Science.gov

Sample records for securities primary auctions

  1. Auction-based Security Game for Multiuser Cooperative Networks

    NASA Astrophysics Data System (ADS)

    Wang, An; Cai, Yueming; Yang, Wendong; Cheng, Yunpeng

    2013-04-01

    In this paper, we develop an auction-based algorithm to allocate the relay power efficiently to improve the system secrecy rate in a cooperative network, where several source-destination pairs and one cooperative relay are involved. On the one hand, the cooperative relay assists these pairs to transmit under a peak power constraint. On the other hand, the relay is untrusty and is also a passive eavesdropper. The whole auction process is completely distributed and no instantaneous channel state information exchange is needed. We also prove the existence and uniqueness of the Nash Equilibrium (NE) for the proposed power auction game. Moreover, the Pareto optimality is also validated. Simulation results show that our proposed auction-based algorithm can effectively improve the system secrecy rate. Besides, the proposed auction-based algorithm can converge to the unique NE point within a finite number of iterations. More interestingly, we also find that the proposed power auction mechanism is cheat-proof.

  2. 31 CFR 356.5 - What types of securities does the Treasury auction?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... securities. (a) Treasury bills. (1) Are issued at a discount or at par, depending upon the auction results; (2) Are redeemed at their par amount at maturity; and (3) Have maturities of not more than one year... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false What types of securities does the...

  3. 31 CFR 356.5 - What types of securities does the Treasury auction?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... securities. (a) Treasury bills. (1) Are issued at a discount or at par, depending upon the auction results; (2) Are redeemed at their par amount at maturity; and (3) Have maturities of not more than one year... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false What types of securities does the...

  4. 31 CFR 356.5 - What types of securities does the Treasury auction?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... securities. (a) Treasury bills. (1) Are issued at a discount or at par, depending upon the auction results; (2) Are redeemed at their par amount at maturity; and (3) Have maturities of not more than one year... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false What types of securities does the...

  5. 31 CFR 356.5 - What types of securities does the Treasury auction?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... securities. (a) Treasury bills. (1) Are issued at a discount or at par, depending upon the auction results; (2) Are redeemed at their par amount at maturity; and (3) Have maturities of not more than one year... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false What types of securities does the...

  6. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... in which auctioned Treasury securities may be issued? There are three book-entry securities systems... marketable Treasury securities. We maintain and transfer securities in these three book-entry systems at... inflation. Securities may be transferred from one system to the other, unless the securities are not...

  7. Security analysis with improved design of post-confirmation mechanism for quantum sealed-bid auction with single photons

    NASA Astrophysics Data System (ADS)

    Zhang, Ke-Jia; Kwek, Leong-Chuan; Ma, Chun-Guang; Zhang, Long; Sun, Hong-Wei

    2018-02-01

    Quantum sealed-bid auction (QSA) has been widely studied in quantum cryptography. For a successful auction, post-confirmation is regarded as an important mechanism to make every bidder verify the identity of the winner after the auctioneer has announced the result. However, since the auctioneer may be dishonest and collude with malicious bidders in practice, some potential loopholes could exist. In this paper, we point out two types of collusion attacks for a particular post-confirmation technique with EPR pairs. And it is not difficult to see that there exists no unconditionally secure post-confirmation mechanism in the existing QSA model, if the dishonest participants have the ability to control multiparticle entanglement. In the view of this, we note that some secure implementation could exist if the participants are supposed to be semi-quantum, i.e., they can only control single photons. Finally, two potential methods to design post-confirmation mechanism are presented in this restricted scenario.

  8. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued or maintained?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false What are the book-entry systems in... BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS... book-entry systems in which auctioned Treasury securities may be issued or maintained? There are three...

  9. 31 CFR 356.5 - What types of securities does the Treasury auction?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... part to distinguish such securities from “inflation-protected” securities. We refer to fixed-principal... years. (2) Treasury inflation-protected notes. (i) Are issued with a stated rate of interest to be applied to the inflation-adjusted principal on each interest payment date; (ii) Have interest payable...

  10. 12 CFR 619.9260 - Primary security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Primary security. 619.9260 Section 619.9260 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9260 Primary security. The basic collateral securing the loan. ...

  11. 12 CFR 619.9260 - Primary security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Primary security. 619.9260 Section 619.9260 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9260 Primary security. The basic collateral securing the loan. ...

  12. 19 CFR 127.34 - Auctioneer's commissions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Auctioneer's commissions. 127.34 Section 127.34 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY GENERAL ORDER, UNCLAIMED, AND ABANDONED MERCHANDISE Proceeds of Sale § 127.34 Auctioneer's...

  13. 40 CFR 73.70 - Auctions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...—Allowance Schedule for Auctions Year of purchase Spot auction Advance auction Advance auction* 1993 50,000 a... for therein. (b) Timing of the auctions. The spot auction and the advance auction will be held on the... Administrator will conduct one spot auction and one advance auction in each calendar year. (c) Submittal for...

  14. 40 CFR 73.70 - Auctions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...—Allowance Schedule for Auctions Year of purchase Spot auction Advance auction Advance auction* 1993 50,000 a... for therein. (b) Timing of the auctions. The spot auction and the advance auction will be held on the... Administrator will conduct one spot auction and one advance auction in each calendar year. (c) Submittal for...

  15. 40 CFR 73.70 - Auctions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...—Allowance Schedule for Auctions Year of purchase Spot auction Advance auction Advance auction* 1993 50,000 a... for therein. (b) Timing of the auctions. The spot auction and the advance auction will be held on the... Administrator will conduct one spot auction and one advance auction in each calendar year. (c) Submittal for...

  16. 40 CFR 73.70 - Auctions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...—Allowance Schedule for Auctions Year of purchase Spot auction Advance auction Advance auction* 1993 50,000 a... for therein. (b) Timing of the auctions. The spot auction and the advance auction will be held on the... Administrator will conduct one spot auction and one advance auction in each calendar year. (c) Submittal for...

  17. 40 CFR 73.70 - Auctions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...—Allowance Schedule for Auctions Year of purchase Spot auction Advance auction Advance auction* 1993 50,000 a... for therein. (b) Timing of the auctions. The spot auction and the advance auction will be held on the... Administrator will conduct one spot auction and one advance auction in each calendar year. (c) Submittal for...

  18. 31 CFR 356.17 - How and when do I pay for securities awarded in an auction?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false How and when do I pay for securities... telephone, you must pay for any securities awarded to you by debit entry to a deposit account. (2) Bidding... account. In your payment amount you must include the par amount and any announced accrued interest and/or...

  19. 31 CFR 356.17 - How and when do I pay for securities awarded in an auction?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false How and when do I pay for securities... telephone, you must pay for any securities awarded to you by debit entry to a deposit account. (2) Bidding... account. In your payment amount you must include the par amount and any announced accrued interest and/or...

  20. 31 CFR 356.17 - How and when do I pay for securities awarded in an auction?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false How and when do I pay for securities... telephone, you must pay for any securities awarded to you by debit entry to a deposit account. (2) Bidding... account. In your payment amount you must include the par amount and any announced accrued interest and/or...

  1. 31 CFR 356.17 - How and when do I pay for securities awarded in an auction?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false How and when do I pay for securities... telephone, you must pay for any securities awarded to you by debit entry to a deposit account. (2) Bidding... account. In your payment amount you must include the par amount and any announced accrued interest and/or...

  2. An economic and feasible Quantum Sealed-bid Auction protocol

    NASA Astrophysics Data System (ADS)

    Zhang, Rui; Shi, Run-hua; Qin, Jia-qi; Peng, Zhen-wan

    2018-02-01

    We present an economic and feasible Quantum Sealed-bid Auction protocol using quantum secure direct communication based on single photons in both the polarization and the spatial-mode degrees of freedom, where each single photon can carry two bits of classical information. Compared with previous protocols, our protocol has higher efficiency. In addition, we propose a secure post-confirmation mechanism without quantum entanglement to guarantee the security and the fairness of the auction.

  3. Essays on wholesale auctions in deregulated electricity markets

    NASA Astrophysics Data System (ADS)

    Baltaduonis, Rimvydas

    2007-12-01

    The early experience in the restructured electric power markets raised several issues, including price spikes, inefficiency, security, and the overall relationship of market clearing prices to generation costs. Unsatisfactory outcomes in these markets are thought to have resulted in part from strategic generator behaviors encouraged by inappropriate market design features. In this dissertation, I examine the performance of three auction mechanisms for wholesale power markets - Offer Cost Minimization auction, Payment Cost Minimization auction and Simple-Offer auction - when electricity suppliers act strategically. A Payment Cost Minimization auction has been proposed as an alternative to the traditional Offer Cost Minimization auction with the intention to solve the problem of inflated wholesale electricity prices. Efficiency concerns for this proposal were voiced due to insights predicated on the assumption of true production cost revelation. Using a game theoretic approach and an experimental method, I compare the two auctions, strictly controlling for the level of unilateral market power. A specific feature of these complex-offer auctions is that the sellers submit not only the quantities and the minimum prices that they are willing to sell at, but also the start-up fees, which are designed to reimburse the fixed start-up costs of the generation plants. I find that the complex structure of the offers leaves considerable room for strategic behavior, which consequently leads to anti-competitive and inefficient market outcomes. In the last chapter of my dissertation, I use laboratory experiments to contrast the performance of two complex-offer auctions against the performance of a simple-offer auction, in which the sellers have to recover all their generation costs - fixed and variable - through a uniform market-clearing price. I find that a simple-offer auction significantly reduces consumer prices and lowers price volatility. It mitigates anti-competitive effects

  4. Improving the secrecy rate by turning foes to allies: An auction scheme

    NASA Astrophysics Data System (ADS)

    Ma, Ya-Yan; Wang, Bao-Yun

    2015-09-01

    Security against eavesdroppers is a critical issue in cognitive radio networks (CRNs). In this paper, a scenario consisting of one primary pair and multiple secondary pairs is considered. The secondary transmitters (STs) work in half-duplex mode and they are potential eavesdroppers on the primary transmission unless they are allowed to simultaneously transmit with the primary transmitter (PT). A modified second-price sealed-bid auction scheme is employed to model the interaction between the PT and STs. With the proposed auction scheme, the hostile relationship between the PT and STs is transformed into a cooperative relationship. An iterative algorithm based on the max-min criteria is proposed to find the optimal bidding power of the STs for an access chance in the presence of multiple eavesdroppers. Numerical results show that the proposed auction scheme not only improves the PT’s security but also increases the access opportunities of the STs. Project supported by the National Natural Science Foundation of China (Grant Nos. 61271232 and 61372126) and the University Postgraduate Research and Innovation Project in Jiangsu Province, China (Grant No. CXZZ12-0472).

  5. Theoretically Founded Optimization of Auctioneer's Revenues in Expanding Auctions

    NASA Astrophysics Data System (ADS)

    Rabin, Jonathan; Shehory, Onn

    The expanding auction is a multi-unit auction which provides the auctioneer with control over the outcome of the auction by means of dynamically adding items for sale. Previous research on the expanding auction has provided a numeric method to calculate a strategy that optimizes the auctioneer's revenue. In this paper, we analyze various theoretical properties of the expanding auction, and compare it to VCG, a multi-unit auction protocol known in the art. We examine the effects of errors in the auctioneer's estimation of the buyers' maximal bidding values and prove a theoretical bound on the ratio between the revenue yielded by the Informed Decision Strategy (IDS) and the post-optimal strategy. We also analyze the relationship between the auction step and the optimal revenue and introduce a method of computing this optimizing step. We further compare the revenues yielded by the use of IDS with an expanding auction to those of the VCG mechanism and determine the conditions under which the former outperforms the latter. Our work provides new insight into the properties of the expanding auction. It further provides theoretically founded means for optimizing the revenue of auctioneer.

  6. Multiparty Quantum English Auction Scheme Using Single Photons as Message Carrier

    NASA Astrophysics Data System (ADS)

    Liu, Ge; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-03-01

    In this paper, a secure and economic multiparty english auction protocol using the single photons as message carrier of bids is proposed. In order to achieve unconditional security, fairness, undeniability and so on, we adopt the decoy photon checking technique and quantum encryption algorithm. Analysis result shows that our protocol satisfies all the characteristics of traditional english auction, meanwhile, it can resist malicious attacks.

  7. Anonymous, Yet Trustworthy Auctions

    NASA Astrophysics Data System (ADS)

    Chanda, Prasit Bikash; Naessens, Vincent; de Decker, Bart

    An auction is an inevitable market mechanism to setup prices of goods or services in a competitive and dynamic environment. Anonymity of bidders is required to conceal their business strategies from competitors. However, it is also essential to provide the seller guarantees that a bidder is trustworthy and competent enough to perform certain tasks (e.g transports). This paper proposes an auction protocol where bidders will participate anonymously, yet prove to be trustworthy and competent and can be held accountable towards auctioneers and sellers. Moreover, the protocol introduces promises, bonuses and compensations to ensure the best price for the sellers, extra profit for bidders and opportunities for newcomers in the business. It also handles ties, and copes with last minute bidding. Finally, the auction’s fair proceedings and outcome can be verified by everyone.

  8. Auctioning Airport Slots?

    NASA Technical Reports Server (NTRS)

    Gruyer, Nicolas; Lenoir, Nathalie

    2003-01-01

    The current allocation of slots on congested European airports constitutes an obstacle to the effective liberalisation of air transportation undertaken in Europe. With a view to favouring effluent slot utilisation and competition, as is the goal of the Euopean commission, we propose to use a market mechanism, based on temporary" utilisation licences. In order to allocate those licences, we propose and describe an iterated combinatorial auction mechanism where a percentage of licences would be reallocated each season. A secondary market would also be set up in order to reallocate slots during a season. Since a combinatorial auction involve a complex optimisation procedure, we describe how it can be made to work in the case of auctions.

  9. Three essays on auction markets

    NASA Astrophysics Data System (ADS)

    Shunda, Nicholas James

    This dissertation contains a series of theoretical investigations of auction markets. The essays it contains cover wholesale electricity markets, a popular selling mechanism on eBay, and supplier entry into multi-unit procurement auctions. The study in Chapter 1 compares the procurement cost-minimizing and productive efficiency performance of the auction mechanism used by independent system operators in wholesale electricity auction markets in the U.S. with that of a proposed alternative. The current practice allocates energy contracts as if the auction featured a discriminatory final payment method when, in fact, the markets are uniform price auctions. The proposed alternative explicitly accounts for the market-clearing price during the allocation phase. We find that the proposed alternative largely outperforms the current practice on the basis of procurement costs in the context of simple auction markets featuring both day-ahead and real-time auctions and that the procurement cost advantage of the alternative is complete when we simulate the effects of increased competition. We also find that a tradeoff between the objectives of procurement cost minimization and productive efficiency emerges in our simple auction markets and persists in the face of increased competition. The study in Chapter 2 considers a possible rationale for an auction with a buy price. In an auction with a buy price, the seller provides bidders with an option to end the auction early by accepting a transaction at a posted price. The "Buy-It-Now" option on eBay is a leading example of an auction with a buy price. The study develops a model of an auction with a buy price in which bidders use the auction's reserve price and buy price to formulate a reference price. The model both explains why a revenue-maximizing seller would want to augment her auction with a buy price and demonstrates that the seller sets a higher reserve price when she can affect the bidders' reference price through the

  10. Auctions to Reinforce Understanding

    ERIC Educational Resources Information Center

    Flores, Haynet Rivera

    2018-01-01

    An auction is a process of buying and selling goods or services by offering them up for bid, taking bids, and then selling each good or service to the highest bidder. Participants bid openly against one another; each bid must be higher than the previous bid. In the activity described rather than goods or services, English teachers sell sentences!…

  11. Evolutionary Dynamics of Biological Auctions

    PubMed Central

    Chatterjee, Krishnendu; Reiter, Johannes G.; Nowak, Martin A.

    2011-01-01

    Many scenarios in the living world, where individual organisms compete for winning positions (or resources), have properties of auctions. Here we study the evolution of bids in biological auctions. For each auction n individuals are drawn at random from a population of size N. Each individual makes a bid which entails a cost. The winner obtains a benefit of a certain value. Costs and benefits are translated into reproductive success (fitness). Therefore, successful bidding strategies spread in the population. We compare two types of auctions. In “biological all-pay auctions” the costs are the bid for every participating individual. In “biological second price all-pay auctions” the cost for everyone other than the winner is the bid, but the cost for the winner is the second highest bid. Second price all-pay auctions are generalizations of the “war of attrition” introduced by Maynard Smith. We study evolutionary dynamics in both types of auctions. We calculate pairwise invasion plots and evolutionarily stable distributions over the continuous strategy space. We find that the average bid in second price all-pay auctions is higher than in all-pay auctions, but the average cost for the winner is similar in both auctions. In both cases the average bid is a declining function of the number of participants, n. The more individuals participate in an auction the smaller is the chance of winning, and thus expensive bids must be avoided. PMID:22120126

  12. 7 CFR 46.25 - Auction sales.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 2 2013-01-01 2013-01-01 false Auction sales. 46.25 Section 46.25 Agriculture... THAN RULES OF PRACTICE) UNDER THE PERISHABLE AGRICULTURAL COMMODITIES ACT, 1930 Auction Sales § 46.25 Auction sales. Commission merchants, dealers and brokers who offer produce for sale through auction...

  13. 7 CFR 46.25 - Auction sales.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 2 2012-01-01 2012-01-01 false Auction sales. 46.25 Section 46.25 Agriculture... THAN RULES OF PRACTICE) UNDER THE PERISHABLE AGRICULTURAL COMMODITIES ACT, 1930 Auction Sales § 46.25 Auction sales. Commission merchants, dealers and brokers who offer produce for sale through auction...

  14. 7 CFR 46.25 - Auction sales.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 2 2014-01-01 2014-01-01 false Auction sales. 46.25 Section 46.25 Agriculture... THAN RULES OF PRACTICE) UNDER THE PERISHABLE AGRICULTURAL COMMODITIES ACT, 1930 Auction Sales § 46.25 Auction sales. Commission merchants, dealers and brokers who offer produce for sale through auction...

  15. 7 CFR 46.25 - Auction sales.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 2 2011-01-01 2011-01-01 false Auction sales. 46.25 Section 46.25 Agriculture... THAN RULES OF PRACTICE) UNDER THE PERISHABLE AGRICULTURAL COMMODITIES ACT, 1930 Auction Sales § 46.25 Auction sales. Commission merchants, dealers and brokers who offer produce for sale through auction...

  16. Timely response to secure messages from primary care patients.

    PubMed

    Rohrer, James E; North, Frederick; Angstman, Kurt B; Oberhelman, Sara S; Meunier, Matthew R

    2013-01-01

    To assess delays in response to patient secure e-mail messages in primary care. Secure electronic messages are initiated by primary care patients. Timely response is necessary for patient safety and quality. A database of secure messages. A random sample of 353 secure electronic messages initiated by primary care patients treated in 4 clinics. Message not opened after 12 hours or messages not responded to after 36 hours. A total of 8.5% of electronic messages were not opened within 12 hours, and 17.6% did not receive a response in 36 hours. Clinic location, being a clinic employee, and patient sex were not related to delays. Patients older than 50 years were more likely to receive a delayed response (25.7% delayed, P = .013). The risk of both kinds of delays was higher on weekends (P < .001 for both). The e-mail message system resulted in high rates of delayed response. Delays were concentrated on weekends (Friday-Sunday). Reducing delayed responses may require automatic rerouting of messages to message centers staffed 24-7 or other mechanisms to manage this after-hours work flow.

  17. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued or maintained?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... government and international agencies and foreign central banks. In their accounts, depository institutions... BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS... Direct®—into which we issue marketable Treasury securities. We maintain and transfer securities in these...

  18. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued or maintained?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false What are the book-entry systems in... system) at their par amount. Par amounts of Treasury inflation-protected securities do not include... Circular, Public Debt Series No. 2-86, as amended (part 357 of this chapter) and part 363 of this chapter...

  19. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued or maintained?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false What are the book-entry systems in... system) at their par amount. Par amounts of Treasury inflation-protected securities do not include... Circular, Fiscal Service Series No. 2-86, as amended (part 357 of this chapter) and part 363 of this...

  20. Internet Auction Sellers: Does Size Really Matter?

    ERIC Educational Resources Information Center

    Halstead, Diane; Becherer, Richard C.

    2003-01-01

    Examines the Internet auction phenomenon as it relates to the marketing mix of online auction sellers. The data indicate that, while there is great diversity among businesses that utilize online auctions, distinct cost leadership and differentiation marketing strategies are both evident. These two approaches are further distinguished in terms of…

  1. 7 CFR 1955.148 - Auction sales.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... complexity of the sale. When the services of a professional auctioneer are advisable, the services will be... 7 Agriculture 14 2010-01-01 2009-01-01 true Auction sales. 1955.148 Section 1955.148 Agriculture... REGULATIONS (CONTINUED) PROPERTY MANAGEMENT Disposal of Inventory Property General § 1955.148 Auction sales...

  2. 7 CFR 1955.148 - Auction sales.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 14 2014-01-01 2014-01-01 false Auction sales. 1955.148 Section 1955.148 Agriculture... REGULATIONS (CONTINUED) PROPERTY MANAGEMENT Disposal of Inventory Property General § 1955.148 Auction sales. This section provides guidance on the sale of all inventory property by auction, except FSA real...

  3. 7 CFR 1955.148 - Auction sales.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 14 2011-01-01 2011-01-01 false Auction sales. 1955.148 Section 1955.148 Agriculture... REGULATIONS (CONTINUED) PROPERTY MANAGEMENT Disposal of Inventory Property General § 1955.148 Auction sales. This section provides guidance on the sale of all inventory property by auction, except FSA real...

  4. 7 CFR 1955.148 - Auction sales.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 14 2012-01-01 2012-01-01 false Auction sales. 1955.148 Section 1955.148 Agriculture... REGULATIONS (CONTINUED) PROPERTY MANAGEMENT Disposal of Inventory Property General § 1955.148 Auction sales. This section provides guidance on the sale of all inventory property by auction, except FSA real...

  5. 7 CFR 1955.148 - Auction sales.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 14 2013-01-01 2013-01-01 false Auction sales. 1955.148 Section 1955.148 Agriculture... REGULATIONS (CONTINUED) PROPERTY MANAGEMENT Disposal of Inventory Property General § 1955.148 Auction sales. This section provides guidance on the sale of all inventory property by auction, except FSA real...

  6. China's Land Market Auctions: Evidence of Corruption?

    PubMed

    Cai, Hongbin; Henderson, J Vernon; Zhang, Qinghua

    2013-01-01

    This paper studies the urban land market in China in 2003-2007. In China, all urban land is owned by the state. Leasehold use rights for land for (re)development are sold by city governments and are a key source of city revenue. Leasehold sales are viewed as a major venue for corruption, prompting a number of reforms over the years. Reforms now require all leasehold rights be sold at public auction. There are two main types of auction: regular English auction and an unusual type which we call a "two stage auction". The latter type of auction seems more subject to corruption, and to side deals between potential bidders and the auctioneer. Absent corruption, theory suggests that two stage auctions would most likely maximize sales revenue for properties which are likely to have relatively few bidders, or are "cold", which would suggest negative selection on property unobservables into such auctions. However, if such auctions are more corruptible, that could involve positive selection as city officials divert hotter properties to a more corruptible auction form. The paper finds that, overall, sales prices are lower for two stage auctions, and there is strong evidence of positive selection. The price difference is explained primarily by the fact that two stage auctions typically have just one bidder, or no competition despite the vibrant land market in Chinese cities.

  7. Exploring Online Auction Behaviors and Motivations

    ERIC Educational Resources Information Center

    Jeon, Sua; Crutsinger, Christy; Kim, Haejung

    2008-01-01

    The availability and convenience of the Internet, combined with the variety of products available at any given time, have contributed to the success of online auctions.This exploratory study examined online auction behaviors among college students in an attempt to identify underlying dimensions of auction motivations. Questionnaires completed by…

  8. Statistical Mechanics of Combinatorial Auctions

    NASA Astrophysics Data System (ADS)

    Galla, Tobias; Leone, Michele; Marsili, Matteo; Sellitto, Mauro; Weigt, Martin; Zecchina, Riccardo

    2006-09-01

    Combinatorial auctions are formulated as frustrated lattice gases on sparse random graphs, allowing the determination of the optimal revenue by methods of statistical physics. Transitions between computationally easy and hard regimes are found and interpreted in terms of the geometric structure of the space of solutions. We introduce an iterative algorithm to solve intermediate and large instances, and discuss competing states of optimal revenue and maximal number of satisfied bidders. The algorithm can be generalized to the hard phase and to more sophisticated auction protocols.

  9. Statistical Properties of Online Auctions

    NASA Astrophysics Data System (ADS)

    Namazi, Alireza; Schadschneider, Andreas

    We characterize the statistical properties of a large number of online auctions run on eBay. Both stationary and dynamic properties, like distributions of prices, number of bids etc., as well as relations between these quantities are studied. The analysis of the data reveals surprisingly simple distributions and relations, typically of power-law form. Based on these findings we introduce a simple method to identify suspicious auctions that could be influenced by a form of fraud known as shill bidding. Furthermore the influence of bidding strategies is discussed. The results indicate that the observed behavior is related to a mixture of agents using a variety of strategies.

  10. A new quantum sealed-bid auction protocol with secret order in post-confirmation

    NASA Astrophysics Data System (ADS)

    Wang, Jing-Tao; Chen, Xiu-Bo; Xu, Gang; Meng, Xiang-Hua; Yang, Yi-Xian

    2015-10-01

    A new security protocol for quantum sealed-bid auction is proposed to resist the collusion attack from some malicious bidders. The most significant feature of this protocol is that bidders prepare their particles with secret order in post-confirmation for encoding bids. In addition, a new theorem and its proof are given based on the theory of combinatorial mathematics, which can be used as evaluation criteria for the collusion attack. It is shown that the new protocol is immune to the collusion attack and meets the demand for a secure auction. Compared with those previous protocols, the security, efficiency and availability of the proposed protocol are largely improved.

  11. 75 FR 44296 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-28

    ... currently collected and made transparent by the MSRB on municipal Auction Rate Securities (``ARS'') and... MSRB on municipal Auction Rate Securities (``ARS'') and Variable Rate Demand Obligations (``VRDOs... auction procedures and interest rate setting mechanisms for ARS and liquidity facilities for VRDOs...

  12. 75 FR 52793 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ... the MSRB on municipal Auction Rate Securities (``ARS'') and Variable Rate Demand Obligations (``VRDOs... information currently collected and made transparent by the MSRB on municipal Auction Rate Securities (``ARS... that define auction procedures and interest rate setting mechanisms for ARS and liquidity facilities...

  13. Biological auctions with multiple rewards

    PubMed Central

    Reiter, Johannes G.; Kanodia, Ayush; Gupta, Raghav; Nowak, Martin A.; Chatterjee, Krishnendu

    2015-01-01

    The competition for resources among cells, individuals or species is a fundamental characteristic of evolution. Biological all-pay auctions have been used to model situations where multiple individuals compete for a single resource. However, in many situations multiple resources with various values exist and single reward auctions are not applicable. We generalize the model to multiple rewards and study the evolution of strategies. In biological all-pay auctions the bid of an individual corresponds to its strategy and is equivalent to its payment in the auction. The decreasingly ordered rewards are distributed according to the decreasingly ordered bids of the participating individuals. The reproductive success of an individual is proportional to its fitness given by the sum of the rewards won minus its payments. Hence, successful bidding strategies spread in the population. We find that the results for the multiple reward case are very different from the single reward case. While the mixed strategy equilibrium in the single reward case with more than two players consists of mostly low-bidding individuals, we show that the equilibrium can convert to many high-bidding individuals and a few low-bidding individuals in the multiple reward case. Some reward values lead to a specialization among the individuals where one subpopulation competes for the rewards and the other subpopulation largely avoids costly competitions. Whether the mixed strategy equilibrium is an evolutionarily stable strategy (ESS) depends on the specific values of the rewards. PMID:26180069

  14. Auctions for coastal energy resources

    NASA Astrophysics Data System (ADS)

    Griffin, Robert M.

    It is becoming increasingly common to allocate public resources to the private sector for the purpose of developing these resources. One of the earliest uses of auctions in the U.S. for allocating rights to public resources was in the offshore oil and gas industry. The U.S. Federal government, through the Department of Interior (DOI), has used auctions to allocate development rights to offshore oil and gas resources to the private sector since the 1950's. Since then many things have changed. Oil and gas markets have gone through boom and bust cycles, giant technological advances in extraction and assessment have taken place, and alternative energy based in the coastal zone is now in demand in markets as well. There has been an enormous amount of research into the drivers of bidder behavior in auctions and optimal auction design in the last 60 years as well. Throughout all of this, the DOI has continued to use basically the same exact auction design to allocate oil and gas leases. The U.S. offshore oil and gas resources sold by the Department of Interior have accounted for more than $65 billion in revenue since the program started. These offshore resources are an important source of government revenue and national wealth. Additionally, the expansion of the energy sector offshore has enormous potential for electricity generation in the U.S., estimated by the National Renewable Energy Laboratory as approaching 54 gigawatts by 2030 (U.S. Department of Energy, 2008). Taken together, the DOI controls access to a large part of the future of energy in the U.S. The research herein assesses the auction formats used to allocate both fossil fuels and renewable resources on the Outer Continental Shelf (OCS). The first manuscript looks at the current method used by the DOI to allocate oil and gas leases on the OCS, and is primarily interested in how bidders behave in this environment. Using latent class estimation techniques to separate distinct bidding behavior in a laboratory

  15. 7 CFR 29.36 - Auction market.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Auction market. 29.36 Section 29.36 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... INSPECTION Regulations Definitions § 29.36 Auction market. A place to which tobacco is delivered by the...

  16. 29 CFR 780.617 - Adjunct livestock auction operations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Adjunct livestock auction operations. 780.617 Section 780... Employment in Agriculture and Livestock Auction Operations Under the Section 13(b)(13) Exemption Requirements for Exemption § 780.617 Adjunct livestock auction operations. The livestock auction operations...

  17. 31 CFR 356.20 - How does the Treasury determine auction awards?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., but not above, par when evaluated at the yield of awards to successful competitive bidders. (2... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false How does the Treasury determine... the yield or discount rate for the securities we are auctioning. (2) Accepting bids at the high yield...

  18. 31 CFR 356.20 - How does the Treasury determine auction awards?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false How does the Treasury determine... margin for the securities we are auctioning. (2) Accepting bids at the high yield, discount rate, or... the remaining par amount needed to fill the offering amount by the par amount of the bids at the high...

  19. 31 CFR 356.20 - How does the Treasury determine auction awards?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., but not above, par when evaluated at the yield of awards to successful competitive bidders. (2... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false How does the Treasury determine... the yield or discount rate for the securities we are auctioning. (2) Accepting bids at the high yield...

  20. 31 CFR 356.20 - How does the Treasury determine auction awards?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., but not above, par when evaluated at the yield of awards to successful competitive bidders. (2... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false How does the Treasury determine... the yield or discount rate for the securities we are auctioning. (2) Accepting bids at the high yield...

  1. 31 CFR 356.20 - How does the Treasury determine auction awards?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... and bond issues. We set the interest rate at a 1/8 of one percent increment. If a Treasury inflation-protected securities auction results in a negative or zero yield, the interest rate will be set at zero, and...

  2. Sequential Auctions in Uncertain Information Settings

    NASA Astrophysics Data System (ADS)

    Fatima, Shaheen; Wooldridge, Michael; Jennings, Nicholas R.

    This paper analyzes sequential auctions for private value objects using second-price sealed-bid rules. Now, the equilibrium bids for such auctions depend on the information uncertainty of the bidders. Specifically, there are three key auction parameters that the bidders could be uncertain about: the valuations of the objects for sale, the number of objects for sale, and the number of participating bidders. We analyse the bidding behaviour for each of these three sources of uncertainty. For each setting, we first find the equilibrium bidding strategies for the individual auctions that comprise a series. Then we analyze the effect of these uncertainties on the computational and economic properties of the equilibrium solution. The former analysis is essential if we want to use software agents to bid on our behalf. The latter is essential because both the auctioneer and the bidders want to know how these uncertainties affect their profits. Thus we compare the outcomes for these settings from the perspective of the bidders (i.e., in terms of their profits), from the perspective of the auctioneer (i.e., in terms of his revenue), and from a global perspective (i.e., in terms of auction efficiency).

  3. Quantum auctions: Facts and myths

    NASA Astrophysics Data System (ADS)

    Piotrowski, Edward W.; Sładkowski, Jan

    2008-06-01

    Quantum game theory, whatever opinions may be held due to its abstract physical formalism, have already found various applications even outside the orthodox physics domain. In this paper we introduce the concept of a quantum auction, its advantages and drawbacks. Then we describe the models that have already been put forward. A general model involves Wigner formalism and infinite dimensional Hilbert spaces - we envisage that the implementation might not be an easy task. But a restricted model advocated by the Hewlett-Packard group (Hogg et al.) seems to be much easier to implement. We focus on problems related to combinatorial auctions and technical assumptions that are made. Powerful quantum algorithms for finding solutions would extend the range of possible applications. Quantum strategies, being qubits, can be teleported but are immune from cloning - therefore extreme privacy of the agent’s activity could in principle be guaranteed. Then we point out some key problems that have to be solved before commercial use would be possible. With present technology, optical networks, single photon sources and detectors seems to be sufficient for an experimental realization in the near future.

  4. 43 CFR 2546.4 - Public auctions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., DEPARTMENT OF THE INTERIOR LAND RESOURCE MANAGEMENT (2000) COLOR-OF-TITLE AND OMITTED LANDS Snake River... public auction any lands for which preference-claimants do not qualify for patents under the regulations...

  5. Sequential Auctions with Partially Substitutable Goods

    NASA Astrophysics Data System (ADS)

    Vetsikas, Ioannis A.; Jennings, Nicholas R.

    In this paper, we examine a setting in which a number of partially substitutable goods are sold in sequential single unit auctions. Each bidder needs to buy exactly one of these goods. In previous work, this setting has been simplified by assuming that bidders do not know their valuations for all items a priori, but rather are informed of their true valuation for each item right before the corresponding auction takes place. This assumption simplifies the strategies of bidders, as the expected revenue from future auctions is the same for all bidders due to the complete lack of private information. In our analysis we don't make this assumption. This complicates the computation of the equilibrium strategies significantly. We examine this setting both for first and second-price auction variants, initially when the closing prices are not announced, for which we prove that sequential first and second-price auctions are revenue equivalent. Then we assume that the prices are announced; because of the asymmetry in the announced prices between the two auction variants, revenue equivalence does not hold in this case. We finish the paper, by giving some initial results about the case when free disposal is allowed, and therefore a bidder can purchase more than one item.

  6. 76 FR 81932 - Auction of FM Broadcast Construction Permits; Revised Construction Permit Number in Auction 93

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ... Construction Permits; Revised Construction Permit Number in Auction 93 AGENCY: Federal Communications Commission. ACTION: Notice. SUMMARY: This document announces a change to the construction permit number for one of the FM broadcast construction permits for Auction 93. FOR FURTHER INFORMATION CONTACT: Linda...

  7. 75 FR 8070 - Closed Auction of Broadcast Construction Permits Scheduled for July 20, 2010; Auction 88...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Construction Permits Scheduled for July 20, 2010; Auction 88 Applicants Must Provide Supplemental Information..., AM, and FM Translator construction permits scheduled to commence on July 20, 2010 (Auction 88). This.... Any envelopes must be disposed of before entering the building. Commercial overnight mail (other than...

  8. 77 FR 38803 - Mobility Fund Phase I Auction Updated Data For Auction 901

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-29

    ... FEDERAL COMMUNICATIONS COMMISSION [AU Docket No. 12-25; DA 12-990] Mobility Fund Phase I Auction Updated Data For Auction 901 AGENCY: Federal Communications Commission. ACTION: Notice. SUMMARY: In this... blocks. The map is a visual representation of data from the Attachment A files, which contain more...

  9. Security Approaches in Using Tablet Computers for Primary Data Collection in Clinical Research

    PubMed Central

    Wilcox, Adam B.; Gallagher, Kathleen; Bakken, Suzanne

    2013-01-01

    Next-generation tablets (iPads and Android tablets) may potentially improve the collection and management of clinical research data. The widespread adoption of tablets, coupled with decreased software and hardware costs, has led to increased consideration of tablets for primary research data collection. When using tablets for the Washington Heights/Inwood Infrastructure for Comparative Effectiveness Research (WICER) project, we found that the devices give rise to inherent security issues associated with the potential use of cloud-based data storage approaches. This paper identifies and describes major security considerations for primary data collection with tablets; proposes a set of architectural strategies for implementing data collection forms with tablet computers; and discusses the security, cost, and workflow of each strategy. The paper briefly reviews the strategies with respect to their implementation for three primary data collection activities for the WICER project. PMID:25848559

  10. Security approaches in using tablet computers for primary data collection in clinical research.

    PubMed

    Wilcox, Adam B; Gallagher, Kathleen; Bakken, Suzanne

    2013-01-01

    Next-generation tablets (iPads and Android tablets) may potentially improve the collection and management of clinical research data. The widespread adoption of tablets, coupled with decreased software and hardware costs, has led to increased consideration of tablets for primary research data collection. When using tablets for the Washington Heights/Inwood Infrastructure for Comparative Effectiveness Research (WICER) project, we found that the devices give rise to inherent security issues associated with the potential use of cloud-based data storage approaches. This paper identifies and describes major security considerations for primary data collection with tablets; proposes a set of architectural strategies for implementing data collection forms with tablet computers; and discusses the security, cost, and workflow of each strategy. The paper briefly reviews the strategies with respect to their implementation for three primary data collection activities for the WICER project.

  11. Auctioneering Training Certificate Program 93-1001. Final Report.

    ERIC Educational Resources Information Center

    Clark, Charles H.

    A project was conducted to prepare a catalog of duties and tasks, performance objectives and guides, and instructional materials that would enable schools to develop instructional programs designed to prepare persons to enter the career of auctioneering. An occupational survey of auctioneers was conducted; a writing team of auctioneers prepared…

  12. Bidding Agents That Perpetrate Auction Fraud

    NASA Astrophysics Data System (ADS)

    Trevathan, Jarrod; McCabe, Alan; Read, Wayne

    This paper presents a software bidding agent that inserts fake bids on the seller's behalf to inflate an auction's price. This behaviour is referred to as shill bidding. Shill bidding is strictly prohibited by online auctioneers, as it defrauds unsuspecting buyers by forcing them to pay more for the item. The malicious bidding agent was constructed to aid in developing shill detection techniques. We have previously documented a simple shill bidding agent that incrementally increases the auction price until it reaches the desired profit target, or it becomes too risky to continue bidding. This paper presents an adaptive shill bidding agent which when used over a series of auctions with substitutable items, can revise its strategy based on bidding behaviour in past auctions. The adaptive agent applies a novel prediction technique referred to as the Extremum Consistency (EC) algorithm, to determine the optimal price to aspire for. The EC algorithm has successfully been used in handwritten signature verification for determining the maximum and minimum values in an input stream. The agent's ability to inflate the price has been tested in a simulated marketplace and experimental results are presented.

  13. 77 FR 57085 - Mobility Fund Phase I Auction; Release of Files with Recalculated Road Miles for Auction 901...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... FEDERAL COMMUNICATIONS COMMISSION [AU Docket No. 12-25; DA 12-1446] Mobility Fund Phase I Auction... Mobility Fund Phase I support to be offered in Auction 901, which is to be held on September 27, 2012, and the change of the mock auction date from September 25, 2012 to September 21, 2012. DATES: The mock...

  14. China’s Land Market Auctions: Evidence of Corruption?

    PubMed Central

    Cai, Hongbin; Henderson, J. Vernon; Zhang, Qinghua

    2013-01-01

    This paper studies the urban land market in China in 2003—2007. In China, all urban land is owned by the state. Leasehold use rights for land for (re)development are sold by city governments and are a key source of city revenue. Leasehold sales are viewed as a major venue for corruption, prompting a number of reforms over the years. Reforms now require all leasehold rights be sold at public auction. There are two main types of auction: regular English auction and an unusual type which we call a “two stage auction”. The latter type of auction seems more subject to corruption, and to side deals between potential bidders and the auctioneer. Absent corruption, theory suggests that two stage auctions would most likely maximize sales revenue for properties which are likely to have relatively few bidders, or are “cold”, which would suggest negative selection on property unobservables into such auctions. However, if such auctions are more corruptible, that could involve positive selection as city officials divert hotter properties to a more corruptible auction form. The paper finds that, overall, sales prices are lower for two stage auctions, and there is strong evidence of positive selection. The price difference is explained primarily by the fact that two stage auctions typically have just one bidder, or no competition despite the vibrant land market in Chinese cities. PMID:25506125

  15. 47 CFR 1.2208 - Public notice of auction completion and auction results.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... PROCEDURE Grants by Random Selection Competitive Bidding Proceedings Broadcast Television Spectrum Reverse... broadcast television spectrum incentive auction conducted under section 6403 of the Spectrum Act, public... indicate that the reassignments of television channels and reallocations of broadcast television spectrum...

  16. 31 CFR 356.23 - How are the auction results announced?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false How are the auction results announced...-93) Determination of Auction Awards; Settlement § 356.23 How are the auction results announced? (a) After the conclusion of the auction, we will announce the auction results through a press release that...

  17. 31 CFR 356.23 - How are the auction results announced?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false How are the auction results announced...) Determination of Auction Awards; Settlement § 356.23 How are the auction results announced? (a) After the conclusion of the auction, we will announce the auction results through a press release that is available on...

  18. 31 CFR 356.23 - How are the auction results announced?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false How are the auction results announced...) Determination of Auction Awards; Settlement § 356.23 How are the auction results announced? (a) After the conclusion of the auction, we will announce the auction results through a press release that is available on...

  19. 31 CFR 356.23 - How are the auction results announced?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false How are the auction results announced...) Determination of Auction Awards; Settlement § 356.23 How are the auction results announced? (a) After the conclusion of the auction, we will announce the auction results through a press release that is available on...

  20. 7 CFR 46.25 - Auction sales.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Auction sales. 46.25 Section 46.25 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing Practices), DEPARTMENT OF AGRICULTURE MARKETING OF PERISHABLE AGRICULTURAL COMMODITIES REGULATIONS (OTHER...

  1. Books at Auction: The Art of Deaccessioning.

    ERIC Educational Resources Information Center

    Model, Peter

    1981-01-01

    Lack of space and budget cuts force many libraries to weed out books and to be selective in accepting collection bequests. The approach for deciding which books to weed out and whether to dispose of these books through dealers or auctions are decisions private clubs and many libraries must make. (RBF)

  2. Effect of security threats on primary care access in Logar province, Afghanistan.

    PubMed

    Morikawa, Masahiro J

    2008-01-01

    Security threats are a major concern for access to health care in many war-torn communities; however, there is little quantified data on actual access to care in rural communities during war. Kinderberg International e.V. provided primary care in rural Logar province, Afghanistan, for these three years in eight districts until they were integrated into the new health care structure led by the Ministry of Health in early 2005. We examined the number of patients visiting our clinic before and during the security threats related to the parliamentary election and subsequent national assembly in 2004. The number of patients declined in remote clinics while the number increased in central locations. This finding has an important practical implication: the monitoring of access to care should include remote clinics, otherwise it may potentially underestimate compromised access to health care due to security threats.

  3. Primary care in an unstable security, humanitarian, economic and political context: the Kurdistan Region of Iraq.

    PubMed

    Shukor, Ali R; Klazinga, Niek S; Kringos, Dionne S

    2017-08-23

    This study presents a descriptive synthesis of Kurdistan Region of Iraq's (KRI) primary care system, which is undergoing comprehensive primary care reforms within the context of a cross-cutting structural economic adjustment program and protracted security, humanitarian, economic and political crises. The descriptive analysis used a framework operationalizing Starfield's classic primary care model for health services research. A scoping review was performed using relevant sources, and expert consultations were conducted for completing and validating data. The descriptive analysis presents a complex narrative of a primary care system undergoing classical developmental processes of transitioning middle-income countries. The system is simultaneously under tremendous pressure to adapt to the continuously changing, complex and resource-intensive needs of sub-populations exhibiting varying morbidity patterns, within the context of protracted security, humanitarian, economic, and political crises. Despite exhibiting significant resilience in the face of the ongoing crises, the continued influx of IDPs and Syrian refugees, coupled with extremely limited resources and weak governance at policy, organizational and clinical levels threaten the sustainability of KRI's public primary care system. Diverse trajectories to the strengthening and development of primary care are underway by local and international actors, notably the World Bank, RAND Corporation, UN organizations and USAID, focusing on varying imperatives related to the protracted humanitarian and economic crises. The convergence, interaction and outcomes of the diverse initiatives and policy approaches in relation to the development of KRI's primary care system are complex and highly uncertain. A common vision of primary care is required to align resources, initiatives and policies, and to enable synergy between all local and international actors involved in the developmental and humanitarian response. Further

  4. Auction-based bandwidth allocation in the Internet

    NASA Astrophysics Data System (ADS)

    Wei, Jiaolong; Zhang, Chi

    2002-07-01

    It has been widely accepted that auctioning which is the pricing approach with minimal information requirement is a proper tool to manage scare network resources. Previous works focus on Vickrey auction which is incentive compatible in classic auction theory. In the beginning of this paper, the faults of the most representative auction-based mechanisms are discussed. And then a new method called uniform-price auction (UPA), which has the simplest auction rule is proposed and it's incentive compatibility in the network environment is also proved. Finally, the basic mode is extended to support applications which require minimum bandwidth guarantees for a given time period by introducing derivative market, and a market mechanism for network resource allocation which is predictable, riskless, and simple for end-users is completed.

  5. 76 FR 1158 - Auction of 700 MHz Band Licenses Scheduled for July 19, 2011; Comment Sought on Competitive...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-07

    ... relating to Auction 92. A. Auction Structure i. Simultaneous Multiple-Round Auction Design 7. The Bureau proposes to auction all licenses included in Auction 92 using the Commission's standard simultaneous... competitiveness and economic efficiency of a simultaneous multiple-round auction may be enhanced if such...

  6. Auction and Game Theory Based Recommendations for DOD Acquisitions

    DTIC Science & Technology

    2015-03-24

    SPONSORED REPORT SERIES Auction and Game Theory Based Recommendations for DOD Acquisitions 24 March 2015 Justin Blott, 2d Lt; Nicholas...TYPE 3. DATES COVERED 00-00-2015 to 00-00-2015 4. TITLE AND SUBTITLE Auction and Game Theory Based Recommendations for DOD Acquisitions 5a...Postgraduate School Abstract This paper synthesizes auction and game theory literature into specific military acquisition improvement

  7. Cooperation based dynamic team formation in multi-agent auctions

    NASA Astrophysics Data System (ADS)

    Pippin, Charles E.; Christensen, Henrik

    2012-06-01

    Auction based methods are often used to perform distributed task allocation on multi-agent teams. Many existing approaches to auctions assume fully cooperative team members. On in-situ and dynamically formed teams, reciprocal collaboration may not always be a valid assumption. This paper presents an approach for dynamically selecting auction partners based on observed team member performance and shared reputation. In addition, we present the use of a shared reputation authority mechanism. Finally, experiments are performed in simulation on multiple UAV platforms to highlight situations in which it is better to enforce cooperation in auctions using this approach.

  8. Auctions vs negotiations: a study of price differentials.

    PubMed

    Kjerstad, Egil

    2005-12-01

    Recent contributions in auction and bargaining theory suggest that a procurer should place more faith in the power of competition among alternative suppliers than in his or her own negotiating skill. Based on data from 216 contracts between procurers and suppliers of medical and surgical articles, we test whether auctions and bargaining result in significantly different prices. The main results are that auctions give 'thicker' markets compared with negotiations, as expected, but that auctions do not result in significantly lower prices compared with negotiations. Copyright (c) 2005 John Wiley & Sons, Ltd.

  9. Auction-theoretic analyses of the first offshore wind energy auction in Germany

    NASA Astrophysics Data System (ADS)

    Kreiss, J.; Ehrhart, K.-M.; Hanke, A.-K.

    2017-11-01

    The first offshore wind energy auction in Germany led to a striking result. The average award price was 0.44 ct/kWh and even more interesting, 3 out of 4 awarded projects had a strike price of 0.0 ct/kWh. That implies that those projects will only receive the actual wholesale market price for electricity as revenue. Although there has been a strong decline in costs of offshore wind projects, such a result is still surprising. We analyzed this result auction-theoretically and showed how the auction design and the market environment can explain part of the outcome. However, another aspect of the explanation is the high risk that the awarded bidders take regarding the future development of both the project costs and the wholesale market price.

  10. Health Auctions: a Valuation Experiment (HAVE) study protocol.

    PubMed

    Kularatna, Sanjeewa; Petrie, Dennis; Scuffham, Paul A; Byrnes, Joshua

    2016-04-07

    Quality-adjusted life years are derived using health state utility weights which adjust for the relative value of living in each health state compared with living in perfect health. Various techniques are used to estimate health state utility weights including time-trade-off and standard gamble. These methods have exhibited limitations in terms of complexity, validity and reliability. A new composite approach using experimental auctions to value health states is introduced in this protocol. A pilot study will test the feasibility and validity of using experimental auctions to value health states in monetary terms. A convenient sample (n=150) from a population of university staff and students will be invited to participate in 30 auction sets with a group of 5 people in each set. The 9 health states auctioned in each auction set will come from the commonly used EQ-5D-3L instrument. At most participants purchase 2 health states, and the participant who acquires the 2 'best' health states on average will keep the amount of money they do not spend in acquiring those health states. The value (highest bid and average bid) of each of the 24 health states will be compared across auctions to test for reliability across auction groups and across auctioneers. A test retest will be conducted for 10% of the sample to assess reliability of responses for health states auctions. Feasibility of conducting experimental auctions to value health states will also be examined. The validity of estimated health states values will be compared with published utility estimates from other methods. This pilot study will explore the feasibility, reliability and validity in using experimental auction for valuing health states. Ethical clearance was obtained from Griffith University ethics committee. The results will be disseminated in peer-reviewed journals and major international conferences. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a

  11. The impact of secure messaging on workflow in primary care: Results of a multiple-case, multiple-method study.

    PubMed

    Hoonakker, Peter L T; Carayon, Pascale; Cartmill, Randi S

    2017-04-01

    Secure messaging is a relatively new addition to health information technology (IT). Several studies have examined the impact of secure messaging on (clinical) outcomes but very few studies have examined the impact on workflow in primary care clinics. In this study we examined the impact of secure messaging on workflow of clinicians, staff and patients. We used a multiple case study design with multiple data collections methods (observation, interviews and survey). Results show that secure messaging has the potential to improve communication and information flow and the organization of work in primary care clinics, partly due to the possibility of asynchronous communication. However, secure messaging can also have a negative effect on communication and increase workload, especially if patients send messages that are not appropriate for the secure messaging medium (for example, messages that are too long, complex, ambiguous, or inappropriate). Results show that clinicians are ambivalent about secure messaging. Secure messaging can add to their workload, especially if there is high message volume, and currently they are not compensated for these activities. Staff is -especially compared to clinicians- relatively positive about secure messaging and patients are overall very satisfied with secure messaging. Finally, clinicians, staff and patients think that secure messaging can have a positive effect on quality of care and patient safety. Secure messaging is a tool that has the potential to improve communication and information flow. However, the potential of secure messaging to improve workflow is dependent on the way it is implemented and used. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. A Classroom Auction with Externalities: Applied to Mergers and Acquisitions

    ERIC Educational Resources Information Center

    Meister, J. Patrick; Anderson, Kyle J.

    2007-01-01

    The authors describe an in-class exercise in which students participate in an auction to buy US Airways. The exercise is based on events of late 1995, in which neither United nor American Airlines decided to bid for US Airways. Two teams of students participate in an English auction. Students learn that the equilibrium of the sequential game is…

  13. A Combinatorial Auction among Versatile Experts and Amateurs

    NASA Astrophysics Data System (ADS)

    Ito, Takayuki; Yokoo, Makoto; Matsubara, Shigeo

    Auctions have become an integral part of electronic commerce and a promising field for applying multi-agent technologies. Correctly judging the quality of auctioned goods is often difficult for amateurs, in particular, in Internet auctions. However, experts can correctly judge the quality of goods. In this situation, it is difficult to make experts tell the truth and attain an efficient allocation, since experts have a clear advantage over amateurs and they would not reveal their valuable information without some reward. In our previous work, we have succeeded in developing such auction protocols under the following two cases: (1) the case of a single-unit auction among experts and amateurs, and (2) the case of a combinatorial auction among single-skilled experts and amateurs. In this paper, we focus on versatile experts. Versatile experts have an interest in, and expert knowledge on the qualities of several goods. In the case of versatile experts, there would be several problems, e.g., free riding problems, if we simply extended the previous VCG-style auction protocol. Thus, in this paper, we employ PORF (price-oriented, rationing-free) protocol for designing our new protocol to realize a strategy-proof auction protocol for experts. In the protocol, the dominant strategy for experts is truth-telling. Also, for amateurs, truth-telling is the best response when two or more experts select the dominant strategy. Furthermore, the protocol is false-name-proof.

  14. A Trustworthy Internet Auction Model with Verifiable Fairness.

    ERIC Educational Resources Information Center

    Liao, Gen-Yih; Hwang, Jing-Jang

    2001-01-01

    Describes an Internet auction model achieving verifiable fairness, a requirement aimed at enhancing the trust of bidders in auctioneers. Analysis results demonstrate that the proposed model satisfies various requirements regarding fairness and privacy. Moreover, in the proposed model, the losing bids remain sealed. (Author/AEF)

  15. Access to primary energy sources - the basis of national energy security

    NASA Astrophysics Data System (ADS)

    Szlązak, Jan; Szlązak, Rafał A.

    2017-11-01

    National energy security is of fundamental importance for economic development of a country. To ensure such safety energy raw material, also called primary energy sources, are necessary. Currently in Poland primary energy sources include mainly fossil fuels, such as hard coal, brown coal, natural gas and crude oil. Other sources, e.g. renewable energy sources account for c. 15% in the energy mix. Primary energy sources are used to produce mainly electricity, which is considered as the cleanest form of energy. Poland does not have, unfortunately, sufficient energy sources and is forced to import some of them, mainly natural gas and crude oil. The article presents an insightful analysis of energy raw material reserves possessed by Poland and their structure taking account of the requirements applicable in the European Union, in particular, those related to environmental protection. The article also describes demand for electricity now and in the perspective of 2030. Primary energy sources necessary for its production have also been given. The article also includes the possibilities for the use of renewable energy sources in Poland, however, climatic conditions there are not are not particularly favourable to it. All the issues addressed in the article are summed up and ended with conclusions.

  16. Approximating the Qualitative Vickrey Auction by a Negotiation Protocol

    NASA Astrophysics Data System (ADS)

    Hindriks, Koen V.; Tykhonov, Dmytro; de Weerdt, Mathijs

    A result of Bulow and Klemperer has suggested that auctions may be a better tool to obtain an efficient outcome than negotiation. For example, some auction mechanisms can be shown to be efficient and strategy-proof. However, they generally also require that the preferences of at least one side of the auction are publicly known. However, sometimes it is very costly, impossible, or undesirable to publicly announce such preferences. It thus is interesting to find methods that do not impose this constraint but still approximate the outcome of the auction. In this paper we show that a multi-round multi-party negotiation protocol may be used to this end if the negotiating agents are capable of learning opponent preferences. The latter condition can be met by current state of the art negotiation technology. We show that this protocol approximates the theoretical outcome predicted by a so-called Qualitative Vickrey auction mechanism (even) on a complex multi-issue domain.

  17. The Use of Reverse Auction Within the U.S. Army

    DTIC Science & Technology

    2016-12-01

    by conducting a literature review on auction theory and the economic principles surrounding open markets and competition. Books, magazine articles...economic principles within auction theory examine buyer and seller motivation. B. AUCTION THEORY Auction theory explains how market participants...that leverage the power of fluid market conditions through a dynamic pricing environment. This project examines the use of RAs within the Army

  18. 78 FR 61350 - Tribal Mobility Fund Phase I Auction (Auction 902); Short-Form Application Filing Window...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-03

    ... Fund Phase I Auction (Auction 902); Short-Form Application Filing Window Rescheduled To Open on... rescheduling of the filing window for short-form applications and release an updated list of eligible areas for... Application Filing Window Rescheduled To Open on September 30, 2013 1. The Bureaus announce that the filing...

  19. 76 FR 20783 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-13

    ... rates and descriptive information about Auction Rate Securities (``ARS'') and Variable Rate Demand... interest rate setting mechanisms for ARS and liquidity facilities for VDROs, information about orders submitted for an ARS auction, and additional information about VRDOs.\\5\\ To provide subscribers with access...

  20. 76 FR 11547 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-02

    ... interest rates and descriptive information about Auction Rate Securities (``ARS'') and Variable Rate Demand... interest rate setting mechanisms for ARS and liquidity facilities for VRDOs, information about orders submitted for an ARS auction, and additional information about VRDOs.\\4\\ To provide subscribers with access...

  1. Georeferenced and secure mobile health system for large scale data collection in primary care.

    PubMed

    Sa, Joao H G; Rebelo, Marina S; Brentani, Alexandra; Grisi, Sandra J F E; Iwaya, Leonardo H; Simplicio, Marcos A; Carvalho, Tereza C M B; Gutierrez, Marco A

    2016-10-01

    Mobile health consists in applying mobile devices and communication capabilities for expanding the coverage and improving the effectiveness of health care programs. The technology is particularly promising for developing countries, in which health authorities can take advantage of the flourishing mobile market to provide adequate health care to underprivileged communities, especially primary care. In Brazil, the Primary Care Information System (SIAB) receives primary health care data from all regions of the country, creating a rich database for health-related action planning. Family Health Teams (FHTs) collect this data in periodic visits to families enrolled in governmental programs, following an acquisition procedure that involves filling in paper forms. This procedure compromises the quality of the data provided to health care authorities and slows down the decision-making process. To develop a mobile system (GeoHealth) that should address and overcome the aforementioned problems and deploy the proposed solution in a wide underprivileged metropolitan area of a major city in Brazil. The proposed solution comprises three main components: (a) an Application Server, with a database containing family health conditions; and two clients, (b) a Web Browser running visualization tools for management tasks, and (c) a data-gathering device (smartphone) to register and to georeference the family health data. A data security framework was designed to ensure the security of data, which was stored locally and transmitted over public networks. The system was successfully deployed at six primary care units in the city of Sao Paulo, where a total of 28,324 families/96,061 inhabitants are regularly followed up by government health policies. The health conditions observed from the population covered were: diabetes in 3.40%, hypertension (age >40) in 23.87% and tuberculosis in 0.06%. This estimated prevalence has enabled FHTs to set clinical appointments proactively, with the aim of

  2. Aligning medication reconciliation and secure messaging: qualitative study of primary care providers' perspectives.

    PubMed

    Heyworth, Leonie; Clark, Justice; Marcello, Thomas B; Paquin, Allison M; Stewart, Max; Archambeault, Cliona; Simon, Steven R

    2013-12-02

    Virtual (non-face-to-face) medication reconciliation strategies may reduce adverse drug events (ADEs) among vulnerable ambulatory patients. Understanding provider perspectives on the use of technology for medication reconciliation can inform the design of patient-centered solutions to improve ambulatory medication safety. The aim of the study was to describe primary care providers' experiences of ambulatory medication reconciliation and secure messaging (secure email between patients and providers), and to elicit perceptions of a virtual medication reconciliation system using secure messaging (SM). This was a qualitative study using semi-structured interviews. From January 2012 to May 2012, we conducted structured observations of primary care clinical activities and interviewed 15 primary care providers within a Veterans Affairs Healthcare System in Boston, Massachusetts (USA). We carried out content analysis informed by the grounded theory. Of the 15 participating providers, 12 were female and 11 saw 10 or fewer patients in a typical workday. Experiences and perceptions elicited from providers during in-depth interviews were organized into 12 overarching themes: 4 themes for experiences with medication reconciliation, 3 themes for perceptions on how to improve ambulatory medication reconciliation, and 5 themes for experiences with SM. Providers generally recognized medication reconciliation as a valuable component of primary care delivery and all agreed that medication reconciliation following hospital discharge is a key priority. Most providers favored delegating the responsibility for medication reconciliation to another member of the staff, such as a nurse or a pharmacist. The 4 themes related to ambulatory medication reconciliation were (1) the approach to complex patients, (2) the effectiveness of medication reconciliation in preventing ADEs, (3) challenges to completing medication reconciliation, and (4) medication reconciliation during transitions of care

  3. Aligning Medication Reconciliation and Secure Messaging: Qualitative Study of Primary Care Providers’ Perspectives

    PubMed Central

    Clark, Justice; Marcello, Thomas B; Paquin, Allison M; Stewart, Max; Archambeault, Cliona; Simon, Steven R

    2013-01-01

    Background Virtual (non-face-to-face) medication reconciliation strategies may reduce adverse drug events (ADEs) among vulnerable ambulatory patients. Understanding provider perspectives on the use of technology for medication reconciliation can inform the design of patient-centered solutions to improve ambulatory medication safety. Objective The aim of the study was to describe primary care providers’ experiences of ambulatory medication reconciliation and secure messaging (secure email between patients and providers), and to elicit perceptions of a virtual medication reconciliation system using secure messaging (SM). Methods This was a qualitative study using semi-structured interviews. From January 2012 to May 2012, we conducted structured observations of primary care clinical activities and interviewed 15 primary care providers within a Veterans Affairs Healthcare System in Boston, Massachusetts (USA). We carried out content analysis informed by the grounded theory. Results Of the 15 participating providers, 12 were female and 11 saw 10 or fewer patients in a typical workday. Experiences and perceptions elicited from providers during in-depth interviews were organized into 12 overarching themes: 4 themes for experiences with medication reconciliation, 3 themes for perceptions on how to improve ambulatory medication reconciliation, and 5 themes for experiences with SM. Providers generally recognized medication reconciliation as a valuable component of primary care delivery and all agreed that medication reconciliation following hospital discharge is a key priority. Most providers favored delegating the responsibility for medication reconciliation to another member of the staff, such as a nurse or a pharmacist. The 4 themes related to ambulatory medication reconciliation were (1) the approach to complex patients, (2) the effectiveness of medication reconciliation in preventing ADEs, (3) challenges to completing medication reconciliation, and (4) medication

  4. Urban expansion brought stress to food security in China: Evidence from decreased cropland net primary productivity.

    PubMed

    He, Chunyang; Liu, Zhifeng; Xu, Min; Ma, Qun; Dou, Yinyin

    2017-01-15

    Cropland net primary productivity (CNPP) is a crucial indicator of grain productivity and food security. However, assessments of the impact of urban expansion on the CNPP in China have been inadequate owing to data limitations. In this paper, our objective was to assess the impact of urban expansion on the CNPP in China from 1992 to 2015 in a spatially explicit manner. We first obtained the CNPP before urban expansion between 1992 and 2015 in China using the Carnegie-Ames-Stanford Approach (CASA) model. We then assessed the impact of urban expansion on the CNPP from 1992 to 2015 at multiple scales (the whole country, agricultural zones, and urban expansion hotspots) by combining the CNPP before urban expansion with the urban land coverage time series extracted from multi-source remotely sensed data. We found that the total loss of the CNPP due to urban expansion from 1992 to 2015 was 13.77TgC, which accounts for 1.88% of the CNPP before urban expansion in China. This CNPP loss resulted in a 12.45-million-ton decrease in grain production in China, corresponding to a reduction in the mean annual grain self-sufficiency rate of 2%. Therefore, we concluded that rapid urban expansion from 1992 to 2015 caused stress to China's food security. We suggest that it is still vital for China to effectively protect cropland to improve the urbanization level to 60% by 2020. Copyright © 2016 Elsevier B.V. All rights reserved.

  5. Competition strength influences individual preferences in an auction game

    PubMed Central

    Toelch, Ulf; Jubera-Garcia, Esperanza; Kurth-Nelson, Zeb; Dolan, Raymond J.

    2014-01-01

    Competitive interactions between individuals are ubiquitous in human societies. Auctions represent an institutionalized context for these interactions, a context where individuals frequently make non-optimal decisions. In particular, competition in auctions can lead to overbidding, resulting in the so-called winner’s curse, often explained by invoking emotional arousal. In this study, we investigated an alternative possibility, namely that competitors’ bids are construed as a source of information about the good’s common value thereby influencing an individuals’ private value estimate. We tested this hypothesis by asking participants to bid in a repeated all-pay auction game for five different real items. Crucially, participants had to rank the auction items for their preference before and after the experiment. We observed a clear relation between auction dynamics and preference change. We found that low competition reduced preference while high competition increased preference. Our findings support a view that competitors’ bids in auction games are perceived as valid social signal for the common value of an item. We suggest that this influence of social information constitutes a major cause for the frequently observed deviations from optimality in auctions. PMID:25168161

  6. Rationality, irrationality and escalating behavior in lowest unique bid auctions.

    PubMed

    Radicchi, Filippo; Baronchelli, Andrea; Amaral, Luís A N

    2012-01-01

    Information technology has revolutionized the traditional structure of markets. The removal of geographical and time constraints has fostered the growth of online auction markets, which now include millions of economic agents worldwide and annual transaction volumes in the billions of dollars. Here, we analyze bid histories of a little studied type of online auctions--lowest unique bid auctions. Similarly to what has been reported for foraging animals searching for scarce food, we find that agents adopt Lévy flight search strategies in their exploration of "bid space". The Lévy regime, which is characterized by a power-law decaying probability distribution of step lengths, holds over nearly three orders of magnitude. We develop a quantitative model for lowest unique bid online auctions that reveals that agents use nearly optimal bidding strategies. However, agents participating in these auctions do not optimize their financial gain. Indeed, as long as there are many auction participants, a rational profit optimizing agent would choose not to participate in these auction markets.

  7. Auction Mechanism to Allocate Air Traffic Control Slots

    NASA Technical Reports Server (NTRS)

    Raffarin, Marianne

    2003-01-01

    This article deals with an auction mechanism for airspace slots, as a means of solving the European airspace congestion problem. A disequilibrium, between Air Traffic Control (ATC) services supply and ATC services demand are at the origin of almost one fourth of delays in the air transport industry in Europe. In order to tackle this congestion problem, we suggest modifying both pricing and allocation of ATC services, by setting up an auction mechanism. Objects of the auction will be the right for airlines to cross a part of the airspace, and then to benefit from ATC services over a period corresponding to the necessary time for the crossing. Allocation and payment rules have to be defined according to the objectives of this auction. The auctioneer is the public authority in charge of ATC services, whose aim is to obtain an efficient allocation. Therefore, the social value will be maximized. Another objective is to internalize congestion costs. To that end, we apply the principle of Clarke-Groves mechanism auction: each winner has to pay the externalities imposed on other bidders. The complex context of ATC leads to a specific design for this auction.

  8. Smarter than others? Conjectures in lowest unique bid auctions.

    PubMed

    Zhou, Cancan; Dong, Hongguang; Hu, Rui; Chen, Qinghua

    2015-01-01

    Research concerning various types of auctions, such as English auctions, Dutch auctions, highest-price sealed-bid auctions, and second-price sealed-bid auctions, is always a topic of considerable interest in interdisciplinary fields. The type of auction, known as a lowest unique bid auction (LUBA), has also attracted significant attention. Various models have been proposed, but they often fail to explain satisfactorily the real bid-distribution characteristics. This paper discusses LUBA bid-distribution characteristics, including the inverted-J shape and the exponential decrease in the upper region. The authors note that this type of distribution, which initially increases and later decreases, cannot be derived from the symmetric Nash equilibrium framework based on perfect information that has previously been used. A novel optimization model based on non-perfect information is presented. The kernel of this model is the premise that agents make decisions to achieve maximum profit based on imaginary information or assumptions regarding the behavior of others.

  9. Rationality, Irrationality and Escalating Behavior in Lowest Unique Bid Auctions

    PubMed Central

    Radicchi, Filippo; Baronchelli, Andrea; Amaral, Luís A. N.

    2012-01-01

    Information technology has revolutionized the traditional structure of markets. The removal of geographical and time constraints has fostered the growth of online auction markets, which now include millions of economic agents worldwide and annual transaction volumes in the billions of dollars. Here, we analyze bid histories of a little studied type of online auctions – lowest unique bid auctions. Similarly to what has been reported for foraging animals searching for scarce food, we find that agents adopt Lévy flight search strategies in their exploration of “bid space”. The Lévy regime, which is characterized by a power-law decaying probability distribution of step lengths, holds over nearly three orders of magnitude. We develop a quantitative model for lowest unique bid online auctions that reveals that agents use nearly optimal bidding strategies. However, agents participating in these auctions do not optimize their financial gain. Indeed, as long as there are many auction participants, a rational profit optimizing agent would choose not to participate in these auction markets. PMID:22279553

  10. 78 FR 72081 - Closed Auction of AM Broadcast Construction Permits Scheduled for May 6, 2014; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-02

    ... Broadcast Construction Permits Scheduled for May 6, 2014; Comment Sought on Competitive Bidding Procedures... announces the auction of certain AM broadcast construction permits. Auction 84 will be a ``closed'' auction..., New York. II. Construction Permits In Auction 84 2. The Bureaus will proceed to auction for 22 new...

  11. Bandwidth auction for SVC streaming in dynamic multi-overlay

    NASA Astrophysics Data System (ADS)

    Xiong, Yanting; Zou, Junni; Xiong, Hongkai

    2010-07-01

    In this paper, we study the optimal bandwidth allocation for scalable video coding (SVC) streaming in multiple overlays. We model the whole bandwidth request and distribution process as a set of decentralized auction games between the competing peers. For the upstream peer, a bandwidth allocation mechanism is introduced to maximize the aggregate revenue. For the downstream peer, a dynamic bidding strategy is proposed. It achieves maximum utility and efficient resource usage by collaborating with a content-aware layer dropping/adding strategy. Also, the convergence of the proposed auction games is theoretically proved. Experimental results show that the auction strategies can adapt to dynamic join of competing peers and video layers.

  12. Auctions in Defense Acquisition: Theory and Experimental Evidence

    DTIC Science & Technology

    2002-01-01

    Department of Defense (DoD) has recently begun purchasing with online auctions — receiving offers from suppli- ers for things ranging from computers to...equipment for U.S. Navy vessels. The Navy was the first to try online auctions for procuring airplane and ship parts. The Army’s first venture into...system. The Air Force first tested the online auction waters in Au- gust 2000 to acquire computer equipment and saved about $88,000, or 27 percent of

  13. From Walras’ auctioneer to continuous time double auctions: a general dynamic theory of supply and demand

    NASA Astrophysics Data System (ADS)

    Donier, J.; Bouchaud, J.-P.

    2016-12-01

    In standard Walrasian auctions, the price of a good is defined as the point where the supply and demand curves intersect. Since both curves are generically regular, the response to small perturbations is linearly small. However, a crucial ingredient is absent of the theory, namely transactions themselves. What happens after they occur? To answer the question, we develop a dynamic theory for supply and demand based on agents with heterogeneous beliefs. When the inter-auction time is infinitely long, the Walrasian mechanism is recovered. When transactions are allowed to happen in continuous time, a peculiar property emerges: close to the price, supply and demand vanish quadratically, which we empirically confirm on the Bitcoin. This explains why price impact in financial markets is universally observed to behave as the square root of the excess volume. The consequences are important, as they imply that the very fact of clearing the market makes prices hypersensitive to small fluctuations.

  14. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  15. A novel income security intervention to address poverty in a primary care setting: a retrospective chart review.

    PubMed

    Jones, Marcella K; Bloch, Gary; Pinto, Andrew D

    2017-08-17

    To examine the development and implementation of a novel income security intervention in primary care. A retrospective, descriptive chart review of all patients referred to the Income Security Heath Promotion service during the first year of the service (December 2013-December 2014). A multisite interdisciplinary primary care organisation in inner city Toronto, Canada, serving over 40 000 patients. The study population included 181 patients (53% female, mean age 48 years) who were referred to the Income Security Health Promotion service and engaged in care. The Income Security Health Promotion service consists of a trained health promoter who provides a mixture of expert advice and case management to patients to improve income security. An advisory group, made up of physicians, social workers, a community engagement specialist and a clinical manager, supports the service. Sociodemographic information, health status, referral information and encounter details were collected from patient charts. Encounters focused on helping patients with increasing their income (77.4%), reducing their expenses (58.6%) and improving their financial literacy (26.5%). The health promoter provided an array of services to patients, including assistance with taxes, connecting to community services, budgeting and accessing free services. The service could be improved with more specific goal setting, better links to other members of the healthcare team and implementing routine follow-up with each patient after discharge. Income Security Health Promotion is a novel service within primary care to assist vulnerable patients with a key social determinant of health. This study is a preliminary look at understanding the functioning of the service. Future research will examine the impact of the Income Security Health Promotion service on income security, financial literacy, engagement with health services and health outcomes. © Article author(s) (or their employer(s) unless otherwise stated in

  16. The Modified Values Auction: A Data Analytic Classroom Game

    ERIC Educational Resources Information Center

    Miller, Larry D.

    1978-01-01

    Describes a modified values auction simulation game, reports on three levels of analysis employing actual classroom data (group, subgroup, and individual), and offers suggestions for utilizing values data in social research. (CMV)

  17. Auction fever: exploring informational social influences on bidder choices.

    PubMed

    Chen, Yi-Fen

    2011-01-01

    Previous investigations of herd behavior have identified the importance of informational social influences in consumer decision making. This research presents three studies examining herd behavior in online auctions. The three studies addressed the influence on bidder online choices of herd cues frequently found in online auctions, including bid number, feedback ratings, and number of questions and answers. This research also investigated the effect of different levels of herd cues on bidder online choices under high and low brand awareness in online auctions. The experimental results demonstrated that bidders use online herd cues when making decisions in online auctions. Additionally, different levels of herd cues influence bidder online choices in both high and low brand awareness product situations.

  18. Statistical mechanics of budget-constrained auctions

    NASA Astrophysics Data System (ADS)

    Altarelli, F.; Braunstein, A.; Realpe-Gomez, J.; Zecchina, R.

    2009-07-01

    Finding the optimal assignment in budget-constrained auctions is a combinatorial optimization problem with many important applications, a notable example being in the sale of advertisement space by search engines (in this context the problem is often referred to as the off-line AdWords problem). On the basis of the cavity method of statistical mechanics, we introduce a message-passing algorithm that is capable of solving efficiently random instances of the problem extracted from a natural distribution, and we derive from its properties the phase diagram of the problem. As the control parameter (average value of the budgets) is varied, we find two phase transitions delimiting a region in which long-range correlations arise.

  19. Auction dynamics: A volume constrained MBO scheme

    NASA Astrophysics Data System (ADS)

    Jacobs, Matt; Merkurjev, Ekaterina; Esedoǧlu, Selim

    2018-02-01

    We show how auction algorithms, originally developed for the assignment problem, can be utilized in Merriman, Bence, and Osher's threshold dynamics scheme to simulate multi-phase motion by mean curvature in the presence of equality and inequality volume constraints on the individual phases. The resulting algorithms are highly efficient and robust, and can be used in simulations ranging from minimal partition problems in Euclidean space to semi-supervised machine learning via clustering on graphs. In the case of the latter application, numerous experimental results on benchmark machine learning datasets show that our approach exceeds the performance of current state-of-the-art methods, while requiring a fraction of the computation time.

  20. Market power in auction and efficiency in emission permits allocation.

    PubMed

    Jiang, Min Xing; Yang, Dong Xiao; Chen, Zi Yue; Nie, Pu Yan

    2016-12-01

    This paper analyzes how to achieve the cost-effectiveness by initial allocation of CO 2 emission permits when a single dominant firm in production market has market power in auction, and compare two prevalent allocation patterns, mixed allocation and single auction. We show how the firm with market power may manipulate the auction price, thereby this leads to fail to achieve cost-effective solution by auction unless the total permits for allocation equal to the effective emissions cap. Provided that the market power firm receives strictly positive free permits, the effective emissions cap of mixed allocation is larger than that of single auction. The production market share of dominant firm is increasing with the free permits it holds. Finally, we examine the compliance costs and welfare of mixed allocation and single auction, the result show that the former is preferred to the later when policy makers consider economic welfare without welfare cost due to CO 2 emissions. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. Competition in decentralized electricity markets: Three papers on electricity auctions

    NASA Astrophysics Data System (ADS)

    Harbord, David William Cameron

    This thesis consists of three self-contained papers on the analysis of electricity auctions written over a period of twelve years. The first paper models price competition in a decentralized wholesale market for electricity as a first-price, sealed-bid, multi-unit auction. In both the pure and mixed-strategy equilibria of the model, above marginal cost pricing and inefficient despatch of generating units occur. An alternative regulatory pricing rule is considered and it is shown that offering to supply at marginal cost can be induced as a dominant strategy for all firms. The second paper analyses strategic interaction between long-term contracts and price competition in the British electricity wholesale market, and confirms that forward contracts will tend to put downward pressure on spot market prices. A 'strategic commitment' motive for selling forward contracts is also identified: a generator may commit itself to bidding lower prices into the spot market in order to ensure that it will be despatched with its full capacity. The third paper characterizes bidding behavior and market outcomes in uniform and discriminatory electricity auctions. Uniform auctions result in higher average prices than discriminatory auctions, but the ranking in terms of productive efficiency is ambiguous. The comparative effects of other market design features, such as the number of steps in suppliers' bid functions, the duration of bids and the elasticity of demand are analyzed. The paper also clarifies some methodological issues in the analysis of electricity auctions. In particular we show that analogies with continuous share auctions are misplaced so long as firms are restricted to a finite number of bids.

  2. Auctionable fixed transmission rights for congestion management

    NASA Astrophysics Data System (ADS)

    Alomoush, Muwaffaq Irsheid

    the transaction by the ISO, take a decision to expand the existing system, or retain the original structure of the system. Also, the thesis investigates the impact of wheeling transactions on congestion management, where we present a generalized mathematical model for the Fixed Transmission Right (FTR) auction. The auction guarantees FTR availability to all participants on a non-discriminatory basis, in which system users are permitted to buy, sell and trade FTRs through an auction. When FTRs are utilized with LMPs, they increase the efficient use of the transmission system and let a transmission customer gain advantageous features such as acquiring a mechanism to offset the extra cost due to congestion charges, providing financial and operational certainty and making system users pay for the actual use of the congested paths. The thesis also highlighted FTR trading in secondary markets to self-arrange access across different paths, create long-term transmission rights and provide more commercial certainty.

  3. A Research Study on Secure Attachment Using the Primary Caregiving Approach

    ERIC Educational Resources Information Center

    Ebbeck, Marjory; Phoon, Dora Mei Yong; Tan-Chong, Elizabeth Chai Kim; Tan, Marilyn Ai Bee; Goh, Mandy Lian Mui

    2015-01-01

    A child's positive sense of well-being is central to their overall growth and development. With an increasing number of mothers in the workforce, many infants and toddlers spend much time in child care services. Hence it is crucial that caregivers provide a secure base for the child to develop secure attachment with educarers. Given multiple…

  4. 29 CFR 780.619 - Work “in connection with” livestock auction operations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Work âin connection withâ livestock auction operations. 780... FAIR LABOR STANDARDS ACT Employment in Agriculture and Livestock Auction Operations Under the Section 13(b)(13) Exemption Requirements for Exemption § 780.619 Work “in connection with” livestock auction...

  5. Using Laboratory Experiments for Policymaking: An Example from the Georgia Irrigation Reduction Auction

    ERIC Educational Resources Information Center

    Cummings, Ronald G.; Holt, Charles A.; Laury, Susan K.

    2004-01-01

    In recent years, interest has been growing in policy applications of different auction systems. This paper reports a series of experiments that were used to design and implement an auction in a unique policymaking environment. In April 2000, the Georgia legislature passed a law that mandated that the state hold an auction in drought years to pay…

  6. 29 CFR 780.620 - Minimum wage for livestock auction work.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... minimum rate required by section 6(a)(1) of the Act for the time spent in livestock auction work. The exemption does not apply unless there is payment for all hours spent in livestock auction work at not less... 29 Labor 3 2010-07-01 2010-07-01 false Minimum wage for livestock auction work. 780.620 Section...

  7. 75 FR 74719 - Auction of VHF Commercial Television Station Construction Permits Scheduled for February 15, 2011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-01

    ... Television Station Construction Permits Scheduled for February 15, 2011; Notice and Filing Requirements... upcoming auction of certain VHF commercial TV construction permits (Auction 90). This document is intended... December 15, 2010. Bidding for construction permits in Auction 90 is scheduled to begin on February 15...

  8. Competitive Bidding in a Certain Class of Auctions

    NASA Astrophysics Data System (ADS)

    Johansson, Mathias

    2006-11-01

    We consider the problem of determining the amount to bid in a certain type of auctions in which customers submit one sealed bid. The bid reflects the price a customer is willing to pay for one unit of the offered goods. The auction is repeated and at each auction each customer requests a certain amount of goods, an amount that we call the capacity of the customer and that varies among customers and over time. At each auction, only the customer with the largest bid-capacity product obtains any goods. The price paid by the winner equals his/her bid-capacity product, and the amount of goods obtained in return equals the winner's capacity. The auction is repeated many times, with only limited information concerning winning bid-capacity products being announced to the customers. This situation is motivated in for example wireless communication networks in which a possible way of obtaining a desired service level is to use dynamic pricing and competitive bidding. In this application, the capacity is typically uncertain when the bid is made. We derive bidding rules and loss functions for a few typical service requirements.

  9. Model of Auctioneer Estimation of Swordtip Squid (Loligo edulis) Quality

    NASA Astrophysics Data System (ADS)

    Nakamura, Makoto; Matsumoto, Keisuke; Morimoto, Eiji; Ezoe, Satoru; Maeda, Toshimichi; Hirano, Takayuki

    The knowledge of experienced auctioneers regarding the circulation of marine products is an essential skill and is necessary for evaluating product quality and managing aspects such as freshness. In the present study, the ability of an auctioneer to quickly evaluate the freshness of swordtip squid (Loligo edulis) at fish markets was analyzed. Evaluation characteristics used by an auctioneer were analyzed and developed using a fuzzy logic model. Forty boxes containing 247 swordtip squid with mantles measuring 220 mm that had been evaluated and assigned to one of five quality categories by an auctioneer were used for the analysis and the modeling. The relationships between the evaluations of appearance, body color, and muscle freshness were statistically analyzed. It was found that a total of four indexes of the epidermis color strongly reflected evaluations of appearance: dispersion ratio of the head, chroma on the head-end mantle and the difference in the chroma and brightness of the mantle. The fuzzy logic model used these indexes for the antecedent-part of the linguistic rules. The results of both simulation and evaluations demonstrate that the model is robust, with the predicted results corresponding with more than 96% of the quality assignments of the auctioneers.

  10. A Greedy Double Auction Mechanism for Grid Resource Allocation

    NASA Astrophysics Data System (ADS)

    Ding, Ding; Luo, Siwei; Gao, Zhan

    To improve the resource utilization and satisfy more users, a Greedy Double Auction Mechanism(GDAM) is proposed to allocate resources in grid environments. GDAM trades resources at discriminatory price instead of uniform price, reflecting the variance in requirements for profits and quantities. Moreover, GDAM applies different auction rules to different cases, over-demand, over-supply and equilibrium of demand and supply. As a new mechanism for grid resource allocation, GDAM is proved to be strategy-proof, economically efficient, weakly budget-balanced and individual rational. Simulation results also confirm that GDAM outperforms the traditional one on both the total trade amount and the user satisfaction percentage, specially as more users are involved in the auction market.

  11. Application for Single Price Auction Model (SPA) in AC Network

    NASA Astrophysics Data System (ADS)

    Wachi, Tsunehisa; Fukutome, Suguru; Chen, Luonan; Makino, Yoshinori; Koshimizu, Gentarou

    This paper aims to develop a single price auction model with AC transmission network, based on the principle of maximizing social surplus of electricity market. Specifically, we first formulate the auction market as a nonlinear optimization problem, which has almost the same form as the conventional optimal power flow problem, and then propose an algorithm to derive both market clearing price and trade volume of each player even for the case of market-splitting. As indicated in the paper, the proposed approach can be used not only for the price evaluation of auction or bidding market but also for analysis of bidding strategy, congestion effect and other constraints or factors. Several numerical examples are used to demonstrate effectiveness of our method.

  12. Multi-unit auctions with budget-constrained bidders

    NASA Astrophysics Data System (ADS)

    Ghosh, Gagan Pratap

    In my dissertation, I investigate the effects of budget-constraints in multi-unit auctions. This is done in three parts. First, I analyze a case where all bidders have a common budget constraint. Precisely, I analyze an auction where two units of an object are sold at two simultaneous, sealed bid, first-price auctions, to bidders who have demand for both units. Bidders differ with respect to their valuations for the units. All bidders have an identical budget constraint which binds their ability to spend in the auction. I show that if valuation distribution is atom-less, then their does not exist any symmetric equilibrium in this auction game. In the second and third parts of my thesis, I analyze the sale of licenses for the right to drill for oil and natural gas in the Outer Continental Shelf (OCS) of the United States. These sales are conducted using simultaneous sealed-bid first-price auctions for multiple licenses, each representing a specific area (called a tract). Using aspects of observed bidding-behavior, I first make a prima facie case that bidders are budget-constrained in these auctions. In order to formalize this argument, I develop a simple extension of the standard model (where bidders differ in their valuations for the objects) by incorporating (random) budgets for the bidders. The auction-game then has a two-dimensional set of types for each player. I study the theoretical properties of this auction, assuming for simplicity that two units are being sold. I show that this game has an equilibrium in pure strategies that is symmetric with respect to the players and with respect to the units. The strategies are essentially pure in the sense that each bidder-type has a unique split (up to a permutation) of his budget between the two auctions. I then characterize the equilibrium in terms of the bid-distribution and iso-bid curves in the value-budget space. I derive various qualitative features of this equilibrium, among which are: (1) under mild

  13. 78 FR 68839 - Tribal Mobility Fund Phase I Auction Rescheduled for February 25, 2014; Notice of Changes to...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-15

    ...) announce the rescheduling of Auction 902 and revise the dates and deadlines for the filing window for short...-auction deadlines for Auction 902. 2. The Auction 902 short-form application filing window opened at 12... short-form application (FCC Form 180) filing window will reopen on November 18, 2013, at 12:00 noon ET...

  14. 75 FR 8703 - Auction of Lower and Upper Paging Bands Licenses Scheduled for May 25, 2010; Notice and Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-25

    ...: Wireless Telecommunications Bureau, Auctions and Spectrum Access Division: For legal questions: Scott...://wireless.fcc.gov/auctions/87/ . Due to the large number of licenses in Auction 87, the complete list of... ``Attachment A'' files at http://wireless.fcc.gov/auctions/87/ . A paper copy of the complete list of licenses...

  15. 76 FR 60830 - Auction of FM Broadcast Construction Permits Scheduled for March 27, 2012; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-30

    ... Construction Permits Scheduled for March 27, 2012; Comment Sought on Competitive Bidding Procedures for Auction... auction of certain FM broadcast construction permits scheduled to commence on March 27, 2012. This... construction permits and seek comment on the procedures to be used for this auction. This auction is scheduled...

  16. 75 FR 61752 - Auction of FM Broadcast Construction Permits Scheduled for March 29, 2011; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... Construction Permits Scheduled for March 29, 2011; Comment Sought on Competitive Bidding Procedures for Auction... auction of certain FM construction permits scheduled to commence on March 29, 2011 (Auction 91). This... Telecommunications and the Media Bureaus (the Bureaus) announce an auction of certain FM Broadcast construction...

  17. Essays on empirical analysis of multi-unit auctions: Impacts of financial transmission rights on the restructured electricity industry

    NASA Astrophysics Data System (ADS)

    Zang, Hailing

    This dissertation uses recently developed empirical methodologies for the study of multi-unit auctions to test the impacts of Financial Transmission Rights (FTRs) on the competitiveness of restructured electricity markets. FTRs are a special type of financial option that hedge against volatility in the cost of transporting electricity over the grid. Policy makers seek to use the prices of FTRs as market signals to incentivize efficient investment and utilization of transmission capacity. However, prices will not send the correct signals if market participants strategically use FTRs. This dissertation uses data from the Texas electricity market to test whether the prices of FTRs are efficient to achieve such goals. The auctions studied are multi-unit, uniform-price, sealed-bid auctions. The first part of the dissertation studies the auctions on the spot market of the wholesale electricity industry. I derive structural empirical models to test theoretical predictions as to whether bidders fully internalize the effect of FTRs on profits into their bidding decisions. I find that bidders are learning as to how to optimally bid above marginal cost for their inframarginal capacities. The bidders also learn to bid to include FTRs into their profit maximization problem during the course of the first year. But starting from the second year, they deviated from optimal bidding that includes FTRs in the profit maximization problems. Counterfactual analysis show that the primary effect of FTRs on market outcomes is changing the level of prices rather than production efficiency. Finally, I find that in most months, the current allocations of FTRs are statistically equivalent to the optimal allocations. The second part of the dissertation studies the bidding behavior in the FTR auctions. I find that FTRs' strategic impact on the FTR purchasing behavior is significant for large bidders---firms exercising market power in the FTR auctions. Second, trader forecasts future FTR credit

  18. Competition in the economic crisis: Analysis of procurement auctions.

    PubMed

    Gugler, Klaus; Weichselbaumer, Michael; Zulehner, Christine

    2015-01-01

    We study the effects of the recent economic crisis on firms׳ bidding behavior and markups in sealed bid auctions. Using data from Austrian construction procurements, we estimate bidders׳ construction costs within a private value auction model. We find that markups of all bids submitted decrease by 1.5 percentage points in the recent economic crisis, markups of winning bids decrease by 3.3 percentage points. We also find that without the government stimulus package this decrease would have been larger. These two pieces of evidence point to pro-cyclical markups.

  19. The association of family food security and depression in mothers having primary school children in Ray-Iran.

    PubMed

    Payab, Moloud; Motlagh, Ahmad-Reza Dorosty; Eshraghian, Mohammadreza; Rostami, Reza; Siassi, Fereydoun

    2014-01-01

    As a major public health problem, food insecurity has adverse social and psychological effects, in addition to the impact on public health. This study aimed to determine the association of household food security and depression in mothers with primary school children in Ray County. This descriptive, analytical cross-sectional study was conducted on 430 mothers with primary school children in the spring 2010. During a two-stage cluster sampling, an 18-items food security questionnaire (USDA) and the Beck depression inventory were completed via interviewing mothers. Chi-squared test, one-way analysis of variance, simple regression and stepwise multiple regression were used to describe and analyze data, and to identify related factors using SPSS-16 software. The prevalence of food insecurity and depression in mothers were 50.2% and 51.4% respectively. Also 34.6% of mothers in the "food secure" group were depressed and 77.8% in "food insecure with hunger" group were depressed and this difference was statistically significant. Twelve out of the 20 examined variables (age, family size, number of children, economic status, home ownership, employment households, educational level of the mother and also the head of household, height, energy intake, and carbohydrate and protein intakes) were significantly associated with food security and depression. Food insecurity and depression in mothers with primary school children in Ray County showed a significant positive correlation (P < 0.001). The prevalence of household food insecurity and depression in the studied population were high. Since there is a significant relationship between food insecurity and depression, more attention must be paid to this group.

  20. [Primary health care in Ecuador: services provided by the Ministry of Health and Rural Social security Services].

    PubMed

    Robertson, R L; Castro, C E; Gómez, L C; Gwynne, G; Tinajero Baca, C L; Zschock, D K

    1991-10-01

    The present study will examine three common premises in the field of international public health: that the primary care services offered by agencies of the Ministries of Health (MH) are less costly than those offered by Social Security institutions, that the former services are inferior to the latter, and that funds are distributed more equitably by the MH centers among their various recipient populations. The 1986 study compared the costs, quality, and equity of the services in 15 primary care centers in Ecuador--eight Ministry of Health centers and seven rural Social Security (RSS) centers--examining budgetary data from 1985 and obtaining information through a questionnaire and interviews with the personnel at those centers. Average costs were calculated by standardized accounting techniques, and it was confirmed that for several important services, especially medical consultations, these costs were much lower in the Ministry centers than in the Social Security centers. However, no differences in the cost of dental care were detected. The evaluation of quality, based on an analysis of the production structure and process, did not yield uniform results. On the one hand, the distribution of personnel and the allocation of funds for drugs and other supplies indicated that the RSS agencies provided better quality services. On the other hand, a questionnaire revealed that the MH health workers' knowledge of various principles of primary care was superior to that of the RSS workers. Upon comparing the per capita budget of the two types of entities, it was confirmed that the Ministry of Health had more equitable per capita coverage than rural Social Security. The implications of these findings for Ecuador and other developing countries are discussed and several recommendations made.

  1. 78 FR 45524 - Auction of H Block Licenses in the 1915-1920 MHz and 1995-2000 MHz Bands; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-29

    ... issues relating to the conduct of Auction 96. A. Auction Design i. Simultaneous Multiple-Round Auction--With or Without Package Bidding 14. The Bureau proposes to conduct Auction 96 using a simultaneous... incorporate provisions for a simple form of package bidding into the simultaneous multiple-round auction. In...

  2. Modelling of auctioning mechanism for solar photovoltaic capacity

    NASA Astrophysics Data System (ADS)

    Poullikkas, Andreas

    2016-10-01

    In this work, a modified optimisation model for the integration of renewable energy sources for power-generation (RES-E) technologies in power-generation systems on a unit commitment basis is developed. The purpose of the modified optimisation procedure is to account for RES-E capacity auctions for different solar photovoltaic (PV) capacity electricity prices. The optimisation model developed uses a genetic algorithm (GA) technique for the calculation of the required RES-E levy (or green tax) in the electricity bills. Also, the procedure enables the estimation of the level of the adequate (or eligible) feed-in-tariff to be offered to future RES-E systems, which do not participate in the capacity auctioning procedure. In order to demonstrate the applicability of the optimisation procedure developed the case of PV capacity auctioning for commercial systems is examined. The results indicated that the required green tax, in order to promote the use of RES-E technologies, which is charged to the electricity customers through their electricity bills, is reduced with the reduction in the final auctioning price. This has a significant effect related to the reduction of electricity bills.

  3. Teaching Auction Strategy Using Experiments Administered Via the Internet

    ERIC Educational Resources Information Center

    Asker, John; Grosskopf, Brit; McKinney, C. Nicholas; Niederle, Muriel; Roth, Alvin E.; Weizsacker, Georg

    2004-01-01

    The authors present an experimental design used to teach concepts in the economics of auctions and implications for e-Business procurement. The experiment is easily administered and can be adapted to many different treatments. The chief innovation is that it does not require the use of a lab or class time. Instead, the design can be implemented on…

  4. 41 CFR 102-38.95 - What is an auction?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What is an auction? 102-38.95 Section 102-38.95 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 38-SALE OF PERSONAL PROPERTY...

  5. 41 CFR 102-38.95 - What is an auction?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false What is an auction? 102-38.95 Section 102-38.95 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 38-SALE OF PERSONAL PROPERTY...

  6. 41 CFR 102-38.95 - What is an auction?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false What is an auction? 102-38.95 Section 102-38.95 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 38-SALE OF PERSONAL PROPERTY...

  7. 41 CFR 102-38.95 - What is an auction?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false What is an auction? 102-38.95 Section 102-38.95 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 38-SALE OF PERSONAL PROPERTY...

  8. 41 CFR 102-38.95 - What is an auction?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What is an auction? 102-38.95 Section 102-38.95 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 38-SALE OF PERSONAL PROPERTY...

  9. Understanding Persuasive Online Sales Messages from eBay Auctions

    ERIC Educational Resources Information Center

    White, Barbara Jo; Clapper, Danial; Noel, Rita; Fortier, Jenny; Grabolosa, Pierre

    2007-01-01

    Online auctions are dominated by eBay, which started bringing together buyers and sellers in 1995. eBay product listings can easily be used in business communication courses to better understand online sales messages. One great advantage is that the vast majority of nearly 15 million listings a day are written and assembled by everyday consumers…

  10. Making Marketing Principles Tangible: Online Auctions as Living Case Studies

    ERIC Educational Resources Information Center

    Wood, Charles M.; Suter, Tracy A.

    2004-01-01

    This article presents an effective course supplement for Principles of Marketing classes. An experiential project involving online auctions is offered to instructors seeking to create a more participatory student environment and an interactive teaching style. A number of learning points are illustrated that allow instructors to use an auction…

  11. Spectrum sharing in cognitive radio networks--an auction-based approach.

    PubMed

    Wang, Xinbing; Li, Zheng; Xu, Pengchao; Xu, Youyun; Gao, Xinbo; Chen, Hsiao-Hwa

    2010-06-01

    Cognitive radio is emerging as a promising technique to improve the utilization of the radio frequency spectrum. In this paper, we consider the problem of spectrum sharing among primary (or "licensed") users (PUs) and secondary (or "unlicensed") users (SUs). We formulate the problem based on bandwidth auction, in which each SU makes a bid for the amount of spectrum and each PU may assign the spectrum among the SUs by itself according to the information from the SUs without degrading its own performance. We show that the auction is a noncooperative game and that Nash equilibrium (NE) can be its solution. We first consider a single-PU network to investigate the existence and uniqueness of the NE and further discuss the fairness among the SUs under given conditions. Then, we present a dynamic updating algorithm in which each SU achieves NE in a distributed manner. The stability condition of the dynamic behavior for this spectrum-sharing scheme is studied. The discussion is generalized to the case in which there are multiple PUs in the network, where the properties of the NE are shown under appropriate conditions. Simulations were used to evaluate the system performance and verify the effectiveness of the proposed algorithm.

  12. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.

    PubMed

    Li, Zhen; Jing, Tao; Ma, Liran; Huo, Yan; Qian, Jin

    2016-03-07

    The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric cryptography and asymmetric cryptography) may be compromised in CIoT networks, since these types of networks are heterogeneous. In this paper, we address the security issue in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative networks, we propose to employ cooperative jamming to achieve secrecy transmission. In the cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the signal to interference plus noise ratio (SINR) at the eavesdropper subject to the quality of service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the considered minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper. By using semi-definite programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme

  13. Auction development for the price-based electric power industry

    NASA Astrophysics Data System (ADS)

    Dekrajangpetch, Somgiat

    The restructuring of the electric power industry is to move away from the cost-based monopolistic environment of the past to the priced-based competitive environment. As the electric power industry is restructuring in many places, there are still many problems that need to be solved. The work in this dissertation contributes to solve some of the electric power auction problems. The majority of this work is aimed to help develop good markets. A LaGrangian relaxation (LR) Centralized Daily Commitment Auction (CDCA) has been implemented. It has been shown that the solution might not be optimal nor fair to some generation companies (GENCOs) when identical or similar generating units participate in a LR CDCA based auction. Supporting information for bidding strategies on how to change unit data to enhance the chances of bid acceptance has been developed. The majority of this work is based on Single Period Commodity Auction (SPCA). Alternative structures for the SPCA are outlined. Whether the optimal solution is degenerated is investigated. Good pricing criteria are summarized and the pricing method following good pricing criteria is developed. Electricity is generally considered as a homogeneous product. When availability level is used as additional characteristic to distinct electricity, electricity can be considered a heterogeneous product. The procedure to trade electricity as a heterogeneous product is developed. The SPCA is formulated as a linear program. The basic IPLP algorithm has been extended so that sensitivity analysis can be performed as in the simplex method. Sensitivity analysis is used to determine market reach. Additionally, sensitivity analysis is used in combination with the investigation of historical auction results to provide raw data for power system expansion. Market power is a critical issue in electric power deregulation. Firms with market power have an advantage over other competitor firms in terms of market reach. Various approaches to

  14. Building Secure Attachments for Primary School Children: A Mixed Methods Study

    ERIC Educational Resources Information Center

    Ubha, Neerose; Cahill, Sharon

    2014-01-01

    Despite the wide implications of attachment theory there remains a lack of research exploring interventions which encapsulate the principles of an attachment-based framework in the school context. The aim of this research was to address this gap by implementing an intervention for a group of five primary-aged pupils with identified insecure…

  15. Design and Promotion Strategy of Marketing Platform of Aquatic Auction based on Internet

    NASA Astrophysics Data System (ADS)

    Peng, Jianliang

    For the online trade and promotion of aquatic products and related materials through the network between supply and demand, the design content and effective promotional strategies of aquatic auctions online marketing platform is proposed in this paper. Design elements involve the location of customer service, the basic function of the platform including the purchase of general orders, online auctions, information dissemination, and recommendation of fine products, human services, and payment preferences. Based on network and mobile e-commerce transaction support, the auction platform makes the transaction of aquatic products well in advance. The results are important practical value for the design and application of online marketing platform of aquatic auction.

  16. Auctions with Dynamic Populations: Efficiency and Revenue Maximization

    NASA Astrophysics Data System (ADS)

    Said, Maher

    We study a stochastic sequential allocation problem with a dynamic population of privately-informed buyers. We characterize the set of efficient allocation rules and show that a dynamic VCG mechanism is both efficient and periodic ex post incentive compatible; we also show that the revenue-maximizing direct mechanism is a pivot mechanism with a reserve price. We then consider sequential ascending auctions in this setting, both with and without a reserve price. We construct equilibrium bidding strategies in this indirect mechanism where bidders reveal their private information in every period, yielding the same outcomes as the direct mechanisms. Thus, the sequential ascending auction is a natural institution for achieving either efficient or optimal outcomes.

  17. Auction-based distributed efficient economic operations of microgrid systems

    NASA Astrophysics Data System (ADS)

    Zou, Suli; Ma, Zhongjing; Liu, Xiangdong

    2014-12-01

    This paper studies the economic operations of the microgrid in a distributed way such that the operational schedule of each of the units, like generators, load units, storage units, etc., in a microgrid system, is implemented by autonomous agents. We apply and generalise the progressive second price (PSP) auction mechanism which was proposed by Lazar and Semret to efficiently allocate the divisible network resources. Considering the economic operation for the microgrid systems, the generators play as sellers to supply energy and the load units play as the buyers to consume energy, while a storage unit, like battery, super capacitor, etc., may transit between buyer and seller, such that it is a buyer when it charges and becomes a seller when it discharges. Furthermore in a connected mode, each individual unit competes against not only the other individual units in the microgrid but also the exogenous main grid possessing fixed electricity price and infinite trade capacity; that is to say, the auctioneer assigns the electricity among all individual units and the main grid with respect to the submitted bid strategies of all individual units in the microgrid in an economic way. Due to these distinct characteristics, the underlying auction games are distinct from those studied in the literature. We show that under mild conditions, the efficient economic operation strategy is a Nash equilibrium (NE) for the PSP auction games, and propose a distributed algorithm under which the system can converge to an NE. We also show that the performance of worst NE can be bounded with respect to the system parameters, say the energy trading price with the main grid, and based upon that, the implemented NE is unique and efficient under some conditions.

  18. AUCTION MECHANISMS FOR IMPLEMENTING TRADABLE NETWORK PERMIT MARKETS

    NASA Astrophysics Data System (ADS)

    Wada, Kentaro; Akamatsu, Takashi

    This paper proposes a new auction mechanism for implementing the tradable network permit markets. Assuming that each user makes a trip from an origin to a destination along a path in a specific time period, we design an auction mechanism that enables each user to purchase a bundle of permits corresponding to a set of links in the user's preferred path. The objective of the proposed mechanism is to achieve a socially optimal state with minimal revelation of users' private information. In order to achieve this, the mechanism employs an evolutionary approach that has an auction phase and a path capacity adjustment phase, which are repeated on a day-to-day basis. We prove that the proposed mechanism has the following desirable properties: (1) truthful bidding is the dominant strategy for each user and (2) the proposed mechanism converges to an approximate socially optimal state in the sense that the achieved value of the social surplus reaches its maximum value when the number of users is large.

  19. [Human resources requirements for diabetic patients healthcare in primary care clinics of the Mexican Institute of Social Security].

    PubMed

    Doubova, Svetlana V; Ramírez-Sánchez, Claudine; Figueroa-Lara, Alejandro; Pérez-Cuevas, Ricardo

    2013-12-01

    To estimate the requirements of human resources (HR) of two models of care for diabetes patients: conventional and specific, also called DiabetIMSS, which are provided in primary care clinics of the Mexican Institute of Social Security (IMSS). An evaluative research was conducted. An expert group identified the HR activities and time required to provide healthcare consistent with the best clinical practices for diabetic patients. HR were estimated by using the evidence-based adjusted service target approach for health workforce planning; then, comparisons between existing and estimated HRs were made. To provide healthcare in accordance with the patients' metabolic control, the conventional model required increasing the number of family doctors (1.2 times) nutritionists (4.2 times) and social workers (4.1 times). The DiabetIMSS model requires greater increase than the conventional model. Increasing HR is required to provide evidence-based healthcare to diabetes patients.

  20. 29 CFR 516.13 - Livestock auction employees exempt from overtime pay requirements under section 13(b)(13) of the...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Livestock auction employees exempt from overtime pay....13 Livestock auction employees exempt from overtime pay requirements under section 13(b)(13) of the... employee is employed both in agriculture and in connection with livestock auction operations: (a) The total...

  1. 78 FR 24404 - Auction of Lower and Upper Paging Band Licenses Scheduled for July 16, 2013; Notice of Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-25

    ...This document announces the procedures and minimum opening bids for the upcoming auction of licenses in the lower and upper paging bands (Auction 95). This document is intended to familiarize prospective applicants with the procedures and other requirements for participation in the auction.

  2. 30 CFR 285.220 - What auction format may MMS use in a lease sale?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... OFFSHORE RENEWABLE ENERGY ALTERNATE USES OF EXISTING FACILITIES ON THE OUTER CONTINENTAL SHELF Issuance of OCS Renewable Energy Leases Competitive Lease Award Process § 285.220 What auction format may MMS use... renewable energy leases and will use one of the following auction formats, as determined through the lease...

  3. 30 CFR 285.220 - What auction format may MMS use in a lease sale?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE RENEWABLE ENERGY ALTERNATE USES OF EXISTING FACILITIES ON THE OUTER CONTINENTAL SHELF Issuance of OCS Renewable Energy Leases Competitive Lease Award Process § 285... competitive auctions to award renewable energy leases and will use one of the following auction formats, as...

  4. 30 CFR 585.220 - What auction format may BOEM use in a lease sale?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INTERIOR OFFSHORE RENEWABLE ENERGY AND ALTERNATE USES OF EXISTING FACILITIES ON THE OUTER CONTINENTAL SHELF Issuance of OCS Renewable Energy Leases Competitive Lease Award Process § 585.220 What auction format may... award renewable energy leases and will use one of the following auction formats, as determined through...

  5. 30 CFR 585.220 - What auction format may BOEM use in a lease sale?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INTERIOR OFFSHORE RENEWABLE ENERGY AND ALTERNATE USES OF EXISTING FACILITIES ON THE OUTER CONTINENTAL SHELF Issuance of OCS Renewable Energy Leases Competitive Lease Award Process § 585.220 What auction format may... award renewable energy leases and will use one of the following auction formats, as determined through...

  6. 30 CFR 585.220 - What auction format may BOEM use in a lease sale?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INTERIOR OFFSHORE RENEWABLE ENERGY AND ALTERNATE USES OF EXISTING FACILITIES ON THE OUTER CONTINENTAL SHELF Issuance of OCS Renewable Energy Leases Competitive Lease Award Process § 585.220 What auction format may... award renewable energy leases and will use one of the following auction formats, as determined through...

  7. 9 CFR 2.76 - Records: Operators of auction sales and brokers.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 9 Animals and Animal Products 1 2011-01-01 2011-01-01 false Records: Operators of auction sales and brokers. 2.76 Section 2.76 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Records § 2.76 Records: Operators of auction sales and...

  8. 9 CFR 2.76 - Records: Operators of auction sales and brokers.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 9 Animals and Animal Products 1 2013-01-01 2013-01-01 false Records: Operators of auction sales and brokers. 2.76 Section 2.76 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Records § 2.76 Records: Operators of auction sales and...

  9. 9 CFR 2.76 - Records: Operators of auction sales and brokers.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 9 Animals and Animal Products 1 2012-01-01 2012-01-01 false Records: Operators of auction sales and brokers. 2.76 Section 2.76 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Records § 2.76 Records: Operators of auction sales and...

  10. Robust Multi-unit Auction Protocol against False-name Bids

    NASA Astrophysics Data System (ADS)

    Yokoo, Makoto; Sakurai, Yuko; Matsubara, Shigeo

    This paper presents a new multi-unit auction protocol (IR protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called LDS has been developed for combinatorial auctions of multiple different items and has proven to be robust against false-name bids. Although we can modify the LDS protocol to handle multi-unit auctions, in which multiple units of an identical item are auctioned, the protocol is complicated and requires the auctioneer to carefully pre-determine the combination of bundles to obtain a high social surplus or revenue. For the auctioneer, our newly developed IR protocol is easier to use than the LDS, since the combination of bundles is automatically determined in a flexible manner according to the declared evaluation values of agents. The evaluation results show that the IR protocol can obtain a better social surplus than that obtained by the LDS protocol.

  11. Are Structural Estimates of Auction Models Reasonable? Evidence from Experimental Data

    ERIC Educational Resources Information Center

    Bajari, Patrick; Hortacsu, Ali

    2005-01-01

    Recently, economists have developed methods for structural estimation of auction models. Many researchers object to these methods because they find the strict rationality assumptions to be implausible. Using bid data from first-price auction experiments, we estimate four alternative structural models: (1) risk-neutral Bayes-Nash, (2) risk-averse…

  12. 77 FR 69933 - Expanding the Economic and Innovation Opportunities of Spectrum Through Incentive Auctions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-21

    ...In the Notice of Proposed Rulemaking, ``Expanding the Economic and Innovation Opportunities of Spectrum Through Incentive Auctions'' (NPRM), released October 2, 2012, the Commission considers matters related to the implementation of Congress's mandate to conduct an incentive auction of broadcast television spectrum as set forth in the Middle Class Tax Relief and Job Creation Act of 2012 (Spectrum Act).

  13. 77 FR 9655 - Mobility Fund Phase I Auction Updated List of Potentially Eligible Census Blocks

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-17

    ... Updated List of Potentially Eligible Census Blocks AGENCY: Federal Communications Commission. ACTION... Bureaus provide an updated list of potentially eligible census blocks for Auction 901 scheduled to... summary of the Mobility Fund Phase I Auction Updated List of Potentially Eligible Census Blocks Public...

  14. Hipster Racism and Sexism in Charity Date Auctions: Individualism, Privilege Blindness and Irony in the Academy

    ERIC Educational Resources Information Center

    Current, Cheris Brewer; Tillotson, Emily

    2018-01-01

    This paper follows one small, Christian university's five-year experience with student charity date auctions. The contemporary re-emergence of date auctions represents a backlash against gender and racial progress. Student leaders believe that in a post-racial and post-sexist society, race and gender are decontextualised neutral elements of…

  15. Sold! The Elementary Classroom Auction as Learning Tool of Communication and Economics

    ERIC Educational Resources Information Center

    Boyd, Josh; Boyd, Gina

    2014-01-01

    An auction, though an economic tool, is essentially a performance dependent on communication (Smith, 1989). The auctioneer dictates the pace, asks for bids, and acknowledges responses; the enterprise is controlled by a voice (Boyce, 2001). Bidders must listen and respond strategically to the communication of the people around them. An auction…

  16. 31 CFR 344.7 - What are Demand Deposit securities?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... indebtedness. Funds invested in the ninety-day certificates of indebtedness earn simple interest equal to the... security shall bear a variable rate of interest based on an adjustment of the average yield for three-month... regular auction of three-month Treasury bills and is shown in the SLGS rate table. Interest is accrued and...

  17. Efficient Double Auction Mechanisms in the Energy Grid with Connected and Islanded Microgrids

    NASA Astrophysics Data System (ADS)

    Faqiry, Mohammad Nazif

    The future energy grid is expected to operate in a decentralized fashion as a network of autonomous microgrids that are coordinated by a Distribution System Operator (DSO), which should allocate energy to them in an efficient manner. Each microgrid operating in either islanded or grid-connected mode may be considered to manage its own resources. This can take place through auctions with individual units of the microgrid as the agents. This research proposes efficient auction mechanisms for the energy grid, with is-landed and connected microgrids. The microgrid level auction is carried out by means of an intermediate agent called an aggregator. The individual consumer and producer units are modeled as selfish agents. With the microgrid in islanded mode, two aggregator-level auction classes are analyzed: (i) price-heterogeneous, and (ii) price homogeneous. Under the price heterogeneity paradigm, this research extends earlier work on the well-known, single-sided Kelly mechanism to double auctions. As in Kelly auctions, the proposed algorithm implements the bidding without using any agent level private infor-mation (i.e. generation capacity and utility functions). The proposed auction is shown to be an efficient mechanism that maximizes the social welfare, i.e. the sum of the utilities of all the agents. Furthermore, the research considers the situation where a subset of agents act as a coalition to redistribute the allocated energy and price using any other specific fairness criterion. The price homogeneous double auction algorithm proposed in this research ad-dresses the problem of price-anticipation, where each agent tries to influence the equilibri-um price of energy by placing strategic bids. As a result of this behavior, the auction's efficiency is lowered. This research proposes a novel approach that is implemented by the aggregator, called virtual bidding, where the efficiency can be asymptotically maximized, even in the presence of price anticipatory bidders

  18. Pricing strategies, the strength of bidding intentions, and online auction performance: a cross-cultural study.

    PubMed

    Peng, Yu-Shu; Jan, Lih-Tsyr

    2009-10-01

    Over the past decade, electronic markets based on the Internet, particularly online auctions, have become popular venues for conducting business. Previous studies often focused on the construction of the best bidding model, while few studies have tried to integrate multiple pricing strategies to predict the probability of closing an auction and the price premium. This study constructs a mediated model to examine the relationship among pricing strategies, the strength of bidding intentions, and online auction performance. The sample consists of 1,055 auctions of iPod MP3 players from eBay Web sites in Hong Kong, Singapore, Belgium, and France. Empirical results show that the pricing strategies directly influence both the probability of closing an auction and the level of price premium. The pricing strategies also indirectly influence the price premium through the mediating effect of the strength of bidding intentions.

  19. 78 FR 65982 - Auction of H Block Licenses in the 1915-1920 MHz and 1995-2000 MHz Bands Rescheduled for January...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-04

    ...This document announces the procedures, reserve price, and minimum opening bids for the upcoming auction of H Block licenses (Auction 96) and provides the revised schedule for Auction 96. This document is intended to familiarize prospective applicants with the procedures and other requirements for participation in the auction.

  20. The Security Education Concepts in the Textbooks of the National and Civic Education of the Primary Stage in Jordan--An Analytical Study

    ERIC Educational Resources Information Center

    Al-Edwan, Zaid Suleiman

    2016-01-01

    The present study aimed at exploring the concepts of the security education in the textbooks of the national and civic education of the higher primary stage in Jordan. It adopted the descriptive analytical method. The study sample consisted of the textbooks of the national and civic education for the basic eighth, ninth and tenth grades. To…

  1. Identification of shareholder ethics and responsibilities in online reverse auctions for construction projects.

    PubMed

    Hatipkarasulu, Yilmaz; Gill, James H

    2004-04-01

    The increasing number of companies providing internet services and auction tools helped popularize the online reverse auction trend for purchasing commodities and services in the last decade. As a result, a number of owners, both public and private, accepted the online reverse auctions as the bidding technique for their construction projects. Owners, while trying to minimize their costs for construction projects, are also required to address their ethical responsibilities to the shareholders. In the case of online reverse auctions for construction projects, the ethical issues involved in the bidding technique directly reflects on the owner's ethical and social responsibilities to their shareholders. The goal of this paper is to identify the shareholder ethics and responsibilities in online reverse auctions for construction projects by analyzing the ethical issues for the parties involved in the process. The identification of the ethical issues and responsibilities requires clear definition and understanding of professional ethics and the roles of the involved parties. In this paper, first, the concept of professional ethics and social responsibility is described in a general form. To illustrate the ethical issues and responsibilities, a sample case of bidding for a construction project using online reverse auction techniques is presented in which the shareholders were actively involved in questioning the ethical issues. The issues involved in the bidding process and their reflection on the shareholder responsibilities are described and analyzed for each stage of the process. A brief discussion of the overall process is also included to address the general ethical issues involved in online reverse auctions.

  2. Adaptive Sniping for Volatile and Stable Continuous Double Auction Markets

    NASA Astrophysics Data System (ADS)

    Toft, I. E.; Bagnall, A. J.

    This paper introduces a new adaptive sniping agent for the Continuous Double Auction. We begin by analysing the performance of the well known Kaplan sniper in two extremes of market conditions. We generate volatile and stable market conditions using the well known Zero Intelligence-Constrained agent and a new zero-intelligence agent Small Increment (SI). ZI-C agents submit random but profitable bids/offers and cause high volatility in prices and individual trader performance. Our new zero-intelligence agent, SI, makes small random adjustments to the outstanding bid/offer and hence is more cautious than ZI-C. We present results for SI in self-play and then analyse Kaplan in volatile and stable markets. We demonstrate that the non-adaptive Kaplan sniper can be configured to suit either market conditions, but no single configuration is performs well across both market types. We believe that in a dynamic auction environment where current or future market conditions cannot be predicted a viable sniping strategy should adapt its behaviour to suit prevailing market conditions. To this end, we propose the Adaptive Sniper (AS) agent for the CDA. AS traders classify sniping opportunities using a statistical model of market activity and adjust their classification thresholds using a Widrow-Hoff adapted search. Our AS agent requires little configuration, and outperforms the original Kaplan sniper in volatile and stable markets, and in a mixed trader type scenario that includes adaptive strategies from the literature.

  3. Multiagent model and mean field theory of complex auction dynamics

    NASA Astrophysics Data System (ADS)

    Chen, Qinghua; Huang, Zi-Gang; Wang, Yougui; Lai, Ying-Cheng

    2015-09-01

    Recent years have witnessed a growing interest in analyzing a variety of socio-economic phenomena using methods from statistical and nonlinear physics. We study a class of complex systems arising from economics, the lowest unique bid auction (LUBA) systems, which is a recently emerged class of online auction game systems. Through analyzing large, empirical data sets of LUBA, we identify a general feature of the bid price distribution: an inverted J-shaped function with exponential decay in the large bid price region. To account for the distribution, we propose a multi-agent model in which each agent bids stochastically in the field of winner’s attractiveness, and develop a theoretical framework to obtain analytic solutions of the model based on mean field analysis. The theory produces bid-price distributions that are in excellent agreement with those from the real data. Our model and theory capture the essential features of human behaviors in the competitive environment as exemplified by LUBA, and may provide significant quantitative insights into complex socio-economic phenomena.

  4. Using Experimental Auctions to Examine Demand for E-Cigarettes.

    PubMed

    O'Connor, Richard; Rousu, Matthew C; Bansal-Travers, Maansi; Vogl, Lisa; Corrigan, Jay R

    2017-06-01

    E-cigarettes are the latest in a line of potentially reduced exposure products that have garnered interest among smokers. In this paper, we use experimental auctions to estimate smokers' demand for e-cigarettes and to assess the impact of advertisements on willingness to pay. These are actual auctions, with winners and losers, which means hypothetical biases often seen in surveys are minimized. We find smokers have positive demand for e-cigarettes, and that the print advertisements used in our study had greater effectiveness than video ads (b = 2.00, p < .05) in terms of increasing demand for disposable e-cigarettes. Demand was greater for reusable versus disposable e-cigarettes. In multivariate models, demand for e-cigarettes was higher among non-white participants and among smokers willing to pay more for cigarettes. Our findings suggest that cigarette smokers are interested in e-cigarettes as alternatives to traditional products, particularly for reusable forms, and that this demand can be influenced by messaging/advertising. Given these reduced harm products are appealing, if smokers are able to switch completely to e-cigarettes, there is a good chance for accrual of significant harm reduction. © The Author 2016. Published by Oxford University Press on behalf of the Society for Research on Nicotine and Tobacco. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  5. Understanding Financial Market States Using an Artificial Double Auction Market.

    PubMed

    Yim, Kyubin; Oh, Gabjin; Kim, Seunghwan

    2016-01-01

    The ultimate value of theories describing the fundamental mechanisms behind asset prices in financial systems is reflected in the capacity of such theories to understand these systems. Although the models that explain the various states of financial markets offer substantial evidence from the fields of finance, mathematics, and even physics, previous theories that attempt to address the complexities of financial markets in full have been inadequate. We propose an artificial double auction market as an agent-based model to study the origin of complex states in financial markets by characterizing important parameters with an investment strategy that can cover the dynamics of the financial market. The investment strategies of chartist traders in response to new market information should reduce market stability based on the price fluctuations of risky assets. However, fundamentalist traders strategically submit orders based on fundamental value and, thereby stabilize the market. We construct a continuous double auction market and find that the market is controlled by the proportion of chartists, Pc. We show that mimicking the real state of financial markets, which emerges in real financial systems, is given within the range Pc = 0.40 to Pc = 0.85; however, we show that mimicking the efficient market hypothesis state can be generated with values less than Pc = 0.40. In particular, we observe that mimicking a market collapse state is created with values greater than Pc = 0.85, at which point a liquidity shortage occurs, and the phase transition behavior is described at Pc = 0.85.

  6. Ergodic Transition in a Simple Model of the Continuous Double Auction

    PubMed Central

    Radivojević, Tijana; Anselmi, Jonatha; Scalas, Enrico

    2014-01-01

    We study a phenomenological model for the continuous double auction, whose aggregate order process is equivalent to two independent queues. The continuous double auction defines a continuous-time random walk for trade prices. The conditions for ergodicity of the auction are derived and, as a consequence, three possible regimes in the behavior of prices and logarithmic returns are observed. In the ergodic regime, prices are unstable and one can observe a heteroskedastic behavior in the logarithmic returns. On the contrary, non-ergodicity triggers stability of prices, even if two different regimes can be seen. PMID:24558377

  7. Ergodic transition in a simple model of the continuous double auction.

    PubMed

    Radivojević, Tijana; Anselmi, Jonatha; Scalas, Enrico

    2014-01-01

    We study a phenomenological model for the continuous double auction, whose aggregate order process is equivalent to two independent M/M/1 queues. The continuous double auction defines a continuous-time random walk for trade prices. The conditions for ergodicity of the auction are derived and, as a consequence, three possible regimes in the behavior of prices and logarithmic returns are observed. In the ergodic regime, prices are unstable and one can observe a heteroskedastic behavior in the logarithmic returns. On the contrary, non-ergodicity triggers stability of prices, even if two different regimes can be seen.

  8. The use of importance and performance analysis (IPA) to evaluate effectiveness of the forward auction market agro commodities: A case study

    NASA Astrophysics Data System (ADS)

    Wulansari, Dwi Ratna; Sutopo, Wahyudi; Hisjam, Muh.

    2018-02-01

    The empowering auction market for commodities in East Java Province is one of five auction market revitalization programs conducted by the Republic of Indonesia c.q. Ministry of Trading started in 2014. One of the districts in East Java Province, namely Magetan District utilizes the commodity auction market to improve the competitiveness of their agricultural industry by shortening the supply chain. The Magetan District needs to evaluate their support for farmers or farmer groups to participate in the forward auction market (FAM). Implementation of the FAM commodities is divided into three main processes, namely pre-auction, auction, and post-auction. The auction market is organized to shorten the trading chain. Implementation of the FAM requires good planning, among Seller (namely Farmer or Farmer Group), organizer of Auction (namely Commodity Auction Company), Buyer, and Local Government (namely the farmer facilitator). This article is aimed to develop the instrument of a Performance Measurement Model Using Important and Performance Analysis (IPA) for Improving the FAM Effectiveness of Agro Commodity from Magetan District with Supply Chain Management approach. IPA is implemented at pre-auction, auction, and post-auction. The IPA model results in the diagram to decide the strategies in improving the FAM effectiveness, and then it can encourage farmers to improve welfare and realize the competitiveness of the auctioneer.

  9. Understanding overbidding: using the neural circuitry of reward to design economic auctions.

    PubMed

    Delgado, Mauricio R; Schotter, Andrew; Ozbay, Erkut Y; Phelps, Elizabeth A

    2008-09-26

    We take advantage of our knowledge of the neural circuitry of reward to investigate a puzzling economic phenomenon: Why do people overbid in auctions? Using functional magnetic resonance imaging (fMRI), we observed that the social competition inherent in an auction results in a more pronounced blood oxygen level-dependent (BOLD) response to loss in the striatum, with greater overbidding correlated with the magnitude of this response. Leveraging these neuroimaging results, we design a behavioral experiment that demonstrates that framing an experimental auction to emphasize loss increases overbidding. These results highlight a role for the contemplation of loss in understanding the tendency to bid "too high." Current economic theories suggest overbidding may result from either "joy of winning" or risk aversion. By combining neuroeconomic and behavioral economic techniques, we find that another factor, namely loss contemplation in a social context, may mediate overbidding in auctions.

  10. Understanding Overbidding: Using the Neural Circuitry of Reward to Design Economic Auctions

    PubMed Central

    Delgado, Mauricio R.; Schotter, Andrew; Ozbay, Erkut Y.; Phelps, Elizabeth A.

    2011-01-01

    We take advantage of our knowledge of the neural circuitry of reward to investigate a puzzling economic phenomenon: Why do people overbid in auctions? Using functional magnetic resonance imaging (fMRI), we observed that the social competition inherent in an auction results in a more pronounced blood oxygen level–dependent (BOLD) response to loss in the striatum, with greater overbidding correlated with the magnitude of this response. Leveraging these neuroimaging results, we design a behavioral experiment that demonstrates that framing an experimental auction to emphasize loss increases overbidding. These results highlight a role for the contemplation of loss in understanding the tendency to bid “too high.” Current economic theories suggest overbidding may result from either “joy of winning” or risk aversion. By combining neuroeconomic and behavioral economic techniques, we find that another factor, namely loss contemplation in a social context, may mediate overbidding in auctions. PMID:18818362

  11. 9 CFR 2.76 - Records: Operators of auction sales and brokers.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ..., DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Records § 2.76 Records: Operators of auction sales and... breed or type of animal; (ii) The sex of the animal; and (iii) The date of birth or approximate age; and...

  12. Bidding Behavior in a Multi-attribute First-price Auction

    DTIC Science & Technology

    2010-01-01

    of applying key features of the multi-unit auction to proxy buyer /seller marginal valuations of the attributes of a job. Two experiments were...compensation package show promise in ascertaining buyer /seller marginal valuations of a job. This research effort was supported by a grant from the...auctions observed in the goods market, as measured by maximizing consumer and producer surplus, are likely to have promising applications to labor markets

  13. Evaluation of Aviation Career Pay Incentives Among the Naval Aviation Enterprise Utilizing Auction Mechanisms

    DTIC Science & Technology

    2015-03-01

    the cm1·ent program has failed to meet targeted retention across conununities while ove1paying nearly $5,300,000 dming FY-2013, according to Eric...Kelso. This thesis examines the potential improvements of applying unif01m-price auction, Quality Adjusted Discount (QUAD), and Combinatorial Retention ...responses, we developed individual quality scores and reservation prices to apply three auction mechanisms to the retention goals and costs of the

  14. Understanding Financial Market States Using an Artificial Double Auction Market

    PubMed Central

    2016-01-01

    The ultimate value of theories describing the fundamental mechanisms behind asset prices in financial systems is reflected in the capacity of such theories to understand these systems. Although the models that explain the various states of financial markets offer substantial evidence from the fields of finance, mathematics, and even physics, previous theories that attempt to address the complexities of financial markets in full have been inadequate. We propose an artificial double auction market as an agent-based model to study the origin of complex states in financial markets by characterizing important parameters with an investment strategy that can cover the dynamics of the financial market. The investment strategies of chartist traders in response to new market information should reduce market stability based on the price fluctuations of risky assets. However, fundamentalist traders strategically submit orders based on fundamental value and, thereby stabilize the market. We construct a continuous double auction market and find that the market is controlled by the proportion of chartists, Pc. We show that mimicking the real state of financial markets, which emerges in real financial systems, is given within the range Pc = 0.40 to Pc = 0.85; however, we show that mimicking the efficient market hypothesis state can be generated with values less than Pc = 0.40. In particular, we observe that mimicking a market collapse state is created with values greater than Pc = 0.85, at which point a liquidity shortage occurs, and the phase transition behavior is described at Pc = 0.85. PMID:27031110

  15. Combining auctions and performance-based payments in a forest enrichment field trial in Western Kenya.

    PubMed

    Khalumba, Mercelyne; Wünscher, Tobias; Wunder, Sven; Büdenbender, Mirjam; Holm-Müller, Karin

    2014-06-01

    Cost-effectiveness is an important aspect in the assessment of payments for environmental services (PES) initiatives. In participatory field trials with communities in Western Kenya, we combined procurement auctions for forest enrichment contracts with performance-based payments and compared the outcomes with a baseline scenario currently used by the Kenyan Forest Service. Procurement auctions were the most cost-effective. The competitive nature of the auction reduced contracting expenses (provision costs), and the result-oriented payments provided additional incentives to care for the planted seedlings, resulting in their improved survival rates (service quantity). These gains clearly exceeded increases in transaction costs associated with conducting an auction. The number of income-poor auction participants and winners was disproportionately high and local institutional buy-in was remarkably strong. Our participatory approach may, however, require adaptations when conducted at a larger scale. Although the number of contracts we monitored was limited and prohibited the use of statistical tests, our study is one of the first to reveal the benefits of using auctions for PES in developing countries. © 2014 Society for Conservation Biology.

  16. Using a Second-Price Auction to set Military Retention Bonus Levels: An Application to the Australian Army

    DTIC Science & Technology

    2008-03-01

    and do not reflect the official policy or position of the Department of Defense or the U.S. Government. 12a. DISTRIBUTION / AVAILABILITY STATEMENT...auction is used to set salaries levels in a generic labor market scenario. The experimental results support the literature: a second-price auction...analyses an experiment where a sealed-bid, second-price auction is used to set salaries levels in a generic labor market scenario. The experimental

  17. Green auctions and reduction of information rents in payments for environmental services: an experimental investigation in Sunan County, northwestern China.

    PubMed

    Deng, Xiaohong; Xu, Zhongmin

    2015-01-01

    Reducing information rents is an important task for government agencies wishing to purchase maximal environmental services with limited budgets. This paper reports on several green auction options for reducing information rents and improving the performance of the "Grain for Green" Payments for environmental services (PES) program implemented in northwestern China. In r experimental auctions and investigations, door-to-door interviews were conducted and bidding envelopes and survey questionnaires were used to determine the offers and the foregone profits of the participants. Three scenarios are analyzed in this paper: a uniform price auction, a discriminatory price auction, and an opportunity-cost system. The results show that compared to the uniform price auction system, the other auction systems can increase the cost-effectiveness of conservation contracting. Competitive bidding can reveal true opportunity costs and can reduce information rents extracted from the government by farmers using private information. The demographics and average bids of these auction types were also analyzed. "Perfect information" in the opportunity-cost offer system has the best performance but is very hard to implement in reality. The results of this research show that the auction is a valuable tool for purchasing conservation contracts in northwestern China, but that in the future, the performance of these auctions should be studied with relaxed model assumptions.

  18. Green Auctions and Reduction of Information Rents in Payments for Environmental Services: An Experimental Investigation in Sunan County, Northwestern China

    PubMed Central

    Deng, Xiaohong; Xu, Zhongmin

    2015-01-01

    Reducing information rents is an important task for government agencies wishing to purchase maximal environmental services with limited budgets. This paper reports on several green auction options for reducing information rents and improving the performance of the “Grain for Green” Payments for environmental services (PES) program implemented in northwestern China. In r experimental auctions and investigations, door-to-door interviews were conducted and bidding envelopes and survey questionnaires were used to determine the offers and the foregone profits of the participants. Three scenarios are analyzed in this paper: a uniform price auction, a discriminatory price auction, and an opportunity-cost system. The results show that compared to the uniform price auction system, the other auction systems can increase the cost-effectiveness of conservation contracting. Competitive bidding can reveal true opportunity costs and can reduce information rents extracted from the government by farmers using private information. The demographics and average bids of these auction types were also analyzed. “Perfect information” in the opportunity-cost offer system has the best performance but is very hard to implement in reality. The results of this research show that the auction is a valuable tool for purchasing conservation contracts in northwestern China, but that in the future, the performance of these auctions should be studied with relaxed model assumptions. PMID:25793263

  19. Impact of primary healthcare providers' initial role security and therapeutic commitment on implementing brief interventions in managing risky alcohol consumption: a cluster randomised factorial trial.

    PubMed

    Keurhorst, M; Anderson, P; Heinen, M; Bendtsen, Preben; Baena, Begoña; Brzózka, Krzysztof; Colom, Joan; Deluca, Paolo; Drummond, Colin; Kaner, Eileen; Kłoda, Karolina; Mierzecki, Artur; Newbury-Birch, Dorothy; Okulicz-Kozaryn, Katarzyna; Palacio-Vieira, Jorge; Parkinson, Kathryn; Reynolds, Jillian; Ronda, Gaby; Segura, Lidia; Słodownik, Luiza; Spak, Fredrik; van Steenkiste, Ben; Wallace, Paul; Wolstenholme, Amy; Wojnar, Marcin; Gual, Antoni; Laurant, M; Wensing, M

    2016-07-16

    Brief interventions in primary healthcare are cost-effective in reducing drinking problems but poorly implemented in routine practice. Although evidence about implementing brief interventions is growing, knowledge is limited with regard to impact of initial role security and therapeutic commitment on brief intervention implementation. In a cluster randomised factorial trial, 120 primary healthcare units (PHCUs) were randomised to eight groups: care as usual, training and support, financial reimbursement, and the opportunity to refer patients to an internet-based brief intervention (e-BI); paired combinations of these three strategies, and all three strategies combined. To explore the impact of initial role security and therapeutic commitment on implementing brief interventions, we performed multilevel linear regression analyses adapted to the factorial design. Data from 746 providers from 120 PHCUs were included in the analyses. Baseline role security and therapeutic commitment were found not to influence implementation of brief interventions. Furthermore, there were no significant interactions between these characteristics and allocated implementation groups. The extent to which providers changed their brief intervention delivery following experience of different implementation strategies was not determined by their initial attitudes towards alcohol problems. In future research, more attention is needed to unravel the causal relation between practitioners' attitudes, their actual behaviour and care improvement strategies to enhance implementation science. ClinicalTrials.gov: NCT01501552.

  20. Mid-term follow-up of the TVT-Secur midurethral sling for primary stress incontinence.

    PubMed

    Angleitner-Flotzinger, Johannes; Aigmueller, Thomas

    2014-09-01

    The TVT-Secur was introduced in 2006 as a less invasive alternative to retropubic and transobturator suburethral slings. This retrospective cohort study evaluated objective and subjective results in a series of 158 consecutive patients as well as complications and the reoperation rate after TVT-Secur procedure. Between November 2006 and June 2010 a total of 158 patients underwent a TVT-Secur procedure at a single institution. All patients underwent preoperative urodynamic testing. All patients were invited for follow-up including physical examination, urodynamic studies and subjective evaluation. A total of 96 patients (61%) were available for follow-up with a mean follow-up of 29.8 months (range 5-50, median 30). At follow-up, eight (8%) of 96 patients had reoperations for stress incontinence. There were no reoperations for bleeding/hematoma, tape erosions or obstructed micturition and there were no tape erosions or exposures. 29 patients (30%) had a negative cough stress test and 44 patients (46%) subjectively considered themselves "cured". Nine of 43 patients (21%) without urgency symptoms preoperatively developed de novo urgency; 24 of 35 patients (69%) with preoperative urgency complaints were free of urgency symptoms. At 2.4 years, the TVT-Secur appears to have a low adverse events profile but inferior results compared with traditional midurethral slings. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  1. 75 FR 32773 - Auction of 218-219 MHz Service and Phase II 220 MHz Service Licenses Scheduled for December 7...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-09

    ... licenses included in Auction 89 using the Commission's standard simultaneous multiple-round auction format... sequential bidding rounds. The initial bidding schedule will be announced in a public notice to be released.... For Auction 89, the Bureau proposes to employ a simultaneous stopping rule approach. A simultaneous...

  2. Competitive bidding for health insurance contracts: lessons from the online HMO auctions.

    PubMed

    Gupta, Alok; Parente, Stephen T; Sanyal, Pallab

    2012-12-01

    Healthcare is an important social and economic component of modern society, and the effective use of information technology in this industry is critical to its success. As health insurance premiums continue to rise, competitive bidding may be useful in generating stronger price competition and lower premium costs for employers and possibly, government agencies. In this paper, we assess an endeavor by several Fortune 500 companies to reduce healthcare procurement costs for their employees by having HMOs compete in open electronic auctions. Although the auctions were successful in generating significant cost savings for the companies in the first year, i.e., 1999, they failed to replicate the success and were eventually discontinued after two more years. Over the past decade since the failed auction experiment, effective utilization of information technologies have led to significant advances in the design of complex electronic markets. Using this knowledge, and data from the auctions, we point out several shortcomings of the auction design that, we believe, led to the discontinuation of the market after three years. Based on our analysis, we propose several actionable recommendations that policy makers can use to design a sustainable electronic market for procuring health insurance.

  3. Physical contact influences how much people pay at celebrity auctions

    PubMed Central

    Newman, George E.; Bloom, Paul

    2014-01-01

    Contagion is a form of magical thinking in which people believe that a person’s immaterial qualities or essence can be transferred to an object through physical contact. Here we investigate how a belief in contagion influences the sale of celebrity memorabilia. Using data from three high-profile estate auctions, we find that people’s expectations about the amount of physical contact between the object and the celebrity positively predicts the final bids for items that belonged to well-liked individuals (e.g., John F. Kennedy) and negatively predicts final bids for items that belonged to disliked individuals (e.g., Bernard Madoff). A follow-up experiment further suggests that these effects are driven by contagion beliefs: when asked to bid on a sweater owned by a well-liked celebrity, participants report that they would pay substantially less if it was sterilized before they received it. However, sterilization increases the amount they would pay for a sweater owned by a disliked celebrity. These studies suggest that magical thinking may still have effects in contemporary Western societies and they provide some unique demonstrations of contagion effects on real-world purchase decisions. PMID:24567388

  4. Physical contact influences how much people pay at celebrity auctions.

    PubMed

    Newman, George E; Bloom, Paul

    2014-03-11

    Contagion is a form of magical thinking in which people believe that a person's immaterial qualities or essence can be transferred to an object through physical contact. Here we investigate how a belief in contagion influences the sale of celebrity memorabilia. Using data from three high-profile estate auctions, we find that people's expectations about the amount of physical contact between the object and the celebrity positively predicts the final bids for items that belonged to well-liked individuals (e.g., John F. Kennedy) and negatively predicts final bids for items that belonged to disliked individuals (e.g., Bernard Madoff). A follow-up experiment further suggests that these effects are driven by contagion beliefs: when asked to bid on a sweater owned by a well-liked celebrity, participants report that they would pay substantially less if it was sterilized before they received it. However, sterilization increases the amount they would pay for a sweater owned by a disliked celebrity. These studies suggest that magical thinking may still have effects in contemporary Western societies and they provide some unique demonstrations of contagion effects on real-world purchase decisions.

  5. 78 FR 11179 - Auction of Lower and Upper Paging Bands Licenses Scheduled for July 16, 2013; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-15

    ... investigating and evaluating all technical and marketplace factors that may have a bearing on the value of the... cooperate, collaborate, or communicate, including discussing bids, bidding strategies, or post-auction... schedule in order to foster an auction pace that reasonably balances speed with the bidders' need to study...

  6. 77 FR 22575 - The Auction Block Company, an Alaska Corporation v. the City of Homer, a Municipal Corporation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-16

    ... FEDERAL MARITIME COMMISSION [Docket No. 12-03] The Auction Block Company, an Alaska Corporation v. the City of Homer, a Municipal Corporation and Its Port of Homer; Notice of Filing of Complaint and...) by The Auction Block Company, an Alaska Corporation, hereinafter ``Complainant,'' against the City of...

  7. 78 FR 21355 - Tribal Mobility Fund Phase I Auction Scheduled for October 24, 2013; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-10

    ... unit is the basic unit that will be used to determine the winners in Auction 902 and to measure... Bureaus will measure coverage based on population rather than road miles. Under the auction design options...: EV-DO, EV-DO Rev A, UMTS/HSPA, HSPA+, WiMAX, and LTE. If the Mosaik data did not show such coverage...

  8. Electronic Reverse Auctions: Integrating an E-Sourcing Tool into a Sales and Purchasing Cross-Course Negotiation Project

    ERIC Educational Resources Information Center

    Williams, Jacqueline A.; Dobie, Kathryn

    2011-01-01

    Electronic reverse auctions are increasingly being used by firms to improve firm financial and operational performance. The described teaching innovation serves as a model for introducing electronic reverse auctions as a central element in a comprehensive negotiation exercise involving sales management and purchasing management students. Results…

  9. 75 FR 56533 - Wireless Telecommunications Bureau Postpones Auction of 218-219 MHz Service and Phase II 220 MHz...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-16

    ... FEDERAL COMMUNICATIONS COMMISSION [AU Docket No. 10-107; DA 10-1630] Wireless Telecommunications... Auction 89. FOR FURTHER INFORMATION CONTACT: Wireless Telecommunications Bureau, Auctions and Spectrum... by the Chief, Wireless Telecommunications Bureau pursuant to authority delegated by 47 CFR 0.131...

  10. Bidding process in online auctions and winning strategy: Rate equation approach

    NASA Astrophysics Data System (ADS)

    Yang, I.; Kahng, B.

    2006-06-01

    Online auctions have expanded rapidly over the last decade and have become a fascinating new type of business or commercial transaction in this digital era. Here we introduce a master equation for the bidding process that takes place in online auctions. We find that the number of distinct bidders who bid k times up to the t th bidding progresses, called the k -frequent bidder, seems to scale as nk(t)˜tk-2.4 . The successfully transmitted bidding rate by the k -frequent bidder is likely to scale as qk(t)˜k-1.4 , independent of t for large t . This theoretical prediction is close to empirical data. These results imply that bidding at the last moment is a rational and effective strategy to win in an eBay auction.

  11. Analysis on trust influencing factors and trust model from multiple perspectives of online Auction

    NASA Astrophysics Data System (ADS)

    Yu, Wang

    2017-10-01

    Current reputation models lack the research on online auction trading completely so they cannot entirely reflect the reputation status of users and may cause problems on operability. To evaluate the user trust in online auction correctly, a trust computing model based on multiple influencing factors is established. It aims at overcoming the efficiency of current trust computing methods and the limitations of traditional theoretical trust models. The improved model comprehensively considers the trust degree evaluation factors of three types of participants according to different participation modes of online auctioneers, to improve the accuracy, effectiveness and robustness of the trust degree. The experiments test the efficiency and the performance of our model under different scale of malicious user, under environment like eBay and Sporas model. The experimental results analysis show the model proposed in this paper makes up the deficiency of existing model and it also has better feasibility.

  12. Mechanism Design for Multi-slot Ads Auction in Sponsored Search Markets

    NASA Astrophysics Data System (ADS)

    Deng, Xiaotie; Sun, Yang; Yin, Ming; Zhou, Yunhong

    In this paper, we study pricing models for multi-slot advertisements, where advertisers can bid to place links to their sales webpages at one or multiple slots on a webpage, called the multi-slot AD auction problem. We develop and analyze several important mechanisms, including the VCG mechanism for multi-slot ads auction, the optimal social welfare solution, as well as two weighted GSP-like protocols (mixed and hybrid). Furthermore, we consider that forward-looking Nash equilibrium and prove its existence in the weighted GSP-like pricing protocols.

  13. On Revenue-Optimal Dynamic Auctions for Bidders with Interdependent Values

    NASA Astrophysics Data System (ADS)

    Constantin, Florin; Parkes, David C.

    In a dynamic market, being able to update one's value based on information available to other bidders currently in the market can be critical to having profitable transactions. This is nicely captured by the model of interdependent values (IDV): a bidder's value can explicitly depend on the private information of other bidders. In this paper we present preliminary results about the revenue properties of dynamic auctions for IDV bidders. We adopt a computational approach to design single-item revenue-optimal dynamic auctions with known arrivals and departures but (private) signals that arrive online. In leveraging a characterization of truthful auctions, we present a mixed-integer programming formulation of the design problem. Although a discretization is imposed on bidder signals the solution is a mechanism applicable to continuous signals. The formulation size grows exponentially in the dependence of bidders' values on other bidders' signals. We highlight general properties of revenue-optimal dynamic auctions in a simple parametrized example and study the sensitivity of prices and revenue to model parameters.

  14. 78 FR 56874 - Comment Sought on Petition for Reconsideration of Auction 902 Procedures Public Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-16

    ... FEDERAL COMMUNICATIONS COMMISSION [AU Docket No. 13-53; DA 13-1876] Comment Sought on Petition for Reconsideration of Auction 902 Procedures Public Notice AGENCY: Federal Communications Commission. ACTION: Notice. SUMMARY: This document announces that on September 6, 2013, Smith Bagley, Inc. (SBI) filed a petition...

  15. 77 FR 73969 - Expanding the Economic and Innovation Opportunities of Spectrum Through Incentive Auctions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-12

    ...] Expanding the Economic and Innovation Opportunities of Spectrum Through Incentive Auctions AGENCY: Federal... Media Bureau extends the deadline for filing comments and reply comments on the Notice of Proposed... delivery, by commercial overnight courier, or by first-class or overnight U.S. Postal Service mail...

  16. Integrating Monetary and Non-monetary Reenlistment Incentives Utilizing the Combinatorial Retention Auction Mechanism (CRAM)

    DTIC Science & Technology

    2008-12-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS INTEGRATING MONETARY AND NON-MONETARY REENLISTMENT INCENTIVES UTILIZING THE...Monetary and Non- monetary Reenlistment Incentives Utilizing the Combinatorial Retention Auction Mechanism (CRAM) 6. AUTHOR(S) Brooke Zimmerman 5...iii Approved for public release; distribution is unlimited INTEGRATING MONETARY AND NON-MONETARY REENLISTMENT INCENTIVES UTILIZING THE

  17. 31 CFR 356.11 - How are bids submitted in an auction?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., our computer time stamp will establish the receipt time. You are bound by your bids after the closing... failures or disruptions of equipment or communications facilities used for participating in Treasury auctions. (4) Submitters are responsible for bids submitted using computer equipment on their premises...

  18. 31 CFR 356.11 - How are bids submitted in an auction?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., our computer time stamp will establish the receipt time. You are bound by your bids after the closing... failures or disruptions of equipment or communications facilities used for participating in Treasury auctions. (4) Submitters are responsible for bids submitted using computer equipment on their premises...

  19. Reciprocity in Online Markets: Empirical Studies of Auction and Barter Markets

    ERIC Educational Resources Information Center

    Ye, Shun

    2013-01-01

    My dissertation seeks to understand how reciprocity affects transaction outcomes and mechanism design in online markets. The first essay examines negative reciprocity illustrated as feedback-revoking behavior in the eBay auction market, focusing on its impact and implications for reputation system design. I utilize the biggest policy change of…

  20. 49 CFR 599.201 - Identification of salvage auctions and disposal facilities.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... facilities. 599.201 Section 599.201 Transportation Other Regulations Relating to Transportation (Continued... and Disposal Facilities § 599.201 Identification of salvage auctions and disposal facilities. (a... disposal facility identified in paragraph (a)(2) or (a)(3) of this section. (2) A disposal facility listed...

  1. See Art History in a New Light: Have an Art Auction

    ERIC Educational Resources Information Center

    Benter, Doris J.

    2008-01-01

    At Portledge School in Locust Valley, New York, ninth graders in their upper school study art history for one semester. The visual arts department has created a vigorous new syllabus culminating in an hour-long mock art auction. The department selects several art movements (e.g., Post-Impressionism, Cubism, Abstract Expressionism, Social Realism,…

  2. 75 FR 57947 - Auction of VHF Commercial Television Station Construction Permits Scheduled for February 15, 2011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-23

    ... technical and marketplace factors that may have a bearing on the value of the construction permits for... auction pace that reasonably balances speed with the bidders' need to study round results and adjust their... and other factors. The Bureaus seek comment on this proposal. Commenters may wish to address the role...

  3. Variability of Valuation of Non-Monetary Incentives: Motivating and Implementing the Combinatorial Retention Auction Mechanism

    DTIC Science & Technology

    2009-03-01

    homeport, geographic stability for two tours and compressed work week; homeport, lump sum SRB, and telecommuting ). The Monte Carlo simulation...Geographic stability 2 tours, and compressed work week). The Add 2 combination includes home port choice, lump sum SRB, and telecommuting ...VALUATION OF NON-MONETARY INCENTIVES: MOTIVATING AND IMPLEMENTING THE COMBINATORIAL RETENTION AUCTION MECHANISM by Jason Blake Ellis March 2009

  4. A False-name-Proof Double Auction Protocol for Arbitrary Evaluation Values

    NASA Astrophysics Data System (ADS)

    Sakurai, Yuko; Yokoo, Makoto

    We develop a new false-name-proof double auction protocol called the Generalized Threshold Price Double auction (GTPD) protocol. False-name-proofness generalizes strategy-proofness by incorporating the possibility of false-name bids, e.g., bids submitted using multiple e-mail addresses. An existing protocol called TPD protocol is false-name-proof but can handle only the cases where marginal utilities of each agent always decrease, while our new GTPD protocol can handle arbitrary evaluation values. When marginal utilities can increase, some bids cannot be divided into a single unit (e.g., an all-or-nothing bid). Due to the existence of such indivisible bids, meeting supply/demand becomes difficult. Furthermore, a seller/buyer can submit a false-name-bid by pretending to be a potential buyer/seller to manipulate allocations and payments. In the GTPD protocol, the auctioneer is required to absorb the supply-demand imbalance up to a given upper-bound. Also, the GTPD incorporate a new false-name-proof one-sided auction protocol that is guaranteed to sell/buy a certain number of units. Simulation results show that when the threshold price is set appropriately, this protocol can obtain a good social surplus, and the number of absorbed units is much smaller than the given upper-bound.

  5. Design Implications of Real-Time Feedback in Continuous Combinatorial Auctions: An Experimental Investigation

    ERIC Educational Resources Information Center

    Sanyal, Pallab

    2009-01-01

    Information Technology (IT) has spawned the growth of novel and innovative market mechanisms (such as online auctions) and associated businesses (such as eBay and Priceline) that were not feasible without the capabilities and reach of these modern information technologies. Previous studies on designing trading mechanisms for online markets…

  6. 49 CFR 580.9 - Odometer record retention for auction companies.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... the buyer; (c) The vehicle identification number; and (d) The odometer reading on the date which the auction company took possession of the motor vehicle. ... permits systematic retrieval, for five years following the date of sale of each motor vehicle, the...

  7. 49 CFR 580.9 - Odometer record retention for auction companies.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the buyer; (c) The vehicle identification number; and (d) The odometer reading on the date which the auction company took possession of the motor vehicle. ... permits systematic retrieval, for five years following the date of sale of each motor vehicle, the...

  8. 49 CFR 580.9 - Odometer record retention for auction companies.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... the buyer; (c) The vehicle identification number; and (d) The odometer reading on the date which the auction company took possession of the motor vehicle. ... permits systematic retrieval, for five years following the date of sale of each motor vehicle, the...

  9. 49 CFR 580.9 - Odometer record retention for auction companies.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... the buyer; (c) The vehicle identification number; and (d) The odometer reading on the date which the auction company took possession of the motor vehicle. ... permits systematic retrieval, for five years following the date of sale of each motor vehicle, the...

  10. 49 CFR 580.9 - Odometer record retention for auction companies.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... the buyer; (c) The vehicle identification number; and (d) The odometer reading on the date which the auction company took possession of the motor vehicle. ... permits systematic retrieval, for five years following the date of sale of each motor vehicle, the...

  11. Teaching Undergraduate Money and Banking: T-Bill Auctions and Stock Market Models

    ERIC Educational Resources Information Center

    Saros, Daniel E.

    2009-01-01

    The author offers innovative approaches to 3 topics that are typically only briefly mentioned (if at all) in money and banking courses. The first topic is a Treasury bill auction experiment in which students have an opportunity to participate directly. The results from a class of 14 money and banking students are used to explain how an instructor…

  12. 25 CFR 215.4 - Leases to be sold at public auction.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Leases to be sold at public auction. 215.4 Section 215.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR ENERGY AND MINERALS LEAD AND ZINC MINING... provided in the regulations in this part, no lead and zinc mining lease under this part of restricted or...

  13. 25 CFR 215.4 - Leases to be sold at public auction.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false Leases to be sold at public auction. 215.4 Section 215.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR ENERGY AND MINERALS LEAD AND ZINC MINING... provided in the regulations in this part, no lead and zinc mining lease under this part of restricted or...

  14. 77 FR 15369 - Mobility Fund Phase I Auction GIS Data of Potentially Eligible Census Blocks

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ....fcc.gov/auctions/901/ , are the following: Downloadable shapefile Web mapping service MapBox map tiles... GIS software allows you to add this service as a layer to your session or project. 6. MapBox map tiles are cached map tiles of the data. With this open source software approach, these image tiles can be...

  15. 77 FR 38061 - Mobility Fund Phase I Auction Supplemental Short-Form Instructions and Other Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-26

    ... FEDERAL COMMUNICATIONS COMMISSION [AU Docket No. 12-25; DA 12-947] Mobility Fund Phase I Auction Supplemental Short-Form Instructions and Other Information AGENCY: Federal Communications Commission. ACTION... number, for example, DA 12-947. The Supplemental Filing Instructions Public Notice and related documents...

  16. Ordering competition: the interactional accomplishment of the sale of art and antiques at auction.

    PubMed

    Heath, Christian; Luff, Paul

    2007-03-01

    Auctions provide an institutional solution to a social problem; they enable the legitimate pricing and exchange of goods where those goods are of uncertain value. In turn, auctions raise a number of social and organizational issues that are resolved within the interaction that arise in sales by auction. In this paper, we examine sales of fine art, antiques and objets d'art and explore the ways in which auctioneers mediate competition between buyers and establish a value for goods. In particular, we explore how bids are elicited, co-ordinated and revealed so as to rapidly escalate the price of goods in a transparent manner that enables the legitimate valuation and exchange of goods. In directing attention towards the significance of the social interaction, including talk, visual and material conduct, the paper contributes to the growing corpus of ethnographic studies of markets. It suggests that to understand the operation of markets and their outcomes, and to unpack issues of agency, trust and practice, we need to place the 'interaction order' at the heart of analytic agenda.

  17. Comparisons of auction mechanisms in a multiple unit setting: A consideration for restructuring electric power markets

    NASA Astrophysics Data System (ADS)

    Bernard, John Charles

    The objective of this study was to compare the performance of five single sided auctions that could be used in restructured electric power markets across different market sizes in a multiple unit setting. Auction selection would profoundly influence an industry over $200 billion in size in the United States, and the consequences of implementing an inappropriate mechanism would be great. Experimental methods were selected to analyze the auctions. Two rounds of experiments were conducted, the first testing the sealed offer last accepted offer (LAO) and first rejected offer (FRO), and the clock English (ENG) and sealed offer English (SOE) in markets of sizes two and six. The FRO, SOE, and ENG used the same pricing rule. Second round testing was on the LAO, FRO, and the nonuniform price multiple unit Vickrey (MUV) in markets of sizes two, four, and six. Experiments lasted 23 and 75 periods for rounds 1 and 2 respectively. Analysis of variance and contrast analysis were used to examine the data. The four performance measures used were price, efficiency, profits per unit, and supply revelation. Five basic principles were also assessed: no sales at losses, all low cost capacity should be offered and sold, no high cost capacity should sell, and the market should clear. It was expected group size and auction type would affect performance. For all performance measures, group size was a significant variable, with smaller groups showing poorer performance. Auction type was significant only for the efficiency performance measure, where clock auctions outperformed the others. Clock auctions also proved superior for the first four principles. The FRO performed poorly in almost all situations, and should not be a preferred mechanism in any market. The ENG was highly efficient, but expensive for the buyer. The SOE appeared superior to the FRO and ENG. The clock improves efficiency over the FRO while less information kept prices under the ENG. The MUV was superior in revealing costs

  18. Efficient Nash Equilibrium Resource Allocation Based on Game Theory Mechanism in Cloud Computing by Using Auction.

    PubMed

    Nezarat, Amin; Dastghaibifard, G H

    2015-01-01

    One of the most complex issues in the cloud computing environment is the problem of resource allocation so that, on one hand, the cloud provider expects the most profitability and, on the other hand, users also expect to have the best resources at their disposal considering the budget constraints and time. In most previous work conducted, heuristic and evolutionary approaches have been used to solve this problem. Nevertheless, since the nature of this environment is based on economic methods, using such methods can decrease response time and reducing the complexity of the problem. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneer's utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.

  19. Using Priced Options to Solve the Exposure Problem in Sequential Auctions

    NASA Astrophysics Data System (ADS)

    Mous, Lonneke; Robu, Valentin; La Poutré, Han

    This paper studies the benefits of using priced options for solving the exposure problem that bidders with valuation synergies face when participating in multiple, sequential auctions. We consider a model in which complementary-valued items are auctioned sequentially by different sellers, who have the choice of either selling their good directly or through a priced option, after fixing its exercise price. We analyze this model from a decision-theoretic perspective and we show, for a setting where the competition is formed by local bidders, that using options can increase the expected profit for both buyers and sellers. Furthermore, we derive the equations that provide minimum and maximum bounds between which a synergy buyer's bids should fall in order for both sides to have an incentive to use the options mechanism. Next, we perform an experimental analysis of a market in which multiple synergy bidders are active simultaneously.

  20. Equilibrium Strategy and Population-Size Effects in Lowest Unique Bid Auctions

    NASA Astrophysics Data System (ADS)

    Pigolotti, Simone; Bernhardsson, Sebastian; Juul, Jeppe; Galster, Gorm; Vivo, Pierpaolo

    2012-02-01

    In lowest unique bid auctions, N players bid for an item. The winner is whoever places the lowest bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large data set of internet auctions. The theory agrees with the data with striking accuracy for small population-size N, while for larger N a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game.

  1. Encouraging information sharing to boost the name-your-own-price auction

    NASA Astrophysics Data System (ADS)

    Chen, Yahong; Li, Jinlin; Huang, He; Ran, Lun; Hu, Yusheng

    2017-08-01

    During a name-your-own-price (NYOP) auction, buyers can learn a lot of knowledge from their socially connected peers. Such social learning process makes them become more active to attend the auction and also helps them make decisions on what price to submit. Combining an information diffusion model and a belief decision model, we explore three effects of bidders' information sharing on the buyers' behaviors and the seller profit. The results indicate that information sharing significantly increases the NYOP popularity and the seller profit. When enlarging the quality or quantity of information sharing, or increasing the spreading efficiency of the network topology, the number of attenders and the seller profit are increased significantly. However, the spread of information may make bidders be more likely to bid higher and consequently lose surplus. In addition, the different but interdependent influence of the successful information and failure information are discussed in this work.

  2. Collective induction without cooperation? Learning and knowledge transfer in cooperative groups and competitive auctions.

    PubMed

    Maciejovsky, Boris; Budescu, David V

    2007-05-01

    There is strong evidence that groups perform better than individuals do on intellective tasks with demonstrably correct solutions. Typically, these studies assume that group members share common goals. The authors extend this line of research by replacing standard face-to-face group interactions with competitive auctions, allowing for conflicting individual incentives. In a series of studies involving the well-known Wason selection task, they demonstrate that competitive auctions induce learning effects equally impressive as those of standard group interactions, and they uncover specific and general knowledge transfers from these institutions to new reasoning problems. The authors identify payoff feedback and information pooling as the driving factors underlying these findings, and they explain these factors within the theoretical framework of collective induction. ((c) 2007 APA, all rights reserved).

  3. A Centralized Auction Mechanism for the Disability and Survivors Insurance in Chile

    NASA Astrophysics Data System (ADS)

    Reyes H., Gonzalo

    As part of the pension reform recently approved in Chile, the government introduced a centralized auction mechanism to provide the Disability and Survivors (D&S) Insurance that covers recent contributors among the more than 8 million participants in the mandatory private pension system. This paper is intended as a case study presenting the main distortions found in the decentralized operation of the system that led to this reform and the challenges faced when designing a competitive auction mechanism to be implemented jointly by the Pension Fund Managers (AFP). In a typical bilateral contract the AFP retained much of the risk and the Insurance Company acted in practice as a reinsurer. The process to hire this contract was not competitive and colligated companies ended up providing the service. Several distortions affected competition in the market through incentives to cream-skim members by AFPs (since they bear most of the risk) or efforts to block disability claims. Since the price of this insurance is hidden in the fees charged by AFPs for the administration of individual accounts and pension funds there was lack of price transparency. Since new AFPs have no history of members’ disability and mortality profile the insurance contract acted as a barrier to entry in the market of AFP services, especially when D&S insurance costs reached 50% of total costs. Cross-subsidies between members of the same AFP, inefficient risk pooling (due to pooling occurring at the AFP rather than at the system level) and regulatory arbitrage, since AFPs provided insurance not being regulated as an insurance company, were also present. A centralized auction mechanism solves these market failures, but also gives raise to new challenges, such as how to design a competitive auction that attracts participation and deters collusion. Design features that were incorporated in the regulation to tackle these issues, such as dividing coverage into predefined percentage blocks, are presented

  4. Efficient Nash Equilibrium Resource Allocation Based on Game Theory Mechanism in Cloud Computing by Using Auction

    PubMed Central

    Nezarat, Amin; Dastghaibifard, GH

    2015-01-01

    One of the most complex issues in the cloud computing environment is the problem of resource allocation so that, on one hand, the cloud provider expects the most profitability and, on the other hand, users also expect to have the best resources at their disposal considering the budget constraints and time. In most previous work conducted, heuristic and evolutionary approaches have been used to solve this problem. Nevertheless, since the nature of this environment is based on economic methods, using such methods can decrease response time and reducing the complexity of the problem. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneer’s utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider. PMID:26431035

  5. A Hierarchical Auction-Based Mechanism for Real-Time Resource Allocation in Cloud Robotic Systems.

    PubMed

    Wang, Lujia; Liu, Ming; Meng, Max Q-H

    2017-02-01

    Cloud computing enables users to share computing resources on-demand. The cloud computing framework cannot be directly mapped to cloud robotic systems with ad hoc networks since cloud robotic systems have additional constraints such as limited bandwidth and dynamic structure. However, most multirobotic applications with cooperative control adopt this decentralized approach to avoid a single point of failure. Robots need to continuously update intensive data to execute tasks in a coordinated manner, which implies real-time requirements. Thus, a resource allocation strategy is required, especially in such resource-constrained environments. This paper proposes a hierarchical auction-based mechanism, namely link quality matrix (LQM) auction, which is suitable for ad hoc networks by introducing a link quality indicator. The proposed algorithm produces a fast and robust method that is accurate and scalable. It reduces both global communication and unnecessary repeated computation. The proposed method is designed for firm real-time resource retrieval for physical multirobot systems. A joint surveillance scenario empirically validates the proposed mechanism by assessing several practical metrics. The results show that the proposed LQM auction outperforms state-of-the-art algorithms for resource allocation.

  6. Clean air, clear market. Making emissions trading work: The role of a computer-assisted auction

    SciTech Connect

    Bartels, C.W.; Marron, D.B.; Lipsky, M.I.

    1993-06-15

    Creating a new commodity presents the chance to develop new markets in which to trade it. In many cases, existing markets can be adapted easily; in other cases it proves worthwhile to develop new forms that reflect special characteristics of the commodity and those who trade it. In the case of the sulfur dioxide (SO[sub 2]) emission allowances created by the Clean Air Act Amendments of 1990, a number of standard market forms already have been adopted. While these will prove useful for handling some transactions, a new Market Clearing Auction (MCA) offers buyers and sellers a centralized marketplace formore » trading SO[sub 2] emission allowances. The MCA, which was developed by the brokerage firm Cantor Fitzgerald, is a computer-assisted [open quotes]smart[close quotes] auction designed to replicate the outcome of an efficient market in emission allowances, and accepts bids and offers for any possible combination of allowances. Orders can be submitted for streams of allowances. Orders can be submitted for streams of allowances covering more than one year. The auction then determines the combination of bids and offers that maximizes the gains from trades in the market, and establishes uniform market clearing prices for each allowance issue (1995, 1996, and so on). Once executed, trades are settled on a cash-forward basis; that is, allowances are delivered and payments are made at future dates.« less

  7. Alternative security

    SciTech Connect

    Weston, B.H.

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.

  8. Homeland Security

    EPA Pesticide Factsheets

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  9. Comparing the performance of the public, social security and private health subsystems in Argentina by core dimensions of primary health care

    PubMed Central

    Yavich, Natalia; Báscolo, Ernesto Pablo; Haggerty, Jeannie

    2016-01-01

    Abstract Background Most Latin American health systems are comprised of public (PubS), social security (SSS) and private (PrS) subsystems. These subsystems coexist, causing health care fragmentation and population segmentation. Objective To estimate the extent of subsystem cross-coverage in a geographically bounded population (Rosario city) and to compare the subsystems’ performance on primary health care (PHC) dimensions. Methods Through a cross-sectional, interviewer-administered survey to a representative sample (n = 822) of the Rosario population, we measured the percentage of cross-coverage (people with usual source of care in one subsystem but also covered by another subsystem) and the health services’ performance by core PHC dimensions, as reported by each subsystem’s usual users. We compared the subsystems’ performance using chi-square analysis and one-way analysis of variance testing. We analyzed whether the observed differences were coherent with the predominant institutional and organizational features of each subsystem. Results Overall, 39.3% of the population was affiliated with the PubS, 44.8% with the SSS and 15.9% with the PrS. Cross-coverage was reported by 40.6% of respondents. The performance of the PubS was weak on accessibility but strong on person-and-community-oriented care, the opposite of the PrS. The SSS combined the strengths of the other two subsystems. Conclusion Rosario’s health system has a high percentage of cross-coverage, contributing to issues of fragmentation, segmentation, financial inequity and inefficiency. The overall performance of the SSS was better than that of the PrS and PubS, though each subsystem had a particular performance pattern with areas of strength and weakness that were consistent with their institutional and organizational profiles. PMID:27377651

  10. Comparing the performance of the public, social security and private health subsystems in Argentina by core dimensions of primary health care.

    PubMed

    Yavich, Natalia; Báscolo, Ernesto Pablo; Haggerty, Jeannie

    2016-06-01

    Most Latin American health systems are comprised of public (PubS), social security (SSS) and private (PrS) subsystems. These subsystems coexist, causing health care fragmentation and population segmentation. To estimate the extent of subsystem cross-coverage in a geographically bounded population (Rosario city) and to compare the subsystems' performance on primary health care (PHC) dimensions. Through a cross-sectional, interviewer-administered survey to a representative sample (n = 822) of the Rosario population, we measured the percentage of cross-coverage (people with usual source of care in one subsystem but also covered by another subsystem) and the health services' performance by core PHC dimensions, as reported by each subsystem's usual users. We compared the subsystems' performance using chi-square analysis and one-way analysis of variance testing. We analyzed whether the observed differences were coherent with the predominant institutional and organizational features of each subsystem. Overall, 39.3% of the population was affiliated with the PubS, 44.8% with the SSS and 15.9% with the PrS. Cross-coverage was reported by 40.6% of respondents. The performance of the PubS was weak on accessibility but strong on person-and-community-oriented care, the opposite of the PrS. The SSS combined the strengths of the other two subsystems. Rosario's health system has a high percentage of cross-coverage, contributing to issues of fragmentation, segmentation, financial inequity and inefficiency. The overall performance of the SSS was better than that of the PrS and PubS, though each subsystem had a particular performance pattern with areas of strength and weakness that were consistent with their institutional and organizational profiles. © The Author 2016. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  11. The impact of product information and trials on demand for smokeless tobacco and cigarettes: Evidence from experimental auctions

    PubMed Central

    Rousu, Matthew C.; O'Connor, Richard; Thrasher, James F; June, Kristie; Bansal-Travers, Maansi; Pitcavage, James

    2014-01-01

    Introduction Epidemiological and toxicological evidence suggests lower risk of smokeless tobacco (ST) products compared to cigarettes. Less is known, however, about consumer perceptions and use of novel forms of ST, including snus and dissolvable tobacco. Methods In this study, we conducted in-person experimental auctions in Buffalo, NY, Columbia, SC, and Selinsgrove, PA with 571 smokers to test the impact of information and product trials on smokers’ preferences. Auctions were conducted between November 2010-November 2011. Results We found no evidence of an impact of product trials on demand in our auctions. Anti-ST information increased demand for cigarettes when presented alone, but when presented with Pro-ST information it decreased demand for cigarettes. It did not decrease demand for ST products. Anti-smoking information increased demand for ST products, but did not affect cigarette demand. Conclusions These findings suggest that credible and effective communications about tobacco harm reduction should reinforce the negative effects of smoking. PMID:24321456

  12. A Winner Determination Algorithm for Combinatorial Auctions Based on Hybrid Artificial Fish Swarm Algorithm

    NASA Astrophysics Data System (ADS)

    Zheng, Genrang; Lin, ZhengChun

    The problem of winner determination in combinatorial auctions is a hotspot electronic business, and a NP hard problem. A Hybrid Artificial Fish Swarm Algorithm(HAFSA), which is combined with First Suite Heuristic Algorithm (FSHA) and Artificial Fish Swarm Algorithm (AFSA), is proposed to solve the problem after probing it base on the theories of AFSA. Experiment results show that the HAFSA is a rapidly and efficient algorithm for The problem of winner determining. Compared with Ant colony Optimization Algorithm, it has a good performance with broad and prosperous application.

  13. A Robust Open Ascending-price Multi-unit Auction Protocol against False-name Bids

    NASA Astrophysics Data System (ADS)

    Iwasaki, Atsushi; Yokoo, Makoto; Terada, Kenji

    This paper develops a new ascending-price multi-unit auction protocol that has following characteristics: (i) it has an open format, (ii) sincere bidding is an equilibrium strategy even if the marginal utilities of each agent can increase and agents can submit false-name bids. False-name bids are bids submitted under fictitious names such as multiple e-mail addresses, which can be done easily in the Internet. This is the first protocol that has these two characteristics. We show that our new protocol outperforms an existing protocol, which satisfies (ii), with respect to the social surplus and the seller's revenue.

  14. Food security is related to adult type 2 diabetes control over time in a United States safety net primary care clinic population.

    PubMed

    Shalowitz, M U; Eng, J S; McKinney, C O; Krohn, J; Lapin, B; Wang, C-H; Nodine, E

    2017-05-15

    Successful Type 2 diabetes management requires adopting a high nutrient-density diet made up of food items that both meet dietary needs and preferences and can be feasibly obtained on a regular basis. However, access to affordable, nutrient-dense foods often is lacking in poorer neighbourhoods. Therefore, low food security should directly impair glucose control, even when patients have full access to and utilize comprehensive medical management. The present study sought to determine whether food security is related longitudinally to glucose control, over-and-above ongoing medication management, among Type 2 diabetes patients receiving comprehensive care at a Midwestern multi-site federally qualified health centre (FQHC). In this longitudinal observational study, we completed a baseline assessment of patients' food security (using the US Household Food Security Module), demographics (via Census items), and diabetes history/management (using a structured clinical encounter form) when patients began receiving diabetes care at the health centre. We then recorded those patients' A1C levels several times during a 24-month follow-up period. Three hundred and ninety-nine patients (56% with low food security) had a baseline A1c measurement; a subsample of 336 (median age=52 years; 56% female; 60% Hispanic, 27% African American, and 9% White) also had at least one follow-up A1c measurement. Patients with lower (vs higher) food security were more likely to be on insulin and have higher A1c levels at baseline. Moreover, the disparity in glucose control by food security status persisted throughout the next 2 years. Although results were based on one multi-site FQHC, potentially limiting their generalizability, they seem to suggest that among Type 2 diabetes patients, low food security directly impairs glucose control-even when patients receive full access to comprehensive medical management-thereby increasing their long-term risks of high morbidity, early mortality, and high

  15. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  16. The impact of free trial acceptance on demand for alternative nicotine products: evidence from experimental auctions.

    PubMed

    Rousu, Matthew C; O'Connor, Richard J; Bansal-Travers, Maansi; Pitcavage, James M; Thrasher, James F

    2015-06-11

    This study explored the relationship between product trials and consumer demand for alternative nicotine products (ANP). An experimental auction was conducted with 258 adult smokers, wherein participants were randomly assigned to one of four experimental conditions. The participants received the opportunity to try, but did not have to accept, one of three relatively novel ST products (i.e., snus, dissolvable tobacco, or medicinal nicotine), or they were placed into a control group (i.e., no trial). All the participants then bid on all three of these products, as well as on cigarettes. We assessed interest in using ANP based on both trial of the product and bids placed for the products in the experimental auction. Fewer smokers were willing to try snus (44%) than dissolvable tobacco (64%) or medicine nicotine (68%). For snus, we find modest evidence suggesting that willingness to try is associated with greater demand for the product. For dissolvable tobacco or medicinal nicotine, we find no evidence that those who accept the product trial have higher demand for the product. Free trials of a novel ANP were not strongly associated with product demand, as assessed by willingness to pay. Given the debate over the potential for ANP to reduce the harm from smoking, these results are important in understanding the impact of free trial offers on adoption of ST product as a strategy to reduce harm from tobacco use.

  17. 30 CFR 285.308 - How will MMS conduct an auction for ROW grants and RUE grants?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... and RUE grants? 285.308 Section 285.308 Mineral Resources BUREAU OF OCEAN ENERGY MANAGEMENT, REGULATION, AND ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE RENEWABLE ENERGY ALTERNATE USES OF EXISTING... Renewable Energy Activities Obtaining Row Grants and Rue Grants § 285.308 How will MMS conduct an auction...

  18. The influence of an online auction's product price and e-retailer reputation on consumers' perception, attitude, and behavioral intention.

    PubMed

    Wu, Wann-Yih; Huang, Po-Ching; Fu, Chen-Su

    2011-06-01

    Online auctions combine the conventional auction model with information technology. However, information asymmetry within such auctions causes risks and uncertainties that influence consumer purchase intentions. In this study, a 2 (product price: high vs. low) × 2 (e-retailer reputation: high vs. low) experimental design was used to understand whether the product price and e-retailer reputation will influence consumers' perceived risk, attitude toward the website and purchase intention. The results of this study indicate that perceived risk negatively influences consumer attitude toward the website and online purchase intention, while consumer attitude toward the website positively influences purchase intention. Moreover, involvement moderates the influence of product price and e-retailer reputation only on social risk but does not have a significant effect on consumer attitude toward the website. This study contributes to a more comprehensive understanding of online auction users' behavior. Finally, the managerial implications, limitations and future research directions are also provided. © 2011 The Authors. Scandinavian Journal of Psychology © 2011 The Scandinavian Psychological Associations.

  19. 49 CFR 599.402 - Requirements and limitations for salvage auctions that are consigned trade-in vehicles under the...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 7 2014-10-01 2014-10-01 false Requirements and limitations for salvage auctions that are consigned trade-in vehicles under the CARS program. 599.402 Section 599.402 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED)...

  20. 49 CFR 599.402 - Requirements and limitations for salvage auctions that are consigned trade-in vehicles under the...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 7 2011-10-01 2011-10-01 false Requirements and limitations for salvage auctions that are consigned trade-in vehicles under the CARS program. 599.402 Section 599.402 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED)...

  1. 49 CFR 599.402 - Requirements and limitations for salvage auctions that are consigned trade-in vehicles under the...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 7 2012-10-01 2012-10-01 false Requirements and limitations for salvage auctions that are consigned trade-in vehicles under the CARS program. 599.402 Section 599.402 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED)...

  2. 49 CFR 599.402 - Requirements and limitations for salvage auctions that are consigned trade-in vehicles under the...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 7 2013-10-01 2013-10-01 false Requirements and limitations for salvage auctions that are consigned trade-in vehicles under the CARS program. 599.402 Section 599.402 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED)...

  3. 78 FR 50086 - Notice of Competitive Auction for Solar Energy Development on Public Lands in the State of Colorado

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-16

    ... Competitive Auction for Solar Energy Development on Public Lands in the State of Colorado AGENCY: Bureau of...) application and a plan of development for solar energy projects on approximately 3,705 acres of public land in... designated Solar Energy Zones (SEZ): Los Mogotes East SEZ and De Tilla Gulch SEZ. Applications for solar...

  4. 76 FR 3892 - Auction of FM Broadcast Construction Permits Rescheduled for April 27, 2011; Notice and Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    .... The commenter also argues that, in the event that only one applicant places a bid on a permit, that...). The Commission makes no warranty whatsoever with respect to the FCC Auction System. In no event shall..., 2011 Short-Form Application (FCC Form 175) Filing Window Opens--January 31, 2011; 12 noon ET Short-Form...

  5. 77 FR 32092 - Mobility Fund Phase I Auction Scheduled for September 27, 2012; Notice and Filing Requirements...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-31

    ... Mobility Fund Phase I support they seek, including any agreements relating to post-auction market structure... FEDERAL COMMUNICATIONS COMMISSION [AU Docket No. 12-25; DA 12-641 and DA 12-721] Mobility Fund... million in one-time Mobility Fund Phase I support scheduled to commence on September 27, 2012. The Bureaus...

  6. 77 FR 7152 - Mobility Fund Phase I Auction Scheduled for September 27, 2012; Comment Sought on Competitive...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-10

    ... application deadlines and other dates related to Auction 901 after considering comments provided in response... must file an application for support. Only after review of the application to confirm compliance with... for support to Tribal lands. 7. The USF/ICC Transformation Order established application, performance...

  7. 76 FR 2920 - Notice of Correction to Notice of Realty Action: Competitive Online Auction of Public Lands in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-18

    ... DEPARTMENT OF THE INTERIOR Bureau of Land Management [LLNVS00560 L58530000.EU0000 241A; N-81926 et al.; 11-08807; TAS: 14X5232] Notice of Correction to Notice of Realty Action: Competitive Online Auction of Public Lands in Clark County, NV AGENCY: Bureau of Land Management, Interior. ACTION: Notice of...

  8. 75 FR 38545 - Notice of Realty Action: Competitive Auction of Public Lands in White Pine County, NV

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-02

    ... DEPARTMENT OF THE INTERIOR Bureau of Land Management [LLNVL01000 L14300000.EU0000 241A; N-86667; 10-08807; MO 4500012445; TAS: 14X5232] Notice of Realty Action: Competitive Auction of Public Lands..., cashier's check, certified check or U.S. postal money order, or any combination thereof, and made payable...

  9. 76 FR 78645 - Auction of FM Broadcast Construction Permits Scheduled for March 27, 2012; Notice and Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-19

    ... touch upon impermissible subject matters because they may convey pricing information and bidding... FCC auction does not constitute an endorsement by the FCC of any particular service, technology, or... habitats, historical or archaeological sites, Indian religious sites, floodplains, and surface features. In...

  10. 7 CFR 29.75a - Display of burley tobacco on auction warehouse floors in designated markets.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... in designated markets. 29.75a Section 29.75a Agriculture Regulations of the Department of Agriculture... § 29.75a Display of burley tobacco on auction warehouse floors in designated markets. (a)(1) Each lot... arrayed sequence of lots and rows of tobacco, shall have prior approval of the Set Work Leader or Circuit...

  11. Human remains sold to the highest bidder! A snapshot of the buying and selling of human skeletal remains on eBay, an Internet auction site.

    PubMed

    Huxley, Angie K; Finnegan, Michael

    2004-01-01

    Internet auction sites have become increasingly popular, with diverse items up for sale to the public worldwide. The purposes of this paper are to inform the forensic community that human skeletal remains, old and new, are for sale on the eBay internet auction site, and to advise forensic scientists that eBay does not use a forensic anthropologist to assess photographs of these materials. Over the last few years, this website was "surfed," with numerous auctions during this period. After contacting eBay by email, representatives responded that they adhere to Native American Grave Protection and Repatriation Act (NAGPRA) and that their website indicates that auctions must state that sale of human remains is for instructional purposes only. Based on the photographs, the remains appear to be of prehistoric and modern origin. An unfortunate consequence of such sale may generate interest in stealing remains from graves, mortuaries, hospitals, or county morgues worldwide.

  12. Effects of scarcity, aesthetics and ecology on wildlife auction prices of large African mammals.

    PubMed

    Dalerum, Fredrik; Miranda, María; Muñiz, Cristina; Rodríguez, Plácido

    2018-02-01

    For successful integration of biological conservation into economic markets, economic processes need to capture ecological values. South African wildlife ranching is a tourist-based activity that generates unique information on the economic value of wildlife species. We used public data from South African wildlife auctions to evaluate if annual prices 1991-2012 related to species characteristics associated with scarcity, aesthetics and ecology of South African carnivores and ungulates. While none of the species characteristics influenced carnivore prices, ungulate prices were related to characteristics associated with novelty and aesthetics, which relative importance had increased over time. We raise both ecological and economic concerns for this apparent focus. Our results also suggest a potential importance of non-species-related factors, such as market and buyer characteristics. We encourage further evaluation of the relative influences of species characteristics versus factors that are intrinsically linked to economic processes on price variations in South African wildlife.

  13. Designing PURPA (Public Utilities Regulatory Act) power purchase auctions: Theory and practice. [Cogenerated electricity purchasing model

    SciTech Connect

    Rothkopf, M.H.; Kahn, E.P.; Teisberg, T.J.

    The Public Utilities Regulatory Act (PURPA) requires there to be procedures for electric utilities to buy electric power from qualifying cogenerators and small power producers (QFs) at rates up to ''avoided cost.'' This has led to price-posting procedures at prices calculated as the utility's marginal cost. Unexpectedly large sales at these prices and slow adjustment to falling energy cost are partially responsible for payments to QFs in excess of the utility's true avoided cost. Using competitive bidding instead of posted prices has been proposed as a way to avoid this outcome. This report reviews bidding theory and explores four issuesmore » that arise in deisigning auction systems for the purchase of power from QFs under PURPA. 77 refs., 6 figs., 15 tabs.« less

  14. Effects of information on young consumers' willingness to pay for genetically modified food: experimental auction analysis.

    PubMed

    Kajale, Dilip B; Becker, T C

    2014-01-01

    This study examines the effects of information on consumers' willingness to pay (WTP) for genetically modified food (GMF). We used Vickrey second price experimental auction method for elicitation of consumer WTP for GM potato chips and GM soya-chocolate bar. The sample used in this study was university students from Delhi, India. Four information formats (positive, negative, no information, and combined information about GM technology) were used for the examination. The results show that, when students received the combine information they were willing to pay around 17%-20% premium for GMF and when received the negative information they demanded around 22% discount for GMF. While the positive- and the no-information formats alone have no considerable effect on consumers' WTP for GMF. Overall, our findings suggest that while doing marketing of GMF in India, the best strategy is to provide combined information about GM technology.

  15. Security Deposits

    DTIC Science & Technology

    1987-04-01

    security deposit action is described in the regulation as follows: h. Security Deposits (DACF and DACA ). (1) Issue. PCS moves create financial hardships...General Wickham, The Army Chief of Staff, specified a philosophy toward the family in the Army Family White Paper. General Wickham’s action was in...security deposits arose. 1 The Army’s action to the issue of security deposits will be thoroughly discussed in this paper. The Army’s action comes now

  16. Security Locks

    ERIC Educational Resources Information Center

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  17. Low-traffic limit and first-passage times for a simple model of the continuous double auction

    NASA Astrophysics Data System (ADS)

    Scalas, Enrico; Rapallo, Fabio; Radivojević, Tijana

    2017-11-01

    We consider a simplified model of the continuous double auction where prices are integers varying from 1 to N with limit orders and market orders, but quantity per order limited to a single share. For this model, the order process is equivalent to two M / M / 1 queues. We study the behavior of the auction in the low-traffic limit where limit orders are immediately matched by market orders. In this limit, the distribution of prices can be computed exactly and gives a reasonable approximation of the price distribution when the ratio between the rate of order arrivals and the rate of order executions is below 1 / 2. This is further confirmed by the analysis of the first-passage time in 1 or N.

  18. Optimal Price Decision Problem for Simultaneous Multi-article Auction and Its Optimal Price Searching Method by Particle Swarm Optimization

    NASA Astrophysics Data System (ADS)

    Masuda, Kazuaki; Aiyoshi, Eitaro

    We propose a method for solving optimal price decision problems for simultaneous multi-article auctions. An auction problem, originally formulated as a combinatorial problem, determines both every seller's whether or not to sell his/her article and every buyer's which article(s) to buy, so that the total utility of buyers and sellers will be maximized. Due to the duality theory, we transform it equivalently into a dual problem in which Lagrange multipliers are interpreted as articles' transaction price. As the dual problem is a continuous optimization problem with respect to the multipliers (i.e., the transaction prices), we propose a numerical method to solve it by applying heuristic global search methods. In this paper, Particle Swarm Optimization (PSO) is used to solve the dual problem, and experimental results are presented to show the validity of the proposed method.

  19. 31 CFR 356.17 - How and when do I pay for securities awarded in an auction?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... other provisions, payment of the settlement amount must be by charge to the funds account of a... Federal Reserve Bank or that chooses not to pay by charge to its own funds account must have an approved... account will be charged under an autocharge agreement will receive advance notice from us of the total par...

  20. An Auction-Based Spectrum Leasing Mechanism for Mobile Macro-Femtocell Networks of IoT.

    PubMed

    Chen, Xin; Xing, Lei; Qiu, Tie; Li, Zhuo

    2017-02-16

    The Internet of Things (IoT) is a vision of the upcoming society. It can provide pervasive communication between two or more entities using 4G-LTE (Long Term Evolution) communication technology. In 4G-LTE networks, there are two important problems: helping manage the spectrum demands of IoT devices and achieving much more revenue with the limited resource. This paper proposes a pricing framework to investigate the spectrum leasing in mobile heterogeneous networks with single macrocell and multiple femtocells. We modeled the leasing procedure between the macrocell service provider (MSP) and femtocell holders (FHs) as an auction to motivate the MSP to lease its spectrum resource. All FHs act as the bidders, and the monopolist MSP acts as the auctioneer. In the auction, FHs submit their bids to rent the spectrum resource so that they can make a profit by selling it to their subscribers. The MSP determines the spectrum leasing amount and chooses the winning FHs by solving the dynamic programming-based 0-1 knapsack problem. In our proposed framework, we focus on the spectrum pricing strategy and revenue maximization of the MSP. The simulation results show that the proposed scheme provides effective motivation for the MSP to lease the spectrum to FHs, and both the MSP and FHs can benefit from spectrum leasing.

  1. The impact of product information and trials on demand for smokeless tobacco and cigarettes: evidence from experimental auctions.

    PubMed

    Rousu, Matthew C; O'Connor, Richard J; Thrasher, James F; June, Kristie M; Bansal-Travers, Maansi; Pitcavage, James

    2014-03-01

    Epidemiological and toxicological evidence suggests lower risk of smokeless tobacco (ST) products compared to cigarettes. Less is known, however, about consumer perceptions and use of novel forms of ST, including snus and dissolvable tobacco. In this study, we conducted in-person experimental auctions in Buffalo, NY, Columbia, SC, and Selinsgrove, PA with 571 smokers to test the impact of information and product trials on smokers' preferences. Auctions were conducted between November 2010-November 2011. We found no evidence of an impact of product trials on demand in our auctions. Anti-ST information increased demand for cigarettes when presented alone, but when presented with pro-ST information it decreased demand for cigarettes. It did not decrease demand for ST products. Anti-smoking information increased demand for ST products, but did not affect cigarette demand. These findings suggest that credible and effective communications about tobacco harm reduction should reinforce the negative effects of smoking. Copyright © 2013 Elsevier Inc. All rights reserved.

  2. An Auction-Based Spectrum Leasing Mechanism for Mobile Macro-Femtocell Networks of IoT

    PubMed Central

    Chen, Xin; Xing, Lei; Qiu, Tie; Li, Zhuo

    2017-01-01

    The Internet of Things (IoT) is a vision of the upcoming society. It can provide pervasive communication between two or more entities using 4G-LTE (Long Term Evolution) communication technology. In 4G-LTE networks, there are two important problems: helping manage the spectrum demands of IoT devices and achieving much more revenue with the limited resource. This paper proposes a pricing framework to investigate the spectrum leasing in mobile heterogeneous networks with single macrocell and multiple femtocells. We modeled the leasing procedure between the macrocell service provider (MSP) and femtocell holders (FHs) as an auction to motivate the MSP to lease its spectrum resource. All FHs act as the bidders, and the monopolist MSP acts as the auctioneer. In the auction, FHs submit their bids to rent the spectrum resource so that they can make a profit by selling it to their subscribers. The MSP determines the spectrum leasing amount and chooses the winning FHs by solving the dynamic programming-based 0–1 knapsack problem. In our proposed framework, we focus on the spectrum pricing strategy and revenue maximization of the MSP. The simulation results show that the proposed scheme provides effective motivation for the MSP to lease the spectrum to FHs, and both the MSP and FHs can benefit from spectrum leasing. PMID:28212317

  3. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    ERIC Educational Resources Information Center

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  4. Game auction prices are not related to biodiversity contributions of southern African ungulates and large carnivores.

    PubMed

    Dalerum, Fredrik; Miranda, Maria

    2016-02-25

    There is an urgent need for human societies to become environmentally sustainable. Because public policy is largely driven by economic processes, quantifications of the relationship between market prices and environmental values can provide important information for developing strategies towards sustainability. Wildlife in southern Africa is often privately owned and traded at game auctions to be utilized for commercial purposes mostly related to tourism. This market offers an interesting opportunity to evaluate how market prices relate to biologically meaningful species characteristics. In this market, prices were not correlated with species contributions to either phylogenetic or functional diversity, and species contributions to phylogenetic or functional diversity did not influence the trends in prices over time for the past 20 years. Since this economic market did not seem to appreciate evolutionary or ecologically relevant characteristics, we question if the game tourism market may contribute towards biodiversity conservation in southern Africa. We suggest that market prices in general may have limited values as guides for directing conservation and environmental management. We further suggest that there is a need to evaluate what humans value in biological organisms, and how potentially necessary shifts in such values can be instigated.

  5. Game auction prices are not related to biodiversity contributions of southern African ungulates and large carnivores

    PubMed Central

    Dalerum, Fredrik; Miranda, Maria

    2016-01-01

    There is an urgent need for human societies to become environmentally sustainable. Because public policy is largely driven by economic processes, quantifications of the relationship between market prices and environmental values can provide important information for developing strategies towards sustainability. Wildlife in southern Africa is often privately owned and traded at game auctions to be utilized for commercial purposes mostly related to tourism. This market offers an interesting opportunity to evaluate how market prices relate to biologically meaningful species characteristics. In this market, prices were not correlated with species contributions to either phylogenetic or functional diversity, and species contributions to phylogenetic or functional diversity did not influence the trends in prices over time for the past 20 years. Since this economic market did not seem to appreciate evolutionary or ecologically relevant characteristics, we question if the game tourism market may contribute towards biodiversity conservation in southern Africa. We suggest that market prices in general may have limited values as guides for directing conservation and environmental management. We further suggest that there is a need to evaluate what humans value in biological organisms, and how potentially necessary shifts in such values can be instigated. PMID:26911226

  6. Emergence of Cooperative Long-Term Market Loyalty in Double Auction Markets

    PubMed Central

    Alorić, Aleksandra; Sollich, Peter; McBurney, Peter; Galla, Tobias

    2016-01-01

    Loyal buyer-seller relationships can arise by design, e.g. when a seller tailors a product to a specific market niche to accomplish the best possible returns, and buyers respond to the dedicated efforts the seller makes to meet their needs. We ask whether it is possible, instead, for loyalty to arise spontaneously, and in particular as a consequence of repeated interaction and co-adaptation among the agents in a market. We devise a stylized model of double auction markets and adaptive traders that incorporates these features. Traders choose where to trade (which market) and how to trade (to buy or to sell) based on their previous experience. We find that when the typical scale of market returns (or, at fixed scale of returns, the intensity of choice) become higher than some threshold, the preferred state of the system is segregated: both buyers and sellers are segmented into subgroups that are persistently loyal to one market over another. We characterize the segregated state analytically in the limit of large markets: it is stabilized by some agents acting cooperatively to enable trade, and provides higher rewards than its unsegregated counterpart both for individual traders and the population as a whole. PMID:27120473

  7. Learning Based Bidding Strategy for HVAC Systems in Double Auction Retail Energy Markets

    SciTech Connect

    Sun, Yannan; Somani, Abhishek; Carroll, Thomas E.

    In this paper, a bidding strategy is proposed using reinforcement learning for HVAC systems in a double auction market. The bidding strategy does not require a specific model-based representation of behavior, i.e., a functional form to translate indoor house temperatures into bid prices. The results from reinforcement learning based approach are compared with the HVAC bidding approach used in the AEP gridSMART® smart grid demonstration project and it is shown that the model-free (learning based) approach tracks well the results from the model-based behavior. Successful use of model-free approaches to represent device-level economic behavior may help develop similar approaches tomore » represent behavior of more complex devices or groups of diverse devices, such as in a building. Distributed control requires an understanding of decision making processes of intelligent agents so that appropriate mechanisms may be developed to control and coordinate their responses, and model-free approaches to represent behavior will be extremely useful in that quest.« less

  8. Reverse Auction: A Potential Strategy for Reduction of Pharmacological Therapy Cost

    PubMed Central

    Brandão, Sara Michelly Gonçalves; Issa, Victor Sarli; Ayub-Ferreira, Silvia Moreira; Storer, Samantha; Gonçalves, Bianca Gigliotti; Santos, Valter Garcia; Carvas Junior, Nelson; Guimarães, Guilherme Veiga; Bocchi, Edimar Alcides

    2015-01-01

    Background Polypharmacy is a significant economic burden. Objective We tested whether using reverse auction (RA) as compared with commercial pharmacy (CP) to purchase medicine results in lower pharmaceutical costs for heart failure (HF) and heart transplantation (HT) outpatients. Methods We compared the costs via RA versus CP in 808 HF and 147 HT patients followed from 2009 through 2011, and evaluated the influence of clinical and demographic variables on cost. Results The monthly cost per patient for HF drugs acquired via RA was $10.15 (IQ 3.51-40.22) versus $161.76 (IQ 86.05‑340.15) via CP; for HT, those costs were $393.08 (IQ 124.74-774.76) and $1,207.70 (IQ 604.48-2,499.97), respectively. Conclusion RA may reduce the cost of prescription drugs for HF and HT, potentially making HF treatment more accessible. Clinical characteristics can influence the cost and benefits of RA. RA may be a new health policy strategy to reduce costs of prescribed medications for HF and HT patients, reducing the economic burden of treatment. PMID:26200898

  9. Influence of individual rationality on continuous double auction markets with networked traders

    NASA Astrophysics Data System (ADS)

    Zhang, Junhuan

    2018-04-01

    This paper investigates the influence of individual rationality of buyers and sellers on continuous double auction market outcomes in terms of the proportion of boundedly-rational buyers and sellers. The individual rationality is discussed in a social network artificial stock market model by embedding network formation and information set. Traders automatically select the most profitable trading strategy based on individual and social learning of the profits and trading strategies of themselves and their neighbors, and submit orders to markets. The results show that (i) a higher proportion of boundedly-rational sellers induces a higher market price, higher sellers' profits and a higher market efficiency; (ii) a higher proportion of boundedly-rational sellers induces a lower number of trades and lower buyers' profits; (iii) a higher proportion of boundedly-rational buyers induces a lower market price, a lower number of trades, and lower sellers' profits; (iv) a higher proportion of boundedly-rational buyers induces higher buyers' profits and a higher market efficiency.

  10. Genetic relationships between temperament of calves at auction and carcass traits in Japanese Black cattle.

    PubMed

    Takeda, Kazuya; Uchida, Hiroshi; Inoue, Keiichi

    2017-10-01

    Correlations of calves' temperament with carcass traits were estimated to clarify the genetic relationships between them in Japanese Black cattle. The temperament records for 3128 calves during auction at a calf market were scored on a scale of 1 (calm) to 5 (nervous) as temperament score (TS), and the TS were divided into two groups (TSG): TS 1 and 2 comprised TSG 1, and 3 to 5 constituted TSG 2. Carcass data were obtained from 33 552 fattened cattle. A threshold animal model was used for analyzing the underlying liability for TSG, whereas a linear one was used for TS and carcass traits. The heritability estimates for TS and TSG were 0.12 and 0.11, respectively. On the other hand, moderate to high heritability estimates were obtained for carcass traits (0.40 to 0.68). The temperament scores were negatively correlated with carcass weight, rib thickness and subcutaneous fat thickness (-0.13 to -0.59). In contrast, weak to moderate positive correlations were found between the temperament scores and rib eye area or yield estimate (0.16 to 0.45). The temperament scores and beef marbling score had no correlation. These results showed that it is possible to improve temperament and carcass traits simultaneously. © 2017 Japanese Society of Animal Science.

  11. Emergence of Cooperative Long-Term Market Loyalty in Double Auction Markets.

    PubMed

    Alorić, Aleksandra; Sollich, Peter; McBurney, Peter; Galla, Tobias

    2016-01-01

    Loyal buyer-seller relationships can arise by design, e.g. when a seller tailors a product to a specific market niche to accomplish the best possible returns, and buyers respond to the dedicated efforts the seller makes to meet their needs. We ask whether it is possible, instead, for loyalty to arise spontaneously, and in particular as a consequence of repeated interaction and co-adaptation among the agents in a market. We devise a stylized model of double auction markets and adaptive traders that incorporates these features. Traders choose where to trade (which market) and how to trade (to buy or to sell) based on their previous experience. We find that when the typical scale of market returns (or, at fixed scale of returns, the intensity of choice) become higher than some threshold, the preferred state of the system is segregated: both buyers and sellers are segmented into subgroups that are persistently loyal to one market over another. We characterize the segregated state analytically in the limit of large markets: it is stabilized by some agents acting cooperatively to enable trade, and provides higher rewards than its unsegregated counterpart both for individual traders and the population as a whole.

  12. Simple stochastic order-book model of swarm behavior in continuous double auction

    NASA Astrophysics Data System (ADS)

    Ichiki, Shingo; Nishinari, Katsuhiro

    2015-02-01

    In this study, we present a simple stochastic order-book model for investors' swarm behaviors seen in the continuous double auction mechanism, which is employed by major global exchanges. Our study shows a characteristic called 'fat tail' seen in the data obtained from our model that incorporates the investors' swarm behaviors. Our model captures two swarm behaviors: one is investors' behavior to follow a trend in the historical price movement, and another is investors' behavior to send orders that contradict a trend in the historical price movement. In order to capture the features of influence by the swarm behaviors, from price data derived from our simulations using these models, we analyzed the price movement range, that is, how much the price is moved when it is continuously moved in a single direction. Depending on the type of swarm behavior, we saw a difference in the cumulative frequency distribution of this price movement range. In particular, for the model of investors who followed a trend in the historical price movement, we saw the power law in the tail of the cumulative frequency distribution of this price movement range. In addition, we analyzed the shape of the tail of the cumulative frequency distribution. The result demonstrated that one of the reasons the trend following of price occurs is that orders temporarily swarm on the order book in accordance with past price trends.

  13. Game auction prices are not related to biodiversity contributions of southern African ungulates and large carnivores

    NASA Astrophysics Data System (ADS)

    Dalerum, Fredrik; Miranda, Maria

    2016-02-01

    There is an urgent need for human societies to become environmentally sustainable. Because public policy is largely driven by economic processes, quantifications of the relationship between market prices and environmental values can provide important information for developing strategies towards sustainability. Wildlife in southern Africa is often privately owned and traded at game auctions to be utilized for commercial purposes mostly related to tourism. This market offers an interesting opportunity to evaluate how market prices relate to biologically meaningful species characteristics. In this market, prices were not correlated with species contributions to either phylogenetic or functional diversity, and species contributions to phylogenetic or functional diversity did not influence the trends in prices over time for the past 20 years. Since this economic market did not seem to appreciate evolutionary or ecologically relevant characteristics, we question if the game tourism market may contribute towards biodiversity conservation in southern Africa. We suggest that market prices in general may have limited values as guides for directing conservation and environmental management. We further suggest that there is a need to evaluate what humans value in biological organisms, and how potentially necessary shifts in such values can be instigated.

  14. Evaluating the impacts of farmers' behaviors on a hypothetical agricultural water market based on double auction

    NASA Astrophysics Data System (ADS)

    Du, Erhu; Cai, Ximing; Brozović, Nicholas; Minsker, Barbara

    2017-05-01

    Agricultural water markets are considered effective instruments to mitigate the impacts of water scarcity and to increase crop production. However, previous studies have limited understanding of how farmers' behaviors affect the performance of water markets. This study develops an agent-based model to explicitly incorporate farmers' behaviors, namely irrigation behavior (represented by farmers' sensitivity to soil water deficit λ) and bidding behavior (represented by farmers' rent seeking μ and learning rate β), in a hypothetical water market based on a double auction. The model is applied to the Guadalupe River Basin in Texas to simulate a hypothetical agricultural water market under various hydrological conditions. It is found that the joint impacts of the behavioral parameters on the water market are strong and complex. In particular, among the three behavioral parameters, λ affects the water market potential and its impacts on the performance of the water market are significant under most scenarios. The impacts of μ or β on the performance of the water market depend on the other two parameters. The water market could significantly increase crop production only when the following conditions are satisfied: (1) λ is small and (2) μ is small and/or β is large. The first condition requires efficient irrigation scheduling, and the second requires well-developed water market institutions that provide incentives to bid true valuation of water permits.

  15. Reverse auction: a potential strategy for reduction of pharmacological therapy cost.

    PubMed

    Brandão, Sara Michelly Gonçalves; Issa, Victor Sarli; Ayub-Ferreira, Silvia Moreira; Storer, Samantha; Gonçalves, Bianca Gigliotti; Santos, Valter Garcia; Carvas Junior, Nelson; Guimarães, Guilherme Veiga; Bocchi, Edimar Alcides

    2015-09-01

    Polypharmacy is a significant economic burden. We tested whether using reverse auction (RA) as compared with commercial pharmacy (CP) to purchase medicine results in lower pharmaceutical costs for heart failure (HF) and heart transplantation (HT) outpatients. We compared the costs via RA versus CP in 808 HF and 147 HT patients followed from 2009 through 2011, and evaluated the influence of clinical and demographic variables on cost. The monthly cost per patient for HF drugs acquired via RA was $10.15 (IQ 3.51-40.22) versus $161.76 (IQ 86.05‑340.15) via CP; for HT, those costs were $393.08 (IQ 124.74-774.76) and $1,207.70 (IQ 604.48-2,499.97), respectively. RA may reduce the cost of prescription drugs for HF and HT, potentially making HF treatment more accessible. Clinical characteristics can influence the cost and benefits of RA. RA may be a new health policy strategy to reduce costs of prescribed medications for HF and HT patients, reducing the economic burden of treatment.

  16. Social Security.

    ERIC Educational Resources Information Center

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  17. School Security.

    ERIC Educational Resources Information Center

    Bete, Tim, Ed.

    1998-01-01

    Presents the opinions of four security experts on the issue of guns in schools. The experts respond to the following questions: will schools ever be free of weapons; will card access systems become common in public schools; will metal detectors solve school security problems; and will students ever be issued bullet-proof vests along with…

  18. 12 CFR 619.9010 - Additional security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Additional security. 619.9010 Section 619.9010 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9010 Additional security. Supplementary collateral to the primary security taken in connection with the loan. ...

  19. 12 CFR 619.9010 - Additional security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Additional security. 619.9010 Section 619.9010 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9010 Additional security. Supplementary collateral to the primary security taken in connection with the loan. ...

  20. Secure Objectives for School Security

    ERIC Educational Resources Information Center

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  1. Social Security Administration

    MedlinePlus

    ... Plan Costs my Social Security Check out your Social Security Statement , change your address & manage your benefits online today. Social Security Number Your Social Security number remains your ...

  2. Control system of the inspection robots group applying auctions and multi-criteria analysis for task allocation

    NASA Astrophysics Data System (ADS)

    Panfil, Wawrzyniec; Moczulski, Wojciech

    2017-10-01

    In the paper presented is a control system of a mobile robots group intended for carrying out inspection missions. The main research problem was to define such a control system in order to facilitate a cooperation of the robots resulting in realization of the committed inspection tasks. Many of the well-known control systems use auctions for tasks allocation, where a subject of an auction is a task to be allocated. It seems that in the case of missions characterized by much larger number of tasks than number of robots it will be better if robots (instead of tasks) are subjects of auctions. The second identified problem concerns the one-sided robot-to-task fitness evaluation. Simultaneous assessment of the robot-to-task fitness and task attractiveness for robot should affect positively for the overall effectiveness of the multi-robot system performance. The elaborated system allows to assign tasks to robots using various methods for evaluation of fitness between robots and tasks, and using some tasks allocation methods. There is proposed the method for multi-criteria analysis, which is composed of two assessments, i.e. robot's concurrency position for task among other robots and task's attractiveness for robot among other tasks. Furthermore, there are proposed methods for tasks allocation applying the mentioned multi-criteria analysis method. The verification of both the elaborated system and the proposed tasks' allocation methods was carried out with the help of simulated experiments. The object under test was a group of inspection mobile robots being a virtual counterpart of the real mobile-robot group.

  3. Evaluation of PersianCAT Agent's Accepting Policy in Continuous Double Auction, Participant in CAT 2007 Competition

    NASA Astrophysics Data System (ADS)

    Honari, Sina; Fos-Hati, Amin; Ebadi, Mojtaba; Gomrokchi, Maziar

    As there is a growing tendency towards online auctions, online Multi Agent Systems for economic activities like stock exchanges is more in demand. CAT (CATallactics) competition has produced a great opportunity for researchers since 2007 to put their theories into practice in a real-time economic-based competition, combining traders and brokers. As one of participants, we evaluated our new accepting policy by putting it to challenge. In this paper we give a general overview of one of our policies in the market.

  4. Data security.

    PubMed

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement.

  5. 49 CFR 1542.3 - Airport security coordinator.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...

  6. 49 CFR 1542.3 - Airport security coordinator.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...

  7. 49 CFR 1542.3 - Airport security coordinator.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...

  8. 49 CFR 1542.3 - Airport security coordinator.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...

  9. 49 CFR 1542.3 - Airport security coordinator.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...

  10. 31 CFR 356.34 - What could happen if someone does not fully comply with the auction rules or fails to pay for...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false What could happen if someone does not... Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE... person or entity from participating in future auctions under this part. We also may refer the matter to...

  11. 31 CFR 356.34 - What could happen if someone does not fully comply with the auction rules or fails to pay for...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false What could happen if someone does not... Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE... person or entity from participating in future auctions under this part. We also may refer the matter to...

  12. 31 CFR 356.34 - What could happen if someone does not fully comply with the auction rules or fails to pay for...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false What could happen if someone does not... Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE... person or entity from participating in future auctions under this part. We also may refer the matter to...

  13. 31 CFR 356.34 - What could happen if someone does not fully comply with the auction rules or fails to pay for...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false What could happen if someone does not... Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE... barring the person or entity from participating in future auctions under this part. We also may refer the...

  14. 31 CFR 356.34 - What could happen if someone does not fully comply with the auction rules or fails to pay for...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false What could happen if someone does not... Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE... person or entity from participating in future auctions under this part. We also may refer the matter to...

  15. A revealed preference approach to estimating supply curves for ecosystem services: use of auctions to set payments for soil erosion control in Indonesia.

    PubMed

    Jack, B Kelsey; Leimona, Beria; Ferraro, Paul J

    2009-04-01

    To supply ecosystem services, private landholders incur costs. Knowledge of these costs is critical for the design of conservation-payment programs. Estimating these costs accurately is difficult because the minimum acceptable payment to a potential supplier is private information. We describe how an auction of payment contracts can be designed to elicit this information during the design phase of a conservation-payment program. With an estimate of the ecosystem-service supply curve from a pilot auction, conservation planners can explore the financial, ecological, and socioeconomic consequences of alternative scaled-up programs. We demonstrate the potential of our approach in Indonesia, where soil erosion on coffee farms generates downstream ecological and economic costs. Bid data from a small-scale, uniform-price auction for soil-conservation contracts allowed estimates of the costs of a scaled-up program, the gain from integrating biophysical and economic data to target contracts, and the trade-offs between poverty alleviation and supply of ecosystem services. Our study illustrates an auction-based approach to revealing private information about the costs of supplying ecosystem services. Such information can improve the design of programs devised to protect and enhance ecosystem services.

  16. A Virtual Field Trip to the Real World of Cap and Trade: Environmental Economics and the EPA SO[subscript 2] Allowance Auction

    ERIC Educational Resources Information Center

    Lewis, Lynne Y.

    2011-01-01

    In the spring of 2001, Bates College Environmental Economics classes bought their first sulfur dioxide emissions allowance at U.S. Environmental Protection Agency's annual auction, then conducted by the Chicago Board of Trade. In the spring of 2010, they bought their 22nd through 34th allowances. This article describes a three-part method for…

  17. Homeland Security, A Primary Army Function

    DTIC Science & Technology

    2002-01-01

    www.efilmqroup.com/nowhere.html>; Internet; accessed 27 January 2002 . ൕ Ibid., 1-4. 14 Gannon , John C., "The US Intelligence Community and Biological...Release. Distribution is Unlimited. USAWC CLASS OF 2002 U.S. ARMY WAR COLLEGE, CARLISLE BARRACKS, PA 17013-5050 20020502 072 USAWC STRATEGY RESEARCH PROJECT...Project DATE: 09 April 2002 PAGES:43 CLASSIFICATION: Unclassified This paper will explore new Army requirements based on the September 2001 Quadrennial

  18. Security Systems Consideration: A Total Security Approach

    NASA Astrophysics Data System (ADS)

    Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.

    2007-12-01

    The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.

  19. Cryptographic Combinatorial Securities Exchanges

    NASA Astrophysics Data System (ADS)

    Thorpe, Christopher; Parkes, David C.

    We present a useful new mechanism that facilitates the atomic exchange of many large baskets of securities in a combinatorial exchange. Cryptography prevents information about the securities in the baskets from being exploited, enhancing trust. Our exchange offers institutions who wish to trade large positions a new alternative to existing methods of block trading: they can reduce transaction costs by taking advantage of other institutions’ available liquidity, while third party liquidity providers guarantee execution—preserving their desired portfolio composition at all times. In our exchange, institutions submit encrypted orders which are crossed, leaving a “remainder”. The exchange proves facts about the portfolio risk of this remainder to third party liquidity providers without revealing the securities in the remainder, the knowledge of which could also be exploited. The third parties learn either (depending on the setting) the portfolio risk parameters of the remainder itself, or how their own portfolio risk would change if they were to incorporate the remainder into a portfolio they submit. In one setting, these third parties submit bids on the commission, and the winner supplies necessary liquidity for the entire exchange to clear. This guaranteed clearing, coupled with external price discovery from the primary markets for the securities, sidesteps difficult combinatorial optimization problems. This latter method of proving how taking on the remainder would change risk parameters of one’s own portfolio, without revealing the remainder’s contents or its own risk parameters, is a useful protocol of independent interest.

  20. Energy Security is National Security

    DTIC Science & Technology

    2011-03-11

    made to resur~ect Cantrell in early 2000 with some success. A newer technique using nitrogen injection was used on the mammoth field. For four years...related to economic survival. Addiction to fossil f-uels enslaves foreign policy, ensures trade deficits and destroys the · enviro ~ent. Energy security

  1. Exercise-referral scheme to promote physical activity among hypertensive patients: design of a cluster randomized trial in the Primary Health Care Units of Mexico’s Social Security System

    PubMed Central

    2014-01-01

    Background Although the benefits of physical activity (PA) on to prevent and manage non-communicable diseases are well known, strategies to help increase the levels of PA among different populations are limited. Exercise-referral schemes have emerged as one effective approach to promote PA; however, there is uncertainty about the feasibility and effectiveness of these schemes in settings outside high-income countries. This study will examine the effectiveness of a scheme to refer hypertensive patients identified in Primary Health Care facilities (PHCU) of the Mexican social security institution to a group PA program offered in the same institution. Methods and design We will describe the methods of a cluster randomized trial study designed to evaluate the effectiveness of an exercise referral scheme to increasing physical activity in hypertensive patients compared to a non-referral scheme. Four PHCU were selected for the study; the PHCU will take part as the unit of randomization and sedentary hypertensive patients as the unit of assessment. 2 PHCU of control group (GC) will provide information to hypertensive patients about physical activity benefits and ways to increase it safely. 2 PHCU of intervention group (IG) will refer patients to sports facilities at the same institution, to follow a group-based PA program developed to increase the PA levels with a designed based on the Transtheoretical Model and Social Cognitive Theory. To evaluate the effects of the intervention as well as short-term maintenance of the intervention’s effects, PA will be assessed at baseline, at 24 and 32 weeks of follow-up. The main outcome will be the difference before and after intervention in the percentage of participants meeting recommended levels of PA between and within intervention and control groups. PA will be measured through self-report and with objective measure by accelerometer. Discussion This study will allow us to evaluate a multidisciplinary effort to link the primary

  2. Security seal

    DOEpatents

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  3. Security system

    DOEpatents

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  4. Security Verification of Secure MANET Routing Protocols

    DTIC Science & Technology

    2012-03-22

    SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Matthew F. Steele, Captain, USAF AFIT/GCS/ ENG /12-03 DEPARTMENT OF THE AIR FORCE AIR...States AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Presented to the Faculty Department of Electrical and Computer...DISTRIBUTION UNLIMITED AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS Matthew F. Steele, B.S.E.E. Captain, USAF

  5. Investor structure and the price-volume relationship in a continuous double auction market: An agent-based modeling perspective

    NASA Astrophysics Data System (ADS)

    Zhang, Wei; Bi, Zhengzheng; Shen, Dehua

    2017-02-01

    This paper investigates the impact of investor structure on the price-volume relationship by simulating a continuous double auction market. Connected with the underlying mechanisms of the price-volume relationship, i.e., the Mixture of Distribution Hypothesis (MDH) and the Sequential Information Arrival Hypothesis (SIAH), the simulation results show that: (1) there exists a strong lead-lag relationship between the return volatility and trading volume when the number of informed investors is close to the number of uninformed investors in the market; (2) as more and more informed investors entering the market, the lead-lag relationship becomes weaker and weaker, while the contemporaneous relationship between the return volatility and trading volume becomes more prominent; (3) when the informed investors are in absolute majority, the market can achieve the new equilibrium immediately. Therefore, we can conclude that the investor structure is a key factor in affecting the price-volume relationship.

  6. Designing PURPA (Public Utilities Regulatory Policies Act) power purchase auctions: Theory and practice. [Buys from cogenerators and small power generators

    SciTech Connect

    Not Available

    The Public Utilities Regulatory Act (PURPA) requires there to be procedures for electric utilities to buy electric power from qualifying cogenerators and small power producers (QFs) at rates up to ''avoided cost''. This has led to price-posting procedures at prices calculated as the utility's marginal cost. Unexpectedly large sales at these prices and slow adjustment to falling energy cost are partially responsible for payments to QFs in excess of the utility's true avoided cost. Using competitive bidding instead of posted prices has been proposed as a way to avoid this outcome. This report reviews bidding theory and explores four issuesmore » that arise in designing auction systems for the purchase of power from QFs under PURPA.« less

  7. Statistical security for Social Security.

    PubMed

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  8. When trust defies common security sense.

    PubMed

    Williams, Patricia A H

    2008-09-01

    Primary care medical practices fail to recognize the seriousness of security threats to their patient and practice information. This can be attributed to a lack of understanding of security concepts, underestimation of potential threats and the difficulty in configuration of security technology countermeasures. To appreciate the factors contributing to such problems, research into general practitioner security practice and perceptions of security was undertaken. The investigation focused on demographics, actual practice, issues and barriers, and practitioner perception. Poor implementation, lack of relevant knowledge and inconsistencies between principles and practice were identified as key themes. Also the results revealed an overwhelming reliance on trust in staff and in computer information systems. This clearly identified that both cultural and technical attributes contribute to the deficiencies in information security practice. The aim of this research is to understand user needs and problems when dealing with information security practice.

  9. Responses to the advanced notice of proposed rulemaking EPA published on June 6, 1996 regarding changes to the EPA allowance auctions and elimination of the direct sale

    SciTech Connect

    Critchfield, L.R.

    1997-12-31

    On June 6, 1996, EPA`s Acid Rain Program published an advance notice of proposed rulemaking (ANPRM) in the Federal Register seeking comment on: (1) whether to change the design of the annual sulfur dioxide (SO{sub 2}) allowance auctions; (2) whether to change the timing of the allowance auctions; (3) whether to change the requirement that the minimum price of offered allowances must be in whole dollars, and (4) whether EPA should propose the ability to submit allowance transfers electronically. EPA also published on that day a proposed and direct final rule on whether to eliminate the direct sale. This papermore » documents the issues addressed in the ANPRM, the comments EPA received, and EPA`s responses to those comments. EPA received comments from 14 separate commenters.« less

  10. [Current status of illegal trade in pharmaceutical products on Internet auction sites in Japan and responses of site administrators to such transactions].

    PubMed

    Ohtani, Hisakazu; Imaoka, Ayuko; Akiyoshi, Takeshi

    2015-01-01

    In Japan, it is illegal to sell pharmaceuticals on Internet auction sites, although a considerable number of pharmaceuticals are listed on such sites. We investigated the current situation regarding the illegal trade in pharmaceuticals on Japanese Internet auction sites and the responses of site administrators to such transactions. We searched for pharmaceuticals and "gray" items that were suspected of being pharmaceuticals on Yahoo-oku! (Yahoo! Auctions, Japan) over a 37-day period and then submitted violation reports indicating that selling pharmaceuticals is illegal or that the description of an item was insufficient. The reports were directed to the site administrators and forwarded to the sellers. One hundred and six pharmaceutical products and 34 gray items were identified during the study period. After the submission of the violation reports, only 28 of the pharmaceutical products and one of the gray items were deleted by the administrator, while 18 of the pharmaceutical products and 7 of the gray items were withdrawn by their sellers. However, 41 pharmaceuticals and 20 gray items were sold. Most of the gray items were listed using characteristic terms or abbreviations without photographic images. More than 70% of the identified pharmaceuticals had a contraindication(s) other than hypersensitivity. In conclusion, the illegal trade in pharmaceuticals on Internet auction sites remains a serious problem in Japan, and the responses of site administrators to such transactions are inadequate. The government and pharmaceutical industry may have to take measures such as providing public and administrative guidance to stop the illegal trade in pharmaceuticals on the Internet.

  11. Estimating the impact of various menu labeling formats on parents' demand for fast-food kids' meals for their children: An experimental auction.

    PubMed

    Hobin, Erin; Lillico, Heather; Zuo, Fei; Sacco, Jocelyn; Rosella, Laura; Hammond, David

    2016-10-01

    This study experimentally tested whether parents' demand for fast-food kids' meals for their children is influenced by various menu labeling formats disclosing calorie and sodium information. The study also examined the effect of various menu labeling formats on parents' ability to identify fast-food kids' meals with higher calorie and sodium content. Online surveys were conducted among parents of children aged 3-12. Parents were randomized to view 1 of 5 menu conditions: 1) No Nutrition Information; 2) Calories-Only; 3) Calories + Contextual Statement (CS); 4) Calories, Sodium, + CS; and, 5) Calorie and Sodium in Traffic Lights + CS. Using an established experimental auction study design, parents viewed replicated McDonald's menus according to their assigned condition and were asked to bid on 4 Happy Meals. A randomly selected price was chosen; bids equal to or above this price "won" the auction, and bids less than this price "lost" the auction. After the auction, participants were asked to identify the Happy Meal with the highest calories and sodium content. Adjusting for multiple comparisons and covariates, the Calories, Sodium, + CS menu had a mean attributed value across all 4 Happy Meals which was 8% lower (-$0.31) than the Calories + CS menu (p < 0.05). Significantly more parents in the 4 menu conditions providing calories were able to correctly identify the Happy Meal with the highest calories (p < 0.0001) and significantly more parents in the 2 conditions providing sodium information were able to correctly identify the Happy Meal with the highest sodium content (p < 0.0001). Menus disclosing both calories and sodium information may reduce demand for fast-food kids' meals and better support parents in making more informed and healthier food choices for their children. Copyright © 2016. Published by Elsevier Ltd.

  12. Nuclear security

    SciTech Connect

    Dingell, J.D.

    1991-02-01

    The Department of Energy's (DOE) Lawrence Livermore National Laboratory, located in Livermore, California, generates and controls large numbers of classified documents associated with the research and testing of nuclear weapons. Concern has been raised about the potential for espionage at the laboratory and the national security implications of classified documents being stolen. This paper determines the extent of missing classified documents at the laboratory and assesses the adequacy of accountability over classified documents in the laboratory's custody. Audit coverage was limited to the approximately 600,000 secret documents in the laboratory's custody. The adequacy of DOE's oversight of the laboratory's secretmore » document control program was also assessed.« less

  13. Effect of management, marketing, and certified health programs on the sale price of beef calves sold through a livestock video auction service from 1995 through 2009.

    PubMed

    Seeger, Jon T; King, Michael E; Grotelueschen, Dale M; Rogers, Glenn M; Stokka, Gerald S

    2011-08-15

    To evaluate and update the previously quantified effects of management, marketing, and certified health programs on the sale price of beef calves sold through a livestock video auction service. Longitudinal study. 41,657 lots representing 5,042,272 beef calves sold from 1995 through 2009. Data describing each lot of beef calves marketed from 1995 through 2009 by a livestock video auction service were obtained from sale catalogues. For each year of the study, multiple regression analysis was used to quantify the effect of management, marketing, and certified health programs on sale price. Sale date, base sale weight, quadratic effect of base weight, sex of calf, region of origin, breed description, inclusion in a certified health program, and number of calves in the lot significantly affected sale price for every year of the study. Variation in body weight, flesh score, and number of days between sale and delivery date had significant effects on price in most of the years; frame score and calves with horns affected price in 7 of 15 years; age and source verification influenced sale price in every year since source verification was introduced in 2005; and the auction service's progressive genetics program increased price during the 1 year that program was available. Some management, marketing, and certified health initiatives have consistently increased the sale price of beef calves, and producers can increase the price of their calves by implementing these practices.

  14. Examining the relationship between psychosocial and behavioral proxies for future consumption behavior: self-reported impact and bidding behavior in an experimental auction study on cigarette labeling

    PubMed Central

    Rousu, Matthew C.; Thrasher, James F.

    2014-01-01

    Experimental and observational research often involves asking consumers to self-report the impact of some proposed option. Because self-reported responses involve no consequence to the respondent for falsely revealing how he or she feels about an issue, self-reports may be subject to social desirability and other influences that bias responses in important ways. In this article, we analyzed data from an experiment on the impact of cigarette packaging and pack warnings, comparing smokers’ self-reported impact (four-item scale) and the bids they placed in experimental auctions to estimate differences in demand. The results were consistent across methods; however, the estimated effect size associated with different warning labels was two times greater for the four-item self-reported response scale when compared to the change in demand as indicated by auction bids. Our study provides evidence that self-reported psychosocial responses provide a valid proxy for behavioral change as reflected by experimental auction bidding behavior. More research is needed to better understand the advantages and disadvantages of behavioral economic methods and traditional self-report approaches to evaluating health behavior change interventions. PMID:24399267

  15. Encouraging stormwater management using a reverse auction: potential to restore stream ecosystems

    EPA Science Inventory

    Stormwater runoff is the primary mechanism by which urbanizing landscapes disrupt natural, stream ecosystems. Source control management has been demonstrated as an effective and cost-efficient method for reducing stormwater runoff; however, sufficiently widespread implementation...

  16. The Latent Structure of Secure Base Script Knowledge

    ERIC Educational Resources Information Center

    Waters, Theodore E. A.; Fraley, R. Chris; Groh, Ashley M.; Steele, Ryan D.; Vaughn, Brian E.; Bost, Kelly K.; Veríssimo, Manuela; Coppola, Gabrielle; Roisman, Glenn I.

    2015-01-01

    There is increasing evidence that attachment representations abstracted from childhood experiences with primary caregivers are organized as a cognitive script describing secure base use and support (i.e., the "secure base script"). To date, however, the latent structure of secure base script knowledge has gone unexamined--this despite…

  17. Detection of equine herpesvirus-4 and physiological stress patterns in young Thoroughbreds consigned to a South African auction sale.

    PubMed

    Badenhorst, Marcha; Page, Patrick; Ganswindt, Andre; Laver, Peter; Guthrie, Alan; Schulman, Martin

    2015-06-02

    The prevalence of equine herpesvirus types-1 and -4 (EHV-1 and -4) in South African Thoroughbreds at auction sales is currently undefined. Commingling of young Thoroughbreds from various populations together with physiological stress related to their transport and confinement at a sales complex, may be associated with shedding and transmission of EHV-1 and -4. This prospective cohort study sampled 90 young Thoroughbreds consigned from eight farms, originating from three provinces representative of the South African Thoroughbred breeding demographic to a sales complex. Nasal swabs for quantitative real-time polymerase chain reaction (qPCR) assay to detect EHV-1 and -4 nucleic acid and blood samples for enzyme-linked immunosorbent assay for EHV-1 and -4 antibodies were collected from all horses on arrival and departure. Additional nasal swabs for qPCR were obtained serially from those displaying pyrexia and, or nasal discharge. Daily faecal samples were used for determination of faecal glucocorticoid metabolite (FGM) concentrations as a measurement of physiological stress and these values were modelled to determine the factors best explaining FGM variability. EHV-4 nucleic acid was detected in 14.4 % and EHV-1 from none of the animals in the study population. Most (93.3 %) and very few (1.1 %) of this population showed antibodies indicating prior exposure to EHV-4 and EHV-1 respectively. Pyrexia and nasal discharge were poor predictors for detecting EHV-4 nucleic acid. The horses' FGM concentrations increased following arrival before decreasing for most of the remaining study period including the auction process. Model averaging showed that variation in FGM concentrations was best explained by days post-arrival and transport duration. In this study population, sales consignment was associated with limited detection of EHV-4 nucleic acid in nasal secretions, with most showing prior exposure to EHV-4 and very few to EHV-1. The physiological stress response shown by

  18. Development of Security Measures: Implementation Instructions for MIL-STD on Physical Security for DCS Facilities.

    DTIC Science & Technology

    1981-07-01

    security measures to in- crease the survivability of these assets. However, sabotage, terrorism and vandalism continue to be serious threats to DCS and its...Closed circuit television. e. Comunication cables. f. Fuel storage. g. Fuel lines. h. Air conditioning. The primary benefits of security measures

  19. Design for Security Workshop

    DTIC Science & Technology

    2014-09-30

    fingerprint sensor etc.  Secure application execution  Trust established outwards  With normal world apps  With internet/cloud apps...Xilinx Zynq Security Components and Capabilities © Copyright 2014 Xilinx . Security Features Inherited from FPGAs Zynq Secure Boot TrustZone...2014 Xilinx . Security Features Inherited from FPGAs Zynq Secure Boot TrustZone Integration 4 Agenda © Copyright 2014 Xilinx . Device DNA and User

  20. Redefining security.

    PubMed

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  1. Poisson-process generalization for the trading waiting-time distribution in a double-auction mechanism

    NASA Astrophysics Data System (ADS)

    Cincotti, Silvano; Ponta, Linda; Raberto, Marco; Scalas, Enrico

    2005-05-01

    In this paper, empirical analyses and computational experiments are presented on high-frequency data for a double-auction (book) market. Main objective of the paper is to generalize the order waiting time process in order to properly model such empirical evidences. The empirical study is performed on the best bid and best ask data of 7 U.S. financial markets, for 30-stock time series. In particular, statistical properties of trading waiting times have been analyzed and quality of fits is evaluated by suitable statistical tests, i.e., comparing empirical distributions with theoretical models. Starting from the statistical studies on real data, attention has been focused on the reproducibility of such results in an artificial market. The computational experiments have been performed within the Genoa Artificial Stock Market. In the market model, heterogeneous agents trade one risky asset in exchange for cash. Agents have zero intelligence and issue random limit or market orders depending on their budget constraints. The price is cleared by means of a limit order book. The order generation is modelled with a renewal process. Based on empirical trading estimation, the distribution of waiting times between two consecutive orders is modelled by a mixture of exponential processes. Results show that the empirical waiting-time distribution can be considered as a generalization of a Poisson process. Moreover, the renewal process can approximate real data and implementation on the artificial stocks market can reproduce the trading activity in a realistic way.

  2. From Secure Memories to Smart Card Security

    NASA Astrophysics Data System (ADS)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  3. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  4. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  5. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  6. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  7. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  8. National ITS architecture security

    DOT National Transportation Integrated Search

    2003-10-01

    This Security Document presents an overview of security as it is represented in the National ITS Architecture and provides guidance for using the security-related parts of the National ITS Architecture. The objective of security, in the context of th...

  9. Building Security into Schools.

    ERIC Educational Resources Information Center

    Kosar, John E.; Ahmed, Faruq

    2000-01-01

    Offers tips for redesigning safer school sites; installing and implementing security technologies (closed-circuit television cameras, door security hardware, electronic security panels, identification cards, metal detectors, and panic buttons); educating students and staff about security functions; and minimizing costs via a comprehensive campus…

  10. Unix Security Cookbook

    NASA Astrophysics Data System (ADS)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  11. Texting "boosts" felt security.

    PubMed

    Otway, Lorna J; Carnelley, Katherine B; Rowe, Angela C

    2014-01-01

    Attachment security can be induced in laboratory settings (e.g., Rowe & Carnelley, 2003) and the beneficial effects of repeated security priming can last for a number of days (e.g., Carnelley & Rowe, 2007). The priming process, however, can be costly in terms of time. We explored the effectiveness of security priming via text message. Participants completed a visualisation task (a secure attachment experience or neutral experience) in the laboratory. On three consecutive days following the laboratory task, participants received (secure or neutral) text message visualisation tasks. Participants in the secure condition reported significantly higher felt security than those in the neutral condition, immediately after the laboratory prime, after the last text message prime and one day after the last text prime. These findings suggest that security priming via text messages is an innovative methodological advancement that effectively induces felt security, representing a potential direction forward for security priming research.

  12. Systems Security Engineering

    DTIC Science & Technology

    2010-08-22

    Commission (IEC). “Information technology — Security techniques — Code of practice for information security management ( ISO /IEC 27002 ...Information technology — Security techniques — Information security management systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security...was a draft ISO standard on Systems and software engineering, Systems and software assurance [18]. Created by systems engineers for systems

  13. Systems Security Engineering

    DTIC Science & Technology

    2010-08-22

    practice for information security management ( ISO /IEC 27002 ),” “Information technology — Security techniques — Information security management...systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security techniques — Information security risk management ( ISO /IEC 27005).” from...associated practice aids. Perhaps the most germane discovery from this effort was a draft ISO standard on Systems and software engineering, Systems and

  14. Homeland security challenges in nursing practice.

    PubMed

    Boatright, Connie; McGlown, K Joanne

    2005-09-01

    Nurses need a comprehensive knowledge of doctrine, laws, regulations,programs, and processes that build the operational framework for health care preparedness. Key components of this knowledge base reside in the areas of: evolution of homeland security: laws and mandates affecting health care and compliance and regulatory issues for health care organizations. This article addresses primary components in both of these areas, after first assessing the status of nursing's involvement (in homeland security), as portrayed in the professional literature.

  15. Regional Military Security Cooperation in North America

    DTIC Science & Technology

    2009-12-11

    will serve as the main research sources. The primary research question is how might the United States better facilitate greater security cooperation...militarily between the U.S., Canada, and Mexico? Secondary research questions are why do we need increased security integration? How do current...research question has several associated tertiary questions . The paper consists of five chapters. Chapters 1 through 3 are introductory and

  16. Information Security Awareness On-Line Materials Design with Knowledge Maps

    ERIC Educational Resources Information Center

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  17. Genetic parameters for cattle price and body weight from routinely collected data at livestock auctions and commercial farms.

    PubMed

    Mc Hugh, N; Evans, R D; Amer, P R; Fahey, A G; Berry, D P

    2011-01-01

    Beef outputs from dairy farms make an important contribution to overall profitability in Irish dairy herds and are the sole source of revenue in many beef herds. The aim of this study was to estimate genetic parameters for animal BW and price across different stages of maturity. Data originated from 2 main sources: price and BW from livestock auctions and BW from on-farm weighings between 2000 and 2008. The data were divided into 4 distinct maturity categories: calves (n = 24,513), weanlings (n = 27,877), postweanlings (n = 23,279), and cows (n = 4,894). A univariate animal model used to estimate variance components was progressively built up to include a maternal genetic effect and a permanent environmental maternal effect. Bivariate analyses were used to estimate genetic covariances between BW and price per animal within and across maturity category. Direct heritability estimates for price per animal were 0.34 ± 0.03, 0.31 ± 0.05, 0.19 ± 0.04, and 0.10 ± 0.04 for calves, weanling, postweanlings, and cows, respectively. Direct heritability estimates for BW were 0.26 ± 0.03 for weanlings, 0.25 ± 0.04 for postweanlings, and 0.24 ± 0.06 for cows; no BW data were available on calves. Significant maternal genetic and maternal permanent environmental effects were observed for weanling BW only. The genetic correlation between price per animal and BW within each maturity group varied from 0.55 ± 0.06 (postweanling price and BW) to 0.91 ± 0.04 (cow price and BW). The availability of routinely collected data, along with the existence of ample genetic variation for animal BW and price per animal, facilitates their inclusion in Irish dairy and beef breeding objectives to better reflect the profitability of both enterprises.

  18. Defining Information Security.

    PubMed

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  19. Digital security technology simplified.

    PubMed

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  20. Global Security Sciences Home - Global Security Sciences

    Science.gov Websites

    Us About Our Research Global Security Sciences Leadership Strategic Initiatives Research Centers Center for Strategic Security Overview Leadership Risk and Infrastructure Science Center Overview Leadership Strategic Alliance for Global Energy Solutions Overview Leadership Systems Science Center Overview

  1. Practical Computer Security through Cryptography

    NASA Technical Reports Server (NTRS)

    McNab, David; Twetev, David (Technical Monitor)

    1998-01-01

    The core protocols upon which the Internet was built are insecure. Weak authentication and the lack of low level encryption services introduce vulnerabilities that propagate upwards in the network stack. Using statistics based on CERT/CC Internet security incident reports, the relative likelihood of attacks via these vulnerabilities is analyzed. The primary conclusion is that the standard UNIX BSD-based authentication system is by far the most commonly exploited weakness. Encryption of Sensitive password data and the adoption of cryptographically-based authentication protocols can greatly reduce these vulnerabilities. Basic cryptographic terminology and techniques are presented, with attention focused on the ways in which technology such as encryption and digital signatures can be used to protect against the most commonly exploited vulnerabilities. A survey of contemporary security software demonstrates that tools based on cryptographic techniques, such as Kerberos, ssh, and PGP, are readily available and effectively close many of the most serious security holes. Nine practical recommendations for improving security are described.

  2. Challenges in managing freshwater fishery resource through Lebak Lebung Auction approach: a case study in Pangkalan Lampam District Ogan Komering Ilir Regency

    NASA Astrophysics Data System (ADS)

    Muslimin, B.; Suadi

    2018-03-01

    Responsible management of fishery resources has been a tradition of Ogan Komering Ilir (OKI) of South Sumatera for generations. It was recorded that since 1630 the Dutch Government had made auction policy for managing water territory in OKI Regency as an effort to preserve nature and to avoid the conflict of inland water ownership. Currently, the community-based management model has been adopted by local governments into formal regulations, known as Regional Regulation on Auction of Flood Water Swamp and Rivers (Lelang Lebak Lebung dan Sungai or L3S). This paper describes the success factors and the threats for the failure of the L3S management model in OKI Regency, based on a case study in Pangkalan Lampam District. The study showed that the management mechanism through the L3S system had been well instituted and become a well-established management practice. The management model is in line with the principle of co-management and the approach has become critical success factor in L3S management. However, ecological, economic and social aspects influence the sustainability of such fishery management model. Besides, L3S management model faces limited data and information related to fish stocks, which result in difficulties in determining the total allowable catch.

  3. Transit Security Procedures Guide

    DOT National Transportation Integrated Search

    1994-12-01

    To protect passenger, employees, revenue, and property, transit systems are encouraged to take a proactive, prevention-oriented systems approach to transit security. This guide is a compilation of materials for planning and improving transit security...

  4. Computer Security Models

    DTIC Science & Technology

    1984-09-01

    Verification Technique for a Class of Security Kernels," International Symposium on Programming , Lecture Notes in Computer Science 137, Springer-Verlag, New York...September 1984 MTR9S31 " J. K. Millen Computer Security C. M. Cerniglia Models * 0 Ne c - ¢- C. S• ~CONTRACT SPONSOR OUSDRE/C31 & ESO/ALEE...ABSTRACT The purpose of this report is to provide a basis for evaluating security models in the context of secure computer system development

  5. Security system signal supervision

    SciTech Connect

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  6. Space Security Law

    NASA Astrophysics Data System (ADS)

    Blount, P. J.

    2017-06-01

    Since the very beginning of the space age, security has been the critical, overriding concern at the heart of both international and domestic space law regimes. While these regimes certainly encompass broader interests, such as commercial uses of outer space, they are built on a legal foundation that is largely intended to regularize interactions among space actors to ensure security, safety, and sustainability in the space environment. Space security law, as a result, has central goals of both maintaining peace and providing security as a public good for the benefit of humankind. The idea of security is a technical and political construct. The law is a tool that is used to articulate that construct as concept and operationalize it as a value. As such, space security law is a network of law and regulation that governs a wide variety of space activities. There are four broad categories that typify the various manifestations of space security law: international peace and security; national security; human security; and space safety and sustainability. International peace and security, the first category, is directly concerned with the international law and norms that have been adopted to decrease the risk of conflict between states. National security, category two, consists of domestic law that implements, at the national level, the obligations found in the first category as well as law that promotes other national security goals. Human security, the third category, is the loose set of law and policy directed at the use of space for the protection of human populations, such as disaster response and planetary protection. Finally, the fourth category, space safety and security, represents the emerging body of law and policy that seeks to protect the space environment through measures that address space debris and harmful contamination. Obviously, these categories overlap and laws can serve duplicative purposes, but this compartmentalization reveals much about the legal

  7. Securing General Aviation

    DTIC Science & Technology

    2009-03-03

    ajor vulnerabilities still exist in ... general aviation security ,”3 the commission did not further elaborate on the nature of those vulnerabilities...commercial operations may make them an attractive alternative to terrorists seeking to identify and exploit vulnerabilities in aviation security . In this...3, 2003, p. A7. 2 See Report of the Aviation Security Advisory Committee Working Group on General Aviation Airport Security (October 1, 2003); and

  8. Primary amyloidosis

    MedlinePlus

    Amyloidosis - primary; Immunoglobulin light chain amyloidosis ... The cause of primary amyloidosis is not well understood. Genes may play a role. The condition is related to abnormal and excess production of proteins. ...

  9. Selecting Security Technology Providers

    ERIC Educational Resources Information Center

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  10. Structuring Homeland Security

    DTIC Science & Technology

    2002-04-09

    20 AIRPORT SECURITY .............................................................................................. 20...using an existing command and control structure. Since September 11, 2001 airport security has been of heightened importance to the American public...In order to use Reserves to provide airport security the airports themselves should be made federal property. This would allow greater flexibility for

  11. Lemnos interoperable security project.

    SciTech Connect

    Halbgewachs, Ronald D.

    2010-03-01

    With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance inmore » a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.« less

  12. School Violence: Physical Security.

    ERIC Educational Resources Information Center

    Utah State Office of Education, Salt Lake City.

    This booklet provides an overview of security technology product areas that might be appropriate and affordable for school applications. Topics cover security concepts and operational issues; security issues when designing for new schools; the role of maintenance; video camera use; walk-through metal detectors; duress alarm devices; and a partial…

  13. Introduction to Retail Security.

    ERIC Educational Resources Information Center

    Thomas, James E., Ed.

    This collection consists of 15 articles dealing with retail security. Included in the volume are the following papers: "Retail Security--an Introduction," by Andrew J. Thacker and Linda Cressman; "Systematic Planning and Retail Security," by Linda T. Thomas; "Identifying Potentially Dishonest Employees," by James E.…

  14. Homeland Security and Information.

    ERIC Educational Resources Information Center

    Relyea, Harold C.

    2002-01-01

    Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)

  15. Security: Progress and Challenges

    ERIC Educational Resources Information Center

    Luker, Mark A.

    2004-01-01

    The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…

  16. Information Security Management (ISM)

    NASA Astrophysics Data System (ADS)

    Šalgovičová, Jarmila; Prajová, Vanessa

    2012-12-01

    Currently, all organizations have to tackle the issue of information security. The paper deals with various aspects of Information Security Management (ISM), including procedures, processes, organizational structures, policies and control processes. Introduction of Information Security Management should be a strategic decision. The concept and implementation of Information Security Management in an organization are determined by the corporate needs and objectives, security requirements, the processes deployed as well as the size and structure of the organization. The implementation of ISM should be carried out to the extent consistent with the needs of the organization.

  17. Unconditionally Secure Blind Signatures

    NASA Astrophysics Data System (ADS)

    Hara, Yuki; Seito, Takenobu; Shikata, Junji; Matsumoto, Tsutomu

    The blind signature scheme introduced by Chaum allows a user to obtain a valid signature for a message from a signer such that the message is kept secret for the signer. Blind signature schemes have mainly been studied from a viewpoint of computational security so far. In this paper, we study blind signatures in unconditional setting. Specifically, we newly introduce a model of unconditionally secure blind signature schemes (USBS, for short). Also, we propose security notions and their formalization in our model. Finally, we propose a construction method for USBS that is provably secure in our security notions.

  18. United States Air Force Security Forces in an Era of Terrorist Threats

    DTIC Science & Technology

    1999-06-01

    their primary duties. The third alternative is to eliminate the Palace Tenure deployments of security personnel and replace them with dedicated units...The Phoenix Raven program, the 820th Security Forces Group, and Palace Tenure commitments. The specified mission varies by organization, but the...820th Security Forces Group. January 1999, slide 4. 166 Statement of LT. Col. Larry A. Buckingham , 820th Security Forces Group Commander, “820th Security

  19. Computer Security Systems Enable Access.

    ERIC Educational Resources Information Center

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  20. BALKANS SECURITY. Current and Projected Factors Affecting Regional Stability

    DTIC Science & Technology

    2000-04-01

    Security Briefing Section II Current Situation in Kosovo and Bosnia primary responsibility for public security in Kosovo. 6 According to a senior KFOR...Integrity * Reliability GAO/NSIAD-00-125BR „.c-miBUTION STATEMENT A ApSwed for Public Release Contents Letter Briefing Section Appendixes Tables...Figures Briefing Section I: Background Briefing Section II: Current Situation in Kosovo and Bosnia Briefing Section III: Projected Security Situation

  1. Securing clean water: A secret to success

    Treesearch

    Michael Somerville; Dino DeSimone

    2000-01-01

    Securing clean water is a primary goal for many agencies, organizations, and concerned citizens. To achieve that goal, agencies have traditionally taken a mostly regulatory approach. In recent years, however, a major trend in government has been to move decision-making and action-taking to the local level. Conservation Districts, watershed organizations, and other...

  2. 77 FR 61771 - Facility Security Officer Training Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-11

    ... Security Officer training program, with the primary focus on developing the curriculum for such a program... Administrator of the Department of Transportation in developing the FSO training curriculum. The purpose of the...) to establish comprehensive FSO training requirements designed to provide full security training that...

  3. What is Security? A perspective on achieving security

    SciTech Connect

    Atencio, Julian J.

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  4. A scoping review of traditional food security in Alaska.

    PubMed

    Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa

    2018-12-01

    Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: "traditional foods", "food security", "access", "availability", "utilisation", "Alaska", "Alaska Native" and "indigenous". Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska.

  5. 20 CFR 404.260 - Special minimum primary insurance amounts.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    .... 404.260 Section 404.260 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Computing Primary Insurance Amounts Special Minimum Primary... compute your primary insurance amount, if the special minimum primary insurance amount described in § 404...

  6. Materialism and food security.

    PubMed

    Allen, M W; Wilson, M

    2005-12-01

    The present studies examined if materialists have an elevated concern about food availability, presumably stemming from a general survival security motivation. Study 1 found that materialists set a greater life goal of food security, and reported more food insecurity during their childhood. Materialists reported less present-day food insecurity. Study 2 revealed that materialists stored/hoarded more food at home, and that obese persons endorsed materialism more than low/normal weight persons. Study 3 found that experimentally decreasing participants' feelings of survival security (via a mortality salience manipulation) led to greater endorsement of materialism, food security as goal, and using food for emotional comfort. The results imply that materialists overcame the food insecurity of their childhood by making food security a top life goal, but that materialists' current concerns about food security may not wholly stem from genuine threats to their food supply.

  7. The strategic security officer.

    PubMed

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  8. Why security fails.

    PubMed

    Sem, Richard D

    2016-10-01

    When a hospital suffers a serious loss or act of violence, the blame frequently centers on the facility's Security Department, but, as the author, a longtime security consultant, points out, there's plenty of blame to go around--including Administration at all levels, and employees, both clinical and non clinical. In this article, he presents the many reasons why security can fail and what should be done to prevent such failure.

  9. Vehicle Tracking and Security

    NASA Astrophysics Data System (ADS)

    Scorer, A. G.

    1998-09-01

    This paper covers the wide area and short range locational technologies that are available for vehicle tracking in particular and mobile user security in general. It also summarises the radio communications services that can deliver information to the user. It considers the use that can be made of these technologies, when combined with procedures for delivering a response, in the security field, notably in relation to personal security, high-value load protection and the after-theft tracking markets.

  10. Securing your financial future.

    PubMed

    Kachalia, Parag R

    2009-04-01

    Securing one's financial future requires dedication and planning. A clear plan must be implemented and continually re-examined to assure an individual remains on track to achieve this security. True success of the plan will be dependent upon taking the appropriate steps to protecting one's assets against unfortunate events along with building assets with a clear end goal in mind. This article will cover the fundamental steps an individual can take to secure their financial future.

  11. Auditing Organizational Security

    DTIC Science & Technology

    2017-01-01

    Managing organizational security is no different from managing any other of the command’s missions. Establish your policies, goals and risk...parameters; implement, train, measure and benchmark them. And then audit, audit, audit. Today, more than ever, Organizational Security is an essential...not be regarded as independent or standing alone. Cybersecurity is an indispensable element of organizational security, which is the subject of

  12. Addressing Software Security

    NASA Technical Reports Server (NTRS)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  13. Kaliningrad and Baltic Security

    DTIC Science & Technology

    2001-06-01

    Kennedy-Minott, Thesis Co-Advisor ___________________________________________ James Wirtz , Chairman Department of National Security Affairs iv...39 Jochen Prantl, �Security and Stability in Northern Europe � A Threat Assessment,� Program on the Northern Dimension of the CFSP, 29...www.usis.usemb.se/ wireless/500/eur508.htm Prantl, Jochen . �Security and Stability in Northern Europe � A Threat Assessment.� Program on the Northern Dimension

  14. Beyond grid security

    NASA Astrophysics Data System (ADS)

    Hoeft, B.; Epting, U.; Koenig, T.

    2008-07-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls.

  15. Smart security and securing data through watermarking

    NASA Astrophysics Data System (ADS)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  16. Survey of quality defects in market beef and dairy cows and bulls sold through livestock auction markets in the Western United States: I. Incidence rates.

    PubMed

    Ahola, J K; Foster, H A; Vanoverbeke, D L; Jensen, K S; Wilson, R L; Glaze, J B; Fife, T E; Gray, C W; Nash, S A; Panting, R R; Rimbey, N R

    2011-05-01

    A survey was conducted to quantify incidence of Beef Quality Assurance (BQA)-related defects in market beef and dairy cows and bulls selling at auction during 2 seasons in 2008. Twenty-three BQA-related traits were evaluated by 9 trained personnel during sales at 10 livestock auction markets in Idaho (n = 5; beef and dairy), California, (n = 4; dairy only), and Utah (n = 1; beef and dairy). Overall, 18,949 unique lots (8,213 beef cows, 1,036 beef bulls, 9,177 dairy cows, and 523 dairy bulls,) consisting of 23,479 animals (9,299 beef cows, 1,091 beef bulls, 12,429 dairy cows, and 660 dairy bulls) were evaluated during 125 sales (64 spring, 61 fall) for dairy and 79 sales (40 spring, 39 fall) for beef. The majority of market beef cows and bulls (60.9 and 71.3%, respectively) were predominantly black-hided, and the Holstein hide pattern was observed in 95.4 and 93.6% of market dairy cows and bulls, respectively. Market cattle weighed 548 ± 103.6 kg (beef cows), 751 ± 176.1 kg (beef bulls), 658 ± 129.7 kg (dairy cows), and 731 ± 150.8 kg (dairy bulls). Most beef cows (79.6%) weighed 455 to 726 kg, and most beef bulls (73.8%) weighed 545 to 954 kg, respectively. Among market beef cattle, 16.0% of cows and 14.5% of bulls weighed less than 455 and 545 kg, respectively, and 63.7% of dairy cows and 81.5% of dairy bulls weighed 545 to 817 kg or 545 to 954 kg, respectively. However, 19.5% of dairy cows and 13.1% of dairy bulls weighed less than 545 kg. Mean BCS for beef cattle (9-point scale) was 4.7 ± 1.2 (cows) and 5.3 ± 0.9 (bulls), and for dairy cattle (5-point scale) was 2.6 ± 0.8 (cows) and 2.9 ± 0.6 (bulls). Some 16.5% of beef cows and 4.1% of beef bulls had a BCS of 1 to 3, whereas 34.8% of dairy cows and 10.4% of dairy bulls had a BCS of 2 or less. Emaciation (beef BCS = 1, dairy BCS = 1.0) or near-emaciation (beef BCS = 2, dairy BCS = 1.5) was observed in 13.3% of dairy cows and 3.9% of beef cows. Among beef cattle, 15.1% of cows and 15.4% of bulls were

  17. Willingness to pay for small solar powered bed net fans: results of a Becker-DeGroot-Marschak auction in Ghana.

    PubMed

    Yukich, Joshua O; Briët, Olivier J T; Ahorlu, Collins K; Nardini, Peter; Keating, Joseph

    2017-08-07

    Long-lasting insecticidal nets (LLINs) are one of the main interventions recommended by the World Health Organization for malaria vector control. LLINs are ineffective if they are not being used. Subsequent to the completion of a cluster randomized cross over trial conducted in rural Greater Accra where participants were provided with the 'Bɔkɔɔ System'-a set of solar powered net fan and light consoles with a solar panel and battery-or alternative household water filters, all trial participants were invited to participate in a Becker-DeGroot-Marschak auction to determine the mean willingness to pay (WTP) for the fan and light consoles and to estimate the demand curve for the units. Results demonstraed a mean WTP of approximately 55 Cedis (~13 USD). Demand results suggested that at a price which would support full manufacturing cost recovery, a majority of households in the area would be willing to purchase at least one such unit.

  18. Comparing the 2000 and 2005 factors affecting the selling price of feeder cattle sold at Arkansas livestock auctions.

    PubMed

    Troxel, T R; Barham, B L

    2007-12-01

    The objectives of the study were to determine how factors affecting the selling price of feeder calves changed from 2000 to 2005 and to examine the perception that discounts narrow or even disappear as calf supplies decrease and selling prices increase. Data from weekly Arkansas livestock auctions were collected from January 1 to December 31 in 2000 and 2005. Data included calf sex, breed type, color, muscle score, horn status, frame score, fill, condition, health, and BW. Mean selling prices for 2000 and 2005 were $92.91 +/- 15.05 and $118.32 +/- 15.13 (mean +/- SD; $/45.45 kg), respectively. Individual price observations were subtracted from the respective annual means and became the dependent variable. The selling prices for feeder calves sold in groups of 2 to 5 calves and in groups of >/= 6 calves were greater in 2005 than 2000 (P < 0.001). Steers received a greater premium ($6.48 +/- 0.09 vs. $6.02 +/- 0.08; mean +/- SE) and bull calves received greater discounts ($0.30 +/- 0.14 vs. $1.68 +/- 0.09) in 2005 than in 2000. Breeds types that increased in value from 2000 to 2005 were Angus x Hereford, Angus, Angus x Charolais, and Brahman (P < 0.001). Breed types that received a reduced selling price in 2005 compared with 2000 (P < 0.001) were one-fourth Brahman Cross, Charolais, Charolais x Limousin, Hereford x Limousin, Limousin, Limousin x one-fourth Brahman, Longhorn, Saler and Simmental. Yellow-white face, black-white face, black, and gray feeder calves received an increase in selling price from 2000 to 2005 (P < 0.001). Although fewer horned feeder calves were sold in 2005 (P < 0.01), they received greater discounts in 2005 than 2000 (-$2.86 +/- 0.16 and -$0.51 +/- 0.09; P < 0.001). In 2005, large-framed feeder calves did not receive the premium detected in 2000, but medium-framed feeder calves in 2005 received a greater selling price compared with 2000. Feeder calves with a muscle score of 1 received a greater premium in 2005 compared with 2000 ($2.58 +/- 0

  19. Combinatorial Auctions without Money

    DTIC Science & Technology

    2014-05-01

    from the Engineering and Physical Sciences Research Council. D. Fo- takis is also supported by AlgoNow project, co-financed by the European Union...hand, there are contexts for which little justification can be found for either the presence of a digital currency or the use of money at all. There are...a license for some subset of cities (subset of U) to sell her product stock to the market . Consider the bidder’s profit for a subset of cities S to be

  20. Healthcare is primary

    PubMed Central

    Kumar, Raman

    2015-01-01

    India is undergoing a rapid transformation in terms of governance, administrative reforms, newer policy develoment, and social movements. India is also considered one of the most vibrant economies in the world. The current discourse in public space is dominated by issues such as economic development, security, corruption free governance, gender equity, and women safety. Healthcare though remains a pressing need of population; seems to have taken a backseat. In the era of decreasing subsidies and cautious investment in social sectors, the 2nd National Conference on Family Medicine and Primary Care 2015 (FMPC) brought a focus on “healthcare” in India. The theme of this conference was “Healthcare is Primary.” The conference participants discussed on the theme of why healthcare should be a national priority and why strong primary care should remain at the center of healthcare delivery system. The experts recommended that India needs to strengthen the “general health system” instead of focusing on disease based vertical programs. Public health system should have capacity and skill pool to be able to deliver person centered comprehensive health services to the community. Proactive implementation of policies towards human resource in health is the need of the hour. As the draft National Health Policy 2015 is being debated, “family medicine” (academic primary care), the unfinished agenda of National Health Policy 2002, remains a priority area of implementation. PMID:26985402

  1. Security Vulnerability Profiles of NASA Mission Software: Empirical Analysis of Security Related Bug Reports

    NASA Technical Reports Server (NTRS)

    Goseva-Popstojanova, Katerina; Tyo, Jacob P.; Sizemore, Brian

    2017-01-01

    principle. Specifically, for all three datasets, from 86 to 88 the security related issues were located in two to four subsystems.- The severity levels of most security issues were moderate, in all three datasets.- Out of 21 primary security classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, these classes contributed from around 80 to 90 of all security issues in each dataset. This again proves the Pareto principle of uneven distribution of security issues, in this case across CWE classes, and supports the fact that addressing these dominant security classes provides the most cost efficient way to improve missions' security. The findings presented in this report uncovered the security vulnerability profiles and identified the common trends and dominant classes of security issues, which in turn can be used to select the most efficient secure design and coding best practices compiled by the part of the SARP project team associated with the NASA's Johnson Space Center. In addition, these findings provide valuable input to the NASA IVV initiative aimed at identification of the two 25 CWEs of ground and flight missions.

  2. Security in the cloud.

    PubMed

    Degaspari, John

    2011-08-01

    As more provider organizations look to the cloud computing model, they face a host of security-related questions. What are the appropriate applications for the cloud, what is the best cloud model, and what do they need to know to choose the best vendor? Hospital CIOs and security experts weigh in.

  3. Securing the Internet frontier.

    PubMed

    Morrissey, J

    1996-10-21

    Just as in the Wild West, security strategies are being mobilized for the untamed Internet frontier. Technology developed by settlers from the banking and merchandising industries is being retooled for healthcare, where security-conscious industries see a big market opportunity.

  4. Technology's Role in Security.

    ERIC Educational Resources Information Center

    Day, C. William

    1999-01-01

    Examines the use of technology to bolster the school security system, tips on selecting a security consultant, and several basic strategies to make buildings and grounds safer. Technological ideas discussed include the use of telephones in classrooms to expedite care in emergency situations, surveillance cameras to reduce crime, and metal…

  5. School Safety and Security.

    ERIC Educational Resources Information Center

    California State Dept. of Education, Sacramento.

    This document offers additional guidelines for school facilities in California in the areas of safety and security, lighting, and cleanliness. It also offers a description of technology resources available on the World Wide Web. On the topic of safety and security, the document offers guidelines in the areas of entrances, doors, and controlled…

  6. Employment Security Tax

    Science.gov Websites

    Alaska > DOLWD > Employment Security Tax EMAIL SCAM ALERT (December 2012) On-line Employer Services Online Filing Demonstrations FAQs for TaxWeb Employer Report Notice Alaska Unemployment Insurance Tax Handbook The Employment Security Tax Section is responsible for providing assistance and information to

  7. SOCIAL MEDIA SECURITY

    Science.gov Websites

    , exciting, entertaining, and useful for maintaining relationships. Professionally, people can use social HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of world. CENTCOM Personnel are reminded to use common sense when using social media. What are social media

  8. Governing for Enterprise Security

    DTIC Science & Technology

    2005-06-01

    1 2 W hat Is Governing for Enterprise Security? ................................................ 5 3 W hat Are the Risks ...oversight and coordination 2. Areas of responsibility 3. Risk measurement 4. Monitoring and testing 5 . Reporting 6. Acceptable residual risk These...and O pportunities? ............................................... 10 3.1 Enterprise Risk and Enterprise Security Risk

  9. STS-127 Pad Security

    NASA Image and Video Library

    2009-07-11

    NASA Kennedy Space Center Security Officer, Jack "Supr Jac" Hilderbrand talks on the phone at the security gate to Pad 39a just a day shy of his 70th birthday and the planned launch of the space shuttle Endeavour with the STS-127 crew. Hilderbrand has been working for the space program since 1960. Photo Credit: (NASA/Bill Ingalls)

  10. NSI security task: Overview

    NASA Technical Reports Server (NTRS)

    Tencati, Ron

    1991-01-01

    An overview is presented of the NASA Science Internet (NSI) security task. The task includes the following: policies and security documentation; risk analysis and management; computer emergency response team; incident handling; toolkit development; user consulting; and working groups, conferences, and committees.

  11. Addressing Information Security Risk

    ERIC Educational Resources Information Center

    Qayoumi, Mohammad H.; Woody, Carol

    2005-01-01

    Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…

  12. Developing a Security Profile.

    ERIC Educational Resources Information Center

    Woodcock, Chris

    1999-01-01

    Examines the questions schools should address when re-evaluating how to protect people, property, and assets. Questions addressed include where and how to begin to improve security in a school, getting the most protection economically, establishing where electronic security should be used, using surveillance cameras and systems, and what the role…

  13. CIOs Uncensored: Security Smarts.

    SciTech Connect

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  14. Secure video communications system

    DOEpatents

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  15. Network Security Is Manageable

    ERIC Educational Resources Information Center

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  16. School Security Technologies

    ERIC Educational Resources Information Center

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  17. Secure E-mailing Between Physicians and Patients

    PubMed Central

    Garrido, Terhilda; Meng, Di; Wang, Jian J.; Palen, Ted E.; Kanter, Michael H.

    2014-01-01

    Secure e-mailing between Kaiser Permanente physicians and patients is widespread; primary care providers receive an average of 5 e-mails from patients each workday. However, on average, secure e-mailing with patients has not substantially impacted primary care provider workloads. Secure e-mail has been associated with increased member retention and improved quality of care. Separate studies associated patient portal and secure e-mail use with both decreased and increased use of other health care services, such as office visits, telephone encounters, emergency department visits, and hospitalizations. Directions for future research include more granular analysis of associations between patient-physician secure e-mail and health care utilization. PMID:24887522

  18. Information Systems Security Products and Services Catalogue.

    DTIC Science & Technology

    1992-01-01

    pricing information on the Motorola Portable DES Receiver Station and Portable DES Base Station, contact Motorola. The PX-300- S ranges in cost from...C2 Paul Smith (612) 482-2776 Tom Latterner (301) 220-3400 Jeffrey S . Bell (215) 986-6864 John Haggard (312) 714-7604 4-2d.2 GENERAL-PURPOSE...primary software security mechanism of the SCOMP system is the security kernel, based on the Center-approved Bell -LaPadula model of the software portion

  19. Primary Myelofibrosis

    MedlinePlus

    ... are described below. Chronic myeloproliferative neoplasms sometimes become acute leukemia , in which too many abnormal white blood ... higher. Patients also have an increased risk of acute myeloid leukemia or primary myelofibrosis . Symptoms of polycythemia ...

  20. Wireless physical layer security

    NASA Astrophysics Data System (ADS)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  1. Wireless physical layer security.

    PubMed

    Poor, H Vincent; Schaefer, Rafael F

    2017-01-03

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  2. Network systems security analysis

    NASA Astrophysics Data System (ADS)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  3. Indirection and computer security.

    SciTech Connect

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyzemore » common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.« less

  4. Wireless physical layer security

    PubMed Central

    Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments. PMID:28028211

  5. International Nuclear Security

    SciTech Connect

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; andmore » (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.« less

  6. 78 FR 68497 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-14

    ... underlying securities is not open for business. The Exchange believes that the proposed changes will allow... business however that security is being traded elsewhere. For example, if the primary market is unable to... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70834; File No. SR-ISE-2013-55] Self-Regulatory...

  7. Addressing the Challenges of Collective Security in West Africa: In View of Recent Conflicts

    DTIC Science & Technology

    2017-06-09

    Distribution is Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT Understanding that achieving peace and security is a primary condition for an economic ...condition for an economic integration, ECOWAS has developped various approachs in resolving crises and overcoming threats within West Africa. Using...System CS Collective Security CSO Civil Society Organizations CSS Center for Security Studies EAC East Africa Community ECCAS Economic Community of

  8. Privacy and Security: A Bibliography.

    ERIC Educational Resources Information Center

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  9. A scoping review of traditional food security in Alaska

    PubMed Central

    Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa

    2018-01-01

    ABSTRACT Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: “traditional foods”, “food security”, “access”, “availability”, “utilisation”, “Alaska”, “Alaska Native” and “indigenous”. Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska. PMID:29292675

  10. Software Security Practices: Integrating Security into the SDLC

    DTIC Science & Technology

    2011-05-01

    Software Security Practices Integrating Security into the SDLC Robert A. Martin HS SEDI is a trademark of the U.S. Department of Homeland Security...2011 to 00-00-2011 4. TITLE AND SUBTITLE Software Security Practices Integrating Security into the SDLC 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...SEDI FFRDC is managed and operated by The MITRE Corporation for DHS. 4 y y w SDLC Integrating Security into a typical software development lifecycle

  11. Maternal secure-base scripts and children's attachment security in an adopted sample.

    PubMed

    Veríssimo, Manuela; Salvaterra, Fernanda

    2006-09-01

    Studies of families with adopted children are of special interest to attachment theorists because they afford opportunities to probe assumptions of attachment theory with regard to the developmental timing of interactions necessary to form primary attachments and also with regard to effects of shared genes on child attachment quality. In Bowlby's model, attachment-relevant behaviors and interactions are observable from the moment of birth, but for adoptive families, these interactions cannot begin until the child enters the family, sometimes several months or even years post-partum. Furthermore, because adoptive parents and adopted children do not usually share genes by common descent, any correspondence between attachment representations of the parent and secure base behavior of the child must arise as a consequence of dyadic interaction histories. The objectives of this study were to evaluate whether the child's age at the time of adoption or at the time of attachment assessment predicted child attachment security in adoptive families and also whether the adoptive mother's internal attachment representation predicted the child's attachment security. The participants were 106 mother - child dyads selected from the 406 adoptions carried out through the Lisbon Department of Adoption Services over a period of 3 years. The Attachment Behavior Q-Set (AQS; Waters, 1995) was used to assess secure base behavior and an attachment script representation task was used to assess the maternal attachment representations. Neither child's age at the time of adoption, nor age of the child at assessment significantly predicted the AQS security score; however, scores reflecting the presence and quality of maternal secure base scripts did predict AQS security. These findings support the notion that the transmission of attachment security across generations involves mutual exchanges and learning by the child and that the exchanges leading to secure attachment need not begin at birth

  12. Public key infrastructure for DOE security research

    SciTech Connect

    Aiken, R.; Foster, I.; Johnston, W.E.

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-keymore » infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.« less

  13. 75 FR 31820 - Notice of Applications for Deregistration Under Section 8(f) of the Investment Company Act of 1940

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-04

    .... Each applicant also distributed preferred shares of Dutch Auction Rate Transferable Securities (``DARTS'') of the acquiring fund to holders of applicants' Auction Rate Preferred Shares, DARTS, or Auction... distributed Dutch Auction Rate Transferable Securities (``DARTS'') of the acquiring fund to the holders of...

  14. Security of medical multimedia.

    PubMed

    Tzelepi, S; Pangalos, G; Nikolacopoulou, G

    2002-09-01

    The application of information technology to health care has generated growing concern about the privacy and security of medical information. Furthermore, data and communication security requirements in the field of multimedia are higher. In this paper we describe firstly the most important security requirements that must be fulfilled by multimedia medical data, and the security measures used to satisfy these requirements. These security measures are based mainly on modern cryptographic and watermarking mechanisms as well as on security infrastructures. The objective of our work is to complete this picture, exploiting the capabilities of multimedia medical data to define and implement an authorization model for regulating access to the data. In this paper we describe an extended role-based access control model by considering, within the specification of the role-permission relationship phase, the constraints that must be satisfied in order for the holders of the permission to use those permissions. The use of constraints allows role-based access control to be tailored to specifiy very fine-grained and flexible content-, context- and time-based access control policies. Other restrictions, such as role entry restriction also can be captured. Finally, the description of system architecture for a secure DBMS is presented.

  15. Security and SCADA protocols

    SciTech Connect

    Igure, V. M.; Williams, R. D.

    2006-07-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less

  16. Security Package for the VAX

    NASA Technical Reports Server (NTRS)

    Marks, V. J.; Benigue, C. E.

    1983-01-01

    Four programs deal with intruders and resource managment. Package available from COSMIC provides DEC VAX-11/780 with certain "deterent" security features. Although packages is not comprehensive security system, of interest for any VAX installation where security is concern.

  17. Software Security Knowledge: Training

    DTIC Science & Technology

    2011-05-01

    eliminating those erro~rs. It can be found at http:ffcwe.mitre.org/top25. Any programmer who writes C’Ode \\r-Vith~out betng aware of those proble ~ms a·nd...time on security. Ultimately, these reasons stem from an underlying problem in the software market . B~cause software is essentially a black·box, it is...security of software and start to effect change in the software market . Nevertheless, we still frequently get pushback when we advocate for security

  18. Secure Multiparty AES

    NASA Astrophysics Data System (ADS)

    Damgård, Ivan; Keller, Marcel

    We propose several variants of a secure multiparty computation protocol for AES encryption. The best variant requires 2200 + {{400}over{255}} expected elementary operations in expected 70 + {{20}over{255}} rounds to encrypt one 128-bit block with a 128-bit key. We implemented the variants using VIFF, a software framework for implementing secure multiparty computation (MPC). Tests with three players (passive security against at most one corrupted player) in a local network showed that one block can be encrypted in 2 seconds. We also argue that this result could be improved by an optimized implementation.

  19. Security, insecurity and health.

    PubMed

    Coupland, Robin

    2007-03-01

    An examination of the nexus of security, insecurity and health shows that security is a prerequisite for health. The many and varied ways that armed violence--including threats of armed violence--can affect people's health can be documented by formal studies; however, valuable data also exist in other reports, such as media reports. The health community needs to recognize that people's insecurity is a massive global health issue. The foreign policies of donor governments should incorporate recognition that documentation, analysis and publication of data describing the impact of insecurity on people's health can lead to the creation of policies to enhance people's security.

  20. Intelligent Sensors Security

    PubMed Central

    Bialas, Andrzej

    2010-01-01

    The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IEC 15408) used for IT products and systems. The paper begins with a primer on the Common Criteria, and then a general security model of the intelligent sensor as an IT product is discussed. The paper presents how the security problem of the intelligent sensor is defined and solved. The contribution of the paper is to provide Common Criteria (CC) related security design patterns and to improve the effectiveness of the sensor development process. PMID:22315571

  1. Portable appliance security apparatus

    NASA Technical Reports Server (NTRS)

    Kerley, J. J. (Inventor)

    1981-01-01

    An apparatus for securing a small computer, or other portable appliance, against theft is described. It is comprised of a case having an open back through which the computer is installed or removed. Guide members in the form of slots are formed in a rear portion of opposite walls of the case for receiving a back plate to cover the opening and thereby secure the computer within the case. An opening formed in the top wall of the case exposes the keyboard and display of the computer. The back plate is locked in the closed position by a key-operated plug type lock. The lock is attached to one end of a hold down cable, the opposite end thereof being secured to a desk top or other stationary object. Thus, the lock simultaneously secures the back plate to the case and retains the case to the stationary object.

  2. Quantum Secure Group Communication.

    PubMed

    Li, Zheng-Hong; Zubairy, M Suhail; Al-Amri, M

    2018-03-01

    We propose a quantum secure group communication protocol for the purpose of sharing the same message among multiple authorized users. Our protocol can remove the need for key management that is needed for the quantum network built on quantum key distribution. Comparing with the secure quantum network based on BB84, we show our protocol is more efficient and securer. Particularly, in the security analysis, we introduce a new way of attack, i.e., the counterfactual quantum attack, which can steal information by "invisible" photons. This invisible photon can reveal a single-photon detector in the photon path without triggering the detector. Moreover, the photon can identify phase operations applied to itself, thereby stealing information. To defeat this counterfactual quantum attack, we propose a quantum multi-user authorization system. It allows us to precisely control the communication time so that the attack can not be completed in time.

  3. Securing Cabin Baggage Act

    THOMAS, 111th Congress

    Rep. Lipinski, Daniel [D-IL-3

    2009-06-15

    House - 06/17/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  4. Transit security handbook

    DOT National Transportation Integrated Search

    1998-05-01

    This handbook has been sponsored by the Federal Transit Administration (FTA) and the Volpe National Transportation Systems Center (Volpe Center) to (1) explain the security requirements specified in FTA's State Safety Oversight Rule (49 CFR Par 659),...

  5. Cognitive Computing for Security.

    SciTech Connect

    Debenedictis, Erik; Rothganger, Fredrick; Aimone, James Bradley

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  6. Transportation security papers : 2002

    DOT National Transportation Integrated Search

    2002-01-01

    Passenger transportation usually receives more attention for safety and security than freight transportation, and since the tragic events that occurred on September 11th, 2001, passenger air transportation has been receiving a great deal of attention...

  7. Keep America Secure Act

    THOMAS, 112th Congress

    Rep. Slaughter, Louise McIntosh [D-NY-28

    2012-08-02

    House - 09/05/2012 Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. Transportation Security Administration

    MedlinePlus

    ... FAQ or factsheet. Disabilities and Medical Conditions Access important information and resources for travelers with disabilities and medical ... Official website of the Department of Homeland Security Travel Media About Contact

  9. Secure Chemical Facilities Act

    THOMAS, 113th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2013-01-23

    Senate - 01/23/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. Secure Chemical Facilities Act

    THOMAS, 111th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2010-07-15

    Senate - 07/15/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. Secure Chemical Facilities Act

    THOMAS, 112th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2011-03-31

    Senate - 03/31/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. Air Cargo Security Act

    THOMAS, 111th Congress

    Rep. Markey, Edward J. [D-MA-7

    2010-11-16

    House - 11/23/2010 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. Hospital security investigations.

    PubMed

    Houston, Keith M

    2002-01-01

    The author discusses the importance of investigation in the hospital setting and how to conduct a good investigation. A security investigation in the healthcare field, he says, may be quite different from one in law enforcement.

  14. Secure Visas Act

    THOMAS, 111th Congress

    Rep. Smith, Lamar [R-TX-21

    2010-03-04

    House - 04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  15. Secure quantum key distribution

    NASA Astrophysics Data System (ADS)

    Lo, Hoi-Kwong; Curty, Marcos; Tamaki, Kiyoshi

    2014-08-01

    Secure communication is crucial in the Internet Age, and quantum mechanics stands poised to revolutionize cryptography as we know it today. In this Review, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After briefly introducing recent experimental progress and challenges, we survey the latest developments in quantum hacking and countermeasures against it.

  16. Security: Individuals and Leviathans

    DTIC Science & Technology

    2013-05-20

    What is human security and how does it fit in the current world order? The United Nations (UN) proposed human security in 1994 at the end of the Cold... world orders established by Western nations, from the Treaty of Westphalia to the UN, suggesting these have been inadequate leviathans. The argument...the globe, when and where they can. However, as the world becomes more multipolar, these Western liberal nations are likely to be restrained from

  17. Security Force Assistance

    DTIC Science & Technology

    2009-05-01

    Group 8-59. Cultures may be individualistic or collectivist in their orientation. An individualist culture is one in which the ties between...individuals are loose—where people are expected to take care of themselves and their immediate families. In a collectivist culture , people are raised from...foreign security forces and their population. Conducting successful security force assistance requires adaptive units led by well- informed, culturally

  18. Data port security lock

    DOEpatents

    Quinby, Joseph D [Albuquerque, NM; Hall, Clarence S [Albuquerque, NM

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  19. France and European Security

    DTIC Science & Technology

    1986-04-01

    block number) In the 1960s, French defense policy emphasized the protection of French territory rather than the collective security of France and her... France and her European allies. This began to change in the late 1970s. The French contribution to European security is now a matter of considerable...independence. He interpreted independence in a specific manner. Although France would maintain ties and commitments to its allies, the French government

  20. Security systems engineering overview

    NASA Astrophysics Data System (ADS)

    Steele, Basil J.

    1997-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.

  1. [Food security in Mexico].

    PubMed

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance.

  2. Security systems engineering overview

    SciTech Connect

    Steele, B.J.

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, andmore » counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).« less

  3. Port Security in the Persian Gulf

    DTIC Science & Technology

    2008-06-01

    drafters of ISPS for secure, standardized documents to be issued to the world’s merchant seamen, another arm of the UN, the International Labour ...Revised), 2003," International Labour Organization, http://www.ilo.org/ilolex/cgi-lex/convde.pl?C185 (accessed March 11, 2008). 5 The convention has...identity documents for a particularly impoverished portion of their workforce . 2. MTSA (2002) and SAFE-Port (2006) The two primary pieces of

  4. Roadmap on optical security

    NASA Astrophysics Data System (ADS)

    Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam

    2016-08-01

    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections

  5. [Primary care in Belgium].

    PubMed

    Sánchez-Sagrado, T

    2017-09-01

    Belgium is an attractive country to work in, not just for doctors but for all Spanish workers, due to it having the headquarters of European Union. The health job allure is double; on the one hand, the opportunity to find a decent job, and on the other, because it is possible to develop their professional abilities with patients of the same nationality in a health system with a different way of working. The Belgium health care system is based on security social models. Health care is financed by the government, social security contributions, and voluntary private health insurance. Primary care in Belgium is very different to that in Spain. Citizens may freely choose their doctor (general practitioner or specialist) increasing the lack of coordination between primary and specialized care. This leads to serious patient safety problems and loss of efficiency within the system. Belgium is a European country with room to improve preventive coverage. General practitioners are self-employed professionals with free choice of setting, and their salary is linked to their professional activity. Ambulatory care is subjected to co-payment, and this fact leads to great inequities on access to care. The statistics say that there is universal coverage but, in 2010, 14% of the population did not seek medical contact due to economic problems. It takes 3 years to become a General Practitioner and continuing medical education is compulsory to be revalidated. In general, Belgian and Spaniards living and working in Belgium are happy with the functioning of the health care system. However, as doctors, we should be aware that it is a health care system in which access is constrained for some people, and preventive coverage could be improved. Copyright © 2016 Sociedad Española de Médicos de Atención Primaria (SEMERGEN). Publicado por Elsevier España, S.L.U. All rights reserved.

  6. Cryptography for Big Data Security

    DTIC Science & Technology

    2015-07-13

    Cryptography for Big Data Security Book Chapter for Big Data: Storage, Sharing, and Security (3S) Distribution A: Public Release Ariel Hamlin1 Nabil...Email: arkady@ll.mit.edu ii Contents 1 Cryptography for Big Data Security 1 1.1 Introduction...48 Chapter 1 Cryptography for Big Data Security 1.1 Introduction With the amount

  7. Building a Secure Library System.

    ERIC Educational Resources Information Center

    Benson, Allen C.

    1998-01-01

    Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…

  8. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  9. MYSEA: The Monterey Security Architecture

    DTIC Science & Technology

    2009-01-01

    Security and Protection, Organization and Design General Terms: Design; Security Keywords: access controls, authentication, information flow controls...Applicable environments include: mil- itary coalitions, agencies and organizations responding to security emergencies, and mandated sharing in business ...network architecture affords users the abil- ity to securely access information across networks at dif- ferent classifications using standardized

  10. A Portable Computer Security Workshop

    ERIC Educational Resources Information Center

    Wagner, Paul J.; Phillips, Andrew T.

    2006-01-01

    We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education to IT professionals and students. It is effective in communicating basic computer security principles…

  11. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    NASA Technical Reports Server (NTRS)

    1985-01-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  12. Gross anatomy of network security

    NASA Technical Reports Server (NTRS)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  13. The Water Security Hydra

    NASA Astrophysics Data System (ADS)

    Lall, U.

    2017-12-01

    As the editor of a new journal on water security, I have been pondering what it can mean theoretically and practically. At one level, it is pretty aobvious that it refers to the ability to affordably and reliably access water of appropriate quality, and to be protected from the water related ravages of nature, such as floods, droughts and water borne disease. The concept of water security can apply to a family, a company, a state or globally. Of course, since we value the environment, water security embraces the needs of the environment. Where, we consider economic development or energy production, water security also emerges as a critical factor. So, in short it touches almost all things about water that pertain to our lives. New stresses are created by a changing climate, growing populations and an ever changing society, economic activity and environment. Thus, if assuring water security is a goal at any of the scales of interest, many factors need to be considered, and what can really be assured, where and for how long emerges as an interesting question. Local (place, time, individuals, politics) as well as global (climate, economics, hydrology) factors interact to determine outcomes, not all of which are readily mapped in our mathematical or cognitive models to a functional notion of what constitutes security in the face of changing conditions and actors. Further, assurance implies going beyond characterization to developing actions, responses to stressors and risk mitigation strategies. How these perform in the short and long run, and what are the outcomes and strategies for impact mitigation in the event of failure then determines water security. Recognizing that providing assurance of water security has always been the goal of water management, regulation and development, perhaps the challenge is to understand what this means from the perspective of not just the "water managers" but the individuals who are the unwitting beneficiaries, or the instruments for

  14. Practical secure quantum communications

    NASA Astrophysics Data System (ADS)

    Diamanti, Eleni

    2015-05-01

    We review recent advances in the field of quantum cryptography, focusing in particular on practical implementations of two central protocols for quantum network applications, namely key distribution and coin flipping. The former allows two parties to share secret messages with information-theoretic security, even in the presence of a malicious eavesdropper in the communication channel, which is impossible with classical resources alone. The latter enables two distrustful parties to agree on a random bit, again with information-theoretic security, and with a cheating probability lower than the one that can be reached in a classical scenario. Our implementations rely on continuous-variable technology for quantum key distribution and on a plug and play discrete-variable system for coin flipping, and necessitate a rigorous security analysis adapted to the experimental schemes and their imperfections. In both cases, we demonstrate the protocols with provable security over record long distances in optical fibers and assess the performance of our systems as well as their limitations. The reported advances offer a powerful toolbox for practical applications of secure communications within future quantum networks.

  15. Biological and Chemical Security

    SciTech Connect

    Fitch, P J

    2002-12-19

    The LLNL Chemical & Biological National Security Program (CBNP) provides science, technology and integrated systems for chemical and biological security. Our approach is to develop and field advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons. Recent events show the importance of civilian defense against terrorism. The 1995 nerve gas attack in Tokyo's subway served to catalyze and focus the early LLNL program on civilian counter terrorism. In the same year, LLNL began CBNP using Laboratory-Directed R&D investments and a focus on biodetection. The Nunn-Lugar-Domenici Defensemore » Against Weapons of Mass Destruction Act, passed in 1996, initiated a number of U.S. nonproliferation and counter-terrorism programs including the DOE (now NNSA) Chemical and Biological Nonproliferation Program (also known as CBNP). In 2002, the Department of Homeland Security was formed. The NNSA CBNP and many of the LLNL CBNP activities are being transferred as the new Department becomes operational. LLNL has a long history in national security including nonproliferation of weapons of mass destruction. In biology, LLNL had a key role in starting and implementing the Human Genome Project and, more recently, the Microbial Genome Program. LLNL has over 1,000 scientists and engineers with relevant expertise in biology, chemistry, decontamination, instrumentation, microtechnologies, atmospheric modeling, and field experimentation. Over 150 LLNL scientists and engineers work full time on chemical and biological national security projects.« less

  16. IPv6 Security

    NASA Astrophysics Data System (ADS)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  17. Secure provision of reactive power ancillary services in competitive electricity markets

    NASA Astrophysics Data System (ADS)

    El-Samahy, Ismael

    The research work presented in this thesis discusses various complex issues associated with reactive power management and pricing in the context of new operating paradigms in deregulated power systems, proposing appropriate policy solutions. An integrated two-level framework for reactive power management is set forth, which is both suitable for a competitive market and ensures a secure and reliable operation of the associated power system. The framework is generic in nature and can be adopted for any electricity market structure. The proposed hierarchical reactive power market structure comprises two stages: procurement of reactive power resources on a seasonal basis, and real-time reactive power dispatch. The main objective of the proposed framework is to provide appropriate reactive power support from service providers at least cost, while ensuring a secure operation of the power system. The proposed procurement procedure is based on a two-step optimization model. First, the marginal benefits of reactive power supply from each provider, with respect to system security, are obtained by solving a loadability-maximization problem subject to transmission security constraints imposed by voltage and thermal limits. Second, the selected set of generators is determined by solving an optimal power flow (OPF)-based auction. This auction maximizes a societal advantage function comprising generators' offers and their corresponding marginal benefits with respect to system security, and considering all transmission system constraints. The proposed procedure yields the selected set of generators and zonal price components, which would form the basis for seasonal contracts between the system operator and the selected reactive power service providers. The main objective of the proposed reactive power dispatch model is to minimize the total payment burden on the Independent System Operator (ISO), which is associated with reactive power dispatch. The real power generation is

  18. Martime Security: Ferry Security Measures Have Been Implemented, but Evaluating Existing Studies Could Further Enhance Security

    DTIC Science & Technology

    2010-12-01

    relevant requirements, analyzed 2006 through 2009 security operations data, interviewed federal and industry officials, and made observations at five...warranted, acted on all findings and recommendations resulting from five agency- contracted studies on ferry security completed in 2005 and 2006 ...Figure 5: Security Deficiencies by Vessel Type, 2006 through 2009 27 Figure 6: Security Deficiencies by Facility Type, 2006 through 2009 28

  19. Technology Empowerment: Security Challenges.

    SciTech Connect

    Warren, Drake Edward; Backus, George A.; Jones, Wendell

    “Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment willmore » continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.« less

  20. Unfalsifiability of security claims.

    PubMed

    Herley, Cormac

    2016-06-07

    There is an inherent asymmetry in computer security: Things can be declared insecure by observation, but not the reverse. There is no observation that allows us to declare an arbitrary system or technique secure. We show that this implies that claims of necessary conditions for security (and sufficient conditions for insecurity) are unfalsifiable. This in turn implies an asymmetry in self-correction: Whereas the claim that countermeasures are sufficient is always subject to correction, the claim that they are necessary is not. Thus, the response to new information can only be to ratchet upward: Newly observed or speculated attack capabilities can argue a countermeasure in, but no possible observation argues one out. Further, when justifications are unfalsifiable, deciding the relative importance of defensive measures reduces to a subjective comparison of assumptions. Relying on such claims is the source of two problems: once we go wrong we stay wrong and errors accumulate, and we have no systematic way to rank or prioritize measures.

  1. Secure medical digital libraries.

    PubMed

    Papadakis, I; Chrissikopoulos, V; Polemi, D

    2001-12-01

    In this paper, a secure medical digital library is presented. It is based on the CORBA specifications for distributed systems. The described approach relies on a three-tier architecture. Interaction between the medical digital library and its users is achieved through a Web server. The choice of employing Web technology for the dissemination of medical data has many advantages compared to older approaches, but also poses extra requirements that need to be fulfilled. Thus, special attention is paid to the distinguished nature of such medical data, whose integrity and confidentiality should be preserved at all costs. This is achieved through the employment of Trusted Third Parties (TTP) technology for the support of the required security services. Additionally, the proposed digital library employs smartcards for the management of the various security tokens that are used from the above services.

  2. Secure content objects

    DOEpatents

    Evans, William D [Cupertino, CA

    2009-02-24

    A secure content object protects electronic documents from unauthorized use. The secure content object includes an encrypted electronic document, a multi-key encryption table having at least one multi-key component, an encrypted header and a user interface device. The encrypted document is encrypted using a document encryption key associated with a multi-key encryption method. The encrypted header includes an encryption marker formed by a random number followed by a derivable variation of the same random number. The user interface device enables a user to input a user authorization. The user authorization is combined with each of the multi-key components in the multi-key encryption key table and used to try to decrypt the encrypted header. If the encryption marker is successfully decrypted, the electronic document may be decrypted. Multiple electronic documents or a document and annotations may be protected by the secure content object.

  3. Ethics and European security

    SciTech Connect

    Paskins, B.

    1986-01-01

    The alliance between the United States and her NATO partners has been strained severely in the last few years. American perceptions of European disloyalty and European impressions of American assertiveness and lack of judgment have played a large part in generating tensions between the allies and emphasising the new peace movements. This book is an attempt to develop a broader understanding of the problem of European security based on Christian ethics. There are disagreements and differences of emphasis among the contributors but they have in common the view that an exclusive preoccupation with the military dimension is damagingly one-sided. Insteadmore » the contributors argue that moral and theological concerns are a vital part of the politics and mechanics of European security and must be incorporated in any effort to devise new policies for security in Europe and the West.« less

  4. Security System Software

    NASA Technical Reports Server (NTRS)

    1993-01-01

    C Language Integration Production System (CLIPS), a NASA-developed expert systems program, has enabled a security systems manufacturer to design a new generation of hardware. C.CURESystem 1 Plus, manufactured by Software House, is a software based system that is used with a variety of access control hardware at installations around the world. Users can manage large amounts of information, solve unique security problems and control entry and time scheduling. CLIPS acts as an information management tool when accessed by C.CURESystem 1 Plus. It asks questions about the hardware and when given the answer, recommends possible quick solutions by non-expert persons.

  5. Climate change and security.

    PubMed

    Rogers, Paul

    2009-04-01

    Climate change was originally expected to have its main impact on countries in temperate latitudes which, because of their relative wealth, would be best able to cope. It is now far more likely that much poorer states in the tropics and sub-tropics will experience severe impacts. This is compounded by the widening socioeconomic divide and the combination of these divisions, with environmental constraints, will have a profound impact on human security. The dangerous response to the prospects of mass migration and radical social movements is to attempt to maintain control without addressing underlying problems. Instead, there is an urgent need to embrace new concepts of sustainable security.

  6. Strategy for IT Security

    NASA Technical Reports Server (NTRS)

    Santiago, S. Scott; Moyles, Thomas J. (Technical Monitor)

    2001-01-01

    This viewgraph presentation provides information on the importance of information technology (IT) security (ITS) to NASA's mission. Several points are made concerning the subject. In order for ITS to be successful, it must be supported by management. NASA, while required by law to keep the public informed of its pursuits, must take precautions due to possible IT-based incursions by computer hackers and other malignant persons. Fear is an excellent motivation for establishing and maintaining a robust ITS policy. The ways in which NASA ITS personnel continually increase security are manifold, however a great deal relies upon the active involvement of the entire NASA community.

  7. Hyperthyroidism (primary)

    PubMed Central

    2008-01-01

    Introduction Hyperthyroidism is characterised by high levels of serum thyroxine and triiodothyronine, and low levels of thyroid-stimulating hormone. The main causes of hyperthyroidism are Graves' disease, toxic multinodular goitre, and toxic adenoma. About 20 times more women than men have hyperthyroidism. Methods and outcomes We conducted a systematic review and aimed to answer the following clinical questions: What are the effects of drug treatments for primary hyperthyroidism? What are the effects of surgical treatments for primary hyperthyroidism? What are the effects of treatments for subclinical hyperthyroidism? We searched: Medline, Embase, The Cochrane Library and other important databases up to June 2007 (BMJ Clinical Evidence reviews are updated periodically, please check our website for the most up-to-date version of this review). We included harms alerts from relevant organisations such as the US Food and Drug Administration (FDA) and the UK Medicines and Healthcare products Regulatory Agency (MHRA). Results We found 14 systematic reviews, RCTs, or observational studies that met our inclusion criteria. We performed a GRADE evaluation of the quality of evidence for interventions. Conclusions In this systematic review we present information relating to the effectiveness and safety of the following interventions: adding thyroxine to antithyroid drugs (carbimazole, propylthiouracil, and thiamazole), antithyroid drugs (carbimazole, propylthiouracil, and thiamazole), radioactive iodine, and thyroidectomy. PMID:19450325

  8. Hyperthyroidism (primary)

    PubMed Central

    2010-01-01

    Introduction Hyperthyroidism is characterised by high levels of serum thyroxine and triiodothyronine, and low levels of thyroid-stimulating hormone. The main causes of hyperthyroidism are Graves' disease, toxic multinodular goitre, and toxic adenoma. About 20 times more women than men have hyperthyroidism. Methods and outcomes We conducted a systematic review and aimed to answer the following clinical questions: What are the effects of drug treatments for primary hyperthyroidism? What are the effects of surgical treatments for primary hyperthyroidism? What are the effects of treatments for subclinical hyperthyroidism? We searched: Medline, Embase, The Cochrane Library, and other important databases up to February 2010 (Clinical Evidence reviews are updated periodically, please check our website for the most up-to-date version of this review). We included harms alerts from relevant organisations such as the US Food and Drug Administration (FDA) and the UK Medicines and Healthcare products Regulatory Agency (MHRA). Results We found 15 systematic reviews, RCTs, or observational studies that met our inclusion criteria. We performed a GRADE evaluation of the quality of evidence for interventions. Conclusions In this systematic review we present information relating to the effectiveness and safety of the following interventions: adding thyroxine to antithyroid drugs (carbimazole, propylthiouracil, and thiamazole), antithyroid drugs (carbimazole, propylthiouracil, and thiamazole), radioactive iodine, and thyroidectomy. PMID:21418670

  9. Security architecture for HL/7 message interchange.

    PubMed

    Chen, T S; Liao, B S; Lin, M G; Gough, T G

    2001-01-01

    The promotion of quality medical treatment is very important to the healthcare providers as well as to patients. It requires that the medical resources of different hospitals be combined to ensure that medical information is shared and that resources are not wasted. A computer-based patient record is one of the best methods to accomplish the interchange of the patient's clinical data. In our system, the Health Level/Seven (HL/7) format is used for the interchange of the clinical data, as it has been supported by many healthcare providers and become a â standard'. The security of the interchange of clinical data is a serious issue for people using the Internet for data communication. Several international well-developed security algorithms, models and secure policies are adopted in the design of a security handler for an HL/7 architecture. The goal of our system is to combine our security system with the end-to-end communication systems constructed from the HL/7 format to establish a safe delivery channel. A suitable security interchange environment is implemented to address some shortcomings in clinical data interchange. located at the application layer of the ISO/OSI reference model. The medical message components, sub-components, and related types of message event are the primary goals of the HL/7 protocols. The patient management system, the doctor's system for recording his advice, examination and diagnosis as well as any financial management system are all covered by the HL/7 protocols. Healthcare providers and hospitals in Taiwan are very interested in developing the HL/7 protocols as a common standard for clinical data interchange.

  10. CAS. Controlled Access Security

    SciTech Connect

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  11. Safe and Secure

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2010-01-01

    The education headlines have been filled with grim news about facility closings, teacher layoffs and program cutbacks. When the economic climate is gloomy, few areas of schools and universities are spared. In areas outside the classroom, such as safety and security, the cuts may be larger and come more quickly. When money is scarce, education…

  12. Secure Embedded Systems

    DTIC Science & Technology

    2016-02-26

    UAS) to illustrate how we use cryptography to ensure confidentiality and integrity. Using this example, we demonstrate the identification of...potential attack targets by considering the CONOPS, the development of countermeasures to these attacks, and the design and implementation of a cryptography ...based security architecture. Because cryptography does not directly enable availability, we also provide insight into the ongoing research that

  13. Energy and National Security

    ERIC Educational Resources Information Center

    Abelson, Philip H.

    1973-01-01

    Discussed in this editorial is the need for a broad and detailed government policy on energy use. Oil companies can not be given complete responsibility to demonstrate usage of different energy sources. The government should construct plants because energy is connected with national security. (PS)

  14. Today's School Security

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2012-01-01

    Outbreaks of violence at education institutions typically do not rise to the horrific levels of Virginia Tech, Columbine High School, or Oikos University. But incidents that threaten school security--bullying, hazing, online harassment--take place in every month of the year and may occur in any classroom or campus from coast to coast. Schools and…

  15. Safe and Secure

    ERIC Educational Resources Information Center

    Cavanagh, Sean

    2004-01-01

    Since the Sept. 11, 2001, terrorist attacks, student interest in school programs dealing with careers in law, public safety, and national security is on the rise. This article describes students' experiences at the Academy for Law and Public Safety at Butler High School in Butler, New Jersey. This vocational academy is one of a number of career…

  16. Metaphors for cyber security.

    SciTech Connect

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a varietymore » of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).« less

  17. SLAC Site Security

    Science.gov Websites

    Information Badging Information Foreign National Requirements SLAC Internal Gate Information Site Entry Form this is a SLAC-Internal page for videos on how to use the automated gates. Security Assistance The Main and holidays. See Gate Information this is a SLAC-Internal page for more information about the

  18. A network security monitor

    SciTech Connect

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.

    1989-11-01

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, ourmore » work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.« less

  19. [Biological security confronting bioterrorism].

    PubMed

    Suárez Fernández, Guillermo

    2002-01-01

    A review is made on Biosecurity at both local and global level in relationship with Bioterrorism as a real threat and its control and prevention. The function of the network of High Security Laboratories around the world able to make immediate diagnosis, research on vaccines, fundamental and urgent epidemiological studies, conform a steady basis to control natural infections and also the possible bioterrorism attacks.

  20. Negligence in Visitor Security.

    ERIC Educational Resources Information Center

    Dwyer, William O.; Murrell, Dan S.

    1985-01-01

    The park administrator's responsibility in providing security for park visitors through prevention strategies and law enforcement is discussed. Types of negligence are indicated, practice recommendations are made, and evaluative criteria for personnel selection and training are offered. Reference is made to the General Accounting Office Report and…