Provably secure identity-based identification and signature schemes from code assumptions
Zhao, Yiming
2017-01-01
Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure. PMID:28809940
Provably secure identity-based identification and signature schemes from code assumptions.
Song, Bo; Zhao, Yiming
2017-01-01
Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes have been proposed. However, with increasingly profound researches on coding theory, the security reduction and efficiency of such schemes have been invalidated and challenged. In this paper, we construct provably secure IBI/IBS schemes from code assumptions against impersonation under active and concurrent attacks through a provably secure code-based signature technique proposed by Preetha, Vasant and Rangan (PVR signature), and a security enhancement Or-proof technique. We also present the parallel-PVR technique to decrease parameter values while maintaining the standard security level. Compared to other code-based IBI/IBS schemes, our schemes achieve not only preferable public parameter size, private key size, communication cost and signature length due to better parameter choices, but also provably secure.
Fundamental problems in provable security and cryptography.
Dent, Alexander W
2006-12-15
This paper examines methods for formally proving the security of cryptographic schemes. We show that, despite many years of active research and dozens of significant results, there are fundamental problems which have yet to be solved. We also present a new approach to one of the more controversial aspects of provable security, the random oracle model.
Provably secure Rabin-p cryptosystem in hybrid setting
NASA Astrophysics Data System (ADS)
Asbullah, Muhammad Asyraf; Ariffin, Muhammad Rezal Kamel
2016-06-01
In this work, we design an efficient and provably secure hybrid cryptosystem depicted by a combination of the Rabin-p cryptosystem with an appropriate symmetric encryption scheme. We set up a hybrid structure which is proven secure in the sense of indistinguishable against the chosen-ciphertext attack. We presume that the integer factorization problem is hard and the hash function that modeled as a random function.
A provably-secure ECC-based authentication scheme for wireless sensor networks.
Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho
2014-11-06
A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes.
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho
2014-01-01
A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009
31 CFR 321.12 - Redemption value of securities.
Code of Federal Regulations, 2014 CFR
2014-07-01
... value of each savings security is determined by the terms of its offering and the length of time it has been outstanding. The Bureau of the Fiscal Service determines redemption values for Series A-E bonds, eligible Series EE and I bonds, and savings notes, that should be used in redeeming savings securities. [63...
Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach
NASA Astrophysics Data System (ADS)
Naik, R. Lalu; Reddy, P. Chenna
2015-12-01
The primary goals of security such as authentication, confidentiality, integrity and non-repudiation in communication networks can be achieved with secure key distribution. Quantum mechanisms are highly secure means of distributing secret keys as they are unconditionally secure. Quantum key distribution protocols can effectively prevent various attacks in the quantum channel, while classical cryptography is efficient in authentication and verification of secret keys. By combining both quantum cryptography and classical cryptography, security of communications over networks can be leveraged. Hwang, Lee and Li exploited the merits of both cryptographic paradigms for provably secure communications to prevent replay, man-in-the-middle, and passive attacks. In this paper, we propose a new scheme with the combination of quantum cryptography and classical cryptography for 802.11i wireless LANs. Since quantum cryptography is premature in wireless networks, our work is a significant step forward toward securing communications in wireless networks. Our scheme is known as hybrid quantum key distribution protocol. Our analytical results revealed that the proposed scheme is provably secure for wireless networks.
Cost Comparison Among Provable Data Possession Schemes
2016-03-01
possession,” in Proceedings of the 11th International Conference on Ap- plied Cryptography and Network Security. Berlin, Heidelberg: Springer-Verlag, 2013...curves,” in Security and Cryptography (SECRYPT), 2013 International Conference on, July 2013, pp. 1–12. [19] R. S. Kumar and A. Saxena, “Data integrity
1988-10-20
The LOCK project , from its very beginnings as an implementation study for the Provably Secure Operating System in 1979...to the security field, can study to gain insight into the evaluation process. The project has developed an innovative format for the DTLS and FTLS...management tern becomes available, the Al Secure DBMS will be system (DBMS) that is currently being developed un- ported to it . der the Advanced
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
NASA Astrophysics Data System (ADS)
Ristenpart, Thomas; Yilek, Scott
Multiparty signature protocols need protection against rogue-key attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, provable security has only been established under the knowledge of secret key (KOSK) assumption where the adversary is required to reveal the secret keys it utilizes. In practice, certifying authorities rarely require the strong proofs of knowledge of secret keys required to substantiate the KOSK assumption. Instead, proofs of possession (POPs) are required and can be as simple as just a signature over the certificate request message. We propose a general registered key model, within which we can model both the KOSK assumption and in-use POP protocols. We show that simple POP protocols yield provable security of Boldyreva's multisignature scheme [11], the LOSSW multisignature scheme [28], and a 2-user ring signature scheme due to Bender, Katz, and Morselli [10]. Our results are the first to provide formal evidence that POPs can stop rogue-key attacks.
Unconditionally Secure Blind Signatures
NASA Astrophysics Data System (ADS)
Hara, Yuki; Seito, Takenobu; Shikata, Junji; Matsumoto, Tsutomu
The blind signature scheme introduced by Chaum allows a user to obtain a valid signature for a message from a signer such that the message is kept secret for the signer. Blind signature schemes have mainly been studied from a viewpoint of computational security so far. In this paper, we study blind signatures in unconditional setting. Specifically, we newly introduce a model of unconditionally secure blind signature schemes (USBS, for short). Also, we propose security notions and their formalization in our model. Finally, we propose a construction method for USBS that is provably secure in our security notions.
31 CFR 321.12 - Redemption value of securities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... each savings security is determined by the terms of its offering and the length of time it has been outstanding. The Bureau of the Public Debt determines redemption values for Series A-E bonds, eligible Series...
31 CFR 321.12 - Redemption value of securities.
Code of Federal Regulations, 2012 CFR
2012-07-01
... savings security is determined by the terms of its offering and the length of time it has been outstanding. The Bureau of the Public Debt determines redemption values for Series A-E bonds, eligible Series EE...
31 CFR 321.12 - Redemption value of securities.
Code of Federal Regulations, 2013 CFR
2013-07-01
... savings security is determined by the terms of its offering and the length of time it has been outstanding. The Bureau of the Public Debt determines redemption values for Series A-E bonds, eligible Series EE...
A System Architecture to Support a Verifiably Secure Multilevel Security System.
1980-06-01
4] Newmann, P.G., R. Fabry, K. Levitt, L. Robin - provide a tradeoff between cost and system secur- son, J. Wensley , "On the Design of a Provably ity...ICS-80/05 NL 112. 11W1 --1.25 1111 6 Mli,’O~ll Rl OIIION W AII .q3 0 School of Information and Computer Science S =GEORGIA INSTITUTE OF TECHNOLOGY 808...Multilevel Security Systemt (Extended Abstract) George I. Davida Department of Electical Engineering and Computer Science University of Wisconsin
Quantum one-way permutation over the finite field of two elements
NASA Astrophysics Data System (ADS)
de Castro, Alexandre
2017-06-01
In quantum cryptography, a one-way permutation is a bounded unitary operator U:{H} → {H} on a Hilbert space {H} that is easy to compute on every input, but hard to invert given the image of a random input. Levin (Probl Inf Transm 39(1):92-103, 2003) has conjectured that the unitary transformation g(a,x)=(a,f(x)+ax), where f is any length-preserving function and a,x \\in {GF}_{{2}^{\\Vert x\\Vert }}, is an information-theoretically secure operator within a polynomial factor. Here, we show that Levin's one-way permutation is provably secure because its output values are four maximally entangled two-qubit states, and whose probability of factoring them approaches zero faster than the multiplicative inverse of any positive polynomial poly( x) over the Boolean ring of all subsets of x. Our results demonstrate through well-known theorems that existence of classical one-way functions implies existence of a universal quantum one-way permutation that cannot be inverted in subexponential time in the worst case.
2011-01-01
OS level, Flume [22] has even been shown to be information flow secure through abstractions such as processes, pipes, file systems etc, while seL4 ...Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish, T. Sewell, H. Tuch, and S. Winwood. sel4 : formal verification of an
Provably secure and high-rate quantum key distribution with time-bin qudits
Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; ...
2017-11-24
The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. Wemore » use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. In conclusion, the security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.« less
Provably secure and high-rate quantum key distribution with time-bin qudits
Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.
2017-01-01
The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. We use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. The security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system. PMID:29202028
Provably secure and high-rate quantum key distribution with time-bin qudits.
Islam, Nurul T; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J
2017-11-01
The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. We use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. The security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.
Provably secure and high-rate quantum key distribution with time-bin qudits
DOE Office of Scientific and Technical Information (OSTI.GOV)
Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton
The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. Wemore » use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. In conclusion, the security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.« less
Li, Chun-Ta; Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming
2017-06-23
In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.
Provably Secure Password-based Authentication in TLS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier
2005-12-20
In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised tomore » the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.« less
A Secure Authenticated Key Exchange Protocol for Credential Services
NASA Astrophysics Data System (ADS)
Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki
In this paper, we propose a leakage-resilient and proactive authenticated key exchange (called LRP-AKE) protocol for credential services which provides not only a higher level of security against leakage of stored secrets but also secrecy of private key with respect to the involving server. And we show that the LRP-AKE protocol is provably secure in the random oracle model with the reduction to the computational Difie-Hellman problem. In addition, we discuss about some possible applications of the LRP-AKE protocol.
Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming
2017-01-01
In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients’ physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu–Chung’s scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP. PMID:28644381
Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
Nam, Junghyun; Kim, Moonseong
2014-01-01
We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. PMID:25276863
Analyzing the security of an existing computer system
NASA Technical Reports Server (NTRS)
Bishop, M.
1986-01-01
Most work concerning secure computer systems has dealt with the design, verification, and implementation of provably secure computer systems, or has explored ways of making existing computer systems more secure. The problem of locating security holes in existing systems has received considerably less attention; methods generally rely on thought experiments as a critical step in the procedure. The difficulty is that such experiments require that a large amount of information be available in a format that makes correlating the details of various programs straightforward. This paper describes a method of providing such a basis for the thought experiment by writing a special manual for parts of the operating system, system programs, and library subroutines.
1981-01-01
comparison of formal and informal design methodologies will show how we think they are converging. Lastly, I will describe our involvement with the DoD...computer security must begin with the design methodology , with the objective being provability. The idea ofa formal evaluation and on-the-shelf... Methodologies ] Here we can compare the formal design methodologies with those used by informal practitioners like Control Data. Obviously, both processes
Secret sharing based on quantum Fourier transform
NASA Astrophysics Data System (ADS)
Yang, Wei; Huang, Liusheng; Shi, Runhua; He, Libao
2013-07-01
Secret sharing plays a fundamental role in both secure multi-party computation and modern cryptography. We present a new quantum secret sharing scheme based on quantum Fourier transform. This scheme enjoys the property that each share of a secret is disguised with true randomness, rather than classical pseudorandomness. Moreover, under the only assumption that a top priority for all participants (secret sharers and recovers) is to obtain the right result, our scheme is able to achieve provable security against a computationally unbounded attacker.
A Secure and Efficient Handover Authentication Protocol for Wireless Networks
Wang, Weijia; Hu, Lei
2014-01-01
Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471
Searching Information Sources in Networks
2017-06-14
SECURITY CLASSIFICATION OF: During the course of this project, we made significant progresses in multiple directions of the information detection...result on information source detection on non-tree networks; (2) The development of information source localization algorithms to detect multiple... information sources. The algorithms have provable performance guarantees and outperform existing algorithms in 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND
Can the use of the Leggett-Garg inequality enhance security of the BB84 protocol?
NASA Astrophysics Data System (ADS)
Shenoy H., Akshata; Aravinda, S.; Srikanth, R.; Home, Dipankar
2017-08-01
Prima facie, there are good reasons to answer in the negative the question posed in the title: the Bennett-Brassard 1984 (BB84) protocol is provably secure subject to the assumption of trusted devices, while the Leggett-Garg-type inequality (LGI) does not seem to be readily adaptable to the device independent (DI) or semi-DI scenario. Nevertheless, interestingly, here we identify a specific device attack, which has been shown to render the standard BB84 protocol completely insecure, but against which our formulated LGI-assisted BB84 protocol (based on an appropriate form of LGI) is secure.
A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.
Farash, Mohammad Sabzinejad; Nawaz, Omer; Mahmood, Khalid; Chaudhry, Shehzad Ashraf; Khan, Muhammad Khurram
2016-07-01
To enhance the quality of healthcare in the management of chronic disease, telecare medical information systems have increasingly been used. Very recently, Zhang and Qi (J. Med. Syst. 38(5):47, 32), and Zhao (J. Med. Syst. 38(5):46, 33) separately proposed two authentication schemes for telecare medical information systems using radio frequency identification (RFID) technology. They claimed that their protocols achieve all security requirements including forward secrecy. However, this paper demonstrates that both Zhang and Qi's scheme, and Zhao's scheme could not provide forward secrecy. To augment the security, we propose an efficient RFID authentication scheme using elliptic curves for healthcare environments. The proposed RFID scheme is secure under common random oracle model.
Cryptographic Securities Exchanges
NASA Astrophysics Data System (ADS)
Thorpe, Christopher; Parkes, David C.
While transparency in financial markets should enhance liquidity, its exploitation by unethical and parasitic traders discourages others from fully embracing disclosure of their own information. Traders exploit both the private information in upstairs markets used to trade large orders outside traditional exchanges and the public information present in exchanges' quoted limit order books. Using homomorphic cryptographic protocols, market designers can create "partially transparent" markets in which every matched trade is provably correct and only beneficial information is revealed. In a cryptographic securities exchange, market operators can hide information to prevent its exploitation, and still prove facts about the hidden information such as bid/ask spread or market depth.
A Model of Onion Routing With Provable Anonymity
2006-08-30
Lysyanskaya. “A Formal Treatment of Onion Routing.” CRYPTO 2005, pp. 169.187, 2005. [4] David Chaum . “The dining cryptographers problem...1988. [5] David Chaum . “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.” Communi- cations of the ACM, 24(2), pp. 84-88, 1981...network layer.” ACM Conference on Computer and Communications Security, pp. 193-206, 2002. [11] David Goldschlag, Michael Reed, and Paul Syverson
Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chevassut, Olivier; Milner, Joseph; Pointcheval, David
2008-04-21
The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on anmore » analysis of relevant patents in the area.« less
Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels
DOE Office of Scientific and Technical Information (OSTI.GOV)
Deutsch, D.; Ekert, A.; Jozsa, R.
1996-09-01
Existing quantum cryptographic schemes are not, as they stand, operable in the presence of noise on the quantum communication channel. Although they become operable if they are supplemented by classical privacy-amplification techniques, the resulting schemes are difficult to analyze and have not been proved secure. We introduce the concept of quantum privacy amplification and a cryptographic scheme incorporating it which is provably secure over a noisy channel. The scheme uses an {open_quote}{open_quote}entanglement purification{close_quote}{close_quote} procedure which, because it requires only a few quantum controlled-not and single-qubit operations, could be implemented using technology that is currently being developed. {copyright} {ital 1996 Themore » American Physical Society.}« less
Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes
Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C.-W.
2014-01-01
Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions. PMID:25207333
Efficient and provable secure pairing-free security-mediated identity-based identification schemes.
Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C-W
2014-01-01
Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.
Data Confidentiality Challenges in Big Data Applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yin, Jian; Zhao, Dongfang
In this paper, we address the problem of data confidentiality in big data analytics. In many fields, much useful patterns can be extracted by applying machine learning techniques to big data. However, data confidentiality must be protected. In many scenarios, data confidentiality could well be a prerequisite for data to be shared. We present a scheme to provide provable secure data confidentiality and discuss various techniques to optimize performance of such a system.
An efficient and provable secure revocable identity-based encryption scheme.
Wang, Changji; Li, Yuan; Xia, Xiaonan; Zheng, Kangjia
2014-01-01
Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE) has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either insecure or inefficient. In this paper, we propose a new scalable RIBE scheme with decryption key exposure resilience by combining Lewko and Waters' identity-based encryption scheme and complete subtree method, and prove our RIBE scheme to be semantically secure using dual system encryption methodology. Compared to existing scalable and semantically secure RIBE schemes, our proposed RIBE scheme is more efficient in term of ciphertext size, public parameters size and decryption cost at price of a little looser security reduction. To the best of our knowledge, this is the first construction of scalable and semantically secure RIBE scheme with constant size public system parameters.
Identity-Based Verifiably Encrypted Signatures without Random Oracles
NASA Astrophysics Data System (ADS)
Zhang, Lei; Wu, Qianhong; Qin, Bo
Fair exchange protocol plays an important role in electronic commerce in the case of exchanging digital contracts. Verifiably encrypted signatures provide an optimistic solution to these scenarios with an off-line trusted third party. In this paper, we propose an identity-based verifiably encrypted signature scheme. The scheme is non-interactive to generate verifiably encrypted signatures and the resulting encrypted signature consists of only four group elements. Based on the computational Diffie-Hellman assumption, our scheme is proven secure without using random oracles. To the best of our knowledge, this is the first identity-based verifiably encrypted signature scheme provably secure in the standard model.
Combinatorial algorithms for design of DNA arrays.
Hannenhalli, Sridhar; Hubell, Earl; Lipshutz, Robert; Pevzner, Pavel A
2002-01-01
Optimal design of DNA arrays requires the development of algorithms with two-fold goals: reducing the effects caused by unintended illumination (border length minimization problem) and reducing the complexity of masks (mask decomposition problem). We describe algorithms that reduce the number of rectangles in mask decomposition by 20-30% as compared to a standard array design under the assumption that the arrangement of oligonucleotides on the array is fixed. This algorithm produces provably optimal solution for all studied real instances of array design. We also address the difficult problem of finding an arrangement which minimizes the border length and come up with a new idea of threading that significantly reduces the border length as compared to standard designs.
Empirical Analysis of Using Erasure Coding in Outsourcing Data Storage With Provable Security
2016-06-01
the fastest encoding performance among the four tested schemes. We expected to observe that Cauchy Reed-Solomonwould be faster than Reed- Solomon for all...providing recoverability for POR. We survey MDS codes and select Reed- Solomon and Cauchy Reed- Solomon MDS codes to be implemented into a prototype POR...tools providing recoverability for POR. We survey MDS codes and select Reed- Solomon and Cauchy Reed- Solomon MDS codes to be implemented into a
Interpreter composition issues in the formal verification of a processor-memory module
NASA Technical Reports Server (NTRS)
Fura, David A.; Cohen, Gerald C.
1994-01-01
This report describes interpreter composition techniques suitable for the formal specification and verification of a processor-memory module using the HOL theorem proving system. The processor-memory module is a multichip subsystem within a fault-tolerant embedded system under development within the Boeing Defense and Space Group. Modeling and verification methods were developed that permit provably secure composition at the transaction-level of specification, significantly reducing the complexity of the hierarchical verification of the system.
Practical secure quantum communications
NASA Astrophysics Data System (ADS)
Diamanti, Eleni
2015-05-01
We review recent advances in the field of quantum cryptography, focusing in particular on practical implementations of two central protocols for quantum network applications, namely key distribution and coin flipping. The former allows two parties to share secret messages with information-theoretic security, even in the presence of a malicious eavesdropper in the communication channel, which is impossible with classical resources alone. The latter enables two distrustful parties to agree on a random bit, again with information-theoretic security, and with a cheating probability lower than the one that can be reached in a classical scenario. Our implementations rely on continuous-variable technology for quantum key distribution and on a plug and play discrete-variable system for coin flipping, and necessitate a rigorous security analysis adapted to the experimental schemes and their imperfections. In both cases, we demonstrate the protocols with provable security over record long distances in optical fibers and assess the performance of our systems as well as their limitations. The reported advances offer a powerful toolbox for practical applications of secure communications within future quantum networks.
Provable Security of Communication for Protecting Information Flow in Distributed Systems
2015-06-01
tensorization of extremal mutual information quantities, which have been of recent...Control, and Computing, Oct. 2012. 25) T. Wang, J. Sturm, P. Cuff, S. Kulkarni, “Condorcet Voting ...Methods Avoid the Paradoxes of Voting Theory,” Proc. of the Allerton Conference on Communication,
Solidify, An LLVM pass to compile LLVM IR into Solidity
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kothapalli, Abhiram
The software currently compiles LLVM IR into Solidity (Ethereum’s dominant programming language) using LLVM’s pass library. Specifically, his compiler allows us to convert an arbitrary DSL into Solidity. We focus specifically on converting Domain Specific Languages into Solidity due to their ease of use, and provable properties. By creating a toolchain to compile lightweight domain-specific languages into Ethereum's dominant language, Solidity, we allow non-specialists to effectively develop safe and useful smart contracts. For example lawyers from a certain firm can have a proprietary DSL that codifies basic laws safely converted to Solidity to be securely executed on the blockchain. Inmore » another example, a simple provenance tracking language can be compiled and securely executed on the blockchain.« less
Password-only authenticated three-party key exchange with provable security in the standard model.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon; Won, Dongho
2014-01-01
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks.
Quantum random oracle model for quantum digital signature
NASA Astrophysics Data System (ADS)
Shang, Tao; Lei, Qi; Liu, Jianwei
2016-10-01
The goal of this work is to provide a general security analysis tool, namely, the quantum random oracle (QRO), for facilitating the security analysis of quantum cryptographic protocols, especially protocols based on quantum one-way function. QRO is used to model quantum one-way function and different queries to QRO are used to model quantum attacks. A typical application of quantum one-way function is the quantum digital signature, whose progress has been hampered by the slow pace of the experimental realization. Alternatively, we use the QRO model to analyze the provable security of a quantum digital signature scheme and elaborate the analysis procedure. The QRO model differs from the prior quantum-accessible random oracle in that it can output quantum states as public keys and give responses to different queries. This tool can be a test bed for the cryptanalysis of more quantum cryptographic protocols based on the quantum one-way function.
Security Hardened Cyber Components for Nuclear Power Plants: Phase I SBIR Final Technical Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Franusich, Michael D.
SpiralGen, Inc. built a proof-of-concept toolkit for enhancing the cyber security of nuclear power plants and other critical infrastructure with high-assurance instrumentation and control code. The toolkit is based on technology from the DARPA High-Assurance Cyber Military Systems (HACMS) program, which has focused on applying the science of formal methods to the formidable set of problems involved in securing cyber physical systems. The primary challenges beyond HACMS in developing this toolkit were to make the new technology usable by control system engineers and compatible with the regulatory and commercial constraints of the nuclear power industry. The toolkit, packaged as amore » Simulink add-on, allows a system designer to assemble a high-assurance component from formally specified and proven blocks and generate provably correct control and monitor code for that subsystem.« less
A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks
Wang, Changji; Yuan, Yuan; Wu, Jiayuan
2017-01-01
Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication. PMID:28632171
A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.
Wang, Changji; Yuan, Yuan; Wu, Jiayuan
2017-06-20
Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-24
... particular security. Savings associations, regardless of size, should not purchase securities for which they... characteristics to be purchased and held by insured savings associations. Under section 362.11(b), a savings... management's credit risk analysis and its use in examiner decisions concerning investment security risk...
The universal numbers. From Biology to Physics.
Marchal, Bruno
2015-12-01
I will explain how the mathematicians have discovered the universal numbers, or abstract computer, and I will explain some abstract biology, mainly self-reproduction and embryogenesis. Then I will explain how and why, and in which sense, some of those numbers can dream and why their dreams can glue together and must, when we assume computationalism in cognitive science, generate a phenomenological physics, as part of a larger phenomenological theology (in the sense of the greek theologians). The title should have been "From Biology to Physics, through the Phenomenological Theology of the Universal Numbers", if that was not too long for a title. The theology will consist mainly, like in some (neo)platonist greek-indian-chinese tradition, in the truth about numbers' relative relations, with each others, and with themselves. The main difference between Aristotle and Plato is that Aristotle (especially in its common and modern christian interpretation) makes reality WYSIWYG (What you see is what you get: reality is what we observe, measure, i.e. the natural material physical science) where for Plato and the (rational) mystics, what we see might be only the shadow or the border of something else, which might be non physical (mathematical, arithmetical, theological, …). Since Gödel, we know that Truth, even just the Arithmetical Truth, is vastly bigger than what the machine can rationally justify. Yet, with Church's thesis, and the mechanizability of the diagonalizations involved, machines can apprehend this and can justify their limitations, and get some sense of what might be true beyond what they can prove or justify rationally. Indeed, the incompleteness phenomenon introduces a gap between what is provable by some machine and what is true about that machine, and, as Gödel saw already in 1931, the existence of that gap is accessible to the machine itself, once it is has enough provability abilities. Incompleteness separates truth and provable, and machines can justify this in some way. More importantly incompleteness entails the distinction between many intensional variants of provability. For example, the absence of reflexion (beweisbar(⌜A⌝) → A with beweisbar being Gödel's provability predicate) makes it impossible for the machine's provability to obey the axioms usually taken for a theory of knowledge. The most important consequence of this in the machine's possible phenomenology is that it provides sense, indeed arithmetical sense, to intensional variants of provability, like the logics of provability-and-truth, which at the propositional level can be mirrored by the logic of provable-and-true statements (beweisbar(⌜A⌝) ∧ A). It is incompleteness which makes this logic different from the logic of provability. Other variants, like provable-and-consistent, or provable-and-consistent-and-true, appears in the same way, and inherits the incompleteness splitting, unlike beweisbar(⌜A⌝) ∧ A. I will recall thought experience which motivates the use of those intensional variants to associate a knower and an observer in some canonical way to the machines or the numbers. We will in this way get an abstract and phenomenological theology of a machine M through the true logics of their true self-referential abilities (even if not provable, or knowable, by the machine itself), in those different intensional senses. Cognitive science and theoretical physics motivate the study of those logics with the arithmetical interpretation of the atomic sentences restricted to the "verifiable" (Σ1) sentences, which is the way to study the theology of the computationalist machine. This provides a logic of the observable, as expected by the Universal Dovetailer Argument, which will be recalled briefly, and which can lead to a comparison of the machine's logic of physics with the empirical logic of the physicists (like quantum logic). This leads also to a series of open problems. Copyright © 2015 Elsevier Ltd. All rights reserved.
A Provably-Secure Transmission Scheme for Wireless Body Area Networks.
Omala, Anyembe Andrew; Robert, Niyifasha; Li, Fagen
2016-11-01
Wireless body area network (WBANs) is composed of sensors that collect and transmit a person's physiological data to health-care providers in real-time. In order to guarantee security of this data over open networks, a secure data transmission mechanism between WBAN and application provider's servers is of necessity. Modified medical data does not provide a true reflection of an individuals state of health and its subsequent use for diagnosis could lead to an irreversible medical condition. In this paper, we propose a lightweight certificateless signcryption scheme for secure transmission of data between WBAN and servers. Our proposed scheme not only provides confidentiality of data and authentication in a single logical step, it is lightweight and resistant to key escrow attacks. We further provide security proof that our scheme provides indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model. Compared with two other Diffie-Hellman based signcryption schemes proposed by Barbosa and Farshim (BF) and another by Yin and Liang (YL), our scheme consumes 46 % and 8 % less energy during signcryption than BF and YL scheme respectively.
Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model
Nam, Junghyun; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon
2014-01-01
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks. PMID:24977229
Provably secure time distribution for the electric grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith IV, Amos M; Evans, Philip G; Williams, Brian P
We demonstrate a quantum time distribution (QTD) method that combines the precision of optical timing techniques with the integrity of quantum key distribution (QKD). Critical infrastructure is dependent on microprocessor- and programmable logic-based monitoring and control systems. The distribution of timing information across the electric grid is accomplished by GPS signals which are known to be vulnerable to spoofing. We demonstrate a method for synchronizing remote clocks based on the arrival time of photons in a modifed QKD system. This has the advantage that the signal can be veried by examining the quantum states of the photons similar to QKD.
Code of Federal Regulations, 2010 CFR
2010-01-01
... face, in bold type: “This security is not a savings account or deposit and it is not insured by the... the same priority as savings accounts or a higher priority; (C) State that the security is not secured...) Except as provided in paragraph (c)(4)(ii) of this section, a savings association must use an indenture...
12 CFR 563g.17 - Sales of securities at an office of a savings association.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Sales of securities at an office of a savings association. 563g.17 Section 563g.17 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.17 Sales of securities at an office of a savings association. Sales of...
When Proofs Reflect More on Assumptions than Conclusions
ERIC Educational Resources Information Center
Dawkins, Paul Christian
2014-01-01
This paper demonstrates how questions of "provability" can help students engaged in reinvention of mathematical theory to understand the axiomatic game. While proof demonstrates how conclusions follow from assumptions, "provability" characterizes the dual relation that assumptions are "justified" when they afford…
Uncovered: Social Security, Retirement Uncertainty, and 1 Million Teachers
ERIC Educational Resources Information Center
Kan, Leslie; Aldeman, Chad
2014-01-01
Retirement savings are often described as a three-legged stool: Social Security, employer retirement plans, and personal savings. For many American workers, Social Security is the most consistent portion of the three-legged model, providing a solid plank of retirement savings. But nationwide, more than 1 million teachers--about 40 percent of all…
75 FR 65404 - Security Savings Bank, FSB; Olathe, KS; Notice of Appointment of Receiver
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-22
... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Security Savings Bank, FSB; Olathe, KS... section 5(d)(2) of the Home Owners' Loan Act, the Office of Thrift Supervision (OTS) has duly appointed the Federal Deposit Insurance Corporation as sole Receiver for Security Savings Bank, FSB, Olathe...
Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.
Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen
2018-04-28
Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.
Sasaki, Michiya; Ogino, Haruyuki; Hattori, Takatoshi
2018-06-08
In order to prove a small increment in a risk of concern in an epidemiological study, a large sample of a population is generally required. Since the background risk of an end point of interest, such as cancer mortality, is affected by various factors, such as lifestyle (diet, smoking, etc.), adjustment for such factors is necessary. However, it is impossible to inclusively and completely adjust for such factors; therefore, uncertainty in the background risk remains for control and exposed populations, indicating that there is a minimum limit to the lower bound for the provable risk regardless of the sample size. In this case study, we developed and discussed the minimum provable risk considering the uncertainty in background risk for hypothetical populations by referring to recent Japanese statistical information to grasp the extent of the minimum provable risk. Risk of fatal diseases due to radiation exposure, which has recently been the focus of radiological protection, was also examined by comparative assessment of the minimum provable risk for cancer and circulatory diseases. It was estimated that the minimum provable risk for circulatory disease mortality was much greater than that for cancer mortality, approximately five to seven times larger; circulatory disease mortality is more difficult to prove as a radiation risk than cancer mortality under the conditions used in this case study.This is an open-access article distributed under the terms of the Creative Commons Attribution-Non Commercial-No Derivatives License 4.0 (CCBY-NC-ND), where it is permissible to download and share the work provided it is properly cited. The work cannot be changed in any way or used commercially without permission from the journal.
Source-Independent Quantum Random Number Generation
NASA Astrophysics Data System (ADS)
Cao, Zhu; Zhou, Hongyi; Yuan, Xiao; Ma, Xiongfeng
2016-01-01
Quantum random number generators can provide genuine randomness by appealing to the fundamental principles of quantum mechanics. In general, a physical generator contains two parts—a randomness source and its readout. The source is essential to the quality of the resulting random numbers; hence, it needs to be carefully calibrated and modeled to achieve information-theoretical provable randomness. However, in practice, the source is a complicated physical system, such as a light source or an atomic ensemble, and any deviations in the real-life implementation from the theoretical model may affect the randomness of the output. To close this gap, we propose a source-independent scheme for quantum random number generation in which output randomness can be certified, even when the source is uncharacterized and untrusted. In our randomness analysis, we make no assumptions about the dimension of the source. For instance, multiphoton emissions are allowed in optical implementations. Our analysis takes into account the finite-key effect with the composable security definition. In the limit of large data size, the length of the input random seed is exponentially small compared to that of the output random bit. In addition, by modifying a quantum key distribution system, we experimentally demonstrate our scheme and achieve a randomness generation rate of over 5 ×103 bit /s .
The randomized benchmarking number is not what you think it is
NASA Astrophysics Data System (ADS)
Proctor, Timothy; Rudinger, Kenneth; Blume-Kohout, Robin; Sarovar, Mohan; Young, Kevin
Randomized benchmarking (RB) is a widely used technique for characterizing a gate set, whereby random sequences of gates are used to probe the average behavior of the gate set. The gates are chosen to ideally compose to the identity, and the rate of decay in the survival probability of an initial state with increasing length sequences is extracted from a set of experiments - this is the `RB number'. For reasonably well-behaved noise and particular gate sets, it has been claimed that the RB number is a reliable estimate of the average gate fidelity (AGF) of each noisy gate to the ideal target unitary, averaged over all gates in the set. Contrary to this widely held view, we show that this is not the case. We show that there are physically relevant situations, in which RB was thought to be provably reliable, where the RB number is many orders of magnitude away from the AGF. These results have important implications for interpreting the RB protocol, and immediate consequences for many advanced RB techniques. Sandia National Laboratories is a multi-mission laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000.
Finite-key security analysis of quantum key distribution with imperfect light sources
Mizutani, Akihiro; Curty, Marcos; Lim, Charles Ci Wen; ...
2015-09-09
In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with arbitrarily flawed optical receivers. The status for QKD systems with imperfect light sources is however less satisfactory, in the sense that the resulting secure key rates are often overly dependent on the quality of state preparation. This is especially the case when the channel loss is high. Very recently, to overcome this limitation, Tamaki et al proposed a QKD protocol based on the so-called 'rejected data analysis', and showed that its security in the limit of infinitelymore » long keys is almost independent of any encoding flaw in the qubit space, being this protocol compatible with the decoy state method. Here, as a step towards practical QKD, we show that a similar conclusion is reached in the finite-key regime, even when the intensity of the light source is unstable. More concretely, we derive security bounds for a wide class of realistic light sources and show that the bounds are also efficient in the presence of high channel loss. Our results strongly suggest the feasibility of long distance provably secure communication with imperfect light sources.« less
Lightweight and confidential data discovery and dissemination for wireless body area networks.
He, Daojing; Chan, Sammy; Zhang, Yan; Yang, Haomiao
2014-03-01
As a special sensor network, a wireless body area network (WBAN) provides an economical solution to real-time monitoring and reporting of patients' physiological data. After a WBAN is deployed, it is sometimes necessary to disseminate data into the network through wireless links to adjust configuration parameters of body sensors or distribute management commands and queries to sensors. A number of such protocols have been proposed recently, but they all focus on how to ensure reliability and overlook security vulnerabilities. Taking into account the unique features and application requirements of a WBAN, this paper presents the design, implementation, and evaluation of a secure, lightweight, confidential, and denial-of-service-resistant data discovery and dissemination protocol for WBANs to ensure the data items disseminated are not altered or tampered. Based on multiple one-way key hash chains, our protocol provides instantaneous authentication and can tolerate node compromise. Besides the theoretical analysis that demonstrates the security and performance of the proposed protocol, this paper also reports the experimental evaluation of our protocol in a network of resource-limited sensor nodes, which shows its efficiency in practice. In particular, extensive security analysis shows that our protocol is provably secure.
Trusted Storage: Putting Security and Data Together
NASA Astrophysics Data System (ADS)
Willett, Michael; Anderson, Dave
State and Federal breach notification legislation mandates that the affected parties be notified in case of a breach of sensitive personal data, unless the data was provably encrypted. Self-encrypting hard drives provide the superior solution for encrypting data-at-rest when compared to software-based solutions. Self-encrypting hard drives, from the laptop to the data center, have been standardized across the hard drive industry by the Trusted Computing Group. Advantages include: simplified management (including keys), no performance impact, quick data erasure and drive re-purposing, no interference with end-to-end data integrity metrics, always encrypting, no cipher-text exposure, and scalability in large data centers.
Social Security and Saving: A Time-Series Econometrics Pedagogical Example (With "R" Code)
ERIC Educational Resources Information Center
Wassell, Charles S., Jr.
2018-01-01
In 1974, and then again in 1996, Martin Feldstein published studies of the impact of the Social Security system on private saving in the U.S. economy. He found that Social Security depressed personal saving by a substantial amount--up to 50 percent. The author uses the Feldstein data and empirical models in this article to illustrate the steps in…
Key Reconciliation for High Performance Quantum Key Distribution
Martinez-Mateo, Jesus; Elkouss, David; Martin, Vicente
2013-01-01
Quantum Key Distribution is carving its place among the tools used to secure communications. While a difficult technology, it enjoys benefits that set it apart from the rest, the most prominent is its provable security based on the laws of physics. QKD requires not only the mastering of signals at the quantum level, but also a classical processing to extract a secret-key from them. This postprocessing has been customarily studied in terms of the efficiency, a figure of merit that offers a biased view of the performance of real devices. Here we argue that it is the throughput the significant magnitude in practical QKD, specially in the case of high speed devices, where the differences are more marked, and give some examples contrasting the usual postprocessing schemes with new ones from modern coding theory. A good understanding of its implications is very important for the design of modern QKD devices. PMID:23546440
5 CFR 9701.527 - Savings provision.
Code of Federal Regulations, 2011 CFR
2011-01-01
....527 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.527 Savings provision. This subpart does not...
5 CFR 9701.527 - Savings provision.
Code of Federal Regulations, 2010 CFR
2010-01-01
....527 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.527 Savings provision. This subpart does not...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-15
... Part 362 Permissible Investments for Federal and State Savings Associations: Corporate Debt Securities... association from acquiring and retaining a corporate debt security unless it determines, prior to acquiring... whether a corporate debt security is eligible for investment under this proposed rule. DATES: Comments...
Lorentzian symmetry predicts universality beyond scaling laws
NASA Astrophysics Data System (ADS)
Watson, Stephen J.
2017-06-01
We present a covariant theory for the ageing characteristics of phase-ordering systems that possess dynamical symmetries beyond mere scalings. A chiral spin dynamics which conserves the spin-up (+) and spin-down (-) fractions, μ+ and μ- , serves as the emblematic paradigm of our theory. Beyond a parabolic spatio-temporal scaling, we discover a hidden Lorentzian dynamical symmetry therein, and thereby prove that the characteristic length L of spin domains grows in time t according to L = \\fracβ{\\sqrt{1 - σ^2}}t\\frac{1{2}} , where σ:= μ+ - μ- (the invariant spin-excess) and β is a universal constant. Furthermore, the normalised length distributions of the spin-up and the spin-down domains each provably adopt a coincident universal (σ-independent) time-invariant form, and this supra-universal probability distribution is empirically verified to assume a form reminiscent of the Wigner surmise.
Composite Bloom Filters for Secure Record Linkage.
Durham, Elizabeth Ashley; Kantarcioglu, Murat; Xue, Yuan; Toth, Csaba; Kuzu, Mehmet; Malin, Bradley
2014-12-01
The process of record linkage seeks to integrate instances that correspond to the same entity. Record linkage has traditionally been performed through the comparison of identifying field values ( e.g., Surname ), however, when databases are maintained by disparate organizations, the disclosure of such information can breach the privacy of the corresponding individuals. Various private record linkage (PRL) methods have been developed to obscure such identifiers, but they vary widely in their ability to balance competing goals of accuracy, efficiency and security. The tokenization and hashing of field values into Bloom filters (BF) enables greater linkage accuracy and efficiency than other PRL methods, but the encodings may be compromised through frequency-based cryptanalysis. Our objective is to adapt a BF encoding technique to mitigate such attacks with minimal sacrifices in accuracy and efficiency. To accomplish these goals, we introduce a statistically-informed method to generate BF encodings that integrate bits from multiple fields, the frequencies of which are provably associated with a minimum number of fields. Our method enables a user-specified tradeoff between security and accuracy. We compare our encoding method with other techniques using a public dataset of voter registration records and demonstrate that the increases in security come with only minor losses to accuracy.
Composite Bloom Filters for Secure Record Linkage
Durham, Elizabeth Ashley; Kantarcioglu, Murat; Xue, Yuan; Toth, Csaba; Kuzu, Mehmet; Malin, Bradley
2014-01-01
The process of record linkage seeks to integrate instances that correspond to the same entity. Record linkage has traditionally been performed through the comparison of identifying field values (e.g., Surname), however, when databases are maintained by disparate organizations, the disclosure of such information can breach the privacy of the corresponding individuals. Various private record linkage (PRL) methods have been developed to obscure such identifiers, but they vary widely in their ability to balance competing goals of accuracy, efficiency and security. The tokenization and hashing of field values into Bloom filters (BF) enables greater linkage accuracy and efficiency than other PRL methods, but the encodings may be compromised through frequency-based cryptanalysis. Our objective is to adapt a BF encoding technique to mitigate such attacks with minimal sacrifices in accuracy and efficiency. To accomplish these goals, we introduce a statistically-informed method to generate BF encodings that integrate bits from multiple fields, the frequencies of which are provably associated with a minimum number of fields. Our method enables a user-specified tradeoff between security and accuracy. We compare our encoding method with other techniques using a public dataset of voter registration records and demonstrate that the increases in security come with only minor losses to accuracy. PMID:25530689
A survey of provably correct fault-tolerant clock synchronization techniques
NASA Technical Reports Server (NTRS)
Butler, Ricky W.
1988-01-01
Six provably correct fault-tolerant clock synchronization algorithms are examined. These algorithms are all presented in the same notation to permit easier comprehension and comparison. The advantages and disadvantages of the different techniques are examined and issues related to the implementation of these algorithms are discussed. The paper argues for the use of such algorithms in life-critical applications.
A new way to protect privacy in large-scale genome-wide association studies.
Kamm, Liina; Bogdanov, Dan; Laur, Sven; Vilo, Jaak
2013-04-01
Increased availability of various genotyping techniques has initiated a race for finding genetic markers that can be used in diagnostics and personalized medicine. Although many genetic risk factors are known, key causes of common diseases with complex heritage patterns are still unknown. Identification of such complex traits requires a targeted study over a large collection of data. Ideally, such studies bring together data from many biobanks. However, data aggregation on such a large scale raises many privacy issues. We show how to conduct such studies without violating privacy of individual donors and without leaking the data to third parties. The presented solution has provable security guarantees. Supplementary data are available at Bioinformatics online.
12 CFR 559.12 - How may a subsidiary of a savings association issue securities?
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false How may a subsidiary of a savings association issue securities? 559.12 Section 559.12 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SUBORDINATE ORGANIZATIONS Regulations Applicable to All Savings Associations § 559.12 How...
31 CFR 321.8 - Redemption-exchange of Series E and EE savings bonds and savings notes.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Redemption-exchange of Series E and... STATES SAVINGS NOTES (FREEDOM SHARES) Scope of Authority § 321.8 Redemption-exchange of Series E and EE... payment of eligible securities presented for redemption in exchange for Series HH bonds. Securities...
New Results on Unconditionally Secure Multi-receiver Manual Authentication
NASA Astrophysics Data System (ADS)
Wang, Shuhong; Safavi-Naini, Reihaneh
Manual authentication is a recently proposed model of communication motivated by the settings where the only trusted infrastructure is a low bandwidth authenticated channel, possibly realized by the aid of a human, that connects the sender and the receiver who are otherwise connected through an insecure channel and do not have any shared key or public key infrastructure. A good example of such scenarios is pairing of devices in Bluetooth. Manual authentication systems are studied in computational and information theoretic security model and protocols with provable security have been proposed. In this paper we extend the results in information theoretic model in two directions. Firstly, we extend a single receiver scenario to multireceiver case where the sender wants to authenticate the same message to a group of receivers. We show new attacks (compared to single receiver case) that can launched in this model and demonstrate that the single receiver lower bound 2log(1/ɛ) + O(1) on the bandwidth of manual channel stays valid in the multireceiver scenario. We further propose a protocol that achieves this bound and provides security, in the sense that we define, if up to c receivers are corrupted. The second direction is the study of non-interactive protocols in unconditionally secure model. We prove that unlike computational security framework, without interaction a secure authentication protocol requires the bandwidth of the manual channel to be at least the same as the message size, hence non-trivial protocols do not exist.
31 CFR 321.8 - Redemption-exchange of Series E and EE savings bonds and savings notes.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Redemption-exchange of Series E and EE... NOTES (FREEDOM SHARES) Scope of Authority § 321.8 Redemption-exchange of Series E and EE savings bonds... eligible securities presented for redemption in exchange for Series HH bonds. Securities eligible for...
31 CFR 321.8 - Redemption-exchange of Series E and EE savings bonds and savings notes.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Redemption-exchange of Series E and EE... STATES SAVINGS NOTES (FREEDOM SHARES) Scope of Authority § 321.8 Redemption-exchange of Series E and EE... payment of eligible securities presented for redemption in exchange for Series HH bonds. Securities...
AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.
Wang, Changji; Shi, Dongyuan; Xu, Xilei
2015-01-01
The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.
AIB-OR: Improving Onion Routing Circuit Construction Using Anonymous Identity-Based Cryptosystems
Wang, Changji; Shi, Dongyuan; Xu, Xilei
2015-01-01
The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet. PMID:25815879
Zhang, Liping; Zhu, Shaohui
2015-05-01
To protect the transmission of the sensitive medical data, a secure and efficient authenticated key agreement scheme should be deployed when the healthcare delivery session is established via Telecare Medicine Information Systems (TMIS) over the unsecure public network. Recently, Islam and Khan proposed an authenticated key agreement scheme using elliptic curve cryptography for TMIS. They claimed that their proposed scheme is provably secure against various attacks in random oracle model and enjoys some good properties such as user anonymity. In this paper, however, we point out that any legal but malicious patient can reveal other user's identity. Consequently, their scheme suffers from server spoofing attack and off-line password guessing attack. Moreover, if the malicious patient performs the same time of the registration as other users, she can further launch the impersonation attack, man-in-the-middle attack, modification attack, replay attack, and strong replay attack successfully. To eliminate these weaknesses, we propose an improved ECC-based authenticated key agreement scheme. Security analysis demonstrates that the proposed scheme can resist various attacks and enables the patient to enjoy the remote healthcare services with privacy protection. Through the performance evaluation, we show that the proposed scheme achieves a desired balance between security and performance in comparisons with other related schemes.
Identifying Vulnerabilities and Hardening Attack Graphs for Networked Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Saha, Sudip; Vullinati, Anil K.; Halappanavar, Mahantesh
We investigate efficient security control methods for protecting against vulnerabilities in networked systems. A large number of interdependent vulnerabilities typically exist in the computing nodes of a cyber-system; as vulnerabilities get exploited, starting from low level ones, they open up the doors to more critical vulnerabilities. These cannot be understood just by a topological analysis of the network, and we use the attack graph abstraction of Dewri et al. to study these problems. In contrast to earlier approaches based on heuristics and evolutionary algorithms, we study rigorous methods for quantifying the inherent vulnerability and hardening cost for the system. Wemore » develop algorithms with provable approximation guarantees, and evaluate them for real and synthetic attack graphs.« less
Requirements to Design to Code: Towards a Fully Formal Approach to Automatic Code Generation
NASA Technical Reports Server (NTRS)
Hinchey, Michael G.; Rash, James L.; Rouff, Christopher A.
2004-01-01
A general-purpose method to mechanically transform system requirements into a provably equivalent model has yet to appear. Such a method represents a necessary step toward high-dependability system engineering for numerous possible application domains, including sensor networks and autonomous systems. Currently available tools and methods that start with a formal model of a system and mechanically produce a provably equivalent implementation are valuable but not sufficient. The gap that current tools and methods leave unfilled is that their formal models cannot be proven to be equivalent to the system requirements as originated by the customer. For the classes of systems whose behavior can be described as a finite (but significant) set of scenarios, we offer a method for mechanically transforming requirements (expressed in restricted natural language, or in other appropriate graphical notations) into a provably equivalent formal model that can be used as the basis for code generation and other transformations.
A Formal Approach to Requirements-Based Programming
NASA Technical Reports Server (NTRS)
Hinchey, Michael G.; Rash, James L.; Rouff, Christopher A.
2005-01-01
No significant general-purpose method is currently available to mechanically transform system requirements into a provably equivalent model. The widespread use of such a method represents a necessary step toward high-dependability system engineering for numerous application domains. Current tools and methods that start with a formal model of a system and mechanically produce a provably equivalent implementation are valuable but not sufficient. The "gap" unfilled by such tools and methods is that the formal models cannot be proven to be equivalent to the requirements. We offer a method for mechanically transforming requirements into a provably equivalent formal model that can be used as the basis for code generation and other transformations. This method is unique in offering full mathematical tractability while using notations and techniques that are well known and well trusted. Finally, we describe further application areas we are investigating for use of the approach.
12 CFR 563.76 - Offers and sales of securities at an office of a savings association.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Offers and sales of securities at an office of a savings association. 563.76 Section 563.76 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF... conversion stock offering. (b) Securities sales practices, advertisements, and other sales literature used in...
12 CFR 563.76 - Offers and sales of securities at an office of a savings association.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Offers and sales of securities at an office of a savings association. 563.76 Section 563.76 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF... conversion stock offering. (b) Securities sales practices, advertisements, and other sales literature used in...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-24
... 1044 insured state and federal savings associations. Of these 1044 insured savings associations, 356... represents only 0.97 percent of the aggregate total assets of the 1044 savings associations. \\16\\ This line...
Demographic Change, Social Security Systems, and Savings1
Bloom, David E.; Canning, David; Mansfield, Richard K.; Moore, Michael
2009-01-01
In theory, improvements in healthy life expectancy should generate increases in the average age of retirement, with little effect on savings rates. In many countries, however, retirement incentives in social security programs prevent retirement ages from keeping pace with changes in life expectancy, leading to an increased need for life-cycle savings. Analyzing a cross-country panel of macroeconomic data, we find that increased longevity raises aggregate savings rates in countries with universal pension coverage and retirement incentives, though the effect disappears in countries with pay-as-you-go systems and high replacement rates. PMID:19865594
Reversibility in Quantum Models of Stochastic Processes
NASA Astrophysics Data System (ADS)
Gier, David; Crutchfield, James; Mahoney, John; James, Ryan
Natural phenomena such as time series of neural firing, orientation of layers in crystal stacking and successive measurements in spin-systems are inherently probabilistic. The provably minimal classical models of such stochastic processes are ɛ-machines, which consist of internal states, transition probabilities between states and output values. The topological properties of the ɛ-machine for a given process characterize the structure, memory and patterns of that process. However ɛ-machines are often not ideal because their statistical complexity (Cμ) is demonstrably greater than the excess entropy (E) of the processes they represent. Quantum models (q-machines) of the same processes can do better in that their statistical complexity (Cq) obeys the relation Cμ >= Cq >= E. q-machines can be constructed to consider longer lengths of strings, resulting in greater compression. With code-words of sufficiently long length, the statistical complexity becomes time-symmetric - a feature apparently novel to this quantum representation. This result has ramifications for compression of classical information in quantum computing and quantum communication technology.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Report. 391.4 Section 391.4 Banks and Banking... SUPERVISION REGULATIONS Security Procedures § 391.4 Report. The security officer for each State savings association shall report at least annually to the State savings association's board of directors on the...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Report. 391.4 Section 391.4 Banks and Banking... SUPERVISION REGULATIONS Security Procedures § 391.4 Report. The security officer for each State savings association shall report at least annually to the State savings association's board of directors on the...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Report. 391.4 Section 391.4 Banks and Banking... SUPERVISION REGULATIONS Security Procedures § 391.4 Report. The security officer for each State savings association shall report at least annually to the State savings association's board of directors on the...
31 CFR 370.0 - What does this part cover?
Code of Federal Regulations, 2010 CFR
2010-07-01
... RELATING TO UNITED STATES SECURITIES General Information § 370.0 What does this part cover? (a) Scope. This... does not apply to transactions for the sale of United States Savings Bonds accomplished through savings... connection with United States securities. This part also provides regulations for the electronic submission...
Requirements to Design to Code: Towards a Fully Formal Approach to Automatic Code Generation
NASA Technical Reports Server (NTRS)
Hinchey, Michael G.; Rash, James L.; Rouff, Christopher A.
2005-01-01
A general-purpose method to mechanically transform system requirements into a provably equivalent model has yet to appear. Such a method represents a necessary step toward high-dependability system engineering for numerous possible application domains, including distributed software systems, sensor networks, robot operation, complex scripts for spacecraft integration and testing, and autonomous systems. Currently available tools and methods that start with a formal model of a system and mechanically produce a provably equivalent implementation are valuable but not sufficient. The gap that current tools and methods leave unfilled is that their formal models cannot be proven to be equivalent to the system requirements as originated by the customer. For the classes of systems whose behavior can be described as a finite (but significant) set of scenarios, we offer a method for mechanically transforming requirements (expressed in restricted natural language, or in other appropriate graphical notations) into a provably equivalent formal model that can be used as the basis for code generation and other transformations.
Requirements to Design to Code: Towards a Fully Formal Approach to Automatic Code Generation
NASA Technical Reports Server (NTRS)
Hinchey, Michael G.; Rash, James L.; Rouff, Christopher A.
2005-01-01
A general-purpose method to mechanically transform system requirements into a provably equivalent model has yet to appear. Such a method represents a necessary step toward high-dependability system engineering for numerous possible application domains, including distributed software systems, sensor networks, robot operation, complex scripts for spacecraft integration and testing, and autonomous systems. Currently available tools and methods that start with a formal model of a: system and mechanically produce a provably equivalent implementation are valuable but not sufficient. The "gap" that current tools and methods leave unfilled is that their formal models cannot be proven to be equivalent to the system requirements as originated by the customer. For the ciasses of systems whose behavior can be described as a finite (but significant) set of scenarios, we offer a method for mechanically transforming requirements (expressed in restricted natural language, or in other appropriate graphical notations) into a provably equivalent formal model that can be used as the basis for code generation and other transformations.
Dedicated Orthogeriatric Service Saves the HSE a Million Euro.
Shanahan, E; Henderson, C; Butler, A; Lenehan, B; Sheehy, T; Costelloe, A; Carew, S; Peters, C; O'Connor, M; Lyons, D; Ryan, J
2016-04-11
Hip fracture is common in older adults and is associated with high morbidity, mortality and significant health care costs. A pilot orthogeriatrics service was established in an acute hospital. We aimed to establish the cost effectiveness of this service. Length of hospital stay, discharge destination and rehabilitation requirements were analysed for a one year period and compared to patients who received usual care prior to the service. We calculated the costs incurred and savings produced by the orthogeriatric service. Median length of stay was reduced by 3 days (p < 0.001) saving €266,976. There was a 19% reduction in rehabilitation requirements saving €192,600. Median rehabilitation length of stay was reduced by 6.5 days saving €171,093. Reductions in long term care requirements led to savings of €10,934 per week. Costs to establish such a service amount to €171,564. The introduction of this service led to improved patient outcomes in a cost effective manner.
Date attachable offline electronic cash scheme.
Fan, Chun-I; Sun, Wei-Zhe; Hau, Hoi-Tung
2014-01-01
Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.
Date Attachable Offline Electronic Cash Scheme
Sun, Wei-Zhe; Hau, Hoi-Tung
2014-01-01
Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling. PMID:24982931
Completely device-independent quantum key distribution
NASA Astrophysics Data System (ADS)
Aguilar, Edgar A.; Ramanathan, Ravishankar; Kofler, Johannes; Pawłowski, Marcin
2016-08-01
Quantum key distribution (QKD) is a provably secure way for two distant parties to establish a common secret key, which then can be used in a classical cryptographic scheme. Using quantum entanglement, one can reduce the necessary assumptions that the parties have to make about their devices, giving rise to device-independent QKD (DIQKD). However, in all existing protocols to date the parties need to have an initial (at least partially) random seed as a resource. In this work, we show that this requirement can be dropped. Using recent advances in the fields of randomness amplification and randomness expansion, we demonstrate that it is sufficient for the message the parties want to communicate to be (partially) unknown to the adversaries—an assumption without which any type of cryptography would be pointless to begin with. One party can use her secret message to locally generate a secret sequence of bits, which can then be openly used by herself and the other party in a DIQKD protocol. Hence our work reduces the requirements needed to perform secure DIQKD and establish safe communication.
FRR: fair remote retrieval of outsourced private medical records in electronic health networks.
Wang, Huaqun; Wu, Qianhong; Qin, Bo; Domingo-Ferrer, Josep
2014-08-01
Cloud computing is emerging as the next-generation IT architecture. However, cloud computing also raises security and privacy concerns since the users have no physical control over the outsourced data. This paper focuses on fairly retrieving encrypted private medical records outsourced to remote untrusted cloud servers in the case of medical accidents and disputes. Our goal is to enable an independent committee to fairly recover the original private medical records so that medical investigation can be carried out in a convincing way. We achieve this goal with a fair remote retrieval (FRR) model in which either t investigation committee members cooperatively retrieve the original medical data or none of them can get any information on the medical records. We realize the first FRR scheme by exploiting fair multi-member key exchange and homomorphic privately verifiable tags. Based on the standard computational Diffie-Hellman (CDH) assumption, our scheme is provably secure in the random oracle model (ROM). A detailed performance analysis and experimental results show that our scheme is efficient in terms of communication and computation. Copyright © 2014 Elsevier Inc. All rights reserved.
Pulcini, Christian D; Kotelchuck, Milton; Kuhlthau, Karen A; Nozzolillo, Alixandra A; Perrin, James M
2012-01-01
To compare the costs of redetermining disability to potential savings in Supplemental Security Income payments associated with different strategies for implementing Continuing Disability Reviews (CDRs) among children potentially enrolled in SSI from 2012 to 2021. We reviewed publicly available reports from the Social Security Administration and Government Accountability Office to estimate costs and savings. We considered CDRs for children ages 1-17 years, excluding mandated low-birth weight and age 18 redeterminations that SSA routinely has performed. If in 2012 the Social Security Administration performs the same number of CDRs for children as in 2010 (16,677, 1% of eligibles) at a cessation rate of 15%, the agency would experience net savings of approximately $145 million in benefit payments. If CDR numbers increased to the greatest level ever (183,211, 22% of eligibles, in 1999) at the same cessation rate, the agency would save approximately $1.6 billion in benefit payments. Increasing the numbers of CDRs for children represents a considerable opportunity for savings. Recognizing the dynamic nature of disability, the agency could reassess the persistence of disability systematically; doing so could free up resources from children who are no longer eligible and help the agency better direct its benefits to recipients with ongoing disability and whose families need support to meet the extra costs associated with raising a child with a major disability. Copyright © 2012 Academic Pediatric Association. Published by Elsevier Inc. All rights reserved.
1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks
Liu, Jingwei; Zhang, Lihuan; Sun, Rong
2016-01-01
Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead. PMID:27213384
1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.
Liu, Jingwei; Zhang, Lihuan; Sun, Rong
2016-05-19
Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.
31 CFR 363.163 - How do I convert an eligible definitive savings bond?
Code of Federal Regulations, 2010 CFR
2010-07-01
... REGULATIONS GOVERNING SECURITIES HELD IN TREASURYDIRECT Conversion of a Definitive Savings Bond § 363.163 How do I convert an eligible definitive savings bond? We will provide online instructions for converting...
31 CFR 321.8 - Redemption-exchange of Series E and EE savings bonds and savings notes.
Code of Federal Regulations, 2012 CFR
2012-07-01
... eligible for exchange are: (1) Series EE bonds bearing issue dates of January 1, 2003, or earlier... February 1, 2003, or thereafter, presented no earlier than 12 months from their issue dates; and (3) Series... securities on exchange unless: (1) The securities are accompanied by a completed exchange subscription signed...
Mantsios, Andrea; Galai, Noya; Mbwambo, Jessie; Likindikoki, Samuel; Shembilu, Catherine; Mwampashi, Ard; Beckham, S W; Leddy, Anna; Davis, Wendy; Sherman, Susan; Kennedy, Caitlin; Kerrigan, Deanna
2018-02-24
This study assessed the association between community savings group participation and consistent condom use (CCU) among female sex workers (FSW) in Iringa, Tanzania. Using cross-sectional data from a survey of venue-based FSW (n = 496), logistic regression was used to examine the associations between financial indicators including community savings group participation and CCU. Over one-third (35%) of the women participated in a savings group. Multivariable regression results indicated that participating in a savings group was significantly associated with nearly two times greater odds of CCU with new clients in the last 30 days (aOR = 1.77, 95% CI 1.10-2.86). Exploratory mediation analysis indicated that the relationship between savings group participation and CCU was partially mediated by financial security, as measured by monthly income. Findings indicate that community savings groups may play an important role in reducing sexual risk behaviors of FSW and hold promise as part of comprehensive, community-led HIV prevention strategies among FSW.
Linear {GLP}-algebras and their elementary theories
NASA Astrophysics Data System (ADS)
Pakhomov, F. N.
2016-12-01
The polymodal provability logic {GLP} was introduced by Japaridze in 1986. It is the provability logic of certain chains of provability predicates of increasing strength. Every polymodal logic corresponds to a variety of polymodal algebras. Beklemishev and Visser asked whether the elementary theory of the free {GLP}-algebra generated by the constants \\mathbf{0}, \\mathbf{1} is decidable [1]. For every positive integer n we solve the corresponding question for the logics {GLP}_n that are the fragments of {GLP} with n modalities. We prove that the elementary theory of the free {GLP}_n-algebra generated by the constants \\mathbf{0}, \\mathbf{1} is decidable for all n. We introduce the notion of a linear {GLP}_n-algebra and prove that all free {GLP}_n-algebras generated by the constants \\mathbf{0}, \\mathbf{1} are linear. We also consider the more general case of the logics {GLP}_α whose modalities are indexed by the elements of a linearly ordered set α: we define the notion of a linear algebra and prove the latter result in this case.
Physical cryptographic verification of nuclear warheads
Kemp, R. Scott; Danagoulian, Areg; Macdonald, Ruaridh R.; Vavrek, Jayson R.
2016-01-01
How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably secure cryptographic hash that does not rely on electronics or software. These techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times. PMID:27432959
Graph State-Based Quantum Group Authentication Scheme
NASA Astrophysics Data System (ADS)
Liao, Longxia; Peng, Xiaoqi; Shi, Jinjing; Guo, Ying
2017-02-01
Motivated by the elegant structure of the graph state, we design an ingenious quantum group authentication scheme, which is implemented by operating appropriate operations on the graph state and can solve the problem of multi-user authentication. Three entities, the group authentication server (GAS) as a verifier, multiple users as provers and the trusted third party Trent are included. GAS and Trent assist the multiple users in completing the authentication process, i.e., GAS is responsible for registering all the users while Trent prepares graph states. All the users, who request for authentication, encode their authentication keys on to the graph state by performing Pauli operators. It demonstrates that a novel authentication scheme can be achieved with the flexible use of graph state, which can synchronously authenticate a large number of users, meanwhile the provable security can be guaranteed definitely.
Physical cryptographic verification of nuclear warheads
NASA Astrophysics Data System (ADS)
Kemp, R. Scott; Danagoulian, Areg; Macdonald, Ruaridh R.; Vavrek, Jayson R.
2016-08-01
How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably secure cryptographic hash that does not rely on electronics or software. These techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times.
Physical cryptographic verification of nuclear warheads.
Kemp, R Scott; Danagoulian, Areg; Macdonald, Ruaridh R; Vavrek, Jayson R
2016-08-02
How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably secure cryptographic hash that does not rely on electronics or software. These techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times.
12 CFR 560.30 - General lending and investment powers of Federal savings associations.
Code of Federal Regulations, 2010 CFR
2010-01-01
.... Commercial paper and corporate debt securities 5(c)(2)(D) Up to 35% of total assets. 2,3 Community...) None. 6 Finance leasing 5(c)(1)(B), 5(c)(2)(A), 5(c)(2)(B), 5(c)(2)(D) Based on purpose and property... corporate debt securities must be aggregated with the Federal savings association's investment in consumer...
Borrowing to Save: A Critique of Recent Proposals to Partially Privatize Social Security
ERIC Educational Resources Information Center
Dattalo, Patrick
2007-01-01
Concern over Social Security's forecasted long-run deficit is occurring at a time when the program has a short-term surplus. One proposed strategy to address this forecasted deficit is to allow the investment of a portion of payroll taxes into private savings accounts (PSAs). The author analyzes recent proposals for PSAs and concludes that PSAs…
Financial management practices and attitudes of dental hygienists: a descriptive study.
Russell, Katherine; Stramoski, Sandra
2011-01-01
The purpose of this study was to determine the financial management goals and practices of registered dental hygienists, their satisfaction with their current financial situations and their attitudes about savings, investments and retirement. A 40 question electronic survey was completed by 388 registered dental hygienists. The descriptive instrument assessed financial practices, attitudes, goals and beliefs, retirement mindset, savings habits, debt tendencies and demographic characteristics of respondents. Statistical analyses compared respondents' beliefs about their financial independence and security with their current financial practices. Analyses included: independent samples t-tests, chi-square analysis and ANOVA. Most dental hygienists believed themselves to be financially independent and reported satisfaction with their current financial situation. Significant relationships existed between respondents' satisfaction with their current financial situations and their financial attitudes and practices (saving regularly and having limited debt). Those who indicated they had personally saved for retirement were more likely to view these savings as their largest source of income during retirement, as opposed to Social Security benefits. A majority agreed that financial management education should be included in the dental hygiene curriculum, and that they would attend a continuing education course on the subject if offered. The results of this study suggest that hygienists have confidence in their ability to provide secure financial futures for themselves. Hygienists who practiced sound financial planning, such as adhering to monthly budgets, having wills, lowering debt and saving regularly, reported a higher level of financial security than those who did not. Most respondents expressed interest in receiving education about financial management through the dental hygiene curriculum and continuing education courses.
Provably unbounded memory advantage in stochastic simulation using quantum mechanics
NASA Astrophysics Data System (ADS)
Garner, Andrew J. P.; Liu, Qing; Thompson, Jayne; Vedral, Vlatko; Gu, mile
2017-10-01
Simulating the stochastic evolution of real quantities on a digital computer requires a trade-off between the precision to which these quantities are approximated, and the memory required to store them. The statistical accuracy of the simulation is thus generally limited by the internal memory available to the simulator. Here, using tools from computational mechanics, we show that quantum processors with a fixed finite memory can simulate stochastic processes of real variables to arbitrarily high precision. This demonstrates a provable, unbounded memory advantage that a quantum simulator can exhibit over its best possible classical counterpart.
Klein, Gerwin; Andronick, June; Keller, Gabriele; Matichuk, Daniel; Murray, Toby; O'Connor, Liam
2017-10-13
We present recent work on building and scaling trustworthy systems with formal, machine-checkable proof from the ground up, including the operating system kernel, at the level of binary machine code. We first give a brief overview of the seL4 microkernel verification and how it can be used to build verified systems. We then show two complementary techniques for scaling these methods to larger systems: proof engineering, to estimate verification effort; and code/proof co-generation, for scalable development of provably trustworthy applications.This article is part of the themed issue 'Verified trustworthy software systems'. © 2017 The Author(s).
Social Security and the Retirement and Savings Behavior of Low Income Households1
van der Klaauw, Wilbert; Wolpin, Kenneth I.
2011-01-01
In this paper, we develop and estimate a model of retirement and savings incorporating limited borrowing, stochastic wage offers, health status and survival, social security benefits, Medicare and employer provided health insurance coverage, and intentional bequests. The model is estimated on sample of relatively poor households from the first three waves of the Health and Retirement Study (HRS), for whom we would expect social security income to be of particular importance. The estimated model is used to simulate the responses to changes in social security rules, including changes in benefit levels, in the payroll tax, in the social security earnings tax and in early and normal retirement ages. Welfare and budget consequences are estimated. PMID:21566719
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Security. 161.44 Section 161.44 Banks and... SAVINGS ASSOCIATIONS § 161.44 Security. The term security means any non-withdrawable account, note, stock... commonly known as a security, or any certificate of interest or participation in, temporary or interim...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Security. 561.44 Section 561.44 Banks and... SAVINGS ASSOCIATIONS § 561.44 Security. The term security means any non-withdrawable account, note, stock... commonly known as a security, or any certificate of interest or participation in, temporary or interim...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Security. 561.44 Section 561.44 Banks and... SAVINGS ASSOCIATIONS § 561.44 Security. The term security means any non-withdrawable account, note, stock... commonly known as a security, or any certificate of interest or participation in, temporary or interim...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Security. 561.44 Section 561.44 Banks and... SAVINGS ASSOCIATIONS § 561.44 Security. The term security means any non-withdrawable account, note, stock... commonly known as a security, or any certificate of interest or participation in, temporary or interim...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Security. 561.44 Section 561.44 Banks and... SAVINGS ASSOCIATIONS § 561.44 Security. The term security means any non-withdrawable account, note, stock... commonly known as a security, or any certificate of interest or participation in, temporary or interim...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Security. 561.44 Section 561.44 Banks and... SAVINGS ASSOCIATIONS § 561.44 Security. The term security means any non-withdrawable account, note, stock... commonly known as a security, or any certificate of interest or participation in, temporary or interim...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Security. 161.44 Section 161.44 Banks and... SAVINGS ASSOCIATIONS § 161.44 Security. The term security means any non-withdrawable account, note, stock... commonly known as a security, or any certificate of interest or participation in, temporary or interim...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Security. 161.44 Section 161.44 Banks and... SAVINGS ASSOCIATIONS § 161.44 Security. The term security means any non-withdrawable account, note, stock... commonly known as a security, or any certificate of interest or participation in, temporary or interim...
12 CFR 541.7 - Corporate debt security.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Corporate debt security. 541.7 Section 541.7... AFFECTING FEDERAL SAVINGS ASSOCIATIONS § 541.7 Corporate debt security. The term corporate debt security..., note and/or debenture which is commonly regarded as a debt security and is not predominantly...
12 CFR 141.7 - Corporate debt security.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Corporate debt security. 141.7 Section 141.7... AFFECTING FEDERAL SAVINGS ASSOCIATIONS § 141.7 Corporate debt security. The term corporate debt security..., note and/or debenture which is commonly regarded as a debt security and is not predominantly...
12 CFR 541.7 - Corporate debt security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Corporate debt security. 541.7 Section 541.7... AFFECTING FEDERAL SAVINGS ASSOCIATIONS § 541.7 Corporate debt security. The term corporate debt security..., note and/or debenture which is commonly regarded as a debt security and is not predominantly...
12 CFR 141.7 - Corporate debt security.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Corporate debt security. 141.7 Section 141.7... AFFECTING FEDERAL SAVINGS ASSOCIATIONS § 141.7 Corporate debt security. The term corporate debt security..., note and/or debenture which is commonly regarded as a debt security and is not predominantly...
12 CFR 541.7 - Corporate debt security.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Corporate debt security. 541.7 Section 541.7... AFFECTING FEDERAL SAVINGS ASSOCIATIONS § 541.7 Corporate debt security. The term corporate debt security..., note and/or debenture which is commonly regarded as a debt security and is not predominantly...
12 CFR 141.7 - Corporate debt security.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Corporate debt security. 141.7 Section 141.7... AFFECTING FEDERAL SAVINGS ASSOCIATIONS § 141.7 Corporate debt security. The term corporate debt security..., note and/or debenture which is commonly regarded as a debt security and is not predominantly...
12 CFR 541.7 - Corporate debt security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Corporate debt security. 541.7 Section 541.7... AFFECTING FEDERAL SAVINGS ASSOCIATIONS § 541.7 Corporate debt security. The term corporate debt security..., note and/or debenture which is commonly regarded as a debt security and is not predominantly...
12 CFR 541.7 - Corporate debt security.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Corporate debt security. 541.7 Section 541.7... AFFECTING FEDERAL SAVINGS ASSOCIATIONS § 541.7 Corporate debt security. The term corporate debt security..., note and/or debenture which is commonly regarded as a debt security and is not predominantly...
76 FR 30243 - Minimum Security Devices and Procedures
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-24
... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures.... Title of Proposal: Minimum Security Devices and Procedures. OMB Number: 1550-0062. Form Number: N/A. Description: The requirement that savings associations establish a written security program is necessitated by...
31 CFR 363.101 - Can an account owner transfer a book-entry savings bond to a minor?
Code of Federal Regulations, 2010 CFR
2010-07-01
... REGULATIONS GOVERNING SECURITIES HELD IN TREASURYDIRECT Book-Entry Savings Bonds Purchased Through TreasuryDirect Gifts § 363.101 Can an account owner transfer a book-entry savings bond to a minor? An account owner can transfer a book-entry savings bond held in TreasuryDirect ® to a minor as a gift or pursuant...
Borrowing to save: a critique of recent proposals to partially privatize Social Security.
Dattalo, Patrick
2007-07-01
Concern over Social Security's forecasted long-run deficit is occurring at a time when the program has a short-term surplus. One proposed strategy to address this forecasted deficit is to allow the investment of a portion of payroll taxes into private savings accounts (PSAs). The author analyzes recent proposals for PSAs and concludes that PSAs are more likely to be a problem than a solution. Paradoxically, PSAs require the government to borrow to encourage current workers to save. The author recommends resources to help social workers remain informed about proposed program reforms and prepared to advocate for the concept of social insurance.
Assurance of energy efficiency and data security for ECG transmission in BASNs.
Ma, Tao; Shrestha, Pradhumna Lal; Hempel, Michael; Peng, Dongming; Sharif, Hamid; Chen, Hsiao-Hwa
2012-04-01
With the technological advancement in body area sensor networks (BASNs), low cost high quality electrocardiographic (ECG) diagnosis systems have become important equipment for healthcare service providers. However, energy consumption and data security with ECG systems in BASNs are still two major challenges to tackle. In this study, we investigate the properties of compressed ECG data for energy saving as an effort to devise a selective encryption mechanism and a two-rate unequal error protection (UEP) scheme. The proposed selective encryption mechanism provides a simple and yet effective security solution for an ECG sensor-based communication platform, where only one percent of data is encrypted without compromising ECG data security. This part of the encrypted data is essential to ECG data quality due to its unequally important contribution to distortion reduction. The two-rate UEP scheme achieves a significant additional energy saving due to its unequal investment of communication energy to the outcomes of the selective encryption, and thus, it maintains a high ECG data transmission quality. Our results show the improvements in communication energy saving of about 40%, and demonstrate a higher transmission quality and security measured in terms of wavelet-based weighted percent root-mean-squared difference.
31 CFR 363.95 - How may I give, and who can receive, a book-entry savings bond as a gift?
Code of Federal Regulations, 2010 CFR
2010-07-01
... may give a book-entry savings bond as a gift in two ways: (a) An individual may purchase a book-entry..., a book-entry savings bond as a gift? 363.95 Section 363.95 Money and Finance: Treasury Regulations... DEBT REGULATIONS GOVERNING SECURITIES HELD IN TREASURYDIRECT Book-Entry Savings Bonds Purchased Through...
Quantum internet: the certifiable road ahead
NASA Astrophysics Data System (ADS)
Elkouss, David; Lipinska, Victoria; Goodenough, Kenneth; Rozpedek, Filip; Kalb, Norbert; van Dam, Suzanne; Le Phuc, Thinh; Murta, Glaucia; Humphreys, Peter; Taminiau, Tim; Hanson, Ronald; Wehner, Stephanie
A future quantum internet enables quantum communication between any two points on earth in order to solve problems which are provably impossible using classical communication. The most well-known application of quantum communication is quantum key distribution, which allows two users to establish an encryption key. However, many other applications are known ranging from protocols for clock synchronization, extending the baselines of telescopes to exponential savings in communication. Due to recent technological progress, we are now on the verge of seeing the first small-scale quantum communication networks being realized. Here, we present a roadmap towards the ultimate form of a quantum internet. Specifically, we identify stages of development that are distinguished by an ever increasing amount of functionality. Each stage supports a certain class of quantum protocols and is interesting in its own right. What's more, we propose a series of simple tests to certify that an experimental implementation has achieved a certain stage. Jointly, the stages and the certification tests will allow us to track and benchmark experimental progress in the years to come. This work is supported by STW, NWO VIDI and ERC Starting Grant.
12 CFR 563g.19 - Approval of the security.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Approval of the security. 563g.19 Section 563g.19 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.19 Approval of the security. Any securities of a savings association which are not exempt under...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Treasury securities through my TreasuryDirect ® account? (a) Online purchase. Purchases of eligible Treasury securities through your TreasuryDirect account must be made online. (b) Payment for savings bonds...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Treasury securities through my TreasuryDirect ® account? (a) Online purchase. Purchases of eligible Treasury securities through your TreasuryDirect account must be made online. (b) Payment for savings bonds...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Treasury securities through my TreasuryDirect ® account? (a) Online purchase. Purchases of eligible Treasury securities through your TreasuryDirect account must be made online. (b) Payment for savings bonds...
The new world of retirement income security in America.
Quinn, Joseph F; Cahill, Kevin E
2016-01-01
We have entered a new world of retirement income security in America, with older individuals more exposed to market risk and more vulnerable to financial insecurity than prior generations. This reflects an evolution that has altered the historical vision of a financially secure retirement supported by Social Security, a defined-benefit pension plan, and individual savings. Today, 2 of these 3 retirement income sources-pensions and savings-are absent or of modest importance for many older Americans. Retirement income security now often requires earnings from continued work later in life, which exacerbates the economic vulnerability of certain segments of the population, including persons with disabilities, the oldest-old, single women, and individuals with intermittent work histories. Because of the unprecedented aging of our society, further changes to the retirement income landscape are inevitable, but policymakers do have options to help protect the financial stability of older Americans. We can begin by promoting savings at all (especially younger) ages and by removing barriers that discourage work later in life. For individuals already on the cusp of retirement, more needs to be done to educate the public about the value of delaying the receipt of Social Security benefits. Inaction now could mean a return to the days when old age and poverty were closely linked. The negative repercussions of this would extend well beyond traditional economic measures, as physical and mental health outcomes are closely tied to financial security. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Hidden Costs of the Campus Security Force.
ERIC Educational Resources Information Center
Temple, Charles M.
1981-01-01
Information on the security operations of public four-year colleges and universities is examined, and the case of the University of Tennessee, Chattanooga (UTC), which saved $66,000 a year from the security unit's operational budget, is noted. Of 561 questionnaires sent to public institutions regarding the general operation of security units,…
12 CFR 560.40 - Commercial paper and corporate debt securities.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Commercial paper and corporate debt securities... paper and corporate debt securities. Pursuant to HOLA section 5(c)(2)(D), a Federal savings association may invest in, sell, or hold commercial paper and corporate debt securities subject to the provisions...
12 CFR 560.40 - Commercial paper and corporate debt securities.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Commercial paper and corporate debt securities... paper and corporate debt securities. Pursuant to HOLA section 5(c)(2)(D), a Federal savings association may invest in, sell, or hold commercial paper and corporate debt securities subject to the provisions...
12 CFR 560.40 - Commercial paper and corporate debt securities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Commercial paper and corporate debt securities... paper and corporate debt securities. Pursuant to HOLA section 5(c)(2)(D), a Federal savings association may invest in, sell, or hold commercial paper and corporate debt securities subject to the provisions...
12 CFR 560.40 - Commercial paper and corporate debt securities.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Commercial paper and corporate debt securities... paper and corporate debt securities. Pursuant to HOLA section 5(c)(2)(D), a Federal savings association may invest in, sell, or hold commercial paper and corporate debt securities subject to the provisions...
12 CFR 560.40 - Commercial paper and corporate debt securities.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Commercial paper and corporate debt securities... paper and corporate debt securities. Pursuant to HOLA section 5(c)(2)(D), a Federal savings association may invest in, sell, or hold commercial paper and corporate debt securities subject to the provisions...
31 CFR 363.55 - May I transfer my book-entry savings bonds to another person?
Code of Federal Regulations, 2010 CFR
2010-07-01
... REGULATIONS GOVERNING SECURITIES HELD IN TREASURYDIRECT Book-Entry Savings Bonds Purchased Through Treasury... a minimum amount of $25. The transfer may only be made as a gift or in response to a final judgment... is a gift or a specified exception. (b) We do not permit the transfer of savings bonds for...
31 CFR 315.3 - Converting definitive savings bonds to book-entry bonds in New Treasury Direct.
Code of Federal Regulations, 2011 CFR
2011-07-01
... book-entry bonds in New Treasury Direct. 315.3 Section 315.3 Money and Finance: Treasury Regulations.... SAVINGS NOTES General Information § 315.3 Converting definitive savings bonds to book-entry bonds in New... book-entry bonds through New Treasury Direct, an online system for holding Treasury securities. The Web...
31 CFR 315.3 - Converting definitive savings bonds to book-entry bonds in New Treasury Direct.
Code of Federal Regulations, 2010 CFR
2010-07-01
... to book-entry bonds in New Treasury Direct. 315.3 Section 315.3 Money and Finance: Treasury.... SAVINGS NOTES General Information § 315.3 Converting definitive savings bonds to book-entry bonds in New... book-entry bonds through New Treasury Direct, an online system for holding Treasury securities. The Web...
20 CFR 416.1121 - Types of unearned income.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 416.1121 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED... to prior work or service. It includes, for example, private pensions, social security benefits... capital investments, such as stocks, bonds, or savings accounts. Royalties are compensation paid to the...
20 CFR 416.1121 - Types of unearned income.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 416.1121 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED... to prior work or service. It includes, for example, private pensions, social security benefits... capital investments, such as stocks, bonds, or savings accounts. Royalties are compensation paid to the...
Formal Requirements-Based Programming for Complex Systems
NASA Technical Reports Server (NTRS)
Rash, James L.; Hinchey, Michael G.; Rouff, Christopher A.; Gracanin, Denis
2005-01-01
Computer science as a field has not yet produced a general method to mechanically transform complex computer system requirements into a provably equivalent implementation. Such a method would be one major step towards dealing with complexity in computing, yet it remains the elusive holy grail of system development. Currently available tools and methods that start with a formal model of a system and mechanically produce a provably equivalent implementation are valuable but not sufficient. The gap that such tools and methods leave unfilled is that the formal models cannot be proven to be equivalent to the system requirements as originated by the customer For the classes of complex systems whose behavior can be described as a finite (but significant) set of scenarios, we offer a method for mechanically transforming requirements (expressed in restricted natural language, or appropriate graphical notations) into a provably equivalent formal model that can be used as the basis for code generation and other transformations. While other techniques are available, this method is unique in offering full mathematical tractability while using notations and techniques that are well known and well trusted. We illustrate the application of the method to an example procedure from the Hubble Robotic Servicing Mission currently under study and preliminary formulation at NASA Goddard Space Flight Center.
Energy Savings Lifetimes and Persistence
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hoffman, Ian M.; Schiller, Steven R.; Todd, Annika
2016-02-01
This technical brief explains the concepts of energy savings lifetimes and savings persistence and discusses how program administrators use these factors to calculate savings for efficiency measures, programs and portfolios. Savings lifetime is the length of time that one or more energy efficiency measures or activities save energy, and savings persistence is the change in savings throughout the functional life of a given efficiency measure or activity. Savings lifetimes are essential for assessing the lifecycle benefits and cost effectiveness of efficiency activities and for forecasting loads in resource planning. The brief also provides estimates of savings lifetimes derived from amore » national collection of costs and savings for electric efficiency programs and portfolios.« less
31 CFR 330.6 - Securities eligible for special endorsement.
Code of Federal Regulations, 2010 CFR
2010-07-01
... PAYMENT UNDER SPECIAL ENDORSEMENT OF UNITED STATES SAVINGS BONDS AND UNITED STATES SAVINGS NOTES (FREEDOM... used in any case in which payment or exchange: (1) Is requested by a parent on behalf of a minor child...
31 CFR 315.3 - Converting definitive savings bonds to book-entry bonds in New Treasury Direct.
Code of Federal Regulations, 2013 CFR
2013-07-01
... book-entry bonds through New Treasury Direct, an online system for holding Treasury securities. The Web... definitive savings bonds should follow online instructions for conversion. Regulations governing converted...
31 CFR 315.3 - Converting definitive savings bonds to book-entry bonds in New Treasury Direct.
Code of Federal Regulations, 2012 CFR
2012-07-01
... book-entry bonds through New Treasury Direct, an online system for holding Treasury securities. The Web... definitive savings bonds should follow online instructions for conversion. Regulations governing converted...
31 CFR 315.3 - Converting definitive savings bonds to book-entry bonds in New Treasury Direct.
Code of Federal Regulations, 2014 CFR
2014-07-01
... book-entry bonds through New Treasury Direct, an online system for holding Treasury securities. The Web... definitive savings bonds should follow online instructions for conversion. Regulations governing converted...
12 CFR 208.37 - Government securities sales practices.
Code of Federal Regulations, 2011 CFR
2011-01-01
...-institutional customer means any customer other than: (i) A bank, savings association, insurance company, or registered investment company; (ii) An investment adviser registered under section 203 of the Investment... Securities-Related Activities § 208.37 Government securities sales practices. (a) Scope. This subpart is...
Reducing the length of postnatal hospital stay: implications for cost and quality of care.
Bowers, John; Cheyne, Helen
2016-01-15
UK health services are under pressure to make cost savings while maintaining quality of care. Typically reducing the length of time patients stay in hospital and increasing bed occupancy are advocated to achieve service efficiency. Around 800,000 women give birth in the UK each year making maternity care a high volume, high cost service. Although average length of stay on the postnatal ward has fallen substantially over the years there is pressure to make still further reductions. This paper explores and discusses the possible cost savings of further reductions in length of stay, the consequences for postnatal services in the community, and the impact on quality of care. We draw on a range of pre-existing data sources including, national level routinely collected data, workforce planning data and data from national surveys of women's experience. Simulation and a financial model were used to estimate excess demand, work intensity and bed occupancy to explore the quantitative, organisational consequences of reducing the length of stay. These data are discussed in relation to findings of national surveys to draw inferences about potential impacts on cost and quality of care. Reducing the length of time women spend in hospital after birth implies that staff and bed numbers can be reduced. However, the cost savings may be reduced if quality and access to services are maintained. Admission and discharge procedures are relatively fixed and involve high cost, trained staff time. Furthermore, it is important to retain a sufficient bed contingency capacity to ensure a reasonable level of service. If quality of care is maintained, staffing and bed capacity cannot be simply reduced proportionately: reducing average length of stay on a typical postnatal ward by six hours or 17% would reduce costs by just 8%. This might still be a significant saving over a high volume service however, earlier discharge results in more women and babies with significant care needs at home. Quality and safety of care would also require corresponding increases in community based postnatal care. Simply reducing staffing in proportion to the length of stay increases the workload for each staff member resulting in poorer quality of care and increased staff stress. Many policy debates, such as that about the length of postnatal hospital-stay, demand consideration of multiple dimensions. This paper demonstrates how diverse data sources and techniques can be integrated to provide a more holistic analysis. Our study suggests that while earlier discharge from the postnatal ward may achievable, it may not generate all of the anticipated cost savings. Some useful savings may be realised but if staff and bed capacity are simply reduced in proportion to the length of stay, care quality may be compromised.
Implementation of a quantum random number generator based on the optimal clustering of photocounts
NASA Astrophysics Data System (ADS)
Balygin, K. A.; Zaitsev, V. I.; Klimov, A. N.; Kulik, S. P.; Molotkov, S. N.
2017-10-01
To implement quantum random number generators, it is fundamentally important to have a mathematically provable and experimentally testable process of measurements of a system from which an initial random sequence is generated. This makes sure that randomness indeed has a quantum nature. A quantum random number generator has been implemented with the use of the detection of quasi-single-photon radiation by a silicon photomultiplier (SiPM) matrix, which makes it possible to reliably reach the Poisson statistics of photocounts. The choice and use of the optimal clustering of photocounts for the initial sequence of photodetection events and a method of extraction of a random sequence of 0's and 1's, which is polynomial in the length of the sequence, have made it possible to reach a yield rate of 64 Mbit/s of the output certainly random sequence.
All-quad meshing without cleanup
Rushdi, Ahmad A.; Mitchell, Scott A.; Mahmoud, Ahmed H.; ...
2016-08-22
Here, we present an all-quad meshing algorithm for general domains. We start with a strongly balanced quadtree. In contrast to snapping the quadtree corners onto the geometric domain boundaries, we move them away from the geometry. Then we intersect the moved grid with the geometry. The resulting polygons are converted into quads with midpoint subdivision. Moving away avoids creating any flat angles, either at a quadtree corner or at a geometry–quadtree intersection. We are able to handle two-sided domains, and more complex topologies than prior methods. The algorithm is provably correct and robust in practice. It is cleanup-free, meaning wemore » have angle and edge length bounds without the use of any pillowing, swapping, or smoothing. Thus, our simple algorithm is fast and predictable. This paper has better quality bounds, and the algorithm is demonstrated over more complex domains, than our prior version.« less
All-quad meshing without cleanup
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rushdi, Ahmad A.; Mitchell, Scott A.; Mahmoud, Ahmed H.
Here, we present an all-quad meshing algorithm for general domains. We start with a strongly balanced quadtree. In contrast to snapping the quadtree corners onto the geometric domain boundaries, we move them away from the geometry. Then we intersect the moved grid with the geometry. The resulting polygons are converted into quads with midpoint subdivision. Moving away avoids creating any flat angles, either at a quadtree corner or at a geometry–quadtree intersection. We are able to handle two-sided domains, and more complex topologies than prior methods. The algorithm is provably correct and robust in practice. It is cleanup-free, meaning wemore » have angle and edge length bounds without the use of any pillowing, swapping, or smoothing. Thus, our simple algorithm is fast and predictable. This paper has better quality bounds, and the algorithm is demonstrated over more complex domains, than our prior version.« less
31 CFR 321.8 - Redemption-exchange of Series E and EE savings bonds and savings notes.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false Redemption-exchange of Series E and... UNITED STATES SAVINGS NOTES (FREEDOM SHARES) Scope of Authority § 321.8 Redemption-exchange of Series E... agent may make payment of eligible securities presented for redemption in exchange for Series HH bonds...
31 CFR 363.125 - How is payment made on a book-entry savings bond?
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false How is payment made on a book-entry... GOVERNING SECURITIES HELD IN TREASURYDIRECT Book-Entry Savings Bonds Purchased Through TreasuryDirect Payment § 363.125 How is payment made on a book-entry savings bond? We will make payment by the ACH method...
31 CFR 363.125 - How is payment made on a book-entry savings bond?
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false How is payment made on a book-entry... GOVERNING SECURITIES HELD IN TREASURYDIRECT Book-Entry Savings Bonds Purchased Through TreasuryDirect Payment § 363.125 How is payment made on a book-entry savings bond? We will make payment by the ACH method...
31 CFR 363.125 - How is payment made on a book-entry savings bond?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false How is payment made on a book-entry... GOVERNING SECURITIES HELD IN TREASURYDIRECT Book-Entry Savings Bonds Purchased Through TreasuryDirect Payment § 363.125 How is payment made on a book-entry savings bond? We will make payment by the ACH method...
31 CFR 363.125 - How is payment made on a book-entry savings bond?
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false How is payment made on a book-entry... GOVERNING SECURITIES HELD IN TREASURYDIRECT Book-Entry Savings Bonds Purchased Through TreasuryDirect Payment § 363.125 How is payment made on a book-entry savings bond? We will make payment by the ACH method...
31 CFR 363.125 - How is payment made on a book-entry savings bond?
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false How is payment made on a book-entry... GOVERNING SECURITIES HELD IN TREASURYDIRECT Book-Entry Savings Bonds Purchased Through TreasuryDirect Payment § 363.125 How is payment made on a book-entry savings bond? We will make payment by the ACH method...
31 CFR 25.406 - Savings clause.
Code of Federal Regulations, 2010 CFR
2010-07-01
... LOANS MADE BY THE DEFENSE SECURITY ASSISTANCE AGENCY AND FOREIGN MILITARY SALES LOANS MADE BY THE FEDERAL FINANCING BANK AND GUARANTEED BY THE DEFENSE SECURITY ASSISTANCE AGENCY Form of Private Loan § 25...
31 CFR 360.3 - Converting definitive savings bonds to book-entry bonds in New Treasury Direct.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Direct, an online system for holding Treasury securities. The Web address for New Treasury Direct is www.treasurydirect.gov. Bond owners who wish to convert their definitive savings bonds should follow online...
31 CFR 360.3 - Converting definitive savings bonds to book-entry bonds in New Treasury Direct.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Direct, an online system for holding Treasury securities. The Web address for New Treasury Direct is www.treasurydirect.gov. Bond owners who wish to convert their definitive savings bonds should follow online...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-24
... Activities; Proposed Information Collection; Comment Request; Securities Exchange Act Disclosure Rules (12 CFR Part 11) and Securities of Federal Savings Associations (12 CFR Part 194) AGENCY: Office of the... concerning its information collection titled, ``Securities Exchange Act Disclosure Rules (12 CFR part 11) and...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Williams, Charles; Green, Andrew S.; Dahle, Douglas
2013-08-01
The findings of this study indicate that potential exists in non-building applications to save energy and costs. This potential could save billions of federal dollars, reduce reliance on fossil fuels, increase energy independence and security, and reduce greenhouse gas emissions. The Federal Government has nearly twenty years of experience with achieving similar energy cost reductions, and letting the energy costs savings pay for themselves, by applying energy savings performance contracts (ESPC) inits buildings. Currently, the application of ESPCs is limited by statute to federal buildings. This study indicates that ESPCs can be a compatible and effective contracting tool for achievingmore » savings in non-building applications.« less
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Inclusion of subordinated debt securities and... FROM THE OFFICE OF THRIFT SUPERVISION State Savings Associations-Operations § 390.341 Inclusion of... seeking FDIC approval of, or non-objection to, the inclusion of covered securities in supplementary...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Inclusion of subordinated debt securities and... FROM THE OFFICE OF THRIFT SUPERVISION State Savings Associations-Operations § 390.341 Inclusion of... seeking FDIC approval of, or non-objection to, the inclusion of covered securities in supplementary...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Inclusion of subordinated debt securities and... FROM THE OFFICE OF THRIFT SUPERVISION State Savings Associations-Operations § 390.341 Inclusion of... seeking FDIC approval of, or non-objection to, the inclusion of covered securities in supplementary...
12 CFR 550.490 - When must I deposit securities with State authorities?
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 5 2011-01-01 2011-01-01 false When must I deposit securities with State authorities? 550.490 Section 550.490 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FIDUCIARY POWERS OF SAVINGS ASSOCIATIONS Depositing Securities With State Authorities § 550.490...
Should you outsource your hospital's security services? Some things to consider.
DiNapoli, David V
2014-01-01
The author, who has managed both in-house and contracted security services, states unequivocally that hospitals can save money by hiring a security company, but cautions that there may be other considerations involved. In this article he provides guidance on making valid and meaningful comparisons between the two options.
31 CFR 363.83 - May an account owner transfer a book-entry savings bond to a minor?
Code of Federal Regulations, 2010 CFR
2010-07-01
... REGULATIONS GOVERNING SECURITIES HELD IN TREASURYDIRECT Book-Entry Savings Bonds Purchased Through Treasury... owner may transfer a bond to a minor as a gift or pursuant to one of the specified exceptions in § 363...
Personal, Electronic, Secure National Library of Medicine Hosts Health Records Conference
... Bar Home Current Issue Past Issues EHR Personal, Electronic, Secure: National Library of Medicine Hosts Health Records ... One suggestion for saving money is to implement electronic personal health records. With this in mind, the ...
Energy-saving EPON Bandwidth Allocation Algorithm Supporting ONU's Sleep Mode
NASA Astrophysics Data System (ADS)
Zhang, Yinfa; Ren, Shuai; Liao, Xiaomin; Fang, Yuanyuan
2014-09-01
A new bandwidth allocation algorithm was presented by combining merits of the IPACT algorithm and the cyclic DBA algorithm based on the DBA algorithm for ONU's sleep mode. Simulation results indicate that compared with the normal mode ONU, the ONU's sleep mode can save about 74% of energy. The new algorithm has a smaller average packet delay and queue length in the upstream direction. While in the downstream direction, the average packet delay of the new algorithm is less than polling cycle Tcycle and the average queue length is less than the product of Tcycle and the maximum link rate. The new algorithm achieves a better compromise between energy-saving and ensuring quality of service.
ICU early physical rehabilitation programs: financial modeling of cost savings.
Lord, Robert K; Mayhew, Christopher R; Korupolu, Radha; Mantheiy, Earl C; Friedman, Michael A; Palmer, Jeffrey B; Needham, Dale M
2013-03-01
To evaluate the potential annual net cost savings of implementing an ICU early rehabilitation program. Using data from existing publications and actual experience with an early rehabilitation program in the Johns Hopkins Hospital Medical ICU, we developed a model of net financial savings/costs and presented results for ICUs with 200, 600, 900, and 2,000 annual admissions, accounting for both conservative- and best-case scenarios. Our example scenario provided a projected financial analysis of the Johns Hopkins Medical ICU early rehabilitation program, with 900 admissions per year, using actual reductions in length of stay achieved by this program. U.S.-based adult ICUs. Financial modeling of the introduction of an ICU early rehabilitation program. Net cost savings generated in our example scenario, with 900 annual admissions and actual length of stay reductions of 22% and 19% for the ICU and floor, respectively, were $817,836. Sensitivity analyses, which used conservative- and best-case scenarios for length of stay reductions and varied the per-day ICU and floor costs, across ICUs with 200-2,000 annual admissions, yielded financial projections ranging from -$87,611 (net cost) to $3,763,149 (net savings). Of the 24 scenarios included in these sensitivity analyses, 20 (83%) demonstrated net savings, with a relatively small net cost occurring in the remaining four scenarios, mostly when simultaneously combining the most conservative assumptions. A financial model, based on actual experience and published data, projects that investment in an ICU early rehabilitation program can generate net financial savings for U.S. hospitals. Even under the most conservative assumptions, the projected net cost of implementing such a program is modest relative to the substantial improvements in patient outcomes demonstrated by ICU early rehabilitation programs.
The impact of labor-saving technology on first birth intervals in rural Ethiopia.
Gibson, Mhairi; Mace, Ruth
2002-02-01
Across the developing world labor-saving technologies introduce considerable savings in the time and energy that women allocate to work. Hormonal studies on natural fertility populations indicate that such a reduction in energetic expenditure (rather than improved nutritional status alone) can lead to increased ovarian function. Other qualitative studies have highlighted a link between labor-saving technology and behavioral changes affecting subsequent age at marriage, which may affect fertility. This biodemographic study was designed to investigate whether these physiological and behavioral changes affect fertility at a population level by focusing on a recent water development scheme in Southern Ethiopia. The demographic consequences of a reduction in women's workload following the installation of water points, specifically the variation in length of first birth interval (time lapsed between marriage and first birth), are investigated. First birth interval length is closely associated with lifetime fertility in populations that do not practice contraception, longer intervals being associated with lower fertility. Using life tables and multivariate hazard modeling techniques a number of significant predictors of first birth interval length are identified. Covariates such as age at marriage, season of marriage, village ecology, and access to improved water supply have significant effects on variation in first birth intervals. When entered into models as a time-varying covariate, access to a water tap stand is associated with an immediate reduction in length of first birth intervals.
Audit Mechanisms for Provable Risk Management and Accountable Data Governance
2012-09-04
the same violation) and the effectiveness of policy interventions (e.g., data breach notification laws and government audits) in encouraging organizations to adopt accountable data governance practices.
On-Line Algorithms and Reverse Mathematics
NASA Astrophysics Data System (ADS)
Harris, Seth
In this thesis, we classify the reverse-mathematical strength of sequential problems. If we are given a problem P of the form ∀X(alpha(X) → ∃Zbeta(X,Z)) then the corresponding sequential problem, SeqP, asserts the existence of infinitely many solutions to P: ∀X(∀nalpha(Xn) → ∃Z∀nbeta(X n,Zn)). P is typically provable in RCA0 if all objects involved are finite. SeqP, however, is only guaranteed to be provable in ACA0. In this thesis we exactly characterize which sequential problems are equivalent to RCA0, WKL0, or ACA0.. We say that a problem P is solvable by an on-line algorithm if P can be solved according to a two-player game, played by Alice and Bob, in which Bob has a winning strategy. Bob wins the game if Alice's sequence of plays 〈a0, ..., ak〉 and Bob's sequence of responses 〈 b0, ..., bk〉 constitute a solution to P. Formally, an on-line algorithm A is a function that inputs an admissible sequence of plays 〈a 0, b0, ..., aj〉 and outputs a new play bj for Bob. (This differs from the typical definition of "algorithm", though quite often a concrete set of instructions can be easily deduced from A.). We show that SeqP is provable in RCA0 precisely when P is solvable by an on-line algorithm. Schmerl proved this result specifically for the graph coloring problem; we generalize Schmerl's result to any problem that is on-line solvable. To prove our separation, we introduce a principle called Predictk(r) that is equivalent to -WKL0 for standard k, r.. We show that WKL0 is sufficient to prove SeqP precisely when P has a solvable closed kernel. This means that a solution exists, and each initial segment of this solution is a solution to the corresponding initial segment of the problem. (Certain bounding conditions are necessary as well.) If no such solution exists, then SeqP is equivalent to ACA0 over RCA 0 + ISigma02; RCA0 alone suffices if only sequences of standard length are considered. We use different techniques from Schmerl to prove this separation, and in the process we improve some of Schmerl's results on Grundy colorings. In Chapter 4 we analyze a variety of applications, classifying their sequential forms by reverse-mathematical strength. This builds upon similar work by Dorais and Hirst and Mummert. We consider combinatorial applications such as matching problems and Dilworth's theorems, and we also consider classic algorithms such as the task scheduling and paging problems. Tables summarizing our findings can be found at the end of Chapter 4.
Code of Federal Regulations, 2010 CFR
2010-01-01
... offer to buy, a security or interest in a security, for value. However, these terms shall not include... or offer of a security which gives the holder a present or future right or privilege to convert the... includes a savings association. (10) Purchase and buy mean the same as in § 563b.25 of this chapter. (11...
Nuclear and Solar Energy: Implications for Homeland Security
2008-12-01
of New Nuclear Plants?" Nuclear Engineering International, March 31, 2004, 14. 10 Gwyneth Cravens, Power to Save the World: The Truth about...Pueblo West, CO: Vales Lake Pub, 2004), 98. 12 Cravens, Power to Save the World: The Truth about Nuclear Energy, 249. 13 Jerry Taylor, "Powering...Cravens, Power to Save the World: The Truth about Nuclear Energy, 152. 30 William Langewiesche, The Atomic Bazaar: Dispatches from the Underground World
NASA Astrophysics Data System (ADS)
Alaelddin, Fuad Yousif Mohammed; Newaz, S. H. Shah; Lee, Joohyung; Uddin, Mohammad Rakib; Lee, Gyu Myoung; Choi, Jun Kyun
2015-12-01
The majority of the traffic over the Internet is TCP based, which is very sensitive to packet loss and delay. Existing research efforts in TDM-Passive Optical Networks (TDM-PONs) mostly evaluate energy saving and traffic delay performances under different energy saving solutions. However, to the best of our knowledge, how energy saving mechanisms could affect TCP traffic performance in TDM-PONs has hardly been studied. In this paper, by means of our state-of-art OPNET Modular based TDM-PON simulator, we evaluate TCP traffic delay, throughput, and Optical Network Unit (ONU) energy consumption performances in a TDM-PON where energy saving mechanisms are employed in ONUs. Here, we study the performances under commonly used energy saving mechanisms defined in standards for TDM-PONs: cyclic sleep and doze mode. In cyclic sleep mode, we evaluate the performances under two well-known sleep interval length deciding algorithms (i.e. fixed sleep interval (FSI) and exponential sleep interval deciding (ESID)) that an OLT uses to decide sleep interval lengths for an ONU. Findings in this paper put forward the strong relationship among TCP traffic delay, throughput and ONU energy consumption under different sleep interval lengths. Moreover, we reveal that under high TCP traffic, both FSI and ESID will end up showing similar delay, energy and throughput performance. Our findings also show that doze mode can offer better TCP throughput and delay performance at the price of consuming more energy than cyclic sleep mode. In addition, our results provide a glimpse on understanding at what point doze mode becomes futile in improving energy saving of an ONU under TCP traffic. Furthermore, in this paper, we highlight important research issues that should be studied in future research to maximize energy saving in TDM-PONs while meeting traffic Quality of Service requirements.
Opportunity Texas[TM]: Learn. Earn. Save.
ERIC Educational Resources Information Center
Center for Public Policy Priorities, 2010
2010-01-01
Texas faces numerous challenges but also has abundant opportunities to build the middle class and increase prosperity. Unfortunately, too many Texans are on the sideline, lacking access to opportunities to learn, earn, and save to secure a more prosperous future for themselves and their families. To create jobs, increase income, and promote…
RSA-Based Password-Authenticated Key Exchange, Revisited
NASA Astrophysics Data System (ADS)
Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki
The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the. RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.
Harrington, Rachel; Lee, Edward; Yang, Hongbo; Wei, Jin; Messali, Andrew; Azie, Nkechi; Wu, Eric Q; Spalding, James
2017-01-01
Invasive aspergillosis (IA) is associated with a significant clinical and economic burden. The phase III SECURE trial demonstrated non-inferiority in clinical efficacy between isavuconazole and voriconazole. No studies have evaluated the cost-effectiveness of isavuconazole compared to voriconazole. The objective of this study was to evaluate the costs and cost-effectiveness of isavuconazole vs. voriconazole for the first-line treatment of IA from the US hospital perspective. An economic model was developed to assess the costs and cost-effectiveness of isavuconazole vs. voriconazole in hospitalized patients with IA. The time horizon was the duration of hospitalization. Length of stay for the initial admission, incidence of readmission, clinical response, overall survival rates, and experience of adverse events (AEs) came from the SECURE trial. Unit costs were from the literature. Total costs per patient were estimated, composed of drug costs, costs of AEs, and costs of hospitalizations. Incremental costs per death avoided and per additional clinical responders were reported. Deterministic and probabilistic sensitivity analyses (DSA and PSA) were conducted. Base case analysis showed that isavuconazole was associated with a $7418 lower total cost per patient than voriconazole. In both incremental costs per death avoided and incremental costs per additional clinical responder, isavuconazole dominated voriconazole. Results were robust in sensitivity analysis. Isavuconazole was cost saving and dominant vs. voriconazole in most DSA. In PSA, isavuconazole was cost saving in 80.2% of the simulations and cost-effective in 82.0% of the simulations at the $50,000 willingness to pay threshold per additional outcome. Isavuconazole is a cost-effective option for the treatment of IA among hospitalized patients. Astellas Pharma Global Development, Inc.
Teaching Aids in Consumer Economics, 1970-71.
ERIC Educational Resources Information Center
New York State Council on Economic Education, Albany.
The document consists of 12 consumer education units for grade 12: Consumer Purchasing; Purchasing Food, Clothing, Furniture, and Appliances; Purchasing and Maintaining an Automobile; Housing; Consumer Credit; Money Management; Fraud, Quackery, and Deception; Banking and Savings; Investments; Life Insurance; Security Programs (Social Security,…
Personal Retirement Accounts and Saving†
Aguila, Emma
2017-01-01
Aging populations are leading countries worldwide to social security reforms. Many countries are moving from pay-as-you-go to personal retirement account (PRA) systems because of their financial sustainability and positive impact on private savings. PRA systems boost private savings at a macro level by converting a government liability into financial wealth managed by private fund managers. However, at a micro level, changes in retirement wealth affect individuals' saving and consumption patterns through their working lives. Retirement wealth increased for lower-income workers after Mexico introduced PRAs, crowding out saving, increasing consumption, and offsetting some of the PRA effect on private savings. (JEL D14, E21, H55, J26, O16) PMID:28286607
77 FR 35681 - Formations of, Acquisitions by, and Mergers of Bank Holding Companies
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-14
...)(12); and issuing and selling money orders, savings bonds, traveler's checks and similar consumer... Securities, FSB, both in Dallas, Texas, and thereby engage in the operation of a savings association pursuant..., pursuant to section 225.28(b)(7); underwriting and dealing in government obligations and money market...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Preservation of benefits contained in savings clause of Immigration and Nationality Act Amendments of 1976. 204.7 Section 204.7 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS IMMIGRANT PETITIONS Immigrant Visa...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-29
... quality will meet this standard. National banks will have to meet this new standard before purchasing... at 12 U.S.C. 1831e(d)(1), which currently limits savings associations to purchasing corporate debt... explaining the due diligence national banks and Federal savings associations should conduct in purchasing...
Peng, Haipeng; Tian, Ye; Kurths, Jurgen; Li, Lixiang; Yang, Yixian; Wang, Daoshun
2017-06-01
Applications of wireless body area networks (WBANs) are extended from remote health care to military, sports, disaster relief, etc. With the network scale expanding, nodes increasing, and links complicated, a WBAN evolves to a body-to-body network. Along with the development, energy saving and data security problems are highlighted. In this paper, chaotic compressive sensing (CCS) is proposed to solve these two crucial problems, simultaneously. Compared with the traditional compressive sensing, CCS can save vast storage space by only storing the matrix generation parameters. Additionally, the sensitivity of chaos can improve the security of data transmission. Aimed at image transmission, modified CCS is proposed, which uses two encryption mechanisms, confusion and mask, and performs a much better encryption quality. Simulation is conducted to verify the feasibility and effectiveness of the proposed methods. The results show that the energy efficiency and security are strongly improved, while the storage space is saved. And the secret key is extremely sensitive, [Formula: see text] perturbation of the secret key could lead to a total different decoding, the relative error is larger than 100%. Particularly for image encryption, the performance of the modified method is excellent. The adjacent pixel correlation is smaller than 0.04 in different directions including horizontal, vertical, and diagonal; the entropy of the cipher image with a 256-level gray value is larger than 7.98.
Code of Federal Regulations, 2014 CFR
2014-07-01
..., SERIES EE Maturities, Redemption Values, and Investment Yields of Series EE Savings Bonds General... securities. This curve relates the yield on a security to its time to maturity. Yields at particular points...
Code of Federal Regulations, 2013 CFR
2013-07-01
..., SERIES EE Maturities, Redemption Values, and Investment Yields of Series EE Savings Bonds General... securities. This curve relates the yield on a security to its time to maturity. Yields at particular points...
Code of Federal Regulations, 2010 CFR
2010-07-01
..., SERIES EE Maturities, Redemption Values, and Investment Yields of Series EE Savings Bonds General... securities. This curve relates the yield on a security to its time to maturity. Yields at particular points...
2003-01-01
could influence their decisions about saving. Although most taxpayers would probably not change their saving plans, some people might save more to hedge ...that approach is that it would allow law- makers to create the appearance of new budgetary resources (sometimes incor- rectly described as " arbitrage ...Box 1 on pages 8 and 9). Budget analysts can avoid the appearance of arbitrage profits by using a risk- adjusted interest rate to value expected gains
Security Decision-Making in Pakistan
1980-09-01
intention of doing this job in worship, his 7life is a worship." But they are also reminded that: Sweat saves blood Blood saves life, Brain saves both...than anything else. In both Service First and Close Door, the military was called off the job before a thorough clean-up was made; in both cases, army...Some were opportunistic -59- job seekers but many were ir.tereztt;;a "- t i. military and were sincere nationalists. The official British analysIa of
Survey of cyber security issues in smart grids
NASA Astrophysics Data System (ADS)
Chen, Thomas M.
2010-04-01
The future smart grid will enable cost savings and lower energy use by means of smart appliances and smart meters which support dynamic load management and real-time monitoring of energy use and distribution. The introduction of two-way communications and control into power grid introduces security and privacy concerns. This talk will survey the security and privacy issues in smart grids using the NIST reference model, and relate these issues to cyber security in the Internet.
Research and realization of info-net security controlling system
NASA Astrophysics Data System (ADS)
Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen
2017-03-01
The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.
CHRR: coordinate hit-and-run with rounding for uniform sampling of constraint-based models
DOE Office of Scientific and Technical Information (OSTI.GOV)
Haraldsdóttir, Hulda S.; Cousins, Ben; Thiele, Ines
In constraint-based metabolic modelling, physical and biochemical constraints define a polyhedral convex set of feasible flux vectors. Uniform sampling of this set provides an unbiased characterization of the metabolic capabilities of a biochemical network. However, reliable uniform sampling of genome-scale biochemical networks is challenging due to their high dimensionality and inherent anisotropy. Here, we present an implementation of a new sampling algorithm, coordinate hit-and-run with rounding (CHRR). This algorithm is based on the provably efficient hit-and-run random walk and crucially uses a preprocessing step to round the anisotropic flux set. CHRR provably converges to a uniform stationary sampling distribution. Wemore » apply it to metabolic networks of increasing dimensionality. We show that it converges several times faster than a popular artificial centering hit-and-run algorithm, enabling reliable and tractable sampling of genome-scale biochemical networks.« less
NASA Astrophysics Data System (ADS)
Gerck, Ed
We present a new, comprehensive framework to qualitatively improve election outcome trustworthiness, where voting is modeled as an information transfer process. Although voting is deterministic (all ballots are counted), information is treated stochastically using Information Theory. Error considerations, including faults, attacks, and threats by adversaries, are explicitly included. The influence of errors may be corrected to achieve an election outcome error as close to zero as desired (error-free), with a provably optimal design that is applicable to any type of voting, with or without ballots. Sixteen voting system requirements, including functional, performance, environmental and non-functional considerations, are derived and rated, meeting or exceeding current public-election requirements. The voter and the vote are unlinkable (secret ballot) although each is identifiable. The Witness-Voting System (Gerck, 2001) is extended as a conforming implementation of the provably optimal design that is error-free, transparent, simple, scalable, robust, receipt-free, universally-verifiable, 100% voter-verified, and end-to-end audited.
CHRR: coordinate hit-and-run with rounding for uniform sampling of constraint-based models
Haraldsdóttir, Hulda S.; Cousins, Ben; Thiele, Ines; ...
2017-01-31
In constraint-based metabolic modelling, physical and biochemical constraints define a polyhedral convex set of feasible flux vectors. Uniform sampling of this set provides an unbiased characterization of the metabolic capabilities of a biochemical network. However, reliable uniform sampling of genome-scale biochemical networks is challenging due to their high dimensionality and inherent anisotropy. Here, we present an implementation of a new sampling algorithm, coordinate hit-and-run with rounding (CHRR). This algorithm is based on the provably efficient hit-and-run random walk and crucially uses a preprocessing step to round the anisotropic flux set. CHRR provably converges to a uniform stationary sampling distribution. Wemore » apply it to metabolic networks of increasing dimensionality. We show that it converges several times faster than a popular artificial centering hit-and-run algorithm, enabling reliable and tractable sampling of genome-scale biochemical networks.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-07
... Savings Program and the Innovation Center AGENCY: Centers for Medicare & Medicaid Services (CMS) and...) of the Social Security Act (of the Act), as added by the Affordable Care Act (ACA) authorizes the... payment and service delivery models by the Center for Medicare and Medicaid Innovation. This notice with...
2012-01-09
NASA Goddard Space Flight Center Financial Manager and White House 2011 SAVE award winner Matthew Ritsko is seen during a television interview at NASA Headquarters shortly after meeting with President Obama at the White House on Monday, Jan. 9, 2011, in Washington. The Presidential Securing Americans' Value and Efficiency (SAVE) program gives front-line federal workers the chance to submit their ideas on how their agencies can save money and work more efficiently. Matthew's proposal calls for NASA to create a "lending library" where specialized space tools and hardware purchased by one NASA organization will be made available to other NASA programs and projects. Photo Credit: (NASA/Bill Ingalls)
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Report. 168.4 Section 168.4 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 168.4 Report. The security officer for each Federal savings association shall report at least annually to the association's board of...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Report. 568.4 Section 568.4 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.4 Report. The security officer for each savings association shall report at least annually to the association's board of...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Report. 568.4 Section 568.4 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.4 Report. The security officer for each savings association shall report at least annually to the association's board of...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Report. 168.4 Section 168.4 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 168.4 Report. The security officer for each Federal savings association shall report at least annually to the association's board of...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Report. 568.4 Section 568.4 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.4 Report. The security officer for each savings association shall report at least annually to the association's board of...
Optimal prediction of the number of unseen species
Orlitsky, Alon; Suresh, Ananda Theertha; Wu, Yihong
2016-01-01
Estimating the number of unseen species is an important problem in many scientific endeavors. Its most popular formulation, introduced by Fisher et al. [Fisher RA, Corbet AS, Williams CB (1943) J Animal Ecol 12(1):42−58], uses n samples to predict the number U of hitherto unseen species that would be observed if t⋅n new samples were collected. Of considerable interest is the largest ratio t between the number of new and existing samples for which U can be accurately predicted. In seminal works, Good and Toulmin [Good I, Toulmin G (1956) Biometrika 43(102):45−63] constructed an intriguing estimator that predicts U for all t≤1. Subsequently, Efron and Thisted [Efron B, Thisted R (1976) Biometrika 63(3):435−447] proposed a modification that empirically predicts U even for some t>1, but without provable guarantees. We derive a class of estimators that provably predict U all of the way up to t∝logn. We also show that this range is the best possible and that the estimator’s mean-square error is near optimal for any t. Our approach yields a provable guarantee for the Efron−Thisted estimator and, in addition, a variant with stronger theoretical and experimental performance than existing methodologies on a variety of synthetic and real datasets. The estimators are simple, linear, computationally efficient, and scalable to massive datasets. Their performance guarantees hold uniformly for all distributions, and apply to all four standard sampling models commonly used across various scientific disciplines: multinomial, Poisson, hypergeometric, and Bernoulli product. PMID:27830649
Optimal prediction of the number of unseen species.
Orlitsky, Alon; Suresh, Ananda Theertha; Wu, Yihong
2016-11-22
Estimating the number of unseen species is an important problem in many scientific endeavors. Its most popular formulation, introduced by Fisher et al. [Fisher RA, Corbet AS, Williams CB (1943) J Animal Ecol 12(1):42-58], uses n samples to predict the number U of hitherto unseen species that would be observed if [Formula: see text] new samples were collected. Of considerable interest is the largest ratio t between the number of new and existing samples for which U can be accurately predicted. In seminal works, Good and Toulmin [Good I, Toulmin G (1956) Biometrika 43(102):45-63] constructed an intriguing estimator that predicts U for all [Formula: see text] Subsequently, Efron and Thisted [Efron B, Thisted R (1976) Biometrika 63(3):435-447] proposed a modification that empirically predicts U even for some [Formula: see text], but without provable guarantees. We derive a class of estimators that provably predict U all of the way up to [Formula: see text] We also show that this range is the best possible and that the estimator's mean-square error is near optimal for any t Our approach yields a provable guarantee for the Efron-Thisted estimator and, in addition, a variant with stronger theoretical and experimental performance than existing methodologies on a variety of synthetic and real datasets. The estimators are simple, linear, computationally efficient, and scalable to massive datasets. Their performance guarantees hold uniformly for all distributions, and apply to all four standard sampling models commonly used across various scientific disciplines: multinomial, Poisson, hypergeometric, and Bernoulli product.
Valuation of travel time savings in viewpoint of WTA.
Shao, Chang-Qiao; Liu, Yang; Liu, Xiao-Ming
2014-01-01
In order to investigate the issues in measurement of value of travel time savings (VTTS), the willingness-to-accept (WTA) for the private car owner is studied by using surveyed data. It is convincing that trip purpose, trip length, time savings, cost savings, income, and allowance from employee have effects on the WTA. Moreover, influences of these variables are not the same for different trip purposes. For commuting trips, effects of income and allowance from employee are significant while time savings and cost savings are dominated for leisure and shopping trips. It is also found that WTA is much higher than expected which implies that there are a group of drivers who are not prone to switching to other trip modes other than passenger car.
Davoren, Mary; Byrne, Orla; O'Connell, Paul; O'Neill, Helen; O'Reilly, Ken; Kennedy, Harry G
2015-11-23
Patients admitted to a secure forensic hospital are at risk of a long hospital stay. Forensic hospital beds are a scarce and expensive resource and ability to identify the factors predicting length of stay at time of admission would be beneficial. The DUNDRUM-1 triage security scale and DUNDRUM-2 triage urgency scale are designed to assess need for therapeutic security and urgency of that need while the HCR-20 predicts risk of violence. We hypothesized that items on the DUNDRUM-1 and DUNDRUM-2 scales, rated at the time of pre-admission assessment, would predict length of stay in a medium secure forensic hospital setting. This is a prospective study. All admissions to a medium secure forensic hospital setting were collated over a 54 month period (n = 279) and followed up for a total of 66 months. Each patient was rated using the DUNDRUM-1 triage security scale and DUNDRUM-2 triage urgency scale as part of a pre-admission assessment (n = 279) and HCR-20 within 2 weeks of admission (n = 187). Episodes of harm to self, harm to others and episodes of seclusion whilst an in-patient were collated. Date of discharge was noted for each individual. Diagnosis at the time of pre-admission assessment (adjustment disorder v other diagnosis), predicted legal status (sentenced v mental health order) and items on the DUNDRUM-1 triage security scale and the DUNDRUM-2 triage urgency scale, also rated at the time of pre-admission assessment, predicted length of stay in the forensic hospital setting. Need for seclusion following admission also predicted length of stay. These findings may form the basis for a structured professional judgment instrument, rated prior to or at time of admission, to assist in estimating length of stay for forensic patients. Such a tool would be useful to clinicians, service planners and commissioners given the high cost of secure psychiatric care.
Comparative costs of family planning services and hospital-based maternity care in Turkey.
Cakir, H V; Fabricant, S J; Kircalioğlu, F N
1996-01-01
The costs of running a recently established family planning program in the Turkish social security system were measured and compared with the costs of providing the medical services and nonmedical benefits for pregnant women. The undiscounted cost savings from averting pregnancy were estimated to exceed the program's recurrent costs by 17.6 to 1. Cost savings represent only 1 percent of all of the system's medical expenditures, but the family planning program is in an early stage, and potential savings could influence management decisionmaking regarding investments in specialized maternity hospitals.
School Security: A Growing Concern
ERIC Educational Resources Information Center
Walker, Milton G.
1976-01-01
Vandalism, trespassing, drug traffic, crowd control, automobile traffic, and emergencies such as fire or storms--these are the kinds of problems a school security system should be designed to eliminate or minimize. A preventive program can save more money than it costs and can improve the learning environment at the same time, says this writer.…
The Retirement Security of the Baby Boom Generation.
ERIC Educational Resources Information Center
Shoven, John B.
1995-01-01
The baby boom generation faces added uncertainty on their investments and perhaps lower realized rates of return on all components of their retirement savings, primarily because of their large number. Effects will be felt in the Social Security system and by pension plans and private investors. Individuals, employers, pension fund managers, and…
Quantum cryptography using coherent states: Randomized encryption and key generation
NASA Astrophysics Data System (ADS)
Corndorf, Eric
With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic objectives of key generation and direct data-encryption, a new quantum cryptographic principle is demonstrated wherein keyed coherent-state signal sets are employed. Taking advantage of the fundamental and irreducible quantum-measurement noise of coherent states, these schemes do not require the users to measure the influence of an attacker. Experimental key-generation and data encryption schemes based on these techniques, which are compatible with today's WDM fiber-optic telecommunications infrastructure, are implemented and analyzed.
Tax reform options: promoting retirement security.
VanDerhei, Jack
2011-11-01
TAX PROPOSALS: Currently, the combination of worker and employer contributions in a defined contribution plan is capped by the federal tax code at the lesser of $49,000 per year or 100 percent of a worker's compensation (participants over age 50 can make additional "catch-up" contributions). As part of the effort to lower the federal deficit and reduce federal "tax expenditures," two major reform proposals have surfaced that would change current tax policy toward retirement savings: A plan that would end the existing tax deductions for 401(k) contributions and replace them with a flat-rate refundable credit that serves as a matching contribution into a retirement savings account. The so-called "20/20 cap," included by the National Commission on Fiscal Responsibility and Reform in their December 2010 report, "The Moment of Truth," which would limit the sum of employer and worker annual contributions to the lower of $20,000 or 20 percent of income, the so-called "20/20 cap." IMPACT OF PERMANENTLY MODIFYING THE EXCLUSION OF EMPLOYEE CONTRIBUTIONS FOR RETIREMENT SAVINGS PLANS FROM TAXABLE INCOME: If the current exclusion of worker contributions for retirement savings plans were ended in 2012 and the total match remains constant, the average reductions in 401(k) accounts at Social Security normal retirement age would range from a low of 11.2 percent for workers currently ages 26-35 in the highest-income groups, to a high of 24.2 percent for workers in that age range in the lowest-income group. IMPACT OF "20/20 CAP": Earlier EBRI analysis of enacting the 20/20 cap starting in 2012 showed it would, as expected, most affect those with high income. However, EBRI also found the cap would cause a significant reduction in retirement savings by the lowest-income workers as well, and younger cohorts would experience larger reductions given their increased exposure to the proposal. IMPORTANCE OF EMPLOYER-SPONSORED RETIREMENT PLANS AND AUTO-ENROLLMENT: A key factor in future retirement income security is whether a worker has access to a retirement plan at work. EBRI has found that voluntary enrollment in 401(k) plans under the current set of tax incentives has the potential to generate a sum that, when combined with Social Security benefits, would replace a sizeable portion of a worker's preretirement income, and that auto-enrollment could produce even larger retirement accumulations. POTENTIAL INCREASE OF AMERICANS FACING INADEQUATE RETIREMENT INCOME: The potential increase of at-risk percentages resulting from (1) employer modifications to existing plans, and (2) a substantial portion of low-income households decreasing or eliminating future contributions to savings plans as a reaction to the proposed elimination of the exclusion of employee contributions for retirement savings plans from taxable income, needs to be analyzed carefully when considering the overall impact of proposals to change existing tax incentives for retirement savings.
Secure web-based access to radiology: forms and databases for fast queries
NASA Astrophysics Data System (ADS)
McColl, Roderick W.; Lane, Thomas J.
2002-05-01
Currently, Web-based access to mini-PACS or similar databases commonly utilizes either JavaScript, Java applets or ActiveX controls. Many sites do not permit applets or controls or other binary objects for fear of viruses or worms sent by malicious users. In addition, the typical CGI query mechanism requires several parameters to be sent with the http GET/POST request, which may identify the patient in some way; this in unacceptable for privacy protection. Also unacceptable are pages produced by server-side scripts which can be cached by the browser, since these may also contain sensitive information. We propose a simple mechanism for access to patient information, including images, which guarantees security of information, makes it impossible to bookmark the page, or to return to the page after some defined length of time. In addition, this mechanism is simple, therefore permitting rapid access without the need to initially download an interface such as an applet or control. In addition to image display, the design of the site allows the user to view and save movies of multi-phasic data, or to construct multi-frame datasets from entire series. These capabilities make the site attractive for research purposes such as teaching file preparation.
Jou, Jonathan D; Jain, Swati; Georgiev, Ivelin S; Donald, Bruce R
2016-06-01
Sparse energy functions that ignore long range interactions between residue pairs are frequently used by protein design algorithms to reduce computational cost. Current dynamic programming algorithms that fully exploit the optimal substructure produced by these energy functions only compute the GMEC. This disproportionately favors the sequence of a single, static conformation and overlooks better binding sequences with multiple low-energy conformations. Provable, ensemble-based algorithms such as A* avoid this problem, but A* cannot guarantee better performance than exhaustive enumeration. We propose a novel, provable, dynamic programming algorithm called Branch-Width Minimization* (BWM*) to enumerate a gap-free ensemble of conformations in order of increasing energy. Given a branch-decomposition of branch-width w for an n-residue protein design with at most q discrete side-chain conformations per residue, BWM* returns the sparse GMEC in O([Formula: see text]) time and enumerates each additional conformation in merely O([Formula: see text]) time. We define a new measure, Total Effective Search Space (TESS), which can be computed efficiently a priori before BWM* or A* is run. We ran BWM* on 67 protein design problems and found that TESS discriminated between BWM*-efficient and A*-efficient cases with 100% accuracy. As predicted by TESS and validated experimentally, BWM* outperforms A* in 73% of the cases and computes the full ensemble or a close approximation faster than A*, enumerating each additional conformation in milliseconds. Unlike A*, the performance of BWM* can be predicted in polynomial time before running the algorithm, which gives protein designers the power to choose the most efficient algorithm for their particular design problem.
Energy Expenditure of Trotting Gait Under Different Gait Parameters
NASA Astrophysics Data System (ADS)
Chen, Xian-Bao; Gao, Feng
2017-07-01
Robots driven by batteries are clean, quiet, and can work indoors or in space. However, the battery endurance is a great problem. A new gait parameter design energy saving strategy to extend the working hours of the quadruped robot is proposed. A dynamic model of the robot is established to estimate and analyze the energy expenditures during trotting. Given a trotting speed, optimal stride frequency and stride length can minimize the energy expenditure. However, the relationship between the speed and the optimal gait parameters is nonlinear, which is difficult for practical application. Therefore, a simplified gait parameter design method for energy saving is proposed. A critical trotting speed of the quadruped robot is found and can be used to decide the gait parameters. When the robot is travelling lower than this speed, it is better to keep a constant stride length and change the cycle period. When the robot is travelling higher than this speed, it is better to keep a constant cycle period and change the stride length. Simulations and experiments on the quadruped robot show that by using the proposed gait parameter design approach, the energy expenditure can be reduced by about 54% compared with the 100 mm stride length under 500 mm/s speed. In general, an energy expenditure model based on the gait parameter of the quadruped robot is built and the trotting gait parameters design approach for energy saving is proposed.
77 FR 213 - United States Savings Bonds, Series EE and I
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-04
... (APA). Because this rule relates to United States securities, which are contracts between Treasury and the owner of the security, this rule falls within the contract exception to the APA, 5 U.S.C. 553(a)(2). As a result, the notice, public comment, and delayed effective date provisions of the APA are...
12 CFR 563.76 - Offers and sales of securities at an office of a savings association.
Code of Federal Regulations, 2010 CFR
2010-01-01
... connection with the association's conversion from the mutual to stock form of organization in a conversion approved pursuant to part 563b of this chapter may be offered and sold at the association's offices... commissions consistent with industry norms may be paid to securities personnel of registered broker-dealers...
Using History to Save Our Nation
ERIC Educational Resources Information Center
Bryant, James A., Jr.
2005-01-01
In this article, the author presents how the tools and skills of a historian has made it possible to hold accountable the executive branch of the federal government in the 9/11 terrorist attacks in New York City and Washington DC. Historian Philip Zelig made it possible to secure the testimony of National Security Advisor Condoleeza Rice--a…
Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho
2015-01-01
A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).
Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho
2015-01-01
A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks). PMID:25849359
NASA Astrophysics Data System (ADS)
Chau, H. F.; Wang, Qinan; Wong, Cardythy
2017-02-01
Recently, Chau [Phys. Rev. A 92, 062324 (2015), 10.1103/PhysRevA.92.062324] introduced an experimentally feasible qudit-based quantum-key-distribution (QKD) scheme. In that scheme, one bit of information is phase encoded in the prepared state in a 2n-dimensional Hilbert space in the form (|i > ±|j >) /√{2 } with n ≥2 . For each qudit prepared and measured in the same two-dimensional Hilbert subspace, one bit of raw secret key is obtained in the absence of transmission error. Here we show that by modifying the basis announcement procedure, the same experimental setup can generate n bits of raw key for each qudit prepared and measured in the same basis in the noiseless situation. The reason is that in addition to the phase information, each qudit also carries information on the Hilbert subspace used. The additional (n -1 ) bits of raw key comes from a clever utilization of this extra piece of information. We prove the unconditional security of this modified protocol and compare its performance with other existing provably secure qubit- and qudit-based protocols on market in the one-way classical communication setting. Interestingly, we find that for the case of n =2 , the secret key rate of this modified protocol using nondegenerate random quantum code to perform one-way entanglement distillation is equal to that of the six-state scheme.
ERIC Educational Resources Information Center
US Senate, 2004
2004-01-01
The Subcommittee conducted an oversight hearing on Section 529 College Savings Plans, State-sponsored investments that are designed to encourage families to save money for their children's college education. Section 529 refers to the Internal Revenue Code section that authorizes and confers special tax treatment on these entities. Section 529…
Proof of cipher text ownership based on convergence encryption
NASA Astrophysics Data System (ADS)
Zhong, Weiwei; Liu, Zhusong
2017-08-01
Cloud storage systems save disk space and bandwidth through deduplication technology, but with the use of this technology has been targeted security attacks: the attacker can get the original file just use hash value to deceive the server to obtain the file ownership. In order to solve the above security problems and the different security requirements of cloud storage system files, an efficient information theory security proof of ownership scheme is proposed. This scheme protects the data through the convergence encryption method, and uses the improved block-level proof of ownership scheme, and can carry out block-level client deduplication to achieve efficient and secure cloud storage deduplication scheme.
2003-05-19
www.bbc.co.uk/cgi-bin/history/renderplain.pl?file=history/war/wwtwo/spying/sis_0/> [27 March 2003]. 37 Ibid. 38 “Operation Overlord,” Saving Private Ryan Online...Security, (Washington, DC: 2002), 17; National Strategy for Combating Terrorism. Washington, DC: 2003. “Operation Overlord,” Saving Private Ryan Online
Code of Federal Regulations, 2014 CFR
2014-04-01
... paragraph (a) reflecting the sale and redemption of United States Savings Bonds, United States Savings Notes... capital of at least $20,000,000, including debt subordinated in accordance with Appendix D of § 240.15c3-1...,000, including debt subordinated in accordance with Appendix D of § 240.15c3-1 of this title, as...
Code of Federal Regulations, 2012 CFR
2012-04-01
... paragraph (a) reflecting the sale and redemption of United States Savings Bonds, United States Savings Notes... capital of at least $20,000,000, including debt subordinated in accordance with Appendix D of § 240.15c3-1...,000, including debt subordinated in accordance with Appendix D of § 240.15c3-1 of this title, as...
Code of Federal Regulations, 2013 CFR
2013-04-01
... paragraph (a) reflecting the sale and redemption of United States Savings Bonds, United States Savings Notes... capital of at least $20,000,000, including debt subordinated in accordance with Appendix D of § 240.15c3-1...,000, including debt subordinated in accordance with Appendix D of § 240.15c3-1 of this title, as...
Code of Federal Regulations, 2011 CFR
2011-04-01
... paragraph (a) reflecting the sale and redemption of United States Savings Bonds, United States Savings Notes... capital of at least $20,000,000, including debt subordinated in accordance with Appendix D of § 240.15c3-1...,000, including debt subordinated in accordance with Appendix D of § 240.15c3-1 of this title, as...
Economics and National Security: Issues and Implications for U.S. Policy
2011-01-04
reduction between 2012 and 2015 through cuts in discretionary spending, tax reform, health care cost containment, mandatory savings, Social ...economic policy: • market capitalism was superior to socialism (high standards of living, vibrant entrepreneurs, and innovation were nourished best by...federal budget and its deficit; on the ability of the economy to fund both national defense and social programs and on issues such as savings
Rep. McCotter, Thaddeus G. [R-MI-11
2011-09-12
House - 09/19/2011 Referred for a period ending not later than September 19, 2011, (or for a later time if the Chairman so designates) to the Subcommittee on Social Security, in each case for consideration of such provisions as fall within the jurisdiction of the subcommittee... (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Rep. Murphy, Patrick [D-FL-18
2013-09-19
House - 10/15/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Precautionary Savings in Mexico: Evidence from the Mexican Health and Aging Study
Velandia Naranjo, Durfari; van Gameren, Edwin
2016-01-01
Precautionary saving is the additional saving done by individuals to protect them financially in situations of uncertainty and reduce their vulnerability for negative shocks that may affect their consumption levels. This paper investigates the existence and extent of savings motivated by precaution in Mexico for people aged between 50 and 75, using data from the Mexican Health and Ageing Study 2003. The empirical strategy is based on a test of the direct relationship between the accumulated wealth and the uncertainty generated by the social security status, in particular the availability of health insurance, accounting also for the expectation to receive a retirement pension. The endogeneity-corrected estimates do not yield results that unequivocally support the existence of private savings as a risk protection mechanism, implying that the public protection system has an important role in reducing the vulnerability of the population studied. PMID:27698512
NASA Astrophysics Data System (ADS)
Han, Yishi; Luo, Zhixiao; Wang, Jianhua; Min, Zhixuan; Qin, Xinyu; Sun, Yunlong
2014-09-01
In general, context-based adaptive variable length coding (CAVLC) decoding in H.264/AVC standard requires frequent access to the unstructured variable length coding tables (VLCTs) and significant memory accesses are consumed. Heavy memory accesses will cause high power consumption and time delays, which are serious problems for applications in portable multimedia devices. We propose a method for high-efficiency CAVLC decoding by using a program instead of all the VLCTs. The decoded codeword from VLCTs can be obtained without any table look-up and memory access. The experimental results show that the proposed algorithm achieves 100% memory access saving and 40% decoding time saving without degrading video quality. Additionally, the proposed algorithm shows a better performance compared with conventional CAVLC decoding, such as table look-up by sequential search, table look-up by binary search, Moon's method, and Kim's method.
Families, dependencies, and the moral ground of health savings accounts.
Bishop, Jeffrey P
2012-12-01
Health Savings Accounts have been marginalized in the West. In Singapore, however, they are foundational to the financing of health care. In this brief essay, I shall begin to sketch a justification for Health Savings Accounts. The family has always been thought of as a mere prolegomena to the polis and to be primarily about securing the goods of material life: food, shelter, intimacy. I shall first explore the recent scientific literature on the communal nature of human thriving and follow it with a phenomenological account of human dependency. I shall claim that in securing the material means to sustain life, the family is also involved in the creation of the life-world of the child. That means that the bare necessities of life met in families are not merely about sustaining bodily life but are also part of the meaning-making aspects of life. The family then should have recourse to the material means of life-and-death decisions, because it is in these life-and-death decisions that the families' life-world of values is to be deployed.
Rep. McCollum, Betty [D-MN-4
2013-02-15
House - 04/08/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
75 FR 32840 - Securities Offering Disclosures
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-09
... make an informed investment decision regarding a possible purchase or sale of a savings association's... control number. As part of the approval process, we invite comments on the following information...
Value drivers: an approach for estimating health and disease management program savings.
Phillips, V L; Becker, Edmund R; Howard, David H
2013-12-01
Health and disease management (HDM) programs have faced challenges in documenting savings related to their implementation. The objective of this eliminate study was to describe OptumHealth's (Optum) methods for estimating anticipated savings from HDM programs using Value Drivers. Optum's general methodology was reviewed, along with details of 5 high-use Value Drivers. The results showed that the Value Driver approach offers an innovative method for estimating savings associated with HDM programs. The authors demonstrated how real-time savings can be estimated for 5 Value Drivers commonly used in HDM programs: (1) use of beta-blockers in treatment of heart disease, (2) discharge planning for high-risk patients, (3) decision support related to chronic low back pain, (4) obesity management, and (5) securing transportation for primary care. The validity of savings estimates is dependent on the type of evidence used to gauge the intervention effect, generating changes in utilization and, ultimately, costs. The savings estimates derived from the Value Driver method are generally reasonable to conservative and provide a valuable framework for estimating financial impacts from evidence-based interventions.
2017-03-01
FINAL REPORT Demonstration of Energy Savings in Commercial Buildings for Tiered Trim and Respond Method in Resetting Static Pressure for VAV...release Page Intentionally Left Blank This report was prepared under contract to the Department of Defense Environmental Security Technology...Certification Program (ESTCP). The publication of this report does not indicate endorsement by the Department of Defense, nor should the contents be
Homeland Security: Budget-in-Brief FY 2006
2005-01-11
nearly 11,000 undocumented migrants attempting to enter the country illegally by sea. • USCG saved the lives of nearly 5,500 mariners in distress and...well as more than 1,368 arrests and 895 indictments for money laundering and other financial crimes. ICE agents also conducted more than 2,500...than merely across the border. This program improves control of the border and save lives by returning Mexican migrants into the interior of Mexico
Tscheulin, Dieter K; Drevs, Florian
2010-04-01
The potential of secondary prevention measures, such as cancer screening, to produce cost savings in the healthcare sector is a controversial issue in healthcare economics. Potential savings are calculated by comparing treatment costs with the cost of a prevention program. When survivors' subsequent unrelated health care costs are included in the calculation, however, the overall cost of disease prevention rises. What have not been studied to date are the secondary effects of fatal disease prevention measures on social security systems. From the perspective of a policy maker responsible for a social security system budget, it is not only future healthcare costs that are relevant for budgeting, but also changes in the contributions to, and expenditures from, statutory pension insurance and health insurance systems. An examination of the effect of longer life expectancies on these insurance systems can be justified by the fact that European social security systems are regulated by the state, and there is no clear separation between the financing of individual insurance systems due to cross-subsidisation. This paper looks at how the results of cost-comparison analyses vary depending on the inclusion or exclusion of future healthcare and non-healthcare costs, using the example of colorectal cancer screening in the German general population. In contrast to previous studies, not only are future unrelated medical costs considered, but also the effects on the social security system. If a German colorectal cancer screening program were implemented, and unrelated future medical care were excluded from the cost-benefit analysis, savings of up to 548 million euros per year would be expected. The screening program would, at the same time, generate costs in the healthcare sector as well as in the social security system of 2,037 million euros per year. Because the amount of future contributions and expenditures in the social security system depends on the age and gender of the recipients of the screening program (i.e. survivors of a typically fatal condition), the impact of age and gender on the results of a cost-comparison analysis of colorectal cancer screening are presented and discussed. Our study shows that colorectal cancer screening generates individual cost savings in the social security system up to a life expectancy of 60 years. Beyond that age, the balance between a recipient's social security contributions and insurance system expenditure is negative. The paper clarifies the relevance of healthcare costs not related to the prevented disease to the economic evaluation of prevention programs, particularly in the case of fatal diseases such as colorectal cancer. The results of the study imply that, from an economic perspective, the participation of at-risk individuals in disease prevention programs should be promoted.
A Provably Necessary Symbiosis
ERIC Educational Resources Information Center
Hochberg, Robert; Gabric, Kathleen
2010-01-01
The "new biology" of the 21st century is increasingly dependent on mathematics, and preparing high school students to have both strong science and math skills has created major challenges for both disciplines. Researchers and educators in biology and mathematics have been working long hours on a project to create high school teaching modules…
MacDonald, Glen M
2010-12-14
The current Southwest drought is exceptional for its high temperatures and arguably the most severe in history. Coincidentally, there has been an increase in forest and woodland mortality due to fires and pathogenic outbreaks. Although the high temperatures and aridity are consistent with projected impacts of greenhouse warming, it is unclear whether the drought can be attributed to increased greenhouse gases or is a product of natural climatic variability. Climate models indicate that the 21st century will be increasingly arid and droughts more severe and prolonged. Forest and woodland mortality due to fires and pathogens will increase. Demography and food security dictate that water demand in the Southwest will remain appreciable. If projected population growth is twinned with suburb-centered development, domestic demands will intensify. Meeting domestic demands through transference from agriculture presents concerns for rural sustainability and food security. Environmental concerns will limit additional transference from rivers. It is unlikely that traditional supply-side solutions such as more dams will securely meet demands at current per-capita levels. Significant savings in domestic usage can be realized through decreased applications of potable water to landscaping, but this is a small fraction of total regional water use, which is dominated by agriculture. Technical innovations, policy measures, and market-based solutions that increase supply and decrease water demand are all needed. Meeting 21st-century sustainability challenges in the Southwest will also require planning, cooperation, and integration that surpass 20th-century efforts in terms of geographic scope, jurisdictional breadth, multisectoral engagement, and the length of planning timelines.
Water, climate change, and sustainability in the southwest
2010-01-01
The current Southwest drought is exceptional for its high temperatures and arguably the most severe in history. Coincidentally, there has been an increase in forest and woodland mortality due to fires and pathogenic outbreaks. Although the high temperatures and aridity are consistent with projected impacts of greenhouse warming, it is unclear whether the drought can be attributed to increased greenhouse gasses or is a product of natural climatic variability. Climate models indicate that the 21st century will be increasingly arid and droughts more severe and prolonged. Forest and woodland mortality due to fires and pathogens will increase. Demography and food security dictate that water demand in the Southwest will remain appreciable. If projected population growth is twinned with suburb-centered development, domestic demands will intensify. Meeting domestic demands through transference from agriculture presents concerns for rural sustainability and food security. Environmental concerns will limit additional transference from rivers. It is unlikely that traditional supply-side solutions such as more dams will securely meet demands at current per-capita levels. Significant savings in domestic usage can be realized through decreased applications of potable water to landscaping, but this is a small fraction of total regional water use, which is dominated by agriculture. Technical innovations, policy measures, and market-based solutions that increase supply and decrease water demand are all needed. Meeting 21st-century sustainability challenges in the Southwest will also require planning, cooperation, and integration that surpass 20th-century efforts in terms of geographic scope, jurisdictional breadth, multisectoral engagement, and the length of planning timelines. PMID:21149704
78 FR 41101 - Proposed Exemptions From Certain Prohibited Transaction Restrictions
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-09
...This document contains notices of pendency before the Department of Labor (the Department) of proposed exemptions from certain of the prohibited transaction restrictions of the Employee Retirement Income Security Act of 1974 (ERISA or the Act) and/or the Internal Revenue Code of 1986 (the Code). This notice includes the following proposed exemptions: D-11640, Wells Fargo Bank, N.A. (the Applicant or the Bank); D-11772, UBS AG (UBS or the Applicant); and D- 11739, D-11740, & D-11741, Sears Holdings Savings Plan (the Savings Plan), Sears Holdings Puerto Rico Savings Plan (the PR Plan) and The Lands' End, Inc. Retirement Plan (the Lands' End Plan).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Molotkov, S. N., E-mail: sergei.molotkov@gmail.com
2012-12-15
Any key-generation session contains a finite number of quantum-state messages, and it is there-fore important to understand the fundamental restrictions imposed on the minimal length of a string required to obtain a secret key with a specified length. The entropy uncertainty relations for smooth min and max entropies considerably simplify and shorten the proof of security. A proof of security of quantum key distribution with phase-temporal encryption is presented. This protocol provides the maximum critical error compared to other protocols up to which secure key distribution is guaranteed. In addition, unlike other basic protocols (of the BB84 type), which aremore » vulnerable with respect to an attack by 'blinding' of avalanche photodetectors, this protocol is stable with respect to such an attack and guarantees key security.« less
Sulo, Suela; Feldstein, Josh; Partridge, Jamie; Schwander, Bjoern; Sriram, Krishnan; Summerfelt, Wm. Thomas
2017-01-01
Background Nutrition interventions can alleviate the burden of malnutrition by improving patient outcomes; however, evidence on the economic impact of medical nutrition intervention remains limited. A previously published nutrition-focused quality improvement program targeting malnourished hospitalized patients showed that screening patients with a validated screening tool at admission, rapidly administering oral nutritional supplements, and educating patients on supplement adherence result in significant reductions in 30-day unplanned readmissions and hospital length of stay. Objectives To assess the potential cost-savings associated with decreased 30-day readmissions and hospital length of stay in malnourished inpatients through a nutrition-focused quality improvement program using a web-based budget impact model, and to demonstrate the clinical and fiscal value of the intervention. Methods The reduction in readmission rate and length of stay for 1269 patients enrolled in the quality improvement program (between October 13, 2014, and April 2, 2015) were compared with the pre–quality improvement program baseline and validation cohorts (4611 patients vs 1319 patients, respectively) to calculate potential cost-savings as well as to inform the design of the budget impact model. Readmission rate and length-of-stay reductions were calculated by determining the change from baseline to post–quality improvement program as well as the difference between the validation cohort and the post–quality improvement program, respectively. Results As a result of improved health outcomes for the treated patients, the nutrition-focused quality improvement program led to a reduction in 30-day hospital readmissions and length of stay. The avoided hospital readmissions and reduced number of days in the hospital for the patients in the quality improvement program resulted in cost-savings of $1,902,933 versus the pre–quality improvement program baseline cohort, and $4,896,758 versus the pre–quality improvement program in the validation cohort. When these costs were assessed across the entire patient population enrolled in the quality improvement program, per-patient net savings of $1499 when using the baseline cohort as the comparator and savings per patient treated of $3858 when using the validated cohort as the comparator were achieved. Conclusion The nutrition-focused quality improvement program reduced the per-patient healthcare costs by avoiding 30-day readmissions and through reduced length of hospital stay. These clinical and economic outcomes provide a rationale for merging patient care and financial modeling to advance the delivery of value-based medicine in a malnourished hospitalized population. The use of a novel web-based budget impact model supports the integration of comparative effectiveness analytics and healthcare resource management in the hospital setting to provide optimal quality of care at a reduced overall cost. PMID:28975010
Sulo, Suela; Feldstein, Josh; Partridge, Jamie; Schwander, Bjoern; Sriram, Krishnan; Summerfelt, Wm Thomas
2017-07-01
Nutrition interventions can alleviate the burden of malnutrition by improving patient outcomes; however, evidence on the economic impact of medical nutrition intervention remains limited. A previously published nutrition-focused quality improvement program targeting malnourished hospitalized patients showed that screening patients with a validated screening tool at admission, rapidly administering oral nutritional supplements, and educating patients on supplement adherence result in significant reductions in 30-day unplanned readmissions and hospital length of stay. To assess the potential cost-savings associated with decreased 30-day readmissions and hospital length of stay in malnourished inpatients through a nutrition-focused quality improvement program using a web-based budget impact model, and to demonstrate the clinical and fiscal value of the intervention. The reduction in readmission rate and length of stay for 1269 patients enrolled in the quality improvement program (between October 13, 2014, and April 2, 2015) were compared with the pre-quality improvement program baseline and validation cohorts (4611 patients vs 1319 patients, respectively) to calculate potential cost-savings as well as to inform the design of the budget impact model. Readmission rate and length-of-stay reductions were calculated by determining the change from baseline to post-quality improvement program as well as the difference between the validation cohort and the post-quality improvement program, respectively. As a result of improved health outcomes for the treated patients, the nutrition-focused quality improvement program led to a reduction in 30-day hospital readmissions and length of stay. The avoided hospital readmissions and reduced number of days in the hospital for the patients in the quality improvement program resulted in cost-savings of $1,902,933 versus the pre-quality improvement program baseline cohort, and $4,896,758 versus the pre-quality improvement program in the validation cohort. When these costs were assessed across the entire patient population enrolled in the quality improvement program, per-patient net savings of $1499 when using the baseline cohort as the comparator and savings per patient treated of $3858 when using the validated cohort as the comparator were achieved. The nutrition-focused quality improvement program reduced the per-patient healthcare costs by avoiding 30-day readmissions and through reduced length of hospital stay. These clinical and economic outcomes provide a rationale for merging patient care and financial modeling to advance the delivery of value-based medicine in a malnourished hospitalized population. The use of a novel web-based budget impact model supports the integration of comparative effectiveness analytics and healthcare resource management in the hospital setting to provide optimal quality of care at a reduced overall cost.
Optimization of NTP System Truss to Reduce Radiation Shield Mass
NASA Technical Reports Server (NTRS)
Scharber, Luke L.; Kharofa, Adam; Caffrey, Jarvis A.
2016-01-01
The benefits of nuclear thermal propulsion are numerous and relevant to the current NASA mission goals involving but not limited to the crewed missions to mars and the moon. They do however also present new and unique challenges to the design and logistics of launching/operating spacecraft. One of these challenges, relevant to this discussion, is the significant mass of the shielding which is required to ensure an acceptable radiation environment for the spacecraft and crew. Efforts to reduce shielding mass are difficult to accomplish from material and geometric design points of the shield itself, however by increasing the distance between the nuclear engines and the main body of the spacecraft the required mass of the shielding is lessened considerably. The mass can be reduced significantly per unit length, though any additional mass added by the structure to create this distance serves to offset those savings, thus the design of a lightweight structure is ideal. The challenges of designing the truss are bounded by several limiting factors including; the loading conditions, the capabilities of the launch vehicle, and achieving the ideal truss length when factoring for the overall mass reduced. Determining the overall set of mass values for a truss of varying length is difficult since to maintain an optimally designed truss the geometry of the truss or its members must change. Thus the relation between truss mass and length for these loading scenarios is not linear, and instead has relation determined by the truss design. In order to establish a mass versus length trend for various truss designs to compare with the mass saved from the shield versus length, optimization software was used to find optimal geometric properties that still met the design requirements at established lengths. By solving for optimal designs at various lengths, mass trends could be determined. The initial design findings show a clear benefit to extending the engines as far from the main structure of the spacecraft as the launch vehicle's payload volume would allow when comparing mass savings verse the additional structure.
Save Our Seniors' Social Security Act of 2009
Rep. Granger, Kay [R-TX-12
2009-09-30
House - 10/01/2009 Referred to the Subcommittee on Railroads, Pipelines, and Hazardous Materials. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Future Warfare: Anthology Revised Edition
2001-06-01
film “ Saving Private Ryan ” are compelling and chilling. But the information age promises to make ground combat considerably less destructive that the...116 Saving Private Ryan , 80–81 Schwarzkopf, Norman, 242, 243–244 Science and technology, 191–202 Scipio, 44 Security beyond the year 2010, 128–131, 137... Private Ryan ” where the true horror of face-to-face ground combat is driven into the psyche of the movie goer. I am increasingly convinced, however
Acquisition Savings Reform Act of 2011
Sen. Brown, Scott P. [R-MA
2011-10-19
Senate - 10/19/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Save More Tomorrow Act of 2012
Sen. Akaka, Daniel K. [D-HI
2012-05-14
Senate - 05/14/2012 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
20 CFR 418.1010 - Definitions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... means the Social Security Act, as amended. (10) Title means a title of the Act. (11) We, our, or us...) Tax-exempt interest income; (ii) Income from United States savings bonds used to pay higher education...
Buy Smarter and Save Act of 2013
Sen. Begich, Mark [D-AK
2013-07-16
Senate - 07/16/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Save America Comprehensive Immigration Act of 2009
Rep. Jackson-Lee, Sheila [D-TX-18
2009-01-07
House - 02/09/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Cost Savings Enhancements Act of 2012
Sen. Paul, Rand [R-KY
2012-02-09
Senate - 02/09/2012 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Software For Computer-Security Audits
NASA Technical Reports Server (NTRS)
Arndt, Kate; Lonsford, Emily
1994-01-01
Information relevant to potential breaches of security gathered efficiently. Automated Auditing Tools for VAX/VMS program includes following automated software tools performing noted tasks: Privileged ID Identification, program identifies users and their privileges to circumvent existing computer security measures; Critical File Protection, critical files not properly protected identified; Inactive ID Identification, identifications of users no longer in use found; Password Lifetime Review, maximum lifetimes of passwords of all identifications determined; and Password Length Review, minimum allowed length of passwords of all identifications determined. Written in DEC VAX DCL language.
Pension decisions in a changing economy: gender, structure, and choice.
Hardy, M A; Shuey, K
2000-09-01
As responsibility for financial security in retirement becomes more individualized, understanding the distribution and determinants of savings behavior grows in importance. Employed men and women often gain access to their pension assets when they change jobs. In this study gender differences in pre-retirement access to and disposition of accumulated pension assets are examined. The authors used data from the Health and Retirement Study to model pension participation, disposition of pension assets, and use of cash settlements derived from a pension plan in a previous job. Logit models provided estimates of gender differences in access to pensions and the preservation of pension funds for retirement. Women were less likely to have participated in employer-sponsored pension plans; more likely to cash out accumulated pension assets when they changed jobs; and, when job changes occurred at relatively young ages, equally likely to spend the settlement. However, by their late 40s, women were more likely to save the settlement, a net gender difference that increased with age at which the settlement was received. The structure of employment compensation continues to place women at a disadvantage. Gender differences in earnings and fringe benefits not only affect current financial status, but also cast a shadow over future financial security. Although the gender gap in pension coverage has been reduced, women with pensions have access to lower benefits and less in accumulated assets. As these continuing deficits are addressed, enhancing women's tendency to save pension assets for retirement can help them build financial security.
A 12-year National Study of Suicide by Jumping From Bridges in Norway.
Sæheim, Aleksandra; Hestetun, Ingebjørg; Mork, Erlend; Nrugham, Latha; Mehlum, Lars
2017-01-01
Studies from several countries suggest that erecting fences on bridges more commonly used for suicide by jumping may be an effective way of reducing the risk of suicide by jumping from these bridges. Distribution of suicides by jumping off bridges has not yet been studied on a national level in any country. This study included all suicides by jumping from high places registered in the Norwegian Cause of Death Registry (COD) in the period 1999-2010 (n = 319). Combining data from the COD registry and information from police records, 71 cases of suicide by jumping off a bridge were identified involving 36 bridges. This form of suicide constituted approximately 1% of all suicides in Norway in the period 1999-2010. Almost half of these suicides were registered at only 6 bridges. Three Norwegian bridges were secured during the observation period of this study. Two bridges had barriers installed on the full length of the bridge with 11 suicides registered before barriers were installed, and none after. On the 1 bridge that was only partially secured, no change in numbers of suicides was observed after barriers were installed. One-third of jumps from bridges occurred over land. We found that although suicide by jumping off bridges was a relatively rare event, there is a potential for saving lives by installing physical barriers on bridges that are more commonly used for suicide by jumping.
Smartphone-based secure authenticated session sharing in Internet of Personal Things
NASA Astrophysics Data System (ADS)
Krishnan, Ram; Ninglekhu, Jiwan
2015-03-01
In the context of password-based authentication, a user can only memorize limited number of usernames and passwords. They are generally referred to as user-credentials. Longer character length of passwords further adds complication in mastering them. The expansion of the Internet and our growing dependency on it, has made it almost impossible for us to handle the big pool of user-credentials. Using simple, same or similar passwords is considered a poor practice, as it can easily be compromised by password cracking tools and social engineering attacks. Therefore, a robust and painless technique to manage personal credentials for websites is desirable. In this paper, a novel technique for user-credentials management via a smart mobile device such as a smartphone in a local network is proposed. We present a secure user-credential management scheme in which user's account login (username) and password associated with websites domain name is saved into the mobile device's database using a mobile application. We develop a custom browser extension application for client and use it to import user's credentials linked with the corresponding website from the mobile device via the local Wi-Fi network connection. The browser extension imports and identifies the authentication credentials and pushes them into the target TextBox locations in the webpage, ready for the user to execute. This scheme is suitably demonstrated between two personal devices in a local network.
CHRR: coordinate hit-and-run with rounding for uniform sampling of constraint-based models.
Haraldsdóttir, Hulda S; Cousins, Ben; Thiele, Ines; Fleming, Ronan M T; Vempala, Santosh
2017-06-01
In constraint-based metabolic modelling, physical and biochemical constraints define a polyhedral convex set of feasible flux vectors. Uniform sampling of this set provides an unbiased characterization of the metabolic capabilities of a biochemical network. However, reliable uniform sampling of genome-scale biochemical networks is challenging due to their high dimensionality and inherent anisotropy. Here, we present an implementation of a new sampling algorithm, coordinate hit-and-run with rounding (CHRR). This algorithm is based on the provably efficient hit-and-run random walk and crucially uses a preprocessing step to round the anisotropic flux set. CHRR provably converges to a uniform stationary sampling distribution. We apply it to metabolic networks of increasing dimensionality. We show that it converges several times faster than a popular artificial centering hit-and-run algorithm, enabling reliable and tractable sampling of genome-scale biochemical networks. https://github.com/opencobra/cobratoolbox . ronan.mt.fleming@gmail.com or vempala@cc.gatech.edu. Supplementary data are available at Bioinformatics online. © The Author 2017. Published by Oxford University Press.
Household food security is associated with growth of infants and young children in rural Bangladesh.
Saha, Kuntal K; Frongillo, Edward A; Alam, Dewan S; Arifeen, Shams E; Persson, Lars A; Rasmussen, Kathleen M
2009-09-01
Despite a strong relationship between household food security and the health and nutritional status of adults and older children, the association of household food security with the growth of infants and young children has not been adequately studied, particularly in developing countries. We examined the association between household food security and subsequent growth of infants and young children in rural Bangladesh. We followed 1343 children from birth to 24 months of age who were born in the Maternal and Infant Nutrition Intervention in Matlab (MINIMat) study in rural Bangladesh. A food security scale was created from data collected on household food security from the mothers during pregnancy. Data on weight and length were collected monthly in the first year and quarterly in the second year of life. Anthropometric indices were calculated relative to the 2006 WHO child growth standards. Growth trajectories were modelled using multilevel models for change controlling for possible confounders. Household food security was associated (P < 0.05) with greater subsequent weight and length gain in this cohort. Attained weight, length and anthropometric indices from birth to 24 months were higher (P < 0.001) among those who were in food-secure households. Proportions of underweight and stunting were significantly (P < 0.05) lower in food-secure households. These results suggest that household food security is a determinant of child growth in rural Bangladesh, and that it may be necessary to ensure food security of these poor rural households to prevent highly prevalent undernutrition in this population and in similar settings elsewhere in the world.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 5 2011-01-01 2011-01-01 false May I make a loan to a fiduciary account that is secured by an interest in the assets of the account? 550.360 Section 550.360 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FIDUCIARY POWERS OF SAVINGS ASSOCIATIONS...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false May I make a loan to a fiduciary account that is secured by an interest in the assets of the account? 550.360 Section 550.360 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY FIDUCIARY POWERS OF SAVINGS ASSOCIATIONS...
CHIPS. Volume 27, Number 2, April-June 2009
2009-07-01
unlimited 13. SUPPLEMENTARY NOTES The original document contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17...Navy Network Enterprise 9 CARS Task Force Shortens Original Timeline – Reducing the number of Navy legacy networks to improve security and save...NETWARCOM and edited from the original article published in the Winter 2008-2009 edition of Info Domain. “A plan of action and milestones (POA&M) for
DOE Office of Scientific and Technical Information (OSTI.GOV)
Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas
2004-10-01
If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware ismore » necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements on this method as well as demonstrating its implementation for various algorithms. We also examine cryptographic techniques to achieve obfuscation including encrypted functions and offer a new application to digital signature algorithms. To better understand the lack of security proofs for obfuscation techniques, we examine in detail general theoretical models of obfuscation. We explain the need for formal models in order to obtain provable security and the progress made in this direction thus far. Finally we tackle the problem of verifying remote execution. We introduce some methods of verifying remote exponentiation computations and some insight into generic computation checking.« less
Financial implications of glycemic control: results of an inpatient diabetes management program.
Newton, Christopher A; Young, Sandra
2006-01-01
(1) To determine the financial implications associated with changes in clinical outcomes resulting from implementation of an inpatient diabetes management program and (2) to describe the strategies involved in the formation of this program. The various factors that influence financial outcomes are examined, and previous and current outcomes are compared. Associations exist between hyperglycemia, length of stay, and hospital costs. Implementation of an inpatient diabetes management program, based on published guidelines, has been shown to increase the use of scheduled medications to treat hyperglycemia and increase the frequency of physician intervention for glucose readings outside desired ranges. Results from implementing this program have included a reduction in the average glucose level in the medical intensive care unit through use of protocols driven to initiate intravenous insulin once the glucose level exceeds 140 mg/dL. Additionally, glucose levels have been reduced throughout the hospital, primarily because of interactions between diabetes nurse care managers and the primary care team. Associated with these lower glucose levels are a decreased prevalence of central line infections and shorter lengths of stay. The reduction in the length of stay for patients with diabetes has resulted in a savings of more than 2 million dollars for the year and has yielded a 467% return on investment for the hospital. Improved blood glucose control during the hospitalization of patients with known hyperglycemia is associated with reduced morbidity, reduced hospital length of stay, and cost savings. The implementation of an inpatient diabetes management program can provide better glycemic control, thereby improving outcomes for hyperglycemic patients while saving the hospital money.
Field test of wavelength-saving quantum key distribution network.
Wang, Shuang; Chen, Wei; Yin, Zhen-Qiang; Zhang, Yang; Zhang, Tao; Li, Hong-Wei; Xu, Fang-Xing; Zhou, Zheng; Yang, Yang; Huang, Da-Jun; Zhang, Li-Jun; Li, Fang-Yi; Liu, Dong; Wang, Yong-Gang; Guo, Guang-Can; Han, Zheng-Fu
2010-07-15
We propose a wavelength-saving topology of a quantum key distribution (QKD) network based on passive optical elements, and we report on the field test of this network on commercial telecom optical fiber at the frequency of 20 MHz. In this network, five nodes are supported with two wavelengths, and every two nodes can share secure keys directly at the same time. We also characterized the insertion loss and cross talk effects on the point-to-point QKD system after introducing this QKD network.
Stone, Alexander B; Grant, Michael C; Pio Roda, Claro; Hobson, Deborah; Pawlik, Timothy; Wu, Christopher L; Wick, Elizabeth C
2016-03-01
Despite positive results from several international Enhanced Recovery After Surgery (ERAS) protocols, the United States has been slow to adopt ERAS protocols, in part due to concern regarding the expenses of such a program. We sought to evaluate the potential annual net cost savings of implementing a US-based ERAS program. Using data from existing publications and experience with an ERAS program, a model of net financial costs was developed for surgical groups of escalating numbers of annual cases. Our example scenario provided a financial analysis of the implementation of an ERAS program at a United States academic institution based on data from the ERAS Program for Colorectal Surgery at The Johns Hopkins Hospital. Based on available data from the United States, ERAS programs lead to reductions in lengths of hospital stay that range from 0.7 to 2.7 days and substantial direct cost savings. Using example data from a quaternary hospital, the considerable cost of $552,783 associated with implementation of an ERAS program was offset by even greater savings in the first year of nearly $948,500, yielding a net savings of $395,717. Sensitivity analysis across several caseload and direct cost scenarios yielded similar savings in 20 of the 27 projections. Enhanced Recovery After Surgery protocols have repeatedly led to reduction in length of hospital stay and improved surgical outcomes. A financial model, based on published data and experience, projects that investment in an ERAS program can also lead to net financial savings for US hospitals. Copyright © 2016 American College of Surgeons. Published by Elsevier Inc. All rights reserved.
Save Our Postal Worker Jobs Act of 2011
Sen. Mikulski, Barbara A. [D-MD
2011-10-12
Senate - 10/12/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
One Approach to Contracting Out Services.
ERIC Educational Resources Information Center
Cryder, Ralph S.
1985-01-01
Public agencies can benefit from cost savings in forestry services, park security, and maintenance when park and recreation departments contract out for services. Pros and cons of contracting out and guidelines for this process are offered. (DF)
Securing the Assistance of Victims of Exploitation Act of 2014 (SAVE Act)
Rep. Jackson Lee, Sheila [D-TX-18
2014-07-29
House - 08/11/2014 Referred to the Subcommittee on Department Operations, Oversight, and Nutrition. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Save Our Small and Seasonal Businesses Act of 2009
Rep. Stupak, Bart [D-MI-1
2009-02-23
House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Global Security Scan for Canadian Science Capabilities (2015-2020): Report of Proceedings
2008-03-01
apply targeted regulation to communications services such as obligations to save routing information as a way to track child predators, obligatory...what is risk, what does security mean to Canada. Is it on-line porn or a terrorist attack? Define the term then define the most heinous thing that...CoE Sec-Gen statement regarding child predators in cyberspace and Convention being open to additional signatories + ITU Plenipotentiary Conference
Federal Information Technology Savings, Accountability, and Transparency Act of 2013
Sen. Udall, Tom [D-NM
2013-12-17
Senate - 12/17/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
76 FR 76811 - Stakeholders Meeting Regarding Ready Reserve Force (RRF) Ship Manager Contract Program
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-08
... for Cost Saving Methods in Program Management, Ship Costs, Green Initiatives. Limited Scope Ship... registration is recommended. The DOT building at 1200 New Jersey Ave. SE. has security entrance requirements...
Medication Errors: Cut Your Risk with These Tips
... program. Reporting to MedWatch is easy, confidential and secure — and it can help save others from being ... org," "Mayo Clinic Healthy Living," and the triple-shield Mayo Clinic logo are trademarks of Mayo Foundation ...
31 CFR 353.3 - Converting definitive savings bonds to book-entry bonds in New Treasury Direct.
Code of Federal Regulations, 2012 CFR
2012-07-01
... New Treasury Direct, an online system for holding Treasury securities. The Web address for New... bonds should follow online instructions for conversion. Regulations governing converted bonds are found...
31 CFR 353.3 - Converting definitive savings bonds to book-entry bonds in New Treasury Direct.
Code of Federal Regulations, 2010 CFR
2010-07-01
... New Treasury Direct, an online system for holding Treasury securities. The Web address for New... bonds should follow online instructions for conversion. Regulations governing converted bonds are found...
31 CFR 353.3 - Converting definitive savings bonds to book-entry bonds in New Treasury Direct.
Code of Federal Regulations, 2013 CFR
2013-07-01
... New Treasury Direct, an online system for holding Treasury securities. The Web address for New... bonds should follow online instructions for conversion. Regulations governing converted bonds are found...
Planning for Retirement with a Tax-Sheltered Mutual Fund.
ERIC Educational Resources Information Center
Schnee, Edward J.; And Others
1983-01-01
Greater attention has been focused on the role that employer-sponsored retirement plans and individual savings must play in ensuring retirement income security. Alternative tax retirement planning opportunities currently available to college personnel are explored. (MLW)
Freshwater savings from marine protein consumption
NASA Astrophysics Data System (ADS)
Gephart, Jessica A.; Pace, Michael L.; D'Odorico, Paolo
2014-01-01
Marine fisheries provide an essential source of protein for many people around the world. Unlike alternative terrestrial sources of protein, marine fish production requires little to no freshwater inputs. Consuming marine fish protein instead of terrestrial protein therefore represents freshwater savings (equivalent to an avoided water cost) and contributes to a low water footprint diet. These water savings are realized by the producers of alternative protein sources, rather than the consumers of marine protein. This study quantifies freshwater savings from marine fish consumption around the world by estimating the water footprint of replacing marine fish with terrestrial protein based on current consumption patterns. An estimated 7 600 km3 yr-1 of water is used for human food production. Replacing marine protein with terrestrial protein would require an additional 350 km3 yr-1 of water, meaning that marine protein provides current water savings of 4.6%. The importance of these freshwater savings is highly uneven around the globe, with savings ranging from as little as 0 to as much as 50%. The largest savings as a per cent of current water footprints occur in Asia, Oceania, and several coastal African nations. The greatest national water savings from marine fish protein occur in Southeast Asia and the United States. As the human population increases, future water savings from marine fish consumption will be increasingly important to food and water security and depend on sustainable harvest of capture fisheries and low water footprint growth of marine aquaculture.
22 CFR 211.9 - Liability for loss damage or improper distribution of commodities.
Code of Federal Regulations, 2014 CFR
2014-04-01
... sponsors may add to the value any provable costs they have incurred prior to delivery by the ocean carrier... TRANSFER OF FOOD COMMODITIES FOR FOOD USE IN DISASTER RELIEF, ECONOMIC DEVELOPMENT AND OTHER ASSISTANCE... or damage to commodities. (See paragraph (c)(2)(iii) of this section.) (B) The value of commodities...
22 CFR 211.9 - Liability for loss damage or improper distribution of commodities.
Code of Federal Regulations, 2013 CFR
2013-04-01
... sponsors may add to the value any provable costs they have incurred prior to delivery by the ocean carrier... TRANSFER OF FOOD COMMODITIES FOR FOOD USE IN DISASTER RELIEF, ECONOMIC DEVELOPMENT AND OTHER ASSISTANCE... or damage to commodities. (See paragraph (c)(2)(iii) of this section.) (B) The value of commodities...
Fusion And Inference From Multiple And Massive Disparate Distributed Dynamic Data Sets
2017-07-01
principled methodology for two-sample graph testing; designed a provably almost-surely perfect vertex clustering algorithm for block model graphs; proved...3.7 Semi-Supervised Clustering Methodology ...................................................................... 9 3.8 Robust Hypothesis Testing...dimensional Euclidean space – allows the full arsenal of statistical and machine learning methodology for multivariate Euclidean data to be deployed for
Isogeometric Divergence-conforming B-splines for the Steady Navier-Stokes Equations
2012-04-01
discretizations produce pointwise divergence-free velocity elds and hence exactly satisfy mass conservation. Consequently, discrete variational formulations...cretizations produce pointwise divergence-free velocity fields and hence exactly satisfy mass conservation. Consequently, discrete variational ... variational formulation. Using a combination of an advective for- mulation, SUPG, PSPG, and grad-div stabilization, provably convergent numerical methods
A Few Observations and Remarks on Time Effectiveness of Interactive Electronic Testing
ERIC Educational Resources Information Center
Magdin, Martin; Turcáni, Milan
2015-01-01
In the paper, we point out several observations and remarks on time effectiveness of electronic testing, in particular of its new form (interactive tests). A test is often used as an effective didactic tool for evaluating the extent of gained cognitive capabilities. According to authors Rudman (1989) and Wang (2003) it is provable that the…
Zero Autocorrelation Waveforms: A Doppler Statistic and Multifunction Problems
2006-01-01
by ANSI Std Z39-18 It is natural to refer to A as the ambiguity function of u, since in the usual setting on the real line R, the analogue ambiguity...Doppler statistic |Cu,uek(j)| is excellent and provable for detecting deodorized Doppler frequency shift [11] (see Fig. 2). Also, if one graphs only
Chandran, D; Woods, C M; Schar, M; Ma, N; Ooi, E H; Athanasiadis, T
2018-02-01
To conduct a cost analysis of injection laryngoplasty performed in the operating theatre under local anaesthesia and general anaesthesia. The retrospective study included patients who had undergone injection laryngoplasty as day cases between July 2013 and March 2016. Cost data were obtained, along with patient demographics, anaesthetic details, type of injectant, American Society of Anesthesiologists score, length of stay, total operating theatre time and surgeon procedure time. A total of 20 cases (general anaesthesia = 6, local anaesthesia = 14) were included in the cost analysis. The mean total cost under general anaesthesia (AU$2865.96 ± 756.29) was significantly higher than that under local anaesthesia (AU$1731.61 ± 290.29) (p < 0.001). The mean operating theatre time, surgeon procedure time and length of stay were all significantly lower under local anaesthesia compared to general anaesthesia. Time variables such as operating theatre time and length of stay were the most significant predictors of the total costs. Procedures performed under local anaesthesia in the operating theatre are associated with shorter operating theatre time and length of stay in the hospital, and provide significant cost savings. Further savings could be achieved if local anaesthesia procedures were performed in the office setting.
Fast Multivariate Search on Large Aviation Datasets
NASA Technical Reports Server (NTRS)
Bhaduri, Kanishka; Zhu, Qiang; Oza, Nikunj C.; Srivastava, Ashok N.
2010-01-01
Multivariate Time-Series (MTS) are ubiquitous, and are generated in areas as disparate as sensor recordings in aerospace systems, music and video streams, medical monitoring, and financial systems. Domain experts are often interested in searching for interesting multivariate patterns from these MTS databases which can contain up to several gigabytes of data. Surprisingly, research on MTS search is very limited. Most existing work only supports queries with the same length of data, or queries on a fixed set of variables. In this paper, we propose an efficient and flexible subsequence search framework for massive MTS databases, that, for the first time, enables querying on any subset of variables with arbitrary time delays between them. We propose two provably correct algorithms to solve this problem (1) an R-tree Based Search (RBS) which uses Minimum Bounding Rectangles (MBR) to organize the subsequences, and (2) a List Based Search (LBS) algorithm which uses sorted lists for indexing. We demonstrate the performance of these algorithms using two large MTS databases from the aviation domain, each containing several millions of observations Both these tests show that our algorithms have very high prune rates (>95%) thus needing actual
Efficient proof of ownership for cloud storage systems
NASA Astrophysics Data System (ADS)
Zhong, Weiwei; Liu, Zhusong
2017-08-01
Cloud storage system through the deduplication technology to save disk space and bandwidth, but the use of this technology has appeared targeted security attacks: the attacker can deceive the server to obtain ownership of the file by get the hash value of original file. In order to solve the above security problems and the different security requirements of the files in the cloud storage system, an efficient and information-theoretical secure proof of ownership sceme is proposed to support the file rating. Through the K-means algorithm to implement file rating, and use random seed technology and pre-calculation method to achieve safe and efficient proof of ownership scheme. Finally, the scheme is information-theoretical secure, and achieve better performance in the most sensitive areas of client-side I/O and computation.
Interactive home telehealth and burns: A pilot study.
Hickey, Sean; Gomez, Jason; Meller, Benjamin; Schneider, Jeffery C; Cheney, Meredith; Nejad, Shamim; Schulz, John; Goverman, Jeremy
2017-09-01
The objective of this study is to review our experience incorporating Interactive Home Telehealth (IHT) visits into follow-up burn care. A retrospective review of all burn patients participating in IHT encounters over the course of 15 months was performed. Connections were established through secure video conferencing and call-routing software. Patients connected with a personal computer or tablet and providers connected with a desktop computer with a high-definition web camera. In some cases, high-definition digital images were emailed to the provider prior to the virtual consultation. For each patient, the following was collected: (1) patient and injury demographics (diagnosis, prognosis, and clinical management), (2) total number of encounters, (3) service for each encounter (burn, psychiatry, and rehabilitation), (4) length of visit, including travel distance and time saved and, (5) complications, including re-admissions and connectivity issues. 52 virtual encounters were performed with 31 patients during the first year of the pilot project from March 2015 to June 2016. Mean age of the participant was 44 years (range 18-83 years). Mean total burn surface area of the participant was 12% (range 1-80%). Average roundtrip travel distance saved was 188 miles (range 4-822 miles). Average round trip travel time saved was 201min (range 20-564min). There were no unplanned re-admissions and no complications. Five connectivity issues were reported, none of which prevented completion of the visit. Interactive Home Telehealth is a safe and feasible modality for delivering follow-up care to burn patients. Burn care providers benefit from the potential to improve outpatient clinic utilization. Patients benefit from improved access to multiple members of their specialized burn care team, as well as cost-reductions for patient travel expenses. Future studies are needed to ensure patient and provider satisfaction and to further validate the significance, cost-effectiveness and safety. Copyright © 2016 Elsevier Ltd and ISBI. All rights reserved.
NASA Astrophysics Data System (ADS)
Siswantyo, Sepha; Susanti, Bety Hayat
2016-02-01
Preneel-Govaerts-Vandewalle (PGV) schemes consist of 64 possible single-block-length schemes that can be used to build a hash function based on block ciphers. For those 64 schemes, Preneel claimed that 4 schemes are secure. In this paper, we apply length extension attack on those 4 secure PGV schemes which use RC5 algorithm in its basic construction to test their collision resistance property. The attack result shows that the collision occurred on those 4 secure PGV schemes. Based on the analysis, we indicate that Feistel structure and data dependent rotation operation in RC5 algorithm, XOR operations on the scheme, along with selection of additional message block value also give impact on the collision to occur.
Alternative Fuels Data Center: Idle Reduction Benefits and Considerations
money, protects public health and the environment, and increases U.S. energy security. Reducing idle time can also reduce engine wear and associated maintenance costs. Saving Fuel and Money A photo of an
31 CFR 360.3 - Converting definitive savings bonds to book-entry bonds in New Treasury Direct.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Treasury Direct, an online system for holding Treasury securities. The Web address for New Treasury Direct... follow online instructions for conversion. Regulations governing converted bonds are found at 31 CFR part...
78 FR 41995 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-12
... of United States Savings Bonds/Notes Involved in a Chain Letter Scheme. Form: PD F 2966. Abstract... purchased in a chain letter scheme and used to identify the securities involved and to issue a refund of the...
Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.
Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang
2015-09-25
Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.
Rickard, Claire M; Marsh, Nicole; Webster, Joan; Playford, E Geoffrey; McGrail, Matthew R; Larsen, Emily; Keogh, Samantha; McMillan, David; Whitty, Jennifer A; Choudhury, Md Abu; Dunster, Kimble R; Reynolds, Heather; Marshall, Andrea; Crilly, Julia; Young, Jeanine; Thom, Ogilvie; Gowardman, John; Corley, Amanda; Fraser, John F
2015-09-23
Over 70% of all hospital admissions have a peripheral intravenous device (PIV) inserted; however, the failure rate of PIVs is unacceptably high, with up to 69% of these devices failing before treatment is complete. Failure can be due to dislodgement, phlebitis, occlusion/infiltration and/or infection. This results in interrupted medical therapy; painful phlebitis and reinsertions; increased hospital length of stay, morbidity and mortality from infections; and wasted medical/nursing time. Appropriate PIV dressing and securement may prevent many cases of PIV failure, but little comparative data exist regarding the efficacy of various PIV dressing and securement methods. This trial will investigate the clinical and cost-effectiveness of 4 methods of PIV dressing and securement in preventing PIV failure. A multicentre, parallel group, superiority randomised controlled trial with 4 arms, 3 experimental groups (tissue adhesive, bordered polyurethane dressing, sutureless securement device) and 1 control (standard polyurethane dressing) is planned. There will be a 3-year recruitment of 1708 adult patients, with allocation concealment until randomisation by a centralised web-based service. The primary outcome is PIV failure which includes any of: dislodgement, occlusion/infiltration, phlebitis and infection. Secondary outcomes include: types of PIV failure, PIV dwell time, costs, device colonisation, skin colonisation, patient and staff satisfaction. Relative incidence rates of device failure per 100 devices and per 1000 device days with 95% CIs will summarise the impact of each dressing, and test differences between groups. Kaplan-Meier survival curves (with log-rank Mantel-Cox test) will compare device failure over time. p Values of <0.05 will be considered significant. Secondary end points will be compared between groups using parametric or non-parametric techniques appropriate to level of measurement. Ethical approval has been received from Queensland Health (HREC/11/QRCH/152) and Griffith University (NRS/46/11/HREC). Results will be published according to the CONSORT statement and presented at relevant conferences. Australian New Zealand Clinical Trial Registry (ACTRN); 12611000769987. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Rickard, Claire M; Marsh, Nicole; Webster, Joan; Playford, E Geoffrey; McGrail, Matthew R; Larsen, Emily; Keogh, Samantha; McMillan, David; Whitty, Jennifer A; Choudhury, Md Abu; Dunster, Kimble R; Reynolds, Heather; Marshall, Andrea; Crilly, Julia; Young, Jeanine; Thom, Ogilvie; Gowardman, John; Corley, Amanda; Fraser, John F
2015-01-01
Introduction Over 70% of all hospital admissions have a peripheral intravenous device (PIV) inserted; however, the failure rate of PIVs is unacceptably high, with up to 69% of these devices failing before treatment is complete. Failure can be due to dislodgement, phlebitis, occlusion/infiltration and/or infection. This results in interrupted medical therapy; painful phlebitis and reinsertions; increased hospital length of stay, morbidity and mortality from infections; and wasted medical/nursing time. Appropriate PIV dressing and securement may prevent many cases of PIV failure, but little comparative data exist regarding the efficacy of various PIV dressing and securement methods. This trial will investigate the clinical and cost-effectiveness of 4 methods of PIV dressing and securement in preventing PIV failure. Methods and analysis A multicentre, parallel group, superiority randomised controlled trial with 4 arms, 3 experimental groups (tissue adhesive, bordered polyurethane dressing, sutureless securement device) and 1 control (standard polyurethane dressing) is planned. There will be a 3-year recruitment of 1708 adult patients, with allocation concealment until randomisation by a centralised web-based service. The primary outcome is PIV failure which includes any of: dislodgement, occlusion/infiltration, phlebitis and infection. Secondary outcomes include: types of PIV failure, PIV dwell time, costs, device colonisation, skin colonisation, patient and staff satisfaction. Relative incidence rates of device failure per 100 devices and per 1000 device days with 95% CIs will summarise the impact of each dressing, and test differences between groups. Kaplan-Meier survival curves (with log-rank Mantel-Cox test) will compare device failure over time. p Values of <0.05 will be considered significant. Secondary end points will be compared between groups using parametric or non-parametric techniques appropriate to level of measurement. Ethics and dissemination Ethical approval has been received from Queensland Health (HREC/11/QRCH/152) and Griffith University (NRS/46/11/HREC). Results will be published according to the CONSORT statement and presented at relevant conferences. Trial registration number Australian New Zealand Clinical Trial Registry (ACTRN); 12611000769987. PMID:26399574
Implementing a resident lifting system in an extended care hospital. Demonstrating cost-benefit.
Spiegel, Jerry; Yassi, Analee; Ronald, Lisa A; Tate, Robert B; Hacking, Penny; Colby, Teresa
2002-03-01
1. Implemeting mechanical resident lifting equipment in an extended care facility produced a payback from direct savings alone within 4 years. Payback occurred more quickly when the effect of indirect savings or the trend to rising compensation costs was considered. 2. Combining the observations of the occupational health nurses related to staff well being with relevant cost-benefit data is useful in influencing decision makers and in securing funding for prevention measures. 3. Clear identification of a viewpoint is an important part of an economic evaluation and cost-benefit analysis.
Petrovic, M; Maganaris, C N; Deschamps, K; Verschueren, S M; Bowling, F L; Boulton, A J M; Reeves, N D
2018-05-01
The Achilles tendon (AT) has the capacity to store and release elastic energy during walking, contributing to metabolic energy savings. In diabetes patients, it is hypothesized that a stiffer Achilles tendon may reduce the capacity for energy saving through this mechanism, thereby contributing to an increased metabolic cost of walking (CoW). The aim of this study was to investigate the effects of diabetes and diabetic peripheral neuropathy (DPN) on the Achilles tendon and plantarflexor muscle-tendon unit behavior during walking. Twenty-three nondiabetic controls (Ctrl); 20 diabetic patients without peripheral neuropathy (DM), and 13 patients with moderate/severe DPN underwent gait analysis using a motion analysis system, force plates, and ultrasound measurements of the gastrocnemius muscle, using a muscle model to determine Achilles tendon and muscle-tendon length changes. During walking, the DM and particularly the DPN group displayed significantly less Achilles tendon elongation (Ctrl: 1.81; DM: 1.66; and DPN: 1.54 cm), higher tendon stiffness (Ctrl: 210; DM: 231; and DPN: 240 N/mm), and higher tendon hysteresis (Ctrl: 18; DM: 21; and DPN: 24%) compared with controls. The muscle fascicles of the gastrocnemius underwent very small length changes in all groups during walking (~0.43 cm), with the smallest length changes in the DPN group. Achilles tendon forces were significantly lower in the diabetes groups compared with controls (Ctrl: 2666; DM: 2609; and DPN: 2150 N). The results strongly point toward the reduced energy saving capacity of the Achilles tendon during walking in diabetes patients as an important factor contributing to the increased metabolic CoW in these patients. NEW & NOTEWORTHY From measurements taken during walking we observed that the Achilles tendon in people with diabetes and particularly people with diabetic peripheral neuropathy was stiffer, was less elongated, and was subject to lower forces compared with controls without diabetes. These altered properties of the Achilles tendon in people with diabetes reduce the tendon's energy saving capacity and contribute toward the higher metabolic energy cost of walking in these patients.
Jain, Siddharth; Kilgore, Meredith; Edwards, Rodney K; Owen, John
2016-07-01
Preterm birth (PTB) is a significant cause of neonatal morbidity and mortality. Studies have shown that vaginal progesterone therapy for women diagnosed with shortened cervical length can reduce the risk of PTB. However, published cost-effectiveness analyses of vaginal progesterone for short cervix have not considered an appropriate range of clinically important parameters. To evaluate the cost-effectiveness of universal cervical length screening in women without a history of spontaneous PTB, assuming that all women with shortened cervical length receive progesterone to reduce the likelihood of PTB. A decision analysis model was developed to compare universal screening and no-screening strategies. The primary outcome was the cost-effectiveness ratio of both the strategies, defined as the estimated patient cost per quality-adjusted life-year (QALY) realized by the children. One-way sensitivity analyses were performed by varying progesterone efficacy to prevent PTB. A probabilistic sensitivity analysis was performed to address uncertainties in model parameter estimates. In our base-case analysis, assuming that progesterone reduces the likelihood of PTB by 11%, the incremental cost-effectiveness ratio for screening was $158,000/QALY. Sensitivity analyses show that these results are highly sensitive to the presumed efficacy of progesterone to prevent PTB. In a 1-way sensitivity analysis, screening results in cost-saving if progesterone can reduce PTB by 36%. Additionally, for screening to be cost-effective at WTP=$60,000 in three clinical scenarios, progesterone therapy has to reduce PTB by 60%, 34% and 93%. Screening is never cost-saving in the worst-case scenario or when serial ultrasounds are employed, but could be cost-saving with a two-day hospitalization only if progesterone were 64% effective. Cervical length screening and treatment with progesterone is a not a dominant, cost-effective strategy unless progesterone is more effective than has been suggested by available data for US women. Until future trials demonstrate greater progesterone efficacy, and effectiveness studies confirm a benefit from screening and treatment, the cost-effectiveness of universal cervical length screening in the United States remains questionable. Copyright © 2016 Elsevier Inc. All rights reserved.
Mullany, LC; Darmstadt, GL; Khatry, SK; LeClerq, SC; Tielsch, JM
2008-01-01
Background Classification of infants into low birth weight (LBW, <2500 g) or very low birth weight (VLBW, <2000 g) categories is a crucial step in targeting interventions to high-risk infants. Objective To compare the validity of chest circumference and foot length as surrogate anthropometric measures for the identification of LBW and VLBW infants. Subjects and setting Newborn infants (n = 1640) born between March and June 2004 in 30 Village Development Committees of Sarlahi district, Nepal. Design Chest circumference, foot length and weight (SECA 727, precise to 2 g) of newborns were measured within 72 h after birth. The sensitivity, specificity and predictive values for a range of cutoff points of the anthropometric measures were estimated using the digital scale measurements as the gold standard. Results Among LBW infants (469/1640, 28.6%), chest circumference measures <30.3 cm were 91% sensitive and 83% specific. Similar levels of sensitivity for foot length were achieved only with considerable loss of specificity (<45%). Foot length measurements <6.9 cm were 88% sensitive and 86% specific for the identification of VLBW infants. Conclusion Chest circumference was superior to foot length in classification of infants into birth weight categories. For the identification of VLBW infants, foot length performed well, and may be preferable to chest circumference, as the former measure does not require removal of infant swaddling clothes. In the absence of more precise direct measures of birth weight, chest circumference is recommended over foot length for the identification of LBW infants. Sponsorship The National Institute of Child Health and Human Development; the Saving Newborn Lives Initiative, Save the Children – US and the Office of Heath and Nutrition, United States Agency for International Development (see Acknowledgements). PMID:16885929
31 CFR 353.3 - Converting definitive savings bonds to book-entry bonds in TreasuryDirect®.
Code of Federal Regulations, 2014 CFR
2014-07-01
... TreasuryDirect®, an online system for holding Treasury securities. The Web address for TreasuryDirect® is... follow online instructions for conversion. Regulations governing converted bonds are found at 31 CFR part...
Code of Federal Regulations, 2011 CFR
2011-07-01
... private business or trade. Securities. Mutual funds, stocks, bonds, or any product registered with the... fund employees and special Government employees, of the Department of Defense. Financial services... banking (e.g., ATMs), in-store banking, checking, share and savings accounts, fund transfers, sale of...
Code of Federal Regulations, 2010 CFR
2010-07-01
... private business or trade. Securities. Mutual funds, stocks, bonds, or any product registered with the... fund employees and special Government employees, of the Department of Defense. Financial services... banking (e.g., ATMs), in-store banking, checking, share and savings accounts, fund transfers, sale of...
76 FR 61778 - Agency Information Collection (Certificate as to Assets) Activities Under OMB Review
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-05
... investment in savings, bonds and other securities that he or she received on behalf of beneficiaries who are... information was published on July 25, 2011, at pages 44400-44401. Affected Public: Individuals or households...
OSPREY: protein design with ensembles, flexibility, and provable algorithms.
Gainza, Pablo; Roberts, Kyle E; Georgiev, Ivelin; Lilien, Ryan H; Keedy, Daniel A; Chen, Cheng-Yu; Reza, Faisal; Anderson, Amy C; Richardson, David C; Richardson, Jane S; Donald, Bruce R
2013-01-01
We have developed a suite of protein redesign algorithms that improves realistic in silico modeling of proteins. These algorithms are based on three characteristics that make them unique: (1) improved flexibility of the protein backbone, protein side-chains, and ligand to accurately capture the conformational changes that are induced by mutations to the protein sequence; (2) modeling of proteins and ligands as ensembles of low-energy structures to better approximate binding affinity; and (3) a globally optimal protein design search, guaranteeing that the computational predictions are optimal with respect to the input model. Here, we illustrate the importance of these three characteristics. We then describe OSPREY, a protein redesign suite that implements our protein design algorithms. OSPREY has been used prospectively, with experimental validation, in several biomedically relevant settings. We show in detail how OSPREY has been used to predict resistance mutations and explain why improved flexibility, ensembles, and provability are essential for this application. OSPREY is free and open source under a Lesser GPL license. The latest version is OSPREY 2.0. The program, user manual, and source code are available at www.cs.duke.edu/donaldlab/software.php. osprey@cs.duke.edu. Copyright © 2013 Elsevier Inc. All rights reserved.
True Randomness from Big Data.
Papakonstantinou, Periklis A; Woodruff, David P; Yang, Guang
2016-09-26
Generating random bits is a difficult task, which is important for physical systems simulation, cryptography, and many applications that rely on high-quality random bits. Our contribution is to show how to generate provably random bits from uncertain events whose outcomes are routinely recorded in the form of massive data sets. These include scientific data sets, such as in astronomics, genomics, as well as data produced by individuals, such as internet search logs, sensor networks, and social network feeds. We view the generation of such data as the sampling process from a big source, which is a random variable of size at least a few gigabytes. Our view initiates the study of big sources in the randomness extraction literature. Previous approaches for big sources rely on statistical assumptions about the samples. We introduce a general method that provably extracts almost-uniform random bits from big sources and extensively validate it empirically on real data sets. The experimental findings indicate that our method is efficient enough to handle large enough sources, while previous extractor constructions are not efficient enough to be practical. Quality-wise, our method at least matches quantum randomness expanders and classical world empirical extractors as measured by standardized tests.
NASA Astrophysics Data System (ADS)
Papakonstantinou, Periklis A.; Woodruff, David P.; Yang, Guang
2016-09-01
Generating random bits is a difficult task, which is important for physical systems simulation, cryptography, and many applications that rely on high-quality random bits. Our contribution is to show how to generate provably random bits from uncertain events whose outcomes are routinely recorded in the form of massive data sets. These include scientific data sets, such as in astronomics, genomics, as well as data produced by individuals, such as internet search logs, sensor networks, and social network feeds. We view the generation of such data as the sampling process from a big source, which is a random variable of size at least a few gigabytes. Our view initiates the study of big sources in the randomness extraction literature. Previous approaches for big sources rely on statistical assumptions about the samples. We introduce a general method that provably extracts almost-uniform random bits from big sources and extensively validate it empirically on real data sets. The experimental findings indicate that our method is efficient enough to handle large enough sources, while previous extractor constructions are not efficient enough to be practical. Quality-wise, our method at least matches quantum randomness expanders and classical world empirical extractors as measured by standardized tests.
Papakonstantinou, Periklis A.; Woodruff, David P.; Yang, Guang
2016-01-01
Generating random bits is a difficult task, which is important for physical systems simulation, cryptography, and many applications that rely on high-quality random bits. Our contribution is to show how to generate provably random bits from uncertain events whose outcomes are routinely recorded in the form of massive data sets. These include scientific data sets, such as in astronomics, genomics, as well as data produced by individuals, such as internet search logs, sensor networks, and social network feeds. We view the generation of such data as the sampling process from a big source, which is a random variable of size at least a few gigabytes. Our view initiates the study of big sources in the randomness extraction literature. Previous approaches for big sources rely on statistical assumptions about the samples. We introduce a general method that provably extracts almost-uniform random bits from big sources and extensively validate it empirically on real data sets. The experimental findings indicate that our method is efficient enough to handle large enough sources, while previous extractor constructions are not efficient enough to be practical. Quality-wise, our method at least matches quantum randomness expanders and classical world empirical extractors as measured by standardized tests. PMID:27666514
The financial impact of health information exchange on emergency department care.
Frisse, Mark E; Johnson, Kevin B; Nian, Hui; Davison, Coda L; Gadd, Cynthia S; Unertl, Kim M; Turri, Pat A; Chen, Qingxia
2012-01-01
To examine the financial impact health information exchange (HIE) in emergency departments (EDs). We studied all ED encounters over a 13-month period in which HIE data were accessed in all major emergency departments Memphis, Tennessee. HIE access encounter records were matched with similar encounter records without HIE access. Outcomes studied were ED-originated hospital admissions, admissions for observation, laboratory testing, head CT, body CT, ankle radiographs, chest radiographs, and echocardiograms. Our estimates employed generalized estimating equations for logistic regression models adjusted for admission type, length of stay, and Charlson co-morbidity index. Marginal probabilities were used to calculate changes in outcome variables and their financial consequences. HIE data were accessed in approximately 6.8% of ED visits across 12 EDs studied. In 11 EDs directly accessing HIE data only through a secure Web browser, access was associated with a decrease in hospital admissions (adjusted odds ratio (OR)=0.27; p<0001). In a 12th ED relying more on print summaries, HIE access was associated with a decrease in hospital admissions (OR=0.48; p<0001) and statistically significant decreases in head CT use, body CT use, and laboratory test ordering. Applied only to the study population, HIE access was associated with an annual cost savings of $1.9 million. Net of annual operating costs, HIE access reduced overall costs by $1.07 million. Hospital admission reductions accounted for 97.6% of total cost reductions. Access to additional clinical data through HIE in emergency department settings is associated with net societal saving.
How Family Status and Social Security Claiming Options Shape Optimal Life Cycle Portfolios
Hubener, Andreas; Maurer, Raimond; Mitchell, Olivia S.
2017-01-01
We show how optimal household decisions regarding work, retirement, saving, portfolio allocations, and life insurance are shaped by the complex financial options embedded in U.S. Social Security rules and uncertain family transitions. Our life cycle model predicts sharp consumption drops on retirement, an age-62 peak in claiming rates, and earlier claiming by wives versus husbands and single women. Moreover, life insurance is mainly purchased on men’s lives. Our model, which takes Social Security rules seriously, generates wealth and retirement outcomes that are more consistent with the data, in contrast to earlier and less realistic models. PMID:28659659
Personal finance: there are no shortcuts to financial security.
Yarkony, Kathryn
2009-12-01
Perioperative nurses have skills that lend themselves to sound financial decision-making, and during these difficult economic times, it is important to know how to secure earnings for the future. Key strategies include saving for retirement, consulting a financial advisor, investing in reliable vehicles, holding investments until the market stabilizes, and controlling credit card debt. Nurses can use the nursing process of assessment, diagnosis, planning, implementation, and evaluation to help them make sound financial decisions. (c) AORN, Inc, 2009.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tucker, R.A.
This paper reports that properly applied, light sources and lighting systems not only enhance a building's attractiveness and usability, they also create a secure environment. An effectively lighted area can minimize pedestrian hazards and auto accidents. Good security lighting also eliminates the darkness that vandals, thieves, and felons thrive on. Unfortunately, lighting quality has sometimes been sacrificed for the sake of energy efficiency, and resulting savings offset by poor aesthetics and user dissatisfaction. However, trade-offs in quality and efficiency are not necessary, thanks to recent developments in light source technology.
Printer Multiplexing Among Multiple Z-100 Microcomputers.
1985-12-01
allows the printer to be used by any one of multiple Z-l00’s at a time. The SPOOL process sends the data thru the CONTROL process to the printer or saves...the data on the (Continue) 20 OISTRIBUTION/AVAILABILITY OF ABSTRACT 21. ABSTRACT SECURITY CLASSIFICATION K)UNCLASSIFIEDIUNLIMITED 0 SAME AS RPT 0 DTIC...CLASSFICATION Of THIS PAG9 (l#1011 DMIat 19. ABSTRACT (Continued) disk file. - ,:1J. 4, .-.-. _ SECURITY CLASSIF9CATION OP THIS PA8EWY~en Data Enteed
The energetics of low browsing in sauropods.
Ruxton, Graeme D; Wilkinson, David M
2011-10-23
It has recently been argued that the probable high cost of travel for sauropod dinosaurs would have made exploiting high forage energetically attractive, if this reduced the need to travel between food patches. This argument was supported by simple calculations. Here, we take a similar approach to evaluate the energetics of foraging close to the ground. We predict that small extensions of the neck beyond the minimum required for the mouth to reach the ground bring substantial energetic savings. Each increment of length brings a further saving, but the sizes of such benefits decrease with increasing neck length. However, the observed neck length of around 9 m for Brachiosaurus (for example) is predicted to reduce the overall cost of foraging by 80 per cent, compared with a minimally necked individual. We argue that the long neck of the sauropods may have been under positive selection for low foraging (instead of, or as well as, exploitation of high foraging), if this long neck allowed a greater area of food to be exploited from a given position and thus reduced the energetically expensive movement of the whole animal.
Unconventional Staging Package Selection Leads to Cost Savings
DOE Office of Scientific and Technical Information (OSTI.GOV)
,
2012-06-07
In late 2010, U.S. Department of Energy (DOE) Deputy Secretary of Energy, Daniel Poneman, directed that an analysis be conducted on the U-233 steel-clad, Zero Power Reactor (ZPR) fuel plates that were stored at Oak Ridge National Laboratory (ORNL), focusing on cost savings and any potential DOE programmatic needs for the special nuclear material (SNM). The NA-162 Nuclear Criticality Safety Program requested retention of these fuel plates for use in experiments at the Nevada National Security Site (NNSS). A Secretarial Initiative challenged ORNL to make the first shipment to the NNSS by the end of the 2011 calendar year, andmore » this effort became known as the U-233 Project Accelerated Shipping Campaign. To meet the Secretarial Initiative, National Security Technologies, LLC (NSTec), the NNSS Management and Operations contractor, was asked to facilitate the receipt and staging of the U-233 fuel plates in the Device Assembly Facility (DAF). Because there were insufficient staging containers available for the fuel plates, NSTec conducted an analysis of alternatives. The project required a staging method that would reduce the staging footprint while addressing nuclear criticality safety and radiation exposure concerns. To accommodate an intermediate staging method of approximately five years, the NSTec project team determined that a unique and unconventional staging package, the AT-400R, was available to meet the project requirements. By using the AT-400R containers, NSTec was able to realize a cost savings of approximately $10K per container, a total cost savings of nearly $450K.« less
Predicting Time-to-Relapse in Breast Cancer Using Neural Networks
1997-12-01
CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 118. SECURITY CLASSIFICATION OF THIS PAGE Unclassified 19. SECURITY CLASSIFICATION OF...Lowell WE, and Davis GL. A neural network that predicts psychiatric length of stay. MD Computing 10:87-92, 1993. Ebell MH. Artificial neural netowrks
77 FR 16165 - United States Savings Bonds and Notes; Payments
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-20
... security by imprinting the word ``PAID'' on its face and entering the amount and date of the actual payment... imprint of a payment stamp. The stamp may not exceed 1\\1/8\\ inches in any dimension and must include the...
78 FR 16856 - Sunshine Act Meetings
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-19
... Savings Plan Activity Reports by the Executive Director. a. Monthly Participant Activity Report. b. Monthly Investment Report. c. Legislative Report. 3. Shareholder Actions. 4. Demographics Report. 5. Audit Reports and DOL Presentation. Parts Closed to the Public 1. Security. CONTACT PERSON FOR MORE INFORMATION...
76 FR 79275 - Truth in Savings (Regulation DD)
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-21
... disclosure. Sensitive personal information, such as account numbers or social security numbers, should not be... improved, and consumers' ability to make informed decisions regarding deposit accounts would be... regulations, while making information on the other regulations available. The Bureau expects to conduct...
Code of Federal Regulations, 2012 CFR
2012-04-01
... Purchase and Installation of Energy Conserving Improvements, Solar Energy Systems, and Individual Utility... not now covered by a mortgage insured or held by the Secretary. (c) Energy saving loan means any form of secured obligation used in connection with the purchase and installation of energy conserving...
Code of Federal Regulations, 2013 CFR
2013-04-01
... Purchase and Installation of Energy Conserving Improvements, Solar Energy Systems, and Individual Utility... not now covered by a mortgage insured or held by the Secretary. (c) Energy saving loan means any form of secured obligation used in connection with the purchase and installation of energy conserving...
Code of Federal Regulations, 2010 CFR
2010-04-01
... Purchase and Installation of Energy Conserving Improvements, Solar Energy Systems, and Individual Utility... not now covered by a mortgage insured or held by the Secretary. (c) Energy saving loan means any form of secured obligation used in connection with the purchase and installation of energy conserving...
Code of Federal Regulations, 2014 CFR
2014-04-01
... Purchase and Installation of Energy Conserving Improvements, Solar Energy Systems, and Individual Utility... not now covered by a mortgage insured or held by the Secretary. (c) Energy saving loan means any form of secured obligation used in connection with the purchase and installation of energy conserving...
Code of Federal Regulations, 2011 CFR
2011-04-01
... Purchase and Installation of Energy Conserving Improvements, Solar Energy Systems, and Individual Utility... not now covered by a mortgage insured or held by the Secretary. (c) Energy saving loan means any form of secured obligation used in connection with the purchase and installation of energy conserving...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-15
... structure and how the security will perform in various scenarios throughout the business cycle. The FDIC... F Street) on business days between 7 a.m. and 5 p.m. Public Inspection: All comments received must...
Jackson, Bianca D; Walker, Neff; Heidkamp, Rebecca
2017-11-01
Background: The Lives Saved Tool (LiST) uses the poverty head-count ratio at $1.90/d as a proxy for food security to identify the percentage of the population with the potential to benefit from balanced energy supplementation and complementary feeding (CF) interventions, following the approach used for the Lancet 's 2008 series on Maternal and Child Undernutrition. Because much work has been done in the development of food security indicators, a re-evaluation of the use of this indicator was warranted. Objective: The aim was to re-evaluate the use of the poverty head-count ratio at $1.90/d as the food security proxy indicator in LiST. Methods: We carried out a desk review to identify available indicators of food security. We identified 3 indicators and compared them by using scatterplots, Spearman's correlations, and Bland-Altman plot analysis. We generated LiST projections to compare the modeled impact results with the use of the different indicators. Results: There are many food security indicators available, but only 3 additional indicators were identified with the data availability requirements to be used as the food security indicator in LiST. As expected, analyzed food security indicators were significantly positively correlated ( P < 0.001), but there was generally poor agreement between them. The disparity between the indicators also increases as the values of the indicators increase. Consequently, the choice of indicator can have a considerable effect on the impact of interventions modeled in LiST, especially in food-insecure contexts. Conclusions: There was no single indicator identified that is ideal for measuring the percentage of the population who is food insecure for LiST. Thus, LiST will use the food security indicators that were used in the meta-analyses that produced the effect estimates. These are the poverty head-count ratio at $1.90/d for CF interventions and the prevalence of a low body mass index in women of reproductive age for balanced energy supplementation interventions. © 2017 American Society for Nutrition.
2006-06-01
winglets : 35.81m Length: 38.56m Height: 12.83m Fuselage length: 38.02m Tailplane: 14.35m Maximum taxi weight: 83,778kg Maximum fuel...visual and aerodynamic handling deficiencies (by today’s standards) and are only capable of partially qualifying a VP-30 Cat I or Cat III pilot in
Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes
NASA Astrophysics Data System (ADS)
Tavallaei, Saeed Ebadi; Falahati, Abolfazl
Due to the low level of security in public key cryptosystems based on number theory, fundamental difficulties such as "key escrow" in Public Key Infrastructure (PKI) and a secure channel in ID-based cryptography, a new key distribution cryptosystem based on Error Control Codes (ECC) is proposed . This idea is done by some modification on McEliece cryptosystem. The security of ECC cryptosystem obtains from the NP-Completeness of block codes decoding. The capability of generating public keys with variable lengths which is suitable for different applications will be provided by using ECC. It seems that usage of these cryptosystems because of decreasing in the security of cryptosystems based on number theory and increasing the lengths of their keys would be unavoidable in future.
An aging society: opportunity or challenge?
Cutler, D M; Poterba, J M; Sheiner, L M; Summers, L H
1990-01-01
"This paper steps back from the current political debate [in the United States] over the social security trust fund and examines the more general question of how serious a macroeconomic problem aging is and how policy should respond to it. We focus primarily on issues relating to saving and capital accumulation. We do not consider the broader question of whether the current U.S. national saving rate is too high or too low, but focus on the effect of demographic changes on the optimal level of national saving. In addition, we consider the effects of demographic change on productivity growth and the optimal timing of tax collections. Our general conclusion is that demographic changes will improve American standards of living in the near future, but lower them slightly over the very long term. Other things being equal, the optimal policy response to recent and anticipated demographic changes is almost certainly a reduction rather than an increase in the national saving rate." excerpt
Scarani, Valerio; Acín, Antonio; Ribordy, Grégoire; Gisin, Nicolas
2004-02-06
We introduce a new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks. We study one of these protocols, which differs from the original protocol by Bennett and Brassard (BB84) only in the classical sifting procedure. This protocol is provably better than BB84 against PNS attacks at zero error.
Blind One-Bit Compressive Sampling
2013-01-17
14] Q. Li, C. A. Micchelli, L. Shen, and Y. Xu, A proximity algorithm accelerated by Gauss - Seidel iterations for L1/TV denoising models, Inverse...methods for nonconvex optimization on the unit sphere and has a provable convergence guarantees. Binary iterative hard thresholding (BIHT) algorithms were... Convergence analysis of the algorithm is presented. Our approach is to obtain a sequence of optimization problems by successively approximating the ℓ0
Properties of a certain stochastic dynamical system, channel polarization, and polar codes
NASA Astrophysics Data System (ADS)
Tanaka, Toshiyuki
2010-06-01
A new family of codes, called polar codes, has recently been proposed by Arikan. Polar codes are of theoretical importance because they are provably capacity achieving with low-complexity encoding and decoding. We first discuss basic properties of a certain stochastic dynamical system, on the basis of which properties of channel polarization and polar codes are reviewed, with emphasis on our recent results.
Sen. Coburn, Tom [R-OK
2011-05-11
Senate - 05/11/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
NASA technology utilization house
NASA Technical Reports Server (NTRS)
1977-01-01
Following systems and features, which are predicted to save approximately $20,000 in utility costs over twenty year period, are incorporated into single-level, contemporarily designed, energy efficient residential structure: solar heating and cooling; energy efficient appliances; water recycling; security, smoke, and tornado detectors; and flat conductor electrical wiring.
36 CFR Appendix A to Part 1234 - Minimum Security Standards for Level III Federal Facilities
Code of Federal Regulations, 2014 CFR
2014-07-01
... technology and blast standards. Immediate review of ongoing projects may generate savings in the... critical systems (alarm systems, radio communications, computer facilities, etc.) Required. Occupant... all exterior windows (shatter protection) Recommended. Review current projects for blast standards...
36 CFR Appendix A to Part 1234 - Minimum Security Standards for Level III Federal Facilities
Code of Federal Regulations, 2012 CFR
2012-07-01
... technology and blast standards. Immediate review of ongoing projects may generate savings in the... critical systems (alarm systems, radio communications, computer facilities, etc.) Required. Occupant... all exterior windows (shatter protection) Recommended. Review current projects for blast standards...
Caruana, Erin L; Kuys, Suzanne S; Clarke, Jane; Bauer, Sandra G
2017-08-01
This study determined the impact of a pragmatic 6-day physiotherapy service on length of stay, functional independence, gait and balance in people undergoing inpatient rehabilitation, compared to a 5-day service. A prospective cohort study with historical comparison was undertaken in a mixed inpatient rehabilitation unit. Intervention period participants (2011) meeting inclusion criteria were eligible for a 6-day physiotherapy service. All other participants, including the historical cohort (2010) received usual care (5-day physiotherapy). Length of stay, functional independence, gait and balance performance were measured. A total of 536 individuals participated in this study; 270 in 2011 (60% received 6-day physiotherapy) and 266 in 2010. Participants in 2011 showed a trend for reduced length of stay (1.7 days, 95%CI -0.53 to 3.92) compared to 2010. Other measures showed no significant differences between cohorts. In 2011, those receiving 6-day physiotherapy were more dependent, but showed significantly improved functional independence and balance compared to those receiving 5-day physiotherapy (p < 0.040) without impacting length of stay. Implementing a 6-day physiotherapy service in a "real-world" rehabilitation setting demonstrated a trend towards reduced length of stay, and improved functional gains. This service could lead to cost-savings for hospitals and improved patient flow. Implications for Rehabilitation "Real-world" implementation of a 6-day physiotherapy service in rehabilitation shows a trend for reducing length of stay. This reduction in length of stay may lead to cost-savings for the hospital system, and improve patient flow into rehabilitation. Patients receiving 6-day physiotherapy made significant gains in balance and functional independence compared to patients receiving 5-day physiotherapy services in the rehabilitation setting.
An Energy Efficient Protocol For The Internet Of Things
NASA Astrophysics Data System (ADS)
Venčkauskas, Algimantas; Jusas, Nerijus; Kazanavičius, Egidijus; Štuikys, Vytautas
2015-01-01
The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.
Context aware adaptive security service model
NASA Astrophysics Data System (ADS)
Tunia, Marcin A.
2015-09-01
Present systems and devices are usually protected against different threats concerning digital data processing. The protection mechanisms consume resources, which are either highly limited or intensively utilized by many entities. The optimization of these resources usage is advantageous. The resources that are saved performing optimization may be utilized by other mechanisms or may be sufficient for longer time. It is usually assumed that protection has to provide specific quality and attack resistance. By interpreting context situation of business services - users and services themselves, it is possible to adapt security services parameters to countermeasure threats associated with current situation. This approach leads to optimization of used resources and maintains sufficient security level. This paper presents architecture of adaptive security service, which is context-aware and exploits quality of context data issue.
A cost-benefit analysis of the Mexican Social Security Administration's family planning program.
Nortman, D L; Halvas, J; Rabago, A
1986-01-01
A cost-benefit analysis of the family planning program of the Mexican Social Security System (IMSS) was undertaken to test the hypothesis that IMSS's family planning services yield a net savings to IMSS by reducing the load on its maternal and infant care service. The cost data are believed to be of exceptionally high quality because they were empirically ascertained by a retrospective and prospective survey of unit time and personnel costs per specified detailed type of service in 37 IMSS hospitals and 16 clinics in 13 of Mexico's 32 states. Based on the average cost per case, the analysis disclosed that for every peso (constant 1983 currency) that IMSS spent on family planning services to its urban population during 1972-1984 inclusive, the agency saved nine pesos. The article concludes by raising the speculative question as to the proportion of the births averted by the IMSS family planning program that would have been averted in the absence of IMSS's family planning services.
2008-12-01
SHA256 DIGEST LENGTH) ) ; peAddSection(&sF i l e , " . S i g S t u b " , dwStubSecSize , dwStubSecSize ) ; 169 peSecure(&sF i l e , deqAddrSize...deqAuthPageAddrSize . s i z e ( ) /2) ∗ (8 + SHA256 DIGEST LENGTH) ) + 16 ; bCode [ 3 4 ] = ( ( char∗)&dwSize ) [ 0 ] ; bCode [ 3 5 ] = ( ( char∗)&dwSize ) [ 1...2) ∗ (8 + SHA256 DIGEST LENGTH... ) ) ; AES KEY aesKey ; unsigned char i v s a l t [ 1 6 ] , temp iv [ 1 6 ] ; 739 unsigned char ∗key
1991-09-01
Secretary of Defense as a method to achieve savings in the $9 billion spent annually on information technology in DoD and to promote interoperability and...by the Office of the Secretary of Defense as a method to achieve savings in the $9 billion spent annually on information technology in DoD and to...commander. Without standard conventions for terminolo- gy, tactics or operations, the different units would have to expend much more time and effort to
Evaluating the Investment Potential of HSAs in Benefit Programs.
LaFleur, James; Magner, Liana; Domaszewicz, Sander
Despite its complexities, the health savings account (HSA) is a powerful and growing element of the U.S. financial landscape. In the future, employers will likely be expected to provide tax-advantaged savings programs for employees' current and future medical expenses. This article discusses investment lineup issues that must be addressed in order to optimize HSAs to help participants achieve successful outcomes. Plan sponsors at the forefront of addressing these issues (and perhaps others) will be in a better position to help their employees maximize both the health benefits and the wealth benefits provided for a secure retirement.
Food security, maternal feeding practices and child weight-for-length.
Barroso, Cristina S; Roncancio, Angelica; Moramarco, Michael W; Hinojosa, Martha B; Davila, Yolanda R; Mendias, Elnora; Reifsnider, Elizabeth
2016-02-01
Over consumption of energy-dense nutrient-poor foods may contribute to childhood obesity. We hypothesized that greater than recommended servings of sugar sweetened beverages and foods, indicators of food security, and a high maternal recumbent weight-for-length are positively associated with high percentages of child overweight/obesity. This secondary data analysis consisted of a sample of 240 mother-child dyads. The original studies were designed to examine the effect of a public health nursing intervention on optimal childhood growth for low-income, minority children. Eligibility to participate included: 1) mothers self-identified as Hispanic; 2) children were 12-24 months old; and 3) children were enrolled in the Special Supplemental Nutrition Program for Women, Infants and Children (WIC); and 4) children were free of any major disease. Multivariate logistic regression examined the association between child weight, weight-for-length, maternal recumbent weight-for-length, child's eating schedule, maternal attitudes on feeding, food security, and consumption of sugar-sweetened beverages, desserts and fatty meats. Receiving SNAP was positively associated with child weight-for-length (WL). Children whose mothers reported ever having received SNAP were 2.01 times more likely to be overweight compared to children whose mothers did not report ever having received SNAP (95% CI=1.04-3.90). Children who consumed desserts were 2.87 times more likely to be overweight compared to children who did not consume desserts (95% CI=1.19-6.88). Also, child's caloric intake was significantly associated with child WL. Children who consumed more calories were 1.00 times more likely to be overweight compared to children who consumed fewer calories (95% CI=1.00-1.00). Research on food security and children's weight has reported mixed findings. Methodological issues have been identified as contributory to the inconsistent findings. Of paramount importance to these studies is the measurement of low food security. Children in this sample who were food insecure, as indicated by SNAP recipients, were more likely to have a higher WL measurement. Future studies should focus on the correlation between food security and hunger/satiety cues. Copyright © 2015 Elsevier Inc. All rights reserved.
ERIC Educational Resources Information Center
Kiss, Elizabeth
2006-01-01
Earning, spending, saving and investing, and using credit are important aspects of money management that teens need to understand as they move into adulthood. Family and consumer sciences (FCS) professionals have a long history of addressing this important life skill. This brief article describes the High School Financial Planning Program (HSFPP),…
Code of Federal Regulations, 2010 CFR
2010-10-01
... HOMELAND SECURITY DISASTER ASSISTANCE FEDERAL DISASTER ASSISTANCE Coastal Barrier Resources Act § 206.345... coastal water areas because the use or facility requires access to the coastal water body; and (3... actions essential to the saving of lives and the protection of property and the public health and safety...
44 CFR 206.346 - Applicability to disaster assistance.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF HOMELAND SECURITY DISASTER ASSISTANCE FEDERAL DISASTER ASSISTANCE Coastal Barrier Resources Act... are essential to the saving of lives and the protection of property and the public health and safety... not limited to: (1) Removal of debris from public property; (2) Emergency protection measures to...
Code of Federal Regulations, 2014 CFR
2014-10-01
... HOMELAND SECURITY DISASTER ASSISTANCE FEDERAL DISASTER ASSISTANCE Coastal Barrier Resources Act § 206.345... coastal water areas because the use or facility requires access to the coastal water body; and (3... actions essential to the saving of lives and the protection of property and the public health and safety...
44 CFR 206.346 - Applicability to disaster assistance.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY DISASTER ASSISTANCE FEDERAL DISASTER ASSISTANCE Coastal Barrier Resources Act... are essential to the saving of lives and the protection of property and the public health and safety... not limited to: (1) Removal of debris from public property; (2) Emergency protection measures to...
Code of Federal Regulations, 2013 CFR
2013-10-01
... HOMELAND SECURITY DISASTER ASSISTANCE FEDERAL DISASTER ASSISTANCE Coastal Barrier Resources Act § 206.345... coastal water areas because the use or facility requires access to the coastal water body; and (3... actions essential to the saving of lives and the protection of property and the public health and safety...
Code of Federal Regulations, 2012 CFR
2012-10-01
... HOMELAND SECURITY DISASTER ASSISTANCE FEDERAL DISASTER ASSISTANCE Coastal Barrier Resources Act § 206.345... coastal water areas because the use or facility requires access to the coastal water body; and (3... actions essential to the saving of lives and the protection of property and the public health and safety...
Code of Federal Regulations, 2011 CFR
2011-10-01
... HOMELAND SECURITY DISASTER ASSISTANCE FEDERAL DISASTER ASSISTANCE Coastal Barrier Resources Act § 206.345... coastal water areas because the use or facility requires access to the coastal water body; and (3... actions essential to the saving of lives and the protection of property and the public health and safety...
44 CFR 206.346 - Applicability to disaster assistance.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF HOMELAND SECURITY DISASTER ASSISTANCE FEDERAL DISASTER ASSISTANCE Coastal Barrier Resources Act... are essential to the saving of lives and the protection of property and the public health and safety... not limited to: (1) Removal of debris from public property; (2) Emergency protection measures to...
44 CFR 206.346 - Applicability to disaster assistance.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF HOMELAND SECURITY DISASTER ASSISTANCE FEDERAL DISASTER ASSISTANCE Coastal Barrier Resources Act... are essential to the saving of lives and the protection of property and the public health and safety... not limited to: (1) Removal of debris from public property; (2) Emergency protection measures to...
44 CFR 206.346 - Applicability to disaster assistance.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF HOMELAND SECURITY DISASTER ASSISTANCE FEDERAL DISASTER ASSISTANCE Coastal Barrier Resources Act... are essential to the saving of lives and the protection of property and the public health and safety... not limited to: (1) Removal of debris from public property; (2) Emergency protection measures to...
12 CFR 568.5 - Protection of customer information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Protection of customer information. 568.5 Section 568.5 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITY PROCEDURES § 568.5 Protection of customer information. Savings associations and their subsidiaries (except...
Code of Federal Regulations, 2010 CFR
2010-10-01
... OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL EXECUTIVE POLICY § 201.3 Policy. (a..., postattack resources will be assigned to activities concerned with the maintenance and saving of lives... and recovery. (g) The Director of the Office of Science and Technology Policy will serve as the...
ERIC Educational Resources Information Center
Lowe, Jason; Noyes, Brad
1999-01-01
Explains how proper athletic facility locker-room design can save time and money. Design factors that address who will be using the facility are discussed as are user requirements, such as preparation areas, total storage area per user, grooming area, and security areas. Final comments address maintenance and operations issues. (GR)
Practical issues in quantum-key-distribution postprocessing
NASA Astrophysics Data System (ADS)
Fung, Chi-Hang Fred; Ma, Xiongfeng; Chau, H. F.
2010-01-01
Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.
Evaluation of advanced lift concepts and fuel conservative short-haul aircraft, volume 1
NASA Technical Reports Server (NTRS)
Renshaw, J. H.; Bowden, M. K.; Narucki, C. W.; Bennett, J. A.; Smith, P. R.; Ferrill, R. S.; Randall, C. C.; Tibbetts, J. G.; Patterson, R. W.; Meyer, R. T.
1974-01-01
The performance and economics of a twin-engine augmentor wing airplane were evaluated in two phases. Design aspects of the over-the-wing/internally blown flap hybrid, augmentor wing, and mechanical flap aircraft were investigated for 910 m. field length with parametric extension to other field lengths. Fuel savings achievable by application of advanced lift concepts to short-haul aircraft were evaluated and the effect of different field lengths, cruise requirements, and noise levels on fuel consumption and airplane economics at higher fuel prices were determined. Conclusions and recommendations are presented.
Chamberlain, Mark; Dwyer, Rebecca
2015-01-01
Pre-operative assessment of complex surgical patients can be a lengthy process, albeit essential to minimise complication rates. In a tertiary referral unit specialising in the surgical repair of entercutaneous fistulas, a baseline audit revealed an average in-patient length of stay of 30.1 days, mainly caused by poor co-ordination between specialities. After the introduction of a weekly multi-disciplinary team meeting and the formalisation of a patient pathway, this admission length was reduced to 5.7 days (p<0.01), resulting in significant savings to the department.
Racial and ethnic differences in wealth and asset choices.
Choudhury, S
White households in the United States are far wealthier than black or Hispanic households, a disparity that remains unexplained even after taking into account income and demographic factors. This article uses data from the Health and Retirement Study to examine various components of aggregate wealth, including housing equity, nonhousing equity, financial assets in general, and risky assets in particular. It inspects asset choices by race and ethnicity and assesses whether differences in saving behavior--and, consequently, in rates of return on assets--are possible sources of the wealth gap. It also demonstrates the equalizing effect of pension wealth and Social Security wealth on total wealth. Racial and ethnic differences in housing equity narrow among households in the higher income quartiles, whereas differences in nonhousing equity generally widen as income increases. The widening gap in nonhousing equity stems from differences in financial asset holdings, particularly risky assets. At every income quartile and educational level, the percentage of black and Hispanic households that own risky, higher-yielding assets in considerably smaller than the percentage of white households. Thus, some of the wealth gap appears to be attributable to differences in saving behavior. Understanding how people save--in particular, knowing whether certain people will be more vulnerable financially because of their saving choices--helps policymakers assess older Americans' financial preparedness for retirement and anticipate their economic well-being thereafter. Lower rates of investment in the financial market will probably result in slower wealth creation in minority households. Recognizing this, some organizations are trying to open opportunities for minority households to invest in the financial market. This is a positive step toward narrowing the wealth divide. Such efforts will become even more critical if Social Security reform places increased responsibility on individuals to manage personal accounts.
Matrix Recipes for Hard Thresholding Methods
2012-11-07
have been proposed to approximate the solution. In [11], Donoho et al . demonstrate that, in the sparse approximation problem, under basic incoherence...inducing convex surrogate ‖ · ‖1 with provable guarantees for unique signal recovery. In the ARM problem, Fazel et al . [12] identified the nuclear norm...sparse recovery for all. Technical report, EPFL, 2011 . [25] N. Halko , P. G. Martinsson, and J. A. Tropp. Finding structure with randomness: Probabilistic
Auditing Rational Adversaries to Provably Manage Risks
2012-05-23
series of white papers on accountability-based privacy governance in which one recommendation is that organisations should have in place policies and...that this state of affairs raises is how to design effective audit and punishment schemes. This paper articulates a desirable property and presents an...In this section, we provide an overview of our model using a motivating scenario that will serve as a running example for this paper . Consider a
Solving LP Relaxations of Large-Scale Precedence Constrained Problems
NASA Astrophysics Data System (ADS)
Bienstock, Daniel; Zuckerberg, Mark
We describe new algorithms for solving linear programming relaxations of very large precedence constrained production scheduling problems. We present theory that motivates a new set of algorithmic ideas that can be employed on a wide range of problems; on data sets arising in the mining industry our algorithms prove effective on problems with many millions of variables and constraints, obtaining provably optimal solutions in a few minutes of computation.
Tractable Algorithms for Proximity Search on Large Graphs
2010-07-01
development in information retrieval, 2005. 5.1 164 A. K. Chandra, P. Raghavan, W. L. Ruzzo, and R. Smolensky. The electrical resistance of a graph captures...2007] show how to use hitting times for designing provably manipulation resistant reputation systems. Harmonic func- tions have been used for...commute times with electrical net- works (Doyle and Snell [1984]). Consider an undirected graph. Now think of each edge as a resistor with conductance
Spectral Learning for Supervised Topic Models.
Ren, Yong; Wang, Yining; Zhu, Jun
2018-03-01
Supervised topic models simultaneously model the latent topic structure of large collections of documents and a response variable associated with each document. Existing inference methods are based on variational approximation or Monte Carlo sampling, which often suffers from the local minimum defect. Spectral methods have been applied to learn unsupervised topic models, such as latent Dirichlet allocation (LDA), with provable guarantees. This paper investigates the possibility of applying spectral methods to recover the parameters of supervised LDA (sLDA). We first present a two-stage spectral method, which recovers the parameters of LDA followed by a power update method to recover the regression model parameters. Then, we further present a single-phase spectral algorithm to jointly recover the topic distribution matrix as well as the regression weights. Our spectral algorithms are provably correct and computationally efficient. We prove a sample complexity bound for each algorithm and subsequently derive a sufficient condition for the identifiability of sLDA. Thorough experiments on synthetic and real-world datasets verify the theory and demonstrate the practical effectiveness of the spectral algorithms. In fact, our results on a large-scale review rating dataset demonstrate that our single-phase spectral algorithm alone gets comparable or even better performance than state-of-the-art methods, while previous work on spectral methods has rarely reported such promising performance.
Generalized Buneman Pruning for Inferring the Most Parsimonious Multi-state Phylogeny
NASA Astrophysics Data System (ADS)
Misra, Navodit; Blelloch, Guy; Ravi, R.; Schwartz, Russell
Accurate reconstruction of phylogenies remains a key challenge in evolutionary biology. Most biologically plausible formulations of the problem are formally NP-hard, with no known efficient solution. The standard in practice are fast heuristic methods that are empirically known to work very well in general, but can yield results arbitrarily far from optimal. Practical exact methods, which yield exponential worst-case running times but generally much better times in practice, provide an important alternative. We report progress in this direction by introducing a provably optimal method for the weighted multi-state maximum parsimony phylogeny problem. The method is based on generalizing the notion of the Buneman graph, a construction key to efficient exact methods for binary sequences, so as to apply to sequences with arbitrary finite numbers of states with arbitrary state transition weights. We implement an integer linear programming (ILP) method for the multi-state problem using this generalized Buneman graph and demonstrate that the resulting method is able to solve data sets that are intractable by prior exact methods in run times comparable with popular heuristics. Our work provides the first method for provably optimal maximum parsimony phylogeny inference that is practical for multi-state data sets of more than a few characters.
Factors Affecting Attachment in International Adoptees at 6 Months Post Adoption
Weiss, Sandra
2011-01-01
This pilot study examined the effect of five child and maternal factors on the attachment security of international adoptees at six months post adoption. Results from the sample of 22 adoptive mother-infant dyads showed that age at adoption, developmental status, length and quality of preadoption care, and maternal attachment representations were not significant predictors of child attachment status. The number of preadoption placements and the child's stress level did significantly predict attachment status, accounting for approximately 40% of the variance in attachment security. Number of preadoption placements uniquely contributed 14% of that variance (p=.007) while stress level uniquely contributed 12% (p=.01). Children who had fewer preadoption placements had higher attachment security; similarly, children who had lower stress levels had higher attachment security. Results suggest that consistency of preadoption care was more important than its length or quality. Further, the relationship between stress level and attachment security raises the possibility that a lower stress level functions as a protective factor for the developing attachment with the adoptive mother. PMID:22267885
Code of Federal Regulations, 2010 CFR
2010-01-01
... assets means: (1) A savings association's total assets as that term is defined in this section; (2) Plus... advances as defined in this section are not direct credit substitutes; (7) Clean-up calls on third party...) The term equity securities does not include investments in a subsidiary as that term is defined in...
Course Notes and Suggestions for Consumer Education.
ERIC Educational Resources Information Center
Sweetwater Union High School District, Chula Vista, CA.
The document is a guide to a consumer education course; the course format is a series of several activity-based miniunits for each of 15 instructional areas: components of life styles, decision making, settling conflicts, budgeting, handling and controlling family income, credit, interest rates, savings institutions, family financial security,…
12 CFR 560.121 - Investment in State housing corporations.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Investment in State housing corporations. 560... Investment in State housing corporations. (a) Any savings association to the extent it has legal authority to... state housing corporation; provided, that such obligations or loans are secured directly, or indirectly...
12 CFR 560.121 - Investment in State housing corporations.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Investment in State housing corporations. 560... Investment in State housing corporations. (a) Any savings association to the extent it has legal authority to... state housing corporation; provided, that such obligations or loans are secured directly, or indirectly...
12 CFR 560.121 - Investment in State housing corporations.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Investment in State housing corporations. 560... Investment in State housing corporations. (a) Any savings association to the extent it has legal authority to... state housing corporation; provided, that such obligations or loans are secured directly, or indirectly...
12 CFR 560.121 - Investment in State housing corporations.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Investment in State housing corporations. 560... Investment in State housing corporations. (a) Any savings association to the extent it has legal authority to... state housing corporation; provided, that such obligations or loans are secured directly, or indirectly...
77 FR 32179 - Proposed Collection: Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-31
... Certificate of Identity. DATES: Written comments should be received on or before July 30, 2012 to be assured...: Title: Certificate of Identity. OMB Number: 1535-0048. Form Number: PD F 0385. Abstract: The information is requested to establish the identity of the owner of the United States Savings Securities. Current...
78 FR 62313 - General Pulaski Memorial Day, 2013
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-16
... helped secure our independence. He sacrificed his life in defense of our freedom, and each year on... Brandywine, where his courageous charge covered General George Washington's retreat, saving Washington's life... mortally wounded. He did not live to see the Revolution's end, but he died with hope that our Nation would...
31 CFR 352.7 - Issues on exchange.
Code of Federal Regulations, 2010 CFR
2010-07-01
... States Savings Notes (Freedom Shares) at their current redemption values for Series HH bonds. Series E.... The total current redemption value of the eligible securities submitted for exchange in any one transaction was required to be $500 or more. If the current redemption value was an even multiple of $500...
31 CFR 352.7 - Issues on exchange.
Code of Federal Regulations, 2013 CFR
2013-07-01
... States Savings Notes (Freedom Shares) at their current redemption values for Series HH bonds. Series E.... The total current redemption value of the eligible securities submitted for exchange in any one transaction was required to be $500 or more. If the current redemption value was an even multiple of $500...
31 CFR 352.7 - Issues on exchange.
Code of Federal Regulations, 2011 CFR
2011-07-01
... States Savings Notes (Freedom Shares) at their current redemption values for Series HH bonds. Series E.... The total current redemption value of the eligible securities submitted for exchange in any one transaction was required to be $500 or more. If the current redemption value was an even multiple of $500...
31 CFR 352.7 - Issues on exchange.
Code of Federal Regulations, 2014 CFR
2014-07-01
... redemption value exceeded, but was not an even multiple of $500, the owner had the option either: (1) To add... United States Savings Notes (Freedom Shares) at their current redemption values for Series HH bonds...) Computation of issue price. The total current redemption value of the eligible securities submitted for...
31 CFR 352.7 - Issues on exchange.
Code of Federal Regulations, 2012 CFR
2012-07-01
... States Savings Notes (Freedom Shares) at their current redemption values for Series HH bonds. Series E.... The total current redemption value of the eligible securities submitted for exchange in any one transaction was required to be $500 or more. If the current redemption value was an even multiple of $500...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-17
.... ACTION: Environmental Assessment and Finding of No Significant Impact. FOR FURTHER INFORMATION CONTACT... environmental assessment or an environmental impact statement. This environmental assessment was prepared for... environmental impacts. There will be minor savings of energy and vehicular use associated with the security...
The looming retirement crisis.
Walker, D M
1997-06-01
A retirement crisis looms in the United States due to a number of recent and emerging trends that affect government retirement programs, employer- and union-sponsored retirement benefits and personal savings arrangements. The crisis can be averted, but only with well-thought-out action on a number of issues, particularly Social Security and Medicare reform.
Code of Federal Regulations, 2012 CFR
2012-01-01
... with § 195.41. (d) Automated teller machine (ATM) means an automated, unstaffed banking facility owned...) Motor vehicle loan, which is a consumer loan extended for the purchase of and secured by a motor vehicle... means a savings association that offers only a narrow product line (such as credit card or motor vehicle...
Code of Federal Regulations, 2014 CFR
2014-01-01
... with § 195.41. (d) Automated teller machine (ATM) means an automated, unstaffed banking facility owned...) Motor vehicle loan, which is a consumer loan extended for the purchase of and secured by a motor vehicle... means a savings association that offers only a narrow product line (such as credit card or motor vehicle...
Code of Federal Regulations, 2013 CFR
2013-01-01
... with § 195.41. (d) Automated teller machine (ATM) means an automated, unstaffed banking facility owned...) Motor vehicle loan, which is a consumer loan extended for the purchase of and secured by a motor vehicle... means a savings association that offers only a narrow product line (such as credit card or motor vehicle...
12 CFR 561.12 - Consumer credit.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Consumer credit. 561.12 Section 561.12 Banks... AFFECTING ALL SAVINGS ASSOCIATIONS § 561.12 Consumer credit. The term consumer credit means credit extended... real estate and chattel liens secured by mobile homes and leases of personal property to consumers that...
FERMI/GLAST Integrated Trending and Plotting System Release 5.0
NASA Technical Reports Server (NTRS)
Ritter, Sheila; Brumer, Haim; Reitan, Denise
2012-01-01
An Integrated Trending and Plotting System (ITPS) is a trending, analysis, and plotting system used by space missions to determine performance and status of spacecraft and its instruments. ITPS supports several NASA mission operational control centers providing engineers, ground controllers, and scientists with access to the entire spacecraft telemetry data archive for the life of the mission, and includes a secure Web component for remote access. FERMI/GLAST ITPS Release 5.0 features include the option to display dates (yyyy/ddd) instead of orbit numbers along orbital Long-Term Trend (LTT) plot axis, the ability to save statistics from daily production plots as image files, and removal of redundant edit/create Input Definition File (IDF) screens. Other features are a fix to address invalid packet lengths, a change in naming convention of image files in order to use in script, the ability to save all ITPS plot images (from Windows or the Web) as GIF or PNG format, the ability to specify ymin and ymax on plots where previously only the desired range could be specified, Web interface capability to plot IDFs that contain out-oforder page and plot numbers, and a fix to change all default file names to show yyyydddhhmmss time stamps instead of hhmmssdddyyyy. A Web interface capability sorts files based on modification date (with newest one at top), and the statistics block can be displayed via a Web interface. Via the Web, users can graphically view the volume of telemetry data from each day contained in the ITPS archive in the Web digest. The ITPS could be also used in nonspace fields that need to plot data or trend data, including financial and banking systems, aviation and transportation systems, healthcare and educational systems, sales and marketing, and housing and construction.
Using Cryptography to Improve Conjunction Analysis
NASA Astrophysics Data System (ADS)
Hemenway, B.; Welser, B.; Baiocchi, D.
2012-09-01
Coordination of operations between satellite operators is becoming increasingly important to prevent collisions. Unfortunately, this coordination is often handicapped by a lack of trust. Coordination and cooperation between satellite operators can take many forms, however, one specific area where cooperation between operators would yield significant benefits is in the computation of conjunction analyses. Passively collected orbital are of generally of too low fidelity to be of use in conjunction analyses. Each operator, however, maintains high fidelity data about their own satellites. These high fidelity data are significantly more valuable in calculating conjunction analyses than the lower-fidelity data. If operators were to share their high fidelity data overall space situational awareness could be improved. At present, many operators do not share data and as a consequence space situational awareness suffers. Restrictive data sharing policies are primarily motivated by privacy concerns on the part of the satellite operators, as each operator is reluctant or unwilling to share data that might compromise its political or commercial interests. In order to perform the necessary conjunction analyses while still maintaining the privacy of their own data, a few operators have entered data sharing agreements. These operators provide their private data to a trusted outside party, who then performs the conjunction analyses and reports the results to the operators. These types of agreements are not an ideal solution as they require a degree of trust between the parties, and the cost of employing the trusted party can be large. In this work, we present and analyze cryptographic tools that would allow satellite operators to securely calculate conjunction analyses without the help of a trusted outside party, while provably maintaining the privacy of their own orbital information. For example, recent advances in cryptographic protocols, specifically in the area of secure Multiparty Computation (MPC) have the potential to allow satellite operators to perform the necessary conjunction analyses without the need to reveal their orbital information to anyone. This talk will describe how MPC works, and how we propose to use it to facilitate secure information sharing between satellite operators.
31 CFR 321.12 - Redemption value of securities.
Code of Federal Regulations, 2011 CFR
2011-07-01
... security is determined by the terms of its offering and the length of time it has been outstanding. The Bureau of the Public Debt determines redemption values for Series A-E bonds, eligible Series EE and I...
Pharmaco-economics of levosimendan in cardiology: a European perspective.
Nieminen, M S; Buerke, M; Parissis, J; Ben-Gal, T; Pollesello, P; Kivikko, M; Karavidas, A; Severino, P; Comín-Colet, J; Wikström, G; Fedele, F
2015-11-15
Heart failure places a significant economic burden on health care. Acute heart failure requires hospitalization and often frequent re-hospitalization in expensive wards where vasoactive rescue therapy is often added on top of standard medications. In these lean times, there is a growing need for cost-effective therapeutic options that supply superior support and in addition shorten the length of stay in hospital and reduce re-hospitalization rates. The inodilator levosimendan represents the latest addition to the vasoactive treatments of acute heart failure patients, and it appears to meet these expectations. Our aim was to answer the question whether the treatment efficacy of levosimendan - when selected as therapy for patients hospitalized for acute heart failure - brings savings to hospitals in various European countries representing different economies. We took a conservative approach and selected some a fortiori arguments to simplify the calculations. We selected seven European countries to represent different economies: Italy, Spain, Greece, Germany, Sweden, Finland and Israel. Data on the costs of medications and on the cost per day were collected and fed in a simple algorithm to detect savings. These saving varied from country to country, from a minimum of €0.50 in Germany to a maximum of €354.64 in Sweden. The use of levosimendan as a therapy for patients hospitalized for acute heart failure provides a net saving to hospitals driven by a reduction in the length of hospital stay. This finding is true in each of the countries considered in this study. Copyright © 2015. Published by Elsevier Ireland Ltd.
Impact of Enterovirus Testing on Resource Use in Febrile Young Infants: A Systematic Review.
Wallace, Sowdhamini S; Lopez, Michelle A; Caviness, A Chantal
2017-02-01
Enterovirus infection commonly causes fever in infants aged 0 to 90 days and, without testing, is difficult to differentiate from serious bacterial infection. To determine the cost savings of routine enterovirus testing and identify subgroups of infants with greater potential impact from testing among infants 0 to 90 days old with fever. Studies were identified systematically from published and unpublished literature by using Embase, Medline, the Cochrane database, and conference proceedings. Inclusion criteria were original studies, in any language, of enterovirus infection including the outcomes of interest in infants aged 0 to 90 days. Standardized instruments were used to appraise each study. The evidence quality was evaluated using Grading of Recommendations Assessment, Development, and Evaluation criteria. Two investigators independently searched the literature, screened and critically appraised the studies, extracted the data, and applied the Grading of Recommendations Assessment, Development, and Evaluation criteria. Of the 257 unique studies identified and screened, 32 were completely reviewed and 8 were included. Routine enterovirus testing was associated with reduced hospital length of stay and cost savings during peak enterovirus season. Cerebrospinal fluid pleocytosis was a poor predictor of enterovirus meningitis. The studies were all observational and the evidence was of low quality. Enterovirus polymerase chain reaction testing, independent of cerebrospinal fluid pleocytosis, can reduce length of stay and achieve cost savings, especially during times of high enterovirus prevalence. Additional study is needed to identify subgroups that may achieve greater cost savings from testing to additionally enhance the efficiency of testing. Copyright © 2017 by the American Academy of Pediatrics.
Street, J T; Thorogood, N P; Cheung, A; Noonan, V K; Chen, J; Fisher, C G; Dvorak, M F
2013-06-01
Observational cohort comparison. To compare the previously validated Spine Adverse Events Severity system (SAVES) with International Classification of Diseases, Tenth Revision codes (ICD-10) codes for identifying adverse events (AEs) in patients with traumatic spinal cord injury (TSCI). Quaternary Care Spine Program. Patients discharged between 2006 and 2010 were identified from our prospective registry. Two consecutive cohorts were created based on the system used to record acute care AEs; one used ICD-10 coding by hospital coders and the other used SAVES data prospectively collected by a multidisciplinary clinical team. The ICD-10 codes were appropriately mapped to the SAVES. There were 212 patients in the ICD-10 cohort and 173 patients in the SAVES cohort. Analyses were adjusted to account for the different sample sizes, and the two cohorts were comparable based on age, gender and motor score. The SAVES system identified twice as many AEs per person as ICD-10 coding. Fifteen unique AEs were more reliably identified using SAVES, including neuropathic pain (32 × more; P<0.001), urinary tract infections (1.4 × ; P<0.05), pressure sores (2.9 × ; P<0.001) and intra-operative AEs (2.3 × ; P<0.05). Eight of these 15 AEs more frequently identified by SAVES significantly impacted length of stay (P<0.05). Risk factors such as patient age and severity of paralysis were more reliably correlated to AEs collected through SAVES than ICD-10. Implementation of the SAVES system for patients with TSCI captured more individuals experiencing AEs and more AEs per person compared with ICD-10 codes. This study demonstrates the utility of prospectively collecting AE data using validated tools.
Application research of rail transit safety protection based on laser detection
NASA Astrophysics Data System (ADS)
Wang, Zhifei
2016-10-01
Platform screen door can not only prevent the passengers fell or jumped the track danger, to passengers bring comfortable waiting environment, but also has the function of environmental protection and energy saving. But platform screen door and train the full-length gap region is insecure in the system design of a hidden, such as passengers for some reason (grab the train) in the interstitial region retention, is sandwiched between the intercity safety door and the door, and such as the region lacks security detection and alarm system, once the passengers in the gap region retention (caught), bring more serious threat to the safety of passengers and traffic safety. This paper from the point of view of the design presents the physical, infrared, laser three safety protection device setting schemes. Domestic intelligence of between rail transit shield door and train security clearance processing used is screen door system standard configuration, the obstacle detection function for avoid passengers stranded in the clearance has strong prevention function. Laser detection research and development projects can access to prevent shield door and train gap clamp safety measures. Rail safety protection method are studied applying laser detection technique. According to the laser reflection equation of foreign body, the characteristics of laser detection of foreign bodies are given in theory. By using statistical analysis method, the workflow of laser detection system is established. On this basis, protection methods is proposed. Finally the simulation and test results show that the laser detection technology in the rail traffic safety protection reliability and stability, And the future laser detection technology in is discussed the development of rail transit.
49 CFR 38.29 - Interior circulation, handrails and stanchions.
Code of Federal Regulations, 2013 CFR
2013-10-01
... length with front-door lifts or ramps, vertical stanchions immediately behind the driver shall either... of 22 feet in length, the minimum interior height along the path from the lift to the securement location shall be 68 inches. For vehicles of 22 feet in length or less, the minimum interior height from...
A Business Case for Tele-Intensive Care Units
Coustasse, Alberto; Deslich, Stacie; Bailey, Deanna; Hairston, Alesia; Paul, David
2014-01-01
Objectives: A tele-intensive care unit (tele-ICU) uses telemedicine in an intensive care unit (ICU) setting, applying technology to provide care to critically ill patients by off-site clinical resources. The purpose of this review was to examine the implementation, adoption, and utilization of tele-ICU systems by hospitals to determine their efficiency and efficacy as identified by cost savings and patient outcomes. Methods: This literature review examined a large number of studies of implementation of tele-ICU systems in hospitals. Results: The evidence supporting cost savings was mixed. Implementation of a tele-ICU system was associated with cost savings, shorter lengths of stay, and decreased mortality. However, two studies suggested increased hospital cost after implementation of tele-ICUs is initially expensive but eventually results in cost savings and better clinical outcomes. Conclusions: Intensivists working these systems are able to more effectively treat ICU patients, providing better clinical outcomes for patients at lower costs compared with hospitals without a tele-ICU. PMID:25662529
Knoll, Melissa A Z
2010-01-01
Traditional economic theory posits that people make decisions by maximizing a utility function in which all of the relevant constraints and preferences are included and weighed appropriately. Behavioral economists and decision-making researchers, however, are interested in how people make decisions in the face of incomplete information, limited cognitive resources, and decision biases. Empirical findings in the areas of behavioral economics and judgment and decision making (JDM) demonstrate departures from the notion that man is economically rational, illustrating instead that people often act in ways that are economically suboptimal. This article outlines findings from the JDM and behavioral-economics literatures that highlight the many behavioral impediments to saving that individuals may encounter on their way to financial security. I discuss how behavioral and psychological issues, such as self-control, emotions, and choice architecture can help policymakers understand what factors, aside from purely economic ones, may affect individuals' savings behavior.
2013-01-01
Background Phylogeny estimation from aligned haplotype sequences has attracted more and more attention in the recent years due to its importance in analysis of many fine-scale genetic data. Its application fields range from medical research, to drug discovery, to epidemiology, to population dynamics. The literature on molecular phylogenetics proposes a number of criteria for selecting a phylogeny from among plausible alternatives. Usually, such criteria can be expressed by means of objective functions, and the phylogenies that optimize them are referred to as optimal. One of the most important estimation criteria is the parsimony which states that the optimal phylogeny T∗for a set H of n haplotype sequences over a common set of variable loci is the one that satisfies the following requirements: (i) it has the shortest length and (ii) it is such that, for each pair of distinct haplotypes hi,hj∈H, the sum of the edge weights belonging to the path from hi to hj in T∗ is not smaller than the observed number of changes between hi and hj. Finding the most parsimonious phylogeny for H involves solving an optimization problem, called the Most Parsimonious Phylogeny Estimation Problem (MPPEP), which is NP-hard in many of its versions. Results In this article we investigate a recent version of the MPPEP that arises when input data consist of single nucleotide polymorphism haplotypes extracted from a population of individuals on a common genomic region. Specifically, we explore the prospects for improving on the implicit enumeration strategy of implicit enumeration strategy used in previous work using a novel problem formulation and a series of strengthening valid inequalities and preliminary symmetry breaking constraints to more precisely bound the solution space and accelerate implicit enumeration of possible optimal phylogenies. We present the basic formulation and then introduce a series of provable valid constraints to reduce the solution space. We then prove that these constraints can often lead to significant reductions in the gap between the optimal solution and its non-integral linear programming bound relative to the prior art as well as often substantially faster processing of moderately hard problem instances. Conclusion We provide an indication of the conditions under which such an optimal enumeration approach is likely to be feasible, suggesting that these strategies are usable for relatively large numbers of taxa, although with stricter limits on numbers of variable sites. The work thus provides methodology suitable for provably optimal solution of some harder instances that resist all prior approaches. PMID:23343437
Local television news coverage of President Clinton's introduction of the Health Security Act.
Dorfman, L; Schauffler, H H; Wilkerson, J; Feinson, J
1996-04-17
To investigate how local television news reported on health system reform during the week President Clinton presented his health system reform bill. Retrospective content analysis of the 1342-page Health Security Act of 1993, the printed text of President Clinton's speech before Congress on September 22, 1993, and a sample of local television news stories on health system reform broadcast during the week of September 19 through 25, 1993. The state of California. During the week, 316 television news stories on health system reform were aired during the 166 local news broadcasts sampled. Health system reform was the second most frequently reported topic, second to stories on violent crime. News stories on health system reform averaged 1 minute 38 seconds in length, compared with 57 seconds for violent crime. Fifty-seven percent of the local news stories focused on interest group politics. Compared with the content of the Health Security Act, local news broadcasts devoted a significantly greater portion of their stories to financing, eligibility, and preventive services. Local news stories gave significantly less attention to cost-saving mechanisms, long-term care benefits, and changes in Medicare and Medicaid, and less than 2% of stories mentioned quality assurance mechanisms, malpractice reform, or new public health initiatives. Of the 316 televised news stories, 53 reported on the president's speech, covering many of the same topics emphasized in the speech (financing, organization and administration, and eligibility) and de-emphasizing many of the same topics (Medicare and Medicaid, quality assurance, and malpractice reform). Two percent of the president's speech covered partisan politics; 45% of the local news stories on the speech featured challenges from partisan politicians. Although health system reform was the focus of a large number of local television news stories during the week, in-depth explanation was scarce. In general, the news stories provided superficial coverage framed largely in terms of the risks and costs of reform to specific stakeholders.
2014-04-01
synchronization primitives based on preset templates can result in over synchronization if unchecked, possibly creating deadlock situations. Further...inputs rather than enforcing synchronization with a global clock. MRICDF models software as a network of communicating actors. Four primitive actors...control wants to send interrupt or not. Since this is shared buffer, a semaphore mechanism is assumed to synchronize the read/write of this buffer. The
Noise-enhanced clustering and competitive learning algorithms.
Osoba, Osonde; Kosko, Bart
2013-01-01
Noise can provably speed up convergence in many centroid-based clustering algorithms. This includes the popular k-means clustering algorithm. The clustering noise benefit follows from the general noise benefit for the expectation-maximization algorithm because many clustering algorithms are special cases of the expectation-maximization algorithm. Simulations show that noise also speeds up convergence in stochastic unsupervised competitive learning, supervised competitive learning, and differential competitive learning. Copyright © 2012 Elsevier Ltd. All rights reserved.
Shirasaka, Takashi; Funama, Yoshinori; Hayashi, Mutsukazu; Awamoto, Shinichi; Kondo, Masatoshi; Nakamura, Yasuhiko; Hatakenaka, Masamitsu; Honda, Hiroshi
2012-01-01
Our purpose in this study was to assess the radiation dose reduction and the actual exposed scan length of over-range areas using a spiral dynamic z-collimator at different beam pitches and detector coverage. Using glass rod dosimeters, we measured the unilateral over-range scan dose between the beginning of the planned scan range and the beginning of the actual exposed scan range. Scanning was performed at detector coverage of 80.0 and 40.0 mm, with and without the spiral dynamic z-collimator. The dose-saving ratio was calculated as the ratio of the unnecessary over-range dose, with and without the spiral dynamic z-collimator. In 80.0 mm detector coverage without the spiral dynamic z-collimator, the actual exposed scan length for the over-range area was 108, 120, and 126 mm, corresponding to a beam pitch of 0.60, 0.80, and 0.99, respectively. With the spiral dynamic z-collimator, the actual exposed scan length for the over-range area was 48, 66, and 84 mm with a beam pitch of 0.60, 0.80, and 0.99, respectively. The dose-saving ratios with and without the spiral dynamic z-collimator for a beam pitch of 0.60, 0.80, and 0.99 were 35.07, 24.76, and 13.51%, respectively. With 40.0 mm detector coverage, the dose-saving ratios with and without the spiral dynamic z-collimator had the highest value of 27.23% with a low beam pitch of 0.60. The spiral dynamic z-collimator is important for a reduction in the unnecessary over-range dose and makes it possible to reduce the unnecessary dose by means of a lower beam pitch.
Possibilities and pitfalls of outsourcing.
Hazelwood, Sarah E; Hazelwood, Anita C; Cook, Ellen D
2005-10-01
Outsourcing can save healthcare organizations costs related to staffing and training. Organizations should ensure that a vendor's staff is credentialed, knowledgeable, and properly trained. Outsourcing firms should ensure the confidentiality and security of the information they will handle. Outsourcing carries risks for providers, including potentially negative impact on tax-exempt status and loss of control over business processes.
12 CFR 567.6 - Risk-based capital credit risk-weight categories.
Code of Federal Regulations, 2010 CFR
2010-01-01
..., but only if the originating bank remains liable to the customer or beneficiary for the full amount of... considered timely if they are not 30 days past due; (D) Qualifying residential construction loans as defined...) Indemnification of customers whose securities the savings association has lent as agent. If the customer is not...
33 CFR 159.311 - Safety exception.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Safety exception. 159.311 Section... Operations § 159.311 Safety exception. The regulations in this subpart shall not apply to discharges made for the purpose of securing the safety of the cruise vessel or saving life at sea, provided that all...
Ready, Steady, Go! Strategies to Improve Texans' Financial Readiness to Pay for College
ERIC Educational Resources Information Center
Helmcamp, Leslie
2011-01-01
Texas faces numerous challenges, but also abundant opportunities to build the middle class and increase prosperity. Unfortunately, too many Texans are sidelined, lacking access to opportunities to learn, earn, and save to secure a prosperous future for themselves and their families. A college education provides opportunities for Texans to obtain…
17 CFR 260.7a-4 - Calculation of time.
Code of Federal Regulations, 2010 CFR
2010-04-01
... eastern daylight-saving time, whichever is in effect at the principal office of the Commission on the date... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Calculation of time. 260.7a-4... time. Saturdays, Sundays and holidays shall be counted in computing the effective date of applications...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-08
... under EPC? c. Should EPCs permit the investments of green building measures if sufficient savings or.... weekdays at the above address. Due to security measures at the HUD Headquarters building, an advance... assessment and auditing protocol for PHA's undertaking self-direct EPCs? Could a Green Physical Needs...
USDA-ARS?s Scientific Manuscript database
Optimizing water use efficiency (WUE) is a crucial goal. However, water savings must not be made at the expense of yield and fruit quality in order to secure economical sustainability for producers. The impact of different anti-transpirants (ATS) on WUE, water consumption (WC), net carbon assimilati...
Collection Development: After the Meltdown (Personal Investing), January 2011
ERIC Educational Resources Information Center
Maxted, Lawrence
2011-01-01
Many current investors involuntarily entered the realm of investments for the first time when 401(k) retirement and other market-tied savings plans became the norm. Homeowners thought their homes were safe, appreciating investments. Yet the last decade saw two major market corrections. The 2008 mortgage-backed securities crisis induced global…
12 CFR 560.35 - Adjustments to home loans.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Adjustments to home loans. 560.35 Section 560.35... Lending and Investment Powers for Federal Savings Associations § 560.35 Adjustments to home loans. (a) For any home loan secured by borrower-occupied property, or property to be occupied by the borrower...
12 CFR 560.35 - Adjustments to home loans.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Adjustments to home loans. 560.35 Section 560.35... Lending and Investment Powers for Federal Savings Associations § 560.35 Adjustments to home loans. (a) For any home loan secured by borrower-occupied property, or property to be occupied by the borrower...
12 CFR 560.35 - Adjustments to home loans.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Adjustments to home loans. 560.35 Section 560... Lending and Investment Powers for Federal Savings Associations § 560.35 Adjustments to home loans. (a) For any home loan secured by borrower-occupied property, or property to be occupied by the borrower...
12 CFR 560.35 - Adjustments to home loans.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Adjustments to home loans. 560.35 Section 560... Lending and Investment Powers for Federal Savings Associations § 560.35 Adjustments to home loans. (a) For any home loan secured by borrower-occupied property, or property to be occupied by the borrower...
12 CFR 560.35 - Adjustments to home loans.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Adjustments to home loans. 560.35 Section 560... Lending and Investment Powers for Federal Savings Associations § 560.35 Adjustments to home loans. (a) For any home loan secured by borrower-occupied property, or property to be occupied by the borrower...
31 CFR 306.11 - Forms of registration for transferable securities.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Federal law, such as a national bank or Federal savings and loan association. Examples: Smith....—Depreciation Acct. (12-3456789). First National Bank of Albemarle (12- 3456789). Abco & Co., Inc., a nominee... Sinking Fund under Ch. 35, Gen. Laws of RI. State of Colorado in trust for Colorado Surplus Property...
31 CFR 306.11 - Forms of registration for transferable securities.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Federal law, such as a national bank or Federal savings and loan association. Examples: Smith....—Depreciation Acct. (12-3456789). First National Bank of Albemarle (12- 3456789). Abco & Co., Inc., a nominee... Sinking Fund under Ch. 35, Gen. Laws of RI. State of Colorado in trust for Colorado Surplus Property...
31 CFR 306.11 - Forms of registration for transferable securities.
Code of Federal Regulations, 2013 CFR
2013-07-01
... Federal law, such as a national bank or Federal savings and loan association. Examples: Smith....—Depreciation Acct. (12-3456789). First National Bank of Albemarle (12- 3456789). Abco & Co., Inc., a nominee... Sinking Fund under Ch. 35, Gen. Laws of RI. State of Colorado in trust for Colorado Surplus Property...
34 CFR 628.43 - What investment standards shall a grantee follow?
Code of Federal Regulations, 2011 CFR
2011-07-01
...— (1) Certificates of deposit; (2) Mutual funds; (3) Stocks; or (4) Bonds. (e) An institution may not... endowment fund established under this part in savings accounts or in low-risk securities in which a...) When investing the endowment fund, the grantee shall exercise the judgment and care, under the...
17 CFR 240.10b-10 - Confirmation of transactions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... to a customer at the time of the customer's investment decision. (a) Disclosure requirement. It shall... in, or to induce the purchase or sale by such customer of, any security (other than U.S. Savings... purchased or sold by such customer; and (2) Whether the broker or dealer is acting as agent for such...
17 CFR 260.7a-4 - Calculation of time.
Code of Federal Regulations, 2014 CFR
2014-04-01
... eastern daylight-saving time, whichever is in effect at the principal office of the Commission on the date... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Calculation of time. 260.7a-4... time. Saturdays, Sundays and holidays shall be counted in computing the effective date of applications...
17 CFR 260.7a-4 - Calculation of time.
Code of Federal Regulations, 2013 CFR
2013-04-01
... eastern daylight-saving time, whichever is in effect at the principal office of the Commission on the date... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Calculation of time. 260.7a-4... time. Saturdays, Sundays and holidays shall be counted in computing the effective date of applications...
17 CFR 260.7a-4 - Calculation of time.
Code of Federal Regulations, 2011 CFR
2011-04-01
... eastern daylight-saving time, whichever is in effect at the principal office of the Commission on the date... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Calculation of time. 260.7a-4... time. Saturdays, Sundays and holidays shall be counted in computing the effective date of applications...
17 CFR 260.7a-4 - Calculation of time.
Code of Federal Regulations, 2012 CFR
2012-04-01
... eastern daylight-saving time, whichever is in effect at the principal office of the Commission on the date... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Calculation of time. 260.7a-4... time. Saturdays, Sundays and holidays shall be counted in computing the effective date of applications...
76 FR 51472 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-18
... CUBES. Form: PD F 1832 E. Abstract: Used to certify assignments of U.S. registered definitive securities. Affected Public: Individuals or Households. Estimated Total Burden Hours: 1,250. OMB Number: 1535-0113... Consent with Respect to United States Savings Bond/Notes. Form: PD F 1849 E. Abstract: Used to obtain a...
76 FR 17997 - Privacy Act of 1974, as Amended
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-31
..., support good jobs, and increase U.S. competitiveness. As required by 5 U.S.C. 552a(r), a report of a new... certification. The records may contain taxpayer names and Taxpayer Identification Numbers (TIN) (social security... new and cost-saving therapies, support good jobs, and increase U.S. competitiveness. (2) Disclose...
33 CFR 159.311 - Safety exception.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety exception. 159.311 Section... Operations § 159.311 Safety exception. The regulations in this subpart shall not apply to discharges made for the purpose of securing the safety of the cruise vessel or saving life at sea, provided that all...
Technology vs the Academic Book Thief
ERIC Educational Resources Information Center
American School and University, 1972
1972-01-01
Three case studies describe successful installations of three leading book security manufacturers. Reports on a 92 percent book loss cut at West Leyden High School, Northlake, Illinois; a substantial savings and a loss cut at the Charles Stewart Mott Library, Flint, Michigan; and a 75 percent loss cut at Chabot College, Hayward, California. (EA)
State Energy Program Results: More Projects That Work
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1998-12-01
A Summary of Success stories of the State Energy Programs. The goal of the State Energy Program is to strengthen the capabilities of States to promote energy efficiency and to adopt renewable energy technologies, thereby helping the nation save energy and realize a stronger economy, cleaner environment, and a more secure future.
Bluetooth-based wireless sensor networks
NASA Astrophysics Data System (ADS)
You, Ke; Liu, Rui Qiang
2007-11-01
In this work a Bluetooth-based wireless sensor network is proposed. In this bluetooth-based wireless sensor networks, information-driven star topology and energy-saved mode are used, through which a blue master node can control more than seven slave node, the energy of each sensor node is reduced and secure management of each sensor node is improved.
ERIC Educational Resources Information Center
College Planning & Management, 2000
2000-01-01
Provides tips for expanding a school's card access system and making it more productive for all concerned. Tips include the use of electronic locks for better security; the need for state-of-the-art card reader system to save money in the long run; selecting vendors to one that manufactures, installs, and supports the card system; and having…
12 CFR 563g.2 - Offering circular requirement.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Offering circular requirement. 563g.2 Section 563g.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.2 Offering circular requirement. (a) General. No savings association shall offer or sell, directly...
12 CFR 563g.18 - Current and periodic reports.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Current and periodic reports. 563g.18 Section 563g.18 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.18 Current and periodic reports. (a) Each savings association which files an offering circular...
Homeland Security Strategic Plan for the Non-Major Local Law Enforcement Agency
2011-09-01
The Los Angeles Police ... the community, which allows the police department to be more efficient and effective in keeping citizens safe. Technology continues to change and...saving hundreds of manhours per year in crime data collection. Although the Independence Missouri Police Department made an effort to use Web
76 FR 63923 - Formations of, Acquisitions by, and Mergers of Bank Holding Companies
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-14
... Security Bank of Washington, Mountlake Terrace, Washington, from a state savings bank to a commercial bank... FEDERAL RESERVE SYSTEM Formations of, Acquisitions by, and Mergers of Bank Holding Companies The companies listed in this notice have applied to the Board for approval, pursuant to the Bank Holding Company...
Makhija, D; Rock, M; Xiong, Y; Epstein, J D; Arnold, M R; Lattouf, O M; Calcaterra, D
2017-06-01
A recent retrospective comparative effectiveness study found that use of the FLOSEAL Hemostatic Matrix in cardiac surgery was associated with significantly lower risks of complications, blood transfusions, surgical revisions, and shorter length of surgery than use of SURGIFLO Hemostatic Matrix. These outcome improvements in cardiac surgery procedures may translate to economic savings for hospitals and payers. The objective of this study was to estimate the cost-consequence of two flowable hemostatic matrices (FLOSEAL or SURGIFLO) in cardiac surgeries for US hospitals. A cost-consequence model was constructed using clinical outcomes from a previously published retrospective comparative effectiveness study of FLOSEAL vs SURGIFLO in adult cardiac surgeries. The model accounted for the reported differences between these products in length of surgery, rates of major and minor complications, surgical revisions, and blood product transfusions. Costs were derived from Healthcare Cost and Utilization Project's National Inpatient Sample (NIS) 2012 database and converted to 2015 US dollars. Savings were modeled for a hospital performing 245 cardiac surgeries annually, as identified as the average for hospitals in the NIS dataset. One-way sensitivity analysis and probabilistic sensitivity analysis were performed to test model robustness. The results suggest that if FLOSEAL is utilized in a hospital that performs 245 mixed cardiac surgery procedures annually, 11 major complications, 31 minor complications, nine surgical revisions, 79 blood product transfusions, and 260.3 h of cumulative operating time could be avoided. These improved outcomes correspond to a net annualized saving of $1,532,896. Cost savings remained consistent between $1.3m and $1.8m and between $911k and $2.4m, even after accounting for the uncertainty around clinical and cost inputs, in a one-way and probabilistic sensitivity analysis, respectively. Outcome differences associated with FLOSEAL vs SURGIFLO that were previously reported in a comparative effectiveness study may result in substantial cost savings for US hospitals.
Watson, Justin J J; Moren, Alexis; Diggs, Brian; Houser, Ben; Eastes, Lynn; Brand, Dawn; Bilyeu, Pamela; Schreiber, Martin; Kiraly, Laszlo
2016-05-01
Trauma transfer patients routinely undergo repeat imaging because of inefficiencies within the radiology system. In 2009, the virtual private network (VPN) telemedicine system was adopted throughout Oregon allowing virtual image transfer between hospitals. The startup cost was a nominal $3,000 per hospital. A retrospective review from 2007 to 2012 included 400 randomly selected adult trauma transfer patients based on a power analysis (200 pre/200 post). The primary outcome evaluated was reduction in repeat computed tomography (CT) scans. Secondary outcomes included cost savings, emergency department (ED) length of stay (LOS), and spared radiation. All data were analyzed using Mann-Whitney U and chi-square tests. P less than .05 indicated significance. Spared radiation was calculated as a weighted average per body region, and savings was calculated using charges obtained from Oregon Health and Science University radiology current procedural terminology codes. Four-hundred patients were included. Injury Severity Score, age, ED and overall LOS, mortality, trauma type, and gender were not statistically different between groups. The percentage of patients with repeat CT scans decreased after VPN implementation: CT abdomen (13.2% vs 2.8%, P < .01) and cervical spine (34.4% vs 18.2%, P < .01). Post-VPN, the total charges saved in 2012 for trauma transfer patients was $333,500, whereas the average radiation dose spared per person was 1.8 mSV. Length of stay in the ED for patients with Injury Severity Score less than 15 transferring to the ICU was decreased (P < .05). Implementation of a statewide teleradiology network resulted in fewer total repeat CT scans, significant savings, decrease in radiation exposure, and decreased LOS in the ED for patients with less complex injuries. The potential for health care savings by widespread adoption of a VPN is significant. Copyright © 2016 Elsevier Inc. All rights reserved.
A photonic quantum information interface.
Tanzilli, S; Tittel, W; Halder, M; Alibart, O; Baldi, P; Gisin, N; Zbinden, H
2005-09-01
Quantum communication requires the transfer of quantum states, or quantum bits of information (qubits), from one place to another. From a fundamental perspective, this allows the distribution of entanglement and the demonstration of quantum non-locality over significant distances. Within the context of applications, quantum cryptography offers a provably secure way to establish a confidential key between distant partners. Photons represent the natural flying qubit carriers for quantum communication, and the presence of telecommunications optical fibres makes the wavelengths of 1,310 nm and 1,550 nm particularly suitable for distribution over long distances. However, qubits encoded into alkaline atoms that absorb and emit at wavelengths around 800 nm have been considered for the storage and processing of quantum information. Hence, future quantum information networks made of telecommunications channels and alkaline memories will require interfaces that enable qubit transfers between these useful wavelengths, while preserving quantum coherence and entanglement. Here we report a demonstration of qubit transfer between photons of wavelength 1,310 nm and 710 nm. The mechanism is a nonlinear up-conversion process, with a success probability of greater than 5 per cent. In the event of a successful qubit transfer, we observe strong two-photon interference between the 710 nm photon and a third photon at 1,550 nm, initially entangled with the 1,310 nm photon, although they never directly interacted. The corresponding fidelity is higher than 98 per cent.
A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing
Měsíček, Libor; Choi, Jongsun
2018-01-01
Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely. PMID:29796233
A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing.
Ko, Hoon; Měsíček, Libor; Choi, Jongsun; Hwang, Seogchan
2018-01-01
Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely.
Physical key-protected one-time pad
Horstmeyer, Roarke; Judkewitz, Benjamin; Vellekoop, Ivo M.; Assawaworrarit, Sid; Yang, Changhuei
2013-01-01
We describe an encrypted communication principle that forms a secure link between two parties without electronically saving either of their keys. Instead, random cryptographic bits are kept safe within the unique mesoscopic randomness of two volumetric scattering materials. We demonstrate how a shared set of patterned optical probes can generate 10 gigabits of statistically verified randomness between a pair of unique 2 mm3 scattering objects. This shared randomness is used to facilitate information-theoretically secure communication following a modified one-time pad protocol. Benefits of volumetric physical storage over electronic memory include the inability to probe, duplicate or selectively reset any bits without fundamentally altering the entire key space. Our ability to securely couple the randomness contained within two unique physical objects can extend to strengthen hardware required by a variety of cryptographic protocols, which is currently a critically weak link in the security pipeline of our increasingly mobile communication culture. PMID:24345925
Safe to Fly: Certifying COTS Hardware for Spaceflight
NASA Technical Reports Server (NTRS)
Fichuk, Jessica L.
2011-01-01
Providing hardware for the astronauts to use on board the Space Shuttle or International Space Station (ISS) involves a certification process that entails evaluating hardware safety, weighing risks, providing mitigation, and verifying requirements. Upon completion of this certification process, the hardware is deemed safe to fly. This process from start to finish can be completed as quickly as 1 week or can take several years in length depending on the complexity of the hardware and whether the item is a unique custom design. One area of cost and schedule savings that NASA implements is buying Commercial Off the Shelf (COTS) hardware and certifying it for human spaceflight as safe to fly. By utilizing commercial hardware, NASA saves time not having to develop, design and build the hardware from scratch, as well as a timesaving in the certification process. By utilizing COTS hardware, the current detailed certification process can be simplified which results in schedule savings. Cost savings is another important benefit of flying COTS hardware. Procuring COTS hardware for space use can be more economical than custom building the hardware. This paper will investigate the cost savings associated with certifying COTS hardware to NASA s standards rather than performing a custom build.
Lucidi, Cristina; Di Gregorio, Vincenza; Ceccarelli, Giancarlo; Venditti, Mario; Riggio, Oliviero; Merli, Manuela
2017-01-01
Background Early diagnosis and appropriate treatment of infections in cirrhosis are crucial. As new guidelines in this context, particularly for health care-associated (HCA) infections, would be needed, we performed a trial documenting whether an empirical broad-spectrum antibiotic therapy is more effective than the standard one for these infections. Because of the higher daily cost of broad-spectrum than standard antibiotics, we performed a cost analysis to compare: 1) total drug costs, 2) profitability of hospital admissions. Methods This retrospective observational analysis was performed on patients enrolled in the trial NCT01820026, in which consecutive cirrhotic patients with HCA infections were randomly assigned to a standard vs a broad-spectrum treatment. Antibiotic daily doses, days of treatment, length of hospital stay, and DRG (diagnosis-related group) were recorded from the clinical trial medical records. The profitability of hospitalizations was calculated considering DRG tariffs divided by length of hospital stay. Results We considered 84 patients (42 for each group). The standard therapy allowed to obtain a first-line treatment cost lower than in the broad-spectrum therapy. Anyway, the latter, being related to a lower failure rate (19% vs 57.1%), resulted in cost saving in terms of cumulative antibiotic costs (first- and second-line treatments). The mean cost saving per patient for the broad-spectrum arm was €44.18 (−37.6%), with a total cost saving of about €2,000. Compared to standard group, we observed a statistically significant reduction in hospital stay from 17.8 to 11.8 days (p<0.002) for patients treated with broad-spectrum antibiotics. The distribution of DRG tariffs was similar in the two groups. According to DRG, the shorter length of hospital stay of the broad-spectrum group involved a higher mean profitable daily cost than standard group (€345.61 vs €252.23; +37%). Conclusion Our study supports the idea that the use of a broad-spectrum empirical treatment for HCA infections in cirrhosis would be cost-saving and that hospitals need to be aware of the clinical and economic consequences of a wrong antibiotic treatment in this setting. PMID:28721080
Lucidi, Cristina; Di Gregorio, Vincenza; Ceccarelli, Giancarlo; Venditti, Mario; Riggio, Oliviero; Merli, Manuela
2017-01-01
Early diagnosis and appropriate treatment of infections in cirrhosis are crucial. As new guidelines in this context, particularly for health care-associated (HCA) infections, would be needed, we performed a trial documenting whether an empirical broad-spectrum antibiotic therapy is more effective than the standard one for these infections. Because of the higher daily cost of broad-spectrum than standard antibiotics, we performed a cost analysis to compare: 1) total drug costs, 2) profitability of hospital admissions. This retrospective observational analysis was performed on patients enrolled in the trial NCT01820026, in which consecutive cirrhotic patients with HCA infections were randomly assigned to a standard vs a broad-spectrum treatment. Antibiotic daily doses, days of treatment, length of hospital stay, and DRG (diagnosis-related group) were recorded from the clinical trial medical records. The profitability of hospitalizations was calculated considering DRG tariffs divided by length of hospital stay. We considered 84 patients (42 for each group). The standard therapy allowed to obtain a first-line treatment cost lower than in the broad-spectrum therapy. Anyway, the latter, being related to a lower failure rate (19% vs 57.1%), resulted in cost saving in terms of cumulative antibiotic costs (first- and second-line treatments). The mean cost saving per patient for the broad-spectrum arm was €44.18 (-37.6%), with a total cost saving of about €2,000. Compared to standard group, we observed a statistically significant reduction in hospital stay from 17.8 to 11.8 days ( p <0.002) for patients treated with broad-spectrum antibiotics. The distribution of DRG tariffs was similar in the two groups. According to DRG, the shorter length of hospital stay of the broad-spectrum group involved a higher mean profitable daily cost than standard group (€345.61 vs €252.23; +37%). Our study supports the idea that the use of a broad-spectrum empirical treatment for HCA infections in cirrhosis would be cost-saving and that hospitals need to be aware of the clinical and economic consequences of a wrong antibiotic treatment in this setting.
Castillo, Encarnación; López-Ramos, Juan A.; Morales, Diego P.
2018-01-01
Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature. PMID:29337921
Parrilla, Luis; Castillo, Encarnación; López-Ramos, Juan A; Álvarez-Bermejo, José A; García, Antonio; Morales, Diego P
2018-01-16
Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature.
Financial coping strategies of mental health consumers: managing social benefits.
Caplan, Mary Ager
2014-05-01
Mental health consumers depend on social benefits in the forms of supplemental security income and social security disability insurance for their livelihood. Although these programs pay meager benefits, little research has been undertaken into how this population makes ends meet. Using a qualitative approach, this study asks what are the financial coping strategies of mental health consumers? Seven approaches were identified: subsidies, cost-effective shopping, budgeting, prioritizing, technology, debt management, and saving money. Results illustrate the resourcefulness of mental health consumers in managing meager social benefits and highlight the need to strengthen community mental health efforts with financial capabilities education.
Patel, Mitesh S; Patel, Neha; Small, Dylan S; Rosin, Roy; Rohrbach, Jeffrey I; Stromberg, Nathaniel; Hanson, C William; Asch, David A
2016-08-01
Changes in the medium of communication from paging to mobile secure text messaging may change clinical care, but the effects of these changes on patient outcomes have not been well examined. To evaluate the association between inpatient medicine service adoption of mobile secure text messaging and patient length of stay and readmissions. Observational study. Patients admitted to medicine services at the Hospital of the University of Pennsylvania (intervention site; n = 8995 admissions of 6484 patients) and Penn Presbyterian Medical Center (control site; n = 6799 admissions of 4977 patients) between May 1, 2012, and April 30, 2014. Mobile secure text messaging. Change in length of stay and 30-day readmissions, comparing patients at the intervention site to the control site before (May 1, 2012 to April 30, 2013) and after (May 1, 2013 to April 30, 2014) the intervention, adjusting for time trends and patient demographics, comorbidities, insurance, and disposition. During the pre-intervention period, the mean length of stay ranged from 4.0 to 5.0 days at the control site and from 5.2 to 6.7 days at the intervention site, but trends were similar. In the first month after the intervention, the mean length of stay was unchanged at the control site (4.7 to 4.7 days) but declined at the intervention site (6.0 to 5.4 days). Trends were mostly similar during the rest of the post-intervention period, ranging from 4.4 to 5.6 days at the control site and from 5.4 to 6.5 days at the intervention site. Readmission rates varied significantly within sites before and after the intervention, but overall trends were similar. In adjusted analyses, there was a significant decrease in length of stay for the intervention site relative to the control site during the post-intervention period compared to the pre-intervention period (-0.77 days ; 95 % CI, -1.14, -0.40; P < 0.001). There was no significant difference in the odds of readmission (OR, 0.97; 95 % CI: 0.81, 1.17; P = 0.77). These findings were supported by multiple sensitivity analyses. Compared to a control group over time, hospitalized medical patients on inpatient services whose care providers and staff were offered mobile secure text messaging showed a relative decrease in length of stay and no change in readmissions.
Secure medical information sharing in cloud computing.
Shao, Zhiyi; Yang, Bo; Zhang, Wenzheng; Zhao, Yi; Wu, Zhenqiang; Miao, Meixia
2015-01-01
Medical information sharing is one of the most attractive applications of cloud computing, where searchable encryption is a fascinating solution for securely and conveniently sharing medical data among different medical organizers. However, almost all previous works are designed in symmetric key encryption environment. The only works in public key encryption do not support keyword trapdoor security, have long ciphertext related to the number of receivers, do not support receiver revocation without re-encrypting, and do not preserve the membership of receivers. In this paper, we propose a searchable encryption supporting multiple receivers for medical information sharing based on bilinear maps in public key encryption environment. In the proposed protocol, data owner stores only one copy of his encrypted file and its corresponding encrypted keywords on cloud for multiple designated receivers. The keyword ciphertext is significantly shorter and its length is constant without relation to the number of designated receivers, i.e., for n receivers the ciphertext length is only twice the element length in the group. Only the owner knows that with whom his data is shared, and the access to his data is still under control after having been put on the cloud. We formally prove the security of keyword ciphertext based on the intractability of Bilinear Diffie-Hellman problem and the keyword trapdoor based on Decisional Diffie-Hellman problem.
Minimum probe length for unique identification of all open reading frames in a microbial genome
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sokhansanj, B A; Ng, J; Fitch, J P
2000-03-05
In this paper, we determine the minimum hybridization probe length to uniquely identify at least 95% of the open reading frame (ORF) in an organism. We analyze the whole genome sequences of 17 species, 11 bacteria, 4 archaea, and 2 eukaryotes. We also present a mathematical model for minimum probe length based on assuming that all ORFs are random, of constant length, and contain an equal distribution of bases. The model accurately predicts the minimum probe length for all species, but it incorrectly predicts that all ORFs may be uniquely identified. However, a probe length of just 9 bases ismore » adequate to identify over 95% of the ORFs for all 15 prokaryotic species we studied. Using a minimum probe length, while accepting that some ORFs may not be identified and that data will be lost due to hybridization error, may result in significant savings in microarray and oligonucleotide probe design.« less
A Component-Based Approach for Securing Indoor Home Care Applications
Estévez, Elisabet
2017-01-01
eHealth systems have adopted recent advances on sensing technologies together with advances in information and communication technologies (ICT) in order to provide people-centered services that improve the quality of life of an increasingly elderly population. As these eHealth services are founded on the acquisition and processing of sensitive data (e.g., personal details, diagnosis, treatments and medical history), any security threat would damage the public’s confidence in them. This paper proposes a solution for the design and runtime management of indoor eHealth applications with security requirements. The proposal allows applications definition customized to patient particularities, including the early detection of health deterioration and suitable reaction (events) as well as security needs. At runtime, security support is twofold. A secured component-based platform supervises applications execution and provides events management, whilst the security of the communications among application components is also guaranteed. Additionally, the proposed event management scheme adopts the fog computing paradigm to enable local event related data storage and processing, thus saving communication bandwidth when communicating with the cloud. As a proof of concept, this proposal has been validated through the monitoring of the health status in diabetic patients at a nursing home. PMID:29278370
A Component-Based Approach for Securing Indoor Home Care Applications.
Agirre, Aitor; Armentia, Aintzane; Estévez, Elisabet; Marcos, Marga
2017-12-26
eHealth systems have adopted recent advances on sensing technologies together with advances in information and communication technologies (ICT) in order to provide people-centered services that improve the quality of life of an increasingly elderly population. As these eHealth services are founded on the acquisition and processing of sensitive data (e.g., personal details, diagnosis, treatments and medical history), any security threat would damage the public's confidence in them. This paper proposes a solution for the design and runtime management of indoor eHealth applications with security requirements. The proposal allows applications definition customized to patient particularities, including the early detection of health deterioration and suitable reaction (events) as well as security needs. At runtime, security support is twofold. A secured component-based platform supervises applications execution and provides events management, whilst the security of the communications among application components is also guaranteed. Additionally, the proposed event management scheme adopts the fog computing paradigm to enable local event related data storage and processing, thus saving communication bandwidth when communicating with the cloud. As a proof of concept, this proposal has been validated through the monitoring of the health status in diabetic patients at a nursing home.
The impact on hospital resource utilisation of treatment of hepatic encephalopathy with rifaximin-α.
Orr, James G; Currie, Craig J; Berni, Ellen; Goel, Anurag; Moriarty, Kieran J; Sinha, Ashish; Gordon, Fiona; Dethier, Anne; Dillon, John F; Clark, Katie; Richardson, Paul; Middleton, Paul; Patel, Vishal; Shawcross, Debbie; Preedy, Helen; Aspinall, Richard J; Hudson, Mark
2016-09-01
Rifaximin-α reduces the risk of recurrence of overt hepatic encephalopathy. However, there remain concerns regarding the financial cost of the drug. We aimed to study the impact of treatment with rifaximin-α on healthcare resource utilisation using data from seven UK liver treatment centres. All seven centres agreed a standardised data set and data characterising clinical, demographic and emergency hospital admissions were collected retrospectively for the time periods 3, 6 and 12 months before and following initiation of rifaximin-α. Admission rates and hospital length of stay before and during therapy were compared. Costs of admissions and drug acquisition were estimated using published sources. Multivariate analyses were carried out to assess the relative impact of various factors on hospital length of stay. Data were available from 326 patients. Following the commencement of rifaximin, the total hospital length of stay reduced by an estimated 31-53%, equating to a reduction in inpatient costs of between £4858 and £6607 per year. Taking into account drug costs of £3379 for 1-year treatment with rifaximin-α, there was an estimated annual mean saving of £1480-£3228 per patient. Initiation of treatment with rifaximin-α was associated with a marked reduction in the number of hospital admissions and hospital length of stay. These data suggest that treatment of patients with rifaximin-α for hepatic encephalopathy was generally cost saving. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
Provable Transient Recovery for Frame-Based, Fault-Tolerant Computing Systems
NASA Technical Reports Server (NTRS)
DiVito, Ben L.; Butler, Ricky W.
1992-01-01
We present a formal verification of the transient fault recovery aspects of the Reliable Computing Platform (RCP), a fault-tolerant computing system architecture for digital flight control applications. The RCP uses NMR-style redundancy to mask faults and internal majority voting to purge the effects of transient faults. The system design has been formally specified and verified using the EHDM verification system. Our formalization accommodates a wide variety of voting schemes for purging the effects of transients.
2014-07-30
of the IEEE Intl. Conf. on Comp. Vis. and Patt . Recog. (CVPR). 07-JAN-14, . : , B. Taylor, A. Ayvaci, A. Ravichandran, and S. Soatto.. Semantic video...detection, localization and tracking, Intl. Conf. on Comp. Vis. Patt . Recog.. 06-JAN-11, . : , Michalis Raptis, Iasonas Kokkinos, Stefano Soatto...of the IEEE Intl. Conf. on Comp. Vis. and Patt . Recog., 2012. [12] M. Raptis and S. Soatto. Tracklet descriptors for action modeling and video
Anonymous broadcasting of classical information with a continuous-variable topological quantum code
NASA Astrophysics Data System (ADS)
Menicucci, Nicolas C.; Baragiola, Ben Q.; Demarie, Tommaso F.; Brennen, Gavin K.
2018-03-01
Broadcasting information anonymously becomes more difficult as surveillance technology improves, but remarkably, quantum protocols exist that enable provably traceless broadcasting. The difficulty is making scalable entangled resource states that are robust to errors. We propose an anonymous broadcasting protocol that uses a continuous-variable surface-code state that can be produced using current technology. High squeezing enables large transmission bandwidth and strong anonymity, and the topological nature of the state enables local error mitigation.
Isenberg, Sarina R; Lu, Chunhua; McQuade, John; Chan, Kelvin K W; Gill, Natasha; Cardamone, Michael; Torto, Deirdre; Langbaum, Terry; Razzak, Rab; Smith, Thomas J
2017-05-01
Palliative care inpatient units (PCUs) can improve symptoms, family perception of care, and lower per-diem costs compared with usual care. In March 2013, Johns Hopkins Medical Institutions (JHMI) added a PCU to the palliative care (PC) program. We studied the financial impact of the PC program on JHMI from March 2013 to March 2014. This study considered three components of the PC program: PCU, PC consultations, and professional fees. Using 13 months of admissions data, the team calculated the per-day variable cost pre-PCU (ie, in another hospital unit) and after transfer to the PCU. These fees were multiplied by the number of patients transferred to the PCU and by the average length of stay in the PCU. Consultation savings were estimated using established methods. Professional fees assumed a collection rate of 50%. The total positive financial impact of the PC program was $3,488,863.17. There were 153 transfers to the PCU, 60% with cancer, and an average length of stay of 5.11 days. The daily loss pretransfer to the PCU of $1,797.67 was reduced to $1,345.34 in the PCU (-25%). The PCU saved JHMI $353,645.17 in variable costs, or $452.33 per transfer. Cost savings for PC consultations in the hospital, 60% with cancer, were estimated at $2,765,218. $370,000 was collected in professional fees savings. The PCU and PC program had a favorable impact on JHMI while providing expert patient-centered care. As JHMI moves to an accountable care organization model, value-based patient-centered care and increased intensive care unit availability are desirable.
76 FR 14083 - Proposed Exemptions From Certain Prohibited Transaction Restrictions
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-15
...This document contains notices of pendency before the Department of Labor (the Department) of proposed exemptions from certain of the prohibited transaction restrictions of the Employee Retirement Income Security Act of 1974 (ERISA or the Act) and/or the Internal Revenue Code of 1986 (the Code). This notice includes the following proposed exemptions: D-11468 & D-11469 The Krispy Kreme Doughnut Corporation Retirement Savings Plan, The Krispy Kreme Profit- Sharing Stock Ownership Plan; D-11632 Millenium Trust Co. LLC, Custodian FBO William Etherington IRA; D-11642 H-E-B Brand Savings & Retirement Plan and H.E. Butt Grocery Company; and L-11625 The International Union of Painters and Allied Trades Finishing Institute.
NASA Astrophysics Data System (ADS)
Wang, Jianhua; Cheng, Lianglun; Wang, Tao; Peng, Xiaodong
2016-03-01
Table look-up operation plays a very important role during the decoding processing of context-based adaptive variable length decoding (CAVLD) in H.264/advanced video coding (AVC). However, frequent table look-up operation can result in big table memory access, and then lead to high table power consumption. Aiming to solve the problem of big table memory access of current methods, and then reduce high power consumption, a memory-efficient table look-up optimized algorithm is presented for CAVLD. The contribution of this paper lies that index search technology is introduced to reduce big memory access for table look-up, and then reduce high table power consumption. Specifically, in our schemes, we use index search technology to reduce memory access by reducing the searching and matching operations for code_word on the basis of taking advantage of the internal relationship among length of zero in code_prefix, value of code_suffix and code_lengh, thus saving the power consumption of table look-up. The experimental results show that our proposed table look-up algorithm based on index search can lower about 60% memory access consumption compared with table look-up by sequential search scheme, and then save much power consumption for CAVLD in H.264/AVC.
Impact of Long-Term Care on Retirement Wellness.
Rappaport, Anna M
2015-01-01
Retirement wellness is the result of retiring at an appropriate age, saving enough and managing risks appropriately. One of the major risks that often is not addressed effectively is the long-term care (LTC) risk, i.e., the risk of needing help due to physical or cognitive limitations. In 2014, the Society of Actuaries issued a call for papers on the link between LTC and retirement security. This article will discuss the topic of LTC and retirement security broadly, drawing from several of the papers. Some of the topics include the impact of LTC on the individual, family members and caregivers; modeling results showing the impact of LTC on assets needed for a secure retirement; alternative methods of financing LTC; the link between housing decisions and LTC; and some ideas for the future.
31 CFR 363.6 - What special terms do I need to know to understand this part?
Code of Federal Regulations, 2012 CFR
2012-07-01
... TreasuryDirect account at account establishment using an online verification service or offline... the online process by which all securities contained within the minor linked account are moved to the... transaction to convert a definitive savings bond to a book-entry bond. Online means use of the Internet. Owner...
31 CFR 363.6 - What special terms do I need to know to understand this part?
Code of Federal Regulations, 2013 CFR
2013-07-01
... TreasuryDirect account at account establishment using an online verification service or offline... the online process by which all securities contained within the minor linked account are moved to the... transaction to convert a definitive savings bond to a book-entry bond. Online means use of the Internet. Owner...
31 CFR 363.6 - What special terms do I need to know to understand this part?
Code of Federal Regulations, 2014 CFR
2014-07-01
... TreasuryDirect account at account establishment using an online verification service or offline... the online process by which all securities contained within the minor linked account are moved to the... transaction to convert a definitive savings bond to a book-entry bond. Online means use of the Internet. Owner...
ERIC Educational Resources Information Center
Paquet, Katherine G.
2013-01-01
Cloud computing may provide cost benefits for organizations by eliminating the overhead costs of software, hardware, and maintenance (e.g., license renewals, upgrading software, servers and their physical storage space, administration along with funding a large IT department). In addition to the promised savings, the organization may require…
Comparability of Computer Delivered versus Traditional Paper and Pencil Testing
ERIC Educational Resources Information Center
Strader, Douglas A.
2012-01-01
There are many advantages supporting the use of computers as an alternate mode of delivery for high stakes testing: cost savings, increased test security, flexibility in test administrations, innovations in items, and reduced scoring time. The purpose of this study was to determine if the use of computers as the mode of delivery had any…
17 CFR 210.6A-04 - Statements of income and changes in plan equity.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Statements of income and..., Savings and Similar Plans § 210.6A-04 Statements of income and changes in plan equity. Statements of income and changes in plan equity filed under this rule shall comply with the following provisions: 1...
17 CFR 210.6A-04 - Statements of income and changes in plan equity.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Statements of income and..., Savings and Similar Plans § 210.6A-04 Statements of income and changes in plan equity. Statements of income and changes in plan equity filed under this rule shall comply with the following provisions: 1...
75 FR 63107 - Alternatives to the Use of External Credit Ratings in the Regulations of the OTS
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-14
..., savings associations must consider the interest rate, credit, liquidity, price and other risks presented... subject only to moderate credit risk, and for whom expectations of default risk over the term of the... securities activities based on the levels and types of risks in its portfolio. As with the credit quality...
17 CFR 210.6A-02 - Special rules applicable to employee stock purchase, savings and similar plans.
Code of Federal Regulations, 2011 CFR
2011-04-01
... note shall so state indicating briefly the principal assumptions on which the plan relied in not making..., showing cost parenthetically. For purposes of this rule, the term value shall mean (1) market value for those securities having readily available market quotations and (2) fair value as determined in good...
Providing and Funding Financial Literacy Programs for Low Income Adults and Youth. Strategy Brief
ERIC Educational Resources Information Center
Friedman, Pamela
2005-01-01
Making effective financial decisions and knowing how to manage money are skills critical to enjoying a secure financial future. Yet many individuals and families lack the knowledge necessary to make sound financial choices, as evidenced by falling savings rates, mounting consumer debt, and a growing dependence on alternative banking institutions.…
12 CFR 563d.210 - Form and content of financial statements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Form and content of financial statements. 563d... SECURITIES OF SAVINGS ASSOCIATIONS Regulations § 563d.210 Form and content of financial statements. The financial statements required to be contained in filings with the Office under the Act are as set out in the...
Saving German Studies, via Europe
ERIC Educational Resources Information Center
Donahue, William Collins; Kagel, Martin
2012-01-01
By most accounts, the position of German studies in the American academy is no longer secure. To a large extent, that is due to reasons beyond the control of individual faculty or departments, including the general crisis faced by the humanities and the diminished importance in the eyes of the public of literary criticism, a vital part of the…
12 CFR 150.510 - What must I do if state authorities refuse my deposit?
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 1 2013-01-01 2013-01-01 false What must I do if state authorities refuse my deposit? 150.510 Section 150.510 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY FIDUCIARY POWERS OF FEDERAL SAVINGS ASSOCIATIONS Depositing Securities With State Authorities § 150.510 What...