Sample records for customer proprietary network

  1. 47 CFR 64.2005 - Use of customer proprietary network information without customer approval.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Use of customer proprietary network information without customer approval. 64.2005 Section 64.2005 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2005 Use of customer proprietary network information without customer...

  2. 47 CFR 64.2005 - Use of customer proprietary network information without customer approval.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 3 2011-10-01 2011-10-01 false Use of customer proprietary network information without customer approval. 64.2005 Section 64.2005 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2005 Use of customer proprietary network information without customer...

  3. 47 CFR 64.2011 - Notification of customer proprietary network information security breaches.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 3 2011-10-01 2011-10-01 false Notification of customer proprietary network information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security...

  4. 47 CFR 64.2011 - Notification of customer proprietary network information security breaches.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Notification of customer proprietary network information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security...

  5. 47 CFR 64.2011 - Notification of customer proprietary network information security breaches.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security... 47 Telecommunication 3 2013-10-01 2013-10-01 false Notification of customer proprietary network information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION...

  6. 47 CFR 64.5111 - Notification of customer proprietary network information security breaches.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Proprietary Network Information. § 64.5111 Notification of customer proprietary network information security... 47 Telecommunication 3 2013-10-01 2013-10-01 false Notification of customer proprietary network information security breaches. 64.5111 Section 64.5111 Telecommunication FEDERAL COMMUNICATIONS COMMISSION...

  7. 47 CFR 64.5111 - Notification of customer proprietary network information security breaches.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Proprietary Network Information. § 64.5111 Notification of customer proprietary network information security... 47 Telecommunication 3 2014-10-01 2014-10-01 false Notification of customer proprietary network information security breaches. 64.5111 Section 64.5111 Telecommunication FEDERAL COMMUNICATIONS COMMISSION...

  8. 47 CFR 64.2011 - Notification of customer proprietary network information security breaches.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security... 47 Telecommunication 3 2014-10-01 2014-10-01 false Notification of customer proprietary network information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION...

  9. 47 CFR 64.2011 - Notification of customer proprietary network information security breaches.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security... 47 Telecommunication 3 2012-10-01 2012-10-01 false Notification of customer proprietary network information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION...

  10. 47 CFR 64.2003 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... RULES RELATING TO COMMON CARRIERS Customer Proprietary Network Information § 64.2003 Definitions. (a... service. (g) Customer proprietary network information (CPNI). The term “customer proprietary network...

  11. 47 CFR 64.2009 - Safeguards required for use of customer proprietary network information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Safeguards required for use of customer proprietary network information. 64.2009 Section 64.2009 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2009 Safeguards required for use of customer proprietary network...

  12. 47 CFR 64.2007 - Approval required for use of customer proprietary network information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Approval required for use of customer proprietary network information. 64.2007 Section 64.2007 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2007 Approval required for use of customer proprietary network...

  13. 47 CFR 64.2007 - Approval required for use of customer proprietary network information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 3 2011-10-01 2011-10-01 false Approval required for use of customer proprietary network information. 64.2007 Section 64.2007 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2007 Approval required for use of customer proprietary network...

  14. 47 CFR 64.2009 - Safeguards required for use of customer proprietary network information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 3 2011-10-01 2011-10-01 false Safeguards required for use of customer proprietary network information. 64.2009 Section 64.2009 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2009 Safeguards required for use of customer proprietary network...

  15. 47 CFR 64.2010 - Safeguards on the disclosure of customer proprietary network information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 3 2011-10-01 2011-10-01 false Safeguards on the disclosure of customer proprietary network information. 64.2010 Section 64.2010 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2010 Safeguards on the disclosure of customer proprietary network...

  16. 47 CFR 64.2008 - Notice required for use of customer proprietary network information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 3 2011-10-01 2011-10-01 false Notice required for use of customer proprietary network information. 64.2008 Section 64.2008 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2008 Notice required for use of customer proprietary network information...

  17. 47 CFR 64.2008 - Notice required for use of customer proprietary network information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Notice required for use of customer proprietary network information. 64.2008 Section 64.2008 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2008 Notice required for use of customer proprietary network information...

  18. 75 FR 9210 - Notice of Public Information Collection(s) Approved by the Office of Management and Budget

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-01

    ... privacy of customer proprietary network information and carrier proprietary information from unauthorized... infrastructure will acquire information regarding interconnected VoIP providers and their customers for use in... for the provision of E911 services. To be clear, no entity may use customer information obtained as a...

  19. 47 CFR 64.2010 - Safeguards on the disclosure of customer proprietary network information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... authenticate a customer prior to disclosing CPNI based on customer-initiated telephone contact, online account... customer. (c) Online access to CPNI. A telecommunications carrier must authenticate a customer without the... customer online access to CPNI related to a telecommunications service account. Once authenticated, the...

  20. 47 CFR 64.2010 - Safeguards on the disclosure of customer proprietary network information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... authenticate a customer prior to disclosing CPNI based on customer-initiated telephone contact, online account... customer. (c) Online access to CPNI. A telecommunications carrier must authenticate a customer without the... customer online access to CPNI related to a telecommunications service account. Once authenticated, the...

  1. 47 CFR 64.2010 - Safeguards on the disclosure of customer proprietary network information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... authenticate a customer prior to disclosing CPNI based on customer-initiated telephone contact, online account... customer. (c) Online access to CPNI. A telecommunications carrier must authenticate a customer without the... customer online access to CPNI related to a telecommunications service account. Once authenticated, the...

  2. 47 CFR 64.5110 - Safeguards on the disclosure of customer proprietary network information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... disclosing CPNI based on a customer-initiated telephone contact, TRS call, point-to-point call, online...) of this section. (c) Online access to CPNI. A TRS provider shall authenticate a customer without the... customer online access to CPNI related to his or her TRS account. Once authenticated, the customer may only...

  3. 47 CFR 64.5110 - Safeguards on the disclosure of customer proprietary network information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... disclosing CPNI based on a customer-initiated telephone contact, TRS call, point-to-point call, online...) of this section. (c) Online access to CPNI. A TRS provider shall authenticate a customer without the... customer online access to CPNI related to his or her TRS account. Once authenticated, the customer may only...

  4. 47 CFR 64.2003 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... RULES RELATING TO COMMON CARRIERS Customer Proprietary Network Information § 64.2003 Definitions. (a) Account information. “Account information” is information that is specifically connected to the customer's service relationship with the carrier, including such things as an account number or any component thereof...

  5. 47 CFR 64.5105 - Use of customer proprietary network information without customer approval.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... calls; (ii) Access, either directly or via a third party, a commercially available database that will... permit access to CPNI upon request by the administrator of the TRS Fund, as that term is defined in § 64...

  6. 47 CFR 64.5105 - Use of customer proprietary network information without customer approval.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... calls; (ii) Access, either directly or via a third party, a commercially available database that will... permit access to CPNI upon request by the administrator of the TRS Fund, as that term is defined in § 64...

  7. 19 CFR 351.304 - Establishing business proprietary treatment of information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... an investigation, the submitting person may enclose business proprietary customer names within double... 19 Customs Duties 3 2010-04-01 2010-04-01 false Establishing business proprietary treatment of... ANTIDUMPING AND COUNTERVAILING DUTIES Information and Argument § 351.304 Establishing business proprietary...

  8. 47 CFR 64.2001 - Basis and purpose.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Basis and purpose. 64.2001 Section 64.2001 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES (CONTINUED) MISCELLANEOUS RULES RELATING TO COMMON CARRIERS Customer Proprietary Network Information § 64.2001 Basis and purpose...

  9. 47 CFR 64.2001 - Basis and purpose.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 3 2011-10-01 2011-10-01 false Basis and purpose. 64.2001 Section 64.2001 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES (CONTINUED) MISCELLANEOUS RULES RELATING TO COMMON CARRIERS Customer Proprietary Network Information § 64.2001 Basis and purpose...

  10. 47 CFR 64.2010 - Safeguards on the disclosure of customer proprietary network information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... not prompted by the carrier asking for readily available biographical information, or account... use of readily available biographical information, or account information, prior to allowing the... readily available biographical information, or account information. (d) In-store access to CPNI. A...

  11. 19 CFR 351.306 - Use of business proprietary information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... that originally submitted the item (e.g., Petitioner, Respondent A, Respondent B). Business proprietary... 19 Customs Duties 3 2010-04-01 2010-04-01 false Use of business proprietary information. 351.306 Section 351.306 Customs Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE ANTIDUMPING AND...

  12. 19 CFR 351.306 - Use of business proprietary information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 3 2011-04-01 2011-04-01 false Use of business proprietary information. 351.306 Section 351.306 Customs Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE ANTIDUMPING AND COUNTERVAILING DUTIES Information and Argument § 351.306 Use of business proprietary information. (a) By the...

  13. 77 FR 42036 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-17

    ... Market Maker,\\5\\ Firm Proprietary and Customer (Professional) \\6\\ orders; and (ii) $0.78 per contract for Non-ISE Market Maker \\7\\ orders. Priority Customer \\8\\ orders are not charged a ``taker'' fee for... Proprietary and Customer (Professional) orders. Priority Customer orders are not charged a ``maker'' fee for...

  14. 78 FR 54704 - Self-Regulatory Organizations; New York Stock Exchange LLC; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-05

    ... via the Common Customer Gateway (``CCG'') and to the Exchanges' proprietary market data products.\\5... Liquidity Center Network Connection in the Exchange Data Center August 29, 2013. Pursuant to Section 19(b)(1... organization. The Commission is publishing this notice to solicit comments on the proposed rule change from...

  15. 78 FR 54710 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing and Immediate Effectiveness of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-05

    ... via the Common Customer Gateway (``CCG'') and to the Exchanges' proprietary market data products.\\5... the same order gateway, regardless of whether the sender is co-located in the data center or not. In... Fees for a 40 Gigabit Liquidity Center Network Connection in the Exchange Data Center August 29, 2013...

  16. 78 FR 44994 - Self-Regulatory Organizations; Chicago Board Options Exchange, Incorporated; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-25

    ... its proprietary and/or market-making desk to trade at prices that would satisfy customer orders held.../or market-making desk at prices that would satisfy the customer order. If a Trading Permit Holder... proprietary and/or market- making desk to trade at prices that would satisfy customer orders held as a...

  17. 19 CFR 357.111 - Public and proprietary information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Public and proprietary information. 357.111 Section 357.111 Customs Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE SHORT SUPPLY...: (1) Business or trade secrets concerning the nature of a product or production process, if unique or...

  18. 19 CFR 357.111 - Public and proprietary information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 3 2011-04-01 2011-04-01 false Public and proprietary information. 357.111 Section 357.111 Customs Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE SHORT SUPPLY...: (1) Business or trade secrets concerning the nature of a product or production process, if unique or...

  19. 19 CFR 357.111 - Public and proprietary information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 3 2012-04-01 2012-04-01 false Public and proprietary information. 357.111 Section 357.111 Customs Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE SHORT SUPPLY...: (1) Business or trade secrets concerning the nature of a product or production process, if unique or...

  20. 17 CFR 31.9 - Minimum financial requirements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... term “customer” means customer as defined in § 31.4(d); (ii) The term “proprietary account” means a... the definition of customer (as defined in paragraph (b)(2)(i) of this section) or proprietary account... demonstrates to the satisfaction of the Commission that it complies with the financial requirements of this...

  1. 75 FR 49546 - Self-Regulatory Organizations; Notice of Filing and Immediate Effectiveness of Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-13

    ... filing is to amend the Schedule to reflect new transaction pricing that will become operative on August 4... customer order flow. Currently, all Firm proprietary manual transactions are charged $0.18 per contract and... transaction involving a Firm's proprietary trading account that has a customer of that same Firm on the contra...

  2. 77 FR 28914 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-16

    ... Market Maker,\\6\\ Market Maker Plus,\\7\\ Firm Proprietary and Customer (Professional) \\8\\ orders; and (ii... for ISE Market Maker, Market Maker Plus, Firm Proprietary and Customer (Professional) orders; and (ii... Plus is an ISE Market Maker who is on the National Best Bid or National Best Offer 80% of the time for...

  3. Social support in the practices of informal providers: The case of patent and proprietary medicine vendors in Nigeria.

    PubMed

    Sieverding, Maia; Liu, Jenny; Beyeler, Naomi

    2015-10-01

    The social and institutional environments in which informal healthcare providers operate shape their health and business practices, particularly in contexts where regulatory enforcement is weak. In this study, we adopt a social capital perspective to understanding the social networks on which proprietary and patent medicine vendors (PPMVs) in Nigeria rely for support in the operation of their shops. Data are drawn from 70 in-depth interviews with PPMVs in three states, including interviews with local leaders of the PPMV professional association. We find that PPMVs primarily relied on more senior colleagues and formal healthcare professionals for informational support, including information about new medicines and advice on how to treat specific cases of illness. For instrumental support, including finance, start-up assistance, and intervention with regulatory agencies, PPMVs relied on extended family, the PPMVs with whom they apprenticed, and the leaders of their professional association. PPMVs' networks also provided continual reinforcement of what constitutes good PPMV practice through admonishments to follow scope of practice limitations. These informal reminders, as well as monitoring activities conducted by the professional association, served to reinforce PPMVs' concern with avoiding negative customer health outcomes, which were perceived to be detrimental to their business reputations. That PPMVs' networks both encouraged practices to reduce the likelihood of poor health outcomes, and provided advice regarding customers' health conditions, highlights the potential impact of informal providers' access to different forms of social capital on their delivery of health services, as well as their success as microenterprises. Copyright © 2015 Elsevier Ltd. All rights reserved.

  4. 47 CFR 51.335 - Notice of network changes: Confidential or proprietary information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Notice of network changes: Confidential or proprietary information. 51.335 Section 51.335 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED... Carriers § 51.335 Notice of network changes: Confidential or proprietary information. (a) If an incumbent...

  5. 47 CFR 51.335 - Notice of network changes: Confidential or proprietary information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 3 2011-10-01 2011-10-01 false Notice of network changes: Confidential or proprietary information. 51.335 Section 51.335 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED... Carriers § 51.335 Notice of network changes: Confidential or proprietary information. (a) If an incumbent...

  6. 48 CFR 225.7304 - FMS customer involvement.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... contract without full and open competition. The FMS customer may also request that a subcontract be placed... disclose to the FMS customer any data, including certified cost or pricing data, that is contractor... proprietary data is a subject of negotiations. (e) Do not allow representatives of the FMS customer to— (1...

  7. 48 CFR 225.7304 - FMS customer involvement.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... contract without full and open competition. The FMS customer may also request that a subcontract be placed... disclose to the FMS customer any data, including certified cost or pricing data, that is contractor... proprietary data is a subject of negotiations. (e) Do not allow representatives of the FMS customer to— (1...

  8. 47 CFR 7.3 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... fiscal relationship of covered entity in question to the parent entity. (i) The term specialized customer... and specialized customer premises equipment commonly used by individuals with disabilities to achieve...-proprietary standard signals used by TTYs. (c) The term customer premises equipment shall mean equipment...

  9. 31 CFR 800.301 - Transactions that are covered transactions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., and maintained relationships with its prior customers, all of which were transferred to Corporation A..., customer list, equipment, and inventory management software used to operate the facility. Under these facts... physical facility, and would not include customer lists, intellectual property, or other proprietary...

  10. 31 CFR 800.301 - Transactions that are covered transactions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., and maintained relationships with its prior customers, all of which were transferred to Corporation A..., customer list, equipment, and inventory management software used to operate the facility. Under these facts... physical facility, and would not include customer lists, intellectual property, or other proprietary...

  11. 31 CFR 800.301 - Transactions that are covered transactions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., and maintained relationships with its prior customers, all of which were transferred to Corporation A..., customer list, equipment, and inventory management software used to operate the facility. Under these facts... physical facility, and would not include customer lists, intellectual property, or other proprietary...

  12. 31 CFR 800.301 - Transactions that are covered transactions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., and maintained relationships with its prior customers, all of which were transferred to Corporation A..., customer list, equipment, and inventory management software used to operate the facility. Under these facts... physical facility, and would not include customer lists, intellectual property, or other proprietary...

  13. 31 CFR 800.301 - Transactions that are covered transactions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., and maintained relationships with its prior customers, all of which were transferred to Corporation A..., customer list, equipment, and inventory management software used to operate the facility. Under these facts... physical facility, and would not include customer lists, intellectual property, or other proprietary...

  14. 17 CFR 31.26 - Quarterly reporting requirement.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... leverage contract was repurchased, resold or liquidated; (i) The leverage customer account identification number; (j) Whether the leverage customer had a commercial or noncommercial leverage account; (k) Whether the leverage customer was the owner or holder of a proprietary leverage account as defined in § 31.4(e...

  15. 77 FR 35727 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-14

    ... categories: ISE Market Maker,\\6\\ Market Maker Plus,\\7\\ Firm Proprietary, Customer (Professional),\\8\\ Non-ISE Market Maker,\\9\\ and Priority Customer.\\10\\ The Exchange is proposing to increase certain rebate amounts... Customer (Professional) is a person who is not a broker/ dealer and is not a Priority Customer. \\9\\ A Non...

  16. 47 CFR 51.317 - Standards for requiring the unbundling of network elements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... network elements. 51.317 Section 51.317 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED... Carriers § 51.317 Standards for requiring the unbundling of network elements. (a) Proprietary network elements. A network element shall be considered to be proprietary if an incumbent LEC can demonstrate that...

  17. 47 CFR 51.317 - Standards for requiring the unbundling of network elements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... network elements. 51.317 Section 51.317 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED... Carriers § 51.317 Standards for requiring the unbundling of network elements. (a) Proprietary network elements. A network element shall be considered to be proprietary if an incumbent LEC can demonstrate that...

  18. 77 FR 16304 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-20

    ...\\ Market Maker Plus,\\8\\ Firm Proprietary, Customer (Professional),\\9\\ Non-ISE Market Maker,\\10\\ and Priority Customer.\\11\\ The Exchange is proposing to increase certain rebates for certain complex orders, as... determine whether or not they are meeting the Exchange's stated criteria. \\9\\ A Customer (Professional) is a...

  19. 75 FR 31500 - Self-Regulatory Organizations; NYSE Amex LLC; Order Approving Proposed Rule Change To Establish...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-03

    ... customer and proprietary order flow. Given the portability of order flow from one trading venue to another... reduce costs for the Exchange's customers. The following basic principles underlie this proposal. A... customers or to distribute the data internally. In addition, the Exchange will require each professional end...

  20. 76 FR 2170 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-12

    ... to market participants that add or remove liquidity from the Exchange (``maker/taker fees'') in 100... contract for Market Maker, Market Maker Plus,\\4\\ Firm Proprietary and Customer (Professional) \\5\\ orders... Customer \\7\\ orders for 100 or more contracts. Priority Customer orders for less than 100 contracts are not...

  1. 19 CFR 207.7 - Limited disclosure of certain business proprietary information under administrative protective...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Limited disclosure of certain business proprietary... order, and file with the Secretary a certificate attesting to his personal, good faith belief that all..., 1994; 61 FR 37829, July 22, 1996; 68 FR 32978, June 3, 2003; 70 FR 8512, Feb. 22, 2005] ...

  2. 19 CFR 207.7 - Limited disclosure of certain business proprietary information under administrative protective...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 3 2011-04-01 2011-04-01 false Limited disclosure of certain business proprietary... order, and file with the Secretary a certificate attesting to his personal, good faith belief that all..., 1994; 61 FR 37829, July 22, 1996; 68 FR 32978, June 3, 2003; 70 FR 8512, Feb. 22, 2005] ...

  3. 77 FR 17530 - Order Granting an Application of Edward Jones & Co. LLP Exemption From Exchange Act Section 11(d...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-26

    ... margin on newly-purchased shares of mutual funds not managed or sponsored by Edward Jones or any affiliate of Edward Jones (``non-proprietary mutual funds'') in instances in which the customer makes a dollar-for-dollar substitution by selling an already- margined non-proprietary mutual fund and buying...

  4. 17 CFR 23.605 - Conflicts of interest policies and procedures.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... for risk management purposes), trading, sales, marketing, advertising, solicitation, structuring, or... exercising direct supervisory authority over the performance of, any proprietary or customer clearing... event with 15 or more existing customers, provided that all of the event participants previously...

  5. 77 FR 65034 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-24

    ... that trade against Priority Customer orders in the Select Symbols, SPY, Non-Select Penny Pilot Symbols...,\\8\\ Firm Proprietary/Broker-Dealer and Professional Customer \\9\\ orders; (ii) $0.20 per contract for Non-ISE Market Maker \\10\\ orders; and (iii) $0.00 per contract for Priority Customer \\11\\ orders. For...

  6. 75 FR 31488 - Self-Regulatory Organizations; New York Stock Exchange, LLC; Order Approving Proposed Rule Change...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-03

    ... that control the handling of a large volume of customer and proprietary order flow. Given the...''). The agreement will authorize the NYSE-Only Vendor to provide NYSE BBO Information to its customers or... customers, issuers, brokers, or dealers. \\6\\ In approving this proposed rule change, the Commission has...

  7. 75 FR 31484 - Self-Regulatory Organizations; NYSE Arca, Inc.; Order Approving Proposed Rule Change To Modify...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-03

    ... firms that control the handling of a large volume of customer and proprietary order flow. Given the... more closely aligns with current data consumption and will reduce costs for the Exchange's customers... Data service to its customers or to distribute the data internally. In addition, the Exchange will...

  8. 77 FR 31680 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-29

    ... Plus; (iii) Non-ISE Market Maker; \\5\\ (iv) Firm Proprietary; (v) Customer (Professional);\\6\\ (vi) Priority Customer,\\7\\ 100 or more contracts; and (vii) Priority Customer, less than 100 contracts. \\3... Market Makers'' collectively. See ISE Rule 100(a)(25). \\5\\ A Non-ISE Market Maker, or Far Away Market...

  9. 78 FR 26828 - Self-Regulatory Organizations; Chicago Board Options Exchange, Incorporated; Order Granting...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-08

    ... simultaneously holding and working a customer order in that same stock. No-Knowledge Exception \\14\\ \\14\\ See... prevent the proprietary trading unit from obtaining knowledge of the customer orders that are held at a... Rule Change, as Modified by Amendment No. 1, Relating to Trading Ahead of Customer Orders and Best...

  10. 19 CFR 207.7 - Limited disclosure of certain business proprietary information under administrative protective...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 3 2014-04-01 2014-04-01 false Limited disclosure of certain business proprietary... order, and file with the Secretary a certificate attesting to his personal, good faith belief that all..., 1994; 61 FR 37829, July 22, 1996; 68 FR 32978, June 3, 2003; 70 FR 8512, Feb. 22, 2005; 76 FR 61942...

  11. 19 CFR 207.7 - Limited disclosure of certain business proprietary information under administrative protective...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 3 2012-04-01 2012-04-01 false Limited disclosure of certain business proprietary... order, and file with the Secretary a certificate attesting to his personal, good faith belief that all..., 1994; 61 FR 37829, July 22, 1996; 68 FR 32978, June 3, 2003; 70 FR 8512, Feb. 22, 2005; 76 FR 61942...

  12. 19 CFR 207.7 - Limited disclosure of certain business proprietary information under administrative protective...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 3 2013-04-01 2013-04-01 false Limited disclosure of certain business proprietary... order, and file with the Secretary a certificate attesting to his personal, good faith belief that all..., 1994; 61 FR 37829, July 22, 1996; 68 FR 32978, June 3, 2003; 70 FR 8512, Feb. 22, 2005; 76 FR 61942...

  13. 77 FR 9906 - Nationwide Categorical Waivers Under Section 1605 (Buy American) of the American Recovery and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-21

    ... (4) network manager for conversion of proprietary protocol--Staefa brand system--to a non-proprietary... conversion of proprietary protocol--Staefa brand system--to a non-proprietary open source protocol, are not... their scouting process did not locate any domestic manufacturers for these exact or equivalent items. In...

  14. 77 FR 19042 - Self-Regulatory Organizations; Notice of Filing and Immediate Effectiveness of Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-29

    ... investments, trading practices and display execution and trading systems. While the examination is primarily... concepts relating to customers.\\5\\ \\5\\ Proprietary trading firms don not have customers. The qualification... Trading Systems, 13 questions. Representatives from the applicable markets intend to meet on a periodic...

  15. Use of small stand-alone Internet nodes as a distributed control system

    NASA Astrophysics Data System (ADS)

    Goodwin, Robert W.; Kucera, Michael J.; Shea, Michael F.

    1994-12-01

    For several years, the standard model for accelerator control systems has been workstation consoles connected to VME local stations by a Local Area Network with analog and digital data being accessed via a field bus to custom I/O interface electronics. Commercially available hardware has now made it possible to implement a small stand-alone data acquisition station that combines the LAN connection, the computer, and the analog and digital I/O interface on a single board. This eliminates the complexity of a field bus and the associated proprietary I/O hardware. A minimum control system is one data acquisition station and a Macintosh or workstation console, both connected to the network; larger systems have more consoles and nodes. An implementation of this architecture is described along with performance and operational experience.

  16. 78 FR 13130 - Self-Regulatory Organizations; ICE Clear Europe Limited; Order Approving Proposed Rule Change, as...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-26

    ... already the case for single-name CDS). Recognizing the highly correlated relationship between long-short...' proprietary positions. ICE Clear Europe does not currently clear CDS positions of customers of its Clearing Members, but it plans to introduce customer clearing for CDS upon receipt of applicable regulatory...

  17. 75 FR 34490 - Self-Regulatory Organizations; NASDAQ OMX BX, Inc.; Order Approving Proposed Rule Change To...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-17

    ... customer and proprietary order flow. Given the portability of order flow from one trading venue to another... designed to permit unfair discrimination between customers, issuers, brokers, or dealers. \\7\\ In approving... flow from market participants; and (ii) the availability to market participants of alternatives to...

  18. 76 FR 49809 - Self-Regulatory Organizations; The NASDAQ Stock Market LLC; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ... investments, trading practices and display execution and trading systems. While the examination is primarily... concepts relating to customers.\\6\\ \\6\\ Proprietary trading firms do not have customers. The qualification... Trading Systems, 13 questions. Representatives from the applicable SROs intend to meet on a periodic basis...

  19. 75 FR 26830 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-12

    ... to the following categories of market participants: (i) Market Maker; (ii) Market Maker Plus; \\6\\ (iii) Non-ISE Market Maker; \\7\\ (iv) Firm Proprietary; (v) Customer (Professional); \\8\\ (vi) Priority... currently charges a fee for removing liquidity to the following class of market participants: (i) Customer...

  20. 16 CFR 4.10 - Nonpublic material.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... sensitive information, such as costs or various types of sales statistics and inventories. It includes trade... customers in which there is a proprietary or highly competitive interest. (3) Interagency or intra-agency...

  1. 16 CFR 4.10 - Nonpublic material.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... sensitive information, such as costs or various types of sales statistics and inventories. It includes trade... customers in which there is a proprietary or highly competitive interest. (3) Interagency or intra-agency...

  2. 16 CFR 4.10 - Nonpublic material.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... sensitive information, such as costs or various types of sales statistics and inventories. It includes trade... customers in which there is a proprietary or highly competitive interest. (3) Interagency or intra-agency...

  3. 16 CFR 4.10 - Nonpublic material.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... sensitive information, such as costs or various types of sales statistics and inventories. It includes trade... customers in which there is a proprietary or highly competitive interest. (3) Interagency or intra-agency...

  4. 16 CFR 4.10 - Nonpublic material.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... sensitive information, such as costs or various types of sales statistics and inventories. It includes trade... customers in which there is a proprietary or highly competitive interest. (3) Interagency or intra-agency...

  5. 76 FR 35498 - Self-Regulatory Organizations; The NASDAQ Stock Market LLC; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-17

    ... handling of a large volume of customer and proprietary order flow. Given the portability of order flow from... public customers. For BONO SM data, the proposed per-user fees are $5 per Professional user; and $1 per... to attract order flow to that exchange. The Exchange believes that the continued availability of BONO...

  6. Upper Stage Tank Thermodynamic Modeling Using SINDA/FLUINT

    NASA Technical Reports Server (NTRS)

    Schallhorn, Paul; Campbell, D. Michael; Chase, Sukhdeep; Piquero, Jorge; Fortenberry, Cindy; Li, Xiaoyi; Grob, Lisa

    2006-01-01

    Modeling to predict the condition of cryogenic propellants in an upper stage of a launch vehicle is necessary for mission planning and successful execution. Traditionally, this effort was performed using custom, in-house proprietary codes, limiting accessibility and application. Phenomena responsible for influencing the thermodynamic state of the propellant have been characterized as distinct events whose sequence defines a mission. These events include thermal stratification, passive thermal control roll (rotation), slosh, and engine firing. This paper demonstrates the use of an off the shelf, commercially available, thermal/fluid-network code to predict the thermodynamic state of propellant during the coast phase between engine firings, i.e. the first three of the above identified events. Results of this effort will also be presented.

  7. Affordable Open-Source Data Loggers for Distributed Measurements of Sap-Flux, Stem Growth, Relative Humidity, Temperature, and Soil Water Content

    NASA Astrophysics Data System (ADS)

    Anderson, T.; Jencso, K. G.; Hoylman, Z. H.; Hu, J.

    2015-12-01

    Characterizing the mechanisms that lead to differences in forest ecosystem productivity across complex terrain remains a challenge. This difficulty can be partially attributed to the cost of installing networks of proprietary data loggers that monitor differences in the biophysical factors contributing to tree growth. Here, we describe the development and initial application of a network of open source data loggers. These data loggers are based on the Arduino platform, but were refined into a custom printed circuit board (PCB). This reduced the cost and complexity of the data loggers, which made them cheap to reproduce and reliable enough to withstand the harsh environmental conditions experienced in Ecohydrology studies. We demonstrate the utility of these loggers for high frequency, spatially-distributed measurements of sap-flux, stem growth, relative humidity, temperature, and soil water content across 36 landscape positions in the Lubrecht Experimental Forest, MT, USA. This new data logging technology made it possible to develop a spatially distributed monitoring network within the constraints of our research budget and may provide new insights into factors affecting forest productivity across complex terrain.

  8. MDPHnet: Secure, Distributed Sharing of Electronic Health Record Data for Public Health Surveillance, Evaluation, and Planning

    PubMed Central

    Vogel, Joshua; Brown, Jeffrey S.; Land, Thomas; Platt, Richard

    2014-01-01

    Electronic health record systems contain clinically detailed data from large populations of patients that could significantly enrich public health surveillance. Clinical practices’ security, privacy, and proprietary concerns, however, have limited their willingness to share these data with public health agencies. We describe a novel distributed network for public health surveillance called MDPHnet. The system allows the Massachusetts Department of Public Health (MDPH) to initiate custom queries against participating practices’ electronic health records while the data remain behind each practice’s firewall. Practices can review proposed queries before execution and approve query results before releasing them to the health department. MDPH is using the system for routine surveillance for priority conditions and to evaluate the impact of public health interventions. PMID:25322301

  9. 17 CFR 20.3 - Clearing organizations.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... day; (5) A proprietary or clearing member customer account indicator; (6) The futures equivalent month...; (13) Gross long non-delta-adjusted swaption positions; and (14) Gross short non-delta-adjusted swaption positions. (c) End of reporting day data. For all futures equivalent months, clearing...

  10. 17 CFR 20.3 - Clearing organizations.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... day; (5) A proprietary or clearing member customer account indicator; (6) The futures equivalent month...; (13) Gross long non-delta-adjusted swaption positions; and (14) Gross short non-delta-adjusted swaption positions. (c) End of reporting day data. For all futures equivalent months, clearing...

  11. Protocol independent transmission method in software defined optical network

    NASA Astrophysics Data System (ADS)

    Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng

    2016-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.

  12. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    PubMed Central

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  13. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    PubMed

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-06-14

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  14. ISS Live!

    NASA Technical Reports Server (NTRS)

    Price, Jennifer; Harris, Philip; Hochstetler, Bruce; Guerra, Mark; Mendez, Israel; Healy, Matthew; Khan, Ahmed

    2013-01-01

    International Space Station Live! (ISSLive!) is a Web application that uses a proprietary commercial technology called Lightstreamer to push data across the Internet using the standard http port (port 80). ISSLive! uses the push technology to display real-time telemetry and mission timeline data from the space station in any common Web browser or Internet- enabled mobile device. ISSLive! is designed to fill a unique niche in the education and outreach areas by providing access to real-time space station data without a physical presence in the mission control center. The technology conforms to Internet standards, supports the throughput needed for real-time space station data, and is flexible enough to work on a large number of Internet-enabled devices. ISSLive! consists of two custom components: (1) a series of data adapters that resides server-side in the mission control center at Johnson Space Center, and (2) a set of public html that renders the data pushed from the data adapters. A third component, the Lightstreamer server, is commercially available from a third party and acts as an intermediary between custom components (1) and (2). Lightstreamer also provides proprietary software libraries that are required to use the custom components. At the time of this reporting, this is the first usage of Web-based, push streaming technology in the aerospace industry.

  15. 19 CFR 351.312 - Industrial users and consumer organizations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ....312 Section 351.312 Customs Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE... § 351.218, paragraphs (b), (c)(1), and (c)(3) of § 351.301, and paragraphs (c), (d), and (e) of § 351... with § 351.303. (c) Business proprietary information. Persons described in paragraph (b) of this...

  16. 76 FR 68846 - Prohibitions and Restrictions on Proprietary Trading and Certain Interests in, and Relationships...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-07

    ...; Trading on behalf of customers; Investments in Small Business Investment Companies (``SBICs'') and public interest investments; Trading for the general account of insurance companies; Organizing and offering a... such entities to continue to provide client-oriented financial services. However, the delineation of...

  17. 77 FR 8331 - Prohibitions and Restrictions on Proprietary Trading and Certain Interests in, and Relationships...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-14

    ... activity; Trading on behalf of customers; Investments in Small Business Investment Companies (``SBICs... and offering a covered fund (including limited investments in such funds); Foreign trading by non-U.S... to continue to provide client-oriented financial services. However, the delineation of what...

  18. 19 CFR 351.304 - Establishing business proprietary treatment of information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... information. 351.304 Section 351.304 Customs Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE...) Electronic databases. In accordance with § 351.303(c)(3), an electronic database need not contain brackets... in the database. The public version of the database must be publicly summarized and ranged in...

  19. 19 CFR 351.304 - Establishing business proprietary treatment of information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... information. 351.304 Section 351.304 Customs Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE...) Electronic databases. In accordance with § 351.303(c)(3), an electronic database need not contain brackets... in the database. The public version of the database must be publicly summarized and ranged in...

  20. 19 CFR 351.304 - Establishing business proprietary treatment of information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... information. 351.304 Section 351.304 Customs Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE...) Electronic databases. In accordance with § 351.303(c)(3), an electronic database need not contain brackets... in the database. The public version of the database must be publicly summarized and ranged in...

  1. Tax-exempt/proprietary partnerships: how the deal gets done.

    PubMed

    Anthony, M F

    1997-01-01

    Joint venture partnerships between tax-exempt healthcare providers and proprietary companies represent a type of provider-sponsored network. Tax-exempt /proprietary partnerships can help tax-exempt providers attain their strategic objectives and, at the same time, retain some governance involvement and healthcare decision-making authority. Proprietary companies that enter into such partnerships are able to expand their market presence and revenue potential without spending capital on an acquisition. Proprietary companies also gain the tax-exempt partners' goodwill, which could take them years to develop on their own. Before negotiating a partnership agreement, potential partners must assess their respective financial, cultural, organizational, and strategic strengths and weaknesses as well as their overall compatibility. Then they must develop contract terms to bring into the partnership negotiations. These terms include purpose, legal structure, assets/liabilities, governance, management, valuation, profit/loss sharing, capitalization/working capital, human resources, withdrawal from the partnership, noncompete covernants, and tax exemption issues.

  2. 77 FR 8928 - Self-Regulatory Organizations; EDGA Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-15

    ...) defines a proprietary trading firm as a firm that embodies the following characteristics: The Member is... the Member's own accounts; the Member does not, and will not have ``customers''; \\7\\ all Principals... of, employees of, or contractors to the Member. In addition, NASDAQ Rule 1032(c) defines a...

  3. 77 FR 34431 - Self-Regulatory Organizations; BATS Y-Exchange, Inc.; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-11

    ... contracts and all customer and introducing broker proprietary accounts along with key personnel to Apex Clearing (the ``Transferring Accounts'').\\5\\ \\4\\ Prior to the Transaction, Apex Clearing's name was Ridge... Transferring Accounts by PFSI. On May 31, 2012, Apex Clearing submitted an application for approval as an...

  4. 76 FR 27735 - Self-Regulatory Organizations; Chicago Stock Exchange, Incorporated; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-12

    ... price. The ``no-knowledge'' exception would also apply to a Participant firm's market-making unit. \\8... to permit its proprietary and/or market-making desk to trade at prices that would satisfy customer... Participant and the circumstances under which the Participant may trade proprietarily at its market- making...

  5. 75 FR 42809 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-22

    .../taker fees currently apply to the following categories of market participants: (i) Market Maker; (ii) Market Maker Plus; \\4\\ (iii) Non-ISE Market Maker; \\5\\ (iv) Firm Proprietary; (v) Customer (Professional... (``PHLX''). PHLX currently charges a fee for removing liquidity to the following class of market...

  6. Community Networks and Effective Change in Proprietary Colleges and Universities: A Systems Perspective

    ERIC Educational Resources Information Center

    Valentine, Dorothy J.

    2017-01-01

    This case study was conducted to gain more knowledge from citizens in the four city area of Virginia which included Chesapeake, Norfolk, Portsmouth, and Virginia Beach concerning the emergence of proprietary colleges in these areas. It was a qualitative study designed to gain more insight into the feelings and regard that citizens in these areas…

  7. Performance analysis of a proposed tightly-coupled medical instrument network based on CAN protocol.

    PubMed

    Mujumdar, Shantanu; Thongpithoonrat, Pongnarin; Gurkan, D; McKneely, Paul K; Chapman, Frank M; Merchant, Fatima

    2010-01-01

    Advances in medical devices and health care has been phenomenal during the recent years. Although medical device manufacturers have been improving their instruments, network connection of these instruments still rely on proprietary technologies. Even if the interface has been provided by the manufacturer (e.g., RS-232, USB, or Ethernet coupled with a proprietary API), there is no widely-accepted uniform data model to access data of various bedside instruments. There is a need for a common standard which allows for internetworking with the medical devices from different manufacturers. ISO/IEEE 11073 (X73) is a standard attempting to unify the interfaces of all medical devices. X73 defines a client access mechanism that would be implemented into the communication controllers (residing between an instrument and the network) in order to access/network patient data. On the other hand, MediCAN™ technology suite has been demonstrated with various medical instruments to achieve interfacing and networking with a similar goal in its open standardization approach. However, it provides a more generic definition for medical data to achieve flexibility for networking and client access mechanisms. The instruments are in turn becoming more sophisticated; however, the operation of an instrument is still expected to be locally done by authorized medical personnel. Unfortunately, each medical instrument has its unique proprietary API (application programming interface - if any) to provide automated and electronic access to monitoring data. Integration of these APIs requires an agreement with the manufacturers towards realization of interoperable health care networking. As long as the interoperability of instruments with a network is not possible, ubiquitous access to patient status is limited only to manual entry based systems. This paper demonstrates an attempt to realize an interoperable medical instrument interface for networking using MediCAN technology suite as an open standard.

  8. 77 FR 35444 - Self-Regulatory Organizations; NYSE Amex LLC; Order Granting Approval of Proposed Rule Change...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-13

    ... to meet their requirement under proposed Rule 107B(d)(1)(A) to identify their market-making activity... proprietary only, and are not related to any customer-facing business, including potentially market-making... Equities Rule 107B To Add a Class of Supplemental Liquidity Providers That are Registered as Market Makers...

  9. 77 FR 24239 - Self-Regulatory Organizations; New York Stock Exchange LLC; Notice of Filing of Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-23

    ... 107B(d)(1)(A) requirement to identify such market-making quotes to the Exchange. The use of unique... proprietary only, and are not related to any customer-facing business, including potentially market-making businesses. The Exchange proposes to maintain this requirement for SLP-Props. However, because market making...

  10. Networking standards

    NASA Technical Reports Server (NTRS)

    Davies, Mark

    1991-01-01

    The enterprise network is currently a multivendor environment consisting of many defacto and proprietary standards. During the 1990s, these networks will evolve towards networks which are based on international standards in both Local Area Network (LAN) and Wide Area Network (WAN) space. Also, you can expect to see the higher level functions and applications begin the same transition. Additional information is given in viewgraph form.

  11. Time-dependent Increase in the Network Response to the Stimulation of Neuronal Cell Cultures on Micro-electrode Arrays.

    PubMed

    Gertz, Monica L; Baker, Zachary; Jose, Sharon; Peixoto, Nathalia

    2017-05-29

    Micro-electrode arrays (MEAs) can be used to investigate drug toxicity, design paradigms for next-generation personalized medicine, and study network dynamics in neuronal cultures. In contrast with more traditional methods, such as patch-clamping, which can only record activity from a single cell, MEAs can record simultaneously from multiple sites in a network, without requiring the arduous task of placing each electrode individually. Moreover, numerous control and stimulation configurations can be easily applied within the same experimental setup, allowing for a broad range of dynamics to be explored. One of the key dynamics of interest in these in vitro studies has been the extent to which cultured networks display properties indicative of learning. Mouse neuronal cells cultured on MEAs display an increase in response following training induced by electrical stimulation. This protocol demonstrates how to culture neuronal cells on MEAs; successfully record from over 95% of the plated dishes; establish a protocol to train the networks to respond to patterns of stimulation; and sort, plot, and interpret the results from such experiments. The use of a proprietary system for stimulating and recording neuronal cultures is demonstrated. Software packages are also used to sort neuronal units. A custom-designed graphical user interface is used to visualize post-stimulus time histograms, inter-burst intervals, and burst duration, as well as to compare the cellular response to stimulation before and after a training protocol. Finally, representative results and future directions of this research effort are discussed.

  12. Reflections on the role of open source in health information system interoperability.

    PubMed

    Sfakianakis, S; Chronaki, C E; Chiarugi, F; Conforti, F; Katehakis, D G

    2007-01-01

    This paper reflects on the role of open source in health information system interoperability. Open source is a driving force in computer science research and the development of information systems. It facilitates the sharing of information and ideas, enables evolutionary development and open collaborative testing of code, and broadens the adoption of interoperability standards. In health care, information systems have been developed largely ad hoc following proprietary specifications and customized design. However, the wide deployment of integrated services such as Electronic Health Records (EHRs) over regional health information networks (RHINs) relies on interoperability of the underlying information systems and medical devices. This reflection is built on the experiences of the PICNIC project that developed shared software infrastructure components in open source for RHINs and the OpenECG network that offers open source components to lower the implementation cost of interoperability standards such as SCP-ECG, in electrocardiography. Open source components implementing standards and a community providing feedback from real-world use are key enablers of health care information system interoperability. Investing in open source is investing in interoperability and a vital aspect of a long term strategy towards comprehensive health services and clinical research.

  13. 19 CFR 207.51 - Judicial review of denial of application for disclosure of certain business proprietary...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 3 2010-04-01 2010-04-01 false Judicial review of denial of application for... SUBSIDIZED EXPORTS TO THE UNITED STATES Judicial Review § 207.51 Judicial review of denial of application for.... Persons entitled to judicial review under section 777(c)(2) of the Commission determination not to...

  14. Hot Chips and Hot Interconnects for High End Computing Systems

    NASA Technical Reports Server (NTRS)

    Saini, Subhash

    2005-01-01

    I will discuss several processors: 1. The Cray proprietary processor used in the Cray X1; 2. The IBM Power 3 and Power 4 used in an IBM SP 3 and IBM SP 4 systems; 3. The Intel Itanium and Xeon, used in the SGI Altix systems and clusters respectively; 4. IBM System-on-a-Chip used in IBM BlueGene/L; 5. HP Alpha EV68 processor used in DOE ASCI Q cluster; 6. SPARC64 V processor, which is used in the Fujitsu PRIMEPOWER HPC2500; 7. An NEC proprietary processor, which is used in NEC SX-6/7; 8. Power 4+ processor, which is used in Hitachi SR11000; 9. NEC proprietary processor, which is used in Earth Simulator. The IBM POWER5 and Red Storm Computing Systems will also be discussed. The architectures of these processors will first be presented, followed by interconnection networks and a description of high-end computer systems based on these processors and networks. The performance of various hardware/programming model combinations will then be compared, based on latest NAS Parallel Benchmark results (MPI, OpenMP/HPF and hybrid (MPI + OpenMP). The tutorial will conclude with a discussion of general trends in the field of high performance computing, (quantum computing, DNA computing, cellular engineering, and neural networks).

  15. The Case for an Open Data Model

    DTIC Science & Technology

    1998-08-01

    Microsoft Word, Pagemaker, and Framemaker , and the drawing programs MacDraw, Adobe Illustrator, and Microsoft PowerPoint, use their own proprietary...needs a custom word counting tool, since no utility could work in Word and other word processors. Framemaker for Windows does not have a word counting...supplied in 2 At least none that I could find in Framemaker 5.5 for Windows. Another problem with

  16. Care-seeking at patent and proprietary medicine vendors in Nigeria.

    PubMed

    Prach, Lisa M; Treleaven, Emily; Isiguzo, Chinwoke; Liu, Jenny

    2015-06-12

    To achieve health development goals, policymakers are increasingly focused on improving primary care in low- and middle-income countries, and private sector drug retailers offer one channel through which basic services may be delivered. In Nigeria, patent and proprietary medicine vendors (PPMVs) serve as a main source of medications, but little is known about their clientele or how care is sought at PPMVs for common illnesses. We explore differences in care-seeking at PPMV shops based on the most commonly reported symptoms. In Kogi and Kwara states, Nigeria, 250 PPMV shop workers and 2,359 customers purchasing drugs were surveyed, and each worker-customer interaction was observed. Multivariate regression analysis was used to assess the association of commonly reported symptoms with care-seeking behavior prior to attending the shop and while interacting with the provider at the shop. Most customers sought care for headache (30.5 %), fever (22.9 %), cough/cold (18.1 %), or diarrhea (8.4 %). Customers with fever were more likely to report being diagnosed by a formally trained person, to have discussed the illness with and be examined by the shop worker, and have more difficulty paying. In contrast, customers with headache symptoms were less likely to experience these outcomes and spent less money purchasing drugs. Those reporting cough or cold symptoms were less likely to have been diagnosed by a formally trained person, waited longer before visiting the PPMV shop, and were more likely to discuss the illness with the shop worker, but were less likely to be examined or to recommend the purchased drug themselves. If a sick child was brought to the shop, a discussion of the illness and an exam were more likely and more money was spent on drugs. Because care-seeking behaviors vary by symptoms and the sick person's age, PPMVs should be trained to treat common illnesses for which customers are unlikely to seek a formal medical consultation. Interventions aimed at improving primary care need to target the places where most people access care, and equip PPMV workers with knowledge and tools to provide basic services.

  17. Achieving Accountability in Cyberspace: Revolution or Evolution?

    DTIC Science & Technology

    2014-01-01

    hours, the malware propagates throughout both networks and begins to beacon to a site known for its state - sponsored cyberspace espionage activities...installation in the United States , communications personnel in a tenant unit, whose primary unclassified operating network is neither owned nor...protect its unclas- sified proprietary network. A known nation- state actor gains access to the company’s network and begins to exfil- trate megabytes

  18. Comparative-effectiveness research in distributed health data networks.

    PubMed

    Toh, S; Platt, R; Steiner, J F; Brown, J S

    2011-12-01

    Comparative-effectiveness research (CER) can be conducted within a distributed health data network. Such networks allow secure access to separate data sets from different data partners and overcome many practical obstacles related to patient privacy, data security, and proprietary concerns. A scalable network architecture supports a wide range of CER activities and meets the data infrastructure needs envisioned by the Federal Coordinating Council for Comparative Effectiveness Research.

  19. Fast BPM data distribution for global orbit feedback using commercial gigabit ethernet technology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hulsart, R.; Cerniglia, P.; Michnoff, R.

    2011-03-28

    In order to correct beam perturbations in RHIC around 10Hz, a new fast data distribution network was required to deliver BPM position data at rates several orders of magnitude above the capability of the existing system. The urgency of the project limited the amount of custom hardware that could be developed, which dictated the use of as much commercially available equipment as possible. The selected architecture uses a custom hardware interface to the existing RHIC BPM electronics together with commercially available Gigabit Ethernet switches to distribute position data to devices located around the collider ring. Using the minimum Ethernet packetmore » size and a field programmable gate array (FPGA) based state machine logic instead of a software based driver, real-time and deterministic data delivery is possible using Ethernet. The method of adapting this protocol for low latency data delivery, bench testing of Ethernet hardware, and the logic to construct Ethernet packets using FPGA hardware will be discussed. A robust communications system using almost all commercial off-the-shelf equipment was developed in under a year which enabled retrofitting of the existing RHIC BPM system to provide 10 KHz data delivery for a global orbit feedback scheme using 72 BPMs. Total latencies from data acquisition at the BPMs to delivery at the controller modules, including very long transmission distances, were kept under 100 {micro}s, which provide very little phase error in correcting the 10 Hz oscillations. Leveraging off of the speed of Gigabit Ethernet and wide availability of Ethernet products enabled this solution to be fully implemented in a much shorter time and at lower cost than if a similar network was developed using a proprietary method.« less

  20. Common MD-IS infrastructure for wireless data technologies

    NASA Astrophysics Data System (ADS)

    White, Malcolm E.

    1995-12-01

    The expansion of global networks, caused by growth and acquisition within the commercial sector, is forcing users to move away from proprietary systems in favor of standards-based, open systems architectures. The same is true in the wireless data communications arena, where operators of proprietary wireless data networks have endeavored to convince users that their particular implementation provides the best service. However, most of the vendors touting these solutions have failed to gain the critical mass that might have lead to their technologies' adoption as a defacto standard, and have been held back by a lack of applications and the high cost of mobile devices. The advent of the cellular digital packet data (CDPD) specification and its support by much of the public cellular service industry has set the stage for the ubiquitous coverage of wireless packet data services across the Unites States. Although CDPD was developed for operation over the advanced mobile phone system (AMPS) cellular network, many of the defined protocols are industry standards that can be applied to the construction of a common infrastructure supporting multiple airlink standards. This approach offers overall cost savings and operation efficiency for service providers, hardware, and software developers and end-users alike, and could be equally advantageous for those service operators using proprietary end system protocols, should they wish to migrate towards an open standard.

  1. Policy Issues in Computer Networks: Multi-Access Information Systems.

    ERIC Educational Resources Information Center

    Lyons, Patrice A.

    As computer databases become more publicly accessible through public networks, there is a growing need to provide effective protection for proprietary information. Without adequate assurances that their works will be protected, authors and other copyright owners may be reluctant to allow the full text of their works to be accessed through computer…

  2. 47 CFR 51.317 - Standards for requiring the unbundling of network elements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... patent, copyright or trade secret law. The Commission shall undertake the following analysis to determine... lack of access to a non-proprietary network element “impairs” a requesting carrier's ability to provide the service it seeks to offer. A requesting carrier's ability to provide service is “impaired” if...

  3. 47 CFR 51.317 - Standards for requiring the unbundling of network elements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... patent, copyright or trade secret law. The Commission shall undertake the following analysis to determine... lack of access to a non-proprietary network element “impairs” a requesting carrier's ability to provide the service it seeks to offer. A requesting carrier's ability to provide service is “impaired” if...

  4. 47 CFR 51.317 - Standards for requiring the unbundling of network elements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... patent, copyright or trade secret law. The Commission shall undertake the following analysis to determine... lack of access to a non-proprietary network element “impairs” a requesting carrier's ability to provide the service it seeks to offer. A requesting carrier's ability to provide service is “impaired” if...

  5. Energy optimization system

    DOEpatents

    Zhou, Zhi; de Bedout, Juan Manuel; Kern, John Michael; Biyik, Emrah; Chandra, Ramu Sharat

    2013-01-22

    A system for optimizing customer utility usage in a utility network of customer sites, each having one or more utility devices, where customer site is communicated between each of the customer sites and an optimization server having software for optimizing customer utility usage over one or more networks, including private and public networks. A customer site model for each of the customer sites is generated based upon the customer site information, and the customer utility usage is optimized based upon the customer site information and the customer site model. The optimization server can be hosted by an external source or within the customer site. In addition, the optimization processing can be partitioned between the customer site and an external source.

  6. Medical instrument data exchange.

    PubMed

    Gumudavelli, Suman; McKneely, Paul K; Thongpithoonrat, Pongnarin; Gurkan, D; Chapman, Frank M

    2008-01-01

    Advances in medical devices and health care has been phenomenal during the recent years. Although medical device manufacturers have been improving their instruments, network connection of these instruments still rely on proprietary technologies. Even if the interface has been provided by the manufacturer (e.g., RS-232, USB, or Ethernet coupled with a proprietary API), there is no widely-accepted uniform data model to access data of various bedside instruments. There is a need for a common standard which allows for internetworking with the medical devices from different manufacturers. ISO/IEEE 11073 (X73) is a standard attempting to unify the interfaces of all medical devices. X73 defines a client access mechanism that would be implemented into the communication controllers (residing between an instrument and the network) in order to access/network patient data. On the other hand, MediCAN technology suite has been demonstrated with various medical instruments to achieve interfacing and networking with a similar goal in its open standardization approach. However, it provides a more generic definition for medical data to achieve flexibility for networking and client access mechanisms. In this paper, a comparison between the data model of X73 and MediCAN will be presented to encourage interoperability demonstrations of medical instruments.

  7. High Fidelity Drug Repurposing, Molecular Profiling, and Cell Reprogramming

    DTIC Science & Technology

    2016-09-01

    network pharmacology and CRCs) to discover and test repurposed drugs that target PCa on an individual patient basis. Objective 1: We will enrich the FDA...repurposing”, for all FDA-approved and experimental drugs. We have recently integrated our proprietary TMFS with network pharmacology , which will help to...samples. In this proposal we integrate two paradigm-shifting Georgetown-Lombardi technologies (TMFS/network pharmacology and CRCs) to discover and test

  8. Migration of legacy mumps applications to relational database servers.

    PubMed

    O'Kane, K C

    2001-07-01

    An extended implementation of the Mumps language is described that facilitates vendor neutral migration of legacy Mumps applications to SQL-based relational database servers. Implemented as a compiler, this system translates Mumps programs to operating system independent, standard C code for subsequent compilation to fully stand-alone, binary executables. Added built-in functions and support modules extend the native hierarchical Mumps database with access to industry standard, networked, relational database management servers (RDBMS) thus freeing Mumps applications from dependence upon vendor specific, proprietary, unstandardized database models. Unlike Mumps systems that have added captive, proprietary RDMBS access, the programs generated by this development environment can be used with any RDBMS system that supports common network access protocols. Additional features include a built-in web server interface and the ability to interoperate directly with programs and functions written in other languages.

  9. 78 FR 14359 - Verizon Business Networks Services, Inc., Specialist-Tech Customer Service, Philadelphia, PA...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-05

    ... Business Networks Services, Inc., Specialist-Tech Customer Service, Philadelphia, PA; Verizon Business Networks Services, Inc., Specialist-Tech Customer Service, Tampa, Florida; Amended Certification Regarding... Business Networks Services, Inc., Order Management Division, Philadelphia, Pennsylvania and Verizon...

  10. Direct-to-PCR tissue preservation for DNA profiling.

    PubMed

    Sorensen, Amy; Berry, Clare; Bruce, David; Gahan, Michelle Elizabeth; Hughes-Stamm, Sheree; McNevin, Dennis

    2016-05-01

    Disaster victim identification (DVI) often occurs in remote locations with extremes of temperatures and humidities. Access to mortuary facilities and refrigeration are not always available. An effective and robust DNA sampling and preservation procedure would increase the probability of successful DNA profiling and allow faster repatriation of bodies and body parts. If the act of tissue preservation also released DNA into solution, ready for polymerase chain reaction (PCR), the DVI process could be further streamlined. In this study, we explored the possibility of obtaining DNA profiles without DNA extraction, by adding aliquots of preservative solutions surrounding fresh human muscle and decomposing human muscle and skin tissue samples directly to PCR. The preservatives consisted of two custom preparations and two proprietary solutions. The custom preparations were a salt-saturated solution of dimethyl sulfoxide (DMSO) with ethylenediaminetetraacetic (EDTA) and TENT buffer (Tris, EDTA, NaCl, Tween 20). The proprietary preservatives were DNAgard (Biomatrica(®)) and Tissue Stabilising Kit (DNA Genotek). We obtained full PowerPlex(®) 21 (Promega) and GlobalFiler(®) (Life Technologies) DNA profiles from fresh and decomposed tissue preserved at 35 °C for up to 28 days for all four preservatives. The preservative aliquots removed from the fresh muscle tissue samples had been stored at -80 °C for 4 years, indicating that long-term archival does not diminish the probability of successful DNA typing. Rather, storage at -80 °C seems to reduce PCR inhibition.

  11. A DNA-Inspired Encryption Methodology for Secure, Mobile Ad Hoc Networks

    NASA Technical Reports Server (NTRS)

    Shaw, Harry

    2012-01-01

    Users are pushing for greater physical mobility with their network and Internet access. Mobile ad hoc networks (MANET) can provide an efficient mobile network architecture, but security is a key concern. A figure summarizes differences in the state of network security for MANET and fixed networks. MANETs require the ability to distinguish trusted peers, and tolerate the ingress/egress of nodes on an unscheduled basis. Because the networks by their very nature are mobile and self-organizing, use of a Public Key Infra structure (PKI), X.509 certificates, RSA, and nonce ex changes becomes problematic if the ideal of MANET is to be achieved. Molecular biology models such as DNA evolution can provide a basis for a proprietary security architecture that achieves high degrees of diffusion and confusion, and resistance to cryptanalysis. A proprietary encryption mechanism was developed that uses the principles of DNA replication and steganography (hidden word cryptography) for confidentiality and authentication. The foundation of the approach includes organization of coded words and messages using base pairs organized into genes, an expandable genome consisting of DNA-based chromosome keys, and a DNA-based message encoding, replication, and evolution and fitness. In evolutionary computing, a fitness algorithm determines whether candidate solutions, in this case encrypted messages, are sufficiently encrypted to be transmitted. The technology provides a mechanism for confidential electronic traffic over a MANET without a PKI for authenticating users.

  12. Historical Analysis of Costs, Risks, and Uncertainties: Moving From a Proprietary to an Open Architected Systems, Open Business Acquisitions Management Approach

    DTIC Science & Technology

    2012-04-30

    businesses look for tangible ROI when evaluating or approving new or continuing investments. One British study found that 89% of companies use...Only by understanding the full range of SOA value propositions can companies begin to get a handle on calculating the ROI of SOA” (para. 2...by nonmonetary valuations , such as customer satisfaction and avoidance of loss of life (Buck, Das, & Hanf, 2008). Figure 1 displays some nonmonetary

  13. An open-source software platform for data management, visualisation, model building and model sharing in water, energy and other resource modelling domains.

    NASA Astrophysics Data System (ADS)

    Knox, S.; Meier, P.; Mohammed, K.; Korteling, B.; Matrosov, E. S.; Hurford, A.; Huskova, I.; Harou, J. J.; Rosenberg, D. E.; Thilmant, A.; Medellin-Azuara, J.; Wicks, J.

    2015-12-01

    Capacity expansion on resource networks is essential to adapting to economic and population growth and pressures such as climate change. Engineered infrastructure systems such as water, energy, or transport networks require sophisticated and bespoke models to refine management and investment strategies. Successful modeling of such complex systems relies on good data management and advanced methods to visualize and share data.Engineered infrastructure systems are often represented as networks of nodes and links with operating rules describing their interactions. Infrastructure system management and planning can be abstracted to simulating or optimizing new operations and extensions of the network. By separating the data storage of abstract networks from manipulation and modeling we have created a system where infrastructure modeling across various domains is facilitated.We introduce Hydra Platform, a Free Open Source Software designed for analysts and modelers to store, manage and share network topology and data. Hydra Platform is a Python library with a web service layer for remote applications, called Apps, to connect. Apps serve various functions including network or results visualization, data export (e.g. into a proprietary format) or model execution. This Client-Server architecture allows users to manipulate and share centrally stored data. XML templates allow a standardised description of the data structure required for storing network data such that it is compatible with specific models.Hydra Platform represents networks in an abstract way and is therefore not bound to a single modeling domain. It is the Apps that create domain-specific functionality. Using Apps researchers from different domains can incorporate different models within the same network enabling cross-disciplinary modeling while minimizing errors and streamlining data sharing. Separating the Python library from the web layer allows developers to natively expand the software or build web-based apps in other languages for remote functionality. Partner CH2M is developing a commercial user-interface for Hydra Platform however custom interfaces and visualization tools can be built. Hydra Platform is available on GitHub while Apps will be shared on a central repository.

  14. 77 FR 27381 - Financial Crimes Enforcement Network: Customer Due Diligence Requirements for Financial...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-10

    ...-AB15 Financial Crimes Enforcement Network: Customer Due Diligence Requirements for Financial... concerning customer due diligence requirements for financial institutions. DATES: Written comments on the... customer due diligence requirements for financial institutions.\\1\\ FinCEN received several comments on the...

  15. Incentive-Based Voltage Regulation in Distribution Networks: Preprint

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhou, Xinyang; Chen, Lijun; Dall'Anese, Emiliano

    This paper considers distribution networks fea- turing distributed energy resources, and designs incentive-based mechanisms that allow the network operator and end-customers to pursue given operational and economic objectives, while concurrently ensuring that voltages are within prescribed limits. Two different network-customer coordination mechanisms that require different amounts of information shared between the network operator and end-customers are developed to identify a solution of a well-defined social-welfare maximization prob- lem. Notably, the signals broadcast by the network operator assume the connotation of prices/incentives that induce the end- customers to adjust the generated/consumed powers in order to avoid the violation of the voltagemore » constraints. Stability of the proposed schemes is analytically established and numerically corroborated.« less

  16. Incentive-Based Voltage Regulation in Distribution Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dall-Anese, Emiliano; Baker, Kyri A; Zhou, Xinyang

    This paper considers distribution networks fea- turing distributed energy resources, and designs incentive-based mechanisms that allow the network operator and end-customers to pursue given operational and economic objectives, while concurrently ensuring that voltages are within prescribed limits. Two different network-customer coordination mechanisms that require different amounts of information shared between the network operator and end-customers are developed to identify a solution of a well-defined social-welfare maximization prob- lem. Notably, the signals broadcast by the network operator assume the connotation of prices/incentives that induce the end- customers to adjust the generated/consumed powers in order to avoid the violation of the voltagemore » constraints. Stability of the proposed schemes is analytically established and numerically corroborated.« less

  17. Tool for Smart Integration of Solar Power

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Becker, Alan

    2017-01-31

    Kevala addresses a significant problem in solar deployment - reducing the risk of investing in solar by determining the inherent value of solar electricity based on the location where it is produced. Kevala’s product will transform the way solar assets are proposed, assessed, and financed resulting in lower capital costs, opening new markets and streamlining siting and customer acquisition. Using detailed electricity infrastructure data, pricing information, GIS mapping, and proprietary algorithms, Kevala’s Grid Assessor software lowers financial risk by providing transparency into the current and future value of projects based on their location.

  18. Variables influencing wearable sensor outcome estimates in individuals with stroke and incomplete spinal cord injury: a pilot investigation validating two research grade sensors.

    PubMed

    Jayaraman, Chandrasekaran; Mummidisetty, Chaithanya Krishna; Mannix-Slobig, Alannah; McGee Koch, Lori; Jayaraman, Arun

    2018-03-13

    Monitoring physical activity and leveraging wearable sensor technologies to facilitate active living in individuals with neurological impairment has been shown to yield benefits in terms of health and quality of living. In this context, accurate measurement of physical activity estimates from these sensors are vital. However, wearable sensor manufacturers generally only provide standard proprietary algorithms based off of healthy individuals to estimate physical activity metrics which may lead to inaccurate estimates in population with neurological impairment like stroke and incomplete spinal cord injury (iSCI). The main objective of this cross-sectional investigation was to evaluate the validity of physical activity estimates provided by standard proprietary algorithms for individuals with stroke and iSCI. Two research grade wearable sensors used in clinical settings were chosen and the outcome metrics estimated using standard proprietary algorithms were validated against designated golden standard measures (Cosmed K4B2 for energy expenditure and metabolic equivalent and manual tallying for step counts). The influence of sensor location, sensor type and activity characteristics were also studied. 28 participants (Healthy (n = 10); incomplete SCI (n = 8); stroke (n = 10)) performed a spectrum of activities in a laboratory setting using two wearable sensors (ActiGraph and Metria-IH1) at different body locations. Manufacturer provided standard proprietary algorithms estimated the step count, energy expenditure (EE) and metabolic equivalent (MET). These estimates were compared with the estimates from gold standard measures. For verifying validity, a series of Kruskal Wallis ANOVA tests (Games-Howell multiple comparison for post-hoc analyses) were conducted to compare the mean rank and absolute agreement of outcome metrics estimated by each of the devices in comparison with the designated gold standard measurements. The sensor type, sensor location, activity characteristics and the population specific condition influences the validity of estimation of physical activity metrics using standard proprietary algorithms. Implementing population specific customized algorithms accounting for the influences of sensor location, type and activity characteristics for estimating physical activity metrics in individuals with stroke and iSCI could be beneficial.

  19. Towards a Pre-Intervention Analytical Methodology

    DTIC Science & Technology

    2012-08-01

    such as concept maps ( Kaste 2007), mind maps, and dynamically interactive networks, available from a variety of proprietary, government, and open...Joint Publication 3-27, Counterterrorism (JP 3-27). Joint Staff. July 2008. Joint Publication 3-57, Civil-Military Operations (JP 3-57). Kaste , R; E

  20. Novel Schemes for Local Area Network Emulation in Passive Optical Networks With RF Subcarrier Multiplexed Customer Traffic

    NASA Astrophysics Data System (ADS)

    Nadarajah, Nishaanthan; Attygalle, Manik; Wong, Elaine; Nirmalathas, Ampalavanapillai

    2005-10-01

    This paper proposes two novel optical layer schemes for intercommunication between customers in a passive optical network (PON). The proposed schemes use radio frequency (RF) subcarrier multiplexed transmission for intercommunication between customers in conjunction with upstream access to the central office (CO) at baseband. One scheme employs a narrowband fiber Bragg grating (FBG) placed close to the star coupler in the feeder fiber of the PON, while the other uses an additional short-length distribution fiber from the star coupler to each customer unit for the redirection of customer traffic. In both schemes, only one optical transmitter is required at each optical network unit (ONU) for the transmission of customer traffic and upstream access traffic. Moreover, downstream bandwidth is not consumed by customer traffic unlike in previously reported techniques. The authors experimentally verify the feasibility of both schemes with 1.25 Gb/s upstream baseband transmission to the CO and 155 Mb/s customer data transmission on the RF carrier. The experimental results obtained from both schemes are compared, and the power budgets are calculated to analyze the scalability of each scheme. Further, the proposed schemes were discussed in terms of upgradability of the transmission bit rates for the upstream access traffic, bandwidth requirements at the customer premises, dispersion tolerance, and stability issues for the practical implementations of the network.

  1. Design of a national distributed health data network.

    PubMed

    Maro, Judith C; Platt, Richard; Holmes, John H; Strom, Brian L; Hennessy, Sean; Lazarus, Ross; Brown, Jeffrey S

    2009-09-01

    A distributed health data network is a system that allows secure remote analysis of separate data sets, each comprising a different medical organization's or health plan's records. Distributed health data networks are currently being planned that could cover millions of people, permitting studies of comparative clinical effectiveness, best practices, diffusion of medical technologies, and quality of care. These networks could also support assessment of medical product safety and other public health needs. Distributed network technologies allow data holders to control all uses of their data, which overcomes many practical obstacles related to confidentiality, regulation, and proprietary interests. Some of the challenges and potential methods of operation of a multipurpose, multi-institutional distributed health data network are described.

  2. Open Source Dataturbine (OSDT) Android Sensorpod in Environmental Observing Systems

    NASA Astrophysics Data System (ADS)

    Fountain, T. R.; Shin, P.; Tilak, S.; Trinh, T.; Smith, J.; Kram, S.

    2014-12-01

    The OSDT Android SensorPod is a custom-designed mobile computing platform for assembling wireless sensor networks for environmental monitoring applications. Funded by an award from the Gordon and Betty Moore Foundation, the OSDT SensorPod represents a significant technological advance in the application of mobile and cloud computing technologies to near-real-time applications in environmental science, natural resources management, and disaster response and recovery. It provides a modular architecture based on open standards and open-source software that allows system developers to align their projects with industry best practices and technology trends, while avoiding commercial vendor lock-in to expensive proprietary software and hardware systems. The integration of mobile and cloud-computing infrastructure represents a disruptive technology in the field of environmental science, since basic assumptions about technology requirements are now open to revision, e.g., the roles of special purpose data loggers and dedicated site infrastructure. The OSDT Android SensorPod was designed with these considerations in mind, and the resulting system exhibits the following characteristics - it is flexible, efficient and robust. The system was developed and tested in the three science applications: 1) a fresh water limnology deployment in Wisconsin, 2) a near coastal marine science deployment at the UCSD Scripps Pier, and 3) a terrestrial ecological deployment in the mountains of Taiwan. As part of a public education and outreach effort, a Facebook page with daily ocean pH measurements from the UCSD Scripps pier was developed. Wireless sensor networks and the virtualization of data and network services is the future of environmental science infrastructure. The OSDT Android SensorPod was designed and developed to harness these new technology developments for environmental monitoring applications.

  3. Extending the XNAT archive tool for image and analysis management in ophthalmology research

    NASA Astrophysics Data System (ADS)

    Wahle, Andreas; Lee, Kyungmoo; Harding, Adam T.; Garvin, Mona K.; Niemeijer, Meindert; Sonka, Milan; Abràmoff, Michael D.

    2013-03-01

    In ophthalmology, various modalities and tests are utilized to obtain vital information on the eye's structure and function. For example, optical coherence tomography (OCT) is utilized to diagnose, screen, and aid treatment of eye diseases like macular degeneration or glaucoma. Such data are complemented by photographic retinal fundus images and functional tests on the visual field. DICOM isn't widely used yet, though, and frequently images are encoded in proprietary formats. The eXtensible Neuroimaging Archive Tool (XNAT) is an open-source NIH-funded framework for research PACS and is in use at the University of Iowa for neurological research applications. Its use for ophthalmology was hence desirable but posed new challenges due to data types thus far not considered and the lack of standardized formats. We developed custom tools for data types not natively recognized by XNAT itself using XNAT's low-level REST API. Vendor-provided tools can be included as necessary to convert proprietary data sets into valid DICOM. Clients can access the data in a standardized format while still retaining the original format if needed by specific analysis tools. With respective project-specific permissions, results like segmentations or quantitative evaluations can be stored as additional resources to previously uploaded datasets. Applications can use our abstract-level Python or C/C++ API to communicate with the XNAT instance. This paper describes concepts and details of the designed upload script templates, which can be customized to the needs of specific projects, and the novel client-side communication API which allows integration into new or existing research applications.

  4. Value Creation Through Integrated Networks and Convergence

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    De Martini, Paul; Taft, Jeffrey D.

    2015-04-01

    Customer adoption of distributed energy resources and public policies are driving changes in the uses of the distribution system. A system originally designed and built for one-way energy flows from central generating facilities to end-use customers is now experiencing injections of energy from customers anywhere on the grid and frequent reversals in the direction of energy flow. In response, regulators and utilities are re-thinking the design and operations of the grid to create more open and transactive electric networks. This evolution has the opportunity to unlock significant value for customers and utilities. Alternatively, failure to seize this potential may insteadmore » lead to an erosion of value if customers seek to defect and disconnect from the system. This paper will discuss how current grid modernization investments may be leveraged to create open networks that increase value through the interaction of intelligent devices on the grid and prosumerization of customers. Moreover, even greater value can be realized through the synergistic effects of convergence of multiple networks. This paper will highlight examples of the emerging nexus of non-electric networks with electricity.« less

  5. Customized ultra-high-power toric intraocular lens implantation for pellucid marginal degeneration and cataract.

    PubMed

    Luck, Jonathan

    2010-07-01

    I report a case of pellucid marginal degeneration (PMD) with cataract that was successfully treated with implantation of an ultra-high-power customized bitoric AT.Comfort 646TLC intraocular lens (IOL). The preoperative uncorrected distance visual acuity (UDVA) was 6/120 and the corrected distance visual acuity (CDVA), 6/24 with 10.9 diopters (D) of keratometric astigmatism on Scheimpflug imaging. After implantation of an IOL with -0.5 +16.0 x 170, the UDVA was 6/9 with a manifest refraction of +0.25 +1.25 x 150 and the CDVA, 6/6(-1). No surgical complications or postoperative problems occurred, and the patient was very satisfied with the outcome. A longer follow-up is required to confirm this favorable clinical result. The author has no financial or proprietary interest in any material or method mentioned. Copyright 2010 ASCRS and ESCRS. Published by Elsevier Inc. All rights reserved.

  6. Sensitivity and specificity of dosing alerts for dosing errors among hospitalized pediatric patients

    PubMed Central

    Stultz, Jeremy S; Porter, Kyle; Nahata, Milap C

    2014-01-01

    Objectives To determine the sensitivity and specificity of a dosing alert system for dosing errors and to compare the sensitivity of a proprietary system with and without institutional customization at a pediatric hospital. Methods A retrospective analysis of medication orders, orders causing dosing alerts, reported adverse drug events, and dosing errors during July, 2011 was conducted. Dosing errors with and without alerts were identified and the sensitivity of the system with and without customization was compared. Results There were 47 181 inpatient pediatric orders during the studied period; 257 dosing errors were identified (0.54%). The sensitivity of the system for identifying dosing errors was 54.1% (95% CI 47.8% to 60.3%) if customization had not occurred and increased to 60.3% (CI 54.0% to 66.3%) with customization (p=0.02). The sensitivity of the system for underdoses was 49.6% without customization and 60.3% with customization (p=0.01). Specificity of the customized system for dosing errors was 96.2% (CI 96.0% to 96.3%) with a positive predictive value of 8.0% (CI 6.8% to 9.3). All dosing errors had an alert over-ridden by the prescriber and 40.6% of dosing errors with alerts were administered to the patient. The lack of indication-specific dose ranges was the most common reason why an alert did not occur for a dosing error. Discussion Advances in dosing alert systems should aim to improve the sensitivity and positive predictive value of the system for dosing errors. Conclusions The dosing alert system had a low sensitivity and positive predictive value for dosing errors, but might have prevented dosing errors from reaching patients. Customization increased the sensitivity of the system for dosing errors. PMID:24496386

  7. First field trial of Virtual Network Operator oriented network on demand (NoD) service provisioning over software defined multi-vendor OTN networks

    NASA Astrophysics Data System (ADS)

    Li, Yajie; Zhao, Yongli; Zhang, Jie; Yu, Xiaosong; Chen, Haoran; Zhu, Ruijie; Zhou, Quanwei; Yu, Chenbei; Cui, Rui

    2017-01-01

    A Virtual Network Operator (VNO) is a provider and reseller of network services from other telecommunications suppliers. These network providers are categorized as virtual because they do not own the underlying telecommunication infrastructure. In terms of business operation, VNO can provide customers with personalized services by leasing network infrastructure from traditional network providers. The unique business modes of VNO lead to the emergence of network on demand (NoD) services. The conventional network provisioning involves a series of manual operation and configuration, which leads to high cost in time. Considering the advantages of Software Defined Networking (SDN), this paper proposes a novel NoD service provisioning solution to satisfy the private network need of VNOs. The solution is first verified in the real software defined multi-domain optical networks with multi-vendor OTN equipment. With the proposed solution, NoD service can be deployed via online web portals in near-real time. It reinvents the customer experience and redefines how network services are delivered to customers via an online self-service portal. Ultimately, this means a customer will be able to simply go online, click a few buttons and have new services almost instantaneously.

  8. PULSION® HP: Tunable, High Productivity Plasma Doping

    NASA Astrophysics Data System (ADS)

    Felch, S. B.; Torregrosa, F.; Etienne, H.; Spiegel, Y.; Roux, L.; Turnbaugh, D.

    2011-01-01

    Plasma doping has been explored for many implant applications for over two decades and is now being used in semiconductor manufacturing for two applications: DRAM polysilicon counter-doping and contact doping. The PULSION HP is a new plasma doping tool developed by Ion Beam Services for high-volume production that enables customer control of the dominant mechanism—deposition, implant, or etch. The key features of this tool are a proprietary, remote RF plasma source that enables a high density plasma with low chamber pressure, resulting in a wide process space, and special chamber and wafer electrode designs that optimize doping uniformity.

  9. Strategy and the Internet.

    PubMed

    Porter, M E

    2001-03-01

    Many of the pioneers of Internet business, both dot-coms and established companies, have competed in ways that violate nearly every precept of good strategy. Rather than focus on profits, they have chased customers indiscriminately through discounting, channel incentives, and advertising. Rather than concentrate on delivering value that earns an attractive price from customers, they have pursued indirect revenues such as advertising and click-through fees. Rather than make trade-offs, they have rushed to offer every conceivable product or service. It did not have to be this way--and it does not have to be in the future. When it comes to reinforcing a distinctive strategy, Michael Porter argues, the Internet provides a better technological platform than previous generations of IT. Gaining competitive advantage does not require a radically new approach to business; it requires building on the proven principles of effective strategy. Porter argues that, contrary to recent thought, the Internet is not disruptive to most existing industries and established companies. It rarely nullifies important sources of competitive advantage in an industry; it often makes them even more valuable. And as all companies embrace Internet technology, the Internet itself will be neutralized as a source of advantage. Robust competitive advantages will arise instead from traditional strengths such as unique products, proprietary content, and distinctive physical activities. Internet technology may be able to fortify those advantages, but it is unlikely to supplant them. Porter debunks such Internet myths as first-mover advantage, the power of virtual companies, and the multiplying rewards of network effects. He disentangles the distorted signals from the marketplace, explains why the Internet complements rather than cannibalizes existing ways of doing business, and outlines strategic imperatives for dot-coms and traditional companies.

  10. Judicious use of custom development in an open source component architecture

    NASA Astrophysics Data System (ADS)

    Bristol, S.; Latysh, N.; Long, D.; Tekell, S.; Allen, J.

    2014-12-01

    Modern software engineering is not as much programming from scratch as innovative assembly of existing components. Seamlessly integrating disparate components into scalable, performant architecture requires sound engineering craftsmanship and can often result in increased cost efficiency and accelerated capabilities if software teams focus their creativity on the edges of the problem space. ScienceBase is part of the U.S. Geological Survey scientific cyberinfrastructure, providing data and information management, distribution services, and analysis capabilities in a way that strives to follow this pattern. ScienceBase leverages open source NoSQL and relational databases, search indexing technology, spatial service engines, numerous libraries, and one proprietary but necessary software component in its architecture. The primary engineering focus is cohesive component interaction, including construction of a seamless Application Programming Interface (API) across all elements. The API allows researchers and software developers alike to leverage the infrastructure in unique, creative ways. Scaling the ScienceBase architecture and core API with increasing data volume (more databases) and complexity (integrated science problems) is a primary challenge addressed by judicious use of custom development in the component architecture. Other data management and informatics activities in the earth sciences have independently resolved to a similar design of reusing and building upon established technology and are working through similar issues for managing and developing information (e.g., U.S. Geoscience Information Network; NASA's Earth Observing System Clearing House; GSToRE at the University of New Mexico). Recent discussions facilitated through the Earth Science Information Partners are exploring potential avenues to exploit the implicit relationships between similar projects for explicit gains in our ability to more rapidly advance global scientific cyberinfrastructure.

  11. No Place to Play: Current Employee Privacy Rights in Social Networking Sites

    ERIC Educational Resources Information Center

    Genova, Gina L.

    2009-01-01

    Employers have legitimate business interests in monitoring workplace Internet use: to minimize legal exposure, to increase productivity, and to avoid proprietary information loss. Since employees arguably have no expectation of privacy in their work on employers' computers, there are few grounds for complaint if they are disciplined for straying…

  12. Safety management of Ethernet broadband access based on VLAN aggregation

    NASA Astrophysics Data System (ADS)

    Wang, Li

    2004-04-01

    With broadband access network development, the Ethernet technology is more and more applied access network now. It is different from the private network -LAN. The differences lie in four points: customer management, safety management, service management and count-fee management. This paper mainly discusses the safety management related questions. Safety management means that the access network must secure the customer data safety, isolate the broad message which brings the customer private information, such as ARP, DHCP, and protect key equipment from attack. Virtue LAN (VLAN) technology can restrict network broadcast flow. We can config each customer port with a VLAN, so each customer is isolated with others. The IP address bound with VLAN ID can be routed rightly. But this technology brings another question: IP address shortage. VLAN aggregation technology can solve this problem well. Such a mechanism provides several advantages over traditional IPv4 addressing architectures employed in large switched LANs today. With VLAN aggregation technology, we introduce the notion of sub-VLANs and super-VLANs, a much more optimal approach to IP addressing can be realized. This paper will expatiate the VLAN aggregation model and its implementation in Ethernet access network. It is obvious that the customers in different sub-VLANs can not communication to each other because the ARP packet is isolated. Proxy ARP can enable the communication among them. This paper will also expatiate the proxy ARP model and its implementation in Ethernet access network.

  13. Dynamic motifs in socio-economic networks

    NASA Astrophysics Data System (ADS)

    Zhang, Xin; Shao, Shuai; Stanley, H. Eugene; Havlin, Shlomo

    2014-12-01

    Socio-economic networks are of central importance in economic life. We develop a method of identifying and studying motifs in socio-economic networks by focusing on “dynamic motifs,” i.e., evolutionary connection patterns that, because of “node acquaintances” in the network, occur much more frequently than random patterns. We examine two evolving bi-partite networks: i) the world-wide commercial ship chartering market and ii) the ship build-to-order market. We find similar dynamic motifs in both bipartite networks, even though they describe different economic activities. We also find that “influence” and “persistence” are strong factors in the interaction behavior of organizations. When two companies are doing business with the same customer, it is highly probable that another customer who currently only has business relationship with one of these two companies, will become customer of the second in the future. This is the effect of influence. Persistence means that companies with close business ties to customers tend to maintain their relationships over a long period of time.

  14. Value Co-creation and Co-innovation: Linking Networked Organisations and Customer Communities

    NASA Astrophysics Data System (ADS)

    Romero, David; Molina, Arturo

    Strategic networks such as Collaborative Networked Organisations (CNOs) and Virtual Customer Communities (VCCs) show a high potential as drivers of value co-creation and collaborative innovation in today’s Networking Era. Both look at the network structures as a source of jointly value creation and open innovation through access to new skills, knowledge, markets and technologies by sharing risk and integrating complementary competencies. This collaborative endeavour has proven to be able to enhance the adaptability and flexibility of CNOs and VCCs value creating systems in order to react in response to external drivers such as collaborative (business) opportunities. This paper presents a reference framework for creating interface networks, also known as ‘experience-centric networks’, as enablers for linking networked organisations and customer communities in order to support the establishment of user-driven and collaborative innovation networks.

  15. Demonstrating High-Accuracy Orbital Access Using Open-Source Tools

    NASA Technical Reports Server (NTRS)

    Gilbertson, Christian; Welch, Bryan

    2017-01-01

    Orbit propagation is fundamental to almost every space-based analysis. Currently, many system analysts use commercial software to predict the future positions of orbiting satellites. This is one of many capabilities that can replicated, with great accuracy, without using expensive, proprietary software. NASAs SCaN (Space Communication and Navigation) Center for Engineering, Networks, Integration, and Communications (SCENIC) project plans to provide its analysis capabilities using a combination of internal and open-source software, allowing for a much greater measure of customization and flexibility, while reducing recurring software license costs. MATLAB and the open-source Orbit Determination Toolbox created by Goddard Space Flight Center (GSFC) were utilized to develop tools with the capability to propagate orbits, perform line-of-sight (LOS) availability analyses, and visualize the results. The developed programs are modular and can be applied for mission planning and viability analysis in a variety of Solar System applications. The tools can perform 2 and N-body orbit propagation, find inter-satellite and satellite to ground station LOS access (accounting for intermediate oblate spheroid body blocking, geometric restrictions of the antenna field-of-view (FOV), and relativistic corrections), and create animations of planetary movement, satellite orbits, and LOS accesses. The code is the basis for SCENICs broad analysis capabilities including dynamic link analysis, dilution-of-precision navigation analysis, and orbital availability calculations.

  16. Parallel Wavefront Analysis for a 4D Interferometer

    NASA Technical Reports Server (NTRS)

    Rao, Shanti R.

    2011-01-01

    This software provides a programming interface for automating data collection with a PhaseCam interferometer from 4D Technology, and distributing the image-processing algorithm across a cluster of general-purpose computers. Multiple instances of 4Sight (4D Technology s proprietary software) run on a networked cluster of computers. Each connects to a single server (the controller) and waits for instructions. The controller directs the interferometer to several images, then assigns each image to a different computer for processing. When the image processing is finished, the server directs one of the computers to collate and combine the processed images, saving the resulting measurement in a file on a disk. The available software captures approximately 100 images and analyzes them immediately. This software separates the capture and analysis processes, so that analysis can be done at a different time and faster by running the algorithm in parallel across several processors. The PhaseCam family of interferometers can measure an optical system in milliseconds, but it takes many seconds to process the data so that it is usable. In characterizing an adaptive optics system, like the next generation of astronomical observatories, thousands of measurements are required, and the processing time quickly becomes excessive. A programming interface distributes data processing for a PhaseCam interferometer across a Windows computing cluster. A scriptable controller program coordinates data acquisition from the interferometer, storage on networked hard disks, and parallel processing. Idle time of the interferometer is minimized. This architecture is implemented in Python and JavaScript, and may be altered to fit a customer s needs.

  17. What is a free customer worth? Armchair calculations of nonpaying customers' value can lead to flawed strategies.

    PubMed

    Gupta, Sunil; Mela, Carl F

    2008-11-01

    Free customers who are subsidized by paying customers are essential to a vast array of businesses, such as media companies, employment services, and even IT providers. But because they generate revenue only indirectly, figuring out the true value of those customers--and how much attention to devote them--has always been a challenge. Traditional customer-valuation models don't help; they focus exclusively on paying customers and largely ignore network effects, or how customers help draw other customers to a business. Now a new model, devised by professors Gupta, of Harvard Business School, and Mela, of Fuqua School of Business, takes into account not only direct network effects (where buyers attract more buyers or sellers more sellers) but also indirect network effects (where buyers attract more sellers or vice versa) . The model calculates the precise long-term impact of each additional free customer on a company's profits, factoring in the degree to which he or she brings in other customers--whether free or paying--and the ripple effect of those customers. The model helped an online auction house make several critical decisions. The business made its money on fees charged to sellers but recognized that its free customers--its buyers--were valuable, too. As competition heated up, the company worried that it wasn't wooing enough buyers. Using the model, the business discovered that the network effects of buyers were indeed large and that those customers were worth over $1,000 each--much more than had been assumed. Armed with that information, the firm increased its research on buyers, invested more in targeting them with ads, and improved their experience. The model also helped the company identify the effects of various pricing strategies on sellers, showing that they became less price-sensitive over time. As a result, the company raised the fees it charged them as well.

  18. Business cycles' correlation and systemic risk of the Japanese supplier-customer network.

    PubMed

    Krichene, Hazem; Chakraborty, Abhijit; Inoue, Hiroyasu; Fujiwara, Yoshi

    2017-01-01

    This work aims to study and explain the business cycle correlations of the Japanese production network. We consider the supplier-customer network, which is a directed network representing the trading links between Japanese firms (links from suppliers to customers). The community structure of this network is determined by applying the Infomap algorithm. Each community is defined by its GDP and its associated business cycle. Business cycle correlations between communities are estimated based on copula theory. Then, based on firms' attributes and network topology, these correlations are explained through linear econometric models. The results show strong evidence of business cycle correlations in the Japanese production network. A significant systemic risk is found for high negative or positive shocks. These correlations are explained mainly by the sector and by geographic similarities. Moreover, our results highlight the higher vulnerability of small communities and small firms, which is explained by the disassortative mixing of the production network.

  19. Business cycles’ correlation and systemic risk of the Japanese supplier-customer network

    PubMed Central

    Chakraborty, Abhijit; Inoue, Hiroyasu; Fujiwara, Yoshi

    2017-01-01

    This work aims to study and explain the business cycle correlations of the Japanese production network. We consider the supplier-customer network, which is a directed network representing the trading links between Japanese firms (links from suppliers to customers). The community structure of this network is determined by applying the Infomap algorithm. Each community is defined by its GDP and its associated business cycle. Business cycle correlations between communities are estimated based on copula theory. Then, based on firms’ attributes and network topology, these correlations are explained through linear econometric models. The results show strong evidence of business cycle correlations in the Japanese production network. A significant systemic risk is found for high negative or positive shocks. These correlations are explained mainly by the sector and by geographic similarities. Moreover, our results highlight the higher vulnerability of small communities and small firms, which is explained by the disassortative mixing of the production network. PMID:29059233

  20. The Quality Challenge: How Kaplan Is Tackling the LEAP Call to Action

    ERIC Educational Resources Information Center

    Smith, Peter

    2012-01-01

    When the author attended a Network for Academic Renewal conference sponsored by the Association of American Colleges and Universities (AAC&U) in 2011, he was surprised by the level of skepticism expressed from the podium about proprietary higher education. This article is intended as a response. From his perspective as a for-profit educator, the…

  1. Customer social network affects marketing strategy: A simulation analysis based on competitive diffusion model

    NASA Astrophysics Data System (ADS)

    Hou, Rui; Wu, Jiawen; Du, Helen S.

    2017-03-01

    To explain the competition phenomenon and results between QQ and MSN (China) in the Chinese instant messaging software market, this paper developed a new population competition model based on customer social network. The simulation results show that the firm whose product with greater network externality effect will gain more market share than its rival when the same marketing strategy is used. The firm with the advantage of time, derived from the initial scale effect will become more competitive than its rival when facing a group of common penguin customers within a social network, verifying the winner-take-all phenomenon in this case.

  2. A social model based on customers' profiles for analyzing the churning process in the mobile market of data plans

    NASA Astrophysics Data System (ADS)

    Postigo-Boix, Marcos; Melús-Moreno, José L.

    2018-04-01

    Mobile Network Operators (MNOs) present wireless services of the same kind in identical zones, clients select the service taking into account any element they consider relevant. Churning hits on the design of the network and the method to assign prices by MNOs, and of course their earnings. Therefore, MNOs try to reduce churn detecting potential churners before they leave the service. Our approach to churn prediction considers each customer individually. Previous research shows that members of the social circle of a subscriber may influence churn. Thus, many scenarios that describe social relations, and in which churning processes could be expected, set an emerging challenge with practical implications. This paper uses the Agent-Based Modeling (ABM) technique to model customers. The model's parameters include demographic and psychographic features as well as usage profiles according to their social behavior considering their customers' profiles. Our model modifies and extends an existing real social network generator algorithm that considers customer's profiles and homophily considerations to create connections. We show that using our approach, groups of customers with greater tendency to churn due to the influence of their social networks can be identified better.

  3. Developing Simulated Cyber Attack Scenarios Against Virtualized Adversary Networks

    DTIC Science & Technology

    2017-03-01

    MAST is a custom software framework originally designed to facilitate the training of network administrators on live networks using SimWare. The MAST...or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services ...scenario development and testing in a virtual test environment. Commercial and custom software tools that provide the ability to conduct network

  4. A study on reliability of power customer in distribution network

    NASA Astrophysics Data System (ADS)

    Liu, Liyuan; Ouyang, Sen; Chen, Danling; Ma, Shaohua; Wang, Xin

    2017-05-01

    The existing power supply reliability index system is oriented to power system without considering actual electricity availability in customer side. In addition, it is unable to reflect outage or customer’s equipment shutdown caused by instantaneous interruption and power quality problem. This paper thus makes a systematic study on reliability of power customer. By comparing with power supply reliability, reliability of power customer is defined and extracted its evaluation requirements. An indexes system, consisting of seven customer indexes and two contrast indexes, are designed to describe reliability of power customer from continuity and availability. In order to comprehensively and quantitatively evaluate reliability of power customer in distribution networks, reliability evaluation method is proposed based on improved entropy method and the punishment weighting principle. Practical application has proved that reliability index system and evaluation method for power customer is reasonable and effective.

  5. The Structure and Evolution of Buyer-Supplier Networks

    PubMed Central

    Mizuno, Takayuki; Souma, Wataru; Watanabe, Tsutomu

    2014-01-01

    In this paper, we investigate the structure and evolution of customer-supplier networks in Japan using a unique dataset that contains information on customer and supplier linkages for more than 500,000 incorporated non-financial firms for the five years from 2008 to 2012. We find, first, that the number of customer links is unequal across firms; the customer link distribution has a power-law tail with an exponent of unity (i.e., it follows Zipf's law). We interpret this as implying that competition among firms to acquire new customers yields winners with a large number of customers, as well as losers with fewer customers. We also show that the shortest path length for any pair of firms is, on average, 4.3 links. Second, we find that link switching is relatively rare. Our estimates indicate that the survival rate per year for customer links is 92 percent and for supplier links 93 percent. Third and finally, we find that firm growth rates tend to be more highly correlated the closer two firms are to each other in a customer-supplier network (i.e., the smaller is the shortest path length for the two firms). This suggests that a non-negligible portion of fluctuations in firm growth stems from the propagation of microeconomic shocks – shocks affecting only a particular firm – through customer-supplier chains. PMID:25000368

  6. The structure and evolution of buyer-supplier networks.

    PubMed

    Mizuno, Takayuki; Souma, Wataru; Watanabe, Tsutomu

    2014-01-01

    In this paper, we investigate the structure and evolution of customer-supplier networks in Japan using a unique dataset that contains information on customer and supplier linkages for more than 500,000 incorporated non-financial firms for the five years from 2008 to 2012. We find, first, that the number of customer links is unequal across firms; the customer link distribution has a power-law tail with an exponent of unity (i.e., it follows Zipf's law). We interpret this as implying that competition among firms to acquire new customers yields winners with a large number of customers, as well as losers with fewer customers. We also show that the shortest path length for any pair of firms is, on average, 4.3 links. Second, we find that link switching is relatively rare. Our estimates indicate that the survival rate per year for customer links is 92 percent and for supplier links 93 percent. Third and finally, we find that firm growth rates tend to be more highly correlated the closer two firms are to each other in a customer-supplier network (i.e., the smaller is the shortest path length for the two firms). This suggests that a non-negligible portion of fluctuations in firm growth stems from the propagation of microeconomic shocks - shocks affecting only a particular firm - through customer-supplier chains.

  7. Improved passive optical network architectures to support local area network emulation and protection

    NASA Astrophysics Data System (ADS)

    Wong, Elaine; Nadarajah, Nishaanthan; Chae, Chang-Joon; Nirmalathas, Ampalavanapillai; Attygalle, Sanjeewa M.

    2006-01-01

    We describe two optical layer schemes which simultaneously facilitate local area network emulation and automatic protection switching against distribution fiber breaks in passive optical networks. One scheme employs a narrowband fiber Bragg grating placed close to the star coupler in the feeder fiber of the passive optical network, while the other uses an additional short length distribution fiber from the star coupler to each customer for the redirection of the customer traffic. Both schemes use RF subcarrier multiplexed transmission for intercommunication between customers in conjunction with upstream access to the central office at baseband. Failure detection and automatic protection switching are performed independently by each optical network unit that is located at the customer premises in a distributed manner. The restoration of traffic transported between the central office and an optical network unit in the event of the distribution fiber break is performed by interconnecting adjacent optical network units and carrying out signal transmissions via an independent but interconnected optical network unit. Such a protection mechanism enables multiple adjacent optical network units to be simultaneously protected by a single optical network unit utilizing its maximum available bandwidth. We experimentally verify the feasibility of both schemes with 1.25 Gb/s upstream baseband transmission to the central office and 155 Mb/s local area network data transmission on a RF subcarrier frequency. The experimental results obtained from both schemes are compared, and the power budgets are calculated to analyze the scalability of each scheme.

  8. A flexible, open, decentralized system for digital pathology networks.

    PubMed

    Schuler, Robert; Smith, David E; Kumaraguruparan, Gowri; Chervenak, Ann; Lewis, Anne D; Hyde, Dallas M; Kesselman, Carl

    2012-01-01

    High-resolution digital imaging is enabling digital archiving and sharing of digitized microscopy slides and new methods for digital pathology. Collaborative research centers, outsourced medical services, and multi-site organizations stand to benefit from sharing pathology data in a digital pathology network. Yet significant technological challenges remain due to the large size and volume of digitized whole slide images. While information systems do exist for managing local pathology laboratories, they tend to be oriented toward narrow clinical use cases or offer closed ecosystems around proprietary formats. Few solutions exist for networking digital pathology operations. Here we present a system architecture and implementation of a digital pathology network and share results from a production system that federates major research centers.

  9. A Flexible, Open, Decentralized System for Digital Pathology Networks

    PubMed Central

    SMITH, David E.; KUMARAGURUPARAN, Gowri; CHERVENAK, Ann; LEWIS, Anne D.; HYDE, Dallas M.; KESSELMAN, Carl

    2014-01-01

    High-resolution digital imaging is enabling digital archiving and sharing of digitized microscopy slides and new methods for digital pathology. Collaborative research centers, outsourced medical services, and multi-site organizations stand to benefit from sharing pathology data in a digital pathology network. Yet significant technological challenges remain due to the large size and volume of digitized whole slide images. While information systems do exist for managing local pathology laboratories, they tend to be oriented toward narrow clinical use cases or offer closed ecosystems around proprietary formats. Few solutions exist for networking digital pathology operations. Here we present a system architecture and implementation of a digital pathology network and share results from a production system that federates major research centers. PMID:22941985

  10. Ultraviolet Communication for Medical Applications

    DTIC Science & Technology

    2015-06-01

    DEI procured several UVC phosphors and tested them with vacuum UV (VUV) excitation. Available emission peaks include: 226 nm, 230 nm, 234 nm, 242...SUPPLEMENTARY NOTES Report contains color. 14. ABSTRACT Under this Phase II SBIR effort, Directed Energy Inc.’s (DEI) proprietary ultraviolet ( UV ...15. SUBJECT TERMS Non-line-of-sight (NLOS), networking, optical communication, plasma-shells, short range, ultraviolet ( UV ) light 16. SECURITY

  11. Network Hardware Virtualization for Application Provisioning in Core Networks

    DOE PAGES

    Gumaste, Ashwin; Das, Tamal; Khandwala, Kandarp; ...

    2017-02-03

    We present that service providers and vendors are moving toward a network virtualized core, whereby multiple applications would be treated on their own merit in programmable hardware. Such a network would have the advantage of being customized for user requirements and allow provisioning of next generation services that are built specifically to meet user needs. In this article, we articulate the impact of network virtualization on networks that provide customized services and how a provider's business can grow with network virtualization. We outline a decision map that allows mapping of applications with technology that is supported in network-virtualization - orientedmore » equipment. Analogies to the world of virtual machines and generic virtualization show that hardware supporting network virtualization will facilitate new customer needs while optimizing the provider network from the cost and performance perspectives. A key conclusion of the article is that growth would yield sizable revenue when providers plan ahead in terms of supporting network-virtualization-oriented technology in their networks. To be precise, providers have to incorporate into their growth plans network elements capable of new service deployments while protecting network neutrality. Finally, a simulation study validates our NV-induced model.« less

  12. Network Hardware Virtualization for Application Provisioning in Core Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gumaste, Ashwin; Das, Tamal; Khandwala, Kandarp

    We present that service providers and vendors are moving toward a network virtualized core, whereby multiple applications would be treated on their own merit in programmable hardware. Such a network would have the advantage of being customized for user requirements and allow provisioning of next generation services that are built specifically to meet user needs. In this article, we articulate the impact of network virtualization on networks that provide customized services and how a provider's business can grow with network virtualization. We outline a decision map that allows mapping of applications with technology that is supported in network-virtualization - orientedmore » equipment. Analogies to the world of virtual machines and generic virtualization show that hardware supporting network virtualization will facilitate new customer needs while optimizing the provider network from the cost and performance perspectives. A key conclusion of the article is that growth would yield sizable revenue when providers plan ahead in terms of supporting network-virtualization-oriented technology in their networks. To be precise, providers have to incorporate into their growth plans network elements capable of new service deployments while protecting network neutrality. Finally, a simulation study validates our NV-induced model.« less

  13. Baseline OCT Measurements in the Idiopathic Intracranial Hypertension Treatment Trial, Part I: Quality Control, Comparisons, and Variability

    PubMed Central

    2014-01-01

    Purpose. Optical coherence tomography (OCT) has been used to investigate papilledema in single-site, mostly retrospective studies. We investigated whether spectral-domain OCT (SD-OCT), which provides thickness and volume measurements of the optic nerve head and retina, could reliably demonstrate structural changes due to papilledema in a prospective multisite clinical trial setting. Methods. At entry, 126 subjects in the Idiopathic Intracranial Hypertension Treatment Trial (IIHTT) with mild visual field loss had optic disc and macular scans, using the Cirrus SD-OCT. Images were analyzed by using the proprietary commercial and custom 3D-segmentation algorithms to calculate retinal nerve fiber layer (RNFL), total retinal thickness (TRT), optic nerve head volume (ONHV), and retinal ganglion cell layer (GCL) thickness. We evaluated variability, with interocular comparison and correlation between results for both methods. Results. The average RNFL thickness > 95% of normal controls in 90% of eyes and the RNFL, TRT, ONH height, and ONHV showed strong (r > 0.8) correlations for interocular comparisons. Variability for repeated testing of OCT parameters was low for both methods and intraclass correlations > 0.9 except for the proprietary GCL thickness. The proprietary algorithm–derived RNFL, TRT, and GCL thickness measurements had failure rates of 10%, 16%, and 20% for all eyes respectively, which were uncommon with 3D-segmentation–derived measurements. Only 7% of eyes had GCL thinning that was less than fifth percentile of normal age-matched control eyes by both methods. Conclusions. Spectral-domain OCT provides reliable continuous variables and quantified assessment of structural alterations due to papilledema. (ClinicalTrials.gov number, NCT01003639.) PMID:25370510

  14. The limits of scale.

    PubMed

    Halaburda, Hanna; Oberholzer-Gee, Felix

    2014-04-01

    The value of many products and services rises or falls with the number of customers using them; the fewer fax machines in use, the less important it is to have one. These network effects influence consumer decisions and affect companies' ability to compete. Strategists have developed some well-known rules for navigating business environments with network effects. "Move first" is one, and "get big fast" is another. In a study of dozens of companies, however, the authors found that quite often the conventional wisdom was dead wrong. And when the rules failed, the reason was always the same: Companies trip up when they try to attract large volumes of customers without understanding (1) the strength of mutual attraction among various customer groups and (2) the extent of asymmetric attraction among them. Looking at examples such as TripAdvisor, Wikipedia, and the New York Times, the authors offer strategies for competing in markets with network effects. New entrants should focus on customer groups that they are uniquely positioned to serve or appeal to the most attractive customers in a market. Incumbents pursuing growth strategies in adjacent markets or new geographies should consider how similar the needs of new customers are to those of existing customers. Offering complements also allows incumbents to reach additional customer groups.

  15. 17 CFR 75.7 - Limitations on permitted proprietary trading activities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... proprietary trading activities. 75.7 Section 75.7 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION (CONTINUED) PROPRIETARY TRADING AND CERTAIN INTERESTS IN AND RELATIONSHIPS WITH COVERED FUNDS Proprietary Trading § 75.7 Limitations on permitted proprietary trading activities. (a) No transaction, class...

  16. 17 CFR 255.7 - Limitations on permitted proprietary trading activities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... proprietary trading activities. 255.7 Section 255.7 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) PROPRIETARY TRADING AND CERTAIN INTERESTS IN AND RELATIONSHIPS WITH COVERED FUNDS Proprietary Trading § 255.7 Limitations on permitted proprietary trading activities. (a) No transaction, class...

  17. Requirements management: A CSR's perspective

    NASA Technical Reports Server (NTRS)

    Thompson, Joanie

    1991-01-01

    The following subject areas are covered: customer service overview of network service request processing; Customer Service Representative (CSR) responsibility matrix; extract from a sample Memorandum of Understanding; Network Service Request Form and its instructions sample notification of receipt; and requirements management in the NASA Science Internet.

  18. Insider Threats in the Software Development Lifecycle

    DTIC Science & Technology

    2014-11-05

    employee, contractor, or other business partner who • has or had authorized access to an organization’s network , system or data and • intentionally...organization’s network , system, or data and who, through • their action/inaction without malicious intent • cause harm or substantially increase...and female Male Target Network , systems, or data PII or Customer Information IP (trade secrets) or Customer Information Access Used

  19. SPAN: Ocean science

    NASA Technical Reports Server (NTRS)

    Thomas, Valerie L.; Koblinsky, Chester J.; Webster, Ferris; Zlotnicki, Victor; Green, James L.

    1987-01-01

    The Space Physics Analysis Network (SPAN) is a multi-mission, correlative data comparison network which links space and Earth science research and data analysis computers. It provides a common working environment for sharing computer resources, sharing computer peripherals, solving proprietary problems, and providing the potential for significant time and cost savings for correlative data analysis. This is one of a series of discipline-specific SPAN documents which are intended to complement the SPAN primer and SPAN Management documents. Their purpose is to provide the discipline scientists with a comprehensive set of documents to assist in the use of SPAN for discipline specific scientific research.

  20. The LiveWire Project final report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brown, C.D.; Nelson, T.T.; Kelly, J.C.

    Utilities across the US have begun pilot testing a variety of hardware and software products to develop a two-way communications system between themselves and their customers. Their purpose is to reduce utility operating costs and to provide new and improved services for customers in light of pending changes in the electric industry being brought about by deregulation. A consortium including utilities, national labs, consultants, and contractors, with the support of the Department of Energy (DOE) and the Electric Power Research Institute (EPRI), initiated a project that utilized a hybrid fiber-coax (HFC) wide-area network integrated with a CEBus based local areamore » network within the customers home. The system combined energy consumption data taken within the home, and home automation features to provide a suite of energy management services for residential customers. The information was transferred via the Internet through the HFC network, and presented to the customer on their personal computer. This final project report discusses the design, prototype testing, and system deployment planning of the energy management system.« less

  1. A generic open-source software framework supporting scenario simulations in bioterrorist crises.

    PubMed

    Falenski, Alexander; Filter, Matthias; Thöns, Christian; Weiser, Armin A; Wigger, Jan-Frederik; Davis, Matthew; Douglas, Judith V; Edlund, Stefan; Hu, Kun; Kaufman, James H; Appel, Bernd; Käsbohrer, Annemarie

    2013-09-01

    Since the 2001 anthrax attack in the United States, awareness of threats originating from bioterrorism has grown. This led internationally to increased research efforts to improve knowledge of and approaches to protecting human and animal populations against the threat from such attacks. A collaborative effort in this context is the extension of the open-source Spatiotemporal Epidemiological Modeler (STEM) simulation and modeling software for agro- or bioterrorist crisis scenarios. STEM, originally designed to enable community-driven public health disease models and simulations, was extended with new features that enable integration of proprietary data as well as visualization of agent spread along supply and production chains. STEM now provides a fully developed open-source software infrastructure supporting critical modeling tasks such as ad hoc model generation, parameter estimation, simulation of scenario evolution, estimation of effects of mitigation or management measures, and documentation. This open-source software resource can be used free of charge. Additionally, STEM provides critical features like built-in worldwide data on administrative boundaries, transportation networks, or environmental conditions (eg, rainfall, temperature, elevation, vegetation). Users can easily combine their own confidential data with built-in public data to create customized models of desired resolution. STEM also supports collaborative and joint efforts in crisis situations by extended import and export functionalities. In this article we demonstrate specifically those new software features implemented to accomplish STEM application in agro- or bioterrorist crisis scenarios.

  2. PyPLIF: Python-based Protein-Ligand Interaction Fingerprinting.

    PubMed

    Radifar, Muhammad; Yuniarti, Nunung; Istyastono, Enade Perdana

    2013-01-01

    Structure-based virtual screening (SBVS) methods often rely on docking score. The docking score is an over-simplification of the actual ligand-target binding. Its capability to model and predict the actual binding reality is limited. Recently, interaction fingerprinting (IFP) has come and offered us an alternative way to model reality. IFP provides us an alternate way to examine protein-ligand interactions. The docking score indicates the approximate affinity and IFP shows the interaction specificity. IFP is a method to convert three dimensional (3D) protein-ligand interactions into one dimensional (1D) bitstrings. The bitstrings are subsequently employed to compare the protein-ligand interaction predicted by the docking tool against the reference ligand. These comparisons produce scores that can be used to enhance the quality of SBVS campaigns. However, some IFP tools are either proprietary or using a proprietary library, which limits the access to the tools and the development of customized IFP algorithm. Therefore, we have developed PyPLIF, a Python-based open source tool to analyze IFP. In this article, we describe PyPLIF and its application to enhance the quality of SBVS in order to identify antagonists for estrogen α receptor (ERα). PyPLIF is freely available at http://code.google.com/p/pyplif.

  3. The Evolution of ICT Markets: An Agent-Based Model on Complex Networks

    NASA Astrophysics Data System (ADS)

    Zhao, Liangjie; Wu, Bangtao; Chen, Zhong; Li, Li

    Information and communication technology (ICT) products exhibit positive network effects.The dynamic process of ICT markets evolution has two intrinsic characteristics: (1) customers are influenced by each others’ purchasing decision; (2) customers are intelligent agents with bounded rationality.Guided by complex systems theory, we construct an agent-based model and simulate on complex networks to examine how the evolution can arise from the interaction of customers, which occur when they make expectations about the future installed base of a product by the fraction of neighbors who are using the same product in his personal network.We demonstrate that network effects play an important role in the evolution of markets share, which make even an inferior product can dominate the whole market.We also find that the intensity of customers’ communication can influence whether the best initial strategy for firms is to improve product quality or expand their installed base.

  4. Large optical 3D MEMS switches in access networks

    NASA Astrophysics Data System (ADS)

    Madamopoulos, Nicholas; Kaman, Volkan; Yuan, Shifu; Jerphagnon, Olivier; Helkey, Roger; Bowers, John E.

    2007-09-01

    Interest is high among residential customers and businesses for advanced, broadband services such as fast Internet access, electronic commerce, video-on-demand, digital broadcasting, teleconferencing and telemedicine. In order to satisfy such growing demand of end-customers, access technologies such as fiber-to-the-home/building (FTTH/B) are increasingly being deployed. Carriers can reduce maintenance costs, minimize technology obsolescence and introduce new services easily by reducing active elements in the fiber access network. However, having a passive optical network (PON) also introduces operational and maintenance challenges. Increased diagnostic monitoring capability of the network becomes a necessity as more and more fibers are provisioned to deliver services to the end-customers. This paper demonstrates the clear advantages that large 3D optical MEMS switches offer in solving these access network problems. The advantages in preventative maintenance, remote monitoring, test and diagnostic capability are highlighted. The low optical insertion loss for all switch optical connections of the switch enables the monitoring, grooming and serving of a large number of PON lines and customers. Furthermore, the 3D MEMS switch is transparent to optical wavelengths and data formats, thus making it easy to incorporate future upgrades, such higher bit rates or DWDM overlay to a PON.

  5. The development of a qualitative dynamic attribute value model for healthcare institutes.

    PubMed

    Lee, Wan-I

    2010-01-01

    Understanding customers has become an urgent topic for increasing competitiveness. The purpopse of the study was to develop a qualitative dynamic attribute value model which provides insight into the customers' value for healthcare institute managers by conducting the initial open-ended questionnaire survey to select participants purposefully. A total number of 427 questionnaires was conducted in two hospitals in Taiwan (one district hospital with 635 beds and one academic hospital with 2495 beds) and 419 questionnaires were received in nine weeks. Then, apply qualitative in-depth interviews to explore customers' perspective of values for building a model of partial differential equations. This study concludes nine categories of value, including cost, equipment, physician background, physicain care, environment, timing arrangement, relationship, brand image and additional value, to construct objective network for customer value and qualitative dynamic attribute value model where the network shows the value process of loyalty development via its effect on customer satisfaction, customer relationship, customer loyalty and healthcare service. One set predicts the customer relationship based on comminent, including service quality, communication and empahty. As the same time, customer loyalty based on trust, involves buzz marketing, brand and image. Customer value of the current instance is useful for traversing original customer attributes and identifing customers on different service share.

  6. Model for collaboration: a rural medicine and academic health center teleradiology project

    NASA Astrophysics Data System (ADS)

    Van Slyke, Mark A.; Eggli, Douglas F.; Prior, Fred W.; Salmon, William; Pappas, Gregory; Vanatta, Fred; Goldfetter, Warren; Hashem, Said

    1996-05-01

    A pilot project was developed to explore the role of subspecialty radiology support to rural medicine sites over a long-distance network. A collaborative relationship between 2 rural radiology practices and an academic health was established. Project objectives included: (1) Does the subspecialty consultation significantly change diagnosis patterns at the rural site? (2) Is there value added as measured by improved clinical care or an overall decreased cost of care? (3) Can a collaborative model be economically self-supportive? (4) Does the collaborative model encourage and support education and collegial relationships? Two rural hospitals were selected based on the level of imaging technology and willingness to cooperate. Image capture and network technology was chosen to make the network process transparent to the users. DICOM standard interfaces were incorporated into existing CT and MRI scanners and a film digitizer. Nuclear medicine images were transferred and viewed using a proprietary vendor protocol. Relevant clinical data was managed by a custom designed PC based Lotus Notes application (Patient Study Tracking System: PaSTS) (Pennsylvania Blue Shield Institute). All data was transferred over a Frame Relay network and managed by the Pennsylvania Commonwealth sponsored PA Health Net. Images, other than nuclear medicine, were viewed on a GE Advantage viewing station using a pair of 2 X 2.5 K gray scale monitors. Patient text data was managed by the PaSTS PC and displayed on a separate 15' color monitor. A total of 476 radiology studies were networked into the AHC. Randomly chosen research studies comprised 82% of the case work. Consultative and primary read cases comprised 17% and 1% respectively. The exercise was judged effective by both rural sites. Significant findings and diagnoses were confirmed in 73% of cases with discrepant findings in only 4%. One site benefited by adopting more advanced imaging techniques increasing the sophistication of radiology services. The primary value for the referring sites was the added confidence provided by the subspecialty overreads. An educational value was recognized by all. In conclusion, the networking of rural health care sites to an AHC subspecialty radiology practice was successful primarily in increasing the diagnostic confidence at the rural site. Other benefits included: education; increased rural imaging and an opportunity to provide primary interpretation when the rural radiologist is not available. However, the rate of rural generated consultation was low (17%) and is unlikely to support the costs of a high speed network. To support, rather than replace, rural radiology requires a lower cost network and a mechanism for payment for these services.

  7. Creation and perturbation of planar networks of chemical oscillators

    PubMed Central

    Tompkins, Nathan; Cambria, Matthew Carl; Wang, Adam L.; Heymann, Michael; Fraden, Seth

    2015-01-01

    Methods for creating custom planar networks of diffusively coupled chemical oscillators and perturbing individual oscillators within the network are presented. The oscillators consist of the Belousov-Zhabotinsky (BZ) reaction contained in an emulsion. Networks of drops of the BZ reaction are created with either Dirichlet (constant-concentration) or Neumann (no-flux) boundary conditions in a custom planar configuration using programmable illumination for the perturbations. The differences between the observed network dynamics for each boundary condition are described. Using light, we demonstrate the ability to control the initial conditions of the network and to cause individual oscillators within the network to undergo sustained period elongation or a one-time phase delay. PMID:26117136

  8. Aortic Curvature Instead of Angulation Allows Improved Estimation of the True Aorto-iliac Trajectory.

    PubMed

    Schuurmann, R C L; Kuster, L; Slump, C H; Vahl, A; van den Heuvel, D A F; Ouriel, K; de Vries, J-P P M

    2016-02-01

    Supra- and infrarenal aortic neck angulation have been associated with complications after endovascular aortic aneurysm repair. However, a uniform angulation measurement method is lacking and the concept of angulation suggests a triangular oversimplification of the aortic anatomy. (Semi-)automated calculation of curvature along the center luminal line describes the actual trajectory of the aorta. This study proposes a methodology for calculating aortic (neck) curvature and suggests an additional method based on available tools in current workstations: curvature by digital calipers (CDC). Proprietary custom software was developed for automatic calculation of the severity and location of the largest supra- and infrarenal curvature over the center luminal line. Twenty-four patients with severe supra- or infrarenal angulations (≥45°) and 11 patients with small to moderate angulations (<45°) were included. Both CDC and angulation were measured by two independent observers on the pre- and postoperative computed tomographic angiography scans. The relationships between actual curvature and CDC and angulation were visualized and tested with Pearson's correlation coefficient. The CDC was also fully automatically calculated with proprietary custom software. The difference between manual and automatic determination of CDC was tested with a paired Student t test. A p-value was considered significant when two-tailed α < .05. The correlation between actual curvature and manual CDC is strong (.586-.962) and even stronger for automatic CDC (.865-.961). The correlation between actual curvature and angulation is much lower (.410-.737). Flow direction angulation values overestimate CDC measurements by 60%, with larger variance. No significant difference was found in automatically calculated CDC values and manually measured CDC values. Curvature calculation of the aortic neck improves determination of the true aortic trajectory. Automatic calculation of the actual curvature is preferable, but measurement or calculation of the curvature by digital calipers is a valid alternative if actual curvature is not at hand. Copyright © 2015 European Society for Vascular Surgery. Published by Elsevier Ltd. All rights reserved.

  9. Advanced Wireless Integrated Navy Network - AWINN

    DTIC Science & Technology

    2005-09-30

    progress report No. 3 on AWINN hardware and software configurations of smart , wideband, multi-function antennas, secure configurable platform, close-in...results to the host PC via a UART soft core. The UART core used is a proprietary Xilinx core which incorporates features described in National...current software uses wheel odometry and visual landmarks to create a map and estimate position on an internal x, y grid . The wheel odometry provides a

  10. GCN capabilities and status, and the incorporation of LIGO/Virgo

    NASA Astrophysics Data System (ADS)

    Barthelmy, Scott

    2016-03-01

    The Gamma-ray Coordinates Network / Transient Astronomy Network (GCN/TAN) is a single-point source for all transient astronomy notification. It collects the astrophysical transients from the missions (space-based and nearly all ground-based), puts them into a standard format, and distributes them to whomever wants to receive them. This is all done autonomously (completely autonomous within GCN/TAN, and almost always autonomously within the producer end of operations). This automation means minimal time delays (<0.1 sec within GCN for VOEvent and binary socket-based distribution methods, and typically a few sec for email-based which is dependent on the internet email protocol and the number of hops, both of which are out of the control of GCN/TAN). The LIGO-VIRGO Collaboration (LVC) Notices are now implemented in the GCN/TAN system. During the proprietary phase, the recipients must have an MoU with LVC and LVC must authorize GCN to distribute LVC Notices to each given MoU follow-up observer. In addition to Notices, there are the GCN Circulars, which are prose-style reports of follow-up observations made and results obtains. During the LVC Proprietary phase there are also the GCN LVC Circulars, which also require authorization from LVC to join the LVC Circulars.

  11. Social Networking Sites as a Learning Tool

    ERIC Educational Resources Information Center

    Sanchez-Casado, Noelia; Cegarra Navarro, Juan Gabriel; Wensley, Anthony; Tomaseti-Solano, Eva

    2016-01-01

    Purpose: Over the past few years, social networking sites (SNSs) have become very useful for firms, allowing companies to manage the customer-brand relationships. In this context, SNSs can be considered as a learning tool because of the brand knowledge that customers develop from these relationships. Because of the fact that knowledge in…

  12. Identifying web usage behavior of bank customers

    NASA Astrophysics Data System (ADS)

    Araya, Sandro; Silva, Mariano; Weber, Richard

    2002-03-01

    The bank Banco Credito e Inversiones (BCI) started its virtual bank in 1996 and its registered customers perform currently more than 10,000 Internet transactions daily, which typically cause les than 10% of traditional transaction costs. Since most of the customers are still not registered for online banking, one of the goals of the virtual bank is to increase then umber of registered customers. Objective of the presented work was to identify customers who are likely to perform online banking but still do not use this medium for their transactions. This objective has been reached by determining profiles of registered customers who perform many transactions online. Based on these profiles the bank's Data Warehouse is explored for twins of these heavy users that are still not registered for online banking. We applied clustering in order to group the registered customers into five classes. One of these classes contained almost 30% of all registered customers and could clearly be identified as class of heavy users. Next a neural network assigned online customers to the previously found five classes. Applying the network trained on online customers to all the bank customers identified twins of heavy users that, however had not performed online transactions so far. A mailing to these candidates informing about the advantages of online banking doubled the number of registrations compared to previous campaigns.

  13. State of the Art of Network Security Perspectives in Cloud Computing

    NASA Astrophysics Data System (ADS)

    Oh, Tae Hwan; Lim, Shinyoung; Choi, Young B.; Park, Kwang-Roh; Lee, Heejo; Choi, Hyunsang

    Cloud computing is now regarded as one of social phenomenon that satisfy customers' needs. It is possible that the customers' needs and the primary principle of economy - gain maximum benefits from minimum investment - reflects realization of cloud computing. We are living in the connected society with flood of information and without connected computers to the Internet, our activities and work of daily living will be impossible. Cloud computing is able to provide customers with custom-tailored features of application software and user's environment based on the customer's needs by adopting on-demand outsourcing of computing resources through the Internet. It also provides cloud computing users with high-end computing power and expensive application software package, and accordingly the users will access their data and the application software where they are located at the remote system. As the cloud computing system is connected to the Internet, network security issues of cloud computing are considered as mandatory prior to real world service. In this paper, survey and issues on the network security in cloud computing are discussed from the perspective of real world service environments.

  14. 17 CFR 255.6 - Other permitted proprietary trading activities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... trading activities. 255.6 Section 255.6 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) PROPRIETARY TRADING AND CERTAIN INTERESTS IN AND RELATIONSHIPS WITH COVERED FUNDS Proprietary Trading § 255.6 Other permitted proprietary trading activities. (a) Permitted trading in domestic...

  15. 17 CFR 75.6 - Other permitted proprietary trading activities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... trading activities. 75.6 Section 75.6 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION (CONTINUED) PROPRIETARY TRADING AND CERTAIN INTERESTS IN AND RELATIONSHIPS WITH COVERED FUNDS Proprietary Trading § 75.6 Other permitted proprietary trading activities. (a) Permitted trading in domestic...

  16. RFID of next generation network for enhancing customer relationship management in healthcare industries.

    PubMed

    Alzahrani, Ahmed; Qureshi, Muhammad Shuaib; Thayananthan, Vijey

    2017-10-23

    This paper aims to analyze possible next generation of networked radio frequency identification (NGN-RFID) system for customer relationship management (CRM) in healthcare industries. Customer relationship and its management techniques in a specific healthcare industry are considered in this development. The key objective of using NGN-RFID scheme is to enhance the handling of patients' data to improve the CRM efficiency in healthcare industries. The proposed NGN-RFID system is one of the valid points to improve the ability of CRM by analyzing different prior and current traditional approaches. The legacy of customer relationship management will be improved by using this modern NGN-RFID technology without affecting the novelty.

  17. Data analysis-based autonomic bandwidth adjustment in software defined multi-vendor optical transport networks.

    PubMed

    Li, Yajie; Zhao, Yongli; Zhang, Jie; Yu, Xiaosong; Jing, Ruiquan

    2017-11-27

    Network operators generally provide dedicated lightpaths for customers to meet the demand for high-quality transmission. Considering the variation of traffic load, customers usually rent peak bandwidth that exceeds the practical average traffic requirement. In this case, bandwidth provisioning is unmetered and customers have to pay according to peak bandwidth. Supposing that network operators could keep track of traffic load and allocate bandwidth dynamically, bandwidth can be provided as a metered service and customers would pay for the bandwidth that they actually use. To achieve cost-effective bandwidth provisioning, this paper proposes an autonomic bandwidth adjustment scheme based on data analysis of traffic load. The scheme is implemented in a software defined networking (SDN) controller and is demonstrated in the field trial of multi-vendor optical transport networks. The field trial shows that the proposed scheme can track traffic load and realize autonomic bandwidth adjustment. In addition, a simulation experiment is conducted to evaluate the performance of the proposed scheme. We also investigate the impact of different parameters on autonomic bandwidth adjustment. Simulation results show that the step size and adjustment period have significant influences on bandwidth savings and packet loss. A small value of step size and adjustment period can bring more benefits by tracking traffic variation with high accuracy. For network operators, the scheme can serve as technical support of realizing bandwidth as metered service in the future.

  18. 47 CFR 76.938 - Proprietary information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 4 2011-10-01 2011-10-01 false Proprietary information. 76.938 Section 76.938... CABLE TELEVISION SERVICE Cable Rate Regulation § 76.938 Proprietary information. A franchising authority may require the production of proprietary information to make a rate determination in those cases...

  19. Optimized and Automated design of Plasma Diagnostics for Additive Manufacture

    NASA Astrophysics Data System (ADS)

    Stuber, James; Quinley, Morgan; Melnik, Paul; Sieck, Paul; Smith, Trevor; Chun, Katherine; Woodruff, Simon

    2016-10-01

    Despite having mature designs, diagnostics are usually custom designed for each experiment. Most of the design can be now be automated to reduce costs (engineering labor, and capital cost). We present results from scripted physics modeling and parametric engineering design for common optical and mechanical components found in many plasma diagnostics and outline the process for automated design optimization that employs scripts to communicate data from online forms through proprietary and open-source CAD and FE codes to provide a design that can be sent directly to a printer. As a demonstration of design automation, an optical beam dump, baffle and optical components are designed via an automated process and printed. Supported by DOE SBIR Grant DE-SC0011858.

  20. Post-Cure Studies on Solid Silicone Elastomer: DC745U

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ortiz-Acosta, Denisse; Janicke, Michael T.; Yoder, Jacob

    DC745U is a silicone elastomer originally manufactured by Dow Corning under the name of Silastic® DC745U at their manufacturing facility in Kendaville, Indiana. Currently DC745U is available through Xiameter® or Dow Corning’s distributor R. D. Abbott Company. This silicone elastomer is used in numerous parts of weapon systems, including outer pressure pads, aft cap support in W80 and pressure pad in the B61. DC745U is a proprietary formulation and limited information about its composition and properties is provided to the customer. Thus, Los Alamos National Laboratory and Lawrence Livermore National Laboratory have performed a variety of characterization experiments on thismore » material.« less

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Maxwell, Don E; Ezell, Matthew A; Becklehimer, Jeff

    While sites generally have systems in place to monitor the health of Cray computers themselves, often the cooling systems are ignored until a computer failure requires investigation into the source of the failure. The Liebert XDP units used to cool the Cray XE/XK models as well as the Cray proprietary cooling system used for the Cray XC30 models provide data useful for health monitoring. Unfortunately, this valuable information is often available only to custom solutions not accessible by a center-wide monitoring system or is simply ignored entirely. In this paper, methods and tools used to harvest the monitoring data availablemore » are discussed, and the implementation needed to integrate the data into a center-wide monitoring system at the Oak Ridge National Laboratory is provided.« less

  2. Adopting customers' empowerment and social networks to encourage participations in e-health services.

    PubMed

    Anshari, Muhammad; Almunawar, Mohammad Nabil; Low, Patrick Kim Cheng; Wint, Zaw; Younis, Mustafa Z

    2013-01-01

    The aim of this article is to present an e-health model that embeds empowerment and social network intervention that may extend the role of customers in health care settings. A 25-item Likert-type survey instrument was specifically developed for this study and administered to a sample of 108 participants in Indonesia from October to November 2012. The data were analyzed to provide ideas on how to move forward with the e-health initiative as a means to improve e-health services. The survey revealed that there is a high demand for customers' empowerment and involvement in social networks to improve their health literacy and customer satisfaction. Regardless of the limitations of the study, the participants have responded with great support for the abilities of the prototype systems drawn from the survey. The survey results were used as requirements to develop a system prototype that incorporates the expectations of the people. The prototype (namely Clinic 2.0) was derived from the model and confirmed from the survey. Participants were selected to use the system for three months, after which we measured its impact towards their health literacy and customer satisfaction. The results show that the system intervention through Clinic 2.0 leads to a high level of customer satisfaction and health literacy.

  3. Churn in Social Networks

    NASA Astrophysics Data System (ADS)

    Karnstedt, Marcel; Hennessy, Tara; Chan, Jeffrey; Basuchowdhuri, Partha; Hayes, Conor; Strufe, Thorsten

    In the past, churn has been identified as an issue across most industry sectors. In its most general sense it refers to the rate of loss of customers from a company's customer base. There is a simple reason for the attention churn attracts: churning customers mean a loss of revenue. Emerging from business spaces like telecommunications (telcom) and broadcast providers, where churn is a major issue, it is also regarded as a crucial problem in many other businesses, such as online games creators, but also online social networks and discussion sites. Companies aim at identifying the risk of churn in its early stages, as it is usually much cheaper to retain a customer than to try to win him or her back. If this risk can be accurately predicted, marketing departments can target customers efficiently with tailored incentives to prevent them from leaving.

  4. Network Centric Communications for Expeditionary or Carrier Strike Groups

    DTIC Science & Technology

    2011-12-01

    known as Modulating Retroreflector (MRR) mode. In this configuration, a source laser transmits a beam to an optical receiver which receives the...be adapted for use at sea and found that interference was a key issue. SPAWAR Systems Center Pacific has spent over a decade trying to address this...ad-hoc wireless technology non-proprietary and radio agnostic. One of the issues with wireless technologies used at sea is the issue of ― beam

  5. The Development of a Qualitative Dynamic Attribute Value Model for Healthcare Institutes

    PubMed Central

    Lee, Wan-I

    2010-01-01

    Background: Understanding customers has become an urgent topic for increasing competitiveness. The purpopse of the study was to develop a qualitative dynamic attribute value model which provides insight into the customers’ value for healthcare institute managers by conducting the initial open-ended questionnaire survey to select participants purposefully. Methods: A total number of 427 questionnaires was conducted in two hospitals in Taiwan (one district hospital with 635 beds and one academic hospital with 2495 beds) and 419 questionnaires were received in nine weeks. Then, apply qualitative in-depth interviews to explore customers’ perspective of values for building a model of partial differential equations. Results: This study concludes nine categories of value, including cost, equipment, physician background, physicain care, environment, timing arrangement, relationship, brand image and additional value, to construct objective network for customer value and qualitative dynamic attribute value model where the network shows the value process of loyalty development via its effect on customer satisfaction, customer relationship, customer loyalty and healthcare service. Conclusion: One set predicts the customer relationship based on comminent, including service quality, communication and empahty. As the same time, customer loyalty based on trust, involves buzz marketing, brand and image. Customer value of the current instance is useful for traversing original customer attributes and identifing customers on different service share. PMID:23113034

  6. IsoWAN: A NASA Science and Engineering Information and Services Framework

    NASA Technical Reports Server (NTRS)

    Korsmeyer, David J.; Chow, Edward T.; Conroy, Michael P.; Swanson, Keith (Technical Monitor)

    2000-01-01

    We believe that the next evolutionary step in supporting wide-area application and services delivery to customers is a network framework that provides for collocation of applications and services at distinct sites in the network, an interconnection between these sites that is performance optimized for these applications, and value-added services for applications. We use the term IsoWAN to describe an advanced, isolated network interconnect services framework that will enable applications to be more secure, and able to access and be in use in both local and remote environments. The main functions of an IsoWAN are virtual localization of application services, an application service interface, coordinated delivery of applications and associated data to the customer, and supporting collaborative application development for customers. An initial pilot network between three NASA Centers: Ames Research Center, the Jet Propulsion Laboratory, and Marshall Space Flight Center, has been built and its properties will be discussed.

  7. Business is Beaming

    NASA Technical Reports Server (NTRS)

    2001-01-01

    Terabeam has developed a Fiberless Optical(TM) Network that transmits broadband data from office buildings to the nation's wide-area networks (WANs), without digging up the streets. A key component of Terabeam's Fiberless Network is Large Aperture Holographic Optic technology, developed by Ralcon Development Lab, of Paradise, Utah. Ralcon developed the Holographic Optical Element (HOE) technology with assistance from a NASA Goddard Space Flight Center Small Business Innovation Research (SBIR) contract. Terabeam further developed the HOE technology and incorporated it into its Fiberless Optical Network-sending an immeasurable amount of information soaring overhead. Terabeam developed its Fiberless Optical Network using a proprietary HOE to transmit data. The unit is mounted near an office window and has the ability to beam safe, low-power, invisible data through the air at gigabits-per-second speeds to anywhere in the service area. Gigabits-per-second speeds are thousands of times faster than the speeds of current broadband transmissions. This allows businesses to connect to local-area networks (LANs) as well as WANs, in a quick and affordable manner.

  8. 48 CFR 703.104-5 - Disclosure, protection, and marking of proprietary and source information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CONFLICTS OF INTEREST Safeguards 703.104-5 Disclosure, protection, and marking of proprietary and source information. A Contracting Office may authorize release of proprietary and/or source selection information..., and marking of proprietary and source information. 703.104-5 Section 703.104-5 Federal Acquisition...

  9. 43 CFR 3190.1 - Proprietary data.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 43 Public Lands: Interior 2 2011-10-01 2011-10-01 false Proprietary data. 3190.1 Section 3190.1... and Gas Inspections: General § 3190.1 Proprietary data. With regard to any data or information... agreement or contract, the following applies: (a) Proprietary data shall be made available to a State or...

  10. Pervasive Home Environments

    NASA Astrophysics Data System (ADS)

    Bull, P.; Limb, R.; Payne, R.

    An increasing number of computers and other equipment, such as games consoles and multimedia appliances for the home, have networking capability. The rapid growth of broadband in the home is also fuelling the demand for people to network their homes. In the near future we will see a number of market sectors trying to 'own' the home by providing gateways either from the traditional ISP or from games and other service providers. The consumer is bombarded with attractive advertising to acquire the latest technological advances, but is left with a plethora of different appliances, which have a bewildering range of requirements and features in terms of networking, user interface, and higher-level communications protocols. In many cases, these are proprietary, preventing interworking. Such technical and usability anarchy confuses the consumer and could ultimately suppress market adoption.

  11. Community Colleges and Proprietary Schools: Conflict or Convergence? New Directions for Community Colleges, Number 91.

    ERIC Educational Resources Information Center

    Clowes, Darrel A., Ed.; Hawthorne, Elizabeth M., Ed.

    1995-01-01

    This volume describes characteristics of proprietary schools, or for-profit schools that focus primarily on career and technical education, and explores similarities, differences, and points of linkage between proprietary schools and community colleges. The following articles are included: (1) "Community Colleges and Proprietary Schools: Conflict…

  12. 42 CFR 413.157 - Return on equity capital of proprietary providers.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Return on equity capital of proprietary providers... Capital-Related Costs § 413.157 Return on equity capital of proprietary providers. (a) Definitions. For... proprietary hospitals and SNFs. (b) General rule. A reasonable return on equity capital invested and used in...

  13. Proprietary Vocational Schools: A Significant Sector of American Postsecondary Education.

    ERIC Educational Resources Information Center

    Wilms, Wellford W.

    The role of proprietary vocational schools in American postsecondary education and the way in which student financial aid is used are discussed. Proprietary vocational schools, organized as profit-seeking institutions, provide the bulk of American postsecondary vocational education. The average proprietary school is small and exists in a high-risk…

  14. Statewide Planning and Policy Development in Relation to Proprietary Schools.

    ERIC Educational Resources Information Center

    Wallhaus, Robert A.

    Issues concerning state planning and policy toward proprietary schools are considered, with a focus on efforts of Illinois to relate to the proprietary sector in such areas as coordination and planning, student financial aid, and the approval of schools and programs. States that try to integrate the proprietary sector into their planning…

  15. Build your own social network laboratory with Social Lab: a tool for research in social media.

    PubMed

    Garaizar, Pablo; Reips, Ulf-Dietrich

    2014-06-01

    Social networking has surpassed e-mail and instant messaging as the dominant form of online communication (Meeker, Devitt, & Wu, 2010). Currently, all large social networks are proprietary, making it difficult to impossible for researchers to make changes to such networks for the purpose of study design and access to user-generated data from the networks. To address this issue, the authors have developed and present Social Lab, an Internet-based free and open-source social network software system available from http://www.sociallab.es . Having full availability of navigation and communication data in Social Lab allows researchers to investigate behavior in social media on an individual and group level. Automated artificial users ("bots") are available to the researcher to simulate and stimulate social networking situations. These bots respond dynamically to situations as they unfold. The bots can easily be configured with scripts and can be used to experimentally manipulate social networking situations in Social Lab. Examples for setting up, configuring, and using Social Lab as a tool for research in social media are provided.

  16. MoZis: mobile zoo information system: a case study for the city of Osnabrueck

    NASA Astrophysics Data System (ADS)

    Michel, Ulrich

    2007-10-01

    This paper describes a new project of the Institute for Geoinformatics and Remote Sensing, funded by the German Federal Foundation for the Environment (DBU, Deutsche Bundesstiftung Umwelt www.dbu.de). The goal of this project is to develop a mobile zoo information system for Pocket PCs and Smart phones. Visitors of the zoo will be able to use their own mobile devices or use Pocket PCs, which could be borrowed from the zoo to navigate around the zoo's facilities. The system will also provide additional multimedia based information such as audio-based material, animal video clips, and maps of their natural habitat. People could have access to the project at the zoo via wireless local area network or by downloading the necessary files using a home internet connection. Our software environment consists of proprietary and non-proprietary software solutions in order to make it as flexible as possible. Our first prototype was developed with Visual Studio 2003 and Visual Basic.Net.

  17. Automated customized retrieval of radiotherapy data for clinical trials, audit and research.

    PubMed

    Romanchikova, Marina; Harrison, Karl; Burnet, Neil G; Hoole, Andrew Cf; Sutcliffe, Michael Pf; Parker, Michael Andrew; Jena, Rajesh; Thomas, Simon James

    2018-02-01

    To enable fast and customizable automated collection of radiotherapy (RT) data from tomotherapy storage. Human-readable data maps (TagMaps) were created to generate DICOM-RT (Digital Imaging and Communications in Medicine standard for Radiation Therapy) data from tomotherapy archives, and provided access to "hidden" information comprising delivery sinograms, positional corrections and adaptive-RT doses. 797 data sets totalling 25,000 scans were batch-exported in 31.5 h. All archived information was restored, including the data not available via commercial software. The exported data were DICOM-compliant and compatible with major commercial tools including RayStation, Pinnacle and ProSoma. The export ran without operator interventions. The TagMap method for DICOM-RT data modelling produced software that was many times faster than the vendor's solution, required minimal operator input and delivered high volumes of vendor-identical DICOM data. The approach is applicable to many clinical and research data processing scenarios and can be adapted to recover DICOM-RT data from other proprietary storage types such as Elekta, Pinnacle or ProSoma. Advances in knowledge: A novel method to translate data from proprietary storage to DICOM-RT is presented. It provides access to the data hidden in electronic archives, offers a working solution to the issues of data migration and vendor lock-in and paves the way for large-scale imaging and radiomics studies.

  18. Proprietary Schools and Student Financial Aid Programs: Background and Policy Issues. Congressional Report for Congress.

    ERIC Educational Resources Information Center

    Fraas, Charlotte J.

    This report examines some of the major issues that Congress is likely to confront in considering future use of student aid programs by proprietary school students. Chapter 1 presents an historical overview of proprietary school participation in Title IV student aid programs and Chapter 2 explores the current participation of proprietary school…

  19. The network of corporate clients: customer attrition at commercial banks

    NASA Astrophysics Data System (ADS)

    Lublóy, Á.; Szenes, M.

    2008-12-01

    Commercial banks might profit from the adoption of methods widely used in network theory. A decision making process might become biased if one disregards network effects within the corporate client portfolio. This paper models the phenomenon of customer attrition by generating a weighted and directed network of corporate clients linked by financial transactions. During the numerical study of the agent-based toy model we demonstrate that multiple steady states may exist. The statistical properties of the distinct steady states show similarities. We show that most companies of the same community choose the same bank in the steady state. In contrast to the case for the steady state of the Barabási-Albert network, market shares in this model equalize by network size. When modeling customer attrition in the network of 3 × 105 corporate clients, none of the companies followed the behavior of the initial switcher in three quarters of the simulations. The number of switchers exceeded 20 in 1% of the cases. In the worst-case scenario a total of 688 companies chose a competitor bank. Significant network effects have been discovered; high correlation prevailed between the degree of the initial switcher and the severity of the avalanche effect. This suggests that the position of the corporate client in the network might be much more important than the underlying properties (industry, size, profitability, etc) of the company.

  20. 75 FR 62858 - United States, et al.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-13

    ... discounts, other benefits, and information to customers who use the merchants' preferred form of payment... directly with customers, by disrupting the ordinary give and take of the marketplace. Most consumers who... merchants from offering their customers a discount or benefit for using a network credit card that is less...

  1. MAGIC: Model and Graphic Information Converter

    NASA Technical Reports Server (NTRS)

    Herbert, W. C.

    2009-01-01

    MAGIC is a software tool capable of converting highly detailed 3D models from an open, standard format, VRML 2.0/97, into the proprietary DTS file format used by the Torque Game Engine from GarageGames. MAGIC is used to convert 3D simulations from authoritative sources into the data needed to run the simulations in NASA's Distributed Observer Network. The Distributed Observer Network (DON) is a simulation presentation tool built by NASA to facilitate the simulation sharing requirements of the Data Presentation and Visualization effort within the Constellation Program. DON is built on top of the Torque Game Engine (TGE) and has chosen TGE's Dynamix Three Space (DTS) file format to represent 3D objects within simulations.

  2. FreeTure: A Free software to capTure meteors for FRIPON

    NASA Astrophysics Data System (ADS)

    Audureau, Yoan; Marmo, Chiara; Bouley, Sylvain; Kwon, Min-Kyung; Colas, François; Vaubaillon, Jérémie; Birlan, Mirel; Zanda, Brigitte; Vernazza, Pierre; Caminade, Stephane; Gattecceca, Jérôme

    2014-02-01

    The Fireball Recovery and Interplanetary Observation Network (FRIPON) is a French project started in 2014 which will monitor the sky, using 100 all-sky cameras to detect meteors and to retrieve related meteorites on the ground. There are several detection software all around. Some of them are proprietary. Also, some of them are hardware dependent. We present here the open source software for meteor detection to be installed on the FRIPON network's stations. The software will run on Linux with gigabit Ethernet cameras and we plan to make it cross platform. This paper is focused on the meteor detection method used for the pipeline development and the present capabilities.

  3. Information asymmetry, social networking site word of mouth, and mobility effects on social commerce in Korea.

    PubMed

    Hwang, In Jeong; Lee, Bong Gyou; Kim, Ki Youn

    2014-02-01

    The purpose of this research is to examine the issues that affect customers' behavioral character and purchasing behavior. The study proposes a research hypothesis with independent variables that include social presence, trust, and information asymmetry, and the dependent variable purchase decision making, to explain differentiated customer decision making processes in social commerce (S-commerce). To prove the hypothesis, positive verification was performed by focusing on mediating effects through a customer uncertainty variable and moderating effects through mobility and social networking site word of mouth (SNS WOM) variables. The number of studies on customer trends has rapidly increased together with the market size of S-commerce. However, few studies have examined the negative variables that make customers hesitant to make decisions in S-commerce. This study investigates the causes of customer uncertainty and focuses on deducing the control variables that offset this negative relationship. The study finds that in customers' S-commerce purchasing actions, the SNS WOM and mobility variables show control effects between information asymmetry and uncertainty and between trust and uncertainty. Additionally, this research defines the variables related to customer uncertainty that are hidden in S-commerce, and statistically verifies their relationship. The research results can be used in Internet marketing practices to establish marketing mix strategies for customer demand or as research data to predict customer behavior. The results are scientifically meaningful as a precedent for research on customers in S-commerce.

  4. Omori Law After Exogenous Shocks on Supplier-Customer Network

    NASA Astrophysics Data System (ADS)

    Fujiwara, Yoshi

    We study the relaxation process of a supplier-customer network after mass destruction due to two giant earthquakes, Kobe 1995 and East Japan 2011, by investigating the number of chained failures. Firstly, a mass destruction and intervention of business activities in the damaged areas can be considered as a main shock. The exogenous shock was propagated on the supplier-customer network deteriorating financial states of other firms, even if they are not located in geographical neighbors. To quantify such aftershocks, we use chained failures on the network assuming that they indicate the trace of propagation of shocks. We show that the number of chained failures in its temporal change obeys an Omori-law, a power-law relaxation. This finding implies that the relaxation is much more sluggish than one would naively expect, and that it might be possible to estimate the extent and duration of aftershocks by using the empirical law. Several issues are discussed including the origin of the long-time relaxation.

  5. Case Study: Using The OMG SWRADIO Profile and SDR Forum Input for NASA's Space Telecommunications Radio System

    NASA Technical Reports Server (NTRS)

    Briones, Janette C.; Handler, Louis M.; Hall, Steve C.; Reinhart, Richard C.; Kacpura, Thomas J.

    2009-01-01

    The Space Telecommunication Radio System (STRS) standard is a Software Defined Radio (SDR) architecture standard developed by NASA. The goal of STRS is to reduce NASA s dependence on custom, proprietary architectures with unique and varying interfaces and hardware and support reuse of waveforms across platforms. The STRS project worked with members of the Object Management Group (OMG), Software Defined Radio Forum, and industry partners to leverage existing standards and knowledge. This collaboration included investigating the use of the OMG s Platform-Independent Model (PIM) SWRadio as the basis for an STRS PIM. This paper details the influence of the OMG technologies on the STRS update effort, findings in the STRS/SWRadio mapping, and provides a summary of the SDR Forum recommendations.

  6. Individualized Communications

    NASA Technical Reports Server (NTRS)

    1997-01-01

    IntelliWeb and IntelliPrint, products from MicroMass Communications, utilize C Language Integrated Production System (CLIPS), a development and delivery expert systems tool developed at Johnson Space Center. IntelliWeb delivers personalized messages by dynamically creating single web pages or entire web sites based on information provided by each website visitor. IntelliPrint is a product designed to create tailored, individualized messages via printed media. The software uses proprietary technology to generate printed messages that are personally relevant and tailored to meet each individual's needs. Intelliprint is in use in many operations including Brystol-Myers Squibb's personalized newsletter, "Living at Your Best," geared to each recipient based on a health and lifestyle survey taken earlier; and SmithKline Beecham's "Nicorette Committed Quitters Program," in which customized motivational materials support participants in their attempt to quit smoking.

  7. Consistent visualizations of changing knowledge

    PubMed Central

    Tipney, Hannah J.; Schuyler, Ronald P.; Hunter, Lawrence

    2009-01-01

    Networks are increasingly used in biology to represent complex data in uncomplicated symbolic form. However, as biological knowledge is continually evolving, so must those networks representing this knowledge. Capturing and presenting this type of knowledge change over time is particularly challenging due to the intimate manner in which researchers customize those networks they come into contact with. The effective visualization of this knowledge is important as it creates insight into complex systems and stimulates hypothesis generation and biological discovery. Here we highlight how the retention of user customizations, and the collection and visualization of knowledge associated provenance supports effective and productive network exploration. We also present an extension of the Hanalyzer system, ReOrient, which supports network exploration and analysis in the presence of knowledge change. PMID:21347184

  8. Development of an optical character recognition pipeline for handwritten form fields from an electronic health record.

    PubMed

    Rasmussen, Luke V; Peissig, Peggy L; McCarty, Catherine A; Starren, Justin

    2012-06-01

    Although the penetration of electronic health records is increasing rapidly, much of the historical medical record is only available in handwritten notes and forms, which require labor-intensive, human chart abstraction for some clinical research. The few previous studies on automated extraction of data from these handwritten notes have focused on monolithic, custom-developed recognition systems or third-party systems that require proprietary forms. We present an optical character recognition processing pipeline, which leverages the capabilities of existing third-party optical character recognition engines, and provides the flexibility offered by a modular custom-developed system. The system was configured and run on a selected set of form fields extracted from a corpus of handwritten ophthalmology forms. The processing pipeline allowed multiple configurations to be run, with the optimal configuration consisting of the Nuance and LEADTOOLS engines running in parallel with a positive predictive value of 94.6% and a sensitivity of 13.5%. While limitations exist, preliminary experience from this project yielded insights on the generalizability and applicability of integrating multiple, inexpensive general-purpose third-party optical character recognition engines in a modular pipeline.

  9. Development of an optical character recognition pipeline for handwritten form fields from an electronic health record

    PubMed Central

    Peissig, Peggy L; McCarty, Catherine A; Starren, Justin

    2011-01-01

    Background Although the penetration of electronic health records is increasing rapidly, much of the historical medical record is only available in handwritten notes and forms, which require labor-intensive, human chart abstraction for some clinical research. The few previous studies on automated extraction of data from these handwritten notes have focused on monolithic, custom-developed recognition systems or third-party systems that require proprietary forms. Methods We present an optical character recognition processing pipeline, which leverages the capabilities of existing third-party optical character recognition engines, and provides the flexibility offered by a modular custom-developed system. The system was configured and run on a selected set of form fields extracted from a corpus of handwritten ophthalmology forms. Observations The processing pipeline allowed multiple configurations to be run, with the optimal configuration consisting of the Nuance and LEADTOOLS engines running in parallel with a positive predictive value of 94.6% and a sensitivity of 13.5%. Discussion While limitations exist, preliminary experience from this project yielded insights on the generalizability and applicability of integrating multiple, inexpensive general-purpose third-party optical character recognition engines in a modular pipeline. PMID:21890871

  10. Human factors involvement in bringing the power of AI to a heterogeneous user population

    NASA Technical Reports Server (NTRS)

    Czerwinski, Mary; Nguyen, Trung

    1994-01-01

    The Human Factors involvement in developing COMPAQ QuickSolve, an electronic problem-solving and information system for Compaq's line of networked printers, is described. Empowering customers with expert system technology so they could solve advanced networked printer problems on their own was a major goal in designing this system. This process would minimize customer down-time, reduce the number of phone calls to the Compaq Customer Support Center, improve customer satisfaction, and, most importantly, differentiate Compaq printers in the marketplace by providing the best, and most technologically advanced, customer support. This represents a re-engineering of Compaq's customer support strategy and implementation. In its first generation system, SMART, the objective was to provide expert knowledge to Compaq's help desk operation to more quickly and correctly answer customer questions and problems. QuickSolve is a second generation system in that customer support is put directly in the hands of the consumers. As a result, the design of QuickSolve presented a number of challenging issues. Because the produce would be used by a diverse and heterogeneous set of users, a significant amount of human factors research and analysis was required while designing and implementing the system. Research that shaped the organization and design of the expert system component as well.

  11. 31 CFR 1023.220 - Customer identification programs for broker-dealers.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.220 Customer identification programs for broker-dealers. (a...

  12. 31 CFR 1023.220 - Customer identification programs for broker-dealers.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.220 Customer identification programs for broker-dealers. (a...

  13. 31 CFR 1023.220 - Customer identification programs for broker-dealers.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.220 Customer identification programs for broker-dealers. (a...

  14. 31 CFR 1023.220 - Customer identification programs for broker-dealers.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Finance (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Programs § 1023.220 Customer identification programs for broker-dealers. (a...

  15. 78 FR 69018 - Improving the Resiliency of Mobile Wireless Communications Networks; Reliability and Continuity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-18

    ... offer their customers an increasing array of ``smartphones'' and data-centric devices, such as tablets... basis to provide service to their customers? 38. Additionally, the proposal would allow providers to... customers with comparable levels of service within that county? 40. Second, will consumers find this metric...

  16. Adaptive Probabilistic Protocols for Advanced Networks/Assuring the Integrity of Highly Decentralized Communications Systems

    DTIC Science & Technology

    2005-03-01

    to obtain a protocol customized to the needs of a specific setting, under control of an automated theorem proving system that can guarantee...new “compositional” method for protocol design and implementation, in which small microprotocols are combined to obtain a protocol customized to the...and Network Centric Enterprise (NCES) visions. This final report documents a wide range of contributions and technology transitions, including: A

  17. Hierarchical Analytical Approaches for Unraveling the Composition of Proprietary Mixtures

    EPA Pesticide Factsheets

    The composition of commercial mixtures including pesticide inert ingredients, aircraft deicers, and aqueous film-forming foam (AFFF) formulations, and by analogy, fracking fluids, are proprietary. Quantitative analytical methodologies can only be developed for mixture components once their identities are known. Because proprietary mixtures may contain volatile and non-volatile components, a hierarchy of analytical methods is often required for the full identification of all proprietary mixture components.

  18. The case for open-source software in drug discovery.

    PubMed

    DeLano, Warren L

    2005-02-01

    Widespread adoption of open-source software for network infrastructure, web servers, code development, and operating systems leads one to ask how far it can go. Will "open source" spread broadly, or will it be restricted to niches frequented by hopeful hobbyists and midnight hackers? Here we identify reasons for the success of open-source software and predict how consumers in drug discovery will benefit from new open-source products that address their needs with increased flexibility and in ways complementary to proprietary options.

  19. State of the Art of Proprietary Financial Reporting in the Department of the Navy.

    DTIC Science & Technology

    1996-12-01

    statements for fiscal year 1996 and beyond. Proprietary financial reporting focuses on the creation, management, and use of all resources (assets) of...an organization, not just on expendable funds. This thesis provides a comprehensive overview of the state of the art of proprietary financial reporting in...comparison between Federal government and private sector financial reporting . An analysis of the form and content of the primary proprietary reports, the

  20. Using the internet in teaching and learning: A U.K. perspective

    NASA Astrophysics Data System (ADS)

    Browning, Paul; Williams, Jane

    1997-06-01

    A substantial body of courseware has been produced in the U.K., but little is Internet-based. The adoption of this material is being stifled by a lack of suitably specified delivery platforms, the "closed box" nature of the modules which prevents local customization and the absence of any obvious career development benefits to staff that develop or exploit it. Courseware consortia have been slow to exploit the Internet, even for marketing and distribution purposes. The use of proprietary authoring software to produce courseware for standalone machines has polarized thinking away from networked applications. It has seeded the myth that writing courseware requires expensive tools and extensive experience. Of 42 U.K. geoscience departments, 33 now have a Web-presence. Much of the world-visible information is in the "marketing" or "administration" category. It is likely that a significant body of Web-based courseware hides behind Intranets. Locating good-quality teaching and learning resources on the Web can be time-consuming. A start has been made with a number of virtual libraries. There may be a co-ordinating role for national bodies to oversee the provision of pages of "recommended" sites, public domain "imagebanks" and "questionbanks". The geosciences would do well to look at what other disciplines have already achieved in these areas. The future holds many possibilities for distributed and distance learning via the Internet. The arrival of low-cost "fat" Network Computers may solve the delivery problem by seeing a quantum leap in the level of student ownership. However, the rate-limiting control on future developments will be determined by human and not technical consideration. Currently, the opportunities offered by information technology are outstripping the ability of the higher education sector to assimilate and exploit them. Higher education institutes need to "surf the wave, not be submerged by it".

  1. Carbon Nanotube Growth Rate Regression using Support Vector Machines and Artificial Neural Networks

    DTIC Science & Technology

    2014-03-27

    intensity D peak. Reprinted with permission from [38]. The SVM classifier is trained using custom written Java code leveraging the Sequential Minimal...Society Encog is a machine learning framework for Java , C++ and .Net applications that supports Bayesian Networks, Hidden Markov Models, SVMs and ANNs [13...SVM classifiers are trained using Weka libraries and leveraging custom written Java code. The data set is created as an Attribute Relationship File

  2. Perceived Status and Value: The Student-Customer Relationship Inflected by the Inherent Challenges of University-Industry Collaboration

    ERIC Educational Resources Information Center

    Heikkinen, Juho; Isomöttönen, Ville

    2017-01-01

    This article examines how students in a multidisciplinary project-based learning course involving real customers perceive their interactions with their customers. The authors conducted a qualitative study and analysed students' learning reports by means of a thematic network analysis. The analysis shows how students perceive their status in…

  3. 14 CFR 1203.405 - Proprietary information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... PROGRAM Guides for Original Classification § 1203.405 Proprietary information. Proprietary information made available to NASA is subject to examination for classification purposes under the criteria set... the proposal but believes that security classification would be appropriate under the criteria of...

  4. SoundProof: A Smartphone Platform for Wireless Monitoring of Wildlife and Environment

    NASA Astrophysics Data System (ADS)

    Lukac, M.; Monibi, M.; Lane, M. L.; Howell, L.; Ramanathan, N.; Borker, A.; McKown, M.; Croll, D.; Terschy, B.

    2011-12-01

    We are developing an open-source, low-cost wildlife and environmental monitoring solution based on Android smartphones. Using a smartphone instead of a traditional microcontroller or single board computer has several advantages: smartphones are single integrated devices with multiple radios and a battery; they have a robust software interface which enables customization; and are field-tested by millions of users daily. Consequently, smartphones can improve the cost, configurability, and real-time access to data for environmental monitoring, ultimately replacing existing monitoring solutions which are proprietary, difficult to customize, expensive, and require labor-intensive maintenance. While smartphones can radically change environmental and wildlife monitoring, there are a number of technical challenges to address. We present our smartphone-based platform, SoundProof, discuss the challenges of building an autonomous system based on Android phones, and our ongoing efforts to enable environmental monitoring. Our system is built using robust off-the-shelf hardware and mature open-source software where available, to increase scalability and ease of installation. Key features include: * High-quality acoustic signal collection from external microphones to monitor wildlife populations. * Real-time data access, remote programming, and configuration of the field sensor via wireless cellular or WiFi channels, accessible from a website. * Waterproof packaging and solar charger setup for long-term field deployments. * Rich instrumentation of the end-to-end system to quickly identify and debug problems. * Supplementary mesh networking system with long-range wireless antennae to provide coverage when no cell network is available. We have deployed this system to monitor Rufous Crowned Sparrows on Anacapa Island, Chinese Crested Turns on the Matsu Islands in Taiwan, and Ashy Storm Petrels on South East Farallon Island. We have testbeds at two UC Natural Reserves to field-test new or exploratory features before deployment. Side-by-side validation data collected in the field using SoundProof and state-of-the-art wildlife monitoring solutions, including the Cornell ARU and Wildlife Acoustic's Songmeter, demonstrate that acoustic signals collected with cellphones provide sufficient data integrity for measuring the success of bird conservation efforts, measuring bird relative abundance and detecting elusive species. We are extending this platform to numerous other areas of environmental monitoring. Recent developments such as the Android Open Accessory, the IOIO Board, MicroBridge, Amarino, and Cellbots enable microcontrollers to talk with Android applications, making it affordable and feasible to extend our platform to operate with the most common sensors.

  5. A Systematic Scheme for Multiple Access in Ethernet Passive Optical Access Networks

    NASA Astrophysics Data System (ADS)

    Ma, Maode; Zhu, Yongqing; Hiang Cheng, Tee

    2005-11-01

    While backbone networks have experienced substantial changes in the last decade, access networks have not changed much. Recently, passive optical networks (PONs) seem to be ready for commercial deployment as access networks, due to the maturity of a number of enabling technologies. Among the PON technologies, Ethernet PON (EPON) standardized by the IEEE 802.3ah Ethernet in the First Mile (EFM) Task Force is the most attractive one because of its high speed, low cost, familiarity, interoperability, and low overhead. In this paper, we consider the issue of upstream channel sharing in the EPONs. We propose a novel multiple-access control scheme to provide bandwidth-guaranteed service for high-demand customers, while providing best effort service to low-demand customers according to the service level agreement (SLA). The analytical and simulation results prove that the proposed scheme performs best in what it is designed to do compared to another well-known scheme that has not considered providing differentiated services. With business customers preferring premium services with guaranteed bandwidth and residential users preferring low-cost best effort services, our scheme could benefit both groups of subscribers, as well as the operators.

  6. 47 CFR 76.9 - Confidentiality of proprietary information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 4 2012-10-01 2012-10-01 false Confidentiality of proprietary information. 76.9 Section 76.9 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE General § 76.9 Confidentiality of proprietary...

  7. 47 CFR 76.9 - Confidentiality of proprietary information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 4 2013-10-01 2013-10-01 false Confidentiality of proprietary information. 76.9 Section 76.9 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE General § 76.9 Confidentiality of proprietary...

  8. 47 CFR 76.9 - Confidentiality of proprietary information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Confidentiality of proprietary information. 76.9 Section 76.9 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE General § 76.9 Confidentiality of proprietary...

  9. 47 CFR 76.9 - Confidentiality of proprietary information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 4 2014-10-01 2014-10-01 false Confidentiality of proprietary information. 76.9 Section 76.9 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE General § 76.9 Confidentiality of proprietary...

  10. 47 CFR 76.9 - Confidentiality of proprietary information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 4 2011-10-01 2011-10-01 false Confidentiality of proprietary information. 76.9 Section 76.9 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE General § 76.9 Confidentiality of proprietary...

  11. Determination of an Optimal Commercial Data Bus Architecture for a Flight Data System

    NASA Technical Reports Server (NTRS)

    Crawford, Kevin; Johnson, Martin; Humphries, Rick (Technical Monitor)

    2001-01-01

    NASA/Marshall Space Flight Center (MSFC) is continually looking for methods to reduce cost and schedule while keeping the quality of work high. MSFC is NASA's lead center for space transportation and microgravity research. When supporting NASA's programs several decisions concerning the avionics system must be made. Usually many trade studies must be conducted to determine the best ways to meet the customer's requirements. When deciding the flight data system, one of the first trade studies normally conducted is the determination of the data bus architecture. The schedule, cost, reliability, and environments are some of the factors that are reviewed in the determination of the data bus architecture. Based on the studies, the data bus architecture could result in a proprietary data bus or a commercial data bus. The cost factor usually removes the proprietary data bus from consideration. The commercial data bus's range from Versa Module Eurocard (VME) to Compact PCI to STD 32 to PC 104. If cost, schedule and size are prime factors, VME is usually not considered. If the prime factors are cost, schedule, and size then Compact PCI, STD 32 and PC104 are the choices for the data bus architecture. MSFC's center director has funded a study from his discretionary fund to determine an optimal low cost commercial data bus architecture. The goal of the study is to functionally and environmentally test Compact PCI, STD 32 and PC 104 data bus architectures. This paper will summarize the results of the data bus architecture study.

  12. Non-destructive geometric and refractive index characterization of single and multi-element lenses using optical coherence tomography

    NASA Astrophysics Data System (ADS)

    El-Haddad, Mohamed T.; Tao, Yuankai K.

    2018-02-01

    Design of optical imaging systems requires careful balancing of lens aberrations to optimize the point-spread function (PSF) and minimize field distortions. Aberrations and distortions are a result of both lens geometry and glass material. While most lens manufacturers provide optical models to facilitate system-level simulation, these models are often not reflective of true system performance because of manufacturing tolerances. Optical design can be further confounded when achromatic or proprietary lenses are employed. Achromats are ubiquitous in systems that utilize broadband sources due to their superior performance in balancing chromatic aberrations. Similarly, proprietary lenses may be custom-designed for optimal performance, but lens models are generally not available. Optical coherence tomography (OCT) provides non-contact, depth-resolved imaging with high axial resolution and sensitivity. OCT has been previously used to measure the refractive index of unknown materials. In a homogenous sample, the group refractive index is obtained as the ratio between the measured optical and geometric thicknesses of the sample. In heterogenous samples, a method called focus-tracking (FT) quantifies the effect of focal shift introduced by the sample. This enables simultaneous measurement of the thickness and refractive index of intermediate sample layers. Here, we extend the mathematical framework of FT to spherical surfaces, and describe a method based on OCT and FT for full characterization of lens geometry and refractive index. Finally, we validate our characterization method on commercially available singlet and doublet lenses.

  13. Automated data mining of a proprietary database system for physician quality improvement.

    PubMed

    Johnstone, Peter A S; Crenshaw, Tim; Cassels, Diane G; Fox, Timothy H

    2008-04-01

    Physician practice quality improvement is a subject of intense national debate. This report describes using a software data acquisition program to mine an existing, commonly used proprietary radiation oncology database to assess physician performance. Between 2003 and 2004, a manual analysis was performed of electronic portal image (EPI) review records. Custom software was recently developed to mine the record-and-verify database and the review process of EPI at our institution. In late 2006, a report was developed that allowed for immediate review of physician completeness and speed of EPI review for any prescribed period. The software extracted >46,000 EPIs between 2003 and 2007, providing EPI review status and time to review by each physician. Between 2003 and 2007, the department EPI review improved from 77% to 97% (range, 85.4-100%), with a decrease in the mean time to review from 4.2 days to 2.4 days. The initial intervention in 2003 to 2004 was moderately successful in changing the EPI review patterns; it was not repeated because of the time required to perform it. However, the implementation in 2006 of the automated review tool yielded a profound change in practice. Using the software, the automated chart review required approximately 1.5 h for mining and extracting the data for the 4-year period. This study quantified the EPI review process as it evolved during a 4-year period at our institution and found that automation of data retrieval and review simplified and facilitated physician quality improvement.

  14. How architecture wins technology wars.

    PubMed

    Morris, C R; Ferguson, C H

    1993-01-01

    Signs of revolutionary transformation in the global computer industry are everywhere. A roll call of the major industry players reads like a waiting list in the emergency room. The usual explanations for the industry's turmoil are at best inadequate. Scale, friendly government policies, manufacturing capabilities, a strong position in desktop markets, excellent software, top design skills--none of these is sufficient, either by itself or in combination, to ensure competitive success in information technology. A new paradigm is required to explain patterns of success and failure. Simply stated, success flows to the company that manages to establish proprietary architectural control over a broad, fast-moving, competitive space. Architectural strategies have become crucial to information technology because of the astonishing rate of improvement in microprocessors and other semiconductor components. Since no single vendor can keep pace with the outpouring of cheap, powerful, mass-produced components, customers insist on stitching together their own local systems solutions. Architectures impose order on the system and make the interconnections possible. The architectural controller is the company that controls the standard by which the entire information package is assembled. Microsoft's Windows is an excellent example of this. Because of the popularity of Windows, companies like Lotus must conform their software to its parameters in order to compete for market share. In the 1990s, proprietary architectural control is not only possible but indispensable to competitive success. What's more, it has broader implications for organizational structure: architectural competition is giving rise to a new form of business organization.

  15. Integrating medical devices in the operating room using service-oriented architectures.

    PubMed

    Ibach, Bastian; Benzko, Julia; Schlichting, Stefan; Zimolong, Andreas; Radermacher, Klaus

    2012-08-01

    Abstract With the increasing documentation requirements and communication capabilities of medical devices in the operating room, the integration and modular networking of these devices have become more and more important. Commercial integrated operating room systems are mainly proprietary developments using usually proprietary communication standards and interfaces, which reduce the possibility of integrating devices from different vendors. To overcome these limitations, there is a need for an open standardized architecture that is based on standard protocols and interfaces enabling the integration of devices from different vendors based on heterogeneous software and hardware components. Starting with an analysis of the requirements for device integration in the operating room and the techniques used for integrating devices in other industrial domains, a new concept for an integration architecture for the operating room based on the paradigm of a service-oriented architecture is developed. Standardized communication protocols and interface descriptions are used. As risk management is an important factor in the field of medical engineering, a risk analysis of the developed concept has been carried out and the first prototypes have been implemented.

  16. Combined effect of CVR and penetration of DG in the voltage profile and losses of lowvoltage secondary distribution networks

    NASA Astrophysics Data System (ADS)

    Bokhari, Abdullah

    Demarcations between traditional distribution power systems and distributed generation (DG) architectures are increasingly evolving as higher DG penetration is introduced in the system. The concerns in existing electric power systems (EPSs) to accommodate less restrictive interconnection policies while maintaining reliability and performance of power delivery have been the major challenge for DG growth. In this dissertation, the work is aimed to study power quality, energy saving and losses in a low voltage distributed network under various DG penetration cases. Simulation platform suite that includes electric power system, distributed generation and ZIP load models is implemented to determine the impact of DGs on power system steady state performance and the voltage profile of the customers/loads in the network under the voltage reduction events. The investigation designed to test the DG impact on power system starting with one type of DG, then moves on multiple DG types distributed in a random case and realistic/balanced case. The functionality of the proposed DG interconnection is designed to meet the basic requirements imposed by the various interconnection standards, most notably IEEE 1547, public service commission, and local utility regulation. It is found that implementation of DGs on the low voltage secondary network would improve customer's voltage profile, system losses and significantly provide energy savings and economics for utilities. In a network populated with DGs, utility would have a uniform voltage profile at the customers end as the voltage profile becomes more concentrated around targeted voltage level. The study further reinforced the concept that the behavior of DG in distributed network would improve voltage regulation as certain percentage reduction on utility side would ensure uniform percentage reduction seen by all customers and reduce number of voltage violations.

  17. Development and recommendations for a non-proprietary, high-tension, cable end terminal system.

    DOT National Transportation Integrated Search

    2012-07-01

    Cable guardrail systems have been increasing in popularity in recent years due to several perceived benefits over the : commonly used W-beam guardrail. A non-proprietary design was desired as an alternative to the many proprietary designs : available...

  18. 17 CFR 75.3 - Prohibition on proprietary trading.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... (CONTINUED) PROPRIETARY TRADING AND CERTAIN INTERESTS IN AND RELATIONSHIPS WITH COVERED FUNDS Proprietary... of liquidity management in accordance with a documented liquidity management plan of the banking... liquidity management purposes, the amount, types, and risks of these securities that are consistent with...

  19. 17 CFR 255.3 - Prohibition on proprietary trading.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... (CONTINUED) PROPRIETARY TRADING AND CERTAIN INTERESTS IN AND RELATIONSHIPS WITH COVERED FUNDS Proprietary... purpose of liquidity management in accordance with a documented liquidity management plan of the banking... liquidity management purposes, the amount, types, and risks of these securities that are consistent with...

  20. Knowledge-base browsing: an application of hybrid distributed/local connectionist networks

    NASA Astrophysics Data System (ADS)

    Samad, Tariq; Israel, Peggy

    1990-08-01

    We describe a knowledge base browser based on a connectionist (or neural network) architecture that employs both distributed and local representations. The distributed representations are used for input and output thereby enabling associative noise-tolerant interaction with the environment. Internally all representations are fully local. This simplifies weight assignment and facilitates network configuration for specific applications. In our browser concepts and relations in a knowledge base are represented using " microfeatures. " The microfeatures can encode semantic attributes structural features contextual information etc. Desired portions of the knowledge base can then be associatively retrieved based on a structured cue. An ordered list of partial matches is presented to the user for selection. Microfeatures can also be used as " bookmarks" they can be placed dynamically at appropriate points in the knowledge base and subsequently used as retrieval cues. A proof-of-concept system has been implemented for an internally developed Honeywell-proprietary knowledge acquisition tool. 1.

  1. Understanding customers' intention to use social network sites as complaint channel: an analysis of young customers' perspectives

    NASA Astrophysics Data System (ADS)

    Setiawan, Retno Agus; Setyohadi, Djoko Budiyanto; Pranowo

    2018-02-01

    Social network sites (SNSs) have grown rapidly in recent years. More and more companies have used SNSs as part of their business strategy. SNSs offer numerous advantages, especially in enhancing communication. SNSs have a potential as a new complaint channel for young customers to file their complaints to companies. The objective of this study is to investigate the acceptance of SNSs as complaint channel based on TAM. A structured questionnaire was distributed to young participants, which collected 222 valid questionnaires. Furthermore, structural equation modeling was utilized to investigate the structural model. The results revealed that perceived ease of use and perceived usefulness have a positive correlation on the attitude towards SNSs. While the attitude plays an important role in understanding customers' intention to use SNSs to voice complaints. However perceived usefulness has no significant impact on intention to use. Limitations and further research were also discussed.

  2. 47 CFR 8.16 - Confidentiality of proprietary information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false Confidentiality of proprietary information. 8.16 Section 8.16 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRESERVING THE OPEN INTERNET § 8.16 Confidentiality of proprietary information. (a) Any materials filed in the course of a...

  3. 47 CFR 8.16 - Confidentiality of proprietary information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false Confidentiality of proprietary information. 8.16 Section 8.16 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRESERVING THE OPEN INTERNET § 8.16 Confidentiality of proprietary information. (a) Any materials filed in the course of a...

  4. 47 CFR 8.16 - Confidentiality of proprietary information.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false Confidentiality of proprietary information. 8.16 Section 8.16 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRESERVING THE OPEN INTERNET § 8.16 Confidentiality of proprietary information. (a) Any materials filed in the course of a...

  5. 14 CFR 1274.921 - Publications and reports: non-proprietary research results.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... research results. 1274.921 Section 1274.921 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE... Publications and reports: non-proprietary research results. The requirements set forth under this provision may... cooperative agreement. Publications and Reports: Non-Proprietary Research Results July 2002 (a) NASA...

  6. 47 CFR 8.16 - Confidentiality of proprietary information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false Confidentiality of proprietary information. 8.16 Section 8.16 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRESERVING THE OPEN INTERNET § 8.16 Confidentiality of proprietary information. (a) Any materials filed in the course of a...

  7. Next generation space interconnect research and development in space communications

    NASA Astrophysics Data System (ADS)

    Collier, Charles Patrick

    2017-11-01

    Interconnect or "bus" is one of the critical technologies in design of spacecraft avionics systems that dictates its architecture and complexity. MIL-STD-1553B has long been used as the avionics backbone technology. As avionics systems become more and more capable and complex, however, limitations of MIL-STD-1553B such as insufficient 1 Mbps bandwidth and separability have forced current avionics architects and designers to use combination of different interconnect technologies in order to meet various requirements: CompactPCI is used for backplane interconnect; LVDS or RS422 is used for low and high-speed direct point-to-point interconnect; and some proprietary interconnect standards are designed for custom interfaces. This results in a very complicated system that consumes significant spacecraft mass and power and requires extensive resources in design, integration and testing of spacecraft systems.

  8. An object oriented fully 3D tomography visual toolkit.

    PubMed

    Agostinelli, S; Paoli, G

    2001-04-01

    In this paper we present a modern object oriented component object model (COMM) C + + toolkit dedicated to fully 3D cone-beam tomography. The toolkit allows the display and visual manipulation of analytical phantoms, projection sets and volumetric data through a standard Windows graphical user interface. Data input/output is performed using proprietary file formats but import/export of industry standard file formats, including raw binary, Windows bitmap and AVI, ACR/NEMA DICOMM 3 and NCSA HDF is available. At the time of writing built-in implemented data manipulators include a basic phantom ray-tracer and a Matrox Genesis frame grabbing facility. A COMM plug-in interface is provided for user-defined custom backprojector algorithms: a simple Feldkamp ActiveX control, including source code, is provided as an example; our fast Feldkamp plug-in is also available.

  9. Supply chain planning classification

    NASA Astrophysics Data System (ADS)

    Hvolby, Hans-Henrik; Trienekens, Jacques; Bonde, Hans

    2001-10-01

    Industry experience a need to shift in focus from internal production planning towards planning in the supply network. In this respect customer oriented thinking becomes almost a common good amongst companies in the supply network. An increase in the use of information technology is needed to enable companies to better tune their production planning with customers and suppliers. Information technology opportunities and supply chain planning systems facilitate companies to monitor and control their supplier network. In spite if these developments, most links in today's supply chains make individual plans, because the real demand information is not available throughout the chain. The current systems and processes of the supply chains are not designed to meet the requirements now placed upon them. For long term relationships with suppliers and customers, an integrated decision-making process is needed in order to obtain a satisfactory result for all parties. Especially when customized production and short lead-time is in focus. An effective value chain makes inventory available and visible among the value chain members, minimizes response time and optimizes total inventory value held throughout the chain. In this paper a supply chain planning classification grid is presented based current manufacturing classifications and supply chain planning initiatives.

  10. Fixed Access Network Sharing

    NASA Astrophysics Data System (ADS)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  11. Accelerating the Delivery of Home Performance Upgrades through a Synergistic Business Model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schirber, Tom; Ojczyk, Cindy

    Achieving Building America energy savings goals (40% by 2030) will require many existing homes to install energy upgrades. Engaging large numbers of homeowners in building science-guided upgrades during a single remodeling event has been difficult for a number of reasons. Performance upgrades in existing homes tend to occur over multiple years and usually result from component failures (furnace failure) and weather damage (ice dams, roofing, siding). This research attempted to: A) understand the homeowner's motivations regarding investing in building science based performance upgrades; B) determining a rapidly scalable approach to engage large numbers of homeowners directly through existing customer networks;more » and C) access a business model that will manage all aspects of the contractor-homeowner-performance professional interface to ensure good upgrade decisions over time. The solution results from a synergistic approach utilizing networks of suppliers merging with networks of homeowner customers. Companies in the $400 to $800 billion home services industry have proven direct marketing and sales proficiencies that have led to the development of vast customer networks. Companies such as pest control, lawn care, and security have nurtured these networks by successfully addressing the ongoing needs of homes. This long-term access to customers and trust established with consistent delivery has also provided opportunities for home service providers to grow by successfully introducing new products and services like attic insulation and air sealing. The most important component for success is a business model that will facilitate and manage the process. The team analyzes a group that developed a working model.« less

  12. 28 CFR 100.20 - Confidentiality of trade secrets/proprietary information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Confidentiality of trade secrets/proprietary information. 100.20 Section 100.20 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) COST... trade secrets/proprietary information. With respect to any information provided to the FBI under this...

  13. 28 CFR 100.20 - Confidentiality of trade secrets/proprietary information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Confidentiality of trade secrets/proprietary information. 100.20 Section 100.20 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) COST... trade secrets/proprietary information. With respect to any information provided to the FBI under this...

  14. 28 CFR 100.20 - Confidentiality of trade secrets/proprietary information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 2 2014-07-01 2014-07-01 false Confidentiality of trade secrets/proprietary information. 100.20 Section 100.20 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) COST... trade secrets/proprietary information. With respect to any information provided to the FBI under this...

  15. 28 CFR 100.20 - Confidentiality of trade secrets/proprietary information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Confidentiality of trade secrets/proprietary information. 100.20 Section 100.20 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) COST... trade secrets/proprietary information. With respect to any information provided to the FBI under this...

  16. 28 CFR 100.20 - Confidentiality of trade secrets/proprietary information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Confidentiality of trade secrets/proprietary information. 100.20 Section 100.20 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) COST... trade secrets/proprietary information. With respect to any information provided to the FBI under this...

  17. A Gender Identification System for Customers in a Shop Using Infrared Area Scanners

    NASA Astrophysics Data System (ADS)

    Tajima, Takuya; Kimura, Haruhiko; Abe, Takehiko; Abe, Koji; Nakamoto, Yoshinori

    Information about customers in shops plays an important role in marketing analysis. Currently, in convenience stores and supermarkets, the identification of customer's gender is examined by clerks. On the other hand, gender identification systems using camera images are investigated. However, these systems have a problem of invading human privacies in identifying attributes of customers. The proposed system identifies gender by using infrared area scanners and Bayesian network. In the proposed system, since infrared area scanners do not take customers' images directly, invasion of privacies are not occurred. The proposed method uses three parameters of height, walking speed and pace for humans. In general, it is shown that these parameters have factors of sexual distinction in humans, and Bayesian network is designed with these three parameters. The proposed method resolves the existent problems of restricting the locations where the systems are set and invading human privacies. Experimental results using data obtained from 450 people show that the identification rate for the proposed method was 91.3% on the average of both of male and female identifications.

  18. 78 FR 25490 - Corporate Capital Trust, Inc., et al.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-01

    ... Proprietary Accounts (defined below), the ``Existing Affiliated Investors''). Filing Dates: The application... Proprietary Account; or (c) any Future Affiliated Fund. An Existing Affiliated Investor, other than KFN, is an... Investors' investment advisory agreements). 14. The KKR Proprietary Accounts will not be permitted to invest...

  19. 14 CFR 1274.921 - Publications and reports: non-proprietary research results.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... media in which the research was discussed. The Recipient shall submit the following technical reports... 14 Aeronautics and Space 5 2013-01-01 2013-01-01 false Publications and reports: non-proprietary... Publications and reports: non-proprietary research results. The requirements set forth under this provision may...

  20. 14 CFR § 1274.921 - Publications and reports: non-proprietary research results.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... media in which the research was discussed. The Recipient shall submit the following technical reports... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Publications and reports: non-proprietary... Publications and reports: non-proprietary research results. The requirements set forth under this provision may...

  1. 15 CFR 1160.6 - Proprietary data.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 3 2013-01-01 2013-01-01 false Proprietary data. 1160.6 Section 1160... Private Sector Industrial Technology Partnerships § 1160.6 Proprietary data. All persons making a request under this part are cautioned that data submitted to the Department may be available for dissemination...

  2. A Perceptual Measure of the Degree of Development of Proprietary Equipment.

    ERIC Educational Resources Information Center

    Cua, Kristy O.; Junttila, Mikko A.; Schroeder, Roger G.

    2002-01-01

    Evaluated the psychometric properties of a perceptual measure of the extent to which manufacturing organizations develop proprietary equipment, the Proprietary Equipment Scale (developed by the World Class Manufacturing study). Analysis of data from 164 manufacturing plants in 5 countries indicates that although method effects are present, the…

  3. 27 CFR 6.27 - Proprietary interest.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2013-04-01 2013-04-01 false Proprietary interest. 6.27... OF THE TREASURY ALCOHOL âTIED-HOUSEâ Unlawful Inducements Interest in Retail License § 6.27 Proprietary interest. (a) Complete ownership. Outright ownership of a retail business by an industry member is...

  4. 27 CFR 6.33 - Proprietary interest.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2012-04-01 2012-04-01 false Proprietary interest. 6.33... OF THE TREASURY LIQUORS âTIED-HOUSEâ Unlawful Inducements Interest in Retail Property § 6.33 Proprietary interest. (a) Complete ownership. Outright ownership of a retail business by an industry member is...

  5. 27 CFR 6.33 - Proprietary interest.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2013-04-01 2013-04-01 false Proprietary interest. 6.33... OF THE TREASURY ALCOHOL âTIED-HOUSEâ Unlawful Inducements Interest in Retail Property § 6.33 Proprietary interest. (a) Complete ownership. Outright ownership of a retail business by an industry member is...

  6. 27 CFR 6.27 - Proprietary interest.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2012-04-01 2012-04-01 false Proprietary interest. 6.27... OF THE TREASURY LIQUORS âTIED-HOUSEâ Unlawful Inducements Interest in Retail License § 6.27 Proprietary interest. (a) Complete ownership. Outright ownership of a retail business by an industry member is...

  7. Anti-Hassle Chip

    NASA Technical Reports Server (NTRS)

    1998-01-01

    With assistance from NASA's Ames Research Center, the iTV Corporation has developed a full custom microprocessor that enables access to the Internet through a $49 device. The microprocessor is supported with a compliment of design tools for customization and adaptation as either a licensable core or as a complete microprocessor. Other uses include cell phones, DVD (digital versatile disk) players, cable modems, video conferencing equipment, digital cameras, wireless LANs (Local Area Network) and WANs (Wide Area Network). iTV continues to design new, low-cost consumer products.

  8. Extending the User’s Reach. Responsive Networking for Integrated Military Operations

    DTIC Science & Technology

    2006-02-01

    why customers within DOD increasingly bypass “the system,” and why leading IT firms stay out of the defense market. These anomalies will become...processes, lack the perspective, ability, and incentive to meet joint C4 needs. Those who control money are network providers, not customers ; and they do...should seek to attract IT firms. This requires reform of the Federal Acquisition Regulation as it applies to joint C4, not work-arounds and waivers

  9. 75 FR 55392 - Employment Network Report Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-10

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0046] Employment Network Report Card AGENCY... quality assurance, including a ticket consumer Employment Network Report Card. SUMMARY: We are soliciting... this goal by combining a user-friendly EN Report Card, which contains customer satisfaction feedback...

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nawrocki, G.J.; Seaver, C.L.; Kowalkowski, J.B.

    As controls needs at the Advanced Photon Source matured from an installation phase to an operational phase, the need to monitor the existing conventional facilities control system with the EPICS-based accelerator control system was realized. This existing conventional facilities control network is based on a proprietary system from Johnson Controls called Metasys. Initially read-only monitoring of the Metasys parameters will be provided; however, the ability for possible future expansion to full control is available. This paper describes a method of using commercially available hardware and existing EPICS software as a bridge between the Metasys and EPICS control systems.

  11. Systems Modelling of the Socio-Technical Aspects of Residential Electricity Use and Network Peak Demand.

    PubMed

    Lewis, Jim; Mengersen, Kerrie; Buys, Laurie; Vine, Desley; Bell, John; Morris, Peter; Ledwich, Gerard

    2015-01-01

    Provision of network infrastructure to meet rising network peak demand is increasing the cost of electricity. Addressing this demand is a major imperative for Australian electricity agencies. The network peak demand model reported in this paper provides a quantified decision support tool and a means of understanding the key influences and impacts on network peak demand. An investigation of the system factors impacting residential consumers' peak demand for electricity was undertaken in Queensland, Australia. Technical factors, such as the customers' location, housing construction and appliances, were combined with social factors, such as household demographics, culture, trust and knowledge, and Change Management Options (CMOs) such as tariffs, price, managed supply, etc., in a conceptual 'map' of the system. A Bayesian network was used to quantify the model and provide insights into the major influential factors and their interactions. The model was also used to examine the reduction in network peak demand with different market-based and government interventions in various customer locations of interest and investigate the relative importance of instituting programs that build trust and knowledge through well designed customer-industry engagement activities. The Bayesian network was implemented via a spreadsheet with a tickbox interface. The model combined available data from industry-specific and public sources with relevant expert opinion. The results revealed that the most effective intervention strategies involve combining particular CMOs with associated education and engagement activities. The model demonstrated the importance of designing interventions that take into account the interactions of the various elements of the socio-technical system. The options that provided the greatest impact on peak demand were Off-Peak Tariffs and Managed Supply and increases in the price of electricity. The impact in peak demand reduction differed for each of the locations and highlighted that household numbers, demographics as well as the different climates were significant factors. It presented possible network peak demand reductions which would delay any upgrade of networks, resulting in savings for Queensland utilities and ultimately for households. The use of this systems approach using Bayesian networks to assist the management of peak demand in different modelled locations in Queensland provided insights about the most important elements in the system and the intervention strategies that could be tailored to the targeted customer segments.

  12. Stochastic Dual Algorithm for Voltage Regulation in Distribution Networks with Discrete Loads: Preprint

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dall-Anese, Emiliano; Zhou, Xinyang; Liu, Zhiyuan

    This paper considers distribution networks with distributed energy resources and discrete-rate loads, and designs an incentive-based algorithm that allows the network operator and the customers to pursue given operational and economic objectives, while concurrently ensuring that voltages are within prescribed limits. Four major challenges include: (1) the non-convexity from discrete decision variables, (2) the non-convexity due to a Stackelberg game structure, (3) unavailable private information from customers, and (4) different update frequency from two types of devices. In this paper, we first make convex relaxation for discrete variables, then reformulate the non-convex structure into a convex optimization problem together withmore » pricing/reward signal design, and propose a distributed stochastic dual algorithm for solving the reformulated problem while restoring feasible power rates for discrete devices. By doing so, we are able to statistically achieve the solution of the reformulated problem without exposure of any private information from customers. Stability of the proposed schemes is analytically established and numerically corroborated.« less

  13. SBIR Phase II Final Report - Multi-Protocol Energy Management Gateway for Home-Area Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hanna, Jason

    Significant amounts of electricity, natural gas, and heating oil are wasted by homeowners due to inefficient operation and inadequate maintenance of heating, ventilation, and air conditioning (HVAC) equipment. Coincident’s work under this award reduces energy waste, saves consumers money, and reduces carbon emissions. It does so in three ways: First, Coincident’s approach replaces the traditional thermostat with a wireless network of sensors and controllers that measure temperature, humidity and occupancy in multiple rooms in the house. The “Internet of Things” is a technology trend holding the promise of ubiquitous inexpensive sensors. The reality, however, is that energy and HVAC monitoringmore » and management is a patchwork of incompatible protocols and expensive proprietary technologies. Coincident’s multi-protocol architecture, developed in part under this award tackles this problem and brings low cost interoperable sensor and control devices to market. Second, the Coincident system eliminates hard-to-program and rigid thermostat schedules and instead provides automatic operation of heating and cooling by combining individual temperature and comfort preferences with energy-saving targets, real-time utility use information, weather data, and room utilization patterns. Energy efficiency technology must be appealing to consumers otherwise it will not be used. The Coincident user interface has engaging features such as remote control from any smart phone or web browser and per-room performance breakdowns. Expected energy savings resulting from more efficient operation of heating and air conditioning equipment are in the range of 10-20%. Third, the Coincident system provides heating and air-conditioning contractors with fine-grained performance data for every residence they support (subject to customer privacy controls). This data is integrated from diverse networks within the residence and includes HVAC performance and fuel use data. This information allows the partner to validate energy savings and identify potential system faults (whether from installation problems or maintenance issues). When combined with professional installation as part of high-efficiency HVAC upgrade, energy savings levels of 20-30% can be achieved. Economic feasibility of energy efficiency technology is one of the key challenges addressed in this award. The Coincident system is engineered to be delivered at a disruptive price point, making the system financially feasible for new and retrofit homes of all types and sizes. The Coincident system is intended to be sold through the HVAC professional—the industry most capable of improving HVAC efficiency. Providing HVAC contractors with detailed home performance data motivates them to sell the product, provides them with maintenance and upgrade revenue opportunities, and therefore delivers customer savings and environmental benefits. Having demonstrated technical and financial feasibility, Coincident has won additional grants and awards, participated in pilot projects, started partnership discussions with several HVAC equipment vendors, and has lined up several large channel partners ready to participate in large pilot rollouts.« less

  14. 9 CFR 72.13 - Permitted dips and procedures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... proprietary brands of permitted dips—as well the use of compressed air, vat management techniques, and other... proprietary brands of a Dioxathion (Delnav ®) emulsifiable concentrate used at a concentration of 0.125 to 0.150 percent. 4 (2) Approved proprietary brands of coumaphos (Co-Ral ®), 25 percent wettable powder or...

  15. 14 CFR 11.35 - Does FAA include sensitive security information and proprietary information in the Federal Docket...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... information and proprietary information in the Federal Docket Management System (FDMS)? 11.35 Section 11.35... RULEMAKING PROCEDURES Rulemaking Procedures General § 11.35 Does FAA include sensitive security information and proprietary information in the Federal Docket Management System (FDMS)? (a) Sensitive security...

  16. 29 CFR Appendix B to Part 510 - Nonmanufacturing Industries Eligible for Minimum Wage Phase-In

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... service paper. 512 1 Drugs, drug proprietaries, and druggists' sundries. 5122 1 Drugs, drug proprietaries... places. 59 1 Miscellaneous retail. 591 1 Drug stores and proprietary stores. 5912 1 Drug stores and... merchandise stores. 594 1 Miscellaneous shopping goods stores. 5941 1 Sporting goods stores and bicycle shops...

  17. 29 CFR Appendix B to Part 510 - Nonmanufacturing Industries Eligible for Minimum Wage Phase-In

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... service paper. 512 1 Drugs, drug proprietaries, and druggists' sundries. 5122 1 Drugs, drug proprietaries... places. 59 1 Miscellaneous retail. 591 1 Drug stores and proprietary stores. 5912 1 Drug stores and... merchandise stores. 594 1 Miscellaneous shopping goods stores. 5941 1 Sporting goods stores and bicycle shops...

  18. 29 CFR Appendix B to Part 510 - Nonmanufacturing Industries Eligible for Minimum Wage Phase-In

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... service paper. 512 1 Drugs, drug proprietaries, and druggists' sundries. 5122 1 Drugs, drug proprietaries... places. 59 1 Miscellaneous retail. 591 1 Drug stores and proprietary stores. 5912 1 Drug stores and... merchandise stores. 594 1 Miscellaneous shopping goods stores. 5941 1 Sporting goods stores and bicycle shops...

  19. 77 FR 30338 - Self-Regulatory Organizations; Chicago Board Options Exchange, Incorporated; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-22

    ... conduct proprietary trading, market- making and/or that effect transactions on behalf of broker dealers... organizations that conduct proprietary trading, market-making and/or that effect transactions on behalf of... organizations that conduct proprietary trading, market-making and/or that effect transactions on behalf of...

  20. Government Technology Acquisition Policy: The Case of Proprietary versus Open Source Software

    ERIC Educational Resources Information Center

    Hemphill, Thomas A.

    2005-01-01

    This article begins by explaining the concepts of proprietary and open source software technology, which are now competing in the marketplace. A review of recent individual and cooperative technology development and public policy advocacy efforts, by both proponents of open source software and advocates of proprietary software, subsequently…

  1. 27 CFR 6.33 - Proprietary interest.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Proprietary interest. 6.33 Section 6.33 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS âTIED-HOUSEâ Unlawful Inducements Interest in Retail Property § 6.33 Proprietary interest. (a) Complete ownership....

  2. 27 CFR 6.27 - Proprietary interest.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Proprietary interest. 6.27 Section 6.27 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS âTIED-HOUSEâ Unlawful Inducements Interest in Retail License § 6.27 Proprietary interest. (a) Complete ownership....

  3. Guidelines and Minimum Standards for Operation of Texas Proprietary Schools. (Revised.)

    ERIC Educational Resources Information Center

    Texas Education Agency, Austin. Div. of Proprietary Schools and Veterans Education.

    This guide, prepared to assist owners and managers of proprietary schools in Texas in applying for and obtaining approval by the Texas Education Agency, provides guidelines and minimum standards of practice for proprietary school operation. First, the guidelines are discussed in terms of definitions, exemptions, general provisions, certificates of…

  4. 14 CFR 11.35 - Does FAA include sensitive security information and proprietary information in the Federal Docket...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... information and proprietary information in the Federal Docket Management System (FDMS)? 11.35 Section 11.35... RULEMAKING PROCEDURES Rulemaking Procedures General § 11.35 Does FAA include sensitive security information and proprietary information in the Federal Docket Management System (FDMS)? (a) Sensitive security...

  5. 14 CFR 11.35 - Does FAA include sensitive security information and proprietary information in the Federal Docket...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... information and proprietary information in the Federal Docket Management System (FDMS)? 11.35 Section 11.35... RULEMAKING PROCEDURES Rulemaking Procedures General § 11.35 Does FAA include sensitive security information and proprietary information in the Federal Docket Management System (FDMS)? (a) Sensitive security...

  6. 14 CFR 11.35 - Does FAA include sensitive security information and proprietary information in the Federal Docket...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... information and proprietary information in the Federal Docket Management System (FDMS)? 11.35 Section 11.35... RULEMAKING PROCEDURES Rulemaking Procedures General § 11.35 Does FAA include sensitive security information and proprietary information in the Federal Docket Management System (FDMS)? (a) Sensitive security...

  7. 14 CFR 11.35 - Does FAA include sensitive security information and proprietary information in the Federal Docket...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... information and proprietary information in the Federal Docket Management System (FDMS)? 11.35 Section 11.35... RULEMAKING PROCEDURES Rulemaking Procedures General § 11.35 Does FAA include sensitive security information and proprietary information in the Federal Docket Management System (FDMS)? (a) Sensitive security...

  8. 27 CFR 6.27 - Proprietary interest.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2011-04-01 2011-04-01 false Proprietary interest. 6.27 Section 6.27 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS âTIED-HOUSEâ Unlawful Inducements Interest in Retail License § 6.27 Proprietary interest. (a) Complete ownership....

  9. 27 CFR 6.33 - Proprietary interest.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2011-04-01 2011-04-01 false Proprietary interest. 6.33 Section 6.33 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS âTIED-HOUSEâ Unlawful Inducements Interest in Retail Property § 6.33 Proprietary interest. (a) Complete ownership....

  10. 76 FR 72474 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change To List...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-23

    ... has developed a proprietary SectorSAM \\TM\\ quantitative research and evaluation process that forecasts... and short portfolios as dictated by its proprietary SectorSAM quantitative research and evaluation... a proprietary quantitative analysis, to forecast each sector's excess return within a specific time...

  11. 12 CFR 225.181 - Conformance Period for Banking Entities Engaged in Prohibited Proprietary Trading or Private Fund...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... in Prohibited Proprietary Trading or Private Fund Activities. 225.181 Section 225.181 Banks and... Trading and Relationships With Hedge Funds and Private Equity Funds § 225.181 Conformance Period for Banking Entities Engaged in Prohibited Proprietary Trading or Private Fund Activities. (a) Conformance...

  12. 76 FR 62813 - Pilot Program To Evaluate Proposed Proprietary Name Submissions; Public Meeting on Pilot Program...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-11

    ...] Pilot Program To Evaluate Proposed Proprietary Name Submissions; Public Meeting on Pilot Program Results... voluntary pilot program that enabled participating pharmaceutical firms to evaluate proposed proprietary... public meeting at the end of fiscal year 2011 to discuss the results of the pilot program, but the Agency...

  13. The optics inside an automated single molecule array analyzer

    NASA Astrophysics Data System (ADS)

    McGuigan, William; Fournier, David R.; Watson, Gary W.; Walling, Les; Gigante, Bill; Duffy, David C.; Rissin, David M.; Kan, Cheuk W.; Meyer, Raymond E.; Piech, Tomasz; Fishburn, Matthew W.

    2014-02-01

    Quanterix and Stratec Biomedical have developed an instrument that enables the automated measurement of multiple proteins at concentration ~1000 times lower than existing immunoassays. The instrument is based on Quanterix's proprietary Single Molecule Array technology (Simoa™ ) that facilitates the detection and quantification of biomarkers previously difficult to measure, thus opening up new applications in life science research and in-vitro diagnostics. Simoa is based on trapping individual beads in arrays of femtoliter-sized wells that, when imaged with sufficient resolution, allows for counting of single molecules associated with each bead. When used to capture and detect proteins, this approach is known as digital ELISA (Enzyme-linked immunosorbent assay). The platform developed is a merger of many science and engineering disciplines. This paper concentrates on the optical technologies that have enabled the development of a fully-automated single molecule analyzer. At the core of the system is a custom, wide field-of-view, fluorescence microscope that images arrays of microwells containing single molecules bound to magnetic beads. A consumable disc containing 24 microstructure arrays was developed previously in collaboration with Sony DADC. The system cadence requirements, array dimensions, and requirement to detect single molecules presented significant optical challenges. Specifically, the wide field-of-view needed to image the entire array resulted in the need for a custom objective lens. Additionally, cost considerations for the system required a custom solution that leveraged the image processing capabilities. This paper will discuss the design considerations and resultant optical architecture that has enabled the development of an automated digital ELISA platform.

  14. RRAM-based hardware implementations of artificial neural networks: progress update and challenges ahead

    NASA Astrophysics Data System (ADS)

    Prezioso, M.; Merrikh-Bayat, F.; Chakrabarti, B.; Strukov, D.

    2016-02-01

    Artificial neural networks have been receiving increasing attention due to their superior performance in many information processing tasks. Typically, scaling up the size of the network results in better performance and richer functionality. However, large neural networks are challenging to implement in software and customized hardware are generally required for their practical implementations. In this work, we will discuss our group's recent efforts on the development of such custom hardware circuits, based on hybrid CMOS/memristor circuits, in particular of CMOL variety. We will start by reviewing the basics of memristive devices and of CMOL circuits. We will then discuss our recent progress towards demonstration of hybrid circuits, focusing on the experimental and theoretical results for artificial neural networks based on crossbarintegrated metal oxide memristors. We will conclude presentation with the discussion of the remaining challenges and the most pressing research needs.

  15. A Multi-Technology Communication Platform for Urban Mobile Sensing.

    PubMed

    Almeida, Rodrigo; Oliveira, Rui; Luís, Miguel; Senna, Carlos; Sargento, Susana

    2018-04-12

    A common concern in smart cities is the focus on sensing procedures to provide city-wide information to city managers and citizens. To meet the growing demands of smart cities, the network must provide the ability to handle a large number of mobile sensors/devices, with high heterogeneity and unpredictable mobility, by collecting and delivering the sensed information for future treatment. This work proposes a multi-wireless technology communication platform for opportunistic data gathering and data exchange with respect to smart cities. Through the implementation of a proprietary long-range (LoRa) network and an urban sensor network, our platform addresses the heterogeneity of Internet of Things (IoT) devices while conferring communications in an opportunistic manner, increasing the interoperability of our platform. It implements and evaluates a medium access communication (MAC) protocol for LoRa networks with multiple gateways. It also implements mobile Opportunistic VEhicular (mOVE), a delay-tolerant network (DTN)-based architecture to address the mobility dimension. The platform provides vehicle-to-everything (V2X) communication with support for highly reliable and actionable information flows. Moreover, taking into account the high mobility pattern that a smart city scenario presents, we propose and evaluate two forwarding strategies for the opportunistic sensor network.

  16. Compliance and Functional Testing of IEEE 1451.1 for NCAP-to-NCAP Communications in a Sensor Network

    NASA Technical Reports Server (NTRS)

    Figueroa, Jorge; Gurkan, Deniz; Yuan, X.; Benhaddou, D.; Liu, H.; Singla, A.; Franzl, R.; Ma, H.; Bhatt, S.; Morris, J.; hide

    2008-01-01

    Distributed control in a networked environment is an irreplaceable feature in systems with remote sensors and actuators. Although distributed control was not originally designed to be networked, usage of off-the-shelf networking technologies has become so prevalent that control systems are desired to have access mechanisms similar to computer networks. However, proprietary transducer interfaces for network communications and distributed control overwhelmingly dominate this industry. Unless the lack of compatibility and interoperability among transducers is resolved, the mature level of access (that computer networking can deliver) will not be achieved in such networked distributed control systems. Standardization of networked transducer interfaces will enable devices from different manufacturers to talk to each other and ensure their plug-and-play capability. One such standard is the suite of IEEE 1451 for sensor network communication and transducer interfaces. The suite not only provides a standard interface for smart transducers, but also outlines the connection of an NCAP (network capable application processor) and transducers (through a transducer interface module TIM). This paper presents the design of the compliance testing of IEEE 1451.1 (referred to as Dot1) compatible NCAP-to-NCAP communications on a link-layer independent medium. The paper also represents the first demonstration of NCAP-to-NCAP communications with Dot1 compatibility: a tester NCAP and an NCAP under test (NUT).

  17. OR.NET RT: how service-oriented medical device architecture meets real-time communication.

    PubMed

    Pfeiffer, Jonas H; Kasparick, Martin; Strathen, Benjamin; Dietz, Christian; Dingler, Max E; Lueth, Tim C; Timmermann, Dirk; Radermacher, Klaus; Golatowski, Frank

    2018-02-23

    Today's landscape of medical devices is dominated by stand-alone systems and proprietary interfaces lacking cross-vendor interoperability. This complicates or even impedes the innovation of novel, intelligent assistance systems relying on the collaboration of medical devices. Emerging approaches use the service-oriented architecture (SOA) paradigm based on Internet protocol (IP) to enable communication between medical devices. While this works well for scenarios with no or only soft timing constraints, the underlying best-effort communication scheme is insufficient for time critical data. Real-time (RT) networks are able to reliably guarantee fixed latency boundaries, for example, by using time division multiple access (TDMA) communication patterns. However, deterministic RT networks come with their own limitations such as tedious, inflexible configuration and a more restricted bandwidth allocation. In this contribution we overcome the drawbacks of both approaches by describing and implementing mechanisms that allow the two networks to interact. We introduce the first implementation of a medical device network that offers hard RT guarantees for control and sensor data and integrates into SOA networks. Based on two application examples we show how the flexibility of SOA networks and the reliability of RT networks can be combined to achieve an open network infrastructure for medical devices in the operating room (OR).

  18. 47 CFR 32.2426 - Intrabuilding network cable.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) Nonmetallic cable. This subsidiary record category shall include the original cost of optical fiber cable and... between buildings on one customer's same premises. Intrabuilding network cables are used to distribute...

  19. 47 CFR 32.2426 - Intrabuilding network cable.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) Nonmetallic cable. This subsidiary record category shall include the original cost of optical fiber cable and... between buildings on one customer's same premises. Intrabuilding network cables are used to distribute...

  20. 47 CFR 32.2426 - Intrabuilding network cable.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) Nonmetallic cable. This subsidiary record category shall include the original cost of optical fiber cable and... between buildings on one customer's same premises. Intrabuilding network cables are used to distribute...

  1. An Introduction to Intelligent Networks

    DTIC Science & Technology

    1994-02-01

    customers in particular) to "specify a different geographic location for the call to terminate at. depending on the location of the calling customer ...corporate and military alike), with the promise also that they support affordable and dynamic reconfiguration. For example, as a domestic customer . I... relationship has an SCP serving a distribution of SSP elements to pnride wupport for calls that invoke IN functionality. And is in turn coatrolied and

  2. Analysing Customer Opinions with Text Mining Algorithms

    NASA Astrophysics Data System (ADS)

    Consoli, Domenico

    2009-08-01

    Knowing what the customer thinks of a particular product/service helps top management to introduce improvements in processes and products, thus differentiating the company from their competitors and gain competitive advantages. The customers, with their preferences, determine the success or failure of a company. In order to know opinions of the customers we can use technologies available from the web 2.0 (blog, wiki, forums, chat, social networking, social commerce). From these web sites, useful information must be extracted, for strategic purposes, using techniques of sentiment analysis or opinion mining.

  3. 27 CFR 20.113 - Proprietary solvents general-use formula.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    .... (a) A proprietary solvent is any article made with any other ingredients combined with the ingredients in the minimum ratios prescribed in this section. A proprietary solvent shall be made with S.D.A...,” “vapor harmful,” “May be fatal or cause blindness if swallowed,” and “Cannot be made nonpoisonous.” ...

  4. 27 CFR 20.113 - Proprietary solvents general-use formula.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    .... (a) A proprietary solvent is any article made with any other ingredients combined with the ingredients in the minimum ratios prescribed in this section. A proprietary solvent shall be made with S.D.A...,” “vapor harmful,” “May be fatal or cause blindness if swallowed,” and “Cannot be made nonpoisonous.” ...

  5. 27 CFR 20.113 - Proprietary solvents general-use formula.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    .... (a) A proprietary solvent is any article made with any other ingredients combined with the ingredients in the minimum ratios prescribed in this section. A proprietary solvent shall be made with S.D.A...,” “vapor harmful,” “May be fatal or cause blindness if swallowed,” and “Cannot be made nonpoisonous.” ...

  6. 27 CFR 20.113 - Proprietary solvents general-use formula.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    .... (a) A proprietary solvent is any article made with any other ingredients combined with the ingredients in the minimum ratios prescribed in this section. A proprietary solvent shall be made with S.D.A...,” “vapor harmful,” “May be fatal or cause blindness if swallowed,” and “Cannot be made nonpoisonous.” ...

  7. 27 CFR 20.113 - Proprietary solvents general-use formula.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    .... (a) A proprietary solvent is any article made with any other ingredients combined with the ingredients in the minimum ratios prescribed in this section. A proprietary solvent shall be made with S.D.A...,” “vapor harmful,” “May be fatal or cause blindness if swallowed,” and “Cannot be made nonpoisonous.” ...

  8. Proprietary Hospital Social Work: What Do We Know?

    ERIC Educational Resources Information Center

    Ortiz, Elizabeth Thompson; Bassoff, Betty Z.

    The rapid growth of the proprietary sector in the provision of social services creates a challenge for the social work profession. Little is known about social work services in for-profit organizations or about how they compare to similar non-profit settings. A comparative study was conducted of social work services in proprietary and non-profit…

  9. 77 FR 21603 - Self-Regulatory Organizations; NASDAQ OMX BX, Inc.; Notice of Filing of Proposed Rule Change...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-10

    ... monitoring of proprietary trading, market-making or brokerage activities and/or that is engaged in the supervision or training of those engaged in proprietary trading, market-making or brokerage activities will be... behalf of a broker-dealer account, supervises or monitors proprietary trading, market-making or brokerage...

  10. Guidelines and Standards for Proprietary Schools.

    ERIC Educational Resources Information Center

    Georgia State Dept. of Education, Atlanta. Office of Planning and Development.

    This guide contains information pertaining to the law, rules, regulations, and standards of practice that apply to proprietary schools operating in Georgia, as provided in the Georgia Proprietary School Act (O.C.G.A. Section 20-4-60 and following, Georgia School Laws). The guide has been adopted by the Georgia Board of Education and is used in the…

  11. Note: Design and development of wireless controlled aerosol sampling network for large scale aerosol dispersion experiments.

    PubMed

    Gopalakrishnan, V; Subramanian, V; Baskaran, R; Venkatraman, B

    2015-07-01

    Wireless based custom built aerosol sampling network is designed, developed, and implemented for environmental aerosol sampling. These aerosol sampling systems are used in field measurement campaign, in which sodium aerosol dispersion experiments have been conducted as a part of environmental impact studies related to sodium cooled fast reactor. The sampling network contains 40 aerosol sampling units and each contains custom built sampling head and the wireless control networking designed with Programmable System on Chip (PSoC™) and Xbee Pro RF modules. The base station control is designed using graphical programming language LabView. The sampling network is programmed to operate in a preset time and the running status of the samplers in the network is visualized from the base station. The system is developed in such a way that it can be used for any other environment sampling system deployed in wide area and uneven terrain where manual operation is difficult due to the requirement of simultaneous operation and status logging.

  12. Note: Design and development of wireless controlled aerosol sampling network for large scale aerosol dispersion experiments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gopalakrishnan, V.; Subramanian, V.; Baskaran, R.

    2015-07-15

    Wireless based custom built aerosol sampling network is designed, developed, and implemented for environmental aerosol sampling. These aerosol sampling systems are used in field measurement campaign, in which sodium aerosol dispersion experiments have been conducted as a part of environmental impact studies related to sodium cooled fast reactor. The sampling network contains 40 aerosol sampling units and each contains custom built sampling head and the wireless control networking designed with Programmable System on Chip (PSoC™) and Xbee Pro RF modules. The base station control is designed using graphical programming language LabView. The sampling network is programmed to operate in amore » preset time and the running status of the samplers in the network is visualized from the base station. The system is developed in such a way that it can be used for any other environment sampling system deployed in wide area and uneven terrain where manual operation is difficult due to the requirement of simultaneous operation and status logging.« less

  13. 17 CFR 242.604 - Display of customer limit orders.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... responsible broker or dealer, electronic communications network, national securities exchange, or national... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Display of customer limit orders. 242.604 Section 242.604 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...

  14. Identification with the retail organization and customer-perceived employee similarity: effects on customer spending.

    PubMed

    Netemeyer, Richard G; Heilman, Carrie M; Maxham, James G

    2012-09-01

    Two constructs important to academicians and managers are the degree to which employees and customers identify with an organization, employee organizational identification (employee OI) and customer-company identification (customer identification), respectively. This research examines the effects of these identification constructs and the related construct of customer perceived similarity to employees on customer spending. Via a 1-year multilevel study of 12,047 customers and 1,464 store employees (sales associates) covering 212 stores of a specialty apparel retailer, our study contributes to the literature in 2 critical ways. First, we expand the theoretical network of employee OI and customer identification by examining the related construct of a customer's perceived similarity to store employees. We examine the incremental (not fully mediated) main and interaction effects of customer-perceived similarity to employees and employee OI on customer spending. Second, we examine the effect of customer identification on customer spending relative to the effect of customer satisfaction on customer spending. Thus, our study also contributes by demonstrating a potential complementary route to achieve customer spending (customer identification), a route that may be more readily affected by management than the efforts required for a sustained increase in customer satisfaction. Implications for academics and managers are offered.

  15. Evolutionary multidimensional access architecture featuring cost-reduced components

    NASA Astrophysics Data System (ADS)

    Farjady, Farsheed; Parker, Michael C.; Walker, Stuart D.

    1998-12-01

    We describe a three-stage wavelength-routed optical access network, utilizing coarse passband-flattened arrayed- waveguide grating routers. An N-dimensional addressing strategy enables 6912 customers to be bi-directionally addressed with multi-Gb/s data using only 24 wavelengths spaced by 1.6 nm. Coarse wavelength separation allows use of increased tolerance WDM components at the exchange and customer premises. The architecture is designed to map onto standard access network topologies, allowing elegant upgradability from legacy PON infrastructures at low cost. Passband-flattening of the routers is achieved through phase apodization.

  16. SafeConnect Solar - Final Scientific/Technical Report (Updated)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McNish, Zachary

    2016-02-03

    Final Scientific/Technical Report from Tier 0 SunShot Incubator award for hardware-based solution to reducing soft costs of installed solar. The primary objective of this project was for SafeConnect Solar (“SafeConnect”) to create working proof-of-concept hardware prototypes from its proprietary intellectual property and business concepts for a plug-and-play, safety-oriented hardware solution for photovoltaic solar systems. Specifically, SafeConnect sought to build prototypes of its “SmartBox” and related cabling and connectors, as well as the firmware needed to run the hardware. This hardware is designed to ensure a residential PV system installed with it can address all safety concerns that currently form themore » basis of AHJ electrical permitting and licensing requirements, thereby reducing the amount of permitting and specialized labor required on a residential PV system, and also opening up new sales channels and customer acquisition opportunities.« less

  17. An overview of suite for automated global electronic biosurveillance (SAGES)

    NASA Astrophysics Data System (ADS)

    Lewis, Sheri L.; Feighner, Brian H.; Loschen, Wayne A.; Wojcik, Richard A.; Skora, Joseph F.; Coberly, Jacqueline S.; Blazes, David L.

    2012-06-01

    Public health surveillance is undergoing a revolution driven by advances in the field of information technology. Many countries have experienced vast improvements in the collection, ingestion, analysis, visualization, and dissemination of public health data. Resource-limited countries have lagged behind due to challenges in information technology infrastructure, public health resources, and the costs of proprietary software. The Suite for Automated Global Electronic bioSurveillance (SAGES) is a collection of modular, flexible, freely-available software tools for electronic disease surveillance in resource-limited settings. One or more SAGES tools may be used in concert with existing surveillance applications or the SAGES tools may be used en masse for an end-to-end biosurveillance capability. This flexibility allows for the development of an inexpensive, customized, and sustainable disease surveillance system. The ability to rapidly assess anomalous disease activity may lead to more efficient use of limited resources and better compliance with World Health Organization International Health Regulations.

  18. Custom Ontologies for Expanded Network Analysis

    DTIC Science & Technology

    2006-12-01

    for Expanded Network Analysis. In Visualising Network Information (pp. 6-1 – 6-10). Meeting Proceedings RTO-MP-IST-063, Paper 6. Neuilly-sur-Seine...Even to this day, current research groups are working to develop an approach that involves taking all available text, video, imagery and audio and

  19. Towards an Analytic Foundation for Network Architecture

    DTIC Science & Technology

    2010-12-31

    SUPPLEMENTARY NOTES N/A 14. ABSTRACT In this project, we develop the analytic tools of stochastic optimization for wireless network design and apply them...and Mung Chiang, “ DaVinci : Dynamically Adaptive Virtual Networks for a Customized Internet,” in Proc. ACM SIGCOMM CoNext Conference, December 2008

  20. Decentralized supply chain network design: monopoly, duopoly and oligopoly competitions under uncertainty

    NASA Astrophysics Data System (ADS)

    Seyedhosseini, Seyed Mohammad; Fahimi, Kaveh; Makui, Ahmad

    2017-12-01

    This paper presents the competitive supply chain network design problem in which n decentralized supply chains simultaneously enter the market with no existing rival chain, shape their networks and set wholesale and retail prices in competitive mode. The customer demand is elastic and price dependent, customer utility function is based on the Hoteling model and the chains produce identical or highly substitutable products. We construct a solution algorithm based on bi-level programming and possibility theory. In the proposed bi-level model, the inner part sets the prices based on simultaneous extra- and Stackleberg intra- chains competitions, and the outer part shapes the networks in cooperative competitions. Finally, we use a real-word study to discuss the effect of the different structures of the competitors on the equilibrium solution. Moreover, sensitivity analyses are conducted and managerial insights are offered.

  1. Real time data acquisition of a countrywide commercial microwave link network

    NASA Astrophysics Data System (ADS)

    Chwala, Christian; Keis, Felix; Kunstmann, Harald

    2015-04-01

    Research in recent years has shown that data from commercial microwave link networks can provide very valuable precipitation information. Since these networks comprise the backbone of the cell phone network, they provide countrywide coverage. However acquiring the necessary data from the network operators is still difficult. Data is usually made available for researchers with a large time delay and often at irregular basis. This of course hinders the exploitation of commercial microwave link data in operational applications like QPE forecasts running at national meteorological services. To overcome this, we have developed a custom software in joint cooperation with our industry partner Ericsson. The software is installed on a dedicated server at Ericsson and is capable of acquiring data from the countrywide microwave link network in Germany. In its current first operational testing phase, data from several hundred microwave links in southern Germany is recorded. All data is instantaneously sent to our server where it is stored and organized in an emerging database. Time resolution for the Ericsson data is one minute. The custom acquisition software, however, is capable of processing higher sampling rates. Additionally we acquire and manage 1 Hz data from four microwave links operated by the skiing resort in Garmisch-Partenkirchen. We will present the concept of the data acquisition and show details of the custom-built software. Additionally we will showcase the accessibility and basic processing of real time microwave link data via our database web frontend.

  2. Self-Scrubbing Coal -- an integrated approach to clean air

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Harrison, K.E.

    1997-12-31

    Carefree Coal is coal cleaned in a proprietary dense-media cyclone circuit, using ultrafine magnetite slurries, to remove noncombustible material, including up to 90% of the pyritic sulfur. Deep cleaning alone, however, cannot produce a compliance fuel from coals with high organic sulfur contents. In these cases, Self-Scrubbing Coal will be produced. Self-Scrubbing Coal is produced in the same manner as Carefree Coal except that the finest fraction of product from the cleaning circuit is mixed with limestone-based additives and briquetted. The reduced ash content of the deeply-cleaned coal will permit the addition of relatively large amounts of sorbent without exceedingmore » boiler ash specifications or overloading electrostatic precipitators. This additive reacts with sulfur dioxide (SO{sub 2}) during combustion of the coal to remove most of the remaining sulfur. Overall, sulfur reductions in the range of 80--90% are achieved. After nearly 5 years of research and development of a proprietary coal cleaning technology coupled with pilot-scale validation studies of this technology and pilot-scale combustion testing of Self-Scrubbing Coal, Custom Coals Corporation organized a team of experts to prepare a proposal in response to DOE`s Round IV Program Opportunity Notice for its Clean Coal Technology Program under Public Law 101-121 and Public Law 101-512. The main objective of the demonstration project is the production of a coal fuel that will result in up to 90% reduction in sulfur emissions from coal-fired boilers at a cost competitive advantage over other technologies designed to accomplish the same sulfur emissions and over naturally occurring low sulfur coals.« less

  3. Six Networking Tips to Advance Your Career Goals

    ERIC Educational Resources Information Center

    Jones, Angela

    2013-01-01

    Teachers may wonder why networking is relevant. The point of networking is to cultivate relationships for the exchange of information, services, or resources for employment or business. This may sound cold to those in the educational world, where children and youth are the No. 1 customers, but a network can be a huge support as it pertains to…

  4. Presumptive treatment of malaria from formal and informal drug vendors in Nigeria.

    PubMed

    Isiguzo, Chinwoke; Anyanti, Jennifer; Ujuju, Chinazo; Nwokolo, Ernest; De La Cruz, Anna; Schatzkin, Eric; Modrek, Sepideh; Montagu, Dominic; Liu, Jenny

    2014-01-01

    Despite policies that recommend parasitological testing before treatment for malaria, presumptive treatment remains widespread in Nigeria. The majority of Nigerians obtain antimalarial drugs from two types of for-profit drug vendors-formal and informal medicine shops-but little is known about the quality of malaria care services provided at these shops. This study seeks to (1) describe the profile of patients who seek treatment at different types of drug outlets, (2) document the types of drugs purchased for treating malaria, (3) assess which patients are purchasing recommended drugs, and (4) estimate the extent of malaria over-treatment. In urban, peri-urban, and rural areas in Oyo State, customers exiting proprietary and patent medicine vendor (PPMV) shops or pharmacies having purchased anti-malarial drugs were surveyed and tested with malaria rapid diagnostic test. A follow-up phone survey was conducted four days after to assess self-reported drug administration. Bivariate and multivariate regression analysis was conducted to determine the correlates of patronizing a PPMV versus pharmacy, and the likelihood of purchasing an artemisinin-combination therapy (ACT) drug. Of the 457 participants who sought malaria treatment in 49 enrolled outlets, nearly 92% had diagnosed their condition by themselves, a family member, or a friend. Nearly 60% pharmacy customers purchased an ACT compared to only 29% of PPMV customers, and pharmacy customers paid significantly more on average. Multivariate regression results show that patrons of PPMVs were younger, less wealthy, waited fewer days before seeking care, and were less likely to be diagnosed at a hospital, clinic, or laboratory. Only 3.9% of participants tested positive with a malaria rapid diagnostic test. Poorer individuals seeking care at PPMVs are more likely to receive inappropriate malaria treatment when compared to those who go to pharmacies. Increasing accessibility to reliable diagnosis should be explored to reduce malaria over-treatment.

  5. Presumptive Treatment of Malaria from Formal and Informal Drug Vendors in Nigeria

    PubMed Central

    Isiguzo, Chinwoke; Anyanti, Jennifer; Ujuju, Chinazo; Nwokolo, Ernest; De La Cruz, Anna; Schatzkin, Eric; Modrek, Sepideh; Montagu, Dominic; Liu, Jenny

    2014-01-01

    Background Despite policies that recommend parasitological testing before treatment for malaria, presumptive treatment remains widespread in Nigeria. The majority of Nigerians obtain antimalarial drugs from two types of for-profit drug vendors—formal and informal medicine shops—but little is known about the quality of malaria care services provided at these shops. Aims This study seeks to (1) describe the profile of patients who seek treatment at different types of drug outlets, (2) document the types of drugs purchased for treating malaria, (3) assess which patients are purchasing recommended drugs, and (4) estimate the extent of malaria over-treatment. Methods In urban, peri-urban, and rural areas in Oyo State, customers exiting proprietary and patent medicine vendor (PPMV) shops or pharmacies having purchased anti-malarial drugs were surveyed and tested with malaria rapid diagnostic test. A follow-up phone survey was conducted four days after to assess self-reported drug administration. Bivariate and multivariate regression analysis was conducted to determine the correlates of patronizing a PPMV versus pharmacy, and the likelihood of purchasing an artemisinin-combination therapy (ACT) drug. Results Of the 457participants who sought malaria treatment in 49 enrolled outlets, nearly 92% had diagnosed their condition by themselves, a family member, or a friend. Nearly 60% pharmacy customers purchased an ACT compared to only 29% of PPMV customers, and pharmacy customers paid significantly more on average. Multivariate regression results show that patrons of PPMVs were younger, less wealthy, waited fewer days before seeking care, and were less likely to be diagnosed at a hospital, clinic, or laboratory. Only 3.9% of participants tested positive with a malaria rapid diagnostic test. Conclusions Poorer individuals seeking care at PPMVs are more likely to receive inappropriate malaria treatment when compared to those who go to pharmacies. Increasing accessibility to reliable diagnosis should be explored to reduce malaria over-treatment. PMID:25333909

  6. Metropolitan area networks: a corner stone in the broadband era

    NASA Astrophysics Data System (ADS)

    Ghanem, Adel

    1991-02-01

    Deployment of Broadband ISDN is being influenced by both a market pull and a technology push. New broadband service opportunities exist in the business and residential sectors of the market place. It is envisioned that some customers will need connections directly to broadband switches because of the high bandwidth needed for their applications. At the same time Metropolitan Area Network (MAN) systems will serve those customers with bandwidth requirements less than or equal to 150 Mbps. A given MAN will have a geographical domain to serve where it will carry out the switching tasks within this domain. While MANs couldbe designed using differentarchitecturalconcepts the setofservices expected tobeprovidedby MANs could be equivalent to thelist ofservices thatwillbe supported by the targetbroadband network. This paperpositions MANs as a major building block for Broadband networks. It also examines the evolution process ofMANs as a needed step to assure the successful deployment of these new broadband services. 2. BISDN - OVERVIEW Broadband ISDN (BISDN) is being driven into existence by both a market pull as well as a technology push. Opportunities for new valueadded services are the prime market pull for future broadband networks. These services opportunities extend beyond simple voice and low speed data applications and cover both the residential and the business sectors of the market. It is noted for instance that business customers have growing needs for sophisticated telecommunication vehicles to support their

  7. Performance evaluation of multi-channel wireless mesh networks with embedded systems.

    PubMed

    Lam, Jun Huy; Lee, Sang-Gon; Tan, Whye Kit

    2012-01-01

    Many commercial wireless mesh network (WMN) products are available in the marketplace with their own proprietary standards, but interoperability among the different vendors is not possible. Open source communities have their own WMN implementation in accordance with the IEEE 802.11s draft standard, Linux open80211s project and FreeBSD WMN implementation. While some studies have focused on the test bed of WMNs based on the open80211s project, none are based on the FreeBSD. In this paper, we built an embedded system using the FreeBSD WMN implementation that utilizes two channels and evaluated its performance. This implementation allows the legacy system to connect to the WMN independent of the type of platform and distributes the load between the two non-overlapping channels. One channel is used for the backhaul connection and the other one is used to connect to the stations to wireless mesh network. By using the power efficient 802.11 technology, this device can also be used as a gateway for the wireless sensor network (WSN).

  8. A Wireless Sensor Network approach for distributed in-line chemical analysis of water.

    PubMed

    Capella, J V; Bonastre, A; Ors, R; Peris, M

    2010-03-15

    In this work we propose the implementation of a distributed system based on a Wireless Sensor Network for the control of a chemical analysis system for fresh water. This implementation is presented by describing the nodes that form the distributed system, the communication system by wireless networks, control strategies, and so on. Nitrate, ammonium, and chloride are measured in-line using appropriate ion selective electrodes (ISEs), the results obtained being compared with those provided by the corresponding reference methods. Recovery analyses with ISEs and standard methods, study of interferences, and evaluation of major sensor features have also been carried out. The communication among the nodes that form the distributed system is implemented by means of the utilization of proprietary wireless networks, and secondary data transmission services (GSM or GPRS) provided by a mobile telephone operator. The information is processed, integrated and stored in a control center. These data can be retrieved--through the Internet--so as to know the real-time system status and its evolution. Copyright (c) 2009 Elsevier B.V. All rights reserved.

  9. A Study of Economical Incentives for Voltage Profile Control Method in Future Distribution Network

    NASA Astrophysics Data System (ADS)

    Tsuji, Takao; Sato, Noriyuki; Hashiguchi, Takuhei; Goda, Tadahiro; Tange, Seiji; Nomura, Toshio

    In a future distribution network, it is difficult to maintain system voltage because a large number of distributed generators are introduced to the system. The authors have proposed “voltage profile control method” using power factor control of distributed generators in the previous work. However, the economical disbenefit is caused by the active power decrease when the power factor is controlled in order to increase the reactive power. Therefore, proper incentives must be given to the customers that corporate to the voltage profile control method. Thus, in this paper, we develop a new rules which can decide the economical incentives to the customers. The method is tested in one feeder distribution network model and its effectiveness is shown.

  10. Development of an open source package for the processing of sun-sky photometric data in the European Skyrad Users network (ESR)

    NASA Astrophysics Data System (ADS)

    Estelles, V.; Smyth, T.; Campanelli, M.; Utrillas, M. P.

    2009-04-01

    The European SkyRad users network (ESR) is a joint initiative from the Institute of Atmospheric and Climate Sciences (ISAC) at the National Research Council (CNR) in Italy, the Group of Solar Radiation (GRSV) at the University of Valencia (UV) in Spain, and the Plymouth Marine Laboratory (PML) in the United Kingdom. It was started as a Protocol of Agreement between the three institutions, in 2003. The main objective was to collaborate on the improvement of some technical aspects of the Skyrad.pack algorithm. Currently the network is addressed at European research groups that are users of sun - sky photometers and mainly focus their research on the study of atmospheric aerosols and their application to remote sensing or climatological studies. There exist well known international networks such as AERONET (Aerosol Robotic Network) or SKYNET (SKYrad NETwork, in Asia) but they have some characteristics that actually prevent many European research groups to get involved with them. These limitations mean that a number of European groups are working independently, with no coordination. The resultant databases are not made public or the employed methodology is not homogeneous. In turn, it means that a great amount of data is being lost for critical regional studies in Europe. One of these limitations is related to the supported instrumentation. International networks usually adopt a given model of sun photometer as a standard. The ESR is a multi instrumental network using both Prede POM and Cimel CE318 sun - sky photometers. Another limitation is related to the calibration. In the case of AERONET, a centralized and stringent calibration protocol is adopted. This protocol is designed in order to offer a well tracked and quality assured calibration and data elaboration; it is in fact the key stone for the homogeneity of the network results. But centralization raises other problems. The instruments must be periodically sent every 6 - 12 months to United States or France; therefore, 1) the instrument absence generates considerable data gaps, 2) it is also a chance for equipment damage during the transport, and 3) the proprietary group must cope with the economical cost of these international insured deliveries. Moreover, the protocol constrains the network capability to handle a large amount of instruments. In fact, AERONET is very reluctant at the moment to accept new sites in Europe. ESR has developed an improved version of the Langley plot technique (SKYIL) that allows the users to perform a continuous in situ calibration. Previous results show that the obtained uncertainties in the calibration factors (1.0 - 2.5%) are very similar to the uncertainty values for field instruments in AERONET (1.0 - 2.0%). A third difference that could make ESR more appealing to some European research groups is related to the algorithms itself. The core inversion code (Skyrad.pack), the calibration codes and all the automatization scripts are free open source codes that can be further customized by the users. Therefore, an advanced user could easily access and modify the algorithms for new improvements. As a conclusion, the ESR users network has been conceived as a flexible network and collaborative platform for European groups whose main research is focused on atmospheric aerosols characterization and model development. The package we have developed for the network is an open source product that is available for public use, both for Cimel CE318 and Prede POM instruments.

  11. 43 CFR 3266.11 - When I submit confidential, proprietary information, how can I help ensure that it is not...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 43 Public Lands: Interior 2 2011-10-01 2011-10-01 false When I submit confidential, proprietary information, how can I help ensure that it is not available to the public? 3266.11 Section 3266.11 Public... Information § 3266.11 When I submit confidential, proprietary information, how can I help ensure that it is...

  12. 43 CFR 3278.11 - When I submit confidential, proprietary information, how can I help ensure it is not available to...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 43 Public Lands: Interior 2 2011-10-01 2011-10-01 false When I submit confidential, proprietary information, how can I help ensure it is not available to the public? 3278.11 Section 3278.11 Public Lands... § 3278.11 When I submit confidential, proprietary information, how can I help ensure it is not available...

  13. 43 CFR 3255.11 - When I submit confidential, proprietary information, how can I help ensure it is not available to...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 43 Public Lands: Interior 2 2011-10-01 2011-10-01 false When I submit confidential, proprietary information, how can I help ensure it is not available to the public? 3255.11 Section 3255.11 Public Lands... § 3255.11 When I submit confidential, proprietary information, how can I help ensure it is not available...

  14. [Comprehensive system integration and networking in operating rooms].

    PubMed

    Feußner, H; Ostler, D; Kohn, N; Vogel, T; Wilhelm, D; Koller, S; Kranzfelder, M

    2016-12-01

    A comprehensive surveillance and control system integrating all devices and functions is a precondition for realization of the operating room of the future. Multiple proprietary integrated operation room systems are currently available with a central user interface; however, they only cover a relatively small part of all functionalities. Internationally, there are at least three different initiatives to promote a comprehensive systems integration and networking in the operating room: the Japanese smart cyber operating theater (SCOT), the American medical device plug-and-play interoperability program (MDPnP) and the German secure and dynamic networking in operating room and hospital (OR.NET) project supported by the Federal Ministry of Education and Research. Within the framework of the internationally advanced OR.NET project, prototype solution approaches were realized, which make short-term and mid-term comprehensive data retrieval systems probable. An active and even autonomous control of the medical devices by the surveillance and control system (closed loop) is expected only in the long run due to strict regulatory barriers.

  15. Sensing fluid pressure during plucking events in a natural bedrock channel and experimental flume

    NASA Astrophysics Data System (ADS)

    Wilkinson, C.; Harbor, D. J.; Keel, D.; Levy, S.; Kuehner, J. P.

    2016-12-01

    River channel erosion by plucking is believed to be the dominant erosional process in channels with fractured or jointed bedrock. However, despite its significance as an erosional mechanism, plucking is poorly studied in both laboratory and natural channels. In previous flume studies, model bedrock was plucked by fluid forces alone in nonuniform flow near jumps and waves even where blocks do not protrude into the flow. Here we develop sensor systems to test the hypothesis that bed fluid pressure gradients lift "pluckable" bedrock blocks in a natural field setting and a hydraulic flume. The field setting closely mimics the previous flume setup; the instrumented block is downstream of a roughly 1m step and exhibits no protrusion into the flow. The presence of the step promotes nonuniform flow which changes pressure in the bedrock crack network; slabs of bedrock that have slid downstream and sediment that has been pushed upstream 3-4 m under the bed and in the cracks suggest the influence of pressure differences throughout the crack network and below the bed. In this initial deployment, we evaluate a sensor that monitors movement and simultaneous pressure above and below the block. Sensors are emplaced in a 26kg, 45-cm-long, 20-cm-wide block broken from a 4.5-m-long, 11-cm-thick sandstone bed with a dense network of cracks nearly parallel to flow direction and include a tri-axial accelerometer/gyroscope and two fluid pressure sensors. The electronics are housed in a custom-designed 3D-printed ABS waterproof capsule that is mounted in a vertical hole through the rock. A concurrent flume study develops the sensors necessary to investigate the longitudinal pressure difference below a step using multiple analog sensors (0-1 psi gauge pressure) mounted flush to a false floor under the center of a 30x14-cm test zone. The 15-mm-wide sensors are aligned along the flow centerline and are placed under 25 1-cm-thick "pluckable" bedrock blocks constructed with a proprietary plaster cement. Measured mean pressure and transmission of pressure pulses under the test bed are compared to the visual record of plucking. In addition, conducting runs with blocks removed permits simulation of the mean and varying pressure conditions above the modeled "pluckable" layer as a hydraulic jump is moved downstream through the step.

  16. Utilities Power Change: Engaging Commercial Customers in Workplace Charging

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lommele, Stephen; Dafoe, Wendy

    As stewards of an electric grid that is available almost anywhere people park, utilities that support workplace charging are uniquely positioned to help their commercial customers be a part of the rapidly expanding network of charging infrastructure. Utilities understand the distinctive challenges of their customers, have access to technical information about electrical infrastructure, and have deep experience modeling and managing demand for electricity. This case study highlights the experiences of two utilities with workplace charging programs.

  17. Government Activities to Detect, Deter and Disrupt Threats Enumerating from the Dark Web

    DTIC Science & Technology

    2017-06-09

    the surface selling web website, the Silk Road site offered a variety of illegal goods and served as a grant for the customer transaction. The...order to degrade human prosperity. Tor network, besides offering legal anonymity, services is an infrastructure for illicit online services which are... customer ordered illegal goods from the website located on the dark web and paid in Bitcoins. The money stays on the site wallet until the customer

  18. Utilities bullish on meter-reading technology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Garner, W.L.

    1995-01-15

    By the end of 1996, the 400,000 customers of Kansas City Power & Light Company (KCPL) will have their electric meters read by a real-time wireless network that will relay electrical consumption readings back to computers at the utility`s customer service office. KCPL`s executives believe the new radio and cellular network will greatly improve the company`s ability to control its power distribution, manage its load requirements, monitor outages, and in the near future, allow time-of-use and offpeak pricing. The KCPL system represents the first systemwide, commercial application of wireless automated meter reading (AMR) by a U.S. utility. The article alsomore » describes other AMR systems for reading water and gas meters, along with saying that $18 billion in future power plant investments can be avoided by using time-of-use pricing for residential customers.« less

  19. NSSDC provides network access to key data via NDADS

    NASA Technical Reports Server (NTRS)

    Behnke, Jeanne; King, Joseph

    1994-01-01

    The National Space Science Data Center (NSSDC) is making a growing fraction of its most customer-desirable data electronically accessible via both the local and wide area networks. NSSDC is witnessing a great increase in its data dissemination owing to this network accessibility. To provide its customers the best data accessibility, the NSSDC makes data available from a nearline, mass storage system, the NSSDC Data Archive and Dissemination Service (NDADS). The NDADS, the initial version was made available in January 1992, is a customized system of hardware and software that provides users access to the nearline data via ANONYMOUS FTP, an e-mail interface (ARMS), and a C-based software library. In January 1992, the NDADS registered 416 requests for 1,957 files. By December of 1994, NDADS had been populated with 800 gigabytes of electronically accessible data and had registered 1458 requests for 20,887 files. In this report we describe the NDADS system, both hardware and software. Later in the report, we discuss some of the lessons that were learned as a result of operating NDADS, particularly in the area of ingest and dissemination.

  20. Limitation of degree information for analyzing the interaction evolution in online social networks

    NASA Astrophysics Data System (ADS)

    Shang, Ke-Ke; Yan, Wei-Sheng; Xu, Xiao-Ke

    2014-04-01

    Previously many studies on online social networks simply analyze the static topology in which the friend relationship once established, then the links and nodes will not disappear, but this kind of static topology may not accurately reflect temporal interactions on online social services. In this study, we define four types of users and interactions in the interaction (dynamic) network. We found that active, disappeared, new and super nodes (users) have obviously different strength distribution properties and this result also can be revealed by the degree characteristics of the unweighted interaction and friendship (static) networks. However, the active, disappeared, new and super links (interactions) only can be reflected by the strength distribution in the weighted interaction network. This result indicates the limitation of the static topology data on analyzing social network evolutions. In addition, our study uncovers the approximately stable statistics for the dynamic social network in which there are a large variation for users and interaction intensity. Our findings not only verify the correctness of our definitions, but also helped to study the customer churn and evaluate the commercial value of valuable customers in online social networks.

  1. Application and Characteristics of Chinese Herbal Medicine Containing Schisandra

    NASA Astrophysics Data System (ADS)

    Zhao, Hui; Mao, Mingsan

    2018-01-01

    Schisandra is the dried and ripe fruit of Chinese magnoliavine, which has the functions of protecting the liver and gallbladder, lowering blood sugar, antibacterial and antiaging. Schisandra contains biological activity is very high. As a commonly used blind Chinese herbal medicine, Schisandra often appear in the treatment of vertigo, palpitations, insomnia in the proprietary Chinese medicine, play a nourishing liver and kidney, nourishing the nerves and so on. Chinese Pharmacopoeia contains a total of 102 kinds of Chinese medicine containing Schisandra, according to the dosage form will contain Schisandra proprietary Chinese medicine is divided into pills, tablets, granules and other 8 categories, according to the compatibility of Schisandra application, will contain Schisandra proprietary Chinese medicine functional Class 9. In this paper, the main clinical application of proprietary Chinese medicines containing Schisandra chinensis was analyzed by analyzing the classification and functional treatment of Chinese medicinal constituents containing Schisandra in pharmacopoeia, and then providing the basis for the analysis of Schisandra in proprietary Chinese medicine and The study is conducted to give guidance.

  2. NASA/DOD Aerospace Knowledge Diffusion Research Project. Report 35: The use of computer networks in aerospace engineering

    NASA Technical Reports Server (NTRS)

    Bishop, Ann P.; Pinelli, Thomas E.

    1995-01-01

    This research used survey research to explore and describe the use of computer networks by aerospace engineers. The study population included 2000 randomly selected U.S. aerospace engineers and scientists who subscribed to Aerospace Engineering. A total of 950 usable questionnaires were received by the cutoff date of July 1994. Study results contribute to existing knowledge about both computer network use and the nature of engineering work and communication. We found that 74 percent of mail survey respondents personally used computer networks. Electronic mail, file transfer, and remote login were the most widely used applications. Networks were used less often than face-to-face interactions in performing work tasks, but about equally with reading and telephone conversations, and more often than mail or fax. Network use was associated with a range of technical, organizational, and personal factors: lack of compatibility across systems, cost, inadequate access and training, and unwillingness to embrace new technologies and modes of work appear to discourage network use. The greatest positive impacts from networking appear to be increases in the amount of accurate and timely information available, better exchange of ideas across organizational boundaries, and enhanced work flexibility, efficiency, and quality. Involvement with classified or proprietary data and type of organizational structure did not distinguish network users from nonusers. The findings can be used by people involved in the design and implementation of networks in engineering communities to inform the development of more effective networking systems, services, and policies.

  3. Assessing the potential impact of non-proprietary drug copies on quality of medicine and treatment in patients with relapsing multiple sclerosis: the experience with fingolimod.

    PubMed

    Correale, Jorge; Chiquete, Erwin; Milojevic, Snezana; Frider, Nadina; Bajusz, Imre

    2014-01-01

    Fingolimod is a once-daily oral treatment for relapsing multiple sclerosis, the proprietary production processes of which are tightly controlled, owing to its susceptibility to contamination by impurities, including genotoxic impurities. Many markets produce nonproprietary medicines; assessing their efficacy and safety is difficult as regulators may approve nonproprietary drugs without bioequivalence data, genotoxic evaluation, or risk management plans (RMPs). This assessment is especially important for fingolimod given its solubility/bioavailability profile, genotoxicity risk, and low-dose final product (0.5 mg). This paper presents an evaluation of the quality of proprietary and nonproprietary fingolimod variants. Proprietary fingolimod was used as a reference substance against which eleven nonproprietary fingolimod copies were assessed. The microparticle size distribution of each compound was assessed by laser light diffraction, and inorganic impurity content by sulfated ash testing. Heavy metals content was quantified using inductively coupled plasma optical emission spectrometry, and levels of unspecified impurities by high-performance liquid chromatography. Solubility was assessed in a range of solvents at different pH values. Key information from the fingolimod RMP is also presented. Nonproprietary fingolimod variants exhibited properties out of proprietary or internationally accepted specifications, including differences in particle size distribution and levels of impurities such as heavy metals. For microparticle size and heavy metals, all tested fingolimod copies were out-of-specification by several-fold magnitudes. Proprietary fingolimod has a well-defined RMP, highlighting known and potential mid- to long-term safety risks, and risk-minimization and pharmacovigilance procedures. Nonproprietary fingolimod copies produced by processes less well controlled than or altered from proprietary production processes may reduce product reproducibility and quality, potentially presenting risks to patients. Safety data and risk-minimization strategies for proprietary fingolimod may not apply to the nonproprietary fingolimod copies evaluated here. Market authorization of nonproprietary fingolimod copies should require an appropriate RMP to minimize risks to patients.

  4. Learning in a Network: A "Third Way" between School Learning and Workplace Learning?

    ERIC Educational Resources Information Center

    Bottrup, Pernille

    2005-01-01

    Purpose--The aim of this article is to examine network-based learning and discuss how participation in network can enhance organisational learning. Design/methodology/approach--In recent years, companies have increased their collaboration with other organisations, suppliers, customers, etc., in order to meet challenges from a globalised market.…

  5. Extraction of business relationships in supply networks using statistical learning theory.

    PubMed

    Zuo, Yi; Kajikawa, Yuya; Mori, Junichiro

    2016-06-01

    Supply chain management represents one of the most important scientific streams of operations research. The supply of energy, materials, products, and services involves millions of transactions conducted among national and local business enterprises. To deliver efficient and effective support for supply chain design and management, structural analyses and predictive models of customer-supplier relationships are expected to clarify current enterprise business conditions and to help enterprises identify innovative business partners for future success. This article presents the outcomes of a recent structural investigation concerning a supply network in the central area of Japan. We investigated the effectiveness of statistical learning theory to express the individual differences of a supply chain of enterprises within a certain business community using social network analysis. In the experiments, we employ support vector machine to train a customer-supplier relationship model on one of the main communities extracted from a supply network in the central area of Japan. The prediction results reveal an F-value of approximately 70% when the model is built by using network-based features, and an F-value of approximately 77% when the model is built by using attribute-based features. When we build the model based on both, F-values are improved to approximately 82%. The results of this research can help to dispel the implicit design space concerning customer-supplier relationships, which can be explored and refined from detailed topological information provided by network structures rather than from traditional and attribute-related enterprise profiles. We also investigate and discuss differences in the predictive accuracy of the model for different sizes of enterprises and types of business communities.

  6. A Multi-Technology Communication Platform for Urban Mobile Sensing

    PubMed Central

    Almeida, Rodrigo; Oliveira, Rui

    2018-01-01

    A common concern in smart cities is the focus on sensing procedures to provide city-wide information to city managers and citizens. To meet the growing demands of smart cities, the network must provide the ability to handle a large number of mobile sensors/devices, with high heterogeneity and unpredictable mobility, by collecting and delivering the sensed information for future treatment. This work proposes a multi-wireless technology communication platform for opportunistic data gathering and data exchange with respect to smart cities. Through the implementation of a proprietary long-range (LoRa) network and an urban sensor network, our platform addresses the heterogeneity of Internet of Things (IoT) devices while conferring communications in an opportunistic manner, increasing the interoperability of our platform. It implements and evaluates a medium access communication (MAC) protocol for LoRa networks with multiple gateways. It also implements mobile Opportunistic VEhicular (mOVE), a delay-tolerant network (DTN)-based architecture to address the mobility dimension. The platform provides vehicle-to-everything (V2X) communication with support for highly reliable and actionable information flows. Moreover, taking into account the high mobility pattern that a smart city scenario presents, we propose and evaluate two forwarding strategies for the opportunistic sensor network. PMID:29649175

  7. 42 CFR 423.128 - Dissemination of Part D plan information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... plan sponsor's toll free customer service line or by accessing the plan sponsor's internet Web site. (8... redetermination processes via an Internet Web site; and (iii) A system that transmits codes to network pharmacies...— (1) A toll-free customer call center that— (i) Is open during usual business hours. (ii) Provides...

  8. 47 CFR 64.4002 - Notification obligations of LECs.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... and processing a PIC selection submitted by a customer and placing the customer on the network of the...-submitted PIC order (i.e., mirror image of the original order), unless otherwise specified by this paragraph... request (i.e., the mirror image of the original request), along with the specific reason(s) why the...

  9. 47 CFR 64.4002 - Notification obligations of LECs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... and processing a PIC selection submitted by a customer and placing the customer on the network of the...-submitted PIC order (i.e., mirror image of the original order), unless otherwise specified by this paragraph... request (i.e., the mirror image of the original request), along with the specific reason(s) why the...

  10. 47 CFR 64.4002 - Notification obligations of LECs.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... and processing a PIC selection submitted by a customer and placing the customer on the network of the...-submitted PIC order (i.e., mirror image of the original order), unless otherwise specified by this paragraph... request (i.e., the mirror image of the original request), along with the specific reason(s) why the...

  11. 47 CFR 64.4002 - Notification obligations of LECs.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... and processing a PIC selection submitted by a customer and placing the customer on the network of the...-submitted PIC order (i.e., mirror image of the original order), unless otherwise specified by this paragraph... request (i.e., the mirror image of the original request), along with the specific reason(s) why the...

  12. Affect Recognition through Facebook for Effective Group Profiling towards Personalized Instruction

    ERIC Educational Resources Information Center

    Troussas, Christos; Espinosa, Kurt Junshean; Virvou, Maria

    2016-01-01

    Social networks are progressively being considered as an intense thought for learning. Particularly in the research area of Intelligent Tutoring Systems, they can create intuitive, versatile and customized e-learning systems which can advance the learning process by revealing the capacities and shortcomings of every learner and by customizing the…

  13. 75 FR 39950 - Proposed Collection; Comment Request; Cancer Trials Support Unit (CTSU) Public Use Forms and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-13

    ... Request; Cancer Trials Support Unit (CTSU) Public Use Forms and Customer Satisfaction Surveys (NCI... of customer satisfaction for clinical site staff using the CTSU Help Desk and the CTSU web site. An ongoing user satisfaction survey is in place for the Oncology Patient Enrollment Network (OPEN). User...

  14. NSI customer service representatives and user support office: NASA Science Internet

    NASA Technical Reports Server (NTRS)

    1991-01-01

    The NASA Science Internet, (NSI) was established in 1987 to provide NASA's Offices of Space Science and Applications (OSSA) missions with transparent wide-area data connectivity to NASA's researchers, computational resources, and databases. The NSI Office at NASA/Ames Research Center has the lead responsibility for implementing a total, open networking program to serve the OSSA community. NSI is a full-service communications provider whose services include science network planning, network engineering, applications development, network operations, and network information center/user support services. NSI's mission is to provide reliable high-speed communications to the NASA science community. To this end, the NSI Office manages and operates the NASA Science Internet, a multiprotocol network currently supporting both DECnet and TCP/IP protocols. NSI utilizes state-of-the-art network technology to meet its customers' requirements. THe NASA Science Internet interconnects with other national networks including the National Science Foundation's NSFNET, the Department of Energy's ESnet, and the Department of Defense's MILNET. NSI also has international connections to Japan, Australia, New Zealand, Chile, and several European countries. NSI cooperates with other government agencies as well as academic and commercial organizations to implement networking technologies which foster interoperability, improve reliability and performance, increase security and control, and expedite migration to the OSI protocols.

  15. Non-Intrusive Gaze Tracking Using Artificial Neural Networks

    DTIC Science & Technology

    1994-01-05

    We have developed an artificial neural network based gaze tracking, system which can be customized to individual users. A three layer feed forward...empirical analysis of the performance of a large number of artificial neural network architectures for this task. Suggestions for further explorations...for neurally based gaze trackers are presented, and are related to other similar artificial neural network applications such as autonomous road following.

  16. VLSI synthesis of digital application specific neural networks

    NASA Technical Reports Server (NTRS)

    Beagles, Grant; Winters, Kel

    1991-01-01

    Neural networks tend to fall into two general categories: (1) software simulations, or (2) custom hardware that must be trained. The scope of this project is the merger of these two classifications into a system whereby a software model of a network is trained to perform a specific task and the results used to synthesize a standard cell realization of the network using automated tools.

  17. Update on laser vision correction using wavefront analysis with the CustomCornea system and LADARVision 193-nm excimer laser

    NASA Astrophysics Data System (ADS)

    Maguen, Ezra I.; Salz, James J.; McDonald, Marguerite B.; Pettit, George H.; Papaioannou, Thanassis; Grundfest, Warren S.

    2002-06-01

    A study was undertaken to assess whether results of laser vision correction with the LADARVISION 193-nm excimer laser (Alcon-Autonomous technologies) can be improved with the use of wavefront analysis generated by a proprietary system including a Hartman-Schack sensor and expressed using Zernicke polynomials. A total of 82 eyes underwent LASIK in several centers with an improved algorithm, using the CustomCornea system. A subgroup of 48 eyes of 24 patients was randomized so that one eye undergoes conventional treatment and one eye undergoes treatment based on wavefront analysis. Treatment parameters were equal for each type of refractive error. 83% of all eyes had uncorrected vision of 20/20 or better and 95% were 20/25 or better. In all groups, uncorrected visual acuities did not improve significantly in eyes treated with wavefront analysis compared to conventional treatments. Higher order aberrations were consistently better corrected in eyes undergoing treatment based on wavefront analysis for LASIK at 6 months postop. In addition, the number of eyes with reduced RMS was significantly higher in the subset of eyes treated with a wavefront algorithm (38% vs. 5%). Wavefront technology may improve the outcomes of laser vision correction with the LADARVISION excimer laser. Further refinements of the technology and clinical trials will contribute to this goal.

  18. FloWave.US: validated, open-source, and flexible software for ultrasound blood flow analysis.

    PubMed

    Coolbaugh, Crystal L; Bush, Emily C; Caskey, Charles F; Damon, Bruce M; Towse, Theodore F

    2016-10-01

    Automated software improves the accuracy and reliability of blood velocity, vessel diameter, blood flow, and shear rate ultrasound measurements, but existing software offers limited flexibility to customize and validate analyses. We developed FloWave.US-open-source software to automate ultrasound blood flow analysis-and demonstrated the validity of its blood velocity (aggregate relative error, 4.32%) and vessel diameter (0.31%) measures with a skeletal muscle ultrasound flow phantom. Compared with a commercial, manual analysis software program, FloWave.US produced equivalent in vivo cardiac cycle time-averaged mean (TAMean) velocities at rest and following a 10-s muscle contraction (mean bias <1 pixel for both conditions). Automated analysis of ultrasound blood flow data was 9.8 times faster than the manual method. Finally, a case study of a lower extremity muscle contraction experiment highlighted the ability of FloWave.US to measure small fluctuations in TAMean velocity, vessel diameter, and mean blood flow at specific time points in the cardiac cycle. In summary, the collective features of our newly designed software-accuracy, reliability, reduced processing time, cost-effectiveness, and flexibility-offer advantages over existing proprietary options. Further, public distribution of FloWave.US allows researchers to easily access and customize code to adapt ultrasound blood flow analysis to a variety of vascular physiology applications. Copyright © 2016 the American Physiological Society.

  19. A Knowledge Navigation Method for the Domain of Customers' Services of Mobile Communication Corporations in China

    NASA Astrophysics Data System (ADS)

    Wu, Jiangning; Wang, Xiaohuan

    Rapidly increasing amount of mobile phone users and types of services leads to a great accumulation of complaining information. How to use this information to enhance the quality of customers' services is a big issue at present. To handle this kind of problem, the paper presents an approach to construct a domain knowledge map for navigating the explicit and tacit knowledge in two ways: building the Topic Map-based explicit knowledge navigation model, which includes domain TM construction, a semantic topic expansion algorithm and VSM-based similarity calculation; building Social Network Analysis-based tacit knowledge navigation model, which includes a multi-relational expert navigation algorithm and the criterions to evaluate the performance of expert networks. In doing so, both the customer managers and operators in call centers can find the appropriate knowledge and experts quickly and exactly. The experimental results show that the above method is very powerful for knowledge navigation.

  20. 34 CFR 673.4 - Allocation and reallocation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... one of the following six categories: (i) Cosmetology. (ii) Business. (iii) Trade/Technical. (iv) Art Schools. (v) Other Proprietary Institutions. (vi) Non-Proprietary Institutions. (2) Payments to...

  1. Marketing and Sales for Proprietary Schools.

    ERIC Educational Resources Information Center

    Kleinman, Art

    1986-01-01

    The author provides several tips and suggestions for marketing a proprietary school, involving newspaper advertising, television advertising, direct mail, high school marketing, and timing of promotional mailings. (CT)

  2. Electronic document delivery using the Internet.

    PubMed Central

    Bennett, V M; Palmer, E M

    1994-01-01

    The Health Sciences Libraries Consortium (HSLC) was established in 1985 by thirteen founding member institutions in Pennsylvania and Delaware. In 1989, the Interlibrary Loan, Document Delivery, and Union List Task Force, appointed by the HSLC Board of Directors, successfully demonstrated the feasibility of supplying 94% of all interlibrary loan (ILL) photocopy requests in forty-eight hours or less by a network application of group 3-level memory telefacsimiles. However, the expenses associated with the telefacsimile operation and the limitations associated with network polling protocols challenged participants to seek new alternatives for ILL. In 1990, the HSLC introduced HSLC HealthNET, an online wide-area network linking eleven of the thirteen institutions and their resources while providing access to the Internet. The HSLC HealthNET additionally supports a centralized shared library system, several locally mounted databases, and consortiumwide electronic mail. In 1991, a project was initiated to evaluate Ariel software, pioneered by the Research Libraries Group (RLG), compared to the existing network application of group 3-level telefacsimiles. Factors identified as critical to Ariel's potential to replace the telefacsimile network were the proprietary software specifications for Internet access, the use of HSLC's existing wide-area network (WAN), and a hardware platform that was optimal for an ILL environment. This article describes the Ariel project history, the transition to Ariel from the telefacsimile network, evaluation of equipment features for processing efficiency, and operational issues affecting ILL policy. PMID:8004018

  3. VoIP attacks detection engine based on neural network

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  4. Customer requirements process

    NASA Technical Reports Server (NTRS)

    Russell, Yvonne; Falsetti, Christine M.

    1991-01-01

    Customer requirements are presented through three viewgraphs. One graph presents the range of services, which include requirements management, network engineering, operations, and applications support. Another viewgraph presents the project planning process. The third viewgraph presents the programs and/or projects actively supported including life sciences, earth science and applications, solar system exploration, shuttle flight engineering, microgravity science, space physics, and astrophysics.

  5. 47 CFR 63.17 - Special provisions for U.S. international common carriers.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... carrier, may interconnect its authorized private lines to the public switched network on behalf of an end user customer for the end user customer's own use. (b) Except as provided in paragraph (b)(4) of this...'s World Wide Web site at http://www.fcc.gov/ib. (3) Authorized carriers filing tariffs pursuant to...

  6. 47 CFR 63.17 - Special provisions for U.S. international common carriers.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... carrier, may interconnect its authorized private lines to the public switched network on behalf of an end user customer for the end user customer's own use. (b) Except as provided in paragraph (b)(4) of this...'s World Wide Web site at http://www.fcc.gov/ib. (3) Authorized carriers filing tariffs pursuant to...

  7. 47 CFR 63.17 - Special provisions for U.S. international common carriers.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... carrier, may interconnect its authorized private lines to the public switched network on behalf of an end user customer for the end user customer's own use. (b) Except as provided in paragraph (b)(4) of this...'s World Wide Web site at http://www.fcc.gov/ib. (3) Authorized carriers filing tariffs pursuant to...

  8. 48 CFR 209.505-4 - Obtaining access to proprietary information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) For contractors accessing third party proprietary technical data or computer software, non-disclosure... limited rights technical data, commercial technical data, or restricted rights computer software. The...

  9. 48 CFR 1509.505-4 - Obtaining access to proprietary information.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... PROTECTION AGENCY ACQUISITION PLANNING CONTRACTOR QUALIFICATIONS Organizational Conflicts of Interests 1509.505-4 Obtaining access to proprietary information. Contractors gaining access to confidential business... business information. ...

  10. Use of Schema on Read in Earth Science Data Archives

    NASA Astrophysics Data System (ADS)

    Petrenko, M.; Hegde, M.; Smit, C.; Pilone, P.; Pham, L.

    2017-12-01

    Traditionally, NASA Earth Science data archives have file-based storage using proprietary data file formats, such as HDF and HDF-EOS, which are optimized to support fast and efficient storage of spaceborne and model data as they are generated. The use of file-based storage essentially imposes an indexing strategy based on data dimensions. In most cases, NASA Earth Science data uses time as the primary index, leading to poor performance in accessing data in spatial dimensions. For example, producing a time series for a single spatial grid cell involves accessing a large number of data files. With exponential growth in data volume due to the ever-increasing spatial and temporal resolution of the data, using file-based archives poses significant performance and cost barriers to data discovery and access. Storing and disseminating data in proprietary data formats imposes an additional access barrier for users outside the mainstream research community. At the NASA Goddard Earth Sciences Data Information Services Center (GES DISC), we have evaluated applying the "schema-on-read" principle to data access and distribution. We used Apache Parquet to store geospatial data, and have exposed data through Amazon Web Services (AWS) Athena, AWS Simple Storage Service (S3), and Apache Spark. Using the "schema-on-read" approach allows customization of indexing—spatial or temporal—to suit the data access pattern. The storage of data in open formats such as Apache Parquet has widespread support in popular programming languages. A wide range of solutions for handling big data lowers the access barrier for all users. This presentation will discuss formats used for data storage, frameworks with support for "schema-on-read" used for data access, and common use cases covering data usage patterns seen in a geospatial data archive.

  11. Generation co-ordination and energy trading systems in an open market

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eichler, R.

    1998-07-01

    The power industry in many parts of the world is currently undergoing dramatic changes: deregulation, privatization, competition and 3rd party access are the keywords. The major trends are summarized at the beginning of the paper to provide the basis for the evolving consequences for the power generation industry. In the restructured environment of the Open Market power generation companies frequently are organizationally separated from transmission, distribution, and supply and now have to sell their product directly to customers. This necessitates the introduction of energy trading support functions for both bilateral trading and power exchange trading. On the other hand, theremore » is a close relationship between energy trading and the technical process of energy production. The paper discusses design principles for software systems supporting maximum economic benefits. First practical application experience is also presented. The energy trading process requires the break up of proprietary databases and proprietary data structures as this process has a major need to communicate with external partners who normally use different systems. This directly leads to 3rd party products for the database, standardized data structures and standardized communication protocols. The Open Market environment calls for new and modified planning functions: in some cases measured value information necessary for updating load forecasts cannot be directly achieved. This leads to the need for an estimator of the actual load situation, a completely new function. Power scheduling has to take care of the generation company's balance but it need not always be forced to 0. Regulating services from the grid companies can be used instead. This gives the scheduling functions additional freedom for determining more economic overall solutions considering both purchase and services and sales of energy.« less

  12. Use of Schema on Read in Earth Science Data Archives

    NASA Technical Reports Server (NTRS)

    Hegde, Mahabaleshwara; Smit, Christine; Pilone, Paul; Petrenko, Maksym; Pham, Long

    2017-01-01

    Traditionally, NASA Earth Science data archives have file-based storage using proprietary data file formats, such as HDF and HDF-EOS, which are optimized to support fast and efficient storage of spaceborne and model data as they are generated. The use of file-based storage essentially imposes an indexing strategy based on data dimensions. In most cases, NASA Earth Science data uses time as the primary index, leading to poor performance in accessing data in spatial dimensions. For example, producing a time series for a single spatial grid cell involves accessing a large number of data files. With exponential growth in data volume due to the ever-increasing spatial and temporal resolution of the data, using file-based archives poses significant performance and cost barriers to data discovery and access. Storing and disseminating data in proprietary data formats imposes an additional access barrier for users outside the mainstream research community. At the NASA Goddard Earth Sciences Data Information Services Center (GES DISC), we have evaluated applying the schema-on-read principle to data access and distribution. We used Apache Parquet to store geospatial data, and have exposed data through Amazon Web Services (AWS) Athena, AWS Simple Storage Service (S3), and Apache Spark. Using the schema-on-read approach allows customization of indexing spatially or temporally to suit the data access pattern. The storage of data in open formats such as Apache Parquet has widespread support in popular programming languages. A wide range of solutions for handling big data lowers the access barrier for all users. This presentation will discuss formats used for data storage, frameworks with This presentation will discuss formats used for data storage, frameworks with support for schema-on-read used for data access, and common use cases covering data usage patterns seen in a geospatial data archive.

  13. A comparison of the capital structures of nonprofit and proprietary health care organizations.

    PubMed

    Trussel, John

    2012-01-01

    The relative amount of debt used by an organization is an important determination of the organization's likelihood of financial problems and its cost of capital. This study addresses whether or not there are any differences between proprietary and nonprofit health care organizations in terms of capital structure. Controlling for profitability, risk, growth, and size, analysis of covariance is used to determine whether or not proprietary and nonprofit health care organizations use the same amount of leverage in their capital structures. The results indicate that there is no difference in the amount of leverage between the two institutional types. Although nonprofit and proprietary organizations have unique financing mechanisms, these differences do not impact the relative amount of debt and equity in their capital structures.

  14. [Study on building index system of risk assessment of post-marketing Chinese patent medicine based on AHP-fuzzy neural network].

    PubMed

    Li, Yuanyuan; Xie, Yanming; Fu, Yingkun

    2011-10-01

    Currently massive researches have been launched about the safety, efficiency and economy of post-marketing Chinese patent medicine (CPM) proprietary Chinese medicine, but it was lack of a comprehensive interpretation. Establishing the risk evaluation index system and risk assessment model of CPM is the key to solve drug safety problems and protect people's health. The clinical risk factors of CPM exist similarities with the Western medicine, can draw lessons from foreign experience, but also have itself multi-factor multivariate multi-level complex features. Drug safety risk assessment for the uncertainty and complexity, using analytic hierarchy process (AHP) to empower the index weights, AHP-based fuzzy neural network to build post-marketing CPM risk evaluation index system and risk assessment model and constantly improving the application of traditional Chinese medicine characteristic is accord with the road and feasible beneficial exploration.

  15. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beaver, Justin M; Borges, Raymond Charles; Buckner, Mark A

    Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems were designed to operate on closed, proprietary networks where a malicious insider posed the greatest threat potential. The centralization of control and the movement towards open systems and standards has improved the efficiency of industrial control, but has also exposed legacy SCADA systems to security threats that they were not designed to mitigate. This work explores the viability of machine learning methods in detecting the new threat scenarios of command and data injection. Similar to network intrusion detection systems in the cyber security domain, the command and control communications in amore » critical infrastructure setting are monitored, and vetted against examples of benign and malicious command traffic, in order to identify potential attack events. Multiple learning methods are evaluated using a dataset of Remote Terminal Unit communications, which included both normal operations and instances of command and data injection attack scenarios.« less

  16. Latest generation interconnect technologies in APEnet+ networking infrastructure

    NASA Astrophysics Data System (ADS)

    Ammendola, Roberto; Biagioni, Andrea; Cretaro, Paolo; Frezza, Ottorino; Lo Cicero, Francesca; Lonardo, Alessandro; Martinelli, Michele; Stanislao Paolucci, Pier; Pastorelli, Elena; Rossetti, Davide; Simula, Francesco; Vicini, Piero

    2017-10-01

    In this paper we present the status of the 3rd generation design of the APEnet board (V5) built upon the 28nm Altera Stratix V FPGA; it features a PCIe Gen3 x8 interface and enhanced embedded transceivers with a maximum capability of 12.5Gbps each. The network architecture is designed in accordance to the Remote DMA paradigm. The APEnet+ V5 prototype is built upon the Stratix V DevKit with the addition of a proprietary, third party IP core implementing multi-DMA engines. Support for zero-copy communication is assured by the possibility of DMA-accessing either host and GPU memory, offloading the CPU from the chore of data copying. The current implementation plateaus to a bandwidth for memory read of 4.8GB/s. Here we describe the hardware optimization to the memory write process which relies on the use of two independent DMA engines and an improved TLB.

  17. REAL TIME CONTROL OF URBAN DRAINAGE NETWORKS

    EPA Science Inventory

    Real-time control (RTC) is a custom-designed, computer-assisted management technology for a specific sewerage network to meet the operational objectives of its collection/conveyance system. RTC can operate in several modes, including a mode that is activated during a wet weather ...

  18. Customizing cell signaling using engineered genetic logic circuits.

    PubMed

    Wang, Baojun; Buck, Martin

    2012-08-01

    Cells live in an ever-changing environment and continuously sense, process and react to environmental signals using their inherent signaling and gene regulatory networks. Recently, there have been great advances on rewiring the native cell signaling and gene networks to program cells to sense multiple noncognate signals and integrate them in a logical manner before initiating a desired response. Here, we summarize the current state-of-the-art of engineering synthetic genetic logic circuits to customize cellular signaling behaviors, and discuss their promising applications in biocomputing, environmental, biotechnological and biomedical areas as well as the remaining challenges in this growing field. Copyright © 2012 Elsevier Ltd. All rights reserved.

  19. Distribution network design under demand uncertainty using genetic algorithm and Monte Carlo simulation approach: a case study in pharmaceutical industry

    NASA Astrophysics Data System (ADS)

    Izadi, Arman; Kimiagari, Ali mohammad

    2014-01-01

    Distribution network design as a strategic decision has long-term effect on tactical and operational supply chain management. In this research, the location-allocation problem is studied under demand uncertainty. The purposes of this study were to specify the optimal number and location of distribution centers and to determine the allocation of customer demands to distribution centers. The main feature of this research is solving the model with unknown demand function which is suitable with the real-world problems. To consider the uncertainty, a set of possible scenarios for customer demands is created based on the Monte Carlo simulation. The coefficient of variation of costs is mentioned as a measure of risk and the most stable structure for firm's distribution network is defined based on the concept of robust optimization. The best structure is identified using genetic algorithms and 14% reduction in total supply chain costs is the outcome. Moreover, it imposes the least cost variation created by fluctuation in customer demands (such as epidemic diseases outbreak in some areas of the country) to the logistical system. It is noteworthy that this research is done in one of the largest pharmaceutical distribution firms in Iran.

  20. Distribution network design under demand uncertainty using genetic algorithm and Monte Carlo simulation approach: a case study in pharmaceutical industry

    NASA Astrophysics Data System (ADS)

    Izadi, Arman; Kimiagari, Ali Mohammad

    2014-05-01

    Distribution network design as a strategic decision has long-term effect on tactical and operational supply chain management. In this research, the location-allocation problem is studied under demand uncertainty. The purposes of this study were to specify the optimal number and location of distribution centers and to determine the allocation of customer demands to distribution centers. The main feature of this research is solving the model with unknown demand function which is suitable with the real-world problems. To consider the uncertainty, a set of possible scenarios for customer demands is created based on the Monte Carlo simulation. The coefficient of variation of costs is mentioned as a measure of risk and the most stable structure for firm's distribution network is defined based on the concept of robust optimization. The best structure is identified using genetic algorithms and 14 % reduction in total supply chain costs is the outcome. Moreover, it imposes the least cost variation created by fluctuation in customer demands (such as epidemic diseases outbreak in some areas of the country) to the logistical system. It is noteworthy that this research is done in one of the largest pharmaceutical distribution firms in Iran.

  1. Activity classification using realistic data from wearable sensors.

    PubMed

    Pärkkä, Juha; Ermes, Miikka; Korpipää, Panu; Mäntyjärvi, Jani; Peltola, Johannes; Korhonen, Ilkka

    2006-01-01

    Automatic classification of everyday activities can be used for promotion of health-enhancing physical activities and a healthier lifestyle. In this paper, methods used for classification of everyday activities like walking, running, and cycling are described. The aim of the study was to find out how to recognize activities, which sensors are useful and what kind of signal processing and classification is required. A large and realistic data library of sensor data was collected. Sixteen test persons took part in the data collection, resulting in approximately 31 h of annotated, 35-channel data recorded in an everyday environment. The test persons carried a set of wearable sensors while performing several activities during the 2-h measurement session. Classification results of three classifiers are shown: custom decision tree, automatically generated decision tree, and artificial neural network. The classification accuracies using leave-one-subject-out cross validation range from 58 to 97% for custom decision tree classifier, from 56 to 97% for automatically generated decision tree, and from 22 to 96% for artificial neural network. Total classification accuracy is 82 % for custom decision tree classifier, 86% for automatically generated decision tree, and 82% for artificial neural network.

  2. By any other name: ambiguity in marketing proprietary anti-infective agents.

    PubMed

    Berger, Stephen A

    2007-01-01

    In 55 instances, a single proprietary (trade) name has been used to market > or = 2 distinct generic anti-infective agents. In some cases, one trade name represents 2 different drugs in the same country--or even marketed by the same manufacturer. Some unrelated drugs and poisonous substances are also manufactured under trade names assigned to anti-infectives. The use of proprietary names in the prescribing of anti-infective drugs could result in considerable confusion or harm to patients.

  3. ATM encryption testing

    NASA Astrophysics Data System (ADS)

    Capell, Joyce; Deeth, David

    1996-01-01

    This paper describes why encryption was selected by Lockheed Martin Missiles & Space as the means for securing ATM networks. The ATM encryption testing program is part of an ATM network trial provided by Pacific Bell under the California Research Education Network (CalREN). The problem being addressed is the threat to data security which results when changing from a packet switched network infrastructure to a circuit switched ATM network backbone. As organizations move to high speed cell-based networks, there is a break down in the traditional security model which is designed to protect packet switched data networks from external attacks. This is due to the fact that most data security firewalls filter IP packets, restricting inbound and outbound protocols, e.g. ftp. ATM networks, based on cell-switching over virtual circuits, does not support this method for restricting access since the protocol information is not carried by each cell. ATM switches set up multiple virtual connections, thus there is no longer a single point of entry into the internal network. The problem is further complicated by the fact that ATM networks support high speed multi-media applications, including real time video and video teleconferencing which are incompatible with packet switched networks. The ability to restrict access to Lockheed Martin networks in support of both unclassified and classified communications is required before ATM network technology can be fully deployed. The Lockheed Martin CalREN ATM testbed provides the opportunity to test ATM encryption prototypes with actual applications to assess the viability of ATM encryption methodologies prior to installing large scale ATM networks. Two prototype ATM encryptors are being tested: (1) `MILKBUSH' a prototype encryptor developed by NSA for transmission of government classified data over ATM networks, and (2) a prototype ATM encryptor developed by Sandia National Labs in New Mexico, for the encryption of proprietary data.

  4. 12 CFR 229.16 - Specific availability policy disclosure.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... can differentiate between a proprietary and a nonproprietary ATM, if the bank makes funds from deposits at nonproprietary ATMs available for withdrawal later than funds from deposits at proprietary ATMs...

  5. Applications to determine the shortest tower BTS distance using Dijkstra algorithm

    NASA Astrophysics Data System (ADS)

    Mardana, Herwin; Maharani, Septya; Hatta, Heliza Rahmania

    2017-02-01

    Telecommunications Tower or so-called BTS (Base Transceiver System) Toweris one of the main components in the network infrastructure that has experienced an increase in the number of construction. Telecommunications tower function as a place to put the antenna signal transmitter (access network) to provide communication services to customers around the tower. In addition, other use of telecommunications tower also to place the transmission signal antenna (transport network using microwave technology) for connecting customers with a central area. Therefore, in needed of a decision support system that can provide recommendations planting route of fiber optic cable with the shortest distance in purpose the use of fiber optic cable becoming more efficient. The results of the research were the shortest rule information, showing the distance to be travelled and the map view to enabling users to look at these.

  6. User Privacy in RFID Networks

    NASA Astrophysics Data System (ADS)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  7. Software To Secure Distributed Propulsion Simulations

    NASA Technical Reports Server (NTRS)

    Blaser, Tammy M.

    2003-01-01

    Distributed-object computing systems are presented with many security threats, including network eavesdropping, message tampering, and communications middleware masquerading. NASA Glenn Research Center, and its industry partners, has taken an active role in mitigating the security threats associated with developing and operating their proprietary aerospace propulsion simulations. In particular, they are developing a collaborative Common Object Request Broker Architecture (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines

  8. Making the Net More Intelligent.

    ERIC Educational Resources Information Center

    Somers, Doug

    1998-01-01

    Discusses how service providers can address the challenge of costs and the need for attractive services valuable to business customers. Focuses on Internet service control; applying intelligent networking features to the internet working services dilemma; and providing access control over network-based applications for Internet virtual private…

  9. High-Capacity Ground Communications to Support Future Space Missions: A Forecast of Ground Communications Challenges in the 2010-2020 Period

    NASA Technical Reports Server (NTRS)

    Markley, Richard W.

    2003-01-01

    The purpose of this presentation is to identify major challenges involved in space ground communications networks to support space flight missions over the next 20 years. The presentation focus is on the Deep Space Network and its customers, but the forecast is applicable to all space ground communications networks.

  10. Addressing Software Security

    NASA Technical Reports Server (NTRS)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  11. Network Time Protocol - Naval Oceanography Portal

    Science.gov Websites

    section Advanced Search... Sections Home Time Earth Orientation Astronomy Meteorology Oceanography Ice You are here: Home › USNO › Precise Time › NTP USNO Logo USNO Navigation Master Clock GPS Display Clocks TWSTT Telephone Time NTP Eastern TZ Mountain TZ DoD Customers Info Network Time Protocol Network

  12. Community Microgrid Scheduling Considering Network Operational Constraints and Building Thermal Dynamics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Liu, Guodong; Ollis, Thomas B.; Xiao, Bailu

    Here, this paper proposes a Mixed Integer Conic Programming (MICP) model for community microgrids considering the network operational constraints and building thermal dynamics. The proposed optimization model optimizes not only the operating cost, including fuel cost, purchasing cost, battery degradation cost, voluntary load shedding cost and the cost associated with customer discomfort due to room temperature deviation from the set point, but also several performance indices, including voltage deviation, network power loss and power factor at the Point of Common Coupling (PCC). In particular, the detailed thermal dynamic model of buildings is integrated into the distribution optimal power flow (D-OPF)more » model for the optimal operation of community microgrids. The heating, ventilation and air-conditioning (HVAC) systems can be scheduled intelligently to reduce the electricity cost while maintaining the indoor temperature in the comfort range set by customers. Numerical simulation results show the effectiveness of the proposed model and significant saving in electricity cost could be achieved with network operational constraints satisfied.« less

  13. Community Microgrid Scheduling Considering Network Operational Constraints and Building Thermal Dynamics

    DOE PAGES

    Liu, Guodong; Ollis, Thomas B.; Xiao, Bailu; ...

    2017-10-10

    Here, this paper proposes a Mixed Integer Conic Programming (MICP) model for community microgrids considering the network operational constraints and building thermal dynamics. The proposed optimization model optimizes not only the operating cost, including fuel cost, purchasing cost, battery degradation cost, voluntary load shedding cost and the cost associated with customer discomfort due to room temperature deviation from the set point, but also several performance indices, including voltage deviation, network power loss and power factor at the Point of Common Coupling (PCC). In particular, the detailed thermal dynamic model of buildings is integrated into the distribution optimal power flow (D-OPF)more » model for the optimal operation of community microgrids. The heating, ventilation and air-conditioning (HVAC) systems can be scheduled intelligently to reduce the electricity cost while maintaining the indoor temperature in the comfort range set by customers. Numerical simulation results show the effectiveness of the proposed model and significant saving in electricity cost could be achieved with network operational constraints satisfied.« less

  14. 19 CFR 207.3 - Service, filing, and certification of documents.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... proprietary version shall enclose all business proprietary information in brackets and have the following... has failed to bracket correctly, the submitter may file a corrected version or portion of the business...

  15. Neural-Network-Development Program

    NASA Technical Reports Server (NTRS)

    Phillips, Todd A.

    1993-01-01

    NETS, software tool for development and evaluation of neural networks, provides simulation of neural-network algorithms plus computing environment for development of such algorithms. Uses back-propagation learning method for all of networks it creates. Enables user to customize patterns of connections between layers of network. Also provides features for saving, during learning process, values of weights, providing more-precise control over learning process. Written in ANSI standard C language. Machine-independent version (MSC-21588) includes only code for command-line-interface version of NETS 3.0.

  16. Building America Case Study: Accelerating the Delivery of Home-Performance Upgrades Using a Synergistic Business Model, Minneapolis, Minnesota

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Achieving Building America energy savings goals (40 percent by 2030) will require many existing homes to install energy upgrades. Engaging large numbers of homeowners in building science-guided upgrades during a single remodeling event has been difficult for a number of reasons. Performance upgrades in existing homes tend to occur over multiple years and usually result from component failures (furnace failure) and weather damage (ice dams, roofing, siding). This research attempted to: A) Understand the homeowner's motivations regarding investing in building science based performance upgrades. B) Determining a rapidly scalable approach to engage large numbers of homeowners directly through existing customermore » networks. C) Access a business model that will manage all aspects of the contractor-homeowner-performance professional interface to ensure good upgrade decisions over time. The solution results from a synergistic approach utilizing networks of suppliers merging with networks of homeowner customers. Companies in the $400 to $800 billion home services industry have proven direct marketing and sales proficiencies that have led to the development of vast customer networks. Companies such as pest control, lawn care, and security have nurtured these networks by successfully addressing the ongoing needs of homes. This long-term access to customers and trust established with consistent delivery has also provided opportunities for home service providers to grow by successfully introducing new products and services like attic insulation and air sealing. The most important component for success is a business model that will facilitate and manage the process. The team analyzes a group that developed a working model.« less

  17. 47 CFR 63.17 - Special provisions for U.S. international common carriers.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... carrier, may interconnect its authorized private lines to the public switched network on behalf of an end user customer for the end user customer's own use. (b) Except as provided in paragraph (b)(4) of this... World Wide Web site at http://www.fcc.gov/ib. (3) Authorized carriers filing tariffs pursuant to §§ 61...

  18. 47 CFR 63.17 - Special provisions for U.S. international common carriers.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... carrier, may interconnect its authorized private lines to the public switched network on behalf of an end user customer for the end user customer's own use. (b) Except as provided in paragraph (b)(4) of this... World Wide Web site at http://www.fcc.gov/ib. (3) Authorized carriers filing tariffs pursuant to §§ 61...

  19. Enabling model customization and integration

    NASA Astrophysics Data System (ADS)

    Park, Minho; Fishwick, Paul A.

    2003-09-01

    Until fairly recently, the idea of dynamic model content and presentation were treated synonymously. For example, if one was to take a data flow network, which captures the dynamics of a target system in terms of the flow of data through nodal operators, then one would often standardize on rectangles and arrows for the model display. The increasing web emphasis on XML, however, suggests that the network model can have its content specified in an XML language, and then the model can be represented in a number of ways depending on the chosen style. We have developed a formal method, based on styles, that permits a model to be specified in XML and presented in 1D (text), 2D, and 3D. This method allows for customization and personalization to exert their benefits beyond e-commerce, to the area of model structures used in computer simulation. This customization leads naturally to solving the bigger problem of model integration - the act of taking models of a scene and integrating them with that scene so that there is only one unified modeling interface. This work focuses mostly on customization, but we address the integration issue in the future work section.

  20. Seismic Readings from the Deepest Borehole in the New Madrid Seismic Zone

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Woolery, Edward W; Wang, Zhenming; Sturchio, Neil C

    2006-03-01

    Since the 1980s, the research associated with the UK network has been primarily strong-motion seismology of engineering interest. Currently the University of Kentucky operates a strong-motion network of nine stations in the New Madrid Seismic Zone. A unique feature of the network is the inclusions of vertical strong-motion arrays, each with one or two downhole accelerometers. The deepest borehole array is 260 m below the surfaces at station VASA in Fulton County, Kentucky. A preliminary surface seismic refraction survey was conducted at the site before drilling the hole at VSAS (Woolery and Wang, 2002). The depth to the Paleozoic bedrockmore » at the site was estimated to be approximately 595 m, and the depth to the first very stiff layer (i.e. Porters Creek Clay) was found to be about 260 m. These depths and stratigraphic interpretation correlated well with a proprietary seismic reflection line and the Ken-Ten Oil Exploration No. 1 Sanger hole (Schwalb, 1969), as well as our experience in the area (Street et al., 1995; Woolery et al., 1999).« less

  1. 76 FR 28767 - Desert Southwest Customer Service Region-Rate Order No. WAPA-152

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-18

    ... Temporarily Extending Network Integration Transmission Service (NITS). SUMMARY: This action is to temporarily... Administration, Rate Extension for Desert Southwest Region Network Integration Transmission Service and WALC... Integration Transmission Service and Ancillary Services Formula Rates Section 302 of the Department of Energy...

  2. SAGES: A Suite of Freely-Available Software Tools for Electronic Disease Surveillance in Resource-Limited Settings

    PubMed Central

    Lewis, Sheri L.; Feighner, Brian H.; Loschen, Wayne A.; Wojcik, Richard A.; Skora, Joseph F.; Coberly, Jacqueline S.; Blazes, David L.

    2011-01-01

    Public health surveillance is undergoing a revolution driven by advances in the field of information technology. Many countries have experienced vast improvements in the collection, ingestion, analysis, visualization, and dissemination of public health data. Resource-limited countries have lagged behind due to challenges in information technology infrastructure, public health resources, and the costs of proprietary software. The Suite for Automated Global Electronic bioSurveillance (SAGES) is a collection of modular, flexible, freely-available software tools for electronic disease surveillance in resource-limited settings. One or more SAGES tools may be used in concert with existing surveillance applications or the SAGES tools may be used en masse for an end-to-end biosurveillance capability. This flexibility allows for the development of an inexpensive, customized, and sustainable disease surveillance system. The ability to rapidly assess anomalous disease activity may lead to more efficient use of limited resources and better compliance with World Health Organization International Health Regulations. PMID:21572957

  3. TRMM Common Microphysics Products: A Tool for Evaluating Spaceborne Precipitation Retrieval Algorithms

    NASA Technical Reports Server (NTRS)

    Kingsmill, David E.; Yuter, Sandra E.; Hobbs, Peter V.; Rangno, Arthur L.; Heymsfield, Andrew J.; Stith, Jeffrey L.; Bansemer, Aaron; Haggerty, Julie A.; Korolev, Alexei V.

    2004-01-01

    A customized product for analysis of microphysics data collected from aircraft during field campaigns in support of the TRMM program is described. These Common Microphysics Products (CMP's) are designed to aid in evaluation of TRMM spaceborne precipitation retrieval algorithms. Information needed for this purpose (e.g., particle size spectra and habit, liquid and ice water content) was derived using a common processing strategy on the wide variety of microphysical instruments and raw native data formats employed in the field campaigns. The CMP's are organized into an ASCII structure to allow easy access to the data for those less familiar with and without the tools to accomplish microphysical data processing. Detailed examples of the CMP show its potential and some of its limitations. This approach may be a first step toward developing a generalized microphysics format and an associated community-oriented, non-proprietary software package for microphysics data processing, initiatives that would likely broaden community access to and use of microphysics datasets.

  4. Development and Demonstration of the Open Automated Demand Response Standard for the Residential Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Herter, Karen; Rasin, Josh; Perry, Tim

    2009-11-30

    The goal of this study was to demonstrate a demand response system that can signal nearly every customer in all sectors through the integration of two widely available and non- proprietary communications technologies--Open Automated Demand Response (OpenADR) over lnternet protocol and Utility Messaging Channel (UMC) over FM radio. The outcomes of this project were as follows: (1) a software bridge to allow translation of pricing signals from OpenADR to UMC; and (2) a portable demonstration unit with an lnternet-connected notebook computer, a portfolio of DR-enabling technologies, and a model home. The demonstration unit provides visitors the opportunity to send electricity-pricingmore » information over the lnternet (through OpenADR and UMC) and then watch as the model appliances and lighting respond to the signals. The integration of OpenADR and UMC completed and demonstrated in this study enables utilities to send hourly or sub-hourly electricity pricing information simultaneously to the residential, commercial and industrial sectors.« less

  5. Numerical Propulsion System Simulation Architecture

    NASA Technical Reports Server (NTRS)

    Naiman, Cynthia G.

    2004-01-01

    The Numerical Propulsion System Simulation (NPSS) is a framework for performing analysis of complex systems. Because the NPSS was developed using the object-oriented paradigm, the resulting architecture is an extensible and flexible framework that is currently being used by a diverse set of participants in government, academia, and the aerospace industry. NPSS is being used by over 15 different institutions to support rockets, hypersonics, power and propulsion, fuel cells, ground based power, and aerospace. Full system-level simulations as well as subsystems may be modeled using NPSS. The NPSS architecture enables the coupling of analyses at various levels of detail, which is called numerical zooming. The middleware used to enable zooming and distributed simulations is the Common Object Request Broker Architecture (CORBA). The NPSS Developer's Kit offers tools for the developer to generate CORBA-based components and wrap codes. The Developer's Kit enables distributed multi-fidelity and multi-discipline simulations, preserves proprietary and legacy codes, and facilitates addition of customized codes. The platforms supported are PC, Linux, HP, Sun, and SGI.

  6. Customer Churn Prediction for Broadband Internet Services

    NASA Astrophysics Data System (ADS)

    Huang, B. Q.; Kechadi, M.-T.; Buckley, B.

    Although churn prediction has been an area of research in the voice branch of telecommunications services, more focused studies on the huge growth area of Broadband Internet services are limited. Therefore, this paper presents a new set of features for broadband Internet customer churn prediction, based on Henley segments, the broadband usage, dial types, the spend of dial-up, line-information, bill and payment information, account information. Then the four prediction techniques (Logistic Regressions, Decision Trees, Multilayer Perceptron Neural Networks and Support Vector Machines) are applied in customer churn, based on the new features. Finally, the evaluation of new features and a comparative analysis of the predictors are made for broadband customer churn prediction. The experimental results show that the new features with these four modelling techniques are efficient for customer churn prediction in the broadband service field.

  7. Proprietary Schools: Stronger Department of Education Oversight Needed to Help Ensure Only Eligible Students Receive Federal Student Aid. Report to the Chairman, Subcommittee on Higher Education, Lifelong Learning and Competitiveness, Committee on Education and Labor, House of Representatives. GAO-09-600

    ERIC Educational Resources Information Center

    Scott, George A.

    2009-01-01

    For-profit schools--also known as proprietary schools--received over $16 billion in federal loans, grants, and campus-based aid under Title IV of the Higher Education Act in 2007/08. The US Government Accountability Office (GAO) was asked to determine (1) how the student loan default profile of proprietary schools compares with that of other types…

  8. A single capsule formulation of RHB-104 demonstrates higher anti-microbial growth potency for effective treatment of Crohn's disease associated with Mycobacterium avium subspecies paratuberculosis.

    PubMed

    Qasem, Ahmad; Safavikhasraghi, Mitra; Naser, Saleh A

    2016-01-01

    Most recently we reported that RHB‑104 triple antibiotics combination in culture is bactericidal and should be effective for treatment of Crohn's disease (CD)-associated with Mycobacterium avium subspecies paratuberculosis (MAP) (Alcedo et al. in Gut Pathog 14:32, 2016). The combination exhibited unique synergistic antimicrobial growth activity. The proprietary RHB-104 capsule formulation contains active ingredients (63.3 % Clarithromycin (CLA), 6.7 % Clofazimine (CLO) and 30 % Rifabutin (RIF)). In our earlier study, we could not dissolve the proprietary RHB-104 capsule formulation in one compatible solvent. Consequently, we re-created RHB-104 analog by adding appropriate concentrations of each of the three antibiotics into the cultures. The Minimum inhibitory concentration (MIC) for RHB-104 analog, CLA, CLO, RIF, CLA-CLO, CLA-RIF, CLO-RIF and their individual solvents were reported earlier (Alcedo et al. in Gut Pathog 14:32, 2016). In this study, we succeeded in dissolving the proprietary RHB-104 capsule formulation in a single proprietary solvent. This study is designed to compare of the MIC the proprietary RHB-104 capsule formulation to RHB-104 analog against MAP and other microorganisms. BD Bactec™ MGIT™ Para-TB medium (Sparks, MD) system was used to determine the MIC of the proprietary RHB-104 capsule formulation and RHB-104 analog and their solvents against MAP and several other microorganisms. The final concentration of solvents used to dissolve all the drugs were ≤0.5 % (v/v). The MIC for the RHB-104 proprietary solvent against MAP was consistent against all microorganisms tested in the study at 12.5 % (v/v). The MIC for the proprietary RHB-104 capsule formulation was similar to RHB-104 analog against several MAP clinical strains with MIC ≤ 0.2 μg/mL. The MIC for the proprietary RHB-104 capsule formulation was at 2.0 μg/mL against MAP strain MS 137 and M. avium strain JF7 compared to 4.0 ug/mL for RHB-104 analog. Similarly, the MIC of RHB-104 formulation capsule was significantly lower than RHB-104 analog against M. tuberculosis HR237, M. fortuitism subspecies fortuitum, M. smegmatis ATCC 27199, Staphylococcus aureus ATCC 25923 and Listeria monocytogenes ATCC 19112. The data demonstrated that the proprietary RHB-104 capsule formulation is more potent in culture against Mycobacteria and other microorganisms especially those with MIC >0.2. Formulation of multi-drugs in a single capsule results in potent synergistic anti-microbial activity far exceeds treatment the culture with multi-individually dissolved drugs. RHB-104 capsule formulation should be more effective to eradicate MAP infection in patients with CD. The study provides evidence that combining weak antibiotics in one formulation might be the new silver bullet to combat bacteria.

  9. Correlating Inferred Data Plane IPV6 Reboot Events With Control Plane BGP Activity

    DTIC Science & Technology

    2016-03-01

    22 Figure 3.6 Example Border Gateway Protocol (BGP) update message . . . . 23 Figure 3.7 Customer-provider relationship with border...government USN U.S. Navy VPN Virtual Private Network xiv Acknowledgments First, I would like to thank my family for their love , support, and...network outages when they restart . Network outages occur for many reasons: hardware failure, severe weather, misconfiguration, patching, upgrades

  10. Rethinking Traffic Management: Design of Optimizable Networks

    DTIC Science & Technology

    2008-06-01

    Though this paper used optimization theory to design and analyze DaVinci , op- timization theory is one of many possible tools to enable a grounded...dynamically allocate bandwidth shares. The distributed protocols can be implemented using DaVinci : Dynamically Adaptive VIrtual Networks for a Customized...Internet. In DaVinci , each virtual network runs traffic-management protocols optimized for a traffic class, and link bandwidth is dynamically allocated

  11. 19 CFR 356.10 - Procedures for obtaining access to proprietary information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... secretary if such person: (i) Is not involved in competitive decision-making for a participant in the panel review or for any person that would gain competitive advantage through knowledge of the proprietary...

  12. 75 FR 80115 - Proposed Information Collection (Conflicting Interests Certification for Proprietary Schools Only...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-21

    ... education benefits to veterans and other eligible person pursuing approved programs of education. Employees... to ensure State approving agency and VA employees do not own any interest in a proprietary profit...

  13. DEMONSTRATION BULLETIN - SOLIDIFICATION/ STABILIZATION PROCESS, SOLIDTECH, INC.

    EPA Science Inventory

    The Soliditech solidification/stabilization technology mixes hazardous waste materials in soils or sludges with pozzolanic material (cement, fly ash, or kiln dust), a proprietary additive called Urrichem, other proprietary additives, and water. The process is designed to aid ...

  14. Change Strategies Used by a Proprietary School: The Dale Carnegie Organization.

    ERIC Educational Resources Information Center

    Mackey, Paul J.

    1983-01-01

    Discusses recent developments regarding proprietary schools: recognition by accrediting associations, increased federal aid, and increased need for the specific training offered by these schools. Uses the Dale Carnegie organization as an example. (JOW)

  15. Performance analysis of bi-directional broadband passive optical network using erbium-doped fiber amplifier

    NASA Astrophysics Data System (ADS)

    Almalaq, Yasser; Matin, Mohammad A.

    2014-09-01

    The broadband passive optical network (BPON) has the ability to support high-speed data, voice, and video services to home and small businesses customers. In this work, the performance of bi-directional BPON is analyzed for both down and up streams traffic cases by the help of erbium doped fiber amplifier (EDFA). The importance of BPON is reduced cost. Because PBON uses a splitter the cost of the maintenance between the providers and the customers side is suitable. In the proposed research, BPON has been tested by the use of bit error rate (BER) analyzer. BER analyzer realizes maximum Q factor, minimum bit error rate, and eye height.

  16. Implementing a low-cost web-based clinical trial management system for community studies: a case study.

    PubMed

    Geyer, John; Myers, Kathleen; Vander Stoep, Ann; McCarty, Carolyn; Palmer, Nancy; DeSalvo, Amy

    2011-10-01

    Clinical trials with multiple intervention locations and a single research coordinating center can be logistically difficult to implement. Increasingly, web-based systems are used to provide clinical trial support with many commercial, open source, and proprietary systems in use. New web-based tools are available which can be customized without programming expertise to deliver web-based clinical trial management and data collection functions. To demonstrate the feasibility of utilizing low-cost configurable applications to create a customized web-based data collection and study management system for a five intervention site randomized clinical trial establishing the efficacy of providing evidence-based treatment via teleconferencing to children with attention-deficit hyperactivity disorder. The sites are small communities that would not usually be included in traditional randomized trials. A major goal was to develop database that participants could access from computers in their home communities for direct data entry. Discussed is the selection process leading to the identification and utilization of a cost-effective and user-friendly set of tools capable of customization for data collection and study management tasks. An online assessment collection application, template-based web portal creation application, and web-accessible Access 2007 database were selected and customized to provide the following features: schedule appointments, administer and monitor online secure assessments, issue subject incentives, and securely transmit electronic documents between sites. Each tool was configured by users with limited programming expertise. As of June 2011, the system has successfully been used with 125 participants in 5 communities, who have completed 536 sets of assessment questionnaires, 8 community therapists, and 11 research staff at the research coordinating center. Total automation of processes is not possible with the current set of tools as each is loosely affiliated, creating some inefficiency. This system is best suited to investigations with a single data source e.g., psychosocial questionnaires. New web-based applications can be used by investigators with limited programming experience to implement user-friendly, efficient, and cost-effective tools for multi-site clinical trials with small distant communities. Such systems allow the inclusion in research of populations that are not usually involved in clinical trials.

  17. SATWG networked quality function deployment

    NASA Technical Reports Server (NTRS)

    Brown, Don

    1992-01-01

    The initiative of this work is to develop a cooperative process for continual evolution of an integrated, time phased avionics technology plan that involves customers, technologists, developers, and managers. This will be accomplished by demonstrating a computer network technology to augment the Quality Function Deployment (QFD). All results are presented in viewgraph format.

  18. Is the Customer Always Right? End-User Services in a Networked Age.

    ERIC Educational Resources Information Center

    Morrow, Terry

    This paper focuses on the changes taking place in the behavior of those engaged in research and teaching as a result of the increasing availability of source material on the Internet. It first discusses who customers are and what they are using information sources for. It then looks at the range of new services that are on offer, and reviews a…

  19. Interagency Collaborative Arrangements and Activities: Types, Rationales, Considerations (Interagency Paper, Number 5, June 2011)

    DTIC Science & Technology

    2011-06-01

    much of the 20th century and into the current day, controlling U.S. borders— primarily to halt illegal immigration and smuggling of contraband...this lengthy period—include the Coast Guard; Customs Service; Immigration and Naturalization Service; Immigration and Customs Enforcement Bureau...that] a true network starts with robust communications collectivity, but also leverages physical and cultural proximity, shared purpose, established

  20. Distributed health data networks: a practical and preferred approach to multi-institutional evaluations of comparative effectiveness, safety, and quality of care.

    PubMed

    Brown, Jeffrey S; Holmes, John H; Shah, Kiran; Hall, Ken; Lazarus, Ross; Platt, Richard

    2010-06-01

    Comparative effectiveness research, medical product safety evaluation, and quality measurement will require the ability to use electronic health data held by multiple organizations. There is no consensus about whether to create regional or national combined (eg, "all payer") databases for these purposes, or distributed data networks that leave most Protected Health Information and proprietary data in the possession of the original data holders. Demonstrate functions of a distributed research network that supports research needs and also address data holders concerns about participation. Key design functions included strong local control of data uses and a centralized web-based querying interface. We implemented a pilot distributed research network and evaluated the design considerations, utility for research, and the acceptability to data holders of methods for menu-driven querying. We developed and tested a central, web-based interface with supporting network software. Specific functions assessed include query formation and distribution, query execution and review, and aggregation of results. This pilot successfully evaluated temporal trends in medication use and diagnoses at 5 separate sites, demonstrating some of the possibilities of using a distributed research network. The pilot demonstrated the potential utility of the design, which addressed the major concerns of both users and data holders. No serious obstacles were identified that would prevent development of a fully functional, scalable network. Distributed networks are capable of addressing nearly all anticipated uses of routinely collected electronic healthcare data. Distributed networks would obviate the need for centralized databases, thus avoiding numerous obstacles.

  1. Open hardware: a role to play in wireless sensor networks?

    PubMed

    Fisher, Roy; Ledwaba, Lehlogonolo; Hancke, Gerhard; Kruger, Carel

    2015-03-20

    The concept of the Internet of Things is rapidly becoming a reality, with many applications being deployed within industrial and consumer sectors. At the 'thing' level-devices and inter-device network communication-the core technical building blocks are generally the same as those found in wireless sensor network implementations. For the Internet of Things to continue growing, we need more plentiful resources for building intelligent devices and sensor networks. Unfortunately, current commercial devices, e.g., sensor nodes and network gateways, tend to be expensive and proprietary, which presents a barrier to entry and arguably slows down further development. There are, however, an increasing number of open embedded platforms available and also a wide selection of off-the-shelf components that can quickly and easily be built into device and network gateway solutions. The question is whether these solutions measure up to built-for-purpose devices. In the paper, we provide a comparison of existing built-for-purpose devices against open source devices. For comparison, we have also designed and rapidly prototyped a sensor node based on off-the-shelf components. We show that these devices compare favorably to built-for-purpose devices in terms of performance, power and cost. Using open platforms and off-the-shelf components would allow more developers to build intelligent devices and sensor networks, which could result in a better overall development ecosystem, lower barriers to entry and rapid growth in the number of IoT applications.

  2. Open Hardware: A Role to Play in Wireless Sensor Networks?

    PubMed Central

    Fisher, Roy; Ledwaba, Lehlogonolo; Hancke, Gerhard; Kruger, Carel

    2015-01-01

    The concept of the Internet of Things is rapidly becoming a reality, with many applications being deployed within industrial and consumer sectors. At the ‘thing’ level—devices and inter-device network communication—the core technical building blocks are generally the same as those found in wireless sensor network implementations. For the Internet of Things to continue growing, we need more plentiful resources for building intelligent devices and sensor networks. Unfortunately, current commercial devices, e.g., sensor nodes and network gateways, tend to be expensive and proprietary, which presents a barrier to entry and arguably slows down further development. There are, however, an increasing number of open embedded platforms available and also a wide selection of off-the-shelf components that can quickly and easily be built into device and network gateway solutions. The question is whether these solutions measure up to built-for-purpose devices. In the paper, we provide a comparison of existing built-for-purpose devices against open source devices. For comparison, we have also designed and rapidly prototyped a sensor node based on off-the-shelf components. We show that these devices compare favorably to built-for-purpose devices in terms of performance, power and cost. Using open platforms and off-the-shelf components would allow more developers to build intelligent devices and sensor networks, which could result in a better overall development ecosystem, lower barriers to entry and rapid growth in the number of IoT applications. PMID:25803706

  3. 34 CFR 668.8 - Eligible program.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... counseling. (c) Institution of higher education. An eligible program provided by an institution of higher...) Proprietary institution of higher education and postsecondary vocational institution. An eligible program provided by a proprietary institution of higher education or postsecondary vocational institution— (1)(i...

  4. 10 CFR 51.16 - Proprietary information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Proprietary information. 51.16 Section 51.16 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) ENVIRONMENTAL PROTECTION REGULATIONS FOR DOMESTIC LICENSING AND RELATED REGULATORY FUNCTIONS National Environmental Policy Act-Regulations Implementing Section 102(2...

  5. 10 CFR 51.16 - Proprietary information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Proprietary information. 51.16 Section 51.16 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) ENVIRONMENTAL PROTECTION REGULATIONS FOR DOMESTIC LICENSING AND RELATED REGULATORY FUNCTIONS National Environmental Policy Act-Regulations Implementing Section 102(2...

  6. 76 FR 13021 - Agency Information Collection (Conflicting Interests Certification for Proprietary Schools) Under...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-09

    ... Interests Certification for Proprietary Schools Only, VA Form 22-1919. OMB Control Number: 2900-0657. Type... certifying that the institution and enrollees do not have any conflict of interest. An agency may not conduct...

  7. Systems Modelling of the Socio-Technical Aspects of Residential Electricity Use and Network Peak Demand

    PubMed Central

    Lewis, Jim; Mengersen, Kerrie; Buys, Laurie; Vine, Desley; Bell, John; Morris, Peter; Ledwich, Gerard

    2015-01-01

    Provision of network infrastructure to meet rising network peak demand is increasing the cost of electricity. Addressing this demand is a major imperative for Australian electricity agencies. The network peak demand model reported in this paper provides a quantified decision support tool and a means of understanding the key influences and impacts on network peak demand. An investigation of the system factors impacting residential consumers’ peak demand for electricity was undertaken in Queensland, Australia. Technical factors, such as the customers’ location, housing construction and appliances, were combined with social factors, such as household demographics, culture, trust and knowledge, and Change Management Options (CMOs) such as tariffs, price, managed supply, etc., in a conceptual ‘map’ of the system. A Bayesian network was used to quantify the model and provide insights into the major influential factors and their interactions. The model was also used to examine the reduction in network peak demand with different market-based and government interventions in various customer locations of interest and investigate the relative importance of instituting programs that build trust and knowledge through well designed customer-industry engagement activities. The Bayesian network was implemented via a spreadsheet with a tickbox interface. The model combined available data from industry-specific and public sources with relevant expert opinion. The results revealed that the most effective intervention strategies involve combining particular CMOs with associated education and engagement activities. The model demonstrated the importance of designing interventions that take into account the interactions of the various elements of the socio-technical system. The options that provided the greatest impact on peak demand were Off-Peak Tariffs and Managed Supply and increases in the price of electricity. The impact in peak demand reduction differed for each of the locations and highlighted that household numbers, demographics as well as the different climates were significant factors. It presented possible network peak demand reductions which would delay any upgrade of networks, resulting in savings for Queensland utilities and ultimately for households. The use of this systems approach using Bayesian networks to assist the management of peak demand in different modelled locations in Queensland provided insights about the most important elements in the system and the intervention strategies that could be tailored to the targeted customer segments. PMID:26226511

  8. A Data Management System Integrating Web-based Training and Randomized Trials: Requirements, Experiences and Recommendations.

    PubMed

    Muroff, Jordana; Amodeo, Maryann; Larson, Mary Jo; Carey, Margaret; Loftin, Ralph D

    2011-01-01

    This article describes a data management system (DMS) developed to support a large-scale randomized study of an innovative web-course that was designed to improve substance abuse counselors' knowledge and skills in applying a substance abuse treatment method (i.e., cognitive behavioral therapy; CBT). The randomized trial compared the performance of web-course-trained participants (intervention group) and printed-manual-trained participants (comparison group) to determine the effectiveness of the web-course in teaching CBT skills. A single DMS was needed to support all aspects of the study: web-course delivery and management, as well as randomized trial management. The authors briefly reviewed several other systems that were described as built either to handle randomized trials or to deliver and evaluate web-based training. However it was clear that these systems fell short of meeting our needs for simultaneous, coordinated management of the web-course and the randomized trial. New England Research Institute's (NERI) proprietary Advanced Data Entry and Protocol Tracking (ADEPT) system was coupled with the web-programmed course and customized for our purposes. This article highlights the requirements for a DMS that operates at the intersection of web-based course management systems and randomized clinical trial systems, and the extent to which the coupled, customized ADEPT satisfied those requirements. Recommendations are included for institutions and individuals considering conducting randomized trials and web-based training programs, and seeking a DMS that can meet similar requirements.

  9. Competitive Bidding in a Certain Class of Auctions

    NASA Astrophysics Data System (ADS)

    Johansson, Mathias

    2006-11-01

    We consider the problem of determining the amount to bid in a certain type of auctions in which customers submit one sealed bid. The bid reflects the price a customer is willing to pay for one unit of the offered goods. The auction is repeated and at each auction each customer requests a certain amount of goods, an amount that we call the capacity of the customer and that varies among customers and over time. At each auction, only the customer with the largest bid-capacity product obtains any goods. The price paid by the winner equals his/her bid-capacity product, and the amount of goods obtained in return equals the winner's capacity. The auction is repeated many times, with only limited information concerning winning bid-capacity products being announced to the customers. This situation is motivated in for example wireless communication networks in which a possible way of obtaining a desired service level is to use dynamic pricing and competitive bidding. In this application, the capacity is typically uncertain when the bid is made. We derive bidding rules and loss functions for a few typical service requirements.

  10. Early warning system for potential churners among mortgage customers

    NASA Astrophysics Data System (ADS)

    Irpan, Hamidah Muhd; Aidid, Sharifah Sakinah Syed Hassan; Mohmad, Sarahiza; Ibrahim, Noorazilah

    2014-07-01

    Retaining existing customer is a major task for many companies because cost to acquire new customers is higher than retaining existing customers. For mortgage business in Bank X, customer relationship management plays a big role to understand their customers' profile and churners so that suitable action can be done to retain their potential churners. Objectives of this study are (1) understanding their customers' profile and churners, (2) modeling potential churners using neural network model and (3) to deploy the model to identify potential churners. Data was divided into two parts: sampling (67,470 cases) and scoring (4,488 cases). Analysis was done using SAS Enterprise Miner. Dependent variable is churner/non churner while independent variables are balance and amount of loan, interest rate offered installment amount, loan performance, months in arrear, vintage, tenure, age, race and gender. Potential churners were identified as Malays, followed by Indian, other races and Chinese. Nonperforming loan and male customers tend to churn compared to performing loan and female customers. Younger customers with small loan amount, balance and monthly instalment, higher interest rate, have many months in arrears, longer vintage and tenure have higher tendency to churn from Bank X. Hence, Bank X should focus on the potential churners for their campaign to minimize the expenses of retaining existing customers by doing an effective campaign with high successful rate.

  11. Development of a space-systems network testbed

    NASA Technical Reports Server (NTRS)

    Lala, Jaynarayan; Alger, Linda; Adams, Stuart; Burkhardt, Laura; Nagle, Gail; Murray, Nicholas

    1988-01-01

    This paper describes a communications network testbed which has been designed to allow the development of architectures and algorithms that meet the functional requirements of future NASA communication systems. The central hardware components of the Network Testbed are programmable circuit switching communication nodes which can be adapted by software or firmware changes to customize the testbed to particular architectures and algorithms. Fault detection, isolation, and reconfiguration has been implemented in the Network with a hybrid approach which utilizes features of both centralized and distributed techniques to provide efficient handling of faults within the Network.

  12. Electronic neural networks for global optimization

    NASA Technical Reports Server (NTRS)

    Thakoor, A. P.; Moopenn, A. W.; Eberhardt, S.

    1990-01-01

    An electronic neural network with feedback architecture, implemented in analog custom VLSI is described. Its application to problems of global optimization for dynamic assignment is discussed. The convergence properties of the neural network hardware are compared with computer simulation results. The neural network's ability to provide optimal or near optimal solutions within only a few neuron time constants, a speed enhancement of several orders of magnitude over conventional search methods, is demonstrated. The effect of noise on the circuit dynamics and the convergence behavior of the neural network hardware is also examined.

  13. Systems configured to distribute a telephone call, communication systems, communication methods and methods of routing a telephone call to a service representative

    DOEpatents

    Harris, Scott H.; Johnson, Joel A.; Neiswanger, Jeffery R.; Twitchell, Kevin E.

    2004-03-09

    The present invention includes systems configured to distribute a telephone call, communication systems, communication methods and methods of routing a telephone call to a customer service representative. In one embodiment of the invention, a system configured to distribute a telephone call within a network includes a distributor adapted to connect with a telephone system, the distributor being configured to connect a telephone call using the telephone system and output the telephone call and associated data of the telephone call; and a plurality of customer service representative terminals connected with the distributor and a selected customer service representative terminal being configured to receive the telephone call and the associated data, the distributor and the selected customer service representative terminal being configured to synchronize, application of the telephone call and associated data from the distributor to the selected customer service representative terminal.

  14. Continued development of a non-proprietary, high-tension, cable end terminal system.

    DOT National Transportation Integrated Search

    2016-04-29

    A non-proprietary, cable guardrail system is currently under development for the Midwest States Pooled Fund Program. : A cable guardrail end terminal was necessary to accompany the cable guardrail system. The objective of this research : project was ...

  15. Proprietary Schools and Student Financial Aid.

    ERIC Educational Resources Information Center

    Wilms, Wellford W.

    1983-01-01

    Literature concerning U.S. proprietary vocational schools and student financial aid is reviewed, focusing on public and interprofessional attitudes, industry reforms, the schools as businesses, enrollments, student characteristics, program characteristics and costs, completions, job placement, earnings, federal student aid, aid recipients, and…

  16. 7 CFR 983.27 - Proprietary capacity.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Proprietary capacity. 983.27 Section 983.27 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements and Orders; Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE PISTACHIOS GROWN IN CALIFORNIA...

  17. 15 CFR 1160.6 - Proprietary data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 3 2011-01-01 2011-01-01 false Proprietary data. 1160.6 Section 1160.6 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) TECHNOLOGY ADMINISTRATION, DEPARTMENT OF COMMERCE PRODUCTIVITY, TECHNOLOGY AND INNOVATION Promotion of...

  18. 15 CFR 1160.6 - Proprietary data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Proprietary data. 1160.6 Section 1160.6 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) TECHNOLOGY ADMINISTRATION, DEPARTMENT OF COMMERCE PRODUCTIVITY, TECHNOLOGY AND INNOVATION Promotion of...

  19. 15 CFR 1160.26 - Proprietary data.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 3 2011-01-01 2011-01-01 false Proprietary data. 1160.26 Section 1160.26 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) TECHNOLOGY ADMINISTRATION, DEPARTMENT OF COMMERCE PRODUCTIVITY, TECHNOLOGY AND INNOVATION Strategic...

  20. 15 CFR 1160.26 - Proprietary data.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 3 2013-01-01 2013-01-01 false Proprietary data. 1160.26 Section 1160.26 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) TECHNOLOGY ADMINISTRATION, DEPARTMENT OF COMMERCE PRODUCTIVITY, TECHNOLOGY AND INNOVATION Strategic...

  1. 15 CFR 1160.6 - Proprietary data.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 3 2012-01-01 2012-01-01 false Proprietary data. 1160.6 Section 1160.6 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) TECHNOLOGY ADMINISTRATION, DEPARTMENT OF COMMERCE PRODUCTIVITY, TECHNOLOGY AND INNOVATION Promotion of...

  2. 15 CFR 1160.26 - Proprietary data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Proprietary data. 1160.26 Section 1160.26 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) TECHNOLOGY ADMINISTRATION, DEPARTMENT OF COMMERCE PRODUCTIVITY, TECHNOLOGY AND INNOVATION Strategic...

  3. 15 CFR 1160.26 - Proprietary data.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 3 2012-01-01 2012-01-01 false Proprietary data. 1160.26 Section 1160.26 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) TECHNOLOGY ADMINISTRATION, DEPARTMENT OF COMMERCE PRODUCTIVITY, TECHNOLOGY AND INNOVATION Strategic...

  4. 14 CFR 1203.405 - Proprietary information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Proprietary information. 1203.405 Section 1203.405 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY... sent, under proper safeguards, to the Director, Information Security Oversight Office, General Services...

  5. A fatal case of potential chronic overdoses of prescribed and proprietary remedies.

    PubMed

    Takase, Izumi; Yamamoto, Yoshio; Nakagawa, Tokiko; Nishi, Katsuji

    2010-08-01

    A 33-year-old man was found in a state of cardiopulmonary arrest. He was transported to an emergency hospital but was pronounced dead. He had suffered from depression for about 8 years and had attempted suicide repeatedly. A search by the police found 645 empty Press Through Package (PTP) sheets. They had included neuroleptics, antidepressants, hypnotics, proprietary antitussives containing caffeine, proprietary cold remedies containing caffeine, and other unidentified drugs. An autopsy showed higher rectal temperature (38 degrees C), severe pulmonary edema (left: 681 g, right: 821 g), and a large amount of urine in the bladder (about 760 mL). Toxicological analyses using gas chromatography-mass spectrometry (GC/MS) and high performance liquid chromatography (HPLC) demonstrated that doses of clomipramine hydrochloride (a tricyclic antidepressant), chlorpromazine (a phenothiazine), and caffeine (a methylxanthine derivative) were within the toxic range (0.68, 0.64, and 34.24 [microg/mL], respectively). Histological examination showed centrilobular necrosis of the liver with small fat droplets. We concluded that he had died of pulmonary edema due to combined drug intoxication including proprietary antitussives and cold remedies. Furthermore, there was a strong possibility that he had habitually taken overdoses of those drugs. Herein, the risk of misuse of prescribed and proprietary drugs, especially for people with psychological problems, should be reemphasized.

  6. A multi-period distribution network design model under demand uncertainty

    NASA Astrophysics Data System (ADS)

    Tabrizi, Babak H.; Razmi, Jafar

    2013-05-01

    Supply chain management is taken into account as an inseparable component in satisfying customers' requirements. This paper deals with the distribution network design (DND) problem which is a critical issue in achieving supply chain accomplishments. A capable DND can guarantee the success of the entire network performance. However, there are many factors that can cause fluctuations in input data determining market treatment, with respect to short-term planning, on the one hand. On the other hand, network performance may be threatened by the changes that take place within practicing periods, with respect to long-term planning. Thus, in order to bring both kinds of changes under control, we considered a new multi-period, multi-commodity, multi-source DND problem in circumstances where the network encounters uncertain demands. The fuzzy logic is applied here as an efficient tool for controlling the potential customers' demand risk. The defuzzifying framework leads the practitioners and decision-makers to interact with the solution procedure continuously. The fuzzy model is then validated by a sensitivity analysis test, and a typical problem is solved in order to illustrate the implementation steps. Finally, the formulation is tested by some different-sized problems to show its total performance.

  7. Mastering the broadband challenge: next-generation SONET in a packet world

    NASA Astrophysics Data System (ADS)

    Farhi, Eyal

    2001-10-01

    The continuing liberalization of the world's telecommunications markets and the progressive convergence of voice, data, video and Internet communication are prompting telecommunication service providers to both expand and enhance their service capabilities. As bandwidth-hungry applications proliferate, and the demand for data and data services grows, the requirement for broadband communications appears to be insatiable. To provide the expected level of service in this environment of rapidly increasing demand, telcos and service providers must invest in an expanded network. However, to remain competitive and profitable, they must also continue to leverage their existing infrastructure investment. This paper will examine the current challenges network operators are facing today with the deployment of broadband technologies as they strive to maintain existing infrastructure investments while providing new services to their customers and developing added value network operations. This paper will explore various broadband technologies (optical/wireless) that operate on the primary SDH/SONET standards, their topologies and inherent benefits, which provide operators with solutions to the broadband challenge. New customer demands, such as high-speed Data transmissions (increased Internet use), coupled with operators' continuous need for network optimization, have thrown a wrench into daily operations. Therefore, the need to modernize existing networks has become paramount.

  8. Network structure of production

    PubMed Central

    Atalay, Enghin; Hortaçsu, Ali; Roberts, James; Syverson, Chad

    2011-01-01

    Complex social networks have received increasing attention from researchers. Recent work has focused on mechanisms that produce scale-free networks. We theoretically and empirically characterize the buyer–supplier network of the US economy and find that purely scale-free models have trouble matching key attributes of the network. We construct an alternative model that incorporates realistic features of firms’ buyer–supplier relationships and estimate the model’s parameters using microdata on firms’ self-reported customers. This alternative framework is better able to match the attributes of the actual economic network and aids in further understanding several important economic phenomena. PMID:21402924

  9. Neural-Network Simulator

    NASA Technical Reports Server (NTRS)

    Mitchell, Paul H.

    1991-01-01

    F77NNS (FORTRAN 77 Neural Network Simulator) computer program simulates popular back-error-propagation neural network. Designed to take advantage of vectorization when used on computers having this capability, also used on any computer equipped with ANSI-77 FORTRAN Compiler. Problems involving matching of patterns or mathematical modeling of systems fit class of problems F77NNS designed to solve. Program has restart capability so neural network solved in stages suitable to user's resources and desires. Enables user to customize patterns of connections between layers of network. Size of neural network F77NNS applied to limited only by amount of random-access memory available to user.

  10. Methods for analysis of passenger trip performance in a complex networked transportation system

    NASA Astrophysics Data System (ADS)

    Wang, Danyi

    2007-12-01

    The purpose of the Air Transportation System (ATS) is to provide safe and efficient transportation service of passengers and cargo. The on-time performance of a passenger's trip is a critical performance measurement of the Quality of Service (QOS) provided by any Air Transportation System. QOS has been correlated with airline profitability, productivity, customer loyalty and customer satisfaction (Heskett et al. 1994). Btatu and Barnhart have shown that official government and airline on-time performance metrics (i.e. flight-centric measures of air transportation) fail to accurately reflect the passenger experience (Btatu and Barnhart, 2005). Flight-based metrics do not include the trip delays accrued by passengers who were re-booked due to cancelled flights or missed connections. Also, flight-based metrics do not quantify the magnitude of the delay (only the likelihood) and thus fails to provide the consumer with a useful assessment of the impact of a delay. Passenger-centric metrics have not been developed because of the unavailability of airline proprietary data, which is also protected by anti-trust collusion concerns and civil liberty privacy restrictions. Moveover, the growth of the ATS is trending out of the historical range. The objectives of this research were to (1) estimate ATS-wide passenger trip delay using publicly accessible flight data, and (2) investigate passenger trip dynamics out of the range of historical data by building a passenger flow simulation model to predict impact on passenger trip time given anticipated changes in the future. The first objective enables researchers to conduct historical analysis on passenger on-time performance without proprietary itinerary data, and the second objective enables researchers to conduct experiments outside the range of historic data. The estimated passenger trip delay was for 1,030 routes between the 35 busiest airports in the United States in 2006. The major findings of this research are listed as follows: 1. High passenger trip delays are disproportionately generated by cancelled flights and missed connections. Passengers scheduled on cancelled flights or missed connections represent 3 percent of total enplanements, but generated 45 percent of total passenger trip delay. On average, passengers scheduled on cancelled flights experienced 607 minutes delay, and passengers who missed the connections experienced 341 minutes delay in 2006. The heavily skewed distribution of passenger trip delay reveals the fact that a small proportion of passengers experience heavy delays, which can not be reflected by flight-based performance metrics. 2. Trend analysis for passenger trip delays from 2000 to 2006 shows the increase in flight operations slowed down and leveled off in 2006, while enplanements kept increasing. This is due to the continuous increase in load factor. Load factor has increased from 69% in 2003 to 80% in 2006. Passenger performance is very sensitive to changes in flight operations: annual total passenger trip delay was increased by 17% and 7% from 2004 to 2005, and from 2005 to 2006, while flight operations barely increased (0.5% from 2004 to 2005, and no increase from 2005 to 2006) during the same time period. 3. Passenger trip delay is shown to have an asymmetric performance of passenger trip delay in terms of routes. Seventeen percent of the 1030 routes generated 50 percent of total passenger trip delays. An interesting observation is that routes between the New York metropolitan area and the Washington D.C. metropolitan area have the highest average passenger trip delays in the system. 4. In terms of airports, there is also an asymmetric performance of passenger trip delay. Nine of the 35 busiest airports generated 50 percent of total passenger trip delays. Some airports, especially major hubs, impact the passenger trip delays significantly more than others. Recognition of this asymmetric performance can help reduce the total passenger trip delay propagation in the air transportation network by making changes primarily in major airports, such as Atlanta, GA (ATL), Chicago O'Hare (ORD) and Newark (EWR) airports. 5. Congestion Flight Delay, Load Factor, Flight Cancellation Time, and Airline Cooperation Policy are the most significant factors affecting total passenger trip delay in the system.

  11. Network Science Research Laboratory (NSRL) Telemetry Warehouse

    DTIC Science & Technology

    2016-06-01

    Functionality and architecture of the NSRL Telemetry Warehouse are also described as well as the web interface, data structure, security aspects, and...Experiment Controller 6 4.5 Telemetry Sensors 7 4.6 Custom Data Processing Nodes 7 5. Web Interface 8 6. Data Structure 8 6.1 Measurements 8...telemetry in comma-separated value (CSV) format from the web interface or via custom applications developed by researchers using the client application

  12. Mining Rare Events Data for Assessing Customer Attrition Risk

    NASA Astrophysics Data System (ADS)

    Au, Tom; Chin, Meei-Ling Ivy; Ma, Guangqin

    Customer attrition refers to the phenomenon whereby a customer leaves a service provider. As competition intensifies, preventing customers from leaving is a major challenge to many businesses such as telecom service providers. Research has shown that retaining existing customers is more profitable than acquiring new customers due primarily to savings on acquisition costs, the higher volume of service consumption, and customer referrals. For a large enterprise, its customer base consists of tens of millions service subscribers, more often the events, such as switching to competitors or canceling services are large in absolute number, but rare in percentage, far less than 5%. Based on a simple random sample, popular statistical procedures, such as logistic regression, tree-based method and neural network, can sharply underestimate the probability of rare events, and often result a null model (no significant predictors). To improve efficiency and accuracy for event probability estimation, a case-based data collection technique is then considered. A case-based sample is formed by taking all available events and a small, but representative fraction of nonevents from a dataset of interest. In this article we showed a consistent prior correction method for events probability estimation and demonstrated the performance of the above data collection techniques in predicting customer attrition with actual telecommunications data.

  13. Better communication makes customer service shine

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Singer, S.

    1995-01-01

    After the terrible winter last year, Robison Oil decided to expand existing telephone equipment to provide the best possible service to our 26,000 customers. We are headquartered in Elmsford, NY, and have branches in Tarrytown and Brewster. Another company, Original Consumer Oil, is headquartered in the Bronx and serves commercial customers in the metropolitan area. Our new expanded communications system gives us shorter customer response time and the ability to resolve customer issues without transferring the customer around like a ping-pong ball. By combining our telephone and computer systems, we have been able to improve customer delivery and service throughmore » faster dispatching. And by using a network of T1 telephone lines between locations with different area codes, we save money on long distance phone charges. We have 12 customer service reps who are a key part of our operation. They enter all service and oil orders as well as handle all billing and credit problems. We wanted a communication system that would help us reduce the response time for customers, as well as let us know how many calls are waiting to be answered. To make their job easier and more productive, especially during the winter months, we upgraded our AT&T System 75 to a Definity G3 System.« less

  14. Access control and privacy in large distributed systems

    NASA Technical Reports Server (NTRS)

    Leiner, B. M.; Bishop, M.

    1986-01-01

    Large scale distributed systems consists of workstations, mainframe computers, supercomputers and other types of servers, all connected by a computer network. These systems are being used in a variety of applications including the support of collaborative scientific research. In such an environment, issues of access control and privacy arise. Access control is required for several reasons, including the protection of sensitive resources and cost control. Privacy is also required for similar reasons, including the protection of a researcher's proprietary results. A possible architecture for integrating available computer and communications security technologies into a system that meet these requirements is described. This architecture is meant as a starting point for discussion, rather that the final answer.

  15. Asymmetric GT of social networks

    NASA Astrophysics Data System (ADS)

    Szu, Harold

    2010-04-01

    Web citation indexes are computed according to a data vector X collected from the frequency of user accesses, citations weighted by other sites' popularities, and modified by the financial sponsorship in a proprietary manner. The indexing determining the information to be retrieved by the public should be made responsible transparently in at least two ways. One shall balance the inbound linkages pointed at the specific i-th site called the popularity (see paper for equation) with the outbound linkages (see paper for equation) called the risk factor before the release of new information as environmental impact analysis. The relationship between these two factors cannot be assumed equivalent (undirected) as in the case of many mainstream Graph Theory (GT) models.

  16. Cable-to-post attachments for a non-proprietary high-tension cable barrier - phase II.

    DOT National Transportation Integrated Search

    2015-06-01

    The research objectives reported herein were based on further development of cable-to-post attachment hardware for use in : the non-proprietary high-tension cable barrier system. Specifically, this project aimed to develop and evaluate alternative : ...

  17. 12. Photocopy of photograph (from Catalogue of Drugs, Chemicals, Proprietary ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    12. Photocopy of photograph (from Catalogue of Drugs, Chemicals, Proprietary Medicines, Pharmaceutical Preparations, Druggists' Sundries, Etc. Portland, ME: Cook, Everett, and Pennell, 1896.) ca. 1896, photographer unknown 'MAIN OFFICE AND COUNTING ROOM' - Woodman Building, 140 Middle Street, Portland, Cumberland County, ME

  18. 48 CFR 209.505-4 - Obtaining access to proprietary information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) Non-disclosure requirements for contractors accessing third party proprietary technical data or... may be required to enter into non-disclosure agreements directly with the third party asserting restrictions on limited rights technical data, commercial technical data, or restricted rights computer...

  19. 75 FR 73167 - Proposed Information Collection (Compliance Report of Proprietary Institutions) Activity: Comment...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-29

    ... (Compliance Report of Proprietary Institutions) Activity: Comment Request AGENCY: Veterans Benefits Administration, Department of Veterans Affairs. ACTION: Notice. SUMMARY: The Veterans Benefits Administration... Department of Education are in compliance with equal opportunity laws. DATES: Written comments and...

  20. Guidelines and Standards for Proprietary Schools.

    ERIC Educational Resources Information Center

    Georgia State Board of Education, Atlanta.

    This guide contains information pertaining to Georgia law, rules, regulations, and standards of practice for regulating proprietary schools in Georgia. Section 1 of the guide presents operation guidelines, including definitions, exemptions, general provisions, certificates of approval of schools, and appeals procedures. Section 2 presents minimum…

  1. 48 CFR 1352.209-71 - Limitation of future contracting.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... towards solution of broadly defined problems. This may encompass research, evaluating technical feasibility, proof of design and test, or engineering of programs not yet approved for acquisition or operation. (iii) “Proprietary Information” means all information designated as proprietary in accordance...

  2. 48 CFR 1352.209-71 - Limitation of future contracting.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... towards solution of broadly defined problems. This may encompass research, evaluating technical feasibility, proof of design and test, or engineering of programs not yet approved for acquisition or operation. (iii) “Proprietary Information” means all information designated as proprietary in accordance...

  3. Delivery of video-on-demand services using local storages within passive optical networks.

    PubMed

    Abeywickrama, Sandu; Wong, Elaine

    2013-01-28

    At present, distributed storage systems have been widely studied to alleviate Internet traffic build-up caused by high-bandwidth, on-demand applications. Distributed storage arrays located locally within the passive optical network were previously proposed to deliver Video-on-Demand services. As an added feature, a popularity-aware caching algorithm was also proposed to dynamically maintain the most popular videos in the storage arrays of such local storages. In this paper, we present a new dynamic bandwidth allocation algorithm to improve Video-on-Demand services over passive optical networks using local storages. The algorithm exploits the use of standard control packets to reduce the time taken for the initial request communication between the customer and the central office, and to maintain the set of popular movies in the local storage. We conduct packet level simulations to perform a comparative analysis of the Quality-of-Service attributes between two passive optical networks, namely the conventional passive optical network and one that is equipped with a local storage. Results from our analysis highlight that strategic placement of a local storage inside the network enables the services to be delivered with improved Quality-of-Service to the customer. We further formulate power consumption models of both architectures to examine the trade-off between enhanced Quality-of-Service performance versus the increased power requirement from implementing a local storage within the network.

  4. Design of sensor node platform for wireless biomedical sensor networks.

    PubMed

    Xijun, Chen; -H Meng, Max; Hongliang, Ren

    2005-01-01

    Design of low-cost, miniature, lightweight, ultra low-power, flexible sensor platform capable of customization and seamless integration into a wireless biomedical sensor network(WBSN) for health monitoring applications presents one of the most challenging tasks. In this paper, we propose a WBSN node platform featuring an ultra low-power microcontroller, an IEEE 802.15.4 compatible transceiver, and a flexible expansion connector. The proposed solution promises a cost-effective, flexible platform that allows easy customization, energy-efficient computation and communication. The development of a common platform for multiple physical sensors will increase reuse and alleviate costs of transition to a new generation of sensors. As a case study, we present an implementation of an ECG (Electrocardiogram) sensor.

  5. The Internet and managed care: a new wave of innovation.

    PubMed

    Goldsmith, J

    2000-01-01

    Managed care firms have been under siege in the political system and the marketplace for the past few years. The rise of the Internet has brought into being powerful new electronic tools for automating administrative and financial processes in health insurance. These tools may enable new firms or employers to create custom-designed networks connecting their workers and providers, bypassing health plans altogether. Alternatively, health plans may use these tools to create a new consumer-focused business model. While some disintermediation of managed care plans may occur, the barriers to adoption of Internet tools by established plans are quite low. Network computing may provide important leverage for health plans not only to retain their franchises but also to improve their profitability and customer service.

  6. Building a gateway with open source software for secure-DICOM communication over insecure networks

    NASA Astrophysics Data System (ADS)

    Emmel, Dirk; Ricke, Jens; Stohlmann, Lutz; Haderer, Alexander; Felix, Roland

    2002-05-01

    For Teleradiology the exchange of DICOM-images is needed for several purposes. Existing solutions often don't consider about the needs for data security and data privacy. Communication is done without any encryption over insecure networks or with encryption using proprietary solutions, which reduces the data communication possibilities to partners with the same equipment. Our goal was to build a gateway, which offers a transparent solution for secure DICOM-communication in a heterogeneous environment We developed a PC-based gateway system with DICOM-communication to the in-house network and secure DICOM communication for the communication over the insecure network. One gateway installed at each location is responsible for encryption/decryption. The sender just transfers the image data over the DICOM protocol to the local gateway. The gateway forwards the data to the gateway on the destination site using the secure DICOM protocol, which is part of the DICOM standard. The receiving gateway forwards the image data to the final destination again using the DICOM-Protocol. The gateway is based on Open Source software and runs under several operating systems. Our experience shows a reliable solution, which solves security issues for DICOM communication of image data and integrates seamless into a heterogeneous DICOM environment.

  7. Statistical Prediction in Proprietary Rehabilitation.

    ERIC Educational Resources Information Center

    Johnson, Kurt L.; And Others

    1987-01-01

    Applied statistical methods to predict case expenditures for low back pain rehabilitation cases in proprietary rehabilitation. Extracted predictor variables from case records of 175 workers compensation claimants with some degree of permanent disability due to back injury. Performed several multiple regression analyses resulting in a formula that…

  8. 48 CFR 6.305 - Availability of the justification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.305 Availability of the... contractor proprietary data and remove all such data, and such references and citations as are necessary to protect the proprietary data, before making the justifications available for public inspection...

  9. 48 CFR 6.305 - Availability of the justification.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.305 Availability of the... contractor proprietary data and remove all such data, and such references and citations as are necessary to protect the proprietary data, before making the justifications available for public inspection...

  10. 11. Photocopy of photograph (from Catalogue of Drugs, Chemicals, Proprietary ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    11. Photocopy of photograph (from Catalogue of Drugs, Chemicals, Proprietary Medicines, Pharmaceutical Preparations, Druggists' Sundries, Etc. Portland, ME: Cook, Everett, and Pennell, 1896.) ca. 1896, photographer unknown 'SECTION OF MAIN FLOOR AND ORDER DEPARTMENT' - Woodman Building, 140 Middle Street, Portland, Cumberland County, ME

  11. 48 CFR 6.305 - Availability of the justification.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.305 Availability of the... contractor proprietary data and remove all such data, and such references and citations as are necessary to protect the proprietary data, before making the justifications available for public inspection...

  12. 48 CFR 6.305 - Availability of the justification.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.305 Availability of the... contractor proprietary data and remove all such data, and such references and citations as are necessary to protect the proprietary data, before making the justifications available for public inspection...

  13. 48 CFR 6.305 - Availability of the justification.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... ACQUISITION PLANNING COMPETITION REQUIREMENTS Other Than Full and Open Competition 6.305 Availability of the... contractor proprietary data and remove all such data, and such references and citations as are necessary to protect the proprietary data, before making the justifications available for public inspection...

  14. 24 CFR 81.71 - General.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...) Provides for the establishment of a public-use database to make available to the public mortgage data that...) Establishes mechanisms for the GSEs to designate mortgage data or AHAR information as proprietary information and for the Secretary to determine whether such mortgage data or AHAR information is proprietary...

  15. Proprietary and voluntary home care agency evolution: the emergence of a new entity.

    PubMed

    Balinsky, W; Shames, J N

    1985-01-01

    The objective of this paper is to document that the delivery of home care services and the corresponding ways in which they are marketed are evolving in both proprietary and voluntary providers. This evolution is producing the emergency of a new entity. In order to examine the present state, it is necessary to review the general history of the development of both voluntary (not-for-profit) and proprietary home health services. Then, an analysis of present conditions will show that these two forms of ownership are changing in ways that are making them more alike than different. This situation is leading to more intense competition for an expanding and diverse mix of home services. Program content and corresponding marketing techniques have crossed the industry's traditional lines blending into a wide array of services being offered by both voluntary and proprietary organizations. Despite their many shared goals and objectives, home care agencies still differ in their underlying philosophy which is based at least in part on their past.

  16. Ethernet access network based on free-space optic deployment technology

    NASA Astrophysics Data System (ADS)

    Gebhart, Michael; Leitgeb, Erich; Birnbacher, Ulla; Schrotter, Peter

    2004-06-01

    The satisfaction of all communication needs from single households and business companies over a single access infrastructure is probably the most challenging topic in communications technology today. But even though the so-called "Last Mile Access Bottleneck" is well known since more than ten years and many distribution technologies have been tried out, the optimal solution has not yet been found and paying commercial access networks offering all service classes are still rare today. Conventional services like telephone, radio and TV, as well as new and emerging services like email, web browsing, online-gaming, video conferences, business data transfer or external data storage can all be transmitted over the well known and cost effective Ethernet networking protocol standard. Key requirements for the deployment technology driven by the different services are high data rates to the single customer, security, moderate deployment costs and good scalability to number and density of users, quick and flexible deployment without legal impediments and high availability, referring to the properties of optical and wireless communication. We demonstrate all elements of an Ethernet Access Network based on Free Space Optic distribution technology. Main physical parts are Central Office, Distribution Network and Customer Equipment. Transmission of different services, as well as configuration, service upgrades and remote control of the network are handled by networking features over one FSO connection. All parts of the network are proven, the latest commercially available technology. The set up is flexible and can be adapted to any more specific need if required.

  17. [The reform of primary health care: the economic, care and satisfaction results].

    PubMed

    Durán, J; Jodar, G; Pociello, V; Parellada, N; Martín, A; Pradas, J

    1999-05-15

    To compare the overall effect on the general public before and after the primary care reform, its economic outcome and professional satisfaction, following the model of the European Foundation for Quality Management. A descriptive analysis of results at reformed primary care centres compared with results at non-reformed centres in the same city. The study was conducted at Sant Boi de Llobregat, a town of 77,591 inhabitants in Baix Llobregat county (Barcelona). 32.7% of the population was covered by two reformed centres. The rest was covered by one single non-reformed primary care centre. Clinical audits and data on pharmaceutical prescription quality were used to find attendance. For economic results, the formula of attribution of cost/inhabitant and cost/inhabitant seen, including the costs of labour, structure, referral, further tests and pharmacy, were used. The satisfaction of the outside customer (user) was measured by a population survey. Internal customer satisfaction was measured by a survey of the professionals. Results were compared with those for 1997. The study showed that the reformed primary care sector's results, measured in terms of professional satisfaction, user-outside customer, attendance, economic results and social impact, were better than the non-reformed sector's. Inside and outside customers' satisfaction was higher in the reformed network. The cost per inhabitant in the reformed network was 31,874 pesetas, against 25,177 in the non-reformed network. The cost per inhabitant seen was 34,482 and 44,603, respectively. The reform creates efficient resource management and greater satisfaction of the general public and professionals, when an indicator sensitive to the real use of services is used.

  18. Distributed Energy Systems Integration and Demand Optimization for Autonomous Operations and Electric Grid Transactions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ghatikar, Girish; Mashayekh, Salman; Stadler, Michael

    Distributed power systems in the U.S. and globally are evolving to provide reliable and clean energy to consumers. In California, existing regulations require significant increases in renewable generation, as well as identification of customer-side distributed energy resources (DER) controls, communication technologies, and standards for interconnection with the electric grid systems. As DER deployment expands, customer-side DER control and optimization will be critical for system flexibility and demand response (DR) participation, which improves the economic viability of DER systems. Current DER systems integration and communication challenges include leveraging the existing DER and DR technology and systems infrastructure, and enabling optimized cost,more » energy and carbon choices for customers to deploy interoperable grid transactions and renewable energy systems at scale. Our paper presents a cost-effective solution to these challenges by exploring communication technologies and information models for DER system integration and interoperability. This system uses open standards and optimization models for resource planning based on dynamic-pricing notifications and autonomous operations within various domains of the smart grid energy system. It identifies architectures and customer engagement strategies in dynamic DR pricing transactions to generate feedback information models for load flexibility, load profiles, and participation schedules. The models are tested at a real site in California—Fort Hunter Liggett (FHL). Furthermore, our results for FHL show that the model fits within the existing and new DR business models and networked systems for transactive energy concepts. Integrated energy systems, communication networks, and modeling tools that coordinate supply-side networks and DER will enable electric grid system operators to use DER for grid transactions in an integrated system.« less

  19. Procuring load curtailment from local customers under uncertainty.

    PubMed

    Mijatović, Aleksandar; Moriarty, John; Vogrinc, Jure

    2017-08-13

    Demand side response (DSR) provides a flexible approach to managing constrained power network assets. This is valuable if future asset utilization is uncertain. However there may be uncertainty over the process of procurement of DSR from customers. In this context we combine probabilistic modelling, simulation and optimization to identify economically optimal procurement policies from heterogeneous customers local to the asset, under chance constraints on the adequacy of the procured DSR. Mathematically this gives rise to a search over permutations, and we provide an illustrative example implementation and case study.This article is part of the themed issue 'Energy management: flexibility, risk and optimization'. © 2017 The Author(s).

  20. An On-line Technology Information System (OTIS) for Advanced Life Support

    NASA Technical Reports Server (NTRS)

    Levri, Julie A.; Boulanger, Richard; Hogan, John A.; Rodriquez, Luis

    2003-01-01

    OTIS is an on-line communication platform designed for smooth flow of technology information between advanced life support (ALS) technology developers, researchers, system analysts, and managers. With pathways for efficient transfer of information, several improvements in the ALS Program will result. With OTIS, it will be possible to provide programmatic information for technology developers and researchers, technical information for analysts, and managerial decision support. OTIS is a platform that enables the effective research, development, and delivery of complex systems for life support. An electronic data collection form has been developed for the solid waste element, drafted by the Solid Waste Working Group. Forms for other elements (air revitalization, water recovery, food processing, biomass production and thermal control) will also be developed, based on lessons learned from the development of the solid waste form. All forms will be developed by consultation with other working groups, comprised of experts in the area of interest. Forms will be converted to an on-line data collection interface that technology developers will use to transfer information into OTIS. Funded technology developers will log in to OTIS annually to complete the element- specific forms for their technology. The type and amount of information requested expands as the technology readiness level (TRL) increases. The completed forms will feed into a regularly updated and maintained database that will store technology information and allow for database searching. To ensure confidentiality of proprietary information, security permissions will be customized for each user. Principal investigators of a project will be able to designate certain data as proprietary and only technical monitors of a task, ALS Management, and the principal investigator will have the ability to view this information. The typical OTIS user will be able to read all non-proprietary information about all projects.Interaction with the database will occur over encrypted connections, and data will be stored on the server in an encrypted form. Implementation of OTIS will initiate a community-accessible repository of technology development information. With OTIS, ALS element leads and managers will be able to carry out informed technology selection for programmatic decisions. OTIS will also allow analysts to make accurate evaluations of technology options. Additionally, the range and specificity of information solicited will help educate technology developers of program needs. With augmentation, OTIS reporting is capable of replacing the current fiscal year-end reporting process. Overall, the system will enable more informed R&TD decisions and more rapid attainment of ALS Program goals.

Top