Sample records for securities primary auctions

  1. 31 CFR 356.5 - What types of securities does the Treasury auction?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... securities. (a) Treasury bills. (1) Are issued at a discount or at par, depending upon the auction results; (2) Are redeemed at their par amount at maturity; and (3) Have maturities of not more than one year... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false What types of securities does the...

  2. 31 CFR 356.5 - What types of securities does the Treasury auction?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... securities. (a) Treasury bills. (1) Are issued at a discount or at par, depending upon the auction results; (2) Are redeemed at their par amount at maturity; and (3) Have maturities of not more than one year... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false What types of securities does the...

  3. 31 CFR 356.5 - What types of securities does the Treasury auction?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... securities. (a) Treasury bills. (1) Are issued at a discount or at par, depending upon the auction results; (2) Are redeemed at their par amount at maturity; and (3) Have maturities of not more than one year... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false What types of securities does the...

  4. 31 CFR 356.5 - What types of securities does the Treasury auction?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... securities. (a) Treasury bills. (1) Are issued at a discount or at par, depending upon the auction results; (2) Are redeemed at their par amount at maturity; and (3) Have maturities of not more than one year... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false What types of securities does the...

  5. Security analysis with improved design of post-confirmation mechanism for quantum sealed-bid auction with single photons

    NASA Astrophysics Data System (ADS)

    Zhang, Ke-Jia; Kwek, Leong-Chuan; Ma, Chun-Guang; Zhang, Long; Sun, Hong-Wei

    2018-02-01

    Quantum sealed-bid auction (QSA) has been widely studied in quantum cryptography. For a successful auction, post-confirmation is regarded as an important mechanism to make every bidder verify the identity of the winner after the auctioneer has announced the result. However, since the auctioneer may be dishonest and collude with malicious bidders in practice, some potential loopholes could exist. In this paper, we point out two types of collusion attacks for a particular post-confirmation technique with EPR pairs. And it is not difficult to see that there exists no unconditionally secure post-confirmation mechanism in the existing QSA model, if the dishonest participants have the ability to control multiparticle entanglement. In the view of this, we note that some secure implementation could exist if the participants are supposed to be semi-quantum, i.e., they can only control single photons. Finally, two potential methods to design post-confirmation mechanism are presented in this restricted scenario.

  6. Improving the secrecy rate by turning foes to allies: An auction scheme

    NASA Astrophysics Data System (ADS)

    Ma, Ya-Yan; Wang, Bao-Yun

    2015-09-01

    Security against eavesdroppers is a critical issue in cognitive radio networks (CRNs). In this paper, a scenario consisting of one primary pair and multiple secondary pairs is considered. The secondary transmitters (STs) work in half-duplex mode and they are potential eavesdroppers on the primary transmission unless they are allowed to simultaneously transmit with the primary transmitter (PT). A modified second-price sealed-bid auction scheme is employed to model the interaction between the PT and STs. With the proposed auction scheme, the hostile relationship between the PT and STs is transformed into a cooperative relationship. An iterative algorithm based on the max-min criteria is proposed to find the optimal bidding power of the STs for an access chance in the presence of multiple eavesdroppers. Numerical results show that the proposed auction scheme not only improves the PT’s security but also increases the access opportunities of the STs. Project supported by the National Natural Science Foundation of China (Grant Nos. 61271232 and 61372126) and the University Postgraduate Research and Innovation Project in Jiangsu Province, China (Grant No. CXZZ12-0472).

  7. Auction-based Security Game for Multiuser Cooperative Networks

    NASA Astrophysics Data System (ADS)

    Wang, An; Cai, Yueming; Yang, Wendong; Cheng, Yunpeng

    2013-04-01

    In this paper, we develop an auction-based algorithm to allocate the relay power efficiently to improve the system secrecy rate in a cooperative network, where several source-destination pairs and one cooperative relay are involved. On the one hand, the cooperative relay assists these pairs to transmit under a peak power constraint. On the other hand, the relay is untrusty and is also a passive eavesdropper. The whole auction process is completely distributed and no instantaneous channel state information exchange is needed. We also prove the existence and uniqueness of the Nash Equilibrium (NE) for the proposed power auction game. Moreover, the Pareto optimality is also validated. Simulation results show that our proposed auction-based algorithm can effectively improve the system secrecy rate. Besides, the proposed auction-based algorithm can converge to the unique NE point within a finite number of iterations. More interestingly, we also find that the proposed power auction mechanism is cheat-proof.

  8. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... in which auctioned Treasury securities may be issued? There are three book-entry securities systems... marketable Treasury securities. We maintain and transfer securities in these three book-entry systems at... inflation. Securities may be transferred from one system to the other, unless the securities are not...

  9. 19 CFR 127.34 - Auctioneer's commissions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Auctioneer's commissions. 127.34 Section 127.34 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY GENERAL ORDER, UNCLAIMED, AND ABANDONED MERCHANDISE Proceeds of Sale § 127.34 Auctioneer's...

  10. An economic and feasible Quantum Sealed-bid Auction protocol

    NASA Astrophysics Data System (ADS)

    Zhang, Rui; Shi, Run-hua; Qin, Jia-qi; Peng, Zhen-wan

    2018-02-01

    We present an economic and feasible Quantum Sealed-bid Auction protocol using quantum secure direct communication based on single photons in both the polarization and the spatial-mode degrees of freedom, where each single photon can carry two bits of classical information. Compared with previous protocols, our protocol has higher efficiency. In addition, we propose a secure post-confirmation mechanism without quantum entanglement to guarantee the security and the fairness of the auction.

  11. Multiparty Quantum English Auction Scheme Using Single Photons as Message Carrier

    NASA Astrophysics Data System (ADS)

    Liu, Ge; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-03-01

    In this paper, a secure and economic multiparty english auction protocol using the single photons as message carrier of bids is proposed. In order to achieve unconditional security, fairness, undeniability and so on, we adopt the decoy photon checking technique and quantum encryption algorithm. Analysis result shows that our protocol satisfies all the characteristics of traditional english auction, meanwhile, it can resist malicious attacks.

  12. Theoretically Founded Optimization of Auctioneer's Revenues in Expanding Auctions

    NASA Astrophysics Data System (ADS)

    Rabin, Jonathan; Shehory, Onn

    The expanding auction is a multi-unit auction which provides the auctioneer with control over the outcome of the auction by means of dynamically adding items for sale. Previous research on the expanding auction has provided a numeric method to calculate a strategy that optimizes the auctioneer's revenue. In this paper, we analyze various theoretical properties of the expanding auction, and compare it to VCG, a multi-unit auction protocol known in the art. We examine the effects of errors in the auctioneer's estimation of the buyers' maximal bidding values and prove a theoretical bound on the ratio between the revenue yielded by the Informed Decision Strategy (IDS) and the post-optimal strategy. We also analyze the relationship between the auction step and the optimal revenue and introduce a method of computing this optimizing step. We further compare the revenues yielded by the use of IDS with an expanding auction to those of the VCG mechanism and determine the conditions under which the former outperforms the latter. Our work provides new insight into the properties of the expanding auction. It further provides theoretically founded means for optimizing the revenue of auctioneer.

  13. Essays on wholesale auctions in deregulated electricity markets

    NASA Astrophysics Data System (ADS)

    Baltaduonis, Rimvydas

    2007-12-01

    The early experience in the restructured electric power markets raised several issues, including price spikes, inefficiency, security, and the overall relationship of market clearing prices to generation costs. Unsatisfactory outcomes in these markets are thought to have resulted in part from strategic generator behaviors encouraged by inappropriate market design features. In this dissertation, I examine the performance of three auction mechanisms for wholesale power markets - Offer Cost Minimization auction, Payment Cost Minimization auction and Simple-Offer auction - when electricity suppliers act strategically. A Payment Cost Minimization auction has been proposed as an alternative to the traditional Offer Cost Minimization auction with the intention to solve the problem of inflated wholesale electricity prices. Efficiency concerns for this proposal were voiced due to insights predicated on the assumption of true production cost revelation. Using a game theoretic approach and an experimental method, I compare the two auctions, strictly controlling for the level of unilateral market power. A specific feature of these complex-offer auctions is that the sellers submit not only the quantities and the minimum prices that they are willing to sell at, but also the start-up fees, which are designed to reimburse the fixed start-up costs of the generation plants. I find that the complex structure of the offers leaves considerable room for strategic behavior, which consequently leads to anti-competitive and inefficient market outcomes. In the last chapter of my dissertation, I use laboratory experiments to contrast the performance of two complex-offer auctions against the performance of a simple-offer auction, in which the sellers have to recover all their generation costs - fixed and variable - through a uniform market-clearing price. I find that a simple-offer auction significantly reduces consumer prices and lowers price volatility. It mitigates anti-competitive effects

  14. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued or maintained?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false What are the book-entry systems in... BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS... book-entry systems in which auctioned Treasury securities may be issued or maintained? There are three...

  15. 40 CFR 73.70 - Auctions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...—Allowance Schedule for Auctions Year of purchase Spot auction Advance auction Advance auction* 1993 50,000 a... for therein. (b) Timing of the auctions. The spot auction and the advance auction will be held on the... Administrator will conduct one spot auction and one advance auction in each calendar year. (c) Submittal for...

  16. 40 CFR 73.70 - Auctions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...—Allowance Schedule for Auctions Year of purchase Spot auction Advance auction Advance auction* 1993 50,000 a... for therein. (b) Timing of the auctions. The spot auction and the advance auction will be held on the... Administrator will conduct one spot auction and one advance auction in each calendar year. (c) Submittal for...

  17. 40 CFR 73.70 - Auctions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...—Allowance Schedule for Auctions Year of purchase Spot auction Advance auction Advance auction* 1993 50,000 a... for therein. (b) Timing of the auctions. The spot auction and the advance auction will be held on the... Administrator will conduct one spot auction and one advance auction in each calendar year. (c) Submittal for...

  18. 40 CFR 73.70 - Auctions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...—Allowance Schedule for Auctions Year of purchase Spot auction Advance auction Advance auction* 1993 50,000 a... for therein. (b) Timing of the auctions. The spot auction and the advance auction will be held on the... Administrator will conduct one spot auction and one advance auction in each calendar year. (c) Submittal for...

  19. 40 CFR 73.70 - Auctions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...—Allowance Schedule for Auctions Year of purchase Spot auction Advance auction Advance auction* 1993 50,000 a... for therein. (b) Timing of the auctions. The spot auction and the advance auction will be held on the... Administrator will conduct one spot auction and one advance auction in each calendar year. (c) Submittal for...

  20. A new quantum sealed-bid auction protocol with secret order in post-confirmation

    NASA Astrophysics Data System (ADS)

    Wang, Jing-Tao; Chen, Xiu-Bo; Xu, Gang; Meng, Xiang-Hua; Yang, Yi-Xian

    2015-10-01

    A new security protocol for quantum sealed-bid auction is proposed to resist the collusion attack from some malicious bidders. The most significant feature of this protocol is that bidders prepare their particles with secret order in post-confirmation for encoding bids. In addition, a new theorem and its proof are given based on the theory of combinatorial mathematics, which can be used as evaluation criteria for the collusion attack. It is shown that the new protocol is immune to the collusion attack and meets the demand for a secure auction. Compared with those previous protocols, the security, efficiency and availability of the proposed protocol are largely improved.

  1. Three essays on auction markets

    NASA Astrophysics Data System (ADS)

    Shunda, Nicholas James

    This dissertation contains a series of theoretical investigations of auction markets. The essays it contains cover wholesale electricity markets, a popular selling mechanism on eBay, and supplier entry into multi-unit procurement auctions. The study in Chapter 1 compares the procurement cost-minimizing and productive efficiency performance of the auction mechanism used by independent system operators in wholesale electricity auction markets in the U.S. with that of a proposed alternative. The current practice allocates energy contracts as if the auction featured a discriminatory final payment method when, in fact, the markets are uniform price auctions. The proposed alternative explicitly accounts for the market-clearing price during the allocation phase. We find that the proposed alternative largely outperforms the current practice on the basis of procurement costs in the context of simple auction markets featuring both day-ahead and real-time auctions and that the procurement cost advantage of the alternative is complete when we simulate the effects of increased competition. We also find that a tradeoff between the objectives of procurement cost minimization and productive efficiency emerges in our simple auction markets and persists in the face of increased competition. The study in Chapter 2 considers a possible rationale for an auction with a buy price. In an auction with a buy price, the seller provides bidders with an option to end the auction early by accepting a transaction at a posted price. The "Buy-It-Now" option on eBay is a leading example of an auction with a buy price. The study develops a model of an auction with a buy price in which bidders use the auction's reserve price and buy price to formulate a reference price. The model both explains why a revenue-maximizing seller would want to augment her auction with a buy price and demonstrates that the seller sets a higher reserve price when she can affect the bidders' reference price through the

  2. Evolutionary Dynamics of Biological Auctions

    PubMed Central

    Chatterjee, Krishnendu; Reiter, Johannes G.; Nowak, Martin A.

    2011-01-01

    Many scenarios in the living world, where individual organisms compete for winning positions (or resources), have properties of auctions. Here we study the evolution of bids in biological auctions. For each auction n individuals are drawn at random from a population of size N. Each individual makes a bid which entails a cost. The winner obtains a benefit of a certain value. Costs and benefits are translated into reproductive success (fitness). Therefore, successful bidding strategies spread in the population. We compare two types of auctions. In “biological all-pay auctions” the costs are the bid for every participating individual. In “biological second price all-pay auctions” the cost for everyone other than the winner is the bid, but the cost for the winner is the second highest bid. Second price all-pay auctions are generalizations of the “war of attrition” introduced by Maynard Smith. We study evolutionary dynamics in both types of auctions. We calculate pairwise invasion plots and evolutionarily stable distributions over the continuous strategy space. We find that the average bid in second price all-pay auctions is higher than in all-pay auctions, but the average cost for the winner is similar in both auctions. In both cases the average bid is a declining function of the number of participants, n. The more individuals participate in an auction the smaller is the chance of winning, and thus expensive bids must be avoided. PMID:22120126

  3. 31 CFR 356.20 - How does the Treasury determine auction awards?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... and bond issues. We set the interest rate at a 1/8 of one percent increment. If a Treasury inflation-protected securities auction results in a negative or zero yield, the interest rate will be set at zero, and...

  4. 75 FR 44296 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-28

    ... currently collected and made transparent by the MSRB on municipal Auction Rate Securities (``ARS'') and... MSRB on municipal Auction Rate Securities (``ARS'') and Variable Rate Demand Obligations (``VRDOs... auction procedures and interest rate setting mechanisms for ARS and liquidity facilities for VRDOs...

  5. 75 FR 52793 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ... the MSRB on municipal Auction Rate Securities (``ARS'') and Variable Rate Demand Obligations (``VRDOs... information currently collected and made transparent by the MSRB on municipal Auction Rate Securities (``ARS... that define auction procedures and interest rate setting mechanisms for ARS and liquidity facilities...

  6. 7 CFR 46.25 - Auction sales.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 2 2013-01-01 2013-01-01 false Auction sales. 46.25 Section 46.25 Agriculture... THAN RULES OF PRACTICE) UNDER THE PERISHABLE AGRICULTURAL COMMODITIES ACT, 1930 Auction Sales § 46.25 Auction sales. Commission merchants, dealers and brokers who offer produce for sale through auction...

  7. 7 CFR 46.25 - Auction sales.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 2 2012-01-01 2012-01-01 false Auction sales. 46.25 Section 46.25 Agriculture... THAN RULES OF PRACTICE) UNDER THE PERISHABLE AGRICULTURAL COMMODITIES ACT, 1930 Auction Sales § 46.25 Auction sales. Commission merchants, dealers and brokers who offer produce for sale through auction...

  8. 7 CFR 46.25 - Auction sales.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 2 2014-01-01 2014-01-01 false Auction sales. 46.25 Section 46.25 Agriculture... THAN RULES OF PRACTICE) UNDER THE PERISHABLE AGRICULTURAL COMMODITIES ACT, 1930 Auction Sales § 46.25 Auction sales. Commission merchants, dealers and brokers who offer produce for sale through auction...

  9. 7 CFR 46.25 - Auction sales.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 2 2011-01-01 2011-01-01 false Auction sales. 46.25 Section 46.25 Agriculture... THAN RULES OF PRACTICE) UNDER THE PERISHABLE AGRICULTURAL COMMODITIES ACT, 1930 Auction Sales § 46.25 Auction sales. Commission merchants, dealers and brokers who offer produce for sale through auction...

  10. China's Land Market Auctions: Evidence of Corruption?

    PubMed

    Cai, Hongbin; Henderson, J Vernon; Zhang, Qinghua

    2013-01-01

    This paper studies the urban land market in China in 2003-2007. In China, all urban land is owned by the state. Leasehold use rights for land for (re)development are sold by city governments and are a key source of city revenue. Leasehold sales are viewed as a major venue for corruption, prompting a number of reforms over the years. Reforms now require all leasehold rights be sold at public auction. There are two main types of auction: regular English auction and an unusual type which we call a "two stage auction". The latter type of auction seems more subject to corruption, and to side deals between potential bidders and the auctioneer. Absent corruption, theory suggests that two stage auctions would most likely maximize sales revenue for properties which are likely to have relatively few bidders, or are "cold", which would suggest negative selection on property unobservables into such auctions. However, if such auctions are more corruptible, that could involve positive selection as city officials divert hotter properties to a more corruptible auction form. The paper finds that, overall, sales prices are lower for two stage auctions, and there is strong evidence of positive selection. The price difference is explained primarily by the fact that two stage auctions typically have just one bidder, or no competition despite the vibrant land market in Chinese cities.

  11. Auctioning Airport Slots?

    NASA Technical Reports Server (NTRS)

    Gruyer, Nicolas; Lenoir, Nathalie

    2003-01-01

    The current allocation of slots on congested European airports constitutes an obstacle to the effective liberalisation of air transportation undertaken in Europe. With a view to favouring effluent slot utilisation and competition, as is the goal of the Euopean commission, we propose to use a market mechanism, based on temporary" utilisation licences. In order to allocate those licences, we propose and describe an iterated combinatorial auction mechanism where a percentage of licences would be reallocated each season. A secondary market would also be set up in order to reallocate slots during a season. Since a combinatorial auction involve a complex optimisation procedure, we describe how it can be made to work in the case of auctions.

  12. Sequential Auctions in Uncertain Information Settings

    NASA Astrophysics Data System (ADS)

    Fatima, Shaheen; Wooldridge, Michael; Jennings, Nicholas R.

    This paper analyzes sequential auctions for private value objects using second-price sealed-bid rules. Now, the equilibrium bids for such auctions depend on the information uncertainty of the bidders. Specifically, there are three key auction parameters that the bidders could be uncertain about: the valuations of the objects for sale, the number of objects for sale, and the number of participating bidders. We analyse the bidding behaviour for each of these three sources of uncertainty. For each setting, we first find the equilibrium bidding strategies for the individual auctions that comprise a series. Then we analyze the effect of these uncertainties on the computational and economic properties of the equilibrium solution. The former analysis is essential if we want to use software agents to bid on our behalf. The latter is essential because both the auctioneer and the bidders want to know how these uncertainties affect their profits. Thus we compare the outcomes for these settings from the perspective of the bidders (i.e., in terms of their profits), from the perspective of the auctioneer (i.e., in terms of his revenue), and from a global perspective (i.e., in terms of auction efficiency).

  13. 31 CFR 356.20 - How does the Treasury determine auction awards?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., but not above, par when evaluated at the yield of awards to successful competitive bidders. (2... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false How does the Treasury determine... the yield or discount rate for the securities we are auctioning. (2) Accepting bids at the high yield...

  14. 31 CFR 356.20 - How does the Treasury determine auction awards?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., but not above, par when evaluated at the yield of awards to successful competitive bidders. (2... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false How does the Treasury determine... the yield or discount rate for the securities we are auctioning. (2) Accepting bids at the high yield...

  15. 31 CFR 356.20 - How does the Treasury determine auction awards?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., but not above, par when evaluated at the yield of awards to successful competitive bidders. (2... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false How does the Treasury determine... the yield or discount rate for the securities we are auctioning. (2) Accepting bids at the high yield...

  16. 7 CFR 1955.148 - Auction sales.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 14 2014-01-01 2014-01-01 false Auction sales. 1955.148 Section 1955.148 Agriculture... REGULATIONS (CONTINUED) PROPERTY MANAGEMENT Disposal of Inventory Property General § 1955.148 Auction sales. This section provides guidance on the sale of all inventory property by auction, except FSA real...

  17. 7 CFR 1955.148 - Auction sales.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 14 2011-01-01 2011-01-01 false Auction sales. 1955.148 Section 1955.148 Agriculture... REGULATIONS (CONTINUED) PROPERTY MANAGEMENT Disposal of Inventory Property General § 1955.148 Auction sales. This section provides guidance on the sale of all inventory property by auction, except FSA real...

  18. 7 CFR 1955.148 - Auction sales.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 14 2012-01-01 2012-01-01 false Auction sales. 1955.148 Section 1955.148 Agriculture... REGULATIONS (CONTINUED) PROPERTY MANAGEMENT Disposal of Inventory Property General § 1955.148 Auction sales. This section provides guidance on the sale of all inventory property by auction, except FSA real...

  19. 7 CFR 1955.148 - Auction sales.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 14 2013-01-01 2013-01-01 false Auction sales. 1955.148 Section 1955.148 Agriculture... REGULATIONS (CONTINUED) PROPERTY MANAGEMENT Disposal of Inventory Property General § 1955.148 Auction sales. This section provides guidance on the sale of all inventory property by auction, except FSA real...

  20. 7 CFR 1955.148 - Auction sales.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... complexity of the sale. When the services of a professional auctioneer are advisable, the services will be... 7 Agriculture 14 2010-01-01 2009-01-01 true Auction sales. 1955.148 Section 1955.148 Agriculture... REGULATIONS (CONTINUED) PROPERTY MANAGEMENT Disposal of Inventory Property General § 1955.148 Auction sales...

  1. Exploring Online Auction Behaviors and Motivations

    ERIC Educational Resources Information Center

    Jeon, Sua; Crutsinger, Christy; Kim, Haejung

    2008-01-01

    The availability and convenience of the Internet, combined with the variety of products available at any given time, have contributed to the success of online auctions.This exploratory study examined online auction behaviors among college students in an attempt to identify underlying dimensions of auction motivations. Questionnaires completed by…

  2. Auction-based bandwidth allocation in the Internet

    NASA Astrophysics Data System (ADS)

    Wei, Jiaolong; Zhang, Chi

    2002-07-01

    It has been widely accepted that auctioning which is the pricing approach with minimal information requirement is a proper tool to manage scare network resources. Previous works focus on Vickrey auction which is incentive compatible in classic auction theory. In the beginning of this paper, the faults of the most representative auction-based mechanisms are discussed. And then a new method called uniform-price auction (UPA), which has the simplest auction rule is proposed and it's incentive compatibility in the network environment is also proved. Finally, the basic mode is extended to support applications which require minimum bandwidth guarantees for a given time period by introducing derivative market, and a market mechanism for network resource allocation which is predictable, riskless, and simple for end-users is completed.

  3. 31 CFR 356.20 - How does the Treasury determine auction awards?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false How does the Treasury determine... margin for the securities we are auctioning. (2) Accepting bids at the high yield, discount rate, or... the remaining par amount needed to fill the offering amount by the par amount of the bids at the high...

  4. China’s Land Market Auctions: Evidence of Corruption?

    PubMed Central

    Cai, Hongbin; Henderson, J. Vernon; Zhang, Qinghua

    2013-01-01

    This paper studies the urban land market in China in 2003—2007. In China, all urban land is owned by the state. Leasehold use rights for land for (re)development are sold by city governments and are a key source of city revenue. Leasehold sales are viewed as a major venue for corruption, prompting a number of reforms over the years. Reforms now require all leasehold rights be sold at public auction. There are two main types of auction: regular English auction and an unusual type which we call a “two stage auction”. The latter type of auction seems more subject to corruption, and to side deals between potential bidders and the auctioneer. Absent corruption, theory suggests that two stage auctions would most likely maximize sales revenue for properties which are likely to have relatively few bidders, or are “cold”, which would suggest negative selection on property unobservables into such auctions. However, if such auctions are more corruptible, that could involve positive selection as city officials divert hotter properties to a more corruptible auction form. The paper finds that, overall, sales prices are lower for two stage auctions, and there is strong evidence of positive selection. The price difference is explained primarily by the fact that two stage auctions typically have just one bidder, or no competition despite the vibrant land market in Chinese cities. PMID:25506125

  5. 77 FR 38803 - Mobility Fund Phase I Auction Updated Data For Auction 901

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-29

    ... FEDERAL COMMUNICATIONS COMMISSION [AU Docket No. 12-25; DA 12-990] Mobility Fund Phase I Auction Updated Data For Auction 901 AGENCY: Federal Communications Commission. ACTION: Notice. SUMMARY: In this... blocks. The map is a visual representation of data from the Attachment A files, which contain more...

  6. 29 CFR 780.617 - Adjunct livestock auction operations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Adjunct livestock auction operations. 780.617 Section 780... Employment in Agriculture and Livestock Auction Operations Under the Section 13(b)(13) Exemption Requirements for Exemption § 780.617 Adjunct livestock auction operations. The livestock auction operations...

  7. 12 CFR 619.9260 - Primary security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Primary security. 619.9260 Section 619.9260 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9260 Primary security. The basic collateral securing the loan. ...

  8. 12 CFR 619.9260 - Primary security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Primary security. 619.9260 Section 619.9260 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9260 Primary security. The basic collateral securing the loan. ...

  9. Auction-theoretic analyses of the first offshore wind energy auction in Germany

    NASA Astrophysics Data System (ADS)

    Kreiss, J.; Ehrhart, K.-M.; Hanke, A.-K.

    2017-11-01

    The first offshore wind energy auction in Germany led to a striking result. The average award price was 0.44 ct/kWh and even more interesting, 3 out of 4 awarded projects had a strike price of 0.0 ct/kWh. That implies that those projects will only receive the actual wholesale market price for electricity as revenue. Although there has been a strong decline in costs of offshore wind projects, such a result is still surprising. We analyzed this result auction-theoretically and showed how the auction design and the market environment can explain part of the outcome. However, another aspect of the explanation is the high risk that the awarded bidders take regarding the future development of both the project costs and the wholesale market price.

  10. 77 FR 57085 - Mobility Fund Phase I Auction; Release of Files with Recalculated Road Miles for Auction 901...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... FEDERAL COMMUNICATIONS COMMISSION [AU Docket No. 12-25; DA 12-1446] Mobility Fund Phase I Auction... Mobility Fund Phase I support to be offered in Auction 901, which is to be held on September 27, 2012, and the change of the mock auction date from September 25, 2012 to September 21, 2012. DATES: The mock...

  11. Sequential Auctions with Partially Substitutable Goods

    NASA Astrophysics Data System (ADS)

    Vetsikas, Ioannis A.; Jennings, Nicholas R.

    In this paper, we examine a setting in which a number of partially substitutable goods are sold in sequential single unit auctions. Each bidder needs to buy exactly one of these goods. In previous work, this setting has been simplified by assuming that bidders do not know their valuations for all items a priori, but rather are informed of their true valuation for each item right before the corresponding auction takes place. This assumption simplifies the strategies of bidders, as the expected revenue from future auctions is the same for all bidders due to the complete lack of private information. In our analysis we don't make this assumption. This complicates the computation of the equilibrium strategies significantly. We examine this setting both for first and second-price auction variants, initially when the closing prices are not announced, for which we prove that sequential first and second-price auctions are revenue equivalent. Then we assume that the prices are announced; because of the asymmetry in the announced prices between the two auction variants, revenue equivalence does not hold in this case. We finish the paper, by giving some initial results about the case when free disposal is allowed, and therefore a bidder can purchase more than one item.

  12. Internet Auction Sellers: Does Size Really Matter?

    ERIC Educational Resources Information Center

    Halstead, Diane; Becherer, Richard C.

    2003-01-01

    Examines the Internet auction phenomenon as it relates to the marketing mix of online auction sellers. The data indicate that, while there is great diversity among businesses that utilize online auctions, distinct cost leadership and differentiation marketing strategies are both evident. These two approaches are further distinguished in terms of…

  13. Anonymous, Yet Trustworthy Auctions

    NASA Astrophysics Data System (ADS)

    Chanda, Prasit Bikash; Naessens, Vincent; de Decker, Bart

    An auction is an inevitable market mechanism to setup prices of goods or services in a competitive and dynamic environment. Anonymity of bidders is required to conceal their business strategies from competitors. However, it is also essential to provide the seller guarantees that a bidder is trustworthy and competent enough to perform certain tasks (e.g transports). This paper proposes an auction protocol where bidders will participate anonymously, yet prove to be trustworthy and competent and can be held accountable towards auctioneers and sellers. Moreover, the protocol introduces promises, bonuses and compensations to ensure the best price for the sellers, extra profit for bidders and opportunities for newcomers in the business. It also handles ties, and copes with last minute bidding. Finally, the auction’s fair proceedings and outcome can be verified by everyone.

  14. 31 CFR 356.23 - How are the auction results announced?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false How are the auction results announced...-93) Determination of Auction Awards; Settlement § 356.23 How are the auction results announced? (a) After the conclusion of the auction, we will announce the auction results through a press release that...

  15. 31 CFR 356.23 - How are the auction results announced?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false How are the auction results announced...) Determination of Auction Awards; Settlement § 356.23 How are the auction results announced? (a) After the conclusion of the auction, we will announce the auction results through a press release that is available on...

  16. 31 CFR 356.23 - How are the auction results announced?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false How are the auction results announced...) Determination of Auction Awards; Settlement § 356.23 How are the auction results announced? (a) After the conclusion of the auction, we will announce the auction results through a press release that is available on...

  17. 31 CFR 356.23 - How are the auction results announced?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false How are the auction results announced...) Determination of Auction Awards; Settlement § 356.23 How are the auction results announced? (a) After the conclusion of the auction, we will announce the auction results through a press release that is available on...

  18. Health Auctions: a Valuation Experiment (HAVE) study protocol.

    PubMed

    Kularatna, Sanjeewa; Petrie, Dennis; Scuffham, Paul A; Byrnes, Joshua

    2016-04-07

    Quality-adjusted life years are derived using health state utility weights which adjust for the relative value of living in each health state compared with living in perfect health. Various techniques are used to estimate health state utility weights including time-trade-off and standard gamble. These methods have exhibited limitations in terms of complexity, validity and reliability. A new composite approach using experimental auctions to value health states is introduced in this protocol. A pilot study will test the feasibility and validity of using experimental auctions to value health states in monetary terms. A convenient sample (n=150) from a population of university staff and students will be invited to participate in 30 auction sets with a group of 5 people in each set. The 9 health states auctioned in each auction set will come from the commonly used EQ-5D-3L instrument. At most participants purchase 2 health states, and the participant who acquires the 2 'best' health states on average will keep the amount of money they do not spend in acquiring those health states. The value (highest bid and average bid) of each of the 24 health states will be compared across auctions to test for reliability across auction groups and across auctioneers. A test retest will be conducted for 10% of the sample to assess reliability of responses for health states auctions. Feasibility of conducting experimental auctions to value health states will also be examined. The validity of estimated health states values will be compared with published utility estimates from other methods. This pilot study will explore the feasibility, reliability and validity in using experimental auction for valuing health states. Ethical clearance was obtained from Griffith University ethics committee. The results will be disseminated in peer-reviewed journals and major international conferences. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a

  19. 76 FR 81932 - Auction of FM Broadcast Construction Permits; Revised Construction Permit Number in Auction 93

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ... Construction Permits; Revised Construction Permit Number in Auction 93 AGENCY: Federal Communications Commission. ACTION: Notice. SUMMARY: This document announces a change to the construction permit number for one of the FM broadcast construction permits for Auction 93. FOR FURTHER INFORMATION CONTACT: Linda...

  20. Auction Mechanism to Allocate Air Traffic Control Slots

    NASA Technical Reports Server (NTRS)

    Raffarin, Marianne

    2003-01-01

    This article deals with an auction mechanism for airspace slots, as a means of solving the European airspace congestion problem. A disequilibrium, between Air Traffic Control (ATC) services supply and ATC services demand are at the origin of almost one fourth of delays in the air transport industry in Europe. In order to tackle this congestion problem, we suggest modifying both pricing and allocation of ATC services, by setting up an auction mechanism. Objects of the auction will be the right for airlines to cross a part of the airspace, and then to benefit from ATC services over a period corresponding to the necessary time for the crossing. Allocation and payment rules have to be defined according to the objectives of this auction. The auctioneer is the public authority in charge of ATC services, whose aim is to obtain an efficient allocation. Therefore, the social value will be maximized. Another objective is to internalize congestion costs. To that end, we apply the principle of Clarke-Groves mechanism auction: each winner has to pay the externalities imposed on other bidders. The complex context of ATC leads to a specific design for this auction.

  1. Bidding Agents That Perpetrate Auction Fraud

    NASA Astrophysics Data System (ADS)

    Trevathan, Jarrod; McCabe, Alan; Read, Wayne

    This paper presents a software bidding agent that inserts fake bids on the seller's behalf to inflate an auction's price. This behaviour is referred to as shill bidding. Shill bidding is strictly prohibited by online auctioneers, as it defrauds unsuspecting buyers by forcing them to pay more for the item. The malicious bidding agent was constructed to aid in developing shill detection techniques. We have previously documented a simple shill bidding agent that incrementally increases the auction price until it reaches the desired profit target, or it becomes too risky to continue bidding. This paper presents an adaptive shill bidding agent which when used over a series of auctions with substitutable items, can revise its strategy based on bidding behaviour in past auctions. The adaptive agent applies a novel prediction technique referred to as the Extremum Consistency (EC) algorithm, to determine the optimal price to aspire for. The EC algorithm has successfully been used in handwritten signature verification for determining the maximum and minimum values in an input stream. The agent's ability to inflate the price has been tested in a simulated marketplace and experimental results are presented.

  2. 75 FR 8070 - Closed Auction of Broadcast Construction Permits Scheduled for July 20, 2010; Auction 88...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Construction Permits Scheduled for July 20, 2010; Auction 88 Applicants Must Provide Supplemental Information..., AM, and FM Translator construction permits scheduled to commence on July 20, 2010 (Auction 88). This.... Any envelopes must be disposed of before entering the building. Commercial overnight mail (other than...

  3. Smarter than others? Conjectures in lowest unique bid auctions.

    PubMed

    Zhou, Cancan; Dong, Hongguang; Hu, Rui; Chen, Qinghua

    2015-01-01

    Research concerning various types of auctions, such as English auctions, Dutch auctions, highest-price sealed-bid auctions, and second-price sealed-bid auctions, is always a topic of considerable interest in interdisciplinary fields. The type of auction, known as a lowest unique bid auction (LUBA), has also attracted significant attention. Various models have been proposed, but they often fail to explain satisfactorily the real bid-distribution characteristics. This paper discusses LUBA bid-distribution characteristics, including the inverted-J shape and the exponential decrease in the upper region. The authors note that this type of distribution, which initially increases and later decreases, cannot be derived from the symmetric Nash equilibrium framework based on perfect information that has previously been used. A novel optimization model based on non-perfect information is presented. The kernel of this model is the premise that agents make decisions to achieve maximum profit based on imaginary information or assumptions regarding the behavior of others.

  4. Auctioneering Training Certificate Program 93-1001. Final Report.

    ERIC Educational Resources Information Center

    Clark, Charles H.

    A project was conducted to prepare a catalog of duties and tasks, performance objectives and guides, and instructional materials that would enable schools to develop instructional programs designed to prepare persons to enter the career of auctioneering. An occupational survey of auctioneers was conducted; a writing team of auctioneers prepared…

  5. A Combinatorial Auction among Versatile Experts and Amateurs

    NASA Astrophysics Data System (ADS)

    Ito, Takayuki; Yokoo, Makoto; Matsubara, Shigeo

    Auctions have become an integral part of electronic commerce and a promising field for applying multi-agent technologies. Correctly judging the quality of auctioned goods is often difficult for amateurs, in particular, in Internet auctions. However, experts can correctly judge the quality of goods. In this situation, it is difficult to make experts tell the truth and attain an efficient allocation, since experts have a clear advantage over amateurs and they would not reveal their valuable information without some reward. In our previous work, we have succeeded in developing such auction protocols under the following two cases: (1) the case of a single-unit auction among experts and amateurs, and (2) the case of a combinatorial auction among single-skilled experts and amateurs. In this paper, we focus on versatile experts. Versatile experts have an interest in, and expert knowledge on the qualities of several goods. In the case of versatile experts, there would be several problems, e.g., free riding problems, if we simply extended the previous VCG-style auction protocol. Thus, in this paper, we employ PORF (price-oriented, rationing-free) protocol for designing our new protocol to realize a strategy-proof auction protocol for experts. In the protocol, the dominant strategy for experts is truth-telling. Also, for amateurs, truth-telling is the best response when two or more experts select the dominant strategy. Furthermore, the protocol is false-name-proof.

  6. Auctions vs negotiations: a study of price differentials.

    PubMed

    Kjerstad, Egil

    2005-12-01

    Recent contributions in auction and bargaining theory suggest that a procurer should place more faith in the power of competition among alternative suppliers than in his or her own negotiating skill. Based on data from 216 contracts between procurers and suppliers of medical and surgical articles, we test whether auctions and bargaining result in significantly different prices. The main results are that auctions give 'thicker' markets compared with negotiations, as expected, but that auctions do not result in significantly lower prices compared with negotiations. Copyright (c) 2005 John Wiley & Sons, Ltd.

  7. 78 FR 61350 - Tribal Mobility Fund Phase I Auction (Auction 902); Short-Form Application Filing Window...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-03

    ... Fund Phase I Auction (Auction 902); Short-Form Application Filing Window Rescheduled To Open on... rescheduling of the filing window for short-form applications and release an updated list of eligible areas for... Application Filing Window Rescheduled To Open on September 30, 2013 1. The Bureaus announce that the filing...

  8. Multi-unit auctions with budget-constrained bidders

    NASA Astrophysics Data System (ADS)

    Ghosh, Gagan Pratap

    In my dissertation, I investigate the effects of budget-constraints in multi-unit auctions. This is done in three parts. First, I analyze a case where all bidders have a common budget constraint. Precisely, I analyze an auction where two units of an object are sold at two simultaneous, sealed bid, first-price auctions, to bidders who have demand for both units. Bidders differ with respect to their valuations for the units. All bidders have an identical budget constraint which binds their ability to spend in the auction. I show that if valuation distribution is atom-less, then their does not exist any symmetric equilibrium in this auction game. In the second and third parts of my thesis, I analyze the sale of licenses for the right to drill for oil and natural gas in the Outer Continental Shelf (OCS) of the United States. These sales are conducted using simultaneous sealed-bid first-price auctions for multiple licenses, each representing a specific area (called a tract). Using aspects of observed bidding-behavior, I first make a prima facie case that bidders are budget-constrained in these auctions. In order to formalize this argument, I develop a simple extension of the standard model (where bidders differ in their valuations for the objects) by incorporating (random) budgets for the bidders. The auction-game then has a two-dimensional set of types for each player. I study the theoretical properties of this auction, assuming for simplicity that two units are being sold. I show that this game has an equilibrium in pure strategies that is symmetric with respect to the players and with respect to the units. The strategies are essentially pure in the sense that each bidder-type has a unique split (up to a permutation) of his budget between the two auctions. I then characterize the equilibrium in terms of the bid-distribution and iso-bid curves in the value-budget space. I derive various qualitative features of this equilibrium, among which are: (1) under mild

  9. Robust Multi-unit Auction Protocol against False-name Bids

    NASA Astrophysics Data System (ADS)

    Yokoo, Makoto; Sakurai, Yuko; Matsubara, Shigeo

    This paper presents a new multi-unit auction protocol (IR protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called LDS has been developed for combinatorial auctions of multiple different items and has proven to be robust against false-name bids. Although we can modify the LDS protocol to handle multi-unit auctions, in which multiple units of an identical item are auctioned, the protocol is complicated and requires the auctioneer to carefully pre-determine the combination of bundles to obtain a high social surplus or revenue. For the auctioneer, our newly developed IR protocol is easier to use than the LDS, since the combination of bundles is automatically determined in a flexible manner according to the declared evaluation values of agents. The evaluation results show that the IR protocol can obtain a better social surplus than that obtained by the LDS protocol.

  10. 7 CFR 29.36 - Auction market.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Auction market. 29.36 Section 29.36 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... INSPECTION Regulations Definitions § 29.36 Auction market. A place to which tobacco is delivered by the...

  11. Auctions for coastal energy resources

    NASA Astrophysics Data System (ADS)

    Griffin, Robert M.

    It is becoming increasingly common to allocate public resources to the private sector for the purpose of developing these resources. One of the earliest uses of auctions in the U.S. for allocating rights to public resources was in the offshore oil and gas industry. The U.S. Federal government, through the Department of Interior (DOI), has used auctions to allocate development rights to offshore oil and gas resources to the private sector since the 1950's. Since then many things have changed. Oil and gas markets have gone through boom and bust cycles, giant technological advances in extraction and assessment have taken place, and alternative energy based in the coastal zone is now in demand in markets as well. There has been an enormous amount of research into the drivers of bidder behavior in auctions and optimal auction design in the last 60 years as well. Throughout all of this, the DOI has continued to use basically the same exact auction design to allocate oil and gas leases. The U.S. offshore oil and gas resources sold by the Department of Interior have accounted for more than $65 billion in revenue since the program started. These offshore resources are an important source of government revenue and national wealth. Additionally, the expansion of the energy sector offshore has enormous potential for electricity generation in the U.S., estimated by the National Renewable Energy Laboratory as approaching 54 gigawatts by 2030 (U.S. Department of Energy, 2008). Taken together, the DOI controls access to a large part of the future of energy in the U.S. The research herein assesses the auction formats used to allocate both fossil fuels and renewable resources on the Outer Continental Shelf (OCS). The first manuscript looks at the current method used by the DOI to allocate oil and gas leases on the OCS, and is primarily interested in how bidders behave in this environment. Using latent class estimation techniques to separate distinct bidding behavior in a laboratory

  12. Competition strength influences individual preferences in an auction game

    PubMed Central

    Toelch, Ulf; Jubera-Garcia, Esperanza; Kurth-Nelson, Zeb; Dolan, Raymond J.

    2014-01-01

    Competitive interactions between individuals are ubiquitous in human societies. Auctions represent an institutionalized context for these interactions, a context where individuals frequently make non-optimal decisions. In particular, competition in auctions can lead to overbidding, resulting in the so-called winner’s curse, often explained by invoking emotional arousal. In this study, we investigated an alternative possibility, namely that competitors’ bids are construed as a source of information about the good’s common value thereby influencing an individuals’ private value estimate. We tested this hypothesis by asking participants to bid in a repeated all-pay auction game for five different real items. Crucially, participants had to rank the auction items for their preference before and after the experiment. We observed a clear relation between auction dynamics and preference change. We found that low competition reduced preference while high competition increased preference. Our findings support a view that competitors’ bids in auction games are perceived as valid social signal for the common value of an item. We suggest that this influence of social information constitutes a major cause for the frequently observed deviations from optimality in auctions. PMID:25168161

  13. The Use of Reverse Auction Within the U.S. Army

    DTIC Science & Technology

    2016-12-01

    by conducting a literature review on auction theory and the economic principles surrounding open markets and competition. Books, magazine articles...economic principles within auction theory examine buyer and seller motivation. B. AUCTION THEORY Auction theory explains how market participants...that leverage the power of fluid market conditions through a dynamic pricing environment. This project examines the use of RAs within the Army

  14. Rationality, irrationality and escalating behavior in lowest unique bid auctions.

    PubMed

    Radicchi, Filippo; Baronchelli, Andrea; Amaral, Luís A N

    2012-01-01

    Information technology has revolutionized the traditional structure of markets. The removal of geographical and time constraints has fostered the growth of online auction markets, which now include millions of economic agents worldwide and annual transaction volumes in the billions of dollars. Here, we analyze bid histories of a little studied type of online auctions--lowest unique bid auctions. Similarly to what has been reported for foraging animals searching for scarce food, we find that agents adopt Lévy flight search strategies in their exploration of "bid space". The Lévy regime, which is characterized by a power-law decaying probability distribution of step lengths, holds over nearly three orders of magnitude. We develop a quantitative model for lowest unique bid online auctions that reveals that agents use nearly optimal bidding strategies. However, agents participating in these auctions do not optimize their financial gain. Indeed, as long as there are many auction participants, a rational profit optimizing agent would choose not to participate in these auction markets.

  15. Rationality, Irrationality and Escalating Behavior in Lowest Unique Bid Auctions

    PubMed Central

    Radicchi, Filippo; Baronchelli, Andrea; Amaral, Luís A. N.

    2012-01-01

    Information technology has revolutionized the traditional structure of markets. The removal of geographical and time constraints has fostered the growth of online auction markets, which now include millions of economic agents worldwide and annual transaction volumes in the billions of dollars. Here, we analyze bid histories of a little studied type of online auctions – lowest unique bid auctions. Similarly to what has been reported for foraging animals searching for scarce food, we find that agents adopt Lévy flight search strategies in their exploration of “bid space”. The Lévy regime, which is characterized by a power-law decaying probability distribution of step lengths, holds over nearly three orders of magnitude. We develop a quantitative model for lowest unique bid online auctions that reveals that agents use nearly optimal bidding strategies. However, agents participating in these auctions do not optimize their financial gain. Indeed, as long as there are many auction participants, a rational profit optimizing agent would choose not to participate in these auction markets. PMID:22279553

  16. Cooperation based dynamic team formation in multi-agent auctions

    NASA Astrophysics Data System (ADS)

    Pippin, Charles E.; Christensen, Henrik

    2012-06-01

    Auction based methods are often used to perform distributed task allocation on multi-agent teams. Many existing approaches to auctions assume fully cooperative team members. On in-situ and dynamically formed teams, reciprocal collaboration may not always be a valid assumption. This paper presents an approach for dynamically selecting auction partners based on observed team member performance and shared reputation. In addition, we present the use of a shared reputation authority mechanism. Finally, experiments are performed in simulation on multiple UAV platforms to highlight situations in which it is better to enforce cooperation in auctions using this approach.

  17. Auctions in Defense Acquisition: Theory and Experimental Evidence

    DTIC Science & Technology

    2002-01-01

    Department of Defense (DoD) has recently begun purchasing with online auctions — receiving offers from suppli- ers for things ranging from computers to...equipment for U.S. Navy vessels. The Navy was the first to try online auctions for procuring airplane and ship parts. The Army’s first venture into...system. The Air Force first tested the online auction waters in Au- gust 2000 to acquire computer equipment and saved about $88,000, or 27 percent of

  18. Auction and Game Theory Based Recommendations for DOD Acquisitions

    DTIC Science & Technology

    2015-03-24

    SPONSORED REPORT SERIES Auction and Game Theory Based Recommendations for DOD Acquisitions 24 March 2015 Justin Blott, 2d Lt; Nicholas...TYPE 3. DATES COVERED 00-00-2015 to 00-00-2015 4. TITLE AND SUBTITLE Auction and Game Theory Based Recommendations for DOD Acquisitions 5a...Postgraduate School Abstract This paper synthesizes auction and game theory literature into specific military acquisition improvement

  19. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.

    PubMed

    Li, Zhen; Jing, Tao; Ma, Liran; Huo, Yan; Qian, Jin

    2016-03-07

    The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric cryptography and asymmetric cryptography) may be compromised in CIoT networks, since these types of networks are heterogeneous. In this paper, we address the security issue in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative networks, we propose to employ cooperative jamming to achieve secrecy transmission. In the cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the signal to interference plus noise ratio (SINR) at the eavesdropper subject to the quality of service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the considered minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper. By using semi-definite programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme

  20. 76 FR 20783 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-13

    ... rates and descriptive information about Auction Rate Securities (``ARS'') and Variable Rate Demand... interest rate setting mechanisms for ARS and liquidity facilities for VDROs, information about orders submitted for an ARS auction, and additional information about VRDOs.\\5\\ To provide subscribers with access...

  1. Market power in auction and efficiency in emission permits allocation.

    PubMed

    Jiang, Min Xing; Yang, Dong Xiao; Chen, Zi Yue; Nie, Pu Yan

    2016-12-01

    This paper analyzes how to achieve the cost-effectiveness by initial allocation of CO 2 emission permits when a single dominant firm in production market has market power in auction, and compare two prevalent allocation patterns, mixed allocation and single auction. We show how the firm with market power may manipulate the auction price, thereby this leads to fail to achieve cost-effective solution by auction unless the total permits for allocation equal to the effective emissions cap. Provided that the market power firm receives strictly positive free permits, the effective emissions cap of mixed allocation is larger than that of single auction. The production market share of dominant firm is increasing with the free permits it holds. Finally, we examine the compliance costs and welfare of mixed allocation and single auction, the result show that the former is preferred to the later when policy makers consider economic welfare without welfare cost due to CO 2 emissions. Copyright © 2016 Elsevier Ltd. All rights reserved.

  2. Statistical Mechanics of Combinatorial Auctions

    NASA Astrophysics Data System (ADS)

    Galla, Tobias; Leone, Michele; Marsili, Matteo; Sellitto, Mauro; Weigt, Martin; Zecchina, Riccardo

    2006-09-01

    Combinatorial auctions are formulated as frustrated lattice gases on sparse random graphs, allowing the determination of the optimal revenue by methods of statistical physics. Transitions between computationally easy and hard regimes are found and interpreted in terms of the geometric structure of the space of solutions. We introduce an iterative algorithm to solve intermediate and large instances, and discuss competing states of optimal revenue and maximal number of satisfied bidders. The algorithm can be generalized to the hard phase and to more sophisticated auction protocols.

  3. 76 FR 11547 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-02

    ... interest rates and descriptive information about Auction Rate Securities (``ARS'') and Variable Rate Demand... interest rate setting mechanisms for ARS and liquidity facilities for VRDOs, information about orders submitted for an ARS auction, and additional information about VRDOs.\\4\\ To provide subscribers with access...

  4. Biological auctions with multiple rewards

    PubMed Central

    Reiter, Johannes G.; Kanodia, Ayush; Gupta, Raghav; Nowak, Martin A.; Chatterjee, Krishnendu

    2015-01-01

    The competition for resources among cells, individuals or species is a fundamental characteristic of evolution. Biological all-pay auctions have been used to model situations where multiple individuals compete for a single resource. However, in many situations multiple resources with various values exist and single reward auctions are not applicable. We generalize the model to multiple rewards and study the evolution of strategies. In biological all-pay auctions the bid of an individual corresponds to its strategy and is equivalent to its payment in the auction. The decreasingly ordered rewards are distributed according to the decreasingly ordered bids of the participating individuals. The reproductive success of an individual is proportional to its fitness given by the sum of the rewards won minus its payments. Hence, successful bidding strategies spread in the population. We find that the results for the multiple reward case are very different from the single reward case. While the mixed strategy equilibrium in the single reward case with more than two players consists of mostly low-bidding individuals, we show that the equilibrium can convert to many high-bidding individuals and a few low-bidding individuals in the multiple reward case. Some reward values lead to a specialization among the individuals where one subpopulation competes for the rewards and the other subpopulation largely avoids costly competitions. Whether the mixed strategy equilibrium is an evolutionarily stable strategy (ESS) depends on the specific values of the rewards. PMID:26180069

  5. Approximating the Qualitative Vickrey Auction by a Negotiation Protocol

    NASA Astrophysics Data System (ADS)

    Hindriks, Koen V.; Tykhonov, Dmytro; de Weerdt, Mathijs

    A result of Bulow and Klemperer has suggested that auctions may be a better tool to obtain an efficient outcome than negotiation. For example, some auction mechanisms can be shown to be efficient and strategy-proof. However, they generally also require that the preferences of at least one side of the auction are publicly known. However, sometimes it is very costly, impossible, or undesirable to publicly announce such preferences. It thus is interesting to find methods that do not impose this constraint but still approximate the outcome of the auction. In this paper we show that a multi-round multi-party negotiation protocol may be used to this end if the negotiating agents are capable of learning opponent preferences. The latter condition can be met by current state of the art negotiation technology. We show that this protocol approximates the theoretical outcome predicted by a so-called Qualitative Vickrey auction mechanism (even) on a complex multi-issue domain.

  6. Competitive Bidding in a Certain Class of Auctions

    NASA Astrophysics Data System (ADS)

    Johansson, Mathias

    2006-11-01

    We consider the problem of determining the amount to bid in a certain type of auctions in which customers submit one sealed bid. The bid reflects the price a customer is willing to pay for one unit of the offered goods. The auction is repeated and at each auction each customer requests a certain amount of goods, an amount that we call the capacity of the customer and that varies among customers and over time. At each auction, only the customer with the largest bid-capacity product obtains any goods. The price paid by the winner equals his/her bid-capacity product, and the amount of goods obtained in return equals the winner's capacity. The auction is repeated many times, with only limited information concerning winning bid-capacity products being announced to the customers. This situation is motivated in for example wireless communication networks in which a possible way of obtaining a desired service level is to use dynamic pricing and competitive bidding. In this application, the capacity is typically uncertain when the bid is made. We derive bidding rules and loss functions for a few typical service requirements.

  7. Auction fever: exploring informational social influences on bidder choices.

    PubMed

    Chen, Yi-Fen

    2011-01-01

    Previous investigations of herd behavior have identified the importance of informational social influences in consumer decision making. This research presents three studies examining herd behavior in online auctions. The three studies addressed the influence on bidder online choices of herd cues frequently found in online auctions, including bid number, feedback ratings, and number of questions and answers. This research also investigated the effect of different levels of herd cues on bidder online choices under high and low brand awareness in online auctions. The experimental results demonstrated that bidders use online herd cues when making decisions in online auctions. Additionally, different levels of herd cues influence bidder online choices in both high and low brand awareness product situations.

  8. 29 CFR 780.620 - Minimum wage for livestock auction work.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... minimum rate required by section 6(a)(1) of the Act for the time spent in livestock auction work. The exemption does not apply unless there is payment for all hours spent in livestock auction work at not less... 29 Labor 3 2010-07-01 2010-07-01 false Minimum wage for livestock auction work. 780.620 Section...

  9. A Trustworthy Internet Auction Model with Verifiable Fairness.

    ERIC Educational Resources Information Center

    Liao, Gen-Yih; Hwang, Jing-Jang

    2001-01-01

    Describes an Internet auction model achieving verifiable fairness, a requirement aimed at enhancing the trust of bidders in auctioneers. Analysis results demonstrate that the proposed model satisfies various requirements regarding fairness and privacy. Moreover, in the proposed model, the losing bids remain sealed. (Author/AEF)

  10. Statistical Properties of Online Auctions

    NASA Astrophysics Data System (ADS)

    Namazi, Alireza; Schadschneider, Andreas

    We characterize the statistical properties of a large number of online auctions run on eBay. Both stationary and dynamic properties, like distributions of prices, number of bids etc., as well as relations between these quantities are studied. The analysis of the data reveals surprisingly simple distributions and relations, typically of power-law form. Based on these findings we introduce a simple method to identify suspicious auctions that could be influenced by a form of fraud known as shill bidding. Furthermore the influence of bidding strategies is discussed. The results indicate that the observed behavior is related to a mixture of agents using a variety of strategies.

  11. 47 CFR 1.2208 - Public notice of auction completion and auction results.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... PROCEDURE Grants by Random Selection Competitive Bidding Proceedings Broadcast Television Spectrum Reverse... broadcast television spectrum incentive auction conducted under section 6403 of the Spectrum Act, public... indicate that the reassignments of television channels and reallocations of broadcast television spectrum...

  12. Competition in decentralized electricity markets: Three papers on electricity auctions

    NASA Astrophysics Data System (ADS)

    Harbord, David William Cameron

    This thesis consists of three self-contained papers on the analysis of electricity auctions written over a period of twelve years. The first paper models price competition in a decentralized wholesale market for electricity as a first-price, sealed-bid, multi-unit auction. In both the pure and mixed-strategy equilibria of the model, above marginal cost pricing and inefficient despatch of generating units occur. An alternative regulatory pricing rule is considered and it is shown that offering to supply at marginal cost can be induced as a dominant strategy for all firms. The second paper analyses strategic interaction between long-term contracts and price competition in the British electricity wholesale market, and confirms that forward contracts will tend to put downward pressure on spot market prices. A 'strategic commitment' motive for selling forward contracts is also identified: a generator may commit itself to bidding lower prices into the spot market in order to ensure that it will be despatched with its full capacity. The third paper characterizes bidding behavior and market outcomes in uniform and discriminatory electricity auctions. Uniform auctions result in higher average prices than discriminatory auctions, but the ranking in terms of productive efficiency is ambiguous. The comparative effects of other market design features, such as the number of steps in suppliers' bid functions, the duration of bids and the elasticity of demand are analyzed. The paper also clarifies some methodological issues in the analysis of electricity auctions. In particular we show that analogies with continuous share auctions are misplaced so long as firms are restricted to a finite number of bids.

  13. 29 CFR 780.619 - Work “in connection with” livestock auction operations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Work âin connection withâ livestock auction operations. 780... FAIR LABOR STANDARDS ACT Employment in Agriculture and Livestock Auction Operations Under the Section 13(b)(13) Exemption Requirements for Exemption § 780.619 Work “in connection with” livestock auction...

  14. Modelling of auctioning mechanism for solar photovoltaic capacity

    NASA Astrophysics Data System (ADS)

    Poullikkas, Andreas

    2016-10-01

    In this work, a modified optimisation model for the integration of renewable energy sources for power-generation (RES-E) technologies in power-generation systems on a unit commitment basis is developed. The purpose of the modified optimisation procedure is to account for RES-E capacity auctions for different solar photovoltaic (PV) capacity electricity prices. The optimisation model developed uses a genetic algorithm (GA) technique for the calculation of the required RES-E levy (or green tax) in the electricity bills. Also, the procedure enables the estimation of the level of the adequate (or eligible) feed-in-tariff to be offered to future RES-E systems, which do not participate in the capacity auctioning procedure. In order to demonstrate the applicability of the optimisation procedure developed the case of PV capacity auctioning for commercial systems is examined. The results indicated that the required green tax, in order to promote the use of RES-E technologies, which is charged to the electricity customers through their electricity bills, is reduced with the reduction in the final auctioning price. This has a significant effect related to the reduction of electricity bills.

  15. Efficient Double Auction Mechanisms in the Energy Grid with Connected and Islanded Microgrids

    NASA Astrophysics Data System (ADS)

    Faqiry, Mohammad Nazif

    The future energy grid is expected to operate in a decentralized fashion as a network of autonomous microgrids that are coordinated by a Distribution System Operator (DSO), which should allocate energy to them in an efficient manner. Each microgrid operating in either islanded or grid-connected mode may be considered to manage its own resources. This can take place through auctions with individual units of the microgrid as the agents. This research proposes efficient auction mechanisms for the energy grid, with is-landed and connected microgrids. The microgrid level auction is carried out by means of an intermediate agent called an aggregator. The individual consumer and producer units are modeled as selfish agents. With the microgrid in islanded mode, two aggregator-level auction classes are analyzed: (i) price-heterogeneous, and (ii) price homogeneous. Under the price heterogeneity paradigm, this research extends earlier work on the well-known, single-sided Kelly mechanism to double auctions. As in Kelly auctions, the proposed algorithm implements the bidding without using any agent level private infor-mation (i.e. generation capacity and utility functions). The proposed auction is shown to be an efficient mechanism that maximizes the social welfare, i.e. the sum of the utilities of all the agents. Furthermore, the research considers the situation where a subset of agents act as a coalition to redistribute the allocated energy and price using any other specific fairness criterion. The price homogeneous double auction algorithm proposed in this research ad-dresses the problem of price-anticipation, where each agent tries to influence the equilibri-um price of energy by placing strategic bids. As a result of this behavior, the auction's efficiency is lowered. This research proposes a novel approach that is implemented by the aggregator, called virtual bidding, where the efficiency can be asymptotically maximized, even in the presence of price anticipatory bidders

  16. Bandwidth auction for SVC streaming in dynamic multi-overlay

    NASA Astrophysics Data System (ADS)

    Xiong, Yanting; Zou, Junni; Xiong, Hongkai

    2010-07-01

    In this paper, we study the optimal bandwidth allocation for scalable video coding (SVC) streaming in multiple overlays. We model the whole bandwidth request and distribution process as a set of decentralized auction games between the competing peers. For the upstream peer, a bandwidth allocation mechanism is introduced to maximize the aggregate revenue. For the downstream peer, a dynamic bidding strategy is proposed. It achieves maximum utility and efficient resource usage by collaborating with a content-aware layer dropping/adding strategy. Also, the convergence of the proposed auction games is theoretically proved. Experimental results show that the auction strategies can adapt to dynamic join of competing peers and video layers.

  17. 76 FR 1158 - Auction of 700 MHz Band Licenses Scheduled for July 19, 2011; Comment Sought on Competitive...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-07

    ... relating to Auction 92. A. Auction Structure i. Simultaneous Multiple-Round Auction Design 7. The Bureau proposes to auction all licenses included in Auction 92 using the Commission's standard simultaneous... competitiveness and economic efficiency of a simultaneous multiple-round auction may be enhanced if such...

  18. A Greedy Double Auction Mechanism for Grid Resource Allocation

    NASA Astrophysics Data System (ADS)

    Ding, Ding; Luo, Siwei; Gao, Zhan

    To improve the resource utilization and satisfy more users, a Greedy Double Auction Mechanism(GDAM) is proposed to allocate resources in grid environments. GDAM trades resources at discriminatory price instead of uniform price, reflecting the variance in requirements for profits and quantities. Moreover, GDAM applies different auction rules to different cases, over-demand, over-supply and equilibrium of demand and supply. As a new mechanism for grid resource allocation, GDAM is proved to be strategy-proof, economically efficient, weakly budget-balanced and individual rational. Simulation results also confirm that GDAM outperforms the traditional one on both the total trade amount and the user satisfaction percentage, specially as more users are involved in the auction market.

  19. Model of Auctioneer Estimation of Swordtip Squid (Loligo edulis) Quality

    NASA Astrophysics Data System (ADS)

    Nakamura, Makoto; Matsumoto, Keisuke; Morimoto, Eiji; Ezoe, Satoru; Maeda, Toshimichi; Hirano, Takayuki

    The knowledge of experienced auctioneers regarding the circulation of marine products is an essential skill and is necessary for evaluating product quality and managing aspects such as freshness. In the present study, the ability of an auctioneer to quickly evaluate the freshness of swordtip squid (Loligo edulis) at fish markets was analyzed. Evaluation characteristics used by an auctioneer were analyzed and developed using a fuzzy logic model. Forty boxes containing 247 swordtip squid with mantles measuring 220 mm that had been evaluated and assigned to one of five quality categories by an auctioneer were used for the analysis and the modeling. The relationships between the evaluations of appearance, body color, and muscle freshness were statistically analyzed. It was found that a total of four indexes of the epidermis color strongly reflected evaluations of appearance: dispersion ratio of the head, chroma on the head-end mantle and the difference in the chroma and brightness of the mantle. The fuzzy logic model used these indexes for the antecedent-part of the linguistic rules. The results of both simulation and evaluations demonstrate that the model is robust, with the predicted results corresponding with more than 96% of the quality assignments of the auctioneers.

  20. Using Laboratory Experiments for Policymaking: An Example from the Georgia Irrigation Reduction Auction

    ERIC Educational Resources Information Center

    Cummings, Ronald G.; Holt, Charles A.; Laury, Susan K.

    2004-01-01

    In recent years, interest has been growing in policy applications of different auction systems. This paper reports a series of experiments that were used to design and implement an auction in a unique policymaking environment. In April 2000, the Georgia legislature passed a law that mandated that the state hold an auction in drought years to pay…

  1. 78 FR 72081 - Closed Auction of AM Broadcast Construction Permits Scheduled for May 6, 2014; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-02

    ... Broadcast Construction Permits Scheduled for May 6, 2014; Comment Sought on Competitive Bidding Procedures... announces the auction of certain AM broadcast construction permits. Auction 84 will be a ``closed'' auction..., New York. II. Construction Permits In Auction 84 2. The Bureaus will proceed to auction for 22 new...

  2. AUCTION MECHANISMS FOR IMPLEMENTING TRADABLE NETWORK PERMIT MARKETS

    NASA Astrophysics Data System (ADS)

    Wada, Kentaro; Akamatsu, Takashi

    This paper proposes a new auction mechanism for implementing the tradable network permit markets. Assuming that each user makes a trip from an origin to a destination along a path in a specific time period, we design an auction mechanism that enables each user to purchase a bundle of permits corresponding to a set of links in the user's preferred path. The objective of the proposed mechanism is to achieve a socially optimal state with minimal revelation of users' private information. In order to achieve this, the mechanism employs an evolutionary approach that has an auction phase and a path capacity adjustment phase, which are repeated on a day-to-day basis. We prove that the proposed mechanism has the following desirable properties: (1) truthful bidding is the dominant strategy for each user and (2) the proposed mechanism converges to an approximate socially optimal state in the sense that the achieved value of the social surplus reaches its maximum value when the number of users is large.

  3. Design and Promotion Strategy of Marketing Platform of Aquatic Auction based on Internet

    NASA Astrophysics Data System (ADS)

    Peng, Jianliang

    For the online trade and promotion of aquatic products and related materials through the network between supply and demand, the design content and effective promotional strategies of aquatic auctions online marketing platform is proposed in this paper. Design elements involve the location of customer service, the basic function of the platform including the purchase of general orders, online auctions, information dissemination, and recommendation of fine products, human services, and payment preferences. Based on network and mobile e-commerce transaction support, the auction platform makes the transaction of aquatic products well in advance. The results are important practical value for the design and application of online marketing platform of aquatic auction.

  4. On Revenue-Optimal Dynamic Auctions for Bidders with Interdependent Values

    NASA Astrophysics Data System (ADS)

    Constantin, Florin; Parkes, David C.

    In a dynamic market, being able to update one's value based on information available to other bidders currently in the market can be critical to having profitable transactions. This is nicely captured by the model of interdependent values (IDV): a bidder's value can explicitly depend on the private information of other bidders. In this paper we present preliminary results about the revenue properties of dynamic auctions for IDV bidders. We adopt a computational approach to design single-item revenue-optimal dynamic auctions with known arrivals and departures but (private) signals that arrive online. In leveraging a characterization of truthful auctions, we present a mixed-integer programming formulation of the design problem. Although a discretization is imposed on bidder signals the solution is a mechanism applicable to continuous signals. The formulation size grows exponentially in the dependence of bidders' values on other bidders' signals. We highlight general properties of revenue-optimal dynamic auctions in a simple parametrized example and study the sensitivity of prices and revenue to model parameters.

  5. Bidding Behavior in a Multi-attribute First-price Auction

    DTIC Science & Technology

    2010-01-01

    of applying key features of the multi-unit auction to proxy buyer /seller marginal valuations of the attributes of a job. Two experiments were...compensation package show promise in ascertaining buyer /seller marginal valuations of a job. This research effort was supported by a grant from the...auctions observed in the goods market, as measured by maximizing consumer and producer surplus, are likely to have promising applications to labor markets

  6. 75 FR 61752 - Auction of FM Broadcast Construction Permits Scheduled for March 29, 2011; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... Construction Permits Scheduled for March 29, 2011; Comment Sought on Competitive Bidding Procedures for Auction... auction of certain FM construction permits scheduled to commence on March 29, 2011 (Auction 91). This... Telecommunications and the Media Bureaus (the Bureaus) announce an auction of certain FM Broadcast construction...

  7. A Classroom Auction with Externalities: Applied to Mergers and Acquisitions

    ERIC Educational Resources Information Center

    Meister, J. Patrick; Anderson, Kyle J.

    2007-01-01

    The authors describe an in-class exercise in which students participate in an auction to buy US Airways. The exercise is based on events of late 1995, in which neither United nor American Airlines decided to bid for US Airways. Two teams of students participate in an English auction. Students learn that the equilibrium of the sequential game is…

  8. Ergodic Transition in a Simple Model of the Continuous Double Auction

    PubMed Central

    Radivojević, Tijana; Anselmi, Jonatha; Scalas, Enrico

    2014-01-01

    We study a phenomenological model for the continuous double auction, whose aggregate order process is equivalent to two independent queues. The continuous double auction defines a continuous-time random walk for trade prices. The conditions for ergodicity of the auction are derived and, as a consequence, three possible regimes in the behavior of prices and logarithmic returns are observed. In the ergodic regime, prices are unstable and one can observe a heteroskedastic behavior in the logarithmic returns. On the contrary, non-ergodicity triggers stability of prices, even if two different regimes can be seen. PMID:24558377

  9. Ergodic transition in a simple model of the continuous double auction.

    PubMed

    Radivojević, Tijana; Anselmi, Jonatha; Scalas, Enrico

    2014-01-01

    We study a phenomenological model for the continuous double auction, whose aggregate order process is equivalent to two independent M/M/1 queues. The continuous double auction defines a continuous-time random walk for trade prices. The conditions for ergodicity of the auction are derived and, as a consequence, three possible regimes in the behavior of prices and logarithmic returns are observed. In the ergodic regime, prices are unstable and one can observe a heteroskedastic behavior in the logarithmic returns. On the contrary, non-ergodicity triggers stability of prices, even if two different regimes can be seen.

  10. 76 FR 60830 - Auction of FM Broadcast Construction Permits Scheduled for March 27, 2012; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-30

    ... Construction Permits Scheduled for March 27, 2012; Comment Sought on Competitive Bidding Procedures for Auction... auction of certain FM broadcast construction permits scheduled to commence on March 27, 2012. This... construction permits and seek comment on the procedures to be used for this auction. This auction is scheduled...

  11. Essays on empirical analysis of multi-unit auctions: Impacts of financial transmission rights on the restructured electricity industry

    NASA Astrophysics Data System (ADS)

    Zang, Hailing

    This dissertation uses recently developed empirical methodologies for the study of multi-unit auctions to test the impacts of Financial Transmission Rights (FTRs) on the competitiveness of restructured electricity markets. FTRs are a special type of financial option that hedge against volatility in the cost of transporting electricity over the grid. Policy makers seek to use the prices of FTRs as market signals to incentivize efficient investment and utilization of transmission capacity. However, prices will not send the correct signals if market participants strategically use FTRs. This dissertation uses data from the Texas electricity market to test whether the prices of FTRs are efficient to achieve such goals. The auctions studied are multi-unit, uniform-price, sealed-bid auctions. The first part of the dissertation studies the auctions on the spot market of the wholesale electricity industry. I derive structural empirical models to test theoretical predictions as to whether bidders fully internalize the effect of FTRs on profits into their bidding decisions. I find that bidders are learning as to how to optimally bid above marginal cost for their inframarginal capacities. The bidders also learn to bid to include FTRs into their profit maximization problem during the course of the first year. But starting from the second year, they deviated from optimal bidding that includes FTRs in the profit maximization problems. Counterfactual analysis show that the primary effect of FTRs on market outcomes is changing the level of prices rather than production efficiency. Finally, I find that in most months, the current allocations of FTRs are statistically equivalent to the optimal allocations. The second part of the dissertation studies the bidding behavior in the FTR auctions. I find that FTRs' strategic impact on the FTR purchasing behavior is significant for large bidders---firms exercising market power in the FTR auctions. Second, trader forecasts future FTR credit

  12. 43 CFR 2546.4 - Public auctions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., DEPARTMENT OF THE INTERIOR LAND RESOURCE MANAGEMENT (2000) COLOR-OF-TITLE AND OMITTED LANDS Snake River... public auction any lands for which preference-claimants do not qualify for patents under the regulations...

  13. Are Structural Estimates of Auction Models Reasonable? Evidence from Experimental Data

    ERIC Educational Resources Information Center

    Bajari, Patrick; Hortacsu, Ali

    2005-01-01

    Recently, economists have developed methods for structural estimation of auction models. Many researchers object to these methods because they find the strict rationality assumptions to be implausible. Using bid data from first-price auction experiments, we estimate four alternative structural models: (1) risk-neutral Bayes-Nash, (2) risk-averse…

  14. Application for Single Price Auction Model (SPA) in AC Network

    NASA Astrophysics Data System (ADS)

    Wachi, Tsunehisa; Fukutome, Suguru; Chen, Luonan; Makino, Yoshinori; Koshimizu, Gentarou

    This paper aims to develop a single price auction model with AC transmission network, based on the principle of maximizing social surplus of electricity market. Specifically, we first formulate the auction market as a nonlinear optimization problem, which has almost the same form as the conventional optimal power flow problem, and then propose an algorithm to derive both market clearing price and trade volume of each player even for the case of market-splitting. As indicated in the paper, the proposed approach can be used not only for the price evaluation of auction or bidding market but also for analysis of bidding strategy, congestion effect and other constraints or factors. Several numerical examples are used to demonstrate effectiveness of our method.

  15. Competitive bidding for health insurance contracts: lessons from the online HMO auctions.

    PubMed

    Gupta, Alok; Parente, Stephen T; Sanyal, Pallab

    2012-12-01

    Healthcare is an important social and economic component of modern society, and the effective use of information technology in this industry is critical to its success. As health insurance premiums continue to rise, competitive bidding may be useful in generating stronger price competition and lower premium costs for employers and possibly, government agencies. In this paper, we assess an endeavor by several Fortune 500 companies to reduce healthcare procurement costs for their employees by having HMOs compete in open electronic auctions. Although the auctions were successful in generating significant cost savings for the companies in the first year, i.e., 1999, they failed to replicate the success and were eventually discontinued after two more years. Over the past decade since the failed auction experiment, effective utilization of information technologies have led to significant advances in the design of complex electronic markets. Using this knowledge, and data from the auctions, we point out several shortcomings of the auction design that, we believe, led to the discontinuation of the market after three years. Based on our analysis, we propose several actionable recommendations that policy makers can use to design a sustainable electronic market for procuring health insurance.

  16. Spectrum sharing in cognitive radio networks--an auction-based approach.

    PubMed

    Wang, Xinbing; Li, Zheng; Xu, Pengchao; Xu, Youyun; Gao, Xinbo; Chen, Hsiao-Hwa

    2010-06-01

    Cognitive radio is emerging as a promising technique to improve the utilization of the radio frequency spectrum. In this paper, we consider the problem of spectrum sharing among primary (or "licensed") users (PUs) and secondary (or "unlicensed") users (SUs). We formulate the problem based on bandwidth auction, in which each SU makes a bid for the amount of spectrum and each PU may assign the spectrum among the SUs by itself according to the information from the SUs without degrading its own performance. We show that the auction is a noncooperative game and that Nash equilibrium (NE) can be its solution. We first consider a single-PU network to investigate the existence and uniqueness of the NE and further discuss the fairness among the SUs under given conditions. Then, we present a dynamic updating algorithm in which each SU achieves NE in a distributed manner. The stability condition of the dynamic behavior for this spectrum-sharing scheme is studied. The discussion is generalized to the case in which there are multiple PUs in the network, where the properties of the NE are shown under appropriate conditions. Simulations were used to evaluate the system performance and verify the effectiveness of the proposed algorithm.

  17. Identification of shareholder ethics and responsibilities in online reverse auctions for construction projects.

    PubMed

    Hatipkarasulu, Yilmaz; Gill, James H

    2004-04-01

    The increasing number of companies providing internet services and auction tools helped popularize the online reverse auction trend for purchasing commodities and services in the last decade. As a result, a number of owners, both public and private, accepted the online reverse auctions as the bidding technique for their construction projects. Owners, while trying to minimize their costs for construction projects, are also required to address their ethical responsibilities to the shareholders. In the case of online reverse auctions for construction projects, the ethical issues involved in the bidding technique directly reflects on the owner's ethical and social responsibilities to their shareholders. The goal of this paper is to identify the shareholder ethics and responsibilities in online reverse auctions for construction projects by analyzing the ethical issues for the parties involved in the process. The identification of the ethical issues and responsibilities requires clear definition and understanding of professional ethics and the roles of the involved parties. In this paper, first, the concept of professional ethics and social responsibility is described in a general form. To illustrate the ethical issues and responsibilities, a sample case of bidding for a construction project using online reverse auction techniques is presented in which the shareholders were actively involved in questioning the ethical issues. The issues involved in the bidding process and their reflection on the shareholder responsibilities are described and analyzed for each stage of the process. A brief discussion of the overall process is also included to address the general ethical issues involved in online reverse auctions.

  18. Auction development for the price-based electric power industry

    NASA Astrophysics Data System (ADS)

    Dekrajangpetch, Somgiat

    The restructuring of the electric power industry is to move away from the cost-based monopolistic environment of the past to the priced-based competitive environment. As the electric power industry is restructuring in many places, there are still many problems that need to be solved. The work in this dissertation contributes to solve some of the electric power auction problems. The majority of this work is aimed to help develop good markets. A LaGrangian relaxation (LR) Centralized Daily Commitment Auction (CDCA) has been implemented. It has been shown that the solution might not be optimal nor fair to some generation companies (GENCOs) when identical or similar generating units participate in a LR CDCA based auction. Supporting information for bidding strategies on how to change unit data to enhance the chances of bid acceptance has been developed. The majority of this work is based on Single Period Commodity Auction (SPCA). Alternative structures for the SPCA are outlined. Whether the optimal solution is degenerated is investigated. Good pricing criteria are summarized and the pricing method following good pricing criteria is developed. Electricity is generally considered as a homogeneous product. When availability level is used as additional characteristic to distinct electricity, electricity can be considered a heterogeneous product. The procedure to trade electricity as a heterogeneous product is developed. The SPCA is formulated as a linear program. The basic IPLP algorithm has been extended so that sensitivity analysis can be performed as in the simplex method. Sensitivity analysis is used to determine market reach. Additionally, sensitivity analysis is used in combination with the investigation of historical auction results to provide raw data for power system expansion. Market power is a critical issue in electric power deregulation. Firms with market power have an advantage over other competitor firms in terms of market reach. Various approaches to

  19. Auctions to Reinforce Understanding

    ERIC Educational Resources Information Center

    Flores, Haynet Rivera

    2018-01-01

    An auction is a process of buying and selling goods or services by offering them up for bid, taking bids, and then selling each good or service to the highest bidder. Participants bid openly against one another; each bid must be higher than the previous bid. In the activity described rather than goods or services, English teachers sell sentences!…

  20. 9 CFR 2.76 - Records: Operators of auction sales and brokers.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 9 Animals and Animal Products 1 2011-01-01 2011-01-01 false Records: Operators of auction sales and brokers. 2.76 Section 2.76 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Records § 2.76 Records: Operators of auction sales and...

  1. 9 CFR 2.76 - Records: Operators of auction sales and brokers.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 9 Animals and Animal Products 1 2013-01-01 2013-01-01 false Records: Operators of auction sales and brokers. 2.76 Section 2.76 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Records § 2.76 Records: Operators of auction sales and...

  2. 9 CFR 2.76 - Records: Operators of auction sales and brokers.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 9 Animals and Animal Products 1 2012-01-01 2012-01-01 false Records: Operators of auction sales and brokers. 2.76 Section 2.76 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Records § 2.76 Records: Operators of auction sales and...

  3. Understanding Overbidding: Using the Neural Circuitry of Reward to Design Economic Auctions

    PubMed Central

    Delgado, Mauricio R.; Schotter, Andrew; Ozbay, Erkut Y.; Phelps, Elizabeth A.

    2011-01-01

    We take advantage of our knowledge of the neural circuitry of reward to investigate a puzzling economic phenomenon: Why do people overbid in auctions? Using functional magnetic resonance imaging (fMRI), we observed that the social competition inherent in an auction results in a more pronounced blood oxygen level–dependent (BOLD) response to loss in the striatum, with greater overbidding correlated with the magnitude of this response. Leveraging these neuroimaging results, we design a behavioral experiment that demonstrates that framing an experimental auction to emphasize loss increases overbidding. These results highlight a role for the contemplation of loss in understanding the tendency to bid “too high.” Current economic theories suggest overbidding may result from either “joy of winning” or risk aversion. By combining neuroeconomic and behavioral economic techniques, we find that another factor, namely loss contemplation in a social context, may mediate overbidding in auctions. PMID:18818362

  4. Understanding overbidding: using the neural circuitry of reward to design economic auctions.

    PubMed

    Delgado, Mauricio R; Schotter, Andrew; Ozbay, Erkut Y; Phelps, Elizabeth A

    2008-09-26

    We take advantage of our knowledge of the neural circuitry of reward to investigate a puzzling economic phenomenon: Why do people overbid in auctions? Using functional magnetic resonance imaging (fMRI), we observed that the social competition inherent in an auction results in a more pronounced blood oxygen level-dependent (BOLD) response to loss in the striatum, with greater overbidding correlated with the magnitude of this response. Leveraging these neuroimaging results, we design a behavioral experiment that demonstrates that framing an experimental auction to emphasize loss increases overbidding. These results highlight a role for the contemplation of loss in understanding the tendency to bid "too high." Current economic theories suggest overbidding may result from either "joy of winning" or risk aversion. By combining neuroeconomic and behavioral economic techniques, we find that another factor, namely loss contemplation in a social context, may mediate overbidding in auctions.

  5. Combining auctions and performance-based payments in a forest enrichment field trial in Western Kenya.

    PubMed

    Khalumba, Mercelyne; Wünscher, Tobias; Wunder, Sven; Büdenbender, Mirjam; Holm-Müller, Karin

    2014-06-01

    Cost-effectiveness is an important aspect in the assessment of payments for environmental services (PES) initiatives. In participatory field trials with communities in Western Kenya, we combined procurement auctions for forest enrichment contracts with performance-based payments and compared the outcomes with a baseline scenario currently used by the Kenyan Forest Service. Procurement auctions were the most cost-effective. The competitive nature of the auction reduced contracting expenses (provision costs), and the result-oriented payments provided additional incentives to care for the planted seedlings, resulting in their improved survival rates (service quantity). These gains clearly exceeded increases in transaction costs associated with conducting an auction. The number of income-poor auction participants and winners was disproportionately high and local institutional buy-in was remarkably strong. Our participatory approach may, however, require adaptations when conducted at a larger scale. Although the number of contracts we monitored was limited and prohibited the use of statistical tests, our study is one of the first to reveal the benefits of using auctions for PES in developing countries. © 2014 Society for Conservation Biology.

  6. 75 FR 74719 - Auction of VHF Commercial Television Station Construction Permits Scheduled for February 15, 2011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-01

    ... Television Station Construction Permits Scheduled for February 15, 2011; Notice and Filing Requirements... upcoming auction of certain VHF commercial TV construction permits (Auction 90). This document is intended... December 15, 2010. Bidding for construction permits in Auction 90 is scheduled to begin on February 15...

  7. Timely response to secure messages from primary care patients.

    PubMed

    Rohrer, James E; North, Frederick; Angstman, Kurt B; Oberhelman, Sara S; Meunier, Matthew R

    2013-01-01

    To assess delays in response to patient secure e-mail messages in primary care. Secure electronic messages are initiated by primary care patients. Timely response is necessary for patient safety and quality. A database of secure messages. A random sample of 353 secure electronic messages initiated by primary care patients treated in 4 clinics. Message not opened after 12 hours or messages not responded to after 36 hours. A total of 8.5% of electronic messages were not opened within 12 hours, and 17.6% did not receive a response in 36 hours. Clinic location, being a clinic employee, and patient sex were not related to delays. Patients older than 50 years were more likely to receive a delayed response (25.7% delayed, P = .013). The risk of both kinds of delays was higher on weekends (P < .001 for both). The e-mail message system resulted in high rates of delayed response. Delays were concentrated on weekends (Friday-Sunday). Reducing delayed responses may require automatic rerouting of messages to message centers staffed 24-7 or other mechanisms to manage this after-hours work flow.

  8. The use of importance and performance analysis (IPA) to evaluate effectiveness of the forward auction market agro commodities: A case study

    NASA Astrophysics Data System (ADS)

    Wulansari, Dwi Ratna; Sutopo, Wahyudi; Hisjam, Muh.

    2018-02-01

    The empowering auction market for commodities in East Java Province is one of five auction market revitalization programs conducted by the Republic of Indonesia c.q. Ministry of Trading started in 2014. One of the districts in East Java Province, namely Magetan District utilizes the commodity auction market to improve the competitiveness of their agricultural industry by shortening the supply chain. The Magetan District needs to evaluate their support for farmers or farmer groups to participate in the forward auction market (FAM). Implementation of the FAM commodities is divided into three main processes, namely pre-auction, auction, and post-auction. The auction market is organized to shorten the trading chain. Implementation of the FAM requires good planning, among Seller (namely Farmer or Farmer Group), organizer of Auction (namely Commodity Auction Company), Buyer, and Local Government (namely the farmer facilitator). This article is aimed to develop the instrument of a Performance Measurement Model Using Important and Performance Analysis (IPA) for Improving the FAM Effectiveness of Agro Commodity from Magetan District with Supply Chain Management approach. IPA is implemented at pre-auction, auction, and post-auction. The IPA model results in the diagram to decide the strategies in improving the FAM effectiveness, and then it can encourage farmers to improve welfare and realize the competitiveness of the auctioneer.

  9. 78 FR 68839 - Tribal Mobility Fund Phase I Auction Rescheduled for February 25, 2014; Notice of Changes to...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-15

    ...) announce the rescheduling of Auction 902 and revise the dates and deadlines for the filing window for short...-auction deadlines for Auction 902. 2. The Auction 902 short-form application filing window opened at 12... short-form application (FCC Form 180) filing window will reopen on November 18, 2013, at 12:00 noon ET...

  10. Pricing strategies, the strength of bidding intentions, and online auction performance: a cross-cultural study.

    PubMed

    Peng, Yu-Shu; Jan, Lih-Tsyr

    2009-10-01

    Over the past decade, electronic markets based on the Internet, particularly online auctions, have become popular venues for conducting business. Previous studies often focused on the construction of the best bidding model, while few studies have tried to integrate multiple pricing strategies to predict the probability of closing an auction and the price premium. This study constructs a mediated model to examine the relationship among pricing strategies, the strength of bidding intentions, and online auction performance. The sample consists of 1,055 auctions of iPod MP3 players from eBay Web sites in Hong Kong, Singapore, Belgium, and France. Empirical results show that the pricing strategies directly influence both the probability of closing an auction and the level of price premium. The pricing strategies also indirectly influence the price premium through the mediating effect of the strength of bidding intentions.

  11. 7 CFR 46.25 - Auction sales.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Auction sales. 46.25 Section 46.25 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing Practices), DEPARTMENT OF AGRICULTURE MARKETING OF PERISHABLE AGRICULTURAL COMMODITIES REGULATIONS (OTHER...

  12. 78 FR 45524 - Auction of H Block Licenses in the 1915-1920 MHz and 1995-2000 MHz Bands; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-29

    ... issues relating to the conduct of Auction 96. A. Auction Design i. Simultaneous Multiple-Round Auction--With or Without Package Bidding 14. The Bureau proposes to conduct Auction 96 using a simultaneous... incorporate provisions for a simple form of package bidding into the simultaneous multiple-round auction. In...

  13. From Walras’ auctioneer to continuous time double auctions: a general dynamic theory of supply and demand

    NASA Astrophysics Data System (ADS)

    Donier, J.; Bouchaud, J.-P.

    2016-12-01

    In standard Walrasian auctions, the price of a good is defined as the point where the supply and demand curves intersect. Since both curves are generically regular, the response to small perturbations is linearly small. However, a crucial ingredient is absent of the theory, namely transactions themselves. What happens after they occur? To answer the question, we develop a dynamic theory for supply and demand based on agents with heterogeneous beliefs. When the inter-auction time is infinitely long, the Walrasian mechanism is recovered. When transactions are allowed to happen in continuous time, a peculiar property emerges: close to the price, supply and demand vanish quadratically, which we empirically confirm on the Bitcoin. This explains why price impact in financial markets is universally observed to behave as the square root of the excess volume. The consequences are important, as they imply that the very fact of clearing the market makes prices hypersensitive to small fluctuations.

  14. Competition in the economic crisis: Analysis of procurement auctions.

    PubMed

    Gugler, Klaus; Weichselbaumer, Michael; Zulehner, Christine

    2015-01-01

    We study the effects of the recent economic crisis on firms׳ bidding behavior and markups in sealed bid auctions. Using data from Austrian construction procurements, we estimate bidders׳ construction costs within a private value auction model. We find that markups of all bids submitted decrease by 1.5 percentage points in the recent economic crisis, markups of winning bids decrease by 3.3 percentage points. We also find that without the government stimulus package this decrease would have been larger. These two pieces of evidence point to pro-cyclical markups.

  15. Sold! The Elementary Classroom Auction as Learning Tool of Communication and Economics

    ERIC Educational Resources Information Center

    Boyd, Josh; Boyd, Gina

    2014-01-01

    An auction, though an economic tool, is essentially a performance dependent on communication (Smith, 1989). The auctioneer dictates the pace, asks for bids, and acknowledges responses; the enterprise is controlled by a voice (Boyce, 2001). Bidders must listen and respond strategically to the communication of the people around them. An auction…

  16. 75 FR 8703 - Auction of Lower and Upper Paging Bands Licenses Scheduled for May 25, 2010; Notice and Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-25

    ...: Wireless Telecommunications Bureau, Auctions and Spectrum Access Division: For legal questions: Scott...://wireless.fcc.gov/auctions/87/ . Due to the large number of licenses in Auction 87, the complete list of... ``Attachment A'' files at http://wireless.fcc.gov/auctions/87/ . A paper copy of the complete list of licenses...

  17. Bidding process in online auctions and winning strategy: Rate equation approach

    NASA Astrophysics Data System (ADS)

    Yang, I.; Kahng, B.

    2006-06-01

    Online auctions have expanded rapidly over the last decade and have become a fascinating new type of business or commercial transaction in this digital era. Here we introduce a master equation for the bidding process that takes place in online auctions. We find that the number of distinct bidders who bid k times up to the t th bidding progresses, called the k -frequent bidder, seems to scale as nk(t)˜tk-2.4 . The successfully transmitted bidding rate by the k -frequent bidder is likely to scale as qk(t)˜k-1.4 , independent of t for large t . This theoretical prediction is close to empirical data. These results imply that bidding at the last moment is a rational and effective strategy to win in an eBay auction.

  18. Auctions with Dynamic Populations: Efficiency and Revenue Maximization

    NASA Astrophysics Data System (ADS)

    Said, Maher

    We study a stochastic sequential allocation problem with a dynamic population of privately-informed buyers. We characterize the set of efficient allocation rules and show that a dynamic VCG mechanism is both efficient and periodic ex post incentive compatible; we also show that the revenue-maximizing direct mechanism is a pivot mechanism with a reserve price. We then consider sequential ascending auctions in this setting, both with and without a reserve price. We construct equilibrium bidding strategies in this indirect mechanism where bidders reveal their private information in every period, yielding the same outcomes as the direct mechanisms. Thus, the sequential ascending auction is a natural institution for achieving either efficient or optimal outcomes.

  19. A False-name-Proof Double Auction Protocol for Arbitrary Evaluation Values

    NASA Astrophysics Data System (ADS)

    Sakurai, Yuko; Yokoo, Makoto

    We develop a new false-name-proof double auction protocol called the Generalized Threshold Price Double auction (GTPD) protocol. False-name-proofness generalizes strategy-proofness by incorporating the possibility of false-name bids, e.g., bids submitted using multiple e-mail addresses. An existing protocol called TPD protocol is false-name-proof but can handle only the cases where marginal utilities of each agent always decrease, while our new GTPD protocol can handle arbitrary evaluation values. When marginal utilities can increase, some bids cannot be divided into a single unit (e.g., an all-or-nothing bid). Due to the existence of such indivisible bids, meeting supply/demand becomes difficult. Furthermore, a seller/buyer can submit a false-name-bid by pretending to be a potential buyer/seller to manipulate allocations and payments. In the GTPD protocol, the auctioneer is required to absorb the supply-demand imbalance up to a given upper-bound. Also, the GTPD incorporate a new false-name-proof one-sided auction protocol that is guaranteed to sell/buy a certain number of units. Simulation results show that when the threshold price is set appropriately, this protocol can obtain a good social surplus, and the number of absorbed units is much smaller than the given upper-bound.

  20. Quantum auctions: Facts and myths

    NASA Astrophysics Data System (ADS)

    Piotrowski, Edward W.; Sładkowski, Jan

    2008-06-01

    Quantum game theory, whatever opinions may be held due to its abstract physical formalism, have already found various applications even outside the orthodox physics domain. In this paper we introduce the concept of a quantum auction, its advantages and drawbacks. Then we describe the models that have already been put forward. A general model involves Wigner formalism and infinite dimensional Hilbert spaces - we envisage that the implementation might not be an easy task. But a restricted model advocated by the Hewlett-Packard group (Hogg et al.) seems to be much easier to implement. We focus on problems related to combinatorial auctions and technical assumptions that are made. Powerful quantum algorithms for finding solutions would extend the range of possible applications. Quantum strategies, being qubits, can be teleported but are immune from cloning - therefore extreme privacy of the agent’s activity could in principle be guaranteed. Then we point out some key problems that have to be solved before commercial use would be possible. With present technology, optical networks, single photon sources and detectors seems to be sufficient for an experimental realization in the near future.

  1. Green auctions and reduction of information rents in payments for environmental services: an experimental investigation in Sunan County, northwestern China.

    PubMed

    Deng, Xiaohong; Xu, Zhongmin

    2015-01-01

    Reducing information rents is an important task for government agencies wishing to purchase maximal environmental services with limited budgets. This paper reports on several green auction options for reducing information rents and improving the performance of the "Grain for Green" Payments for environmental services (PES) program implemented in northwestern China. In r experimental auctions and investigations, door-to-door interviews were conducted and bidding envelopes and survey questionnaires were used to determine the offers and the foregone profits of the participants. Three scenarios are analyzed in this paper: a uniform price auction, a discriminatory price auction, and an opportunity-cost system. The results show that compared to the uniform price auction system, the other auction systems can increase the cost-effectiveness of conservation contracting. Competitive bidding can reveal true opportunity costs and can reduce information rents extracted from the government by farmers using private information. The demographics and average bids of these auction types were also analyzed. "Perfect information" in the opportunity-cost offer system has the best performance but is very hard to implement in reality. The results of this research show that the auction is a valuable tool for purchasing conservation contracts in northwestern China, but that in the future, the performance of these auctions should be studied with relaxed model assumptions.

  2. 31 CFR 344.7 - What are Demand Deposit securities?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... indebtedness. Funds invested in the ninety-day certificates of indebtedness earn simple interest equal to the... security shall bear a variable rate of interest based on an adjustment of the average yield for three-month... regular auction of three-month Treasury bills and is shown in the SLGS rate table. Interest is accrued and...

  3. 78 FR 65982 - Auction of H Block Licenses in the 1915-1920 MHz and 1995-2000 MHz Bands Rescheduled for January...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-04

    ...This document announces the procedures, reserve price, and minimum opening bids for the upcoming auction of H Block licenses (Auction 96) and provides the revised schedule for Auction 96. This document is intended to familiarize prospective applicants with the procedures and other requirements for participation in the auction.

  4. Green Auctions and Reduction of Information Rents in Payments for Environmental Services: An Experimental Investigation in Sunan County, Northwestern China

    PubMed Central

    Deng, Xiaohong; Xu, Zhongmin

    2015-01-01

    Reducing information rents is an important task for government agencies wishing to purchase maximal environmental services with limited budgets. This paper reports on several green auction options for reducing information rents and improving the performance of the “Grain for Green” Payments for environmental services (PES) program implemented in northwestern China. In r experimental auctions and investigations, door-to-door interviews were conducted and bidding envelopes and survey questionnaires were used to determine the offers and the foregone profits of the participants. Three scenarios are analyzed in this paper: a uniform price auction, a discriminatory price auction, and an opportunity-cost system. The results show that compared to the uniform price auction system, the other auction systems can increase the cost-effectiveness of conservation contracting. Competitive bidding can reveal true opportunity costs and can reduce information rents extracted from the government by farmers using private information. The demographics and average bids of these auction types were also analyzed. “Perfect information” in the opportunity-cost offer system has the best performance but is very hard to implement in reality. The results of this research show that the auction is a valuable tool for purchasing conservation contracts in northwestern China, but that in the future, the performance of these auctions should be studied with relaxed model assumptions. PMID:25793263

  5. 30 CFR 285.220 - What auction format may MMS use in a lease sale?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE RENEWABLE ENERGY ALTERNATE USES OF EXISTING FACILITIES ON THE OUTER CONTINENTAL SHELF Issuance of OCS Renewable Energy Leases Competitive Lease Award Process § 285... competitive auctions to award renewable energy leases and will use one of the following auction formats, as...

  6. 78 FR 24404 - Auction of Lower and Upper Paging Band Licenses Scheduled for July 16, 2013; Notice of Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-25

    ...This document announces the procedures and minimum opening bids for the upcoming auction of licenses in the lower and upper paging bands (Auction 95). This document is intended to familiarize prospective applicants with the procedures and other requirements for participation in the auction.

  7. 30 CFR 285.220 - What auction format may MMS use in a lease sale?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... OFFSHORE RENEWABLE ENERGY ALTERNATE USES OF EXISTING FACILITIES ON THE OUTER CONTINENTAL SHELF Issuance of OCS Renewable Energy Leases Competitive Lease Award Process § 285.220 What auction format may MMS use... renewable energy leases and will use one of the following auction formats, as determined through the lease...

  8. 30 CFR 585.220 - What auction format may BOEM use in a lease sale?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INTERIOR OFFSHORE RENEWABLE ENERGY AND ALTERNATE USES OF EXISTING FACILITIES ON THE OUTER CONTINENTAL SHELF Issuance of OCS Renewable Energy Leases Competitive Lease Award Process § 585.220 What auction format may... award renewable energy leases and will use one of the following auction formats, as determined through...

  9. 30 CFR 585.220 - What auction format may BOEM use in a lease sale?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INTERIOR OFFSHORE RENEWABLE ENERGY AND ALTERNATE USES OF EXISTING FACILITIES ON THE OUTER CONTINENTAL SHELF Issuance of OCS Renewable Energy Leases Competitive Lease Award Process § 585.220 What auction format may... award renewable energy leases and will use one of the following auction formats, as determined through...

  10. 30 CFR 585.220 - What auction format may BOEM use in a lease sale?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INTERIOR OFFSHORE RENEWABLE ENERGY AND ALTERNATE USES OF EXISTING FACILITIES ON THE OUTER CONTINENTAL SHELF Issuance of OCS Renewable Energy Leases Competitive Lease Award Process § 585.220 What auction format may... award renewable energy leases and will use one of the following auction formats, as determined through...

  11. Auction-based distributed efficient economic operations of microgrid systems

    NASA Astrophysics Data System (ADS)

    Zou, Suli; Ma, Zhongjing; Liu, Xiangdong

    2014-12-01

    This paper studies the economic operations of the microgrid in a distributed way such that the operational schedule of each of the units, like generators, load units, storage units, etc., in a microgrid system, is implemented by autonomous agents. We apply and generalise the progressive second price (PSP) auction mechanism which was proposed by Lazar and Semret to efficiently allocate the divisible network resources. Considering the economic operation for the microgrid systems, the generators play as sellers to supply energy and the load units play as the buyers to consume energy, while a storage unit, like battery, super capacitor, etc., may transit between buyer and seller, such that it is a buyer when it charges and becomes a seller when it discharges. Furthermore in a connected mode, each individual unit competes against not only the other individual units in the microgrid but also the exogenous main grid possessing fixed electricity price and infinite trade capacity; that is to say, the auctioneer assigns the electricity among all individual units and the main grid with respect to the submitted bid strategies of all individual units in the microgrid in an economic way. Due to these distinct characteristics, the underlying auction games are distinct from those studied in the literature. We show that under mild conditions, the efficient economic operation strategy is a Nash equilibrium (NE) for the PSP auction games, and propose a distributed algorithm under which the system can converge to an NE. We also show that the performance of worst NE can be bounded with respect to the system parameters, say the energy trading price with the main grid, and based upon that, the implemented NE is unique and efficient under some conditions.

  12. Using a Second-Price Auction to set Military Retention Bonus Levels: An Application to the Australian Army

    DTIC Science & Technology

    2008-03-01

    and do not reflect the official policy or position of the Department of Defense or the U.S. Government. 12a. DISTRIBUTION / AVAILABILITY STATEMENT...auction is used to set salaries levels in a generic labor market scenario. The experimental results support the literature: a second-price auction...analyses an experiment where a sealed-bid, second-price auction is used to set salaries levels in a generic labor market scenario. The experimental

  13. 29 CFR 516.13 - Livestock auction employees exempt from overtime pay requirements under section 13(b)(13) of the...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Livestock auction employees exempt from overtime pay....13 Livestock auction employees exempt from overtime pay requirements under section 13(b)(13) of the... employee is employed both in agriculture and in connection with livestock auction operations: (a) The total...

  14. 77 FR 9655 - Mobility Fund Phase I Auction Updated List of Potentially Eligible Census Blocks

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-17

    ... Updated List of Potentially Eligible Census Blocks AGENCY: Federal Communications Commission. ACTION... Bureaus provide an updated list of potentially eligible census blocks for Auction 901 scheduled to... summary of the Mobility Fund Phase I Auction Updated List of Potentially Eligible Census Blocks Public...

  15. Mechanism Design for Multi-slot Ads Auction in Sponsored Search Markets

    NASA Astrophysics Data System (ADS)

    Deng, Xiaotie; Sun, Yang; Yin, Ming; Zhou, Yunhong

    In this paper, we study pricing models for multi-slot advertisements, where advertisers can bid to place links to their sales webpages at one or multiple slots on a webpage, called the multi-slot AD auction problem. We develop and analyze several important mechanisms, including the VCG mechanism for multi-slot ads auction, the optimal social welfare solution, as well as two weighted GSP-like protocols (mixed and hybrid). Furthermore, we consider that forward-looking Nash equilibrium and prove its existence in the weighted GSP-like pricing protocols.

  16. Ordering competition: the interactional accomplishment of the sale of art and antiques at auction.

    PubMed

    Heath, Christian; Luff, Paul

    2007-03-01

    Auctions provide an institutional solution to a social problem; they enable the legitimate pricing and exchange of goods where those goods are of uncertain value. In turn, auctions raise a number of social and organizational issues that are resolved within the interaction that arise in sales by auction. In this paper, we examine sales of fine art, antiques and objets d'art and explore the ways in which auctioneers mediate competition between buyers and establish a value for goods. In particular, we explore how bids are elicited, co-ordinated and revealed so as to rapidly escalate the price of goods in a transparent manner that enables the legitimate valuation and exchange of goods. In directing attention towards the significance of the social interaction, including talk, visual and material conduct, the paper contributes to the growing corpus of ethnographic studies of markets. It suggests that to understand the operation of markets and their outcomes, and to unpack issues of agency, trust and practice, we need to place the 'interaction order' at the heart of analytic agenda.

  17. 77 FR 69933 - Expanding the Economic and Innovation Opportunities of Spectrum Through Incentive Auctions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-21

    ...In the Notice of Proposed Rulemaking, ``Expanding the Economic and Innovation Opportunities of Spectrum Through Incentive Auctions'' (NPRM), released October 2, 2012, the Commission considers matters related to the implementation of Congress's mandate to conduct an incentive auction of broadcast television spectrum as set forth in the Middle Class Tax Relief and Job Creation Act of 2012 (Spectrum Act).

  18. Books at Auction: The Art of Deaccessioning.

    ERIC Educational Resources Information Center

    Model, Peter

    1981-01-01

    Lack of space and budget cuts force many libraries to weed out books and to be selective in accepting collection bequests. The approach for deciding which books to weed out and whether to dispose of these books through dealers or auctions are decisions private clubs and many libraries must make. (RBF)

  19. 75 FR 32773 - Auction of 218-219 MHz Service and Phase II 220 MHz Service Licenses Scheduled for December 7...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-09

    ... licenses included in Auction 89 using the Commission's standard simultaneous multiple-round auction format... sequential bidding rounds. The initial bidding schedule will be announced in a public notice to be released.... For Auction 89, the Bureau proposes to employ a simultaneous stopping rule approach. A simultaneous...

  20. The Modified Values Auction: A Data Analytic Classroom Game

    ERIC Educational Resources Information Center

    Miller, Larry D.

    1978-01-01

    Describes a modified values auction simulation game, reports on three levels of analysis employing actual classroom data (group, subgroup, and individual), and offers suggestions for utilizing values data in social research. (CMV)

  1. 75 FR 31820 - Notice of Applications for Deregistration Under Section 8(f) of the Investment Company Act of 1940

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-04

    .... Each applicant also distributed preferred shares of Dutch Auction Rate Transferable Securities (``DARTS'') of the acquiring fund to holders of applicants' Auction Rate Preferred Shares, DARTS, or Auction... distributed Dutch Auction Rate Transferable Securities (``DARTS'') of the acquiring fund to the holders of...

  2. Evaluation of Aviation Career Pay Incentives Among the Naval Aviation Enterprise Utilizing Auction Mechanisms

    DTIC Science & Technology

    2015-03-01

    the cm1·ent program has failed to meet targeted retention across conununities while ove1paying nearly $5,300,000 dming FY-2013, according to Eric...Kelso. This thesis examines the potential improvements of applying unif01m-price auction, Quality Adjusted Discount (QUAD), and Combinatorial Retention ...responses, we developed individual quality scores and reservation prices to apply three auction mechanisms to the retention goals and costs of the

  3. Hipster Racism and Sexism in Charity Date Auctions: Individualism, Privilege Blindness and Irony in the Academy

    ERIC Educational Resources Information Center

    Current, Cheris Brewer; Tillotson, Emily

    2018-01-01

    This paper follows one small, Christian university's five-year experience with student charity date auctions. The contemporary re-emergence of date auctions represents a backlash against gender and racial progress. Student leaders believe that in a post-racial and post-sexist society, race and gender are decontextualised neutral elements of…

  4. Security Approaches in Using Tablet Computers for Primary Data Collection in Clinical Research

    PubMed Central

    Wilcox, Adam B.; Gallagher, Kathleen; Bakken, Suzanne

    2013-01-01

    Next-generation tablets (iPads and Android tablets) may potentially improve the collection and management of clinical research data. The widespread adoption of tablets, coupled with decreased software and hardware costs, has led to increased consideration of tablets for primary research data collection. When using tablets for the Washington Heights/Inwood Infrastructure for Comparative Effectiveness Research (WICER) project, we found that the devices give rise to inherent security issues associated with the potential use of cloud-based data storage approaches. This paper identifies and describes major security considerations for primary data collection with tablets; proposes a set of architectural strategies for implementing data collection forms with tablet computers; and discusses the security, cost, and workflow of each strategy. The paper briefly reviews the strategies with respect to their implementation for three primary data collection activities for the WICER project. PMID:25848559

  5. Security approaches in using tablet computers for primary data collection in clinical research.

    PubMed

    Wilcox, Adam B; Gallagher, Kathleen; Bakken, Suzanne

    2013-01-01

    Next-generation tablets (iPads and Android tablets) may potentially improve the collection and management of clinical research data. The widespread adoption of tablets, coupled with decreased software and hardware costs, has led to increased consideration of tablets for primary research data collection. When using tablets for the Washington Heights/Inwood Infrastructure for Comparative Effectiveness Research (WICER) project, we found that the devices give rise to inherent security issues associated with the potential use of cloud-based data storage approaches. This paper identifies and describes major security considerations for primary data collection with tablets; proposes a set of architectural strategies for implementing data collection forms with tablet computers; and discusses the security, cost, and workflow of each strategy. The paper briefly reviews the strategies with respect to their implementation for three primary data collection activities for the WICER project.

  6. Electronic Reverse Auctions: Integrating an E-Sourcing Tool into a Sales and Purchasing Cross-Course Negotiation Project

    ERIC Educational Resources Information Center

    Williams, Jacqueline A.; Dobie, Kathryn

    2011-01-01

    Electronic reverse auctions are increasingly being used by firms to improve firm financial and operational performance. The described teaching innovation serves as a model for introducing electronic reverse auctions as a central element in a comprehensive negotiation exercise involving sales management and purchasing management students. Results…

  7. 31 CFR 356.5 - What types of securities does the Treasury auction?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... part to distinguish such securities from “inflation-protected” securities. We refer to fixed-principal... years. (2) Treasury inflation-protected notes. (i) Are issued with a stated rate of interest to be applied to the inflation-adjusted principal on each interest payment date; (ii) Have interest payable...

  8. Comparisons of auction mechanisms in a multiple unit setting: A consideration for restructuring electric power markets

    NASA Astrophysics Data System (ADS)

    Bernard, John Charles

    The objective of this study was to compare the performance of five single sided auctions that could be used in restructured electric power markets across different market sizes in a multiple unit setting. Auction selection would profoundly influence an industry over $200 billion in size in the United States, and the consequences of implementing an inappropriate mechanism would be great. Experimental methods were selected to analyze the auctions. Two rounds of experiments were conducted, the first testing the sealed offer last accepted offer (LAO) and first rejected offer (FRO), and the clock English (ENG) and sealed offer English (SOE) in markets of sizes two and six. The FRO, SOE, and ENG used the same pricing rule. Second round testing was on the LAO, FRO, and the nonuniform price multiple unit Vickrey (MUV) in markets of sizes two, four, and six. Experiments lasted 23 and 75 periods for rounds 1 and 2 respectively. Analysis of variance and contrast analysis were used to examine the data. The four performance measures used were price, efficiency, profits per unit, and supply revelation. Five basic principles were also assessed: no sales at losses, all low cost capacity should be offered and sold, no high cost capacity should sell, and the market should clear. It was expected group size and auction type would affect performance. For all performance measures, group size was a significant variable, with smaller groups showing poorer performance. Auction type was significant only for the efficiency performance measure, where clock auctions outperformed the others. Clock auctions also proved superior for the first four principles. The FRO performed poorly in almost all situations, and should not be a preferred mechanism in any market. The ENG was highly efficient, but expensive for the buyer. The SOE appeared superior to the FRO and ENG. The clock improves efficiency over the FRO while less information kept prices under the ENG. The MUV was superior in revealing costs

  9. 75 FR 56533 - Wireless Telecommunications Bureau Postpones Auction of 218-219 MHz Service and Phase II 220 MHz...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-16

    ... FEDERAL COMMUNICATIONS COMMISSION [AU Docket No. 10-107; DA 10-1630] Wireless Telecommunications... Auction 89. FOR FURTHER INFORMATION CONTACT: Wireless Telecommunications Bureau, Auctions and Spectrum... by the Chief, Wireless Telecommunications Bureau pursuant to authority delegated by 47 CFR 0.131...

  10. Analysis on trust influencing factors and trust model from multiple perspectives of online Auction

    NASA Astrophysics Data System (ADS)

    Yu, Wang

    2017-10-01

    Current reputation models lack the research on online auction trading completely so they cannot entirely reflect the reputation status of users and may cause problems on operability. To evaluate the user trust in online auction correctly, a trust computing model based on multiple influencing factors is established. It aims at overcoming the efficiency of current trust computing methods and the limitations of traditional theoretical trust models. The improved model comprehensively considers the trust degree evaluation factors of three types of participants according to different participation modes of online auctioneers, to improve the accuracy, effectiveness and robustness of the trust degree. The experiments test the efficiency and the performance of our model under different scale of malicious user, under environment like eBay and Sporas model. The experimental results analysis show the model proposed in this paper makes up the deficiency of existing model and it also has better feasibility.

  11. 41 CFR 102-38.95 - What is an auction?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What is an auction? 102-38.95 Section 102-38.95 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 38-SALE OF PERSONAL PROPERTY...

  12. 41 CFR 102-38.95 - What is an auction?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false What is an auction? 102-38.95 Section 102-38.95 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 38-SALE OF PERSONAL PROPERTY...

  13. 41 CFR 102-38.95 - What is an auction?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false What is an auction? 102-38.95 Section 102-38.95 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 38-SALE OF PERSONAL PROPERTY...

  14. 41 CFR 102-38.95 - What is an auction?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false What is an auction? 102-38.95 Section 102-38.95 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 38-SALE OF PERSONAL PROPERTY...

  15. 41 CFR 102-38.95 - What is an auction?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What is an auction? 102-38.95 Section 102-38.95 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 38-SALE OF PERSONAL PROPERTY...

  16. 77 FR 22575 - The Auction Block Company, an Alaska Corporation v. the City of Homer, a Municipal Corporation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-16

    ... FEDERAL MARITIME COMMISSION [Docket No. 12-03] The Auction Block Company, an Alaska Corporation v. the City of Homer, a Municipal Corporation and Its Port of Homer; Notice of Filing of Complaint and...) by The Auction Block Company, an Alaska Corporation, hereinafter ``Complainant,'' against the City of...

  17. Efficient Nash Equilibrium Resource Allocation Based on Game Theory Mechanism in Cloud Computing by Using Auction.

    PubMed

    Nezarat, Amin; Dastghaibifard, G H

    2015-01-01

    One of the most complex issues in the cloud computing environment is the problem of resource allocation so that, on one hand, the cloud provider expects the most profitability and, on the other hand, users also expect to have the best resources at their disposal considering the budget constraints and time. In most previous work conducted, heuristic and evolutionary approaches have been used to solve this problem. Nevertheless, since the nature of this environment is based on economic methods, using such methods can decrease response time and reducing the complexity of the problem. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneer's utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.

  18. 78 FR 21355 - Tribal Mobility Fund Phase I Auction Scheduled for October 24, 2013; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-10

    ... unit is the basic unit that will be used to determine the winners in Auction 902 and to measure... Bureaus will measure coverage based on population rather than road miles. Under the auction design options...: EV-DO, EV-DO Rev A, UMTS/HSPA, HSPA+, WiMAX, and LTE. If the Mosaik data did not show such coverage...

  19. 49 CFR 580.9 - Odometer record retention for auction companies.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... the buyer; (c) The vehicle identification number; and (d) The odometer reading on the date which the auction company took possession of the motor vehicle. ... permits systematic retrieval, for five years following the date of sale of each motor vehicle, the...

  20. 49 CFR 580.9 - Odometer record retention for auction companies.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the buyer; (c) The vehicle identification number; and (d) The odometer reading on the date which the auction company took possession of the motor vehicle. ... permits systematic retrieval, for five years following the date of sale of each motor vehicle, the...

  1. 49 CFR 580.9 - Odometer record retention for auction companies.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... the buyer; (c) The vehicle identification number; and (d) The odometer reading on the date which the auction company took possession of the motor vehicle. ... permits systematic retrieval, for five years following the date of sale of each motor vehicle, the...

  2. 49 CFR 580.9 - Odometer record retention for auction companies.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... the buyer; (c) The vehicle identification number; and (d) The odometer reading on the date which the auction company took possession of the motor vehicle. ... permits systematic retrieval, for five years following the date of sale of each motor vehicle, the...

  3. 49 CFR 580.9 - Odometer record retention for auction companies.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... the buyer; (c) The vehicle identification number; and (d) The odometer reading on the date which the auction company took possession of the motor vehicle. ... permits systematic retrieval, for five years following the date of sale of each motor vehicle, the...

  4. The influence of an online auction's product price and e-retailer reputation on consumers' perception, attitude, and behavioral intention.

    PubMed

    Wu, Wann-Yih; Huang, Po-Ching; Fu, Chen-Su

    2011-06-01

    Online auctions combine the conventional auction model with information technology. However, information asymmetry within such auctions causes risks and uncertainties that influence consumer purchase intentions. In this study, a 2 (product price: high vs. low) × 2 (e-retailer reputation: high vs. low) experimental design was used to understand whether the product price and e-retailer reputation will influence consumers' perceived risk, attitude toward the website and purchase intention. The results of this study indicate that perceived risk negatively influences consumer attitude toward the website and online purchase intention, while consumer attitude toward the website positively influences purchase intention. Moreover, involvement moderates the influence of product price and e-retailer reputation only on social risk but does not have a significant effect on consumer attitude toward the website. This study contributes to a more comprehensive understanding of online auction users' behavior. Finally, the managerial implications, limitations and future research directions are also provided. © 2011 The Authors. Scandinavian Journal of Psychology © 2011 The Scandinavian Psychological Associations.

  5. 78 FR 11179 - Auction of Lower and Upper Paging Bands Licenses Scheduled for July 16, 2013; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-15

    ... investigating and evaluating all technical and marketplace factors that may have a bearing on the value of the... cooperate, collaborate, or communicate, including discussing bids, bidding strategies, or post-auction... schedule in order to foster an auction pace that reasonably balances speed with the bidders' need to study...

  6. 9 CFR 2.76 - Records: Operators of auction sales and brokers.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ..., DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Records § 2.76 Records: Operators of auction sales and... breed or type of animal; (ii) The sex of the animal; and (iii) The date of birth or approximate age; and...

  7. Understanding Persuasive Online Sales Messages from eBay Auctions

    ERIC Educational Resources Information Center

    White, Barbara Jo; Clapper, Danial; Noel, Rita; Fortier, Jenny; Grabolosa, Pierre

    2007-01-01

    Online auctions are dominated by eBay, which started bringing together buyers and sellers in 1995. eBay product listings can easily be used in business communication courses to better understand online sales messages. One great advantage is that the vast majority of nearly 15 million listings a day are written and assembled by everyday consumers…

  8. Teaching Auction Strategy Using Experiments Administered Via the Internet

    ERIC Educational Resources Information Center

    Asker, John; Grosskopf, Brit; McKinney, C. Nicholas; Niederle, Muriel; Roth, Alvin E.; Weizsacker, Georg

    2004-01-01

    The authors present an experimental design used to teach concepts in the economics of auctions and implications for e-Business procurement. The experiment is easily administered and can be adapted to many different treatments. The chief innovation is that it does not require the use of a lab or class time. Instead, the design can be implemented on…

  9. Equilibrium Strategy and Population-Size Effects in Lowest Unique Bid Auctions

    NASA Astrophysics Data System (ADS)

    Pigolotti, Simone; Bernhardsson, Sebastian; Juul, Jeppe; Galster, Gorm; Vivo, Pierpaolo

    2012-02-01

    In lowest unique bid auctions, N players bid for an item. The winner is whoever places the lowest bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large data set of internet auctions. The theory agrees with the data with striking accuracy for small population-size N, while for larger N a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game.

  10. Making Marketing Principles Tangible: Online Auctions as Living Case Studies

    ERIC Educational Resources Information Center

    Wood, Charles M.; Suter, Tracy A.

    2004-01-01

    This article presents an effective course supplement for Principles of Marketing classes. An experiential project involving online auctions is offered to instructors seeking to create a more participatory student environment and an interactive teaching style. A number of learning points are illustrated that allow instructors to use an auction…

  11. A Centralized Auction Mechanism for the Disability and Survivors Insurance in Chile

    NASA Astrophysics Data System (ADS)

    Reyes H., Gonzalo

    As part of the pension reform recently approved in Chile, the government introduced a centralized auction mechanism to provide the Disability and Survivors (D&S) Insurance that covers recent contributors among the more than 8 million participants in the mandatory private pension system. This paper is intended as a case study presenting the main distortions found in the decentralized operation of the system that led to this reform and the challenges faced when designing a competitive auction mechanism to be implemented jointly by the Pension Fund Managers (AFP). In a typical bilateral contract the AFP retained much of the risk and the Insurance Company acted in practice as a reinsurer. The process to hire this contract was not competitive and colligated companies ended up providing the service. Several distortions affected competition in the market through incentives to cream-skim members by AFPs (since they bear most of the risk) or efforts to block disability claims. Since the price of this insurance is hidden in the fees charged by AFPs for the administration of individual accounts and pension funds there was lack of price transparency. Since new AFPs have no history of members’ disability and mortality profile the insurance contract acted as a barrier to entry in the market of AFP services, especially when D&S insurance costs reached 50% of total costs. Cross-subsidies between members of the same AFP, inefficient risk pooling (due to pooling occurring at the AFP rather than at the system level) and regulatory arbitrage, since AFPs provided insurance not being regulated as an insurance company, were also present. A centralized auction mechanism solves these market failures, but also gives raise to new challenges, such as how to design a competitive auction that attracts participation and deters collusion. Design features that were incorporated in the regulation to tackle these issues, such as dividing coverage into predefined percentage blocks, are presented

  12. Using Priced Options to Solve the Exposure Problem in Sequential Auctions

    NASA Astrophysics Data System (ADS)

    Mous, Lonneke; Robu, Valentin; La Poutré, Han

    This paper studies the benefits of using priced options for solving the exposure problem that bidders with valuation synergies face when participating in multiple, sequential auctions. We consider a model in which complementary-valued items are auctioned sequentially by different sellers, who have the choice of either selling their good directly or through a priced option, after fixing its exercise price. We analyze this model from a decision-theoretic perspective and we show, for a setting where the competition is formed by local bidders, that using options can increase the expected profit for both buyers and sellers. Furthermore, we derive the equations that provide minimum and maximum bounds between which a synergy buyer's bids should fall in order for both sides to have an incentive to use the options mechanism. Next, we perform an experimental analysis of a market in which multiple synergy bidders are active simultaneously.

  13. Encouraging information sharing to boost the name-your-own-price auction

    NASA Astrophysics Data System (ADS)

    Chen, Yahong; Li, Jinlin; Huang, He; Ran, Lun; Hu, Yusheng

    2017-08-01

    During a name-your-own-price (NYOP) auction, buyers can learn a lot of knowledge from their socially connected peers. Such social learning process makes them become more active to attend the auction and also helps them make decisions on what price to submit. Combining an information diffusion model and a belief decision model, we explore three effects of bidders' information sharing on the buyers' behaviors and the seller profit. The results indicate that information sharing significantly increases the NYOP popularity and the seller profit. When enlarging the quality or quantity of information sharing, or increasing the spreading efficiency of the network topology, the number of attenders and the seller profit are increased significantly. However, the spread of information may make bidders be more likely to bid higher and consequently lose surplus. In addition, the different but interdependent influence of the successful information and failure information are discussed in this work.

  14. A Hierarchical Auction-Based Mechanism for Real-Time Resource Allocation in Cloud Robotic Systems.

    PubMed

    Wang, Lujia; Liu, Ming; Meng, Max Q-H

    2017-02-01

    Cloud computing enables users to share computing resources on-demand. The cloud computing framework cannot be directly mapped to cloud robotic systems with ad hoc networks since cloud robotic systems have additional constraints such as limited bandwidth and dynamic structure. However, most multirobotic applications with cooperative control adopt this decentralized approach to avoid a single point of failure. Robots need to continuously update intensive data to execute tasks in a coordinated manner, which implies real-time requirements. Thus, a resource allocation strategy is required, especially in such resource-constrained environments. This paper proposes a hierarchical auction-based mechanism, namely link quality matrix (LQM) auction, which is suitable for ad hoc networks by introducing a link quality indicator. The proposed algorithm produces a fast and robust method that is accurate and scalable. It reduces both global communication and unnecessary repeated computation. The proposed method is designed for firm real-time resource retrieval for physical multirobot systems. A joint surveillance scenario empirically validates the proposed mechanism by assessing several practical metrics. The results show that the proposed LQM auction outperforms state-of-the-art algorithms for resource allocation.

  15. 31 CFR 356.11 - How are bids submitted in an auction?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., our computer time stamp will establish the receipt time. You are bound by your bids after the closing... failures or disruptions of equipment or communications facilities used for participating in Treasury auctions. (4) Submitters are responsible for bids submitted using computer equipment on their premises...

  16. 31 CFR 356.11 - How are bids submitted in an auction?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., our computer time stamp will establish the receipt time. You are bound by your bids after the closing... failures or disruptions of equipment or communications facilities used for participating in Treasury auctions. (4) Submitters are responsible for bids submitted using computer equipment on their premises...

  17. 49 CFR 599.201 - Identification of salvage auctions and disposal facilities.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... facilities. 599.201 Section 599.201 Transportation Other Regulations Relating to Transportation (Continued... and Disposal Facilities § 599.201 Identification of salvage auctions and disposal facilities. (a... disposal facility identified in paragraph (a)(2) or (a)(3) of this section. (2) A disposal facility listed...

  18. Multiagent model and mean field theory of complex auction dynamics

    NASA Astrophysics Data System (ADS)

    Chen, Qinghua; Huang, Zi-Gang; Wang, Yougui; Lai, Ying-Cheng

    2015-09-01

    Recent years have witnessed a growing interest in analyzing a variety of socio-economic phenomena using methods from statistical and nonlinear physics. We study a class of complex systems arising from economics, the lowest unique bid auction (LUBA) systems, which is a recently emerged class of online auction game systems. Through analyzing large, empirical data sets of LUBA, we identify a general feature of the bid price distribution: an inverted J-shaped function with exponential decay in the large bid price region. To account for the distribution, we propose a multi-agent model in which each agent bids stochastically in the field of winner’s attractiveness, and develop a theoretical framework to obtain analytic solutions of the model based on mean field analysis. The theory produces bid-price distributions that are in excellent agreement with those from the real data. Our model and theory capture the essential features of human behaviors in the competitive environment as exemplified by LUBA, and may provide significant quantitative insights into complex socio-economic phenomena.

  19. 75 FR 78768 - Proposed Exemptions From Certain Prohibited Transaction Restrictions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-16

    ... Securities, as discussed herein. 2. The Applicant describes Auction Rate Securities (or ARS) and the arrangement by which ARS are bought and sold as follows. Auction Rate Securities are preferred stock or bonds... to perpetuity. ARS interest rates or dividend yields are determined and periodically reset at...

  20. Reciprocity in Online Markets: Empirical Studies of Auction and Barter Markets

    ERIC Educational Resources Information Center

    Ye, Shun

    2013-01-01

    My dissertation seeks to understand how reciprocity affects transaction outcomes and mechanism design in online markets. The first essay examines negative reciprocity illustrated as feedback-revoking behavior in the eBay auction market, focusing on its impact and implications for reputation system design. I utilize the biggest policy change of…

  1. Efficient Nash Equilibrium Resource Allocation Based on Game Theory Mechanism in Cloud Computing by Using Auction

    PubMed Central

    Nezarat, Amin; Dastghaibifard, GH

    2015-01-01

    One of the most complex issues in the cloud computing environment is the problem of resource allocation so that, on one hand, the cloud provider expects the most profitability and, on the other hand, users also expect to have the best resources at their disposal considering the budget constraints and time. In most previous work conducted, heuristic and evolutionary approaches have been used to solve this problem. Nevertheless, since the nature of this environment is based on economic methods, using such methods can decrease response time and reducing the complexity of the problem. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneer’s utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider. PMID:26431035

  2. Statistical mechanics of budget-constrained auctions

    NASA Astrophysics Data System (ADS)

    Altarelli, F.; Braunstein, A.; Realpe-Gomez, J.; Zecchina, R.

    2009-07-01

    Finding the optimal assignment in budget-constrained auctions is a combinatorial optimization problem with many important applications, a notable example being in the sale of advertisement space by search engines (in this context the problem is often referred to as the off-line AdWords problem). On the basis of the cavity method of statistical mechanics, we introduce a message-passing algorithm that is capable of solving efficiently random instances of the problem extracted from a natural distribution, and we derive from its properties the phase diagram of the problem. As the control parameter (average value of the budgets) is varied, we find two phase transitions delimiting a region in which long-range correlations arise.

  3. Collective induction without cooperation? Learning and knowledge transfer in cooperative groups and competitive auctions.

    PubMed

    Maciejovsky, Boris; Budescu, David V

    2007-05-01

    There is strong evidence that groups perform better than individuals do on intellective tasks with demonstrably correct solutions. Typically, these studies assume that group members share common goals. The authors extend this line of research by replacing standard face-to-face group interactions with competitive auctions, allowing for conflicting individual incentives. In a series of studies involving the well-known Wason selection task, they demonstrate that competitive auctions induce learning effects equally impressive as those of standard group interactions, and they uncover specific and general knowledge transfers from these institutions to new reasoning problems. The authors identify payoff feedback and information pooling as the driving factors underlying these findings, and they explain these factors within the theoretical framework of collective induction. ((c) 2007 APA, all rights reserved).

  4. See Art History in a New Light: Have an Art Auction

    ERIC Educational Resources Information Center

    Benter, Doris J.

    2008-01-01

    At Portledge School in Locust Valley, New York, ninth graders in their upper school study art history for one semester. The visual arts department has created a vigorous new syllabus culminating in an hour-long mock art auction. The department selects several art movements (e.g., Post-Impressionism, Cubism, Abstract Expressionism, Social Realism,…

  5. The impact of product information and trials on demand for smokeless tobacco and cigarettes: Evidence from experimental auctions

    PubMed Central

    Rousu, Matthew C.; O'Connor, Richard; Thrasher, James F; June, Kristie; Bansal-Travers, Maansi; Pitcavage, James

    2014-01-01

    Introduction Epidemiological and toxicological evidence suggests lower risk of smokeless tobacco (ST) products compared to cigarettes. Less is known, however, about consumer perceptions and use of novel forms of ST, including snus and dissolvable tobacco. Methods In this study, we conducted in-person experimental auctions in Buffalo, NY, Columbia, SC, and Selinsgrove, PA with 571 smokers to test the impact of information and product trials on smokers’ preferences. Auctions were conducted between November 2010-November 2011. Results We found no evidence of an impact of product trials on demand in our auctions. Anti-ST information increased demand for cigarettes when presented alone, but when presented with Pro-ST information it decreased demand for cigarettes. It did not decrease demand for ST products. Anti-smoking information increased demand for ST products, but did not affect cigarette demand. Conclusions These findings suggest that credible and effective communications about tobacco harm reduction should reinforce the negative effects of smoking. PMID:24321456

  6. The impact of product information and trials on demand for smokeless tobacco and cigarettes: evidence from experimental auctions.

    PubMed

    Rousu, Matthew C; O'Connor, Richard J; Thrasher, James F; June, Kristie M; Bansal-Travers, Maansi; Pitcavage, James

    2014-03-01

    Epidemiological and toxicological evidence suggests lower risk of smokeless tobacco (ST) products compared to cigarettes. Less is known, however, about consumer perceptions and use of novel forms of ST, including snus and dissolvable tobacco. In this study, we conducted in-person experimental auctions in Buffalo, NY, Columbia, SC, and Selinsgrove, PA with 571 smokers to test the impact of information and product trials on smokers' preferences. Auctions were conducted between November 2010-November 2011. We found no evidence of an impact of product trials on demand in our auctions. Anti-ST information increased demand for cigarettes when presented alone, but when presented with pro-ST information it decreased demand for cigarettes. It did not decrease demand for ST products. Anti-smoking information increased demand for ST products, but did not affect cigarette demand. These findings suggest that credible and effective communications about tobacco harm reduction should reinforce the negative effects of smoking. Copyright © 2013 Elsevier Inc. All rights reserved.

  7. An Auction-Based Spectrum Leasing Mechanism for Mobile Macro-Femtocell Networks of IoT.

    PubMed

    Chen, Xin; Xing, Lei; Qiu, Tie; Li, Zhuo

    2017-02-16

    The Internet of Things (IoT) is a vision of the upcoming society. It can provide pervasive communication between two or more entities using 4G-LTE (Long Term Evolution) communication technology. In 4G-LTE networks, there are two important problems: helping manage the spectrum demands of IoT devices and achieving much more revenue with the limited resource. This paper proposes a pricing framework to investigate the spectrum leasing in mobile heterogeneous networks with single macrocell and multiple femtocells. We modeled the leasing procedure between the macrocell service provider (MSP) and femtocell holders (FHs) as an auction to motivate the MSP to lease its spectrum resource. All FHs act as the bidders, and the monopolist MSP acts as the auctioneer. In the auction, FHs submit their bids to rent the spectrum resource so that they can make a profit by selling it to their subscribers. The MSP determines the spectrum leasing amount and chooses the winning FHs by solving the dynamic programming-based 0-1 knapsack problem. In our proposed framework, we focus on the spectrum pricing strategy and revenue maximization of the MSP. The simulation results show that the proposed scheme provides effective motivation for the MSP to lease the spectrum to FHs, and both the MSP and FHs can benefit from spectrum leasing.

  8. An Auction-Based Spectrum Leasing Mechanism for Mobile Macro-Femtocell Networks of IoT

    PubMed Central

    Chen, Xin; Xing, Lei; Qiu, Tie; Li, Zhuo

    2017-01-01

    The Internet of Things (IoT) is a vision of the upcoming society. It can provide pervasive communication between two or more entities using 4G-LTE (Long Term Evolution) communication technology. In 4G-LTE networks, there are two important problems: helping manage the spectrum demands of IoT devices and achieving much more revenue with the limited resource. This paper proposes a pricing framework to investigate the spectrum leasing in mobile heterogeneous networks with single macrocell and multiple femtocells. We modeled the leasing procedure between the macrocell service provider (MSP) and femtocell holders (FHs) as an auction to motivate the MSP to lease its spectrum resource. All FHs act as the bidders, and the monopolist MSP acts as the auctioneer. In the auction, FHs submit their bids to rent the spectrum resource so that they can make a profit by selling it to their subscribers. The MSP determines the spectrum leasing amount and chooses the winning FHs by solving the dynamic programming-based 0–1 knapsack problem. In our proposed framework, we focus on the spectrum pricing strategy and revenue maximization of the MSP. The simulation results show that the proposed scheme provides effective motivation for the MSP to lease the spectrum to FHs, and both the MSP and FHs can benefit from spectrum leasing. PMID:28212317

  9. 76 FR 9366 - Proposed Exemptions From Certain Prohibited Transaction Restrictions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-17

    ... Security'' or ``ARS'' means a security: (1) That is either a debt instrument (generally with a long-term... purchase of an ARS by Wachovia from a Plan. DATES: Effective Date: If granted, this proposed exemption will... describes Auction Rate Securities and the arrangement by which ARS are bought and sold as follows. Auction...

  10. 25 CFR 215.4 - Leases to be sold at public auction.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Leases to be sold at public auction. 215.4 Section 215.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR ENERGY AND MINERALS LEAD AND ZINC MINING... provided in the regulations in this part, no lead and zinc mining lease under this part of restricted or...

  11. 25 CFR 215.4 - Leases to be sold at public auction.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false Leases to be sold at public auction. 215.4 Section 215.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR ENERGY AND MINERALS LEAD AND ZINC MINING... provided in the regulations in this part, no lead and zinc mining lease under this part of restricted or...

  12. Auction dynamics: A volume constrained MBO scheme

    NASA Astrophysics Data System (ADS)

    Jacobs, Matt; Merkurjev, Ekaterina; Esedoǧlu, Selim

    2018-02-01

    We show how auction algorithms, originally developed for the assignment problem, can be utilized in Merriman, Bence, and Osher's threshold dynamics scheme to simulate multi-phase motion by mean curvature in the presence of equality and inequality volume constraints on the individual phases. The resulting algorithms are highly efficient and robust, and can be used in simulations ranging from minimal partition problems in Euclidean space to semi-supervised machine learning via clustering on graphs. In the case of the latter application, numerous experimental results on benchmark machine learning datasets show that our approach exceeds the performance of current state-of-the-art methods, while requiring a fraction of the computation time.

  13. Using Experimental Auctions to Examine Demand for E-Cigarettes.

    PubMed

    O'Connor, Richard; Rousu, Matthew C; Bansal-Travers, Maansi; Vogl, Lisa; Corrigan, Jay R

    2017-06-01

    E-cigarettes are the latest in a line of potentially reduced exposure products that have garnered interest among smokers. In this paper, we use experimental auctions to estimate smokers' demand for e-cigarettes and to assess the impact of advertisements on willingness to pay. These are actual auctions, with winners and losers, which means hypothetical biases often seen in surveys are minimized. We find smokers have positive demand for e-cigarettes, and that the print advertisements used in our study had greater effectiveness than video ads (b = 2.00, p < .05) in terms of increasing demand for disposable e-cigarettes. Demand was greater for reusable versus disposable e-cigarettes. In multivariate models, demand for e-cigarettes was higher among non-white participants and among smokers willing to pay more for cigarettes. Our findings suggest that cigarette smokers are interested in e-cigarettes as alternatives to traditional products, particularly for reusable forms, and that this demand can be influenced by messaging/advertising. Given these reduced harm products are appealing, if smokers are able to switch completely to e-cigarettes, there is a good chance for accrual of significant harm reduction. © The Author 2016. Published by Oxford University Press on behalf of the Society for Research on Nicotine and Tobacco. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  14. Effect of security threats on primary care access in Logar province, Afghanistan.

    PubMed

    Morikawa, Masahiro J

    2008-01-01

    Security threats are a major concern for access to health care in many war-torn communities; however, there is little quantified data on actual access to care in rural communities during war. Kinderberg International e.V. provided primary care in rural Logar province, Afghanistan, for these three years in eight districts until they were integrated into the new health care structure led by the Ministry of Health in early 2005. We examined the number of patients visiting our clinic before and during the security threats related to the parliamentary election and subsequent national assembly in 2004. The number of patients declined in remote clinics while the number increased in central locations. This finding has an important practical implication: the monitoring of access to care should include remote clinics, otherwise it may potentially underestimate compromised access to health care due to security threats.

  15. Auctionable fixed transmission rights for congestion management

    NASA Astrophysics Data System (ADS)

    Alomoush, Muwaffaq Irsheid

    the transaction by the ISO, take a decision to expand the existing system, or retain the original structure of the system. Also, the thesis investigates the impact of wheeling transactions on congestion management, where we present a generalized mathematical model for the Fixed Transmission Right (FTR) auction. The auction guarantees FTR availability to all participants on a non-discriminatory basis, in which system users are permitted to buy, sell and trade FTRs through an auction. When FTRs are utilized with LMPs, they increase the efficient use of the transmission system and let a transmission customer gain advantageous features such as acquiring a mechanism to offset the extra cost due to congestion charges, providing financial and operational certainty and making system users pay for the actual use of the congested paths. The thesis also highlighted FTR trading in secondary markets to self-arrange access across different paths, create long-term transmission rights and provide more commercial certainty.

  16. The impact of secure messaging on workflow in primary care: Results of a multiple-case, multiple-method study.

    PubMed

    Hoonakker, Peter L T; Carayon, Pascale; Cartmill, Randi S

    2017-04-01

    Secure messaging is a relatively new addition to health information technology (IT). Several studies have examined the impact of secure messaging on (clinical) outcomes but very few studies have examined the impact on workflow in primary care clinics. In this study we examined the impact of secure messaging on workflow of clinicians, staff and patients. We used a multiple case study design with multiple data collections methods (observation, interviews and survey). Results show that secure messaging has the potential to improve communication and information flow and the organization of work in primary care clinics, partly due to the possibility of asynchronous communication. However, secure messaging can also have a negative effect on communication and increase workload, especially if patients send messages that are not appropriate for the secure messaging medium (for example, messages that are too long, complex, ambiguous, or inappropriate). Results show that clinicians are ambivalent about secure messaging. Secure messaging can add to their workload, especially if there is high message volume, and currently they are not compensated for these activities. Staff is -especially compared to clinicians- relatively positive about secure messaging and patients are overall very satisfied with secure messaging. Finally, clinicians, staff and patients think that secure messaging can have a positive effect on quality of care and patient safety. Secure messaging is a tool that has the potential to improve communication and information flow. However, the potential of secure messaging to improve workflow is dependent on the way it is implemented and used. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. Human remains sold to the highest bidder! A snapshot of the buying and selling of human skeletal remains on eBay, an Internet auction site.

    PubMed

    Huxley, Angie K; Finnegan, Michael

    2004-01-01

    Internet auction sites have become increasingly popular, with diverse items up for sale to the public worldwide. The purposes of this paper are to inform the forensic community that human skeletal remains, old and new, are for sale on the eBay internet auction site, and to advise forensic scientists that eBay does not use a forensic anthropologist to assess photographs of these materials. Over the last few years, this website was "surfed," with numerous auctions during this period. After contacting eBay by email, representatives responded that they adhere to Native American Grave Protection and Repatriation Act (NAGPRA) and that their website indicates that auctions must state that sale of human remains is for instructional purposes only. Based on the photographs, the remains appear to be of prehistoric and modern origin. An unfortunate consequence of such sale may generate interest in stealing remains from graves, mortuaries, hospitals, or county morgues worldwide.

  18. Design Implications of Real-Time Feedback in Continuous Combinatorial Auctions: An Experimental Investigation

    ERIC Educational Resources Information Center

    Sanyal, Pallab

    2009-01-01

    Information Technology (IT) has spawned the growth of novel and innovative market mechanisms (such as online auctions) and associated businesses (such as eBay and Priceline) that were not feasible without the capabilities and reach of these modern information technologies. Previous studies on designing trading mechanisms for online markets…

  19. Teaching Undergraduate Money and Banking: T-Bill Auctions and Stock Market Models

    ERIC Educational Resources Information Center

    Saros, Daniel E.

    2009-01-01

    The author offers innovative approaches to 3 topics that are typically only briefly mentioned (if at all) in money and banking courses. The first topic is a Treasury bill auction experiment in which students have an opportunity to participate directly. The results from a class of 14 money and banking students are used to explain how an instructor…

  20. A novel income security intervention to address poverty in a primary care setting: a retrospective chart review.

    PubMed

    Jones, Marcella K; Bloch, Gary; Pinto, Andrew D

    2017-08-17

    To examine the development and implementation of a novel income security intervention in primary care. A retrospective, descriptive chart review of all patients referred to the Income Security Heath Promotion service during the first year of the service (December 2013-December 2014). A multisite interdisciplinary primary care organisation in inner city Toronto, Canada, serving over 40 000 patients. The study population included 181 patients (53% female, mean age 48 years) who were referred to the Income Security Health Promotion service and engaged in care. The Income Security Health Promotion service consists of a trained health promoter who provides a mixture of expert advice and case management to patients to improve income security. An advisory group, made up of physicians, social workers, a community engagement specialist and a clinical manager, supports the service. Sociodemographic information, health status, referral information and encounter details were collected from patient charts. Encounters focused on helping patients with increasing their income (77.4%), reducing their expenses (58.6%) and improving their financial literacy (26.5%). The health promoter provided an array of services to patients, including assistance with taxes, connecting to community services, budgeting and accessing free services. The service could be improved with more specific goal setting, better links to other members of the healthcare team and implementing routine follow-up with each patient after discharge. Income Security Health Promotion is a novel service within primary care to assist vulnerable patients with a key social determinant of health. This study is a preliminary look at understanding the functioning of the service. Future research will examine the impact of the Income Security Health Promotion service on income security, financial literacy, engagement with health services and health outcomes. © Article author(s) (or their employer(s) unless otherwise stated in

  1. Low-traffic limit and first-passage times for a simple model of the continuous double auction

    NASA Astrophysics Data System (ADS)

    Scalas, Enrico; Rapallo, Fabio; Radivojević, Tijana

    2017-11-01

    We consider a simplified model of the continuous double auction where prices are integers varying from 1 to N with limit orders and market orders, but quantity per order limited to a single share. For this model, the order process is equivalent to two M / M / 1 queues. We study the behavior of the auction in the low-traffic limit where limit orders are immediately matched by market orders. In this limit, the distribution of prices can be computed exactly and gives a reasonable approximation of the price distribution when the ratio between the rate of order arrivals and the rate of order executions is below 1 / 2. This is further confirmed by the analysis of the first-passage time in 1 or N.

  2. A revealed preference approach to estimating supply curves for ecosystem services: use of auctions to set payments for soil erosion control in Indonesia.

    PubMed

    Jack, B Kelsey; Leimona, Beria; Ferraro, Paul J

    2009-04-01

    To supply ecosystem services, private landholders incur costs. Knowledge of these costs is critical for the design of conservation-payment programs. Estimating these costs accurately is difficult because the minimum acceptable payment to a potential supplier is private information. We describe how an auction of payment contracts can be designed to elicit this information during the design phase of a conservation-payment program. With an estimate of the ecosystem-service supply curve from a pilot auction, conservation planners can explore the financial, ecological, and socioeconomic consequences of alternative scaled-up programs. We demonstrate the potential of our approach in Indonesia, where soil erosion on coffee farms generates downstream ecological and economic costs. Bid data from a small-scale, uniform-price auction for soil-conservation contracts allowed estimates of the costs of a scaled-up program, the gain from integrating biophysical and economic data to target contracts, and the trade-offs between poverty alleviation and supply of ecosystem services. Our study illustrates an auction-based approach to revealing private information about the costs of supplying ecosystem services. Such information can improve the design of programs devised to protect and enhance ecosystem services.

  3. 76 FR 82336 - Self-Regulatory Organizations; Chicago Board Options Exchange, Incorporated; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-30

    ... (2) a non-price specific commitment to auto- match all Auction responses achieved during the Auction... price responses, leading to more robust competition in AIM. \\16\\ See supra note 3; see also Securities... enhance competition in the AIM Auctions and provide customers with additional opportunities for price...

  4. 77 FR 73969 - Expanding the Economic and Innovation Opportunities of Spectrum Through Incentive Auctions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-12

    ...] Expanding the Economic and Innovation Opportunities of Spectrum Through Incentive Auctions AGENCY: Federal... Media Bureau extends the deadline for filing comments and reply comments on the Notice of Proposed... delivery, by commercial overnight courier, or by first-class or overnight U.S. Postal Service mail...

  5. Clean air, clear market. Making emissions trading work: The role of a computer-assisted auction

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bartels, C.W.; Marron, D.B.; Lipsky, M.I.

    1993-06-15

    Creating a new commodity presents the chance to develop new markets in which to trade it. In many cases, existing markets can be adapted easily; in other cases it proves worthwhile to develop new forms that reflect special characteristics of the commodity and those who trade it. In the case of the sulfur dioxide (SO[sub 2]) emission allowances created by the Clean Air Act Amendments of 1990, a number of standard market forms already have been adopted. While these will prove useful for handling some transactions, a new Market Clearing Auction (MCA) offers buyers and sellers a centralized marketplace formore » trading SO[sub 2] emission allowances. The MCA, which was developed by the brokerage firm Cantor Fitzgerald, is a computer-assisted [open quotes]smart[close quotes] auction designed to replicate the outcome of an efficient market in emission allowances, and accepts bids and offers for any possible combination of allowances. Orders can be submitted for streams of allowances. Orders can be submitted for streams of allowances covering more than one year. The auction then determines the combination of bids and offers that maximizes the gains from trades in the market, and establishes uniform market clearing prices for each allowance issue (1995, 1996, and so on). Once executed, trades are settled on a cash-forward basis; that is, allowances are delivered and payments are made at future dates.« less

  6. 77 FR 38061 - Mobility Fund Phase I Auction Supplemental Short-Form Instructions and Other Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-26

    ... FEDERAL COMMUNICATIONS COMMISSION [AU Docket No. 12-25; DA 12-947] Mobility Fund Phase I Auction Supplemental Short-Form Instructions and Other Information AGENCY: Federal Communications Commission. ACTION... number, for example, DA 12-947. The Supplemental Filing Instructions Public Notice and related documents...

  7. 78 FR 66955 - Exemptions From Certain Prohibited Transaction Restrictions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-07

    ... Auction Rate Securities by UBS AG (ARS Rights) in connection with a Settlement Agreement, (b) the sale of an Auction Rate Security to UBS pursuant to such ARS Rights, where such sale (a Settlement Sale) is... the offer of ARS Rights (the ARS Rights Offer) are consistent with the requirements set forth in the...

  8. 78 FR 43930 - Proposed Exemptions From Certain Prohibited Transaction Restrictions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ...), of certain rights issued to owners of Auction Rate Securities by UBS AG (ARS Rights) in connection with a Settlement Agreement, (b) the sale of an Auction Rate Security to UBS pursuant to such ARS... in Section III (a) The terms and delivery of the offer of ARS Rights (the ARS Rights Offer) are...

  9. 31 CFR 356.17 - How and when do I pay for securities awarded in an auction?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false How and when do I pay for securities... telephone, you must pay for any securities awarded to you by debit entry to a deposit account. (2) Bidding... account. In your payment amount you must include the par amount and any announced accrued interest and/or...

  10. 31 CFR 356.17 - How and when do I pay for securities awarded in an auction?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false How and when do I pay for securities... telephone, you must pay for any securities awarded to you by debit entry to a deposit account. (2) Bidding... account. In your payment amount you must include the par amount and any announced accrued interest and/or...

  11. 31 CFR 356.17 - How and when do I pay for securities awarded in an auction?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false How and when do I pay for securities... telephone, you must pay for any securities awarded to you by debit entry to a deposit account. (2) Bidding... account. In your payment amount you must include the par amount and any announced accrued interest and/or...

  12. 31 CFR 356.17 - How and when do I pay for securities awarded in an auction?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false How and when do I pay for securities... telephone, you must pay for any securities awarded to you by debit entry to a deposit account. (2) Bidding... account. In your payment amount you must include the par amount and any announced accrued interest and/or...

  13. Integrating Monetary and Non-monetary Reenlistment Incentives Utilizing the Combinatorial Retention Auction Mechanism (CRAM)

    DTIC Science & Technology

    2008-12-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS INTEGRATING MONETARY AND NON-MONETARY REENLISTMENT INCENTIVES UTILIZING THE...Monetary and Non- monetary Reenlistment Incentives Utilizing the Combinatorial Retention Auction Mechanism (CRAM) 6. AUTHOR(S) Brooke Zimmerman 5...iii Approved for public release; distribution is unlimited INTEGRATING MONETARY AND NON-MONETARY REENLISTMENT INCENTIVES UTILIZING THE

  14. Adaptive Sniping for Volatile and Stable Continuous Double Auction Markets

    NASA Astrophysics Data System (ADS)

    Toft, I. E.; Bagnall, A. J.

    This paper introduces a new adaptive sniping agent for the Continuous Double Auction. We begin by analysing the performance of the well known Kaplan sniper in two extremes of market conditions. We generate volatile and stable market conditions using the well known Zero Intelligence-Constrained agent and a new zero-intelligence agent Small Increment (SI). ZI-C agents submit random but profitable bids/offers and cause high volatility in prices and individual trader performance. Our new zero-intelligence agent, SI, makes small random adjustments to the outstanding bid/offer and hence is more cautious than ZI-C. We present results for SI in self-play and then analyse Kaplan in volatile and stable markets. We demonstrate that the non-adaptive Kaplan sniper can be configured to suit either market conditions, but no single configuration is performs well across both market types. We believe that in a dynamic auction environment where current or future market conditions cannot be predicted a viable sniping strategy should adapt its behaviour to suit prevailing market conditions. To this end, we propose the Adaptive Sniper (AS) agent for the CDA. AS traders classify sniping opportunities using a statistical model of market activity and adjust their classification thresholds using a Widrow-Hoff adapted search. Our AS agent requires little configuration, and outperforms the original Kaplan sniper in volatile and stable markets, and in a mixed trader type scenario that includes adaptive strategies from the literature.

  15. 78 FR 56874 - Comment Sought on Petition for Reconsideration of Auction 902 Procedures Public Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-16

    ... FEDERAL COMMUNICATIONS COMMISSION [AU Docket No. 13-53; DA 13-1876] Comment Sought on Petition for Reconsideration of Auction 902 Procedures Public Notice AGENCY: Federal Communications Commission. ACTION: Notice. SUMMARY: This document announces that on September 6, 2013, Smith Bagley, Inc. (SBI) filed a petition...

  16. The association of family food security and depression in mothers having primary school children in Ray-Iran.

    PubMed

    Payab, Moloud; Motlagh, Ahmad-Reza Dorosty; Eshraghian, Mohammadreza; Rostami, Reza; Siassi, Fereydoun

    2014-01-01

    As a major public health problem, food insecurity has adverse social and psychological effects, in addition to the impact on public health. This study aimed to determine the association of household food security and depression in mothers with primary school children in Ray County. This descriptive, analytical cross-sectional study was conducted on 430 mothers with primary school children in the spring 2010. During a two-stage cluster sampling, an 18-items food security questionnaire (USDA) and the Beck depression inventory were completed via interviewing mothers. Chi-squared test, one-way analysis of variance, simple regression and stepwise multiple regression were used to describe and analyze data, and to identify related factors using SPSS-16 software. The prevalence of food insecurity and depression in mothers were 50.2% and 51.4% respectively. Also 34.6% of mothers in the "food secure" group were depressed and 77.8% in "food insecure with hunger" group were depressed and this difference was statistically significant. Twelve out of the 20 examined variables (age, family size, number of children, economic status, home ownership, employment households, educational level of the mother and also the head of household, height, energy intake, and carbohydrate and protein intakes) were significantly associated with food security and depression. Food insecurity and depression in mothers with primary school children in Ray County showed a significant positive correlation (P < 0.001). The prevalence of household food insecurity and depression in the studied population were high. Since there is a significant relationship between food insecurity and depression, more attention must be paid to this group.

  17. Access to primary energy sources - the basis of national energy security

    NASA Astrophysics Data System (ADS)

    Szlązak, Jan; Szlązak, Rafał A.

    2017-11-01

    National energy security is of fundamental importance for economic development of a country. To ensure such safety energy raw material, also called primary energy sources, are necessary. Currently in Poland primary energy sources include mainly fossil fuels, such as hard coal, brown coal, natural gas and crude oil. Other sources, e.g. renewable energy sources account for c. 15% in the energy mix. Primary energy sources are used to produce mainly electricity, which is considered as the cleanest form of energy. Poland does not have, unfortunately, sufficient energy sources and is forced to import some of them, mainly natural gas and crude oil. The article presents an insightful analysis of energy raw material reserves possessed by Poland and their structure taking account of the requirements applicable in the European Union, in particular, those related to environmental protection. The article also describes demand for electricity now and in the perspective of 2030. Primary energy sources necessary for its production have also been given. The article also includes the possibilities for the use of renewable energy sources in Poland, however, climatic conditions there are not are not particularly favourable to it. All the issues addressed in the article are summed up and ended with conclusions.

  18. 31 CFR 356.12 - What are the different types of bids and do they have specific requirements or restrictions?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... the specific security being auctioned; (ii) For which the security being auctioned is one of several... increments. The third decimal must be either a zero or a five, for example, 5.320 or 5.325. We will treat any missing decimals as zero, for example, a bid of 5.32 will be treated as 5.320. The rate bid may be a...

  19. Control system of the inspection robots group applying auctions and multi-criteria analysis for task allocation

    NASA Astrophysics Data System (ADS)

    Panfil, Wawrzyniec; Moczulski, Wojciech

    2017-10-01

    In the paper presented is a control system of a mobile robots group intended for carrying out inspection missions. The main research problem was to define such a control system in order to facilitate a cooperation of the robots resulting in realization of the committed inspection tasks. Many of the well-known control systems use auctions for tasks allocation, where a subject of an auction is a task to be allocated. It seems that in the case of missions characterized by much larger number of tasks than number of robots it will be better if robots (instead of tasks) are subjects of auctions. The second identified problem concerns the one-sided robot-to-task fitness evaluation. Simultaneous assessment of the robot-to-task fitness and task attractiveness for robot should affect positively for the overall effectiveness of the multi-robot system performance. The elaborated system allows to assign tasks to robots using various methods for evaluation of fitness between robots and tasks, and using some tasks allocation methods. There is proposed the method for multi-criteria analysis, which is composed of two assessments, i.e. robot's concurrency position for task among other robots and task's attractiveness for robot among other tasks. Furthermore, there are proposed methods for tasks allocation applying the mentioned multi-criteria analysis method. The verification of both the elaborated system and the proposed tasks' allocation methods was carried out with the help of simulated experiments. The object under test was a group of inspection mobile robots being a virtual counterpart of the real mobile-robot group.

  20. Aligning Medication Reconciliation and Secure Messaging: Qualitative Study of Primary Care Providers’ Perspectives

    PubMed Central

    Clark, Justice; Marcello, Thomas B; Paquin, Allison M; Stewart, Max; Archambeault, Cliona; Simon, Steven R

    2013-01-01

    Background Virtual (non-face-to-face) medication reconciliation strategies may reduce adverse drug events (ADEs) among vulnerable ambulatory patients. Understanding provider perspectives on the use of technology for medication reconciliation can inform the design of patient-centered solutions to improve ambulatory medication safety. Objective The aim of the study was to describe primary care providers’ experiences of ambulatory medication reconciliation and secure messaging (secure email between patients and providers), and to elicit perceptions of a virtual medication reconciliation system using secure messaging (SM). Methods This was a qualitative study using semi-structured interviews. From January 2012 to May 2012, we conducted structured observations of primary care clinical activities and interviewed 15 primary care providers within a Veterans Affairs Healthcare System in Boston, Massachusetts (USA). We carried out content analysis informed by the grounded theory. Results Of the 15 participating providers, 12 were female and 11 saw 10 or fewer patients in a typical workday. Experiences and perceptions elicited from providers during in-depth interviews were organized into 12 overarching themes: 4 themes for experiences with medication reconciliation, 3 themes for perceptions on how to improve ambulatory medication reconciliation, and 5 themes for experiences with SM. Providers generally recognized medication reconciliation as a valuable component of primary care delivery and all agreed that medication reconciliation following hospital discharge is a key priority. Most providers favored delegating the responsibility for medication reconciliation to another member of the staff, such as a nurse or a pharmacist. The 4 themes related to ambulatory medication reconciliation were (1) the approach to complex patients, (2) the effectiveness of medication reconciliation in preventing ADEs, (3) challenges to completing medication reconciliation, and (4) medication

  1. Aligning medication reconciliation and secure messaging: qualitative study of primary care providers' perspectives.

    PubMed

    Heyworth, Leonie; Clark, Justice; Marcello, Thomas B; Paquin, Allison M; Stewart, Max; Archambeault, Cliona; Simon, Steven R

    2013-12-02

    Virtual (non-face-to-face) medication reconciliation strategies may reduce adverse drug events (ADEs) among vulnerable ambulatory patients. Understanding provider perspectives on the use of technology for medication reconciliation can inform the design of patient-centered solutions to improve ambulatory medication safety. The aim of the study was to describe primary care providers' experiences of ambulatory medication reconciliation and secure messaging (secure email between patients and providers), and to elicit perceptions of a virtual medication reconciliation system using secure messaging (SM). This was a qualitative study using semi-structured interviews. From January 2012 to May 2012, we conducted structured observations of primary care clinical activities and interviewed 15 primary care providers within a Veterans Affairs Healthcare System in Boston, Massachusetts (USA). We carried out content analysis informed by the grounded theory. Of the 15 participating providers, 12 were female and 11 saw 10 or fewer patients in a typical workday. Experiences and perceptions elicited from providers during in-depth interviews were organized into 12 overarching themes: 4 themes for experiences with medication reconciliation, 3 themes for perceptions on how to improve ambulatory medication reconciliation, and 5 themes for experiences with SM. Providers generally recognized medication reconciliation as a valuable component of primary care delivery and all agreed that medication reconciliation following hospital discharge is a key priority. Most providers favored delegating the responsibility for medication reconciliation to another member of the staff, such as a nurse or a pharmacist. The 4 themes related to ambulatory medication reconciliation were (1) the approach to complex patients, (2) the effectiveness of medication reconciliation in preventing ADEs, (3) challenges to completing medication reconciliation, and (4) medication reconciliation during transitions of care

  2. Understanding Financial Market States Using an Artificial Double Auction Market

    PubMed Central

    2016-01-01

    The ultimate value of theories describing the fundamental mechanisms behind asset prices in financial systems is reflected in the capacity of such theories to understand these systems. Although the models that explain the various states of financial markets offer substantial evidence from the fields of finance, mathematics, and even physics, previous theories that attempt to address the complexities of financial markets in full have been inadequate. We propose an artificial double auction market as an agent-based model to study the origin of complex states in financial markets by characterizing important parameters with an investment strategy that can cover the dynamics of the financial market. The investment strategies of chartist traders in response to new market information should reduce market stability based on the price fluctuations of risky assets. However, fundamentalist traders strategically submit orders based on fundamental value and, thereby stabilize the market. We construct a continuous double auction market and find that the market is controlled by the proportion of chartists, Pc. We show that mimicking the real state of financial markets, which emerges in real financial systems, is given within the range Pc = 0.40 to Pc = 0.85; however, we show that mimicking the efficient market hypothesis state can be generated with values less than Pc = 0.40. In particular, we observe that mimicking a market collapse state is created with values greater than Pc = 0.85, at which point a liquidity shortage occurs, and the phase transition behavior is described at Pc = 0.85. PMID:27031110

  3. Understanding Financial Market States Using an Artificial Double Auction Market.

    PubMed

    Yim, Kyubin; Oh, Gabjin; Kim, Seunghwan

    2016-01-01

    The ultimate value of theories describing the fundamental mechanisms behind asset prices in financial systems is reflected in the capacity of such theories to understand these systems. Although the models that explain the various states of financial markets offer substantial evidence from the fields of finance, mathematics, and even physics, previous theories that attempt to address the complexities of financial markets in full have been inadequate. We propose an artificial double auction market as an agent-based model to study the origin of complex states in financial markets by characterizing important parameters with an investment strategy that can cover the dynamics of the financial market. The investment strategies of chartist traders in response to new market information should reduce market stability based on the price fluctuations of risky assets. However, fundamentalist traders strategically submit orders based on fundamental value and, thereby stabilize the market. We construct a continuous double auction market and find that the market is controlled by the proportion of chartists, Pc. We show that mimicking the real state of financial markets, which emerges in real financial systems, is given within the range Pc = 0.40 to Pc = 0.85; however, we show that mimicking the efficient market hypothesis state can be generated with values less than Pc = 0.40. In particular, we observe that mimicking a market collapse state is created with values greater than Pc = 0.85, at which point a liquidity shortage occurs, and the phase transition behavior is described at Pc = 0.85.

  4. Primary care in an unstable security, humanitarian, economic and political context: the Kurdistan Region of Iraq.

    PubMed

    Shukor, Ali R; Klazinga, Niek S; Kringos, Dionne S

    2017-08-23

    This study presents a descriptive synthesis of Kurdistan Region of Iraq's (KRI) primary care system, which is undergoing comprehensive primary care reforms within the context of a cross-cutting structural economic adjustment program and protracted security, humanitarian, economic and political crises. The descriptive analysis used a framework operationalizing Starfield's classic primary care model for health services research. A scoping review was performed using relevant sources, and expert consultations were conducted for completing and validating data. The descriptive analysis presents a complex narrative of a primary care system undergoing classical developmental processes of transitioning middle-income countries. The system is simultaneously under tremendous pressure to adapt to the continuously changing, complex and resource-intensive needs of sub-populations exhibiting varying morbidity patterns, within the context of protracted security, humanitarian, economic, and political crises. Despite exhibiting significant resilience in the face of the ongoing crises, the continued influx of IDPs and Syrian refugees, coupled with extremely limited resources and weak governance at policy, organizational and clinical levels threaten the sustainability of KRI's public primary care system. Diverse trajectories to the strengthening and development of primary care are underway by local and international actors, notably the World Bank, RAND Corporation, UN organizations and USAID, focusing on varying imperatives related to the protracted humanitarian and economic crises. The convergence, interaction and outcomes of the diverse initiatives and policy approaches in relation to the development of KRI's primary care system are complex and highly uncertain. A common vision of primary care is required to align resources, initiatives and policies, and to enable synergy between all local and international actors involved in the developmental and humanitarian response. Further

  5. 30 CFR 285.308 - How will MMS conduct an auction for ROW grants and RUE grants?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... and RUE grants? 285.308 Section 285.308 Mineral Resources BUREAU OF OCEAN ENERGY MANAGEMENT, REGULATION, AND ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE RENEWABLE ENERGY ALTERNATE USES OF EXISTING... Renewable Energy Activities Obtaining Row Grants and Rue Grants § 285.308 How will MMS conduct an auction...

  6. [Current status of illegal trade in pharmaceutical products on Internet auction sites in Japan and responses of site administrators to such transactions].

    PubMed

    Ohtani, Hisakazu; Imaoka, Ayuko; Akiyoshi, Takeshi

    2015-01-01

    In Japan, it is illegal to sell pharmaceuticals on Internet auction sites, although a considerable number of pharmaceuticals are listed on such sites. We investigated the current situation regarding the illegal trade in pharmaceuticals on Japanese Internet auction sites and the responses of site administrators to such transactions. We searched for pharmaceuticals and "gray" items that were suspected of being pharmaceuticals on Yahoo-oku! (Yahoo! Auctions, Japan) over a 37-day period and then submitted violation reports indicating that selling pharmaceuticals is illegal or that the description of an item was insufficient. The reports were directed to the site administrators and forwarded to the sellers. One hundred and six pharmaceutical products and 34 gray items were identified during the study period. After the submission of the violation reports, only 28 of the pharmaceutical products and one of the gray items were deleted by the administrator, while 18 of the pharmaceutical products and 7 of the gray items were withdrawn by their sellers. However, 41 pharmaceuticals and 20 gray items were sold. Most of the gray items were listed using characteristic terms or abbreviations without photographic images. More than 70% of the identified pharmaceuticals had a contraindication(s) other than hypersensitivity. In conclusion, the illegal trade in pharmaceuticals on Internet auction sites remains a serious problem in Japan, and the responses of site administrators to such transactions are inadequate. The government and pharmaceutical industry may have to take measures such as providing public and administrative guidance to stop the illegal trade in pharmaceuticals on the Internet.

  7. 77 FR 15369 - Mobility Fund Phase I Auction GIS Data of Potentially Eligible Census Blocks

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ....fcc.gov/auctions/901/ , are the following: Downloadable shapefile Web mapping service MapBox map tiles... GIS software allows you to add this service as a layer to your session or project. 6. MapBox map tiles are cached map tiles of the data. With this open source software approach, these image tiles can be...

  8. 76 FR 78645 - Auction of FM Broadcast Construction Permits Scheduled for March 27, 2012; Notice and Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-19

    ... touch upon impermissible subject matters because they may convey pricing information and bidding... FCC auction does not constitute an endorsement by the FCC of any particular service, technology, or... habitats, historical or archaeological sites, Indian religious sites, floodplains, and surface features. In...

  9. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    ERIC Educational Resources Information Center

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  10. [Primary health care in Ecuador: services provided by the Ministry of Health and Rural Social security Services].

    PubMed

    Robertson, R L; Castro, C E; Gómez, L C; Gwynne, G; Tinajero Baca, C L; Zschock, D K

    1991-10-01

    The present study will examine three common premises in the field of international public health: that the primary care services offered by agencies of the Ministries of Health (MH) are less costly than those offered by Social Security institutions, that the former services are inferior to the latter, and that funds are distributed more equitably by the MH centers among their various recipient populations. The 1986 study compared the costs, quality, and equity of the services in 15 primary care centers in Ecuador--eight Ministry of Health centers and seven rural Social Security (RSS) centers--examining budgetary data from 1985 and obtaining information through a questionnaire and interviews with the personnel at those centers. Average costs were calculated by standardized accounting techniques, and it was confirmed that for several important services, especially medical consultations, these costs were much lower in the Ministry centers than in the Social Security centers. However, no differences in the cost of dental care were detected. The evaluation of quality, based on an analysis of the production structure and process, did not yield uniform results. On the one hand, the distribution of personnel and the allocation of funds for drugs and other supplies indicated that the RSS agencies provided better quality services. On the other hand, a questionnaire revealed that the MH health workers' knowledge of various principles of primary care was superior to that of the RSS workers. Upon comparing the per capita budget of the two types of entities, it was confirmed that the Ministry of Health had more equitable per capita coverage than rural Social Security. The implications of these findings for Ecuador and other developing countries are discussed and several recommendations made.

  11. 75 FR 57947 - Auction of VHF Commercial Television Station Construction Permits Scheduled for February 15, 2011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-23

    ... technical and marketplace factors that may have a bearing on the value of the construction permits for... auction pace that reasonably balances speed with the bidders' need to study round results and adjust their... and other factors. The Bureaus seek comment on this proposal. Commenters may wish to address the role...

  12. 77 FR 7152 - Mobility Fund Phase I Auction Scheduled for September 27, 2012; Comment Sought on Competitive...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-10

    ... application deadlines and other dates related to Auction 901 after considering comments provided in response... must file an application for support. Only after review of the application to confirm compliance with... for support to Tribal lands. 7. The USF/ICC Transformation Order established application, performance...

  13. Variability of Valuation of Non-Monetary Incentives: Motivating and Implementing the Combinatorial Retention Auction Mechanism

    DTIC Science & Technology

    2009-03-01

    homeport, geographic stability for two tours and compressed work week; homeport, lump sum SRB, and telecommuting ). The Monte Carlo simulation...Geographic stability 2 tours, and compressed work week). The Add 2 combination includes home port choice, lump sum SRB, and telecommuting ...VALUATION OF NON-MONETARY INCENTIVES: MOTIVATING AND IMPLEMENTING THE COMBINATORIAL RETENTION AUCTION MECHANISM by Jason Blake Ellis March 2009

  14. 7 CFR 29.75a - Display of burley tobacco on auction warehouse floors in designated markets.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... in designated markets. 29.75a Section 29.75a Agriculture Regulations of the Department of Agriculture... § 29.75a Display of burley tobacco on auction warehouse floors in designated markets. (a)(1) Each lot... arrayed sequence of lots and rows of tobacco, shall have prior approval of the Set Work Leader or Circuit...

  15. Optimal Price Decision Problem for Simultaneous Multi-article Auction and Its Optimal Price Searching Method by Particle Swarm Optimization

    NASA Astrophysics Data System (ADS)

    Masuda, Kazuaki; Aiyoshi, Eitaro

    We propose a method for solving optimal price decision problems for simultaneous multi-article auctions. An auction problem, originally formulated as a combinatorial problem, determines both every seller's whether or not to sell his/her article and every buyer's which article(s) to buy, so that the total utility of buyers and sellers will be maximized. Due to the duality theory, we transform it equivalently into a dual problem in which Lagrange multipliers are interpreted as articles' transaction price. As the dual problem is a continuous optimization problem with respect to the multipliers (i.e., the transaction prices), we propose a numerical method to solve it by applying heuristic global search methods. In this paper, Particle Swarm Optimization (PSO) is used to solve the dual problem, and experimental results are presented to show the validity of the proposed method.

  16. Estimating the impact of various menu labeling formats on parents' demand for fast-food kids' meals for their children: An experimental auction.

    PubMed

    Hobin, Erin; Lillico, Heather; Zuo, Fei; Sacco, Jocelyn; Rosella, Laura; Hammond, David

    2016-10-01

    This study experimentally tested whether parents' demand for fast-food kids' meals for their children is influenced by various menu labeling formats disclosing calorie and sodium information. The study also examined the effect of various menu labeling formats on parents' ability to identify fast-food kids' meals with higher calorie and sodium content. Online surveys were conducted among parents of children aged 3-12. Parents were randomized to view 1 of 5 menu conditions: 1) No Nutrition Information; 2) Calories-Only; 3) Calories + Contextual Statement (CS); 4) Calories, Sodium, + CS; and, 5) Calorie and Sodium in Traffic Lights + CS. Using an established experimental auction study design, parents viewed replicated McDonald's menus according to their assigned condition and were asked to bid on 4 Happy Meals. A randomly selected price was chosen; bids equal to or above this price "won" the auction, and bids less than this price "lost" the auction. After the auction, participants were asked to identify the Happy Meal with the highest calories and sodium content. Adjusting for multiple comparisons and covariates, the Calories, Sodium, + CS menu had a mean attributed value across all 4 Happy Meals which was 8% lower (-$0.31) than the Calories + CS menu (p < 0.05). Significantly more parents in the 4 menu conditions providing calories were able to correctly identify the Happy Meal with the highest calories (p < 0.0001) and significantly more parents in the 2 conditions providing sodium information were able to correctly identify the Happy Meal with the highest sodium content (p < 0.0001). Menus disclosing both calories and sodium information may reduce demand for fast-food kids' meals and better support parents in making more informed and healthier food choices for their children. Copyright © 2016. Published by Elsevier Ltd.

  17. 77 FR 32092 - Mobility Fund Phase I Auction Scheduled for September 27, 2012; Notice and Filing Requirements...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-31

    ... Mobility Fund Phase I support they seek, including any agreements relating to post-auction market structure... FEDERAL COMMUNICATIONS COMMISSION [AU Docket No. 12-25; DA 12-641 and DA 12-721] Mobility Fund... million in one-time Mobility Fund Phase I support scheduled to commence on September 27, 2012. The Bureaus...

  18. 49 CFR 599.402 - Requirements and limitations for salvage auctions that are consigned trade-in vehicles under the...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 7 2014-10-01 2014-10-01 false Requirements and limitations for salvage auctions that are consigned trade-in vehicles under the CARS program. 599.402 Section 599.402 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED)...

  19. 49 CFR 599.402 - Requirements and limitations for salvage auctions that are consigned trade-in vehicles under the...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 7 2011-10-01 2011-10-01 false Requirements and limitations for salvage auctions that are consigned trade-in vehicles under the CARS program. 599.402 Section 599.402 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED)...

  20. 49 CFR 599.402 - Requirements and limitations for salvage auctions that are consigned trade-in vehicles under the...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 7 2012-10-01 2012-10-01 false Requirements and limitations for salvage auctions that are consigned trade-in vehicles under the CARS program. 599.402 Section 599.402 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED)...

  1. 49 CFR 599.402 - Requirements and limitations for salvage auctions that are consigned trade-in vehicles under the...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 7 2013-10-01 2013-10-01 false Requirements and limitations for salvage auctions that are consigned trade-in vehicles under the CARS program. 599.402 Section 599.402 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED)...

  2. 75 FR 38545 - Notice of Realty Action: Competitive Auction of Public Lands in White Pine County, NV

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-02

    ... DEPARTMENT OF THE INTERIOR Bureau of Land Management [LLNVL01000 L14300000.EU0000 241A; N-86667; 10-08807; MO 4500012445; TAS: 14X5232] Notice of Realty Action: Competitive Auction of Public Lands..., cashier's check, certified check or U.S. postal money order, or any combination thereof, and made payable...

  3. 76 FR 3892 - Auction of FM Broadcast Construction Permits Rescheduled for April 27, 2011; Notice and Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    .... The commenter also argues that, in the event that only one applicant places a bid on a permit, that...). The Commission makes no warranty whatsoever with respect to the FCC Auction System. In no event shall..., 2011 Short-Form Application (FCC Form 175) Filing Window Opens--January 31, 2011; 12 noon ET Short-Form...

  4. 77 FR 60163 - Self-Regulatory Organizations; C2 Options Exchange, Incorporated; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-02

    ... Change Related to AIM and SAM September 26, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange.... Under Rule 6.52, Solicitation Auction Mechanism (``SAM''), a Trading Permit Holder that represents... Agency Order for electronic execution into the SAM auction process, under which both the Agency Order and...

  5. 76 FR 2920 - Notice of Correction to Notice of Realty Action: Competitive Online Auction of Public Lands in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-18

    ... DEPARTMENT OF THE INTERIOR Bureau of Land Management [LLNVS00560 L58530000.EU0000 241A; N-81926 et al.; 11-08807; TAS: 14X5232] Notice of Correction to Notice of Realty Action: Competitive Online Auction of Public Lands in Clark County, NV AGENCY: Bureau of Land Management, Interior. ACTION: Notice of...

  6. Examining the relationship between psychosocial and behavioral proxies for future consumption behavior: self-reported impact and bidding behavior in an experimental auction study on cigarette labeling

    PubMed Central

    Rousu, Matthew C.; Thrasher, James F.

    2014-01-01

    Experimental and observational research often involves asking consumers to self-report the impact of some proposed option. Because self-reported responses involve no consequence to the respondent for falsely revealing how he or she feels about an issue, self-reports may be subject to social desirability and other influences that bias responses in important ways. In this article, we analyzed data from an experiment on the impact of cigarette packaging and pack warnings, comparing smokers’ self-reported impact (four-item scale) and the bids they placed in experimental auctions to estimate differences in demand. The results were consistent across methods; however, the estimated effect size associated with different warning labels was two times greater for the four-item self-reported response scale when compared to the change in demand as indicated by auction bids. Our study provides evidence that self-reported psychosocial responses provide a valid proxy for behavioral change as reflected by experimental auction bidding behavior. More research is needed to better understand the advantages and disadvantages of behavioral economic methods and traditional self-report approaches to evaluating health behavior change interventions. PMID:24399267

  7. 76 FR 25711 - Proposed Exemptions from Certain Prohibited Transaction Restrictions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-05

    ...)) of an Auction Rate Security (ARS, as defined in Section III(c)) to Northern Trust Corporation or an... of section 4975 of the Code. Section II. Conditions (a) The Plan acquired the ARS in connection with brokerage or advisory services provided by Northern to the Plan; (b) The last auction for the ARS was...

  8. Georeferenced and secure mobile health system for large scale data collection in primary care.

    PubMed

    Sa, Joao H G; Rebelo, Marina S; Brentani, Alexandra; Grisi, Sandra J F E; Iwaya, Leonardo H; Simplicio, Marcos A; Carvalho, Tereza C M B; Gutierrez, Marco A

    2016-10-01

    Mobile health consists in applying mobile devices and communication capabilities for expanding the coverage and improving the effectiveness of health care programs. The technology is particularly promising for developing countries, in which health authorities can take advantage of the flourishing mobile market to provide adequate health care to underprivileged communities, especially primary care. In Brazil, the Primary Care Information System (SIAB) receives primary health care data from all regions of the country, creating a rich database for health-related action planning. Family Health Teams (FHTs) collect this data in periodic visits to families enrolled in governmental programs, following an acquisition procedure that involves filling in paper forms. This procedure compromises the quality of the data provided to health care authorities and slows down the decision-making process. To develop a mobile system (GeoHealth) that should address and overcome the aforementioned problems and deploy the proposed solution in a wide underprivileged metropolitan area of a major city in Brazil. The proposed solution comprises three main components: (a) an Application Server, with a database containing family health conditions; and two clients, (b) a Web Browser running visualization tools for management tasks, and (c) a data-gathering device (smartphone) to register and to georeference the family health data. A data security framework was designed to ensure the security of data, which was stored locally and transmitted over public networks. The system was successfully deployed at six primary care units in the city of Sao Paulo, where a total of 28,324 families/96,061 inhabitants are regularly followed up by government health policies. The health conditions observed from the population covered were: diabetes in 3.40%, hypertension (age >40) in 23.87% and tuberculosis in 0.06%. This estimated prevalence has enabled FHTs to set clinical appointments proactively, with the aim of

  9. A Robust Open Ascending-price Multi-unit Auction Protocol against False-name Bids

    NASA Astrophysics Data System (ADS)

    Iwasaki, Atsushi; Yokoo, Makoto; Terada, Kenji

    This paper develops a new ascending-price multi-unit auction protocol that has following characteristics: (i) it has an open format, (ii) sincere bidding is an equilibrium strategy even if the marginal utilities of each agent can increase and agents can submit false-name bids. False-name bids are bids submitted under fictitious names such as multiple e-mail addresses, which can be done easily in the Internet. This is the first protocol that has these two characteristics. We show that our new protocol outperforms an existing protocol, which satisfies (ii), with respect to the social surplus and the seller's revenue.

  10. 78 FR 50086 - Notice of Competitive Auction for Solar Energy Development on Public Lands in the State of Colorado

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-16

    ... Competitive Auction for Solar Energy Development on Public Lands in the State of Colorado AGENCY: Bureau of...) application and a plan of development for solar energy projects on approximately 3,705 acres of public land in... designated Solar Energy Zones (SEZ): Los Mogotes East SEZ and De Tilla Gulch SEZ. Applications for solar...

  11. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued or maintained?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... government and international agencies and foreign central banks. In their accounts, depository institutions... BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS... Direct®—into which we issue marketable Treasury securities. We maintain and transfer securities in these...

  12. A Winner Determination Algorithm for Combinatorial Auctions Based on Hybrid Artificial Fish Swarm Algorithm

    NASA Astrophysics Data System (ADS)

    Zheng, Genrang; Lin, ZhengChun

    The problem of winner determination in combinatorial auctions is a hotspot electronic business, and a NP hard problem. A Hybrid Artificial Fish Swarm Algorithm(HAFSA), which is combined with First Suite Heuristic Algorithm (FSHA) and Artificial Fish Swarm Algorithm (AFSA), is proposed to solve the problem after probing it base on the theories of AFSA. Experiment results show that the HAFSA is a rapidly and efficient algorithm for The problem of winner determining. Compared with Ant colony Optimization Algorithm, it has a good performance with broad and prosperous application.

  13. 75 FR 47637 - Prohibited Transaction Exemptions and Grant of Individual Exemptions Involving: 2010-23, D-11500...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-06

    ... the past sale of certain Auction Rate Securities (ARS) by the Four-Way Tool & Die, Inc. Profit Sharing... of section 4975 of the Code. (A) The subject ARS were acquired for the Plan by Citizens Bank Wealth...) The last auction for each of the ARS was unsuccessful; (C) The sale of the ARS was directly between...

  14. 75 FR 17966 - Application No. and Proposed Exemption involving D-11565, Citizens Bank Wealth Management, N.A.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-08

    ..., 2008, to the past sale of certain Auction Rate Securities (ARS) by the Four-Way Tool & Die, Inc. Profit... corresponding provisions of section 4975 of the Code. (A) The subject ARS were acquired for the Plan by Citizens... independent broker; (B) The last auction for each of the ARS was unsuccessful; (C) The sale of the ARS was...

  15. Secure E-mailing Between Physicians and Patients

    PubMed Central

    Garrido, Terhilda; Meng, Di; Wang, Jian J.; Palen, Ted E.; Kanter, Michael H.

    2014-01-01

    Secure e-mailing between Kaiser Permanente physicians and patients is widespread; primary care providers receive an average of 5 e-mails from patients each workday. However, on average, secure e-mailing with patients has not substantially impacted primary care provider workloads. Secure e-mail has been associated with increased member retention and improved quality of care. Separate studies associated patient portal and secure e-mail use with both decreased and increased use of other health care services, such as office visits, telephone encounters, emergency department visits, and hospitalizations. Directions for future research include more granular analysis of associations between patient-physician secure e-mail and health care utilization. PMID:24887522

  16. 31 CFR 356.13 - When must I report my net long position and how do I calculate it?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... auctioned you must report a zero. (iii) the total of your bids and your net long position in the security... blank) or report your net long position. (2) Also, if you have more than one bid in an auction and you must report either your net long position or a zero, you must report that figure only once. Finally, if...

  17. Evaluation of PersianCAT Agent's Accepting Policy in Continuous Double Auction, Participant in CAT 2007 Competition

    NASA Astrophysics Data System (ADS)

    Honari, Sina; Fos-Hati, Amin; Ebadi, Mojtaba; Gomrokchi, Maziar

    As there is a growing tendency towards online auctions, online Multi Agent Systems for economic activities like stock exchanges is more in demand. CAT (CATallactics) competition has produced a great opportunity for researchers since 2007 to put their theories into practice in a real-time economic-based competition, combining traders and brokers. As one of participants, we evaluated our new accepting policy by putting it to challenge. In this paper we give a general overview of one of our policies in the market.

  18. 75 FR 38557 - Application Nos. and Proposed Exemptions; D-11489, Morgan Stanley & Co., Incorporated; L-11609...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-02

    ...; (b) The term ``Auction Rate Security'' or ``ARS'' means a security: (1) That is either a debt... Securities (ARS). The applicant describes ARS and the arrangement by which ARS are bought and sold as follows. ARS are securities (issued as debt or preferred stock) with an interest rate or dividend that is reset...

  19. 49 CFR 1542.3 - Airport security coordinator.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...

  20. 49 CFR 1542.3 - Airport security coordinator.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...

  1. 49 CFR 1542.3 - Airport security coordinator.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...

  2. 49 CFR 1542.3 - Airport security coordinator.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...

  3. 49 CFR 1542.3 - Airport security coordinator.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...

  4. 75 FR 8128 - Citigroup Inc. and Its Affiliates (Citigroup or the Applicant); Subaru of America, Inc. (Subaru...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... Securities outside of the Offer and may otherwise buy, sell, hold or seek to restructure, redeem or otherwise....1 trillion. Citigroup's consumer and corporate banking business is a global franchise encompassing... bought and sold as follows. Auction Rate Securities are securities (issued as debt or preferred stock...

  5. 12 CFR 619.9010 - Additional security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Additional security. 619.9010 Section 619.9010 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9010 Additional security. Supplementary collateral to the primary security taken in connection with the loan. ...

  6. 12 CFR 619.9010 - Additional security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Additional security. 619.9010 Section 619.9010 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9010 Additional security. Supplementary collateral to the primary security taken in connection with the loan. ...

  7. The impact of free trial acceptance on demand for alternative nicotine products: evidence from experimental auctions.

    PubMed

    Rousu, Matthew C; O'Connor, Richard J; Bansal-Travers, Maansi; Pitcavage, James M; Thrasher, James F

    2015-06-11

    This study explored the relationship between product trials and consumer demand for alternative nicotine products (ANP). An experimental auction was conducted with 258 adult smokers, wherein participants were randomly assigned to one of four experimental conditions. The participants received the opportunity to try, but did not have to accept, one of three relatively novel ST products (i.e., snus, dissolvable tobacco, or medicinal nicotine), or they were placed into a control group (i.e., no trial). All the participants then bid on all three of these products, as well as on cigarettes. We assessed interest in using ANP based on both trial of the product and bids placed for the products in the experimental auction. Fewer smokers were willing to try snus (44%) than dissolvable tobacco (64%) or medicine nicotine (68%). For snus, we find modest evidence suggesting that willingness to try is associated with greater demand for the product. For dissolvable tobacco or medicinal nicotine, we find no evidence that those who accept the product trial have higher demand for the product. Free trials of a novel ANP were not strongly associated with product demand, as assessed by willingness to pay. Given the debate over the potential for ANP to reduce the harm from smoking, these results are important in understanding the impact of free trial offers on adoption of ST product as a strategy to reduce harm from tobacco use.

  8. 31 CFR 356.34 - What could happen if someone does not fully comply with the auction rules or fails to pay for...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false What could happen if someone does not... Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE... person or entity from participating in future auctions under this part. We also may refer the matter to...

  9. 31 CFR 356.34 - What could happen if someone does not fully comply with the auction rules or fails to pay for...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false What could happen if someone does not... Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE... person or entity from participating in future auctions under this part. We also may refer the matter to...

  10. 31 CFR 356.34 - What could happen if someone does not fully comply with the auction rules or fails to pay for...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false What could happen if someone does not... Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE... person or entity from participating in future auctions under this part. We also may refer the matter to...

  11. 31 CFR 356.34 - What could happen if someone does not fully comply with the auction rules or fails to pay for...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false What could happen if someone does not... Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE... barring the person or entity from participating in future auctions under this part. We also may refer the...

  12. 31 CFR 356.34 - What could happen if someone does not fully comply with the auction rules or fails to pay for...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false What could happen if someone does not... Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE... person or entity from participating in future auctions under this part. We also may refer the matter to...

  13. Development of Security Measures: Implementation Instructions for MIL-STD on Physical Security for DCS Facilities.

    DTIC Science & Technology

    1981-07-01

    security measures to in- crease the survivability of these assets. However, sabotage, terrorism and vandalism continue to be serious threats to DCS and its...Closed circuit television. e. Comunication cables. f. Fuel storage. g. Fuel lines. h. Air conditioning. The primary benefits of security measures

  14. A Virtual Field Trip to the Real World of Cap and Trade: Environmental Economics and the EPA SO[subscript 2] Allowance Auction

    ERIC Educational Resources Information Center

    Lewis, Lynne Y.

    2011-01-01

    In the spring of 2001, Bates College Environmental Economics classes bought their first sulfur dioxide emissions allowance at U.S. Environmental Protection Agency's annual auction, then conducted by the Chicago Board of Trade. In the spring of 2010, they bought their 22nd through 34th allowances. This article describes a three-part method for…

  15. Effect of management, marketing, and certified health programs on the sale price of beef calves sold through a livestock video auction service from 1995 through 2009.

    PubMed

    Seeger, Jon T; King, Michael E; Grotelueschen, Dale M; Rogers, Glenn M; Stokka, Gerald S

    2011-08-15

    To evaluate and update the previously quantified effects of management, marketing, and certified health programs on the sale price of beef calves sold through a livestock video auction service. Longitudinal study. 41,657 lots representing 5,042,272 beef calves sold from 1995 through 2009. Data describing each lot of beef calves marketed from 1995 through 2009 by a livestock video auction service were obtained from sale catalogues. For each year of the study, multiple regression analysis was used to quantify the effect of management, marketing, and certified health programs on sale price. Sale date, base sale weight, quadratic effect of base weight, sex of calf, region of origin, breed description, inclusion in a certified health program, and number of calves in the lot significantly affected sale price for every year of the study. Variation in body weight, flesh score, and number of days between sale and delivery date had significant effects on price in most of the years; frame score and calves with horns affected price in 7 of 15 years; age and source verification influenced sale price in every year since source verification was introduced in 2005; and the auction service's progressive genetics program increased price during the 1 year that program was available. Some management, marketing, and certified health initiatives have consistently increased the sale price of beef calves, and producers can increase the price of their calves by implementing these practices.

  16. Responses to the advanced notice of proposed rulemaking EPA published on June 6, 1996 regarding changes to the EPA allowance auctions and elimination of the direct sale

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Critchfield, L.R.

    1997-12-31

    On June 6, 1996, EPA`s Acid Rain Program published an advance notice of proposed rulemaking (ANPRM) in the Federal Register seeking comment on: (1) whether to change the design of the annual sulfur dioxide (SO{sub 2}) allowance auctions; (2) whether to change the timing of the allowance auctions; (3) whether to change the requirement that the minimum price of offered allowances must be in whole dollars, and (4) whether EPA should propose the ability to submit allowance transfers electronically. EPA also published on that day a proposed and direct final rule on whether to eliminate the direct sale. This papermore » documents the issues addressed in the ANPRM, the comments EPA received, and EPA`s responses to those comments. EPA received comments from 14 separate commenters.« less

  17. The Latent Structure of Secure Base Script Knowledge

    ERIC Educational Resources Information Center

    Waters, Theodore E. A.; Fraley, R. Chris; Groh, Ashley M.; Steele, Ryan D.; Vaughn, Brian E.; Bost, Kelly K.; Veríssimo, Manuela; Coppola, Gabrielle; Roisman, Glenn I.

    2015-01-01

    There is increasing evidence that attachment representations abstracted from childhood experiences with primary caregivers are organized as a cognitive script describing secure base use and support (i.e., the "secure base script"). To date, however, the latent structure of secure base script knowledge has gone unexamined--this despite…

  18. A scoping review of traditional food security in Alaska.

    PubMed

    Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa

    2018-12-01

    Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: "traditional foods", "food security", "access", "availability", "utilisation", "Alaska", "Alaska Native" and "indigenous". Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska.

  19. A Research Study on Secure Attachment Using the Primary Caregiving Approach

    ERIC Educational Resources Information Center

    Ebbeck, Marjory; Phoon, Dora Mei Yong; Tan-Chong, Elizabeth Chai Kim; Tan, Marilyn Ai Bee; Goh, Mandy Lian Mui

    2015-01-01

    A child's positive sense of well-being is central to their overall growth and development. With an increasing number of mothers in the workforce, many infants and toddlers spend much time in child care services. Hence it is crucial that caregivers provide a secure base for the child to develop secure attachment with educarers. Given multiple…

  20. The Security Education Concepts in the Textbooks of the National and Civic Education of the Primary Stage in Jordan--An Analytical Study

    ERIC Educational Resources Information Center

    Al-Edwan, Zaid Suleiman

    2016-01-01

    The present study aimed at exploring the concepts of the security education in the textbooks of the national and civic education of the higher primary stage in Jordan. It adopted the descriptive analytical method. The study sample consisted of the textbooks of the national and civic education for the basic eighth, ninth and tenth grades. To…

  1. Secure provision of reactive power ancillary services in competitive electricity markets

    NASA Astrophysics Data System (ADS)

    El-Samahy, Ismael

    The research work presented in this thesis discusses various complex issues associated with reactive power management and pricing in the context of new operating paradigms in deregulated power systems, proposing appropriate policy solutions. An integrated two-level framework for reactive power management is set forth, which is both suitable for a competitive market and ensures a secure and reliable operation of the associated power system. The framework is generic in nature and can be adopted for any electricity market structure. The proposed hierarchical reactive power market structure comprises two stages: procurement of reactive power resources on a seasonal basis, and real-time reactive power dispatch. The main objective of the proposed framework is to provide appropriate reactive power support from service providers at least cost, while ensuring a secure operation of the power system. The proposed procurement procedure is based on a two-step optimization model. First, the marginal benefits of reactive power supply from each provider, with respect to system security, are obtained by solving a loadability-maximization problem subject to transmission security constraints imposed by voltage and thermal limits. Second, the selected set of generators is determined by solving an optimal power flow (OPF)-based auction. This auction maximizes a societal advantage function comprising generators' offers and their corresponding marginal benefits with respect to system security, and considering all transmission system constraints. The proposed procedure yields the selected set of generators and zonal price components, which would form the basis for seasonal contracts between the system operator and the selected reactive power service providers. The main objective of the proposed reactive power dispatch model is to minimize the total payment burden on the Independent System Operator (ISO), which is associated with reactive power dispatch. The real power generation is

  2. 17 CFR 230.136 - Definition of certain terms in relation to assessable stock.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... relation to assessable stock. 230.136 Section 230.136 Commodity and Securities Exchanges SECURITIES AND... certain terms in relation to assessable stock. (a) An offer, offer to sell, or offer for sale of... shall not be deemed to include the offering or sale of assessable stock, at public auction or otherwise...

  3. Physical contact influences how much people pay at celebrity auctions

    PubMed Central

    Newman, George E.; Bloom, Paul

    2014-01-01

    Contagion is a form of magical thinking in which people believe that a person’s immaterial qualities or essence can be transferred to an object through physical contact. Here we investigate how a belief in contagion influences the sale of celebrity memorabilia. Using data from three high-profile estate auctions, we find that people’s expectations about the amount of physical contact between the object and the celebrity positively predicts the final bids for items that belonged to well-liked individuals (e.g., John F. Kennedy) and negatively predicts final bids for items that belonged to disliked individuals (e.g., Bernard Madoff). A follow-up experiment further suggests that these effects are driven by contagion beliefs: when asked to bid on a sweater owned by a well-liked celebrity, participants report that they would pay substantially less if it was sterilized before they received it. However, sterilization increases the amount they would pay for a sweater owned by a disliked celebrity. These studies suggest that magical thinking may still have effects in contemporary Western societies and they provide some unique demonstrations of contagion effects on real-world purchase decisions. PMID:24567388

  4. Physical contact influences how much people pay at celebrity auctions.

    PubMed

    Newman, George E; Bloom, Paul

    2014-03-11

    Contagion is a form of magical thinking in which people believe that a person's immaterial qualities or essence can be transferred to an object through physical contact. Here we investigate how a belief in contagion influences the sale of celebrity memorabilia. Using data from three high-profile estate auctions, we find that people's expectations about the amount of physical contact between the object and the celebrity positively predicts the final bids for items that belonged to well-liked individuals (e.g., John F. Kennedy) and negatively predicts final bids for items that belonged to disliked individuals (e.g., Bernard Madoff). A follow-up experiment further suggests that these effects are driven by contagion beliefs: when asked to bid on a sweater owned by a well-liked celebrity, participants report that they would pay substantially less if it was sterilized before they received it. However, sterilization increases the amount they would pay for a sweater owned by a disliked celebrity. These studies suggest that magical thinking may still have effects in contemporary Western societies and they provide some unique demonstrations of contagion effects on real-world purchase decisions.

  5. Influence of individual rationality on continuous double auction markets with networked traders

    NASA Astrophysics Data System (ADS)

    Zhang, Junhuan

    2018-04-01

    This paper investigates the influence of individual rationality of buyers and sellers on continuous double auction market outcomes in terms of the proportion of boundedly-rational buyers and sellers. The individual rationality is discussed in a social network artificial stock market model by embedding network formation and information set. Traders automatically select the most profitable trading strategy based on individual and social learning of the profits and trading strategies of themselves and their neighbors, and submit orders to markets. The results show that (i) a higher proportion of boundedly-rational sellers induces a higher market price, higher sellers' profits and a higher market efficiency; (ii) a higher proportion of boundedly-rational sellers induces a lower number of trades and lower buyers' profits; (iii) a higher proportion of boundedly-rational buyers induces a lower market price, a lower number of trades, and lower sellers' profits; (iv) a higher proportion of boundedly-rational buyers induces higher buyers' profits and a higher market efficiency.

  6. Reverse Auction: A Potential Strategy for Reduction of Pharmacological Therapy Cost

    PubMed Central

    Brandão, Sara Michelly Gonçalves; Issa, Victor Sarli; Ayub-Ferreira, Silvia Moreira; Storer, Samantha; Gonçalves, Bianca Gigliotti; Santos, Valter Garcia; Carvas Junior, Nelson; Guimarães, Guilherme Veiga; Bocchi, Edimar Alcides

    2015-01-01

    Background Polypharmacy is a significant economic burden. Objective We tested whether using reverse auction (RA) as compared with commercial pharmacy (CP) to purchase medicine results in lower pharmaceutical costs for heart failure (HF) and heart transplantation (HT) outpatients. Methods We compared the costs via RA versus CP in 808 HF and 147 HT patients followed from 2009 through 2011, and evaluated the influence of clinical and demographic variables on cost. Results The monthly cost per patient for HF drugs acquired via RA was $10.15 (IQ 3.51-40.22) versus $161.76 (IQ 86.05‑340.15) via CP; for HT, those costs were $393.08 (IQ 124.74-774.76) and $1,207.70 (IQ 604.48-2,499.97), respectively. Conclusion RA may reduce the cost of prescription drugs for HF and HT, potentially making HF treatment more accessible. Clinical characteristics can influence the cost and benefits of RA. RA may be a new health policy strategy to reduce costs of prescribed medications for HF and HT patients, reducing the economic burden of treatment. PMID:26200898

  7. Reverse auction: a potential strategy for reduction of pharmacological therapy cost.

    PubMed

    Brandão, Sara Michelly Gonçalves; Issa, Victor Sarli; Ayub-Ferreira, Silvia Moreira; Storer, Samantha; Gonçalves, Bianca Gigliotti; Santos, Valter Garcia; Carvas Junior, Nelson; Guimarães, Guilherme Veiga; Bocchi, Edimar Alcides

    2015-09-01

    Polypharmacy is a significant economic burden. We tested whether using reverse auction (RA) as compared with commercial pharmacy (CP) to purchase medicine results in lower pharmaceutical costs for heart failure (HF) and heart transplantation (HT) outpatients. We compared the costs via RA versus CP in 808 HF and 147 HT patients followed from 2009 through 2011, and evaluated the influence of clinical and demographic variables on cost. The monthly cost per patient for HF drugs acquired via RA was $10.15 (IQ 3.51-40.22) versus $161.76 (IQ 86.05‑340.15) via CP; for HT, those costs were $393.08 (IQ 124.74-774.76) and $1,207.70 (IQ 604.48-2,499.97), respectively. RA may reduce the cost of prescription drugs for HF and HT, potentially making HF treatment more accessible. Clinical characteristics can influence the cost and benefits of RA. RA may be a new health policy strategy to reduce costs of prescribed medications for HF and HT patients, reducing the economic burden of treatment.

  8. 76 FR 20450 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-12

    ... participate in U.S. Treasury Securities Auctions via TAPPS Link. Affected Public: Private Sector: Businesses... of the Public Debt, 200 Third Street, Parkersburg, West Virginia 26106; (304) 480-8112. OMB Reviewer...

  9. Information Security Awareness On-Line Materials Design with Knowledge Maps

    ERIC Educational Resources Information Center

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  10. Challenges in managing freshwater fishery resource through Lebak Lebung Auction approach: a case study in Pangkalan Lampam District Ogan Komering Ilir Regency

    NASA Astrophysics Data System (ADS)

    Muslimin, B.; Suadi

    2018-03-01

    Responsible management of fishery resources has been a tradition of Ogan Komering Ilir (OKI) of South Sumatera for generations. It was recorded that since 1630 the Dutch Government had made auction policy for managing water territory in OKI Regency as an effort to preserve nature and to avoid the conflict of inland water ownership. Currently, the community-based management model has been adopted by local governments into formal regulations, known as Regional Regulation on Auction of Flood Water Swamp and Rivers (Lelang Lebak Lebung dan Sungai or L3S). This paper describes the success factors and the threats for the failure of the L3S management model in OKI Regency, based on a case study in Pangkalan Lampam District. The study showed that the management mechanism through the L3S system had been well instituted and become a well-established management practice. The management model is in line with the principle of co-management and the approach has become critical success factor in L3S management. However, ecological, economic and social aspects influence the sustainability of such fishery management model. Besides, L3S management model faces limited data and information related to fish stocks, which result in difficulties in determining the total allowable catch.

  11. A scoping review of traditional food security in Alaska

    PubMed Central

    Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa

    2018-01-01

    ABSTRACT Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: “traditional foods”, “food security”, “access”, “availability”, “utilisation”, “Alaska”, “Alaska Native” and “indigenous”. Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska. PMID:29292675

  12. Secure e-mailing between physicians and patients: transformational change in ambulatory care.

    PubMed

    Garrido, Terhilda; Meng, Di; Wang, Jian J; Palen, Ted E; Kanter, Michael H

    2014-01-01

    Secure e-mailing between Kaiser Permanente physicians and patients is widespread; primary care providers receive an average of 5 e-mails from patients each workday. However, on average, secure e-mailing with patients has not substantially impacted primary care provider workloads. Secure e-mail has been associated with increased member retention and improved quality of care. Separate studies associated patient portal and secure e-mail use with both decreased and increased use of other health care services, such as office visits, telephone encounters, emergency department visits, and hospitalizations. Directions for future research include more granular analysis of associations between patient-physician secure e-mail and health care utilization.

  13. When trust defies common security sense.

    PubMed

    Williams, Patricia A H

    2008-09-01

    Primary care medical practices fail to recognize the seriousness of security threats to their patient and practice information. This can be attributed to a lack of understanding of security concepts, underestimation of potential threats and the difficulty in configuration of security technology countermeasures. To appreciate the factors contributing to such problems, research into general practitioner security practice and perceptions of security was undertaken. The investigation focused on demographics, actual practice, issues and barriers, and practitioner perception. Poor implementation, lack of relevant knowledge and inconsistencies between principles and practice were identified as key themes. Also the results revealed an overwhelming reliance on trust in staff and in computer information systems. This clearly identified that both cultural and technical attributes contribute to the deficiencies in information security practice. The aim of this research is to understand user needs and problems when dealing with information security practice.

  14. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued or maintained?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false What are the book-entry systems in... system) at their par amount. Par amounts of Treasury inflation-protected securities do not include... Circular, Public Debt Series No. 2-86, as amended (part 357 of this chapter) and part 363 of this chapter...

  15. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued or maintained?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false What are the book-entry systems in... system) at their par amount. Par amounts of Treasury inflation-protected securities do not include... Circular, Fiscal Service Series No. 2-86, as amended (part 357 of this chapter) and part 363 of this...

  16. Learning Based Bidding Strategy for HVAC Systems in Double Auction Retail Energy Markets

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sun, Yannan; Somani, Abhishek; Carroll, Thomas E.

    In this paper, a bidding strategy is proposed using reinforcement learning for HVAC systems in a double auction market. The bidding strategy does not require a specific model-based representation of behavior, i.e., a functional form to translate indoor house temperatures into bid prices. The results from reinforcement learning based approach are compared with the HVAC bidding approach used in the AEP gridSMART® smart grid demonstration project and it is shown that the model-free (learning based) approach tracks well the results from the model-based behavior. Successful use of model-free approaches to represent device-level economic behavior may help develop similar approaches tomore » represent behavior of more complex devices or groups of diverse devices, such as in a building. Distributed control requires an understanding of decision making processes of intelligent agents so that appropriate mechanisms may be developed to control and coordinate their responses, and model-free approaches to represent behavior will be extremely useful in that quest.« less

  17. 77 FR 61771 - Facility Security Officer Training Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-11

    ... Security Officer training program, with the primary focus on developing the curriculum for such a program... Administrator of the Department of Transportation in developing the FSO training curriculum. The purpose of the...) to establish comprehensive FSO training requirements designed to provide full security training that...

  18. Emergence of Cooperative Long-Term Market Loyalty in Double Auction Markets.

    PubMed

    Alorić, Aleksandra; Sollich, Peter; McBurney, Peter; Galla, Tobias

    2016-01-01

    Loyal buyer-seller relationships can arise by design, e.g. when a seller tailors a product to a specific market niche to accomplish the best possible returns, and buyers respond to the dedicated efforts the seller makes to meet their needs. We ask whether it is possible, instead, for loyalty to arise spontaneously, and in particular as a consequence of repeated interaction and co-adaptation among the agents in a market. We devise a stylized model of double auction markets and adaptive traders that incorporates these features. Traders choose where to trade (which market) and how to trade (to buy or to sell) based on their previous experience. We find that when the typical scale of market returns (or, at fixed scale of returns, the intensity of choice) become higher than some threshold, the preferred state of the system is segregated: both buyers and sellers are segmented into subgroups that are persistently loyal to one market over another. We characterize the segregated state analytically in the limit of large markets: it is stabilized by some agents acting cooperatively to enable trade, and provides higher rewards than its unsegregated counterpart both for individual traders and the population as a whole.

  19. Designing PURPA (Public Utilities Regulatory Act) power purchase auctions: Theory and practice. [Cogenerated electricity purchasing model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rothkopf, M.H.; Kahn, E.P.; Teisberg, T.J.

    The Public Utilities Regulatory Act (PURPA) requires there to be procedures for electric utilities to buy electric power from qualifying cogenerators and small power producers (QFs) at rates up to ''avoided cost.'' This has led to price-posting procedures at prices calculated as the utility's marginal cost. Unexpectedly large sales at these prices and slow adjustment to falling energy cost are partially responsible for payments to QFs in excess of the utility's true avoided cost. Using competitive bidding instead of posted prices has been proposed as a way to avoid this outcome. This report reviews bidding theory and explores four issuesmore » that arise in deisigning auction systems for the purchase of power from QFs under PURPA. 77 refs., 6 figs., 15 tabs.« less

  20. Impact of primary healthcare providers' initial role security and therapeutic commitment on implementing brief interventions in managing risky alcohol consumption: a cluster randomised factorial trial.

    PubMed

    Keurhorst, M; Anderson, P; Heinen, M; Bendtsen, Preben; Baena, Begoña; Brzózka, Krzysztof; Colom, Joan; Deluca, Paolo; Drummond, Colin; Kaner, Eileen; Kłoda, Karolina; Mierzecki, Artur; Newbury-Birch, Dorothy; Okulicz-Kozaryn, Katarzyna; Palacio-Vieira, Jorge; Parkinson, Kathryn; Reynolds, Jillian; Ronda, Gaby; Segura, Lidia; Słodownik, Luiza; Spak, Fredrik; van Steenkiste, Ben; Wallace, Paul; Wolstenholme, Amy; Wojnar, Marcin; Gual, Antoni; Laurant, M; Wensing, M

    2016-07-16

    Brief interventions in primary healthcare are cost-effective in reducing drinking problems but poorly implemented in routine practice. Although evidence about implementing brief interventions is growing, knowledge is limited with regard to impact of initial role security and therapeutic commitment on brief intervention implementation. In a cluster randomised factorial trial, 120 primary healthcare units (PHCUs) were randomised to eight groups: care as usual, training and support, financial reimbursement, and the opportunity to refer patients to an internet-based brief intervention (e-BI); paired combinations of these three strategies, and all three strategies combined. To explore the impact of initial role security and therapeutic commitment on implementing brief interventions, we performed multilevel linear regression analyses adapted to the factorial design. Data from 746 providers from 120 PHCUs were included in the analyses. Baseline role security and therapeutic commitment were found not to influence implementation of brief interventions. Furthermore, there were no significant interactions between these characteristics and allocated implementation groups. The extent to which providers changed their brief intervention delivery following experience of different implementation strategies was not determined by their initial attitudes towards alcohol problems. In future research, more attention is needed to unravel the causal relation between practitioners' attitudes, their actual behaviour and care improvement strategies to enhance implementation science. ClinicalTrials.gov: NCT01501552.

  1. Effects of scarcity, aesthetics and ecology on wildlife auction prices of large African mammals.

    PubMed

    Dalerum, Fredrik; Miranda, María; Muñiz, Cristina; Rodríguez, Plácido

    2018-02-01

    For successful integration of biological conservation into economic markets, economic processes need to capture ecological values. South African wildlife ranching is a tourist-based activity that generates unique information on the economic value of wildlife species. We used public data from South African wildlife auctions to evaluate if annual prices 1991-2012 related to species characteristics associated with scarcity, aesthetics and ecology of South African carnivores and ungulates. While none of the species characteristics influenced carnivore prices, ungulate prices were related to characteristics associated with novelty and aesthetics, which relative importance had increased over time. We raise both ecological and economic concerns for this apparent focus. Our results also suggest a potential importance of non-species-related factors, such as market and buyer characteristics. We encourage further evaluation of the relative influences of species characteristics versus factors that are intrinsically linked to economic processes on price variations in South African wildlife.

  2. BALKANS SECURITY. Current and Projected Factors Affecting Regional Stability

    DTIC Science & Technology

    2000-04-01

    Security Briefing Section II Current Situation in Kosovo and Bosnia primary responsibility for public security in Kosovo. 6 According to a senior KFOR...Integrity * Reliability GAO/NSIAD-00-125BR „.c-miBUTION STATEMENT A ApSwed for Public Release Contents Letter Briefing Section Appendixes Tables...Figures Briefing Section I: Background Briefing Section II: Current Situation in Kosovo and Bosnia Briefing Section III: Projected Security Situation

  3. Urban expansion brought stress to food security in China: Evidence from decreased cropland net primary productivity.

    PubMed

    He, Chunyang; Liu, Zhifeng; Xu, Min; Ma, Qun; Dou, Yinyin

    2017-01-15

    Cropland net primary productivity (CNPP) is a crucial indicator of grain productivity and food security. However, assessments of the impact of urban expansion on the CNPP in China have been inadequate owing to data limitations. In this paper, our objective was to assess the impact of urban expansion on the CNPP in China from 1992 to 2015 in a spatially explicit manner. We first obtained the CNPP before urban expansion between 1992 and 2015 in China using the Carnegie-Ames-Stanford Approach (CASA) model. We then assessed the impact of urban expansion on the CNPP from 1992 to 2015 at multiple scales (the whole country, agricultural zones, and urban expansion hotspots) by combining the CNPP before urban expansion with the urban land coverage time series extracted from multi-source remotely sensed data. We found that the total loss of the CNPP due to urban expansion from 1992 to 2015 was 13.77TgC, which accounts for 1.88% of the CNPP before urban expansion in China. This CNPP loss resulted in a 12.45-million-ton decrease in grain production in China, corresponding to a reduction in the mean annual grain self-sufficiency rate of 2%. Therefore, we concluded that rapid urban expansion from 1992 to 2015 caused stress to China's food security. We suggest that it is still vital for China to effectively protect cropland to improve the urbanization level to 60% by 2020. Copyright © 2016 Elsevier B.V. All rights reserved.

  4. Regional Military Security Cooperation in North America

    DTIC Science & Technology

    2009-12-11

    will serve as the main research sources. The primary research question is how might the United States better facilitate greater security cooperation...militarily between the U.S., Canada, and Mexico? Secondary research questions are why do we need increased security integration? How do current...research question has several associated tertiary questions . The paper consists of five chapters. Chapters 1 through 3 are introductory and

  5. 20 CFR 404.260 - Special minimum primary insurance amounts.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    .... 404.260 Section 404.260 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Computing Primary Insurance Amounts Special Minimum Primary... compute your primary insurance amount, if the special minimum primary insurance amount described in § 404...

  6. Emergence of Cooperative Long-Term Market Loyalty in Double Auction Markets

    PubMed Central

    Alorić, Aleksandra; Sollich, Peter; McBurney, Peter; Galla, Tobias

    2016-01-01

    Loyal buyer-seller relationships can arise by design, e.g. when a seller tailors a product to a specific market niche to accomplish the best possible returns, and buyers respond to the dedicated efforts the seller makes to meet their needs. We ask whether it is possible, instead, for loyalty to arise spontaneously, and in particular as a consequence of repeated interaction and co-adaptation among the agents in a market. We devise a stylized model of double auction markets and adaptive traders that incorporates these features. Traders choose where to trade (which market) and how to trade (to buy or to sell) based on their previous experience. We find that when the typical scale of market returns (or, at fixed scale of returns, the intensity of choice) become higher than some threshold, the preferred state of the system is segregated: both buyers and sellers are segmented into subgroups that are persistently loyal to one market over another. We characterize the segregated state analytically in the limit of large markets: it is stabilized by some agents acting cooperatively to enable trade, and provides higher rewards than its unsegregated counterpart both for individual traders and the population as a whole. PMID:27120473

  7. United States Air Force Security Forces in an Era of Terrorist Threats

    DTIC Science & Technology

    1999-06-01

    their primary duties. The third alternative is to eliminate the Palace Tenure deployments of security personnel and replace them with dedicated units...The Phoenix Raven program, the 820th Security Forces Group, and Palace Tenure commitments. The specified mission varies by organization, but the...820th Security Forces Group. January 1999, slide 4. 166 Statement of LT. Col. Larry A. Buckingham , 820th Security Forces Group Commander, “820th Security

  8. Homeland security challenges in nursing practice.

    PubMed

    Boatright, Connie; McGlown, K Joanne

    2005-09-01

    Nurses need a comprehensive knowledge of doctrine, laws, regulations,programs, and processes that build the operational framework for health care preparedness. Key components of this knowledge base reside in the areas of: evolution of homeland security: laws and mandates affecting health care and compliance and regulatory issues for health care organizations. This article addresses primary components in both of these areas, after first assessing the status of nursing's involvement (in homeland security), as portrayed in the professional literature.

  9. Practical Computer Security through Cryptography

    NASA Technical Reports Server (NTRS)

    McNab, David; Twetev, David (Technical Monitor)

    1998-01-01

    The core protocols upon which the Internet was built are insecure. Weak authentication and the lack of low level encryption services introduce vulnerabilities that propagate upwards in the network stack. Using statistics based on CERT/CC Internet security incident reports, the relative likelihood of attacks via these vulnerabilities is analyzed. The primary conclusion is that the standard UNIX BSD-based authentication system is by far the most commonly exploited weakness. Encryption of Sensitive password data and the adoption of cryptographically-based authentication protocols can greatly reduce these vulnerabilities. Basic cryptographic terminology and techniques are presented, with attention focused on the ways in which technology such as encryption and digital signatures can be used to protect against the most commonly exploited vulnerabilities. A survey of contemporary security software demonstrates that tools based on cryptographic techniques, such as Kerberos, ssh, and PGP, are readily available and effectively close many of the most serious security holes. Nine practical recommendations for improving security are described.

  10. 75 FR 61533 - Self-Regulatory Organizations; International Securities Exchange, LLC; Order Granting Approval of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-05

    ... intraday auction, then the next available price is used. If no price is available by the end of the Xetra... 611 permits members to exercise discretionary power with respect to trading options in a customer's...

  11. Maternal secure-base scripts and children's attachment security in an adopted sample.

    PubMed

    Veríssimo, Manuela; Salvaterra, Fernanda

    2006-09-01

    Studies of families with adopted children are of special interest to attachment theorists because they afford opportunities to probe assumptions of attachment theory with regard to the developmental timing of interactions necessary to form primary attachments and also with regard to effects of shared genes on child attachment quality. In Bowlby's model, attachment-relevant behaviors and interactions are observable from the moment of birth, but for adoptive families, these interactions cannot begin until the child enters the family, sometimes several months or even years post-partum. Furthermore, because adoptive parents and adopted children do not usually share genes by common descent, any correspondence between attachment representations of the parent and secure base behavior of the child must arise as a consequence of dyadic interaction histories. The objectives of this study were to evaluate whether the child's age at the time of adoption or at the time of attachment assessment predicted child attachment security in adoptive families and also whether the adoptive mother's internal attachment representation predicted the child's attachment security. The participants were 106 mother - child dyads selected from the 406 adoptions carried out through the Lisbon Department of Adoption Services over a period of 3 years. The Attachment Behavior Q-Set (AQS; Waters, 1995) was used to assess secure base behavior and an attachment script representation task was used to assess the maternal attachment representations. Neither child's age at the time of adoption, nor age of the child at assessment significantly predicted the AQS security score; however, scores reflecting the presence and quality of maternal secure base scripts did predict AQS security. These findings support the notion that the transmission of attachment security across generations involves mutual exchanges and learning by the child and that the exchanges leading to secure attachment need not begin at birth

  12. 78 FR 58356 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing and Immediate Effectiveness of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-23

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70425; File No. SR-NYSEArca-2013-90] Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule... Complex Orders and Complex Order Auction Eligible Orders in Accordance With the Guaranteed Participation...

  13. 77 FR 53241 - Self-Regulatory Organizations; Options Clearing Corporation; Order Approving Proposed Rule Change...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-31

    ... Organizations; Options Clearing Corporation; Order Approving Proposed Rule Change Relating to the Auction Process Under Options Clearing Corporation Rule 1104 August 27, 2012. I. Introduction On July 3, 2012, the Options Clearing Corporation (``OCC'') filed with the Securities and Exchange Commission (``Commission...

  14. Physiological and behavioral patterns of corruption

    PubMed Central

    Jaber-López, Tarek; García-Gallego, Aurora; Perakakis, Pandelis; Georgantzis, Nikolaos

    2014-01-01

    We study the behavior and emotional arousal of the participants in an experimental auction, leading to an asymmetric social dilemma involving an auctioneer and two bidders. An antisocial transfer (bribe) which is beneficial for the auctioneer (official) is paid, if promised, by the winner of the auction. Some pro-social behavior on both the auctioneers' and the bidders' sides is observed even in the absence of any punishment mechanism (Baseline, Treatment 0). However, pro-social behavior is adopted by the vast majority of subjects when the loser of the auction can inspect the transaction between the winner and the auctioneer (Inspection, Treatment 1). The inspection and punishment mechanism is such that, if a bribe is (not) revealed, both corrupt agents (the denouncing bidder) lose(s) this period's payoffs. This renders the inspection option unprofitable for the loser and is rarely used, especially toward the end of the session, when pro-social behavior becomes pervasive. Subjects' emotional arousal was obtained through skin conductance responses. Generally speaking, our findings suggest that stronger emotions are associated with decisions deviating from pure monetary reward maximization, rather than with (un)ethical behavior per se. In fact, using response times as a measure of the subject's reflection during the decision-making process, we can associate emotional arousal with the conflict between primary or instinctive and secondary or contemplative motivations and, more specifically, with deviations from the subject's pure monetary interest. PMID:25566002

  15. Physiological and behavioral patterns of corruption.

    PubMed

    Jaber-López, Tarek; García-Gallego, Aurora; Perakakis, Pandelis; Georgantzis, Nikolaos

    2014-01-01

    We study the behavior and emotional arousal of the participants in an experimental auction, leading to an asymmetric social dilemma involving an auctioneer and two bidders. An antisocial transfer (bribe) which is beneficial for the auctioneer (official) is paid, if promised, by the winner of the auction. Some pro-social behavior on both the auctioneers' and the bidders' sides is observed even in the absence of any punishment mechanism (Baseline, Treatment 0). However, pro-social behavior is adopted by the vast majority of subjects when the loser of the auction can inspect the transaction between the winner and the auctioneer (Inspection, Treatment 1). The inspection and punishment mechanism is such that, if a bribe is (not) revealed, both corrupt agents (the denouncing bidder) lose(s) this period's payoffs. This renders the inspection option unprofitable for the loser and is rarely used, especially toward the end of the session, when pro-social behavior becomes pervasive. Subjects' emotional arousal was obtained through skin conductance responses. Generally speaking, our findings suggest that stronger emotions are associated with decisions deviating from pure monetary reward maximization, rather than with (un)ethical behavior per se. In fact, using response times as a measure of the subject's reflection during the decision-making process, we can associate emotional arousal with the conflict between primary or instinctive and secondary or contemplative motivations and, more specifically, with deviations from the subject's pure monetary interest.

  16. Effects of information on young consumers' willingness to pay for genetically modified food: experimental auction analysis.

    PubMed

    Kajale, Dilip B; Becker, T C

    2014-01-01

    This study examines the effects of information on consumers' willingness to pay (WTP) for genetically modified food (GMF). We used Vickrey second price experimental auction method for elicitation of consumer WTP for GM potato chips and GM soya-chocolate bar. The sample used in this study was university students from Delhi, India. Four information formats (positive, negative, no information, and combined information about GM technology) were used for the examination. The results show that, when students received the combine information they were willing to pay around 17%-20% premium for GMF and when received the negative information they demanded around 22% discount for GMF. While the positive- and the no-information formats alone have no considerable effect on consumers' WTP for GMF. Overall, our findings suggest that while doing marketing of GMF in India, the best strategy is to provide combined information about GM technology.

  17. Information Systems Security Products and Services Catalogue.

    DTIC Science & Technology

    1992-01-01

    pricing information on the Motorola Portable DES Receiver Station and Portable DES Base Station, contact Motorola. The PX-300- S ranges in cost from...C2 Paul Smith (612) 482-2776 Tom Latterner (301) 220-3400 Jeffrey S . Bell (215) 986-6864 John Haggard (312) 714-7604 4-2d.2 GENERAL-PURPOSE...primary software security mechanism of the SCOMP system is the security kernel, based on the Center-approved Bell -LaPadula model of the software portion

  18. 75 FR 16878 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-02

    ... (``ARS'') and Variable Rate Demand Obligations (``VRDOs''). The proposed rule change would: (i) Amend... that define auction procedures and interest rate setting mechanisms for ARS and liquidity facilities for VRDOs (``short-term obligation document disclosure rule change''); (b) ARS bidding information...

  19. Design and evaluation of security multimedia warnings for children's smartphones

    NASA Astrophysics Data System (ADS)

    Menzel, Wiebke; Tuchscheerer, Sven; Fruth, Jana; Kraetzer, Christian; Dittmann, Jana

    2012-02-01

    This article describes primarily the development and empiric validation of a design for security warning messages on smartphones for primary school children (7-10 years old). Our design approach for security warnings for children uses a specific character and is based on recommendations of a paediatrician expert. The design criteria are adapted to children's skills, e.g. their visual, acoustic, and haptic perception and their literacy. The developed security warnings are prototypically implemented in an iOS application (on the iPhone 3G/4G) where children are warned by a simulated anti-malware background service, while they are busy with another task. For the evaluation we select methods for empiric validation of the design approach from the field of usability testing ("think aloud" test, questionnaires, log-files, etc.). Our security warnings prototype is evaluated in an empiric user study with 13 primary school children, aged between 8 and 9 years and of different gender (5 girls, 8 boys). The evaluation analysis shows, that nearly all children liked the design of our security warnings. Surprisingly, on several security warning messages most of the children react in the right way after reading the warning, although the meaning couldn't be interpreted in the right way. Another interesting result is, that several children relate specific information, e.g. update, to a specific character. Furthermore, it could be seen that most of the primary school test candidates have little awareness of security threats on smartphones. It is a very strong argument to develop e.g. tutorials or websites in order to raise awareness and teach children how to recognize security threats and how to react to them. Our design approach of security warnings for children's smartphones can be a basis for warning on other systems or applications like tutorials, which are used by children. In a second investigation, we focus on webpages, designed for children since smartphones and webpages (the

  20. 77 FR 42784 - Self-Regulatory Organizations; Options Clearing Corporation; Notice of Filing of Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-20

    ... Organizations; Options Clearing Corporation; Notice of Filing of Proposed Rule Change Relating to the Auction Process Under Options Clearing Corporation Rule 1104 July 16, 2012. Pursuant to Section 19(b)(1) of the... July 3, 2012, The Options Clearing Corporation (``OCC'') filed with the Securities and Exchange...

  1. 78 FR 49308 - Self-Regulatory Organizations; Notice of Filing of Proposed Rule Change Relating To Which Complex...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-13

    ... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69829A; File No. SR-PHLX-2013-65] Self-Regulatory Organizations; Notice of Filing of Proposed Rule Change Relating To Which Complex Orders Can... Complex Orders Can Initiate a Complex Order Live Auction. The document was dated incorrectly. FOR FURTHER...

  2. 77 FR 1098 - Self-Regulatory Organizations; C2 Options Exchange, Incorporated; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-09

    ... price improvement auctions to occur on C2. B. Self-Regulatory Organization's Statement on Burden on... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66075; File No. SR-C2-2011-042] Self-Regulatory... Rule Change Related to the Exchange's Automated Improvement Mechanisms December 30, 2011. Pursuant to...

  3. Survey of quality defects in market beef and dairy cows and bulls sold through livestock auction markets in the Western United States: I. Incidence rates.

    PubMed

    Ahola, J K; Foster, H A; Vanoverbeke, D L; Jensen, K S; Wilson, R L; Glaze, J B; Fife, T E; Gray, C W; Nash, S A; Panting, R R; Rimbey, N R

    2011-05-01

    A survey was conducted to quantify incidence of Beef Quality Assurance (BQA)-related defects in market beef and dairy cows and bulls selling at auction during 2 seasons in 2008. Twenty-three BQA-related traits were evaluated by 9 trained personnel during sales at 10 livestock auction markets in Idaho (n = 5; beef and dairy), California, (n = 4; dairy only), and Utah (n = 1; beef and dairy). Overall, 18,949 unique lots (8,213 beef cows, 1,036 beef bulls, 9,177 dairy cows, and 523 dairy bulls,) consisting of 23,479 animals (9,299 beef cows, 1,091 beef bulls, 12,429 dairy cows, and 660 dairy bulls) were evaluated during 125 sales (64 spring, 61 fall) for dairy and 79 sales (40 spring, 39 fall) for beef. The majority of market beef cows and bulls (60.9 and 71.3%, respectively) were predominantly black-hided, and the Holstein hide pattern was observed in 95.4 and 93.6% of market dairy cows and bulls, respectively. Market cattle weighed 548 ± 103.6 kg (beef cows), 751 ± 176.1 kg (beef bulls), 658 ± 129.7 kg (dairy cows), and 731 ± 150.8 kg (dairy bulls). Most beef cows (79.6%) weighed 455 to 726 kg, and most beef bulls (73.8%) weighed 545 to 954 kg, respectively. Among market beef cattle, 16.0% of cows and 14.5% of bulls weighed less than 455 and 545 kg, respectively, and 63.7% of dairy cows and 81.5% of dairy bulls weighed 545 to 817 kg or 545 to 954 kg, respectively. However, 19.5% of dairy cows and 13.1% of dairy bulls weighed less than 545 kg. Mean BCS for beef cattle (9-point scale) was 4.7 ± 1.2 (cows) and 5.3 ± 0.9 (bulls), and for dairy cattle (5-point scale) was 2.6 ± 0.8 (cows) and 2.9 ± 0.6 (bulls). Some 16.5% of beef cows and 4.1% of beef bulls had a BCS of 1 to 3, whereas 34.8% of dairy cows and 10.4% of dairy bulls had a BCS of 2 or less. Emaciation (beef BCS = 1, dairy BCS = 1.0) or near-emaciation (beef BCS = 2, dairy BCS = 1.5) was observed in 13.3% of dairy cows and 3.9% of beef cows. Among beef cattle, 15.1% of cows and 15.4% of bulls were

  4. 78 FR 68497 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-14

    ... underlying securities is not open for business. The Exchange believes that the proposed changes will allow... business however that security is being traded elsewhere. For example, if the primary market is unable to... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70834; File No. SR-ISE-2013-55] Self-Regulatory...

  5. Primary care in the United States and its precarious future.

    PubMed

    Starfield, Barbara; Oliver, Thomas

    1999-09-01

    Primary care has not secured a firm place within the US health services system. Since primary care lacks a strong research base, is not institutionalized in medical education or in policy-making and is marginalized in both proposed and actual reforms, it has not developed into a central component of the health care infrastructure. We discuss recent efforts that promised modest improvements, including the Clinton health care reform proposals and subsequent federal and state actions, in the role of primary care within the health services system. We also assess the likely fate of primary care given the accelerated growth of managed care and market competition, the dissatisfaction of large segments of the population with managed care and misperceptions of managed care as synonymous with primary care. We highlight how managed care fails to achieve the cardinal functions of primary care and summarize initiatives that, at a minimum, would be required to secure a stronger position for primary care in the future.

  6. 12 CFR 362.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... adjustable rate preferred stock, money market (auction rate) preferred stock, or other newly developed...) and the National Market System, i.e., the top tier of the National Association of Securities Dealers... shall be understood to be present whenever the FDIC determines there is a high probability that the...

  7. Security Vulnerability Profiles of NASA Mission Software: Empirical Analysis of Security Related Bug Reports

    NASA Technical Reports Server (NTRS)

    Goseva-Popstojanova, Katerina; Tyo, Jacob P.; Sizemore, Brian

    2017-01-01

    principle. Specifically, for all three datasets, from 86 to 88 the security related issues were located in two to four subsystems.- The severity levels of most security issues were moderate, in all three datasets.- Out of 21 primary security classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, these classes contributed from around 80 to 90 of all security issues in each dataset. This again proves the Pareto principle of uneven distribution of security issues, in this case across CWE classes, and supports the fact that addressing these dominant security classes provides the most cost efficient way to improve missions' security. The findings presented in this report uncovered the security vulnerability profiles and identified the common trends and dominant classes of security issues, which in turn can be used to select the most efficient secure design and coding best practices compiled by the part of the SARP project team associated with the NASA's Johnson Space Center. In addition, these findings provide valuable input to the NASA IVV initiative aimed at identification of the two 25 CWEs of ground and flight missions.

  8. The Impact of Social Security on Return Migration among Latin American Elderly in the U.S.

    PubMed Central

    Vega, Alma

    2014-01-01

    International migration has long been considered the preserve of working-age adults. However, the rapid diversification of the elderly population calls for increased attention to the migration patterns of this group and its possible motivations. This study examines whether Latin American immigrants who are primary Social Security beneficiaries are more likely to return to their home countries during later life if they receive lower Social Security benefits. Using a regression discontinuity approach on restricted data from the U.S. Social Security Administration (N=1,515), this study presents the results of a natural experiment whereby the Social Security Administration unexpectedly lowered the Social Security benefits of the 1917-1921 birth cohorts due to a miscalculation in the benefit-calculation formula. Results suggest that approximately 10% of primary Social Security beneficiaries from Latin America born close to these dates return migrated, the probability of which was not affected by Social Security benefit levels. PMID:26279596

  9. Detection of equine herpesvirus-4 and physiological stress patterns in young Thoroughbreds consigned to a South African auction sale.

    PubMed

    Badenhorst, Marcha; Page, Patrick; Ganswindt, Andre; Laver, Peter; Guthrie, Alan; Schulman, Martin

    2015-06-02

    The prevalence of equine herpesvirus types-1 and -4 (EHV-1 and -4) in South African Thoroughbreds at auction sales is currently undefined. Commingling of young Thoroughbreds from various populations together with physiological stress related to their transport and confinement at a sales complex, may be associated with shedding and transmission of EHV-1 and -4. This prospective cohort study sampled 90 young Thoroughbreds consigned from eight farms, originating from three provinces representative of the South African Thoroughbred breeding demographic to a sales complex. Nasal swabs for quantitative real-time polymerase chain reaction (qPCR) assay to detect EHV-1 and -4 nucleic acid and blood samples for enzyme-linked immunosorbent assay for EHV-1 and -4 antibodies were collected from all horses on arrival and departure. Additional nasal swabs for qPCR were obtained serially from those displaying pyrexia and, or nasal discharge. Daily faecal samples were used for determination of faecal glucocorticoid metabolite (FGM) concentrations as a measurement of physiological stress and these values were modelled to determine the factors best explaining FGM variability. EHV-4 nucleic acid was detected in 14.4 % and EHV-1 from none of the animals in the study population. Most (93.3 %) and very few (1.1 %) of this population showed antibodies indicating prior exposure to EHV-4 and EHV-1 respectively. Pyrexia and nasal discharge were poor predictors for detecting EHV-4 nucleic acid. The horses' FGM concentrations increased following arrival before decreasing for most of the remaining study period including the auction process. Model averaging showed that variation in FGM concentrations was best explained by days post-arrival and transport duration. In this study population, sales consignment was associated with limited detection of EHV-4 nucleic acid in nasal secretions, with most showing prior exposure to EHV-4 and very few to EHV-1. The physiological stress response shown by

  10. Simple stochastic order-book model of swarm behavior in continuous double auction

    NASA Astrophysics Data System (ADS)

    Ichiki, Shingo; Nishinari, Katsuhiro

    2015-02-01

    In this study, we present a simple stochastic order-book model for investors' swarm behaviors seen in the continuous double auction mechanism, which is employed by major global exchanges. Our study shows a characteristic called 'fat tail' seen in the data obtained from our model that incorporates the investors' swarm behaviors. Our model captures two swarm behaviors: one is investors' behavior to follow a trend in the historical price movement, and another is investors' behavior to send orders that contradict a trend in the historical price movement. In order to capture the features of influence by the swarm behaviors, from price data derived from our simulations using these models, we analyzed the price movement range, that is, how much the price is moved when it is continuously moved in a single direction. Depending on the type of swarm behavior, we saw a difference in the cumulative frequency distribution of this price movement range. In particular, for the model of investors who followed a trend in the historical price movement, we saw the power law in the tail of the cumulative frequency distribution of this price movement range. In addition, we analyzed the shape of the tail of the cumulative frequency distribution. The result demonstrated that one of the reasons the trend following of price occurs is that orders temporarily swarm on the order book in accordance with past price trends.

  11. Designing PURPA (Public Utilities Regulatory Policies Act) power purchase auctions: Theory and practice. [Buys from cogenerators and small power generators

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    The Public Utilities Regulatory Act (PURPA) requires there to be procedures for electric utilities to buy electric power from qualifying cogenerators and small power producers (QFs) at rates up to ''avoided cost''. This has led to price-posting procedures at prices calculated as the utility's marginal cost. Unexpectedly large sales at these prices and slow adjustment to falling energy cost are partially responsible for payments to QFs in excess of the utility's true avoided cost. Using competitive bidding instead of posted prices has been proposed as a way to avoid this outcome. This report reviews bidding theory and explores four issuesmore » that arise in designing auction systems for the purchase of power from QFs under PURPA.« less

  12. [Human resources requirements for diabetic patients healthcare in primary care clinics of the Mexican Institute of Social Security].

    PubMed

    Doubova, Svetlana V; Ramírez-Sánchez, Claudine; Figueroa-Lara, Alejandro; Pérez-Cuevas, Ricardo

    2013-12-01

    To estimate the requirements of human resources (HR) of two models of care for diabetes patients: conventional and specific, also called DiabetIMSS, which are provided in primary care clinics of the Mexican Institute of Social Security (IMSS). An evaluative research was conducted. An expert group identified the HR activities and time required to provide healthcare consistent with the best clinical practices for diabetic patients. HR were estimated by using the evidence-based adjusted service target approach for health workforce planning; then, comparisons between existing and estimated HRs were made. To provide healthcare in accordance with the patients' metabolic control, the conventional model required increasing the number of family doctors (1.2 times) nutritionists (4.2 times) and social workers (4.1 times). The DiabetIMSS model requires greater increase than the conventional model. Increasing HR is required to provide evidence-based healthcare to diabetes patients.

  13. Do You Ignore Information Security in Your Journal Website?

    PubMed

    Dadkhah, Mehdi; Borchardt, Glenn; Lagzian, Mohammad

    2017-08-01

    Nowadays, web-based applications extend to all businesses due to their advantages and easy usability. The most important issue in web-based applications is security. Due to their advantages, most academic journals are now using these applications, with papers being submitted and published through their websites. As these websites are resources for knowledge, information security is primary for maintaining their integrity. In this opinion piece, we point out vulnerabilities in certain websites and introduce the potential for future threats. We intend to present how some journals are vulnerable and what will happen if a journal can be infected by attackers. This opinion is not a technical manual in information security, it is a short inspection that we did to improve the security of academic journals.

  14. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is tomore » provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.« less

  15. 27 CFR 70.281 - Form of bond and security required.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., express or telegraph money order; (v) Secured by corporate bonds or stocks, or by bonds issued by a State... of business or legal residence of the primary obligor is located; (ii) The surety must have property... which the principal place of business or legal residence of the primary obligor is located; (iv) The...

  16. Final Report-Rail Sensor Testbed Program: Active Agents in Containers for Transport Chain Security

    DTIC Science & Technology

    2011-03-21

    information. These trust approaches have been applied to a variety of regimes, including virtual communities [14], email [15] and ecommerce [16...2004(http://www .arxiv.org/abs/cond-mat/0402143). 16. Melnik, M., Aim, J., Does a seller’s eCommerce reputation matter? evidence from eBay auctions

  17. Mid-term follow-up of the TVT-Secur midurethral sling for primary stress incontinence.

    PubMed

    Angleitner-Flotzinger, Johannes; Aigmueller, Thomas

    2014-09-01

    The TVT-Secur was introduced in 2006 as a less invasive alternative to retropubic and transobturator suburethral slings. This retrospective cohort study evaluated objective and subjective results in a series of 158 consecutive patients as well as complications and the reoperation rate after TVT-Secur procedure. Between November 2006 and June 2010 a total of 158 patients underwent a TVT-Secur procedure at a single institution. All patients underwent preoperative urodynamic testing. All patients were invited for follow-up including physical examination, urodynamic studies and subjective evaluation. A total of 96 patients (61%) were available for follow-up with a mean follow-up of 29.8 months (range 5-50, median 30). At follow-up, eight (8%) of 96 patients had reoperations for stress incontinence. There were no reoperations for bleeding/hematoma, tape erosions or obstructed micturition and there were no tape erosions or exposures. 29 patients (30%) had a negative cough stress test and 44 patients (46%) subjectively considered themselves "cured". Nine of 43 patients (21%) without urgency symptoms preoperatively developed de novo urgency; 24 of 35 patients (69%) with preoperative urgency complaints were free of urgency symptoms. At 2.4 years, the TVT-Secur appears to have a low adverse events profile but inferior results compared with traditional midurethral slings. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  18. Public perspectives on nuclear security. US national security surveys, 1993--1997

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Herron, K.G.; Jenkins-Smith, H.C.

    This is the third report in a series of studies to examine how US attitudes about nuclear security are evolving in the post-Cold War era and to identify trends in public perceptions and preferences relevant to the evolution of US nuclear security policy. It presents findings from three surveys: a nationwide telephone survey of randomly selected members of the US general public; a written survey of randomly selected members of American Men and Women of Science; and a written survey of randomly selected state legislators from all fifty US states. Key areas of investigation included nuclear security, cooperation between USmore » and Russian scientists about nuclear issues, vulnerabilities of critical US infrastructures and responsibilities for their protection, and broad areas of US national science policy. While international and US national security were seen to be slowly improving, the primary nuclear threat to the US was perceived to have shifted from Russia to China. Support was found for nuclear arms control measures, including mutual reductions in stockpiles. However, respondents were pessimistic about eliminating nuclear armaments, and nuclear deterrence continued to be highly values. Participants favored decreasing funding f/or developing and testing new nuclear weapons, but supported increased investments in nuclear weapons infrastructure. Strong concerns were expressed about nuclear proliferation and the potential for nuclear terrorism. Support was evident for US scientific cooperation with Russia to strengthen security of Russian nuclear assets. Elite and general public perceptions of external and domestic nuclear weapons risks and external and domestic nuclear weapons benefits were statistically significantly related to nuclear weapons policy options and investment preferences. Demographic variables and individual belief systems were systematically related both to risk and benefit perceptions and to policy and spending preferences.« less

  19. 31 CFR 356.25 - How does the settlement process work?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false How does the settlement process work? 356.25 Section 356.25 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued...) Determination of Auction Awards; Settlement § 356.25 How does the settlement process work? Securities bought in...

  20. Addressing the Challenges of Collective Security in West Africa: In View of Recent Conflicts

    DTIC Science & Technology

    2017-06-09

    Distribution is Unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT Understanding that achieving peace and security is a primary condition for an economic ...condition for an economic integration, ECOWAS has developped various approachs in resolving crises and overcoming threats within West Africa. Using...System CS Collective Security CSO Civil Society Organizations CSS Center for Security Studies EAC East Africa Community ECCAS Economic Community of

  1. Rapidly Deployable Security System Final Report CRADA No. TC-2030-01

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kohlhepp, V.; Whiteman, B.; McKibben, M. T.

    The ultimate objective of the LEADER and LLNL strategic partnership was to develop and commercialize_a security-based system product and platform for the use in protecting the substantial physical and economic assets of the government and commerce of the United States. The primary goal of this project was to integrate video surveillance hardware developed by LLNL with a security software backbone developed by LEADER. Upon completion of the project, a prototype hardware/software security system that is highly scalable was to be demonstrated.

  2. Investor structure and the price-volume relationship in a continuous double auction market: An agent-based modeling perspective

    NASA Astrophysics Data System (ADS)

    Zhang, Wei; Bi, Zhengzheng; Shen, Dehua

    2017-02-01

    This paper investigates the impact of investor structure on the price-volume relationship by simulating a continuous double auction market. Connected with the underlying mechanisms of the price-volume relationship, i.e., the Mixture of Distribution Hypothesis (MDH) and the Sequential Information Arrival Hypothesis (SIAH), the simulation results show that: (1) there exists a strong lead-lag relationship between the return volatility and trading volume when the number of informed investors is close to the number of uninformed investors in the market; (2) as more and more informed investors entering the market, the lead-lag relationship becomes weaker and weaker, while the contemporaneous relationship between the return volatility and trading volume becomes more prominent; (3) when the informed investors are in absolute majority, the market can achieve the new equilibrium immediately. Therefore, we can conclude that the investor structure is a key factor in affecting the price-volume relationship.

  3. SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly

    NASA Astrophysics Data System (ADS)

    Ricci, R.; Chollet, G.; Crispino, M. V.; Jassim, S.; Koreman, J.; Olivar-Dimas, M.; Garcia-Salicetti, S.; Soria-Rodriguez, P.

    2006-05-01

    This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the 'SecurePhone' - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (esigned) documents and voice recordings. SecurePhone's 'biometric recogniser' is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone's built-in esignature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation. The SecurePhone is expected to boost m-commerce and open new scenarios for m-business and m-work, by changing the way people interact and by improving trust and confidence in information technologies, often considered intimidating and difficult to use. Exploitation plans will also explore other application domains (physical and logical access control, securised mobile communications).

  4. 17 CFR Appendix 1 to Part 45 - Tables of Minimum Primary Economic Terms Data

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Tables of Minimum Primary Economic Terms Data 1 Appendix 1 to Part 45 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... Minimum Primary Economic Terms Data ER13JA12.003 ER13JA12.004 ER13JA12.005 ER13JA12.006 ER13JA12.007...

  5. 17 CFR Appendix 1 to Part 45 - Tables of Minimum Primary Economic Terms Data

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 2 2014-04-01 2014-04-01 false Tables of Minimum Primary Economic Terms Data 1 Appendix 1 to Part 45 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... 45—Tables of Minimum Primary Economic Terms Data ER13JA12.003 ER13JA12.004 ER13JA12.005 ER13JA12.006...

  6. 17 CFR Appendix 1 to Part 45 - Tables of Minimum Primary Economic Terms Data

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Tables of Minimum Primary Economic Terms Data 1 Appendix 1 to Part 45 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... Minimum Primary Economic Terms Data ER13JA12.003 ER13JA12.004 ER13JA12.005 ER13JA12.006 ER13JA12.007...

  7. 75 FR 48395 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-10

    ... Proposed Rule Change The Exchange proposes to adopt changes to its crossing mechanisms to adopt an auto... proposal is to add step-up-and-match functionality (the ``auto-match feature'') to both mechanisms for an...-side order specifies the auction start price. With the auto-match feature, the contra-side order will...

  8. 78 FR 79030 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing of a Proposed Rule Change To...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-27

    ... Exchange listed-securities. The text of the proposed rule change is available at the Exchange's Web site at... rule change. The text of these statements may be examined at the places specified in Item IV below. The..., the Proposed Rule Change 1. Purpose Introduction The Exchange proposes to add a new auction type to...

  9. Security Systems Consideration: A Total Security Approach

    NASA Astrophysics Data System (ADS)

    Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.

    2007-12-01

    The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.

  10. 26 CFR 301.7101-1 - Form of bond and security required.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., bank, express or telegraph money order; (v) Secured by corporate bonds or stocks, or by bonds issued by... legal residence of the primary obligor is located; (ii) He must have property subject to execution of a... or legal residence of the primary obligor is located; (iv) He must agree not to mortgage, or...

  11. Cryptographic Combinatorial Securities Exchanges

    NASA Astrophysics Data System (ADS)

    Thorpe, Christopher; Parkes, David C.

    We present a useful new mechanism that facilitates the atomic exchange of many large baskets of securities in a combinatorial exchange. Cryptography prevents information about the securities in the baskets from being exploited, enhancing trust. Our exchange offers institutions who wish to trade large positions a new alternative to existing methods of block trading: they can reduce transaction costs by taking advantage of other institutions’ available liquidity, while third party liquidity providers guarantee execution—preserving their desired portfolio composition at all times. In our exchange, institutions submit encrypted orders which are crossed, leaving a “remainder”. The exchange proves facts about the portfolio risk of this remainder to third party liquidity providers without revealing the securities in the remainder, the knowledge of which could also be exploited. The third parties learn either (depending on the setting) the portfolio risk parameters of the remainder itself, or how their own portfolio risk would change if they were to incorporate the remainder into a portfolio they submit. In one setting, these third parties submit bids on the commission, and the winner supplies necessary liquidity for the entire exchange to clear. This guaranteed clearing, coupled with external price discovery from the primary markets for the securities, sidesteps difficult combinatorial optimization problems. This latter method of proving how taking on the remainder would change risk parameters of one’s own portfolio, without revealing the remainder’s contents or its own risk parameters, is a useful protocol of independent interest.

  12. 20 CFR 404.281 - Why your primary insurance amount may be recomputed.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... recomputed. 404.281 Section 404.281 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Computing Primary Insurance Amounts Recomputing Your Primary... enacted. If a new method of computing or recomputing primary insurance amounts is enacted into law and you...

  13. The security concern on internet banking adoption among Malaysian banking customers.

    PubMed

    Sudha, Raju; Thiagarajan, A S; Seetharaman, A

    2007-01-01

    The existing literatures highlights that the security is the primary factor which determines the adoption of Internet banking technology. The secondary information on Internet banking development in Malaysia shows a very slow growth rate. Hence, this study aims to study the banking customers perception towards security concern and Internet banking adoption through the information collected from 150 sample respondents. The data analysis reveals that the customers have much concern about security and privacy issue in adoption of Internet banking, whether the customers are adopted Internet banking or not. Hence, it infers that to popularize Internet banking system there is a need for improvement in security and privacy issue among the banking customers.

  14. 42 CFR 60.17 - Security and endorsement.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Security and endorsement. 60.17 Section 60.17 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GRANTS HEALTH EDUCATION... “endorsement” means a signature of anyone other than the borrower who is to assume either primary or secondary...

  15. 42 CFR 60.17 - Security and endorsement.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 1 2014-10-01 2014-10-01 false Security and endorsement. 60.17 Section 60.17 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GRANTS HEALTH EDUCATION... “endorsement” means a signature of anyone other than the borrower who is to assume either primary or secondary...

  16. 42 CFR 60.17 - Security and endorsement.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 1 2012-10-01 2012-10-01 false Security and endorsement. 60.17 Section 60.17 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GRANTS HEALTH EDUCATION... “endorsement” means a signature of anyone other than the borrower who is to assume either primary or secondary...

  17. 42 CFR 60.17 - Security and endorsement.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 1 2011-10-01 2011-10-01 false Security and endorsement. 60.17 Section 60.17 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GRANTS HEALTH EDUCATION... “endorsement” means a signature of anyone other than the borrower who is to assume either primary or secondary...

  18. 42 CFR 60.17 - Security and endorsement.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 1 2013-10-01 2013-10-01 false Security and endorsement. 60.17 Section 60.17 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GRANTS HEALTH EDUCATION... “endorsement” means a signature of anyone other than the borrower who is to assume either primary or secondary...

  19. 31 CFR 356.24 - Will I be notified directly of my awards and, if I am submitting bids for others, do I have to...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... awarded a par amount of $2 billion or more in an auction must send us a confirmation in written form or... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false Will I be notified directly of my.... (2) Notice to clearing corporations. If we are to deliver awarded securities under a delivery and...

  20. Security Vulnerability Profiles of Mission Critical Software: Empirical Analysis of Security Related Bug Reports

    NASA Technical Reports Server (NTRS)

    Goseva-Popstojanova, Katerina; Tyo, Jacob

    2017-01-01

    While some prior research work exists on characteristics of software faults (i.e., bugs) and failures, very little work has been published on analysis of software applications vulnerabilities. This paper aims to contribute towards filling that gap by presenting an empirical investigation of application vulnerabilities. The results are based on data extracted from issue tracking systems of two NASA missions. These data were organized in three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified security related software bugs and classified them in specific vulnerability classes. Then, we created the security vulnerability profiles, i.e., determined where and when the security vulnerabilities were introduced and what were the dominating vulnerabilities classes. Our main findings include: (1) In IVV issues datasets the majority of vulnerabilities were code related and were introduced in the Implementation phase. (2) For all datasets, around 90 of the vulnerabilities were located in two to four subsystems. (3) Out of 21 primary classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, they contributed from 80 to 90 of vulnerabilities in each dataset.

  1. 76 FR 604 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-05

    ... stated that it intends to use the technology renewal fund to fund replacement of aging and outdated... municipal securities, which includes firms active in both the secondary and primary market.'' \\44\\ \\40\\ See..., the MSRB noted that other ``non-profit organizations active in the municipal securities market as well...

  2. What is Security? A perspective on achieving security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Atencio, Julian J.

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  3. Securing clean water: A secret to success

    Treesearch

    Michael Somerville; Dino DeSimone

    2000-01-01

    Securing clean water is a primary goal for many agencies, organizations, and concerned citizens. To achieve that goal, agencies have traditionally taken a mostly regulatory approach. In recent years, however, a major trend in government has been to move decision-making and action-taking to the local level. Conservation Districts, watershed organizations, and other...

  4. Integrating security in a group oriented distributed system

    NASA Technical Reports Server (NTRS)

    Reiter, Michael; Birman, Kenneth; Gong, LI

    1992-01-01

    A distributed security architecture is proposed for incorporation into group oriented distributed systems, and in particular, into the Isis distributed programming toolkit. The primary goal of the architecture is to make common group oriented abstractions robust in hostile settings, in order to facilitate the construction of high performance distributed applications that can tolerate both component failures and malicious attacks. These abstractions include process groups and causal group multicast. Moreover, a delegation and access control scheme is proposed for use in group oriented systems. The focus is the security architecture; particular cryptosystems and key exchange protocols are not emphasized.

  5. A Complex Systems Approach to More Resilient Multi-Layered Security Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brown, Nathanael J. K.; Jones, Katherine A.; Bandlow, Alisa

    In July 2012, protestors cut through security fences and gained access to the Y-12 National Security Complex. This was believed to be a highly reliable, multi-layered security system. This report documents the results of a Laboratory Directed Research and Development (LDRD) project that created a consistent, robust mathematical framework using complex systems analysis algorithms and techniques to better understand the emergent behavior, vulnerabilities and resiliency of multi-layered security systems subject to budget constraints and competing security priorities. Because there are several dimensions to security system performance and a range of attacks that might occur, the framework is multi-objective for amore » performance frontier to be estimated. This research explicitly uses probability of intruder interruption given detection (P I) as the primary resilience metric. We demonstrate the utility of this framework with both notional as well as real-world examples of Physical Protection Systems (PPSs) and validate using a well-established force-on-force simulation tool, Umbra.« less

  6. Security of Personal Computer Systems: A Management Guide.

    ERIC Educational Resources Information Center

    Steinauer, Dennis D.

    This report describes management and technical security considerations associated with the use of personal computer systems as well as other microprocessor-based systems designed for use in a general office environment. Its primary objective is to identify and discuss several areas of potential vulnerability and associated protective measures. The…

  7. Security Verification of Secure MANET Routing Protocols

    DTIC Science & Technology

    2012-03-22

    SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Matthew F. Steele, Captain, USAF AFIT/GCS/ ENG /12-03 DEPARTMENT OF THE AIR FORCE AIR...States AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Presented to the Faculty Department of Electrical and Computer...DISTRIBUTION UNLIMITED AFIT/GCS/ ENG /12-03 SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS Matthew F. Steele, B.S.E.E. Captain, USAF

  8. When security and medicine missions conflict: confidentiality in prison settings.

    PubMed

    Allen, Scott A; Aburabi, Raed

    2016-06-13

    Purpose - It is a simple fact that prisons cannot exist - practically, legally, ethically or morally - without the support of physicians and other health professionals. Access to adequate healthcare is one of the fundamental measures of the legitimacy of a jail or prison. At the same time, there is a fundamental tension in the missions of the prison and doctor. The primary mission of the prison is security and often punishment. Reform and rehabilitation have intermittently been stated goals of prisons in the last century, but in practice those humane goals have rarely governed prison administrative culture. The primary mission of the physician is to promote the health and welfare of his or her patient. The paper aims to discuss these issues. Design/methodology/approach - At times, what is required to serve the patient's best interest is at odds with the interests of security. Much of the work of the prison physician does not conflict with the operation of security. Indeed, much of the work of the prison physician is allowed to proceed without much interference from the security regime. But given the fundamental discord in the legitimate missions of security vs medicine, conflict between the doctor and the warden is inevitable. Findings - In this paper, the authors consider the example of patient confidentiality to illustrate this conflict, using case examples inspired by real cases from the experience of the authors. Originality/value - The authors provide an ethical and practical framework for health professionals to employ when confronting these inevitable conflicts in correctional settings.

  9. Game auction prices are not related to biodiversity contributions of southern African ungulates and large carnivores.

    PubMed

    Dalerum, Fredrik; Miranda, Maria

    2016-02-25

    There is an urgent need for human societies to become environmentally sustainable. Because public policy is largely driven by economic processes, quantifications of the relationship between market prices and environmental values can provide important information for developing strategies towards sustainability. Wildlife in southern Africa is often privately owned and traded at game auctions to be utilized for commercial purposes mostly related to tourism. This market offers an interesting opportunity to evaluate how market prices relate to biologically meaningful species characteristics. In this market, prices were not correlated with species contributions to either phylogenetic or functional diversity, and species contributions to phylogenetic or functional diversity did not influence the trends in prices over time for the past 20 years. Since this economic market did not seem to appreciate evolutionary or ecologically relevant characteristics, we question if the game tourism market may contribute towards biodiversity conservation in southern Africa. We suggest that market prices in general may have limited values as guides for directing conservation and environmental management. We further suggest that there is a need to evaluate what humans value in biological organisms, and how potentially necessary shifts in such values can be instigated.

  10. Game auction prices are not related to biodiversity contributions of southern African ungulates and large carnivores

    NASA Astrophysics Data System (ADS)

    Dalerum, Fredrik; Miranda, Maria

    2016-02-01

    There is an urgent need for human societies to become environmentally sustainable. Because public policy is largely driven by economic processes, quantifications of the relationship between market prices and environmental values can provide important information for developing strategies towards sustainability. Wildlife in southern Africa is often privately owned and traded at game auctions to be utilized for commercial purposes mostly related to tourism. This market offers an interesting opportunity to evaluate how market prices relate to biologically meaningful species characteristics. In this market, prices were not correlated with species contributions to either phylogenetic or functional diversity, and species contributions to phylogenetic or functional diversity did not influence the trends in prices over time for the past 20 years. Since this economic market did not seem to appreciate evolutionary or ecologically relevant characteristics, we question if the game tourism market may contribute towards biodiversity conservation in southern Africa. We suggest that market prices in general may have limited values as guides for directing conservation and environmental management. We further suggest that there is a need to evaluate what humans value in biological organisms, and how potentially necessary shifts in such values can be instigated.

  11. Game auction prices are not related to biodiversity contributions of southern African ungulates and large carnivores

    PubMed Central

    Dalerum, Fredrik; Miranda, Maria

    2016-01-01

    There is an urgent need for human societies to become environmentally sustainable. Because public policy is largely driven by economic processes, quantifications of the relationship between market prices and environmental values can provide important information for developing strategies towards sustainability. Wildlife in southern Africa is often privately owned and traded at game auctions to be utilized for commercial purposes mostly related to tourism. This market offers an interesting opportunity to evaluate how market prices relate to biologically meaningful species characteristics. In this market, prices were not correlated with species contributions to either phylogenetic or functional diversity, and species contributions to phylogenetic or functional diversity did not influence the trends in prices over time for the past 20 years. Since this economic market did not seem to appreciate evolutionary or ecologically relevant characteristics, we question if the game tourism market may contribute towards biodiversity conservation in southern Africa. We suggest that market prices in general may have limited values as guides for directing conservation and environmental management. We further suggest that there is a need to evaluate what humans value in biological organisms, and how potentially necessary shifts in such values can be instigated. PMID:26911226

  12. Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach

    NASA Astrophysics Data System (ADS)

    Naik, R. Lalu; Reddy, P. Chenna

    2015-12-01

    The primary goals of security such as authentication, confidentiality, integrity and non-repudiation in communication networks can be achieved with secure key distribution. Quantum mechanisms are highly secure means of distributing secret keys as they are unconditionally secure. Quantum key distribution protocols can effectively prevent various attacks in the quantum channel, while classical cryptography is efficient in authentication and verification of secret keys. By combining both quantum cryptography and classical cryptography, security of communications over networks can be leveraged. Hwang, Lee and Li exploited the merits of both cryptographic paradigms for provably secure communications to prevent replay, man-in-the-middle, and passive attacks. In this paper, we propose a new scheme with the combination of quantum cryptography and classical cryptography for 802.11i wireless LANs. Since quantum cryptography is premature in wireless networks, our work is a significant step forward toward securing communications in wireless networks. Our scheme is known as hybrid quantum key distribution protocol. Our analytical results revealed that the proposed scheme is provably secure for wireless networks.

  13. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  14. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  15. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  16. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  17. 49 CFR 1542.201 - Security of the secured area.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.201 Security of the secured area. (a) Each airport operator required to have a security... posted by each airport operator in accordance with its security program not later than November 14, 2003. ...

  18. Optical Verification Laboratory Demonstration System for High Security Identification Cards

    NASA Technical Reports Server (NTRS)

    Javidi, Bahram

    1997-01-01

    Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the

  19. 20 CFR 404.242 - Use of old-start primary insurance amount as guaranteed alternative.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... guaranteed alternative. 404.242 Section 404.242 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Computing Primary Insurance Amounts Old-Start Method of Computing Primary Insurance Amounts § 404.242 Use of old-start primary insurance amount as...

  20. Genetic relationships between temperament of calves at auction and carcass traits in Japanese Black cattle.

    PubMed

    Takeda, Kazuya; Uchida, Hiroshi; Inoue, Keiichi

    2017-10-01

    Correlations of calves' temperament with carcass traits were estimated to clarify the genetic relationships between them in Japanese Black cattle. The temperament records for 3128 calves during auction at a calf market were scored on a scale of 1 (calm) to 5 (nervous) as temperament score (TS), and the TS were divided into two groups (TSG): TS 1 and 2 comprised TSG 1, and 3 to 5 constituted TSG 2. Carcass data were obtained from 33 552 fattened cattle. A threshold animal model was used for analyzing the underlying liability for TSG, whereas a linear one was used for TS and carcass traits. The heritability estimates for TS and TSG were 0.12 and 0.11, respectively. On the other hand, moderate to high heritability estimates were obtained for carcass traits (0.40 to 0.68). The temperament scores were negatively correlated with carcass weight, rib thickness and subcutaneous fat thickness (-0.13 to -0.59). In contrast, weak to moderate positive correlations were found between the temperament scores and rib eye area or yield estimate (0.16 to 0.45). The temperament scores and beef marbling score had no correlation. These results showed that it is possible to improve temperament and carcass traits simultaneously. © 2017 Japanese Society of Animal Science.

  1. Public key infrastructure for DOE security research

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aiken, R.; Foster, I.; Johnston, W.E.

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-keymore » infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.« less

  2. Alternative security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weston, B.H.

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.

  3. From Secure Memories to Smart Card Security

    NASA Astrophysics Data System (ADS)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  4. Health security as a public health concept: a critical analysis.

    PubMed

    Aldis, William

    2008-11-01

    There is growing acceptance of the concept of health security. However, there are various and incompatible definitions, incomplete elaboration of the concept of health security in public health operational terms, and insufficient reconciliation of the health security concept with community-based primary health care. More important, there are major differences in understanding and use of the concept in different settings. Policymakers in industrialized countries emphasize protection of their populations especially against external threats, for example terrorism and pandemics; while health workers and policymakers in developing countries and within the United Nations system understand the term in a broader public health context. Indeed, the concept is used inconsistently within the UN agencies themselves, for example the World Health Organization's restrictive use of the term 'global health security'. Divergent understandings of 'health security' by WHO's member states, coupled with fears of hidden national security agendas, are leading to a breakdown of mechanisms for global cooperation such as the International Health Regulations. Some developing countries are beginning to doubt that internationally shared health surveillance data is used in their best interests. Resolution of these incompatible understandings is a global priority.

  5. Port Security in the Persian Gulf

    DTIC Science & Technology

    2008-06-01

    drafters of ISPS for secure, standardized documents to be issued to the world’s merchant seamen, another arm of the UN, the International Labour ...Revised), 2003," International Labour Organization, http://www.ilo.org/ilolex/cgi-lex/convde.pl?C185 (accessed March 11, 2008). 5 The convention has...identity documents for a particularly impoverished portion of their workforce . 2. MTSA (2002) and SAFE-Port (2006) The two primary pieces of

  6. A brief indicator of household energy security: associations with food security, child health, and child development in US infants and toddlers.

    PubMed

    Cook, John T; Frank, Deborah A; Casey, Patrick H; Rose-Jacobs, Ruth; Black, Maureen M; Chilton, Mariana; Ettinger de Cuba, Stephanie; Appugliese, Danielle; Coleman, Sharon; Heeren, Timothy; Berkowitz, Carol; Cutts, Diana B

    2008-10-01

    Household energy security has not been measured empirically or related to child health and development but is an emerging concern for clinicians and researchers as energy costs increase. The objectives of this study were to develop a clinical indicator of household energy security and assess associations with food security, health, and developmental risk in children <36 months of age. A cross-sectional study that used household survey and surveillance data was conducted. Caregivers were interviewed in emergency departments and primary care clinics form January 2001 through December 2006 on demographics, public assistance, food security, experience with heating/cooling and utilities, Parents Evaluation of Developmental Status, and child health. The household energy security indicator includes energy-secure, no energy problems; moderate energy insecurity, utility shutoff threatened in past year; and severe energy insecurity, heated with cooking stove, utility shutoff, or >or=1 day without heat/cooling in past year. The main outcome measures were household and child food security, child reported health status, Parents Evaluation of Developmental Status concerns, and hospitalizations. Of 9721 children, 11% (n = 1043) and 23% (n = 2293) experienced moderate and severe energy insecurity, respectively. Versus children with energy security, children with moderate energy insecurity had greater odds of household food insecurity, child food insecurity, hospitalization since birth, and caregiver report of child fair/poor health, adjusted for research site and mother, child, and household characteristics. Children with severe energy insecurity had greater adjusted odds of household food insecurity, child food insecurity, caregivers reporting significant developmental concerns on the Parents Evaluation of Developmental Status scale, and report of child fair/poor health. No significant association was found between energy security and child weight for age or weight for length. As

  7. Software Security Practices: Integrating Security into the SDLC

    DTIC Science & Technology

    2011-05-01

    Software Security Practices Integrating Security into the SDLC Robert A. Martin HS SEDI is a trademark of the U.S. Department of Homeland Security...2011 to 00-00-2011 4. TITLE AND SUBTITLE Software Security Practices Integrating Security into the SDLC 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...SEDI FFRDC is managed and operated by The MITRE Corporation for DHS. 4 y y w SDLC Integrating Security into a typical software development lifecycle

  8. Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ondrej Linda; Todd Vollmer; Jason Wright

    Resiliency and security in critical infrastructure control systems in the modern world of cyber terrorism constitute a relevant concern. Developing a network security system specifically tailored to the requirements of such critical assets is of a primary importance. This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation. The presented learning algorithm constructs a fuzzy logic rule based model of normal network behavior. Individual fuzzy rules are extracted directly from the stream of incoming packets using an online clustering algorithm. This learning algorithm was specifically developed to comply with the constrainedmore » computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental test-bed mimicking the environment of a critical infrastructure control system.« less

  9. Willingness to pay for small solar powered bed net fans: results of a Becker-DeGroot-Marschak auction in Ghana.

    PubMed

    Yukich, Joshua O; Briët, Olivier J T; Ahorlu, Collins K; Nardini, Peter; Keating, Joseph

    2017-08-07

    Long-lasting insecticidal nets (LLINs) are one of the main interventions recommended by the World Health Organization for malaria vector control. LLINs are ineffective if they are not being used. Subsequent to the completion of a cluster randomized cross over trial conducted in rural Greater Accra where participants were provided with the 'Bɔkɔɔ System'-a set of solar powered net fan and light consoles with a solar panel and battery-or alternative household water filters, all trial participants were invited to participate in a Becker-DeGroot-Marschak auction to determine the mean willingness to pay (WTP) for the fan and light consoles and to estimate the demand curve for the units. Results demonstraed a mean WTP of approximately 55 Cedis (~13 USD). Demand results suggested that at a price which would support full manufacturing cost recovery, a majority of households in the area would be willing to purchase at least one such unit.

  10. Gamma-Ray Detectors: From Homeland Security to the Cosmos (443rd Brookhaven Lecture)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bolotnikov, Aleksey

    2008-12-03

    Many radiation detectors are first developed for homeland security or industrial applications. Scientists, however, are continuously realizing new roles that these detectors can play in high-energy physics and astrophysics experiments. On Wednesday, December 3, join presenter Aleksey Bolotnikov, a physicist in the Nonproliferation and National Security Department (NNSD) and a co-inventor of the cadmium-zinc-telluride Frisch-ring (CdZnTe) detector, for the 443rd Brookhaven Lecture, entitled Gamma-Ray Detectors: From Homeland Security to the Cosmos. In his lecture, Bolotnikov will highlight two primary radiation-detector technologies: CdZnTe detectors and fluid-Xeon (Xe) detectors.

  11. Influence through Airpower Security Cooperation in Egypt and Pakistan: Lessons for Iraq

    DTIC Science & Technology

    2007-12-01

    reengage the world’s primary arms suppliers (who happened to be the five permanent members of the U.N. Security Council) in cooperative restrictions...billion over five years, the purpose of which was to give “Pakistan confidence in our commitment to its security and provide us with reciprocal...prospect of nuclear war.72 The ongoing dispute with India over Kashmir in particular is a “ tinder box” issue over which the positions of the United

  12. 7 CFR 1962.42 - Repossession, care, and sale of chattel security or EO property by the County Supervisor.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... chapter must be followed and any appeal must be concluded. The County Supervisor will take possession of... Finance Office about disposing of the funds. (6) Advertising. (i) Private sales and sales at established public auctions will be advertised by FmHA or its successor agency under Public Law 103-354 only if...

  13. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    NASA Technical Reports Server (NTRS)

    1985-01-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  14. Poisson-process generalization for the trading waiting-time distribution in a double-auction mechanism

    NASA Astrophysics Data System (ADS)

    Cincotti, Silvano; Ponta, Linda; Raberto, Marco; Scalas, Enrico

    2005-05-01

    In this paper, empirical analyses and computational experiments are presented on high-frequency data for a double-auction (book) market. Main objective of the paper is to generalize the order waiting time process in order to properly model such empirical evidences. The empirical study is performed on the best bid and best ask data of 7 U.S. financial markets, for 30-stock time series. In particular, statistical properties of trading waiting times have been analyzed and quality of fits is evaluated by suitable statistical tests, i.e., comparing empirical distributions with theoretical models. Starting from the statistical studies on real data, attention has been focused on the reproducibility of such results in an artificial market. The computational experiments have been performed within the Genoa Artificial Stock Market. In the market model, heterogeneous agents trade one risky asset in exchange for cash. Agents have zero intelligence and issue random limit or market orders depending on their budget constraints. The price is cleared by means of a limit order book. The order generation is modelled with a renewal process. Based on empirical trading estimation, the distribution of waiting times between two consecutive orders is modelled by a mixture of exponential processes. Results show that the empirical waiting-time distribution can be considered as a generalization of a Poisson process. Moreover, the renewal process can approximate real data and implementation on the artificial stocks market can reproduce the trading activity in a realistic way.

  15. Security architecture for HL/7 message interchange.

    PubMed

    Chen, T S; Liao, B S; Lin, M G; Gough, T G

    2001-01-01

    The promotion of quality medical treatment is very important to the healthcare providers as well as to patients. It requires that the medical resources of different hospitals be combined to ensure that medical information is shared and that resources are not wasted. A computer-based patient record is one of the best methods to accomplish the interchange of the patient's clinical data. In our system, the Health Level/Seven (HL/7) format is used for the interchange of the clinical data, as it has been supported by many healthcare providers and become a â standard'. The security of the interchange of clinical data is a serious issue for people using the Internet for data communication. Several international well-developed security algorithms, models and secure policies are adopted in the design of a security handler for an HL/7 architecture. The goal of our system is to combine our security system with the end-to-end communication systems constructed from the HL/7 format to establish a safe delivery channel. A suitable security interchange environment is implemented to address some shortcomings in clinical data interchange. located at the application layer of the ISO/OSI reference model. The medical message components, sub-components, and related types of message event are the primary goals of the HL/7 protocols. The patient management system, the doctor's system for recording his advice, examination and diagnosis as well as any financial management system are all covered by the HL/7 protocols. Healthcare providers and hospitals in Taiwan are very interested in developing the HL/7 protocols as a common standard for clinical data interchange.

  16. Origins of Secure Base Script Knowledge and the Developmental Construction of Attachment Representations

    PubMed Central

    Waters, Theodore E. A.; Ruiz, Sarah K.; Roisman, Glenn I.

    2016-01-01

    Increasing evidence suggests that attachment representations take at least two forms—a secure base script and an autobiographical narrative of childhood caregiving experiences. This study presents data from the first 26 years of the Minnesota Longitudinal Study of Risk and Adaptation (N = 169), examining the developmental origins of secure base script knowledge in a high-risk sample, and testing alternative models of the developmental sequencing of the construction of attachment representations. Results demonstrated that secure base script knowledge was predicted by observations of maternal sensitivity across childhood and adolescence. Further, findings suggest that the construction of a secure base script supports the development of a coherent autobiographical representation of childhood attachment experiences with primary caregivers by early adulthood. PMID:27302650

  17. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  18. Enhanced optical security by using information carrier digital screening

    NASA Astrophysics Data System (ADS)

    Koltai, Ferenc; Adam, Bence

    2004-06-01

    Jura has developed different security features based on Information Carrier Digital Screening. Substance of such features is that a non-visible secondary image is encoded in a visible primary image. The encoded image will be visible only by using a decoding device. One of such developments is JURA's Invisible Personal Information (IPI) is widely used in high security documents, where personal data of the document holder are encoded in the screen of the document holder's photography and they can be decoded by using an optical decoding device. In order to make document verification fully automated, enhance security and eliminate human factors, digital version of IPI, the D-IPI was developed. A special 2D-barcode structure was designed, which contains sufficient quantity of encoded digital information and can be embedded into the photo. Other part of Digital-IPI is the reading software, that is able to retrieve the encoded information with high reliability. The reading software developed with a specific 2D structure is providing the possibility of a forensic analysis. Such analysis will discover all kind of manipulations -- globally, if the photography was simply changed and selectively, if only part of the photography was manipulated. Digital IPI is a good example how benefits of digital technology can be exploited by using optical security and how technology for optical security can be converted into digital technology. The D-IPI process is compatible with all current personalization printers and materials (polycarbonate, PVC, security papers, Teslin-foils, etc.) and can provide any document with enhanced security and tamper-resistance.

  19. Origins of Secure Base Script Knowledge and the Developmental Construction of Attachment Representations.

    PubMed

    Waters, Theodore E A; Ruiz, Sarah K; Roisman, Glenn I

    2017-01-01

    Increasing evidence suggests that attachment representations take at least two forms: a secure base script and an autobiographical narrative of childhood caregiving experiences. This study presents data from the first 26 years of the Minnesota Longitudinal Study of Risk and Adaptation (N = 169), examining the developmental origins of secure base script knowledge in a high-risk sample and testing alternative models of the developmental sequencing of the construction of attachment representations. Results demonstrated that secure base script knowledge was predicted by observations of maternal sensitivity across childhood and adolescence. Furthermore, findings suggest that the construction of a secure base script supports the development of a coherent autobiographical representation of childhood attachment experiences with primary caregivers by early adulthood. © 2016 The Authors. Child Development © 2016 Society for Research in Child Development, Inc.

  20. Communicating Homeland Security Threats: Government and Public Efforts

    DTIC Science & Technology

    2010-12-01

    States has never operated at a threat level lower than blue - guarded risk. The Homeland Security Advisory Council’s primary recommendations included...changing the alert level baseline to blue (guarded risk). Their rationale for resetting the threat level baseline includes acknowledging that a...accustomed to the guarded blue level indicative of a general threat of terrorist attack. To assume that public officials and citizens would ever

  1. Diamond High Assurance Security Program: Trusted Computing Exemplar

    DTIC Science & Technology

    2002-09-01

    computing component, the Embedded MicroKernel Prototype. A third-party evaluation of the component will be initiated during development (e.g., once...target technologies and larger projects is a topic for future research. Trusted Computing Reference Component – The Embedded MicroKernel Prototype We...Kernel The primary security function of the Embedded MicroKernel will be to enforce process and data-domain separation, while providing primitive

  2. Challenges of information security incident learning: An industrial case study in a Chinese healthcare organization.

    PubMed

    He, Ying; Johnson, Chris

    2017-12-01

    Security incidents can have negative impacts on healthcare organizations, and the security of medical records has become a primary concern of the public. However, previous studies showed that organizations had not effectively learned lessons from security incidents. Incident learning as an essential activity in the "follow-up" phase of security incident response lifecycle has long been addressed but not given enough attention. This paper conducted a case study in a healthcare organization in China to explore their current obstacles in the practice of incident learning. We interviewed both IT professionals and healthcare professionals. The results showed that the organization did not have a structured way to gather and redistribute incident knowledge. Incident response was ineffective in cycling incident knowledge back to inform security management. Incident reporting to multiple stakeholders faced a great challenge. In response to this case study, we suggest the security assurance modeling framework to address those obstacles.

  3. Quantitative analysis of Indonesia's reserves and energy security as an evaluation by the nation in facing global competition

    NASA Astrophysics Data System (ADS)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede

    2015-12-01

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy

  4. Homeland Security

    EPA Pesticide Factsheets

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  5. SAFETY GUIDES FOR YOU--IN THE PRIMARY GRADES.

    ERIC Educational Resources Information Center

    WALKER, LUVERNE CRABTREE

    THIS SAFETY INSTRUCTIONAL GUIDE FOR PRIMARY-GRADE TEACHERS PRESENTS NINE DIFFERENT SAFETY UNITS, INCLUDING TRAFFIC SAFETY, PLAYTIME SAFETY, SAFE EATING AND DRINKING HABITS, SAFE CLOTHING, HOME SAFETY, ANIMAL SAFETY, CIVIL DEFENSE SECURITY, AND TESTING SAFETY PRACTICES. EACH UNIT STRESSES THE REASONS FOR ACCENTING SAFETY, WHAT TO KNOW AND DO, AND…

  6. Essays in applied microeconomics

    NASA Astrophysics Data System (ADS)

    Wang, Xiaoting

    In this dissertation I use Microeconomic theory to study firms' behavior. Chapter One introduces the motivations and main findings of this dissertation. Chapter Two studies the issue of information provision through advertisement when markets are segmented and consumers' price information is incomplete. Firms compete in prices and advertising strategies for consumers with transportation costs. High advertising costs contribute to market segmentation. Low advertising costs promote price competition among firms and improves consumer welfare. Chapter Three also investigates market power as a result of consumers' switching costs. A potential entrant can offer a new product bundled with an existing product to compensate consumers for their switching cost. If the primary market is competitive, bundling simply plays the role of price discrimination, and it does not dominate unbundled sales in the process of entry. If the entrant has market power in the primary market, then bundling also plays the role of leveraging market power and it dominates unbundled sales. The market for electric power generation has been opened to competition in recent years. Chapter Four looks at issues involved in the deregulated electricity market. By comparing the performance of the competitive market with the social optimum, we identify the conditions under which market equilibrium generates socially efficient levels of electric power. Chapter Two to Four investigate the strategic behavior among firms. Chapter Five studies the interaction between firms and unemployed workers in a frictional labor market. We set up an asymmetric job auction model, where two types of workers apply for two types of job openings by bidding in auctions and firms hire the applicant offering them the most profits. The job auction model internalizes the determination of the share of surplus from a match, therefore endogenously generates incentives for an efficient division of the matching surplus. Microeconomic

  7. Evaluating the impacts of farmers' behaviors on a hypothetical agricultural water market based on double auction

    NASA Astrophysics Data System (ADS)

    Du, Erhu; Cai, Ximing; Brozović, Nicholas; Minsker, Barbara

    2017-05-01

    Agricultural water markets are considered effective instruments to mitigate the impacts of water scarcity and to increase crop production. However, previous studies have limited understanding of how farmers' behaviors affect the performance of water markets. This study develops an agent-based model to explicitly incorporate farmers' behaviors, namely irrigation behavior (represented by farmers' sensitivity to soil water deficit λ) and bidding behavior (represented by farmers' rent seeking μ and learning rate β), in a hypothetical water market based on a double auction. The model is applied to the Guadalupe River Basin in Texas to simulate a hypothetical agricultural water market under various hydrological conditions. It is found that the joint impacts of the behavioral parameters on the water market are strong and complex. In particular, among the three behavioral parameters, λ affects the water market potential and its impacts on the performance of the water market are significant under most scenarios. The impacts of μ or β on the performance of the water market depend on the other two parameters. The water market could significantly increase crop production only when the following conditions are satisfied: (1) λ is small and (2) μ is small and/or β is large. The first condition requires efficient irrigation scheduling, and the second requires well-developed water market institutions that provide incentives to bid true valuation of water permits.

  8. Healthcare is primary

    PubMed Central

    Kumar, Raman

    2015-01-01

    India is undergoing a rapid transformation in terms of governance, administrative reforms, newer policy develoment, and social movements. India is also considered one of the most vibrant economies in the world. The current discourse in public space is dominated by issues such as economic development, security, corruption free governance, gender equity, and women safety. Healthcare though remains a pressing need of population; seems to have taken a backseat. In the era of decreasing subsidies and cautious investment in social sectors, the 2nd National Conference on Family Medicine and Primary Care 2015 (FMPC) brought a focus on “healthcare” in India. The theme of this conference was “Healthcare is Primary.” The conference participants discussed on the theme of why healthcare should be a national priority and why strong primary care should remain at the center of healthcare delivery system. The experts recommended that India needs to strengthen the “general health system” instead of focusing on disease based vertical programs. Public health system should have capacity and skill pool to be able to deliver person centered comprehensive health services to the community. Proactive implementation of policies towards human resource in health is the need of the hour. As the draft National Health Policy 2015 is being debated, “family medicine” (academic primary care), the unfinished agenda of National Health Policy 2002, remains a priority area of implementation. PMID:26985402

  9. Secure Objectives for School Security

    ERIC Educational Resources Information Center

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  10. Sandia National Laboratories: National Security Missions: Global Security

    Science.gov Websites

    Involvement News News Releases Media Contacts & Resources Lab News Image Gallery Publications Annual Library Events Careers View All Jobs Students & Postdocs Internships & Co-ops Fellowships Security Image Cyber and Infrastructure Security Advanced analyses and technologies for securing the

  11. 9 CFR 11.20 - Responsibilities and liabilities of management.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... liabilities of management. (a) The management of any horse show, horse exhibition, or horse sale or auction..., horse exhibition, horse sale, or horse auction. Horses entered for sale or auction at a horse sale or... the sale or auction and prohibited from entering the sale or auction ring. Sore horses or horses...

  12. 9 CFR 11.20 - Responsibilities and liabilities of management.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... liabilities of management. (a) The management of any horse show, horse exhibition, or horse sale or auction..., horse exhibition, horse sale, or horse auction. Horses entered for sale or auction at a horse sale or... the sale or auction and prohibited from entering the sale or auction ring. Sore horses or horses...

  13. Secure Control Systems for the Energy Sector

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use thismore » technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.« less

  14. 9 CFR 3.35 - Consignments to carriers and intermediate handlers.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., and Transportation of Guinea Pigs and Hamsters Transportation Standards § 3.35 Consignments to... pig or hamster presented by any dealer, research facility, exhibitor, operator of an auction sale, or... for transportation or transport, in commerce any live guinea pig or hamster in a primary enclosure...

  15. 9 CFR 3.35 - Consignments to carriers and intermediate handlers.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ..., and Transportation of Guinea Pigs and Hamsters Transportation Standards § 3.35 Consignments to... pig or hamster presented by any dealer, research facility, exhibitor, operator of an auction sale, or... for transportation or transport, in commerce any live guinea pig or hamster in a primary enclosure...

  16. 9 CFR 3.35 - Consignments to carriers and intermediate handlers.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ..., and Transportation of Guinea Pigs and Hamsters Transportation Standards § 3.35 Consignments to... pig or hamster presented by any dealer, research facility, exhibitor, operator of an auction sale, or... for transportation or transport, in commerce any live guinea pig or hamster in a primary enclosure...

  17. 9 CFR 3.35 - Consignments to carriers and intermediate handlers.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ..., and Transportation of Guinea Pigs and Hamsters Transportation Standards § 3.35 Consignments to... pig or hamster presented by any dealer, research facility, exhibitor, operator of an auction sale, or... for transportation or transport, in commerce any live guinea pig or hamster in a primary enclosure...

  18. Quantitative analysis of Indonesia’s reserves and energy security as an evaluation by the nation in facing global competition

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Selfmore » Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy

  19. Martime Security: Ferry Security Measures Have Been Implemented, but Evaluating Existing Studies Could Further Enhance Security

    DTIC Science & Technology

    2010-12-01

    relevant requirements, analyzed 2006 through 2009 security operations data, interviewed federal and industry officials, and made observations at five...warranted, acted on all findings and recommendations resulting from five agency- contracted studies on ferry security completed in 2005 and 2006 ...Figure 5: Security Deficiencies by Vessel Type, 2006 through 2009 27 Figure 6: Security Deficiencies by Facility Type, 2006 through 2009 28

  20. AVIATION SECURITY: Transportation Security Administration Faces Immediate and Long-Term Challenges

    DTIC Science & Technology

    2002-07-25

    circumvent airport security , and provide whistleblower protection for air carrier and airport security workers. (See app. III for a summary of pending...GAO-01-1171T. Washington, D.C.: September 25, 2001. Aviation Security: Weaknesses in Airport Security and Options for Assigning Screening...125. Washington, D.C.: March 16, 2000. Aviation Security: FAA’s Actions to Study Responsibilities and Funding for Airport Security and to Certify

  1. Social Security Administration

    MedlinePlus

    ... Plan Costs my Social Security Check out your Social Security Statement , change your address & manage your benefits online today. Social Security Number Your Social Security number remains your ...

  2. 31 CFR 354.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Creation of Participant's Security Entitlement; security interests. 354.4 Section 354.4 Money and Finance: Treasury Regulations Relating to Money... Creation of Participant's Security Entitlement; security interests. (a) A Participant's Security...

  3. 31 CFR 354.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Creation of Participant's Security Entitlement; security interests. 354.4 Section 354.4 Money and Finance: Treasury Regulations Relating to Money... Creation of Participant's Security Entitlement; security interests. (a) A Participant's Security...

  4. 31 CFR 354.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false Creation of Participant's Security Entitlement; security interests. 354.4 Section 354.4 Money and Finance: Treasury Regulations Relating to Money... Creation of Participant's Security Entitlement; security interests. (a) A Participant's Security...

  5. 31 CFR 354.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Creation of Participant's Security Entitlement; security interests. 354.4 Section 354.4 Money and Finance: Treasury Regulations Relating to Money... Creation of Participant's Security Entitlement; security interests. (a) A Participant's Security...

  6. 31 CFR 354.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Creation of Participant's Security Entitlement; security interests. 354.4 Section 354.4 Money and Finance: Treasury Regulations Relating to Money... Creation of Participant's Security Entitlement; security interests. (a) A Participant's Security...

  7. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    NASA Astrophysics Data System (ADS)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  8. Identifying Regional Key Eco-Space to Maintain Ecological Security Using GIS

    PubMed Central

    Xie, Hualin; Yao, Guanrong; Wang, Peng

    2014-01-01

    Ecological security and environmental sustainability are the foundations of sustainable development. With the acceleration of urbanization, increasing human activities have promoted greater impacts on the eco-spaces that maintain ecological security. Regional key eco-space has become the primary need to maintain environmental sustainability and can offer society with continued ecosystem services. In this paper, considering the security of water resources, biodiversity conservation, disaster avoidance and protection and natural recreation, an integrated index of eco-space importance was established and a method for identifying key eco-space was created using GIS, with Lanzhou City, China as a case study. The results show that the area of core eco-space in the Lanzhou City is approximately 50,908.7 hm2, accounting for 40% of the region’s total area. These areas mainly consist of geological hazard protection zones and the core zones of regional river systems, wetlands, nature reserves, forest parks and scenic spots. The results of this study provide some guidance for the management of ecological security, ecological restoration and environmental sustainability. PMID:24590051

  9. 32 CFR 644.541 - Award of contract.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... auctioneers, are in a position to give other advice and assistance, and may authorize auction sales on behalf... auctioneers. Consideration should be given to auction sales when there is likely to be considerable interest...

  10. 12 CFR 615.5454 - Creation of participant's security entitlement; security interests.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 7 2012-01-01 2012-01-01 false Creation of participant's security entitlement; security interests. 615.5454 Section 615.5454 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT... Procedures for Farm Credit Securities § 615.5454 Creation of participant's security entitlement; security...

  11. 12 CFR 615.5454 - Creation of participant's security entitlement; security interests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Creation of participant's security entitlement; security interests. 615.5454 Section 615.5454 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT... Procedures for Farm Credit Securities § 615.5454 Creation of participant's security entitlement; security...

  12. Are Time-Limited Grants Likely to Stimulate Sustained Growth in Primary Care Residency Training? A Study of the Primary Care Residency Expansion Program.

    PubMed

    Chen, Rossan Melissa; Petterson, Stephen; Bazemore, Andrew; Grumbach, Kevin

    2015-09-01

    To examine the perceived likelihood of sustaining new residency positions funded by five-year (2010-2015) Primary Care Residency Expansion (PCRE) grants from the Health Resources and Services Administration, which aimed to increase training output to address primary care workforce issues. During September-December 2013, the authors administered an online or telephone survey to program directors whose residency programs received PCRE grants. The main outcome measure was perceived likelihood of sustaining the expanded residency positions beyond the expiration of the grant, in the outlying years of 2016 and 2017 (when the positions will be partially supported) and after 2017 (when the positions will be unsupported). Of 78 eligible program directors, 62 responded (response rate = 79.5%). Twenty-eight (45.1%; 95% CI 32.9%-57.9%) reported that their programs were unlikely to, very unlikely to, or not planning to continue the expanded positions after the PCRE grant expires. Overall, 14 (22.5%) reported having secured full funding to support the expanded positions beyond 2017. Family medicine and pediatrics program directors were significantly less likely than internal medicine program directors to report having secured funding for the outlying years (P = .02). This study suggests that an approach to primary care residency training expansion that relies on time-limited grants is unlikely to produce sustainable growth of the primary care pipeline. Policy makers should instead implement systemic reform of graduate medical education (GME) financing and designate reliable sources of funding, such as Medicare and Medicaid GME funds, for new primary care residency positions.

  13. Public Health Crisis: the Need for Primary Prevention in Failed and Fragile States.

    PubMed

    Quinn, John; Stoeva, Preslava; Zelený, Tomáš; Nanda, Toozy; Tomanová, Alžběta; Bencko, Vladimír

    2017-09-01

    A new 'normal' in global affairs may be erupting from large global powers to that of non-state actors and proxies committing violence through scaled conflict in a post-Westphalian world generating significant global health policy challenges. Health security of populations are multifactorial and indirectly proportional to war, conflict and disaster. Preventing conflict and avoiding the health vacuum that occurs in war and violence may be best practices for policy makers. This paper considers an approach of applying clinical primary prevention principles to global health policy. Brief policy review of current standards and practices in health security in fragile and failed states and prevention; and definitions discussion. A short case study series are presented with best practices, with risk and outcome review. The global balance of power and order may be shifting through geopolitical transference and inadequate action by major global power brokers. Health security in at risk nation-states may be decreasing as a result. Small scale conflict with large-scale violence threatens health security and may experience increased incidence and prevalence in fragile and failed states. Preventative policy to resuscitate fragile and failed states and prevent further external and internal shocks may support health and promote a positive feedback loop of further state stability and increased health security. Public health policy shift to mitigate state failure and public health crisis in war and conflict through the basis of primary prevention may provide best practices and maximize health security for at risk populations. Copyright© by the National Institute of Public Health, Prague 2017

  14. Space Security Law

    NASA Astrophysics Data System (ADS)

    Blount, P. J.

    2017-06-01

    Since the very beginning of the space age, security has been the critical, overriding concern at the heart of both international and domestic space law regimes. While these regimes certainly encompass broader interests, such as commercial uses of outer space, they are built on a legal foundation that is largely intended to regularize interactions among space actors to ensure security, safety, and sustainability in the space environment. Space security law, as a result, has central goals of both maintaining peace and providing security as a public good for the benefit of humankind. The idea of security is a technical and political construct. The law is a tool that is used to articulate that construct as concept and operationalize it as a value. As such, space security law is a network of law and regulation that governs a wide variety of space activities. There are four broad categories that typify the various manifestations of space security law: international peace and security; national security; human security; and space safety and sustainability. International peace and security, the first category, is directly concerned with the international law and norms that have been adopted to decrease the risk of conflict between states. National security, category two, consists of domestic law that implements, at the national level, the obligations found in the first category as well as law that promotes other national security goals. Human security, the third category, is the loose set of law and policy directed at the use of space for the protection of human populations, such as disaster response and planetary protection. Finally, the fourth category, space safety and security, represents the emerging body of law and policy that seeks to protect the space environment through measures that address space debris and harmful contamination. Obviously, these categories overlap and laws can serve duplicative purposes, but this compartmentalization reveals much about the legal

  15. Security Deposits

    DTIC Science & Technology

    1987-04-01

    security deposit action is described in the regulation as follows: h. Security Deposits (DACF and DACA ). (1) Issue. PCS moves create financial hardships...General Wickham, The Army Chief of Staff, specified a philosophy toward the family in the Army Family White Paper. General Wickham’s action was in...security deposits arose. 1 The Army’s action to the issue of security deposits will be thoroughly discussed in this paper. The Army’s action comes now

  16. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    NASA Astrophysics Data System (ADS)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  17. A Security Audit Framework to Manage Information System Security

    NASA Astrophysics Data System (ADS)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  18. Defining Information Security.

    PubMed

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  19. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    PubMed

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  20. Study on the early warning mechanism for the security of blast furnace hearths

    NASA Astrophysics Data System (ADS)

    Zhao, Hong-bo; Huo, Shou-feng; Cheng, Shu-sen

    2013-04-01

    The campaign life of blast furnace (BF) hearths has become the limiting factor for safety and high efficiency production of modern BFs. However, the early warning mechanism of hearth security has not been clear. In this article, based on heat transfer calculations, heat flux and erosion monitoring, the features of heat flux and erosion were analyzed and compared among different types of hearths. The primary detecting elements, mathematical models, evaluating standards, and warning methods were discussed. A novel early warning mechanism with the three-level quantificational standards was proposed for BF hearth security.

  1. Systems Security Engineering

    DTIC Science & Technology

    2010-08-22

    Commission (IEC). “Information technology — Security techniques — Code of practice for information security management ( ISO /IEC 27002 ...Information technology — Security techniques — Information security management systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security...was a draft ISO standard on Systems and software engineering, Systems and software assurance [18]. Created by systems engineers for systems

  2. Building Secure Attachments for Primary School Children: A Mixed Methods Study

    ERIC Educational Resources Information Center

    Ubha, Neerose; Cahill, Sharon

    2014-01-01

    Despite the wide implications of attachment theory there remains a lack of research exploring interventions which encapsulate the principles of an attachment-based framework in the school context. The aim of this research was to address this gap by implementing an intervention for a group of five primary-aged pupils with identified insecure…

  3. Security Strategy of the Bureau of Diplomatic Security.

    DTIC Science & Technology

    2011-06-10

    Williams, M.A. , Member John A. Dyson, MBA , Member Gregory Scott Hospodor, Ph.D Accepted this 10th day of June 2011 by...ACRONYMS AAR After Action Review ASOS Advance Security Overseas Seminar ATA Antiterrorism Assistance Program BRSO Regional Security Officer Course ...BSAC Basic Special Agent Course DS Bureau of Diplomatic Security FACT Foreign Affairs Counter Threat FAH Foreign Affairs Handbook FAM Foreign

  4. Looking beyond maternal sensitivity: mother-child correlates of attachment security among children with intellectual disabilities in urban India.

    PubMed

    John, Aesha; Morris, Amanda Sheffield; Halliburton, Amy L

    2012-11-01

    This study examined correlates of attachment security among children with intellectual disabilities in urban India. Survey and observational data were gathered from 47 children, mothers, and teachers on children's attachment security, adaptive functioning, and mother-child emotional availability. The data were analyzed to examine whether child emotional availability mediates the links between maternal emotional availability and child attachment security, and between child functioning and attachment security. The results supported full mediation, indicating that children's emotional availability was a primary mechanism through which maternal emotional availability and child functioning were linked to attachment security among children in our sample. The study findings are discussed in the context of implications for family interventions and research on socio-emotional development among children with intellectual disabilities.

  5. Systems Security Engineering

    DTIC Science & Technology

    2010-08-22

    practice for information security management ( ISO /IEC 27002 ),” “Information technology — Security techniques — Information security management...systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security techniques — Information security risk management ( ISO /IEC 27005).” from...associated practice aids. Perhaps the most germane discovery from this effort was a draft ISO standard on Systems and software engineering, Systems and

  6. Final report for the Integrated and Robust Security Infrastructure (IRSI) laboratory directed research and development project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hutchinson, R.L.; Hamilton, V.A.; Istrail, G.G.

    1997-11-01

    This report describes the results of a Sandia-funded laboratory-directed research and development project titled {open_quotes}Integrated and Robust Security Infrastructure{close_quotes} (IRSI). IRSI was to provide a broad range of commercial-grade security services to any software application. IRSI has two primary goals: application transparency and manageable public key infrastructure. IRSI must provide its security services to any application without the need to modify the application to invoke the security services. Public key mechanisms are well suited for a network with many end users and systems. There are many issues that make it difficult to deploy and manage a public key infrastructure. IRSImore » addressed some of these issues to create a more manageable public key infrastructure.« less

  7. Security Locks

    ERIC Educational Resources Information Center

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  8. Food Security and Diet Among American Indians in the Midwest.

    PubMed

    Berryhill, Kelly; Hale, Jason; Chase, Brian; Clark, Lauren; He, Jianghua; Daley, Christine M

    2018-04-05

    The purpose of this study was to determine levels of food security among American Indians (AI) living in the Midwest and possible correlations between food security levels and various health outcomes, diet, and demographic variables. This study used a cross-sectional design to determine health behaviors among AI. Participants (n = 362) were recruited by AI staff through various cultural community events in the Midwest, such as powwows and health fairs. Inclusion criteria included the following: age 18 years or older, self-identify as an AI, and willing to participate in the survey. Of all participants, 210 (58%) had either low or very low food security, with 96 in the very low category (26.5%). Participants with very low food security tended to have significantly more chronic conditions. Additional significant differences for very low food security existed by demographic variables, including having no insurance (p < 0.0001) or having a regular primary care provider (p = 0.0354). There was also a significant difference between food security levels and the consumption of fast food within the past week (p value = 0.0420), though no differences were found in fruit and vegetable consumption. AI in our sample had higher levels of food insecurity than those reported in the literature for other racial/ethnic groups. AI and non-Native health professionals should be aware of the gravity of food insecurity and the impact it has on overall health. Additional research is needed to determine specific aspects of food insecurity affecting different Native communities to develop appropriate interventions.

  9. Career Ladder and Curriculum Guide: Housing Management. Resident Selection and Occupancy Trainee, Resident Security Aide, Resident Security Officer, Security Officer II, Community Security Aide. Instructor's Manual.

    ERIC Educational Resources Information Center

    Allen, Archibald; Hailey, Pleasant L., Jr.

    This instructor's manual contains job analysis and training curriculum for the positions of Resident Selection and Occupancy Trainee, Resident Security Aide, Resident Security Officer, Security Officer II, and Community Security Aide. The two sections of the manual and their parts are as follows: Section I: A Model Curriculum for Resident…

  10. Beyond grid security

    NASA Astrophysics Data System (ADS)

    Hoeft, B.; Epting, U.; Koenig, T.

    2008-07-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls.

  11. A short-term longitudinal study of correlates and sequelae of attachment security in autism

    PubMed Central

    Rozga, Agata; Hesse, Erik; Main, Mary; Duschinsky, Robbie; Beckwith, Leila; Sigman, Marian

    2018-01-01

    ABSTRACT In this short-term longitudinal study, 30 preschool-aged children with autism were first observed in Ainsworth’s Strange Situation Procedure and, separately, interacting with the primary caregiver in the home. One year later, each child completed both a developmental assessment and an observational assessment of empathic responding. Behaviors typical for children with autism were distinguished from behaviors suggestive of relationally based attachment disorganization. Forty-five percent of the children were classified as securely attached. The secure group demonstrated language skills superior to those of the insecurely attached group, concurrently and during the follow-up. Compared to parents of children who were insecurely attached, parents of securely attached children were rated as more sensitive. Compared to both organized insecure and disorganized children, secure children were rated as more responsive to an examiner’s apparent distress during the follow-up relative to their ratings at intake, whereas empathy ratings of children with insecure classifications did not increase. Importantly, attachment security was associated with empathy above and beyond the contribution of children’s language level. These results indicate that the sequelae of attachment security in autism may be similar to those documented for typically developing children. PMID:28959921

  12. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation

    PubMed Central

    Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae

    2015-01-01

    The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both. PMID:26131669

  13. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.

    PubMed

    Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae

    2015-06-26

    The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

  14. Development of a medical information system that minimizes staff workload and secures system safety at a small medical institution

    NASA Astrophysics Data System (ADS)

    Haneda, Kiyofumi; Koyama, Tadashi

    2005-04-01

    We developed a secure system that minimizes staff workload and secures safety of a medical information system. In this study, we assess the legal security requirements and risks occurring from the use of digitized data. We then analyze the security measures for ways of reducing these risks. In the analysis, not only safety, but also costs of security measures and ease of operability are taken into consideration. Finally, we assess the effectiveness of security measures by employing our system in small-sized medical institution. As a result of the current study, we developed and implemented several security measures, such as authentications, cryptography, data back-up, and secure sockets layer protocol (SSL) in our system. In conclusion, the cost for the introduction and maintenance of a system is one of the primary difficulties with its employment by a small-sized institution. However, with recent reductions in the price of computers, and certain advantages of small-sized medical institutions, the development of an efficient system configuration has become possible.

  15. Hitting America’s Soft Underbelly. The Potential Threat of Deliberate Biological Attacks Against the U.S. Agricultural and Food Industry

    DTIC Science & Technology

    2004-01-01

    virus) RVF Rift Valley fever SGP sheep and goat pox (viruses) SVD Swine vesicular disease UK United Kingdom USDA U.S. Department of Agriculture VS...and dairy farm- ers alone earn between $50 billion and $54 billion a year through meat and milk sales,7 while roughly $50 billion in revenues are gener...especially true of outlying fields and feedlots and may also be the case with centralized facilities such as milking stands. Security at animal auctions

  16. 17 CFR 230.190 - Registration of underlying securities in asset-backed securities transactions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Registration of underlying securities in asset-backed securities transactions. 230.190 Section 230.190 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General...

  17. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 18 Conservation of Power and Water Resources 2 2013-04-01 2012-04-01 true Creation of Participant's Security Entitlement; security interests. 1314.5 Section 1314.5 Conservation of Power and Water... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A...

  18. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 1 2014-04-01 2014-04-01 false Creation of Participant's Security Entitlement; security interests. 81.93 Section 81.93 Housing and Urban Development Office of the Secretary... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's...

  19. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 18 Conservation of Power and Water Resources 2 2012-04-01 2012-04-01 false Creation of Participant's Security Entitlement; security interests. 1314.5 Section 1314.5 Conservation of Power and Water... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A...

  20. 12 CFR 1249.13 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 10 2014-01-01 2014-01-01 false Creation of Participant's Security Entitlement; security interests. 1249.13 Section 1249.13 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ENTERPRISES BOOK-ENTRY PROCEDURES § 1249.13 Creation of Participant's Security Entitlement; security interests. (a...

  1. 12 CFR 1511.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 9 2013-01-01 2013-01-01 false Creation of Participant's Security Entitlement; security interests. 1511.4 Section 1511.4 Banks and Banking DEPARTMENT OF THE TREASURY RESOLUTION FUNDING CORPORATION BOOK-ENTRY PROCEDURE § 1511.4 Creation of Participant's Security Entitlement; security interests...

  2. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 18 Conservation of Power and Water Resources 2 2011-04-01 2011-04-01 false Creation of Participant's Security Entitlement; security interests. 1314.5 Section 1314.5 Conservation of Power and Water... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A...

  3. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Creation of Participant's Security Entitlement; security interests. 81.93 Section 81.93 Housing and Urban Development Office of the Secretary... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's...

  4. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 18 Conservation of Power and Water Resources 2 2014-04-01 2014-04-01 false Creation of Participant's Security Entitlement; security interests. 1314.5 Section 1314.5 Conservation of Power and Water... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A...

  5. 12 CFR 1249.13 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 7 2011-01-01 2011-01-01 false Creation of Participant's Security Entitlement; security interests. 1249.13 Section 1249.13 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ENTERPRISES BOOK-ENTRY PROCEDURES § 1249.13 Creation of Participant's Security Entitlement; security interests. (a...

  6. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 1 2011-04-01 2011-04-01 false Creation of Participant's Security Entitlement; security interests. 81.93 Section 81.93 Housing and Urban Development Office of the Secretary... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's...

  7. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Creation of Participant's Security Entitlement; security interests. 1314.5 Section 1314.5 Conservation of Power and Water... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A...

  8. 12 CFR 1249.13 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 9 2013-01-01 2013-01-01 false Creation of Participant's Security Entitlement; security interests. 1249.13 Section 1249.13 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ENTERPRISES BOOK-ENTRY PROCEDURES § 1249.13 Creation of Participant's Security Entitlement; security interests. (a...

  9. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 1 2012-04-01 2012-04-01 false Creation of Participant's Security Entitlement; security interests. 81.93 Section 81.93 Housing and Urban Development Office of the Secretary... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's...

  10. 12 CFR 1249.13 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 9 2012-01-01 2012-01-01 false Creation of Participant's Security Entitlement; security interests. 1249.13 Section 1249.13 Banks and Banking FEDERAL HOUSING FINANCE AGENCY ENTERPRISES BOOK-ENTRY PROCEDURES § 1249.13 Creation of Participant's Security Entitlement; security interests. (a...

  11. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 1 2013-04-01 2013-04-01 false Creation of Participant's Security Entitlement; security interests. 81.93 Section 81.93 Housing and Urban Development Office of the Secretary... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's...

  12. 12 CFR 1511.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...; security interests. 1511.4 Section 1511.4 Banks and Banking DEPARTMENT OF THE TREASURY RESOLUTION FUNDING...-entry that a Book-entry Funding Corporation Security has been credited to a Participant's Securities... security interest. (c)(1) The Funding Corporation and the Federal Reserve Banks have no obligation to agree...

  13. 12 CFR 1511.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...; security interests. 1511.4 Section 1511.4 Banks and Banking DEPARTMENT OF THE TREASURY RESOLUTION FUNDING...-entry that a Book-entry Funding Corporation Security has been credited to a Participant's Securities... security interest. (c)(1) The Funding Corporation and the Federal Reserve Banks have no obligation to agree...

  14. 12 CFR 1511.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...; security interests. 1511.4 Section 1511.4 Banks and Banking DEPARTMENT OF THE TREASURY RESOLUTION FUNDING...-entry that a Book-entry Funding Corporation Security has been credited to a Participant's Securities... security interest. (c)(1) The Funding Corporation and the Federal Reserve Banks have no obligation to agree...

  15. 12 CFR 1511.4 - Creation of Participant's Security Entitlement; security interests.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...; security interests. 1511.4 Section 1511.4 Banks and Banking DEPARTMENT OF THE TREASURY RESOLUTION FUNDING...-entry that a Book-entry Funding Corporation Security has been credited to a Participant's Securities... security interest. (c)(1) The Funding Corporation and the Federal Reserve Banks have no obligation to agree...

  16. Preventive Interventions and Sustained Attachment Security in Maltreated Children

    PubMed Central

    Stronach, Erin Pickreign; Toth, Sheree L.; Rogosch, Fred; Cicchetti, Dante

    2013-01-01

    Thirteen-month-old maltreated infants (n = 137) and their mothers were randomly assigned to one of three conditions: child-parent psychotherapy (CPP), psychoeducational parenting intervention (PPI), and community standard (CS). A fourth group of nonmaltreated infants (n =52) and their mothers served as a normative comparison (NC) group. A prior investigation found that the CPP and PPI groups demonstrated substantial increases in secure attachment at post-intervention, whereas this change was not found in the CS and NC groups. The current investigation involved the analysis of data obtained at a follow-up assessment that occurred 12-months after the completion of treatment. At follow-up, children in the CPP group had higher rates of secure and lower rates of disorganized attachment than did children in the PPI or CS groups. Rates of disorganized attachment did not differ between the CPP and NC groups. Intention-to-treat analyses (ITT) also showed higher rates of secure attachment at follow-up in the CPP group relative to the PPI and CS groups. However, groups did not differ on disorganized attachment. Both primary and ITT analyses demonstrated that maternal reported child behavior problems did not differ among the four groups at the follow-up assessment. This is the first investigation to demonstrate sustained attachment security in maltreated children 12 months after the completion of an attachment theory-informed intervention. Findings also suggest that, while effective in the short term, parenting interventions alone may not be effective in maintaining secure attachment in children over time. PMID:24229539

  17. About the Transportation Secure Data Center | Transportation Secure Data

    Science.gov Websites

    Center | NREL About the Transportation Secure Data Center About the Transportation Secure Data Center The Transportation Secure Data Center (TSDC) makes vital transportation data broadly available large, colorful map of the United States. NREL data experts and engineers analyze large sets of complex

  18. Unix Security Cookbook

    NASA Astrophysics Data System (ADS)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  19. 78 FR 28265 - Self-Regulatory Organizations; Chicago Board Options Exchange, Incorporated; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-14

    ... (2) a non-price specific commitment to auto-match all Auction responses received during the Auction... enhance competition in the Auctions and provide customers with additional opportunities for price... Auction processing, and specify (i) a single price at which it seeks to cross the Agency Order (with...

  20. Evaluation of security algorithms used for security processing on DICOM images

    NASA Astrophysics Data System (ADS)

    Chen, Xiaomeng; Shuai, Jie; Zhang, Jianguo; Huang, H. K.

    2005-04-01

    In this paper, we developed security approach to provide security measures and features in PACS image acquisition and Tele-radiology image transmission. The security processing on medical images was based on public key infrastructure (PKI) and including digital signature and data encryption to achieve the security features of confidentiality, privacy, authenticity, integrity, and non-repudiation. There are many algorithms which can be used in PKI for data encryption and digital signature. In this research, we select several algorithms to perform security processing on different DICOM images in PACS environment, evaluate the security processing performance of these algorithms, and find the relationship between performance with image types, sizes and the implementation methods.