Science.gov

Sample records for securities primary auctions

  1. Auction-based Security Game for Multiuser Cooperative Networks

    NASA Astrophysics Data System (ADS)

    Wang, An; Cai, Yueming; Yang, Wendong; Cheng, Yunpeng

    2013-04-01

    In this paper, we develop an auction-based algorithm to allocate the relay power efficiently to improve the system secrecy rate in a cooperative network, where several source-destination pairs and one cooperative relay are involved. On the one hand, the cooperative relay assists these pairs to transmit under a peak power constraint. On the other hand, the relay is untrusty and is also a passive eavesdropper. The whole auction process is completely distributed and no instantaneous channel state information exchange is needed. We also prove the existence and uniqueness of the Nash Equilibrium (NE) for the proposed power auction game. Moreover, the Pareto optimality is also validated. Simulation results show that our proposed auction-based algorithm can effectively improve the system secrecy rate. Besides, the proposed auction-based algorithm can converge to the unique NE point within a finite number of iterations. More interestingly, we also find that the proposed power auction mechanism is cheat-proof.

  2. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued or maintained?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Treasury securities in an auction, securities awarded as a result of those bids are generally held in the... government and international agencies and foreign central banks. In their accounts, depository...

  3. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued or maintained?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Treasury securities in an auction, securities awarded as a result of those bids are generally held in the... government and international agencies and foreign central banks. In their accounts, depository...

  4. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued or maintained?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Treasury securities in an auction, securities awarded as a result of those bids are generally held in the... government and international agencies and foreign central banks. In their accounts, depository...

  5. 31 CFR 356.17 - How and when do I pay for securities awarded in an auction?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false How and when do I pay for securities awarded in an auction? 356.17 Section 356.17 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE FISCAL SERVICE SALE AND ISSUE OF MARKETABLE BOOK-ENTRY...

  6. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued or maintained?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false What are the book-entry systems in... BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS... book-entry systems in which auctioned Treasury securities may be issued or maintained? There are...

  7. Do I hear... anyone here? Tax-exempt healthcare facilities have taken a hit on auction-rate securities as the mortgage meltdown has investors skittish.

    PubMed

    Evans, Melanie

    2008-02-25

    The crisis in auction-rate securities is coming down hard on tax-exempt providers. Buyers are disappearing, sending interest rates soaring. Some hospitals and other healthcare borrowers are being forced to pay maximum interest. "Basically, the investor pool has all but vanished," says Melissa Williams, left, of Christus Health. PMID:18491765

  8. 31 CFR 356.5 - What types of securities does the Treasury auction?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... and conditions in this part, the regulations in 31 CFR part 363 (for securities held in TreasuryDirect), the regulations in 31 CFR part 357 (for securities held in the commercial book-entry system and Legacy... part to distinguish such securities from “inflation-protected” securities. We refer to...

  9. 12 CFR 619.9260 - Primary security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Primary security. 619.9260 Section 619.9260 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9260 Primary security. The basic collateral securing the loan....

  10. 12 CFR 619.9260 - Primary security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Primary security. 619.9260 Section 619.9260 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9260 Primary security. The basic collateral securing the loan....

  11. 12 CFR 619.9260 - Primary security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Primary security. 619.9260 Section 619.9260 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9260 Primary security. The basic collateral securing the loan....

  12. 31 CFR 356.5 - What types of securities does the Treasury auction?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... and conditions in this part, the regulations in 31 CFR part 363 (for securities held in TreasuryDirect), the regulations in 31 CFR part 357 (for securities held in the commercial book-entry system and Legacy... distinguish such notes and bonds from “inflation-protected securities” and “floating rate notes.” We refer...

  13. Essays on wholesale auctions in deregulated electricity markets

    NASA Astrophysics Data System (ADS)

    Baltaduonis, Rimvydas

    2007-12-01

    The early experience in the restructured electric power markets raised several issues, including price spikes, inefficiency, security, and the overall relationship of market clearing prices to generation costs. Unsatisfactory outcomes in these markets are thought to have resulted in part from strategic generator behaviors encouraged by inappropriate market design features. In this dissertation, I examine the performance of three auction mechanisms for wholesale power markets - Offer Cost Minimization auction, Payment Cost Minimization auction and Simple-Offer auction - when electricity suppliers act strategically. A Payment Cost Minimization auction has been proposed as an alternative to the traditional Offer Cost Minimization auction with the intention to solve the problem of inflated wholesale electricity prices. Efficiency concerns for this proposal were voiced due to insights predicated on the assumption of true production cost revelation. Using a game theoretic approach and an experimental method, I compare the two auctions, strictly controlling for the level of unilateral market power. A specific feature of these complex-offer auctions is that the sellers submit not only the quantities and the minimum prices that they are willing to sell at, but also the start-up fees, which are designed to reimburse the fixed start-up costs of the generation plants. I find that the complex structure of the offers leaves considerable room for strategic behavior, which consequently leads to anti-competitive and inefficient market outcomes. In the last chapter of my dissertation, I use laboratory experiments to contrast the performance of two complex-offer auctions against the performance of a simple-offer auction, in which the sellers have to recover all their generation costs - fixed and variable - through a uniform market-clearing price. I find that a simple-offer auction significantly reduces consumer prices and lowers price volatility. It mitigates anti-competitive effects

  14. 19 CFR 127.34 - Auctioneer's commissions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Auctioneer's commissions. 127.34 Section 127.34 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY GENERAL ORDER, UNCLAIMED, AND ABANDONED MERCHANDISE Proceeds of Sale § 127.34...

  15. Improving the secrecy rate by turning foes to allies: An auction scheme

    NASA Astrophysics Data System (ADS)

    Ma, Ya-Yan; Wang, Bao-Yun

    2015-09-01

    Security against eavesdroppers is a critical issue in cognitive radio networks (CRNs). In this paper, a scenario consisting of one primary pair and multiple secondary pairs is considered. The secondary transmitters (STs) work in half-duplex mode and they are potential eavesdroppers on the primary transmission unless they are allowed to simultaneously transmit with the primary transmitter (PT). A modified second-price sealed-bid auction scheme is employed to model the interaction between the PT and STs. With the proposed auction scheme, the hostile relationship between the PT and STs is transformed into a cooperative relationship. An iterative algorithm based on the max-min criteria is proposed to find the optimal bidding power of the STs for an access chance in the presence of multiple eavesdroppers. Numerical results show that the proposed auction scheme not only improves the PT’s security but also increases the access opportunities of the STs. Project supported by the National Natural Science Foundation of China (Grant Nos. 61271232 and 61372126) and the University Postgraduate Research and Innovation Project in Jiangsu Province, China (Grant No. CXZZ12-0472).

  16. Theoretically Founded Optimization of Auctioneer's Revenues in Expanding Auctions

    NASA Astrophysics Data System (ADS)

    Rabin, Jonathan; Shehory, Onn

    The expanding auction is a multi-unit auction which provides the auctioneer with control over the outcome of the auction by means of dynamically adding items for sale. Previous research on the expanding auction has provided a numeric method to calculate a strategy that optimizes the auctioneer's revenue. In this paper, we analyze various theoretical properties of the expanding auction, and compare it to VCG, a multi-unit auction protocol known in the art. We examine the effects of errors in the auctioneer's estimation of the buyers' maximal bidding values and prove a theoretical bound on the ratio between the revenue yielded by the Informed Decision Strategy (IDS) and the post-optimal strategy. We also analyze the relationship between the auction step and the optimal revenue and introduce a method of computing this optimizing step. We further compare the revenues yielded by the use of IDS with an expanding auction to those of the VCG mechanism and determine the conditions under which the former outperforms the latter. Our work provides new insight into the properties of the expanding auction. It further provides theoretically founded means for optimizing the revenue of auctioneer.

  17. Auctioning Airport Slots?

    NASA Technical Reports Server (NTRS)

    Gruyer, Nicolas; Lenoir, Nathalie

    2003-01-01

    The current allocation of slots on congested European airports constitutes an obstacle to the effective liberalisation of air transportation undertaken in Europe. With a view to favouring effluent slot utilisation and competition, as is the goal of the Euopean commission, we propose to use a market mechanism, based on temporary" utilisation licences. In order to allocate those licences, we propose and describe an iterated combinatorial auction mechanism where a percentage of licences would be reallocated each season. A secondary market would also be set up in order to reallocate slots during a season. Since a combinatorial auction involve a complex optimisation procedure, we describe how it can be made to work in the case of auctions.

  18. Three essays on auction markets

    NASA Astrophysics Data System (ADS)

    Shunda, Nicholas James

    This dissertation contains a series of theoretical investigations of auction markets. The essays it contains cover wholesale electricity markets, a popular selling mechanism on eBay, and supplier entry into multi-unit procurement auctions. The study in Chapter 1 compares the procurement cost-minimizing and productive efficiency performance of the auction mechanism used by independent system operators in wholesale electricity auction markets in the U.S. with that of a proposed alternative. The current practice allocates energy contracts as if the auction featured a discriminatory final payment method when, in fact, the markets are uniform price auctions. The proposed alternative explicitly accounts for the market-clearing price during the allocation phase. We find that the proposed alternative largely outperforms the current practice on the basis of procurement costs in the context of simple auction markets featuring both day-ahead and real-time auctions and that the procurement cost advantage of the alternative is complete when we simulate the effects of increased competition. We also find that a tradeoff between the objectives of procurement cost minimization and productive efficiency emerges in our simple auction markets and persists in the face of increased competition. The study in Chapter 2 considers a possible rationale for an auction with a buy price. In an auction with a buy price, the seller provides bidders with an option to end the auction early by accepting a transaction at a posted price. The "Buy-It-Now" option on eBay is a leading example of an auction with a buy price. The study develops a model of an auction with a buy price in which bidders use the auction's reserve price and buy price to formulate a reference price. The model both explains why a revenue-maximizing seller would want to augment her auction with a buy price and demonstrates that the seller sets a higher reserve price when she can affect the bidders' reference price through the

  19. Multiunit auctions with complementarities: Issues of efficiency in electricity auctions

    NASA Astrophysics Data System (ADS)

    Elmaghraby, Wedad Jasmine

    Many governments are beginning to believe that it is in their and their constituents' best interest to deregulate their electricity supply industries (ESI). Electricity supply industries in the United Kingdom, Australia, Chile, Norway and the United States have been, or are currently being, restructured. Amongst the many challenges facing the deregulated ESI is to create an auction that induces an efficient use of generation resources, i.e., the efficient dispatch. The design of an electricity auction that induces an efficient use of generation resources is complicated by the fact that electricity demand, which fluctuates from hour to hour, must be satisfied by different generation technologies with nonconvex costs, and that, with the exception of hydro resources, the generators lack the ability to store electricity in inventory. In this dissertation, I analyze the performance of different auction structures in minimizing generation costs. In particular, I am interested in identifying which, if any, rules in an auction structure are necessary and sufficient to guarantee productive minimization of generation costs, in equilibrium. I conduct my analysis assuming two informational frameworks their own costs and all of their opponents' costs with certainty (Chapter 2), and each generator knows its own costs but is uncertain as to what its opponents' costs may be (Chapter 3). The results of chapters 2 and 3 support each other and indicate that the current auction structures operating in California, the UK and Australia are not able to guarantee productive efficiency. Instead, an auction design that takes into account the structure of generation costs has superior (theoretical) efficiency properties. By auctioning daily electricity demand according to its duration, while limiting the size of the demand bundle to be no greater than the capacity of a generation plant, generators are able to bid so as to reflect their cost advantages. This auction format, labeled an alpha

  20. Multiparty quantum sealed-bid auction using single photons as message carrier

    NASA Astrophysics Data System (ADS)

    Liu, Wen-Jie; Wang, Hai-Bin; Yuan, Gong-Lin; Xu, Yong; Chen, Zhen-Yu; An, Xing-Xing; Ji, Fu-Gao; Gnitou, Gnim Tchalim

    2016-02-01

    In this study, a novel multiparty quantum sealed-bid auction protocol using the single photons as the message carrier of bids is proposed, followed by an example of three-party auction. Compared with those protocols based on the entangled states (GHZ state, EPR pairs, etc.), the present protocol is more economic and feasible within present technology. In order to guarantee the security and the fairness of the auction, the decoy photon checking technique and an improved post-confirmation mechanism with EPR pairs are introduced, respectively.

  1. 49 CFR 580.9 - Odometer record retention for auction companies.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... retain at its primary place of business in an order that is appropriate to business requirements and that... following records: (a) The name of the most recent owner (other than the auction company); (b) The name...

  2. Internet Auction Sellers: Does Size Really Matter?

    ERIC Educational Resources Information Center

    Halstead, Diane; Becherer, Richard C.

    2003-01-01

    Examines the Internet auction phenomenon as it relates to the marketing mix of online auction sellers. The data indicate that, while there is great diversity among businesses that utilize online auctions, distinct cost leadership and differentiation marketing strategies are both evident. These two approaches are further distinguished in terms of…

  3. Exploring Online Auction Behaviors and Motivations

    ERIC Educational Resources Information Center

    Jeon, Sua; Crutsinger, Christy; Kim, Haejung

    2008-01-01

    The availability and convenience of the Internet, combined with the variety of products available at any given time, have contributed to the success of online auctions.This exploratory study examined online auction behaviors among college students in an attempt to identify underlying dimensions of auction motivations. Questionnaires completed by…

  4. 7 CFR 1955.148 - Auction sales.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 14 2011-01-01 2011-01-01 false Auction sales. 1955.148 Section 1955.148 Agriculture... REGULATIONS (CONTINUED) PROPERTY MANAGEMENT Disposal of Inventory Property General § 1955.148 Auction sales. This section provides guidance on the sale of all inventory property by auction, except FSA...

  5. 7 CFR 1955.148 - Auction sales.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 14 2010-01-01 2009-01-01 true Auction sales. 1955.148 Section 1955.148 Agriculture... REGULATIONS (CONTINUED) PROPERTY MANAGEMENT Disposal of Inventory Property General § 1955.148 Auction sales. This section provides guidance on the sale of all inventory property by auction, except FSA...

  6. 7 CFR 1955.148 - Auction sales.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 14 2014-01-01 2014-01-01 false Auction sales. 1955.148 Section 1955.148 Agriculture... REGULATIONS (CONTINUED) PROPERTY MANAGEMENT Disposal of Inventory Property General § 1955.148 Auction sales. This section provides guidance on the sale of all inventory property by auction, except FSA...

  7. 7 CFR 1955.148 - Auction sales.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 14 2013-01-01 2013-01-01 false Auction sales. 1955.148 Section 1955.148 Agriculture... REGULATIONS (CONTINUED) PROPERTY MANAGEMENT Disposal of Inventory Property General § 1955.148 Auction sales. This section provides guidance on the sale of all inventory property by auction, except FSA...

  8. 7 CFR 1955.148 - Auction sales.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 14 2012-01-01 2012-01-01 false Auction sales. 1955.148 Section 1955.148 Agriculture... REGULATIONS (CONTINUED) PROPERTY MANAGEMENT Disposal of Inventory Property General § 1955.148 Auction sales. This section provides guidance on the sale of all inventory property by auction, except FSA...

  9. 7 CFR 46.25 - Auction sales.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 2 2012-01-01 2012-01-01 false Auction sales. 46.25 Section 46.25 Agriculture... THAN RULES OF PRACTICE) UNDER THE PERISHABLE AGRICULTURAL COMMODITIES ACT, 1930 Auction Sales § 46.25 Auction sales. Commission merchants, dealers and brokers who offer produce for sale through...

  10. 7 CFR 46.25 - Auction sales.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 2 2013-01-01 2013-01-01 false Auction sales. 46.25 Section 46.25 Agriculture... THAN RULES OF PRACTICE) UNDER THE PERISHABLE AGRICULTURAL COMMODITIES ACT, 1930 Auction Sales § 46.25 Auction sales. Commission merchants, dealers and brokers who offer produce for sale through...

  11. Statistical Properties of Online Auctions

    NASA Astrophysics Data System (ADS)

    Namazi, Alireza; Schadschneider, Andreas

    We characterize the statistical properties of a large number of online auctions run on eBay. Both stationary and dynamic properties, like distributions of prices, number of bids etc., as well as relations between these quantities are studied. The analysis of the data reveals surprisingly simple distributions and relations, typically of power-law form. Based on these findings we introduce a simple method to identify suspicious auctions that could be influenced by a form of fraud known as shill bidding. Furthermore the influence of bidding strategies is discussed. The results indicate that the observed behavior is related to a mixture of agents using a variety of strategies.

  12. Biological auctions with multiple rewards.

    PubMed

    Reiter, Johannes G; Kanodia, Ayush; Gupta, Raghav; Nowak, Martin A; Chatterjee, Krishnendu

    2015-08-01

    The competition for resources among cells, individuals or species is a fundamental characteristic of evolution. Biological all-pay auctions have been used to model situations where multiple individuals compete for a single resource. However, in many situations multiple resources with various values exist and single reward auctions are not applicable. We generalize the model to multiple rewards and study the evolution of strategies. In biological all-pay auctions the bid of an individual corresponds to its strategy and is equivalent to its payment in the auction. The decreasingly ordered rewards are distributed according to the decreasingly ordered bids of the participating individuals. The reproductive success of an individual is proportional to its fitness given by the sum of the rewards won minus its payments. Hence, successful bidding strategies spread in the population. We find that the results for the multiple reward case are very different from the single reward case. While the mixed strategy equilibrium in the single reward case with more than two players consists of mostly low-bidding individuals, we show that the equilibrium can convert to many high-bidding individuals and a few low-bidding individuals in the multiple reward case. Some reward values lead to a specialization among the individuals where one subpopulation competes for the rewards and the other subpopulation largely avoids costly competitions. Whether the mixed strategy equilibrium is an evolutionarily stable strategy (ESS) depends on the specific values of the rewards. PMID:26180069

  13. Biological auctions with multiple rewards.

    PubMed

    Reiter, Johannes G; Kanodia, Ayush; Gupta, Raghav; Nowak, Martin A; Chatterjee, Krishnendu

    2015-08-01

    The competition for resources among cells, individuals or species is a fundamental characteristic of evolution. Biological all-pay auctions have been used to model situations where multiple individuals compete for a single resource. However, in many situations multiple resources with various values exist and single reward auctions are not applicable. We generalize the model to multiple rewards and study the evolution of strategies. In biological all-pay auctions the bid of an individual corresponds to its strategy and is equivalent to its payment in the auction. The decreasingly ordered rewards are distributed according to the decreasingly ordered bids of the participating individuals. The reproductive success of an individual is proportional to its fitness given by the sum of the rewards won minus its payments. Hence, successful bidding strategies spread in the population. We find that the results for the multiple reward case are very different from the single reward case. While the mixed strategy equilibrium in the single reward case with more than two players consists of mostly low-bidding individuals, we show that the equilibrium can convert to many high-bidding individuals and a few low-bidding individuals in the multiple reward case. Some reward values lead to a specialization among the individuals where one subpopulation competes for the rewards and the other subpopulation largely avoids costly competitions. Whether the mixed strategy equilibrium is an evolutionarily stable strategy (ESS) depends on the specific values of the rewards.

  14. Auctions for coastal energy resources

    NASA Astrophysics Data System (ADS)

    Griffin, Robert M.

    It is becoming increasingly common to allocate public resources to the private sector for the purpose of developing these resources. One of the earliest uses of auctions in the U.S. for allocating rights to public resources was in the offshore oil and gas industry. The U.S. Federal government, through the Department of Interior (DOI), has used auctions to allocate development rights to offshore oil and gas resources to the private sector since the 1950's. Since then many things have changed. Oil and gas markets have gone through boom and bust cycles, giant technological advances in extraction and assessment have taken place, and alternative energy based in the coastal zone is now in demand in markets as well. There has been an enormous amount of research into the drivers of bidder behavior in auctions and optimal auction design in the last 60 years as well. Throughout all of this, the DOI has continued to use basically the same exact auction design to allocate oil and gas leases. The U.S. offshore oil and gas resources sold by the Department of Interior have accounted for more than $65 billion in revenue since the program started. These offshore resources are an important source of government revenue and national wealth. Additionally, the expansion of the energy sector offshore has enormous potential for electricity generation in the U.S., estimated by the National Renewable Energy Laboratory as approaching 54 gigawatts by 2030 (U.S. Department of Energy, 2008). Taken together, the DOI controls access to a large part of the future of energy in the U.S. The research herein assesses the auction formats used to allocate both fossil fuels and renewable resources on the Outer Continental Shelf (OCS). The first manuscript looks at the current method used by the DOI to allocate oil and gas leases on the OCS, and is primarily interested in how bidders behave in this environment. Using latent class estimation techniques to separate distinct bidding behavior in a laboratory

  15. 76 FR 81932 - Auction of FM Broadcast Construction Permits; Revised Construction Permit Number in Auction 93

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ... COMMISSION Auction of FM Broadcast Construction Permits; Revised Construction Permit Number in Auction 93... the construction permit number for one of the FM broadcast construction permits for Auction 93. FOR...'s Electronic Comment Filing System (ECFS) Web page at http://www.fcc.gov/cgb/ecfs/ . ] 1....

  16. 40 CFR 73.73 - Delegation of auctions and sales and termination of auctions and sales.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 17 2013-07-01 2013-07-01 false Delegation of auctions and sales and termination of auctions and sales. 73.73 Section 73.73 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) SULFUR DIOXIDE ALLOWANCE SYSTEM Auctions, Direct Sales,...

  17. 40 CFR 73.73 - Delegation of auctions and sales and termination of auctions and sales.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 16 2010-07-01 2010-07-01 false Delegation of auctions and sales and termination of auctions and sales. 73.73 Section 73.73 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) SULFUR DIOXIDE ALLOWANCE SYSTEM Auctions, Direct Sales,...

  18. 40 CFR 73.73 - Delegation of auctions and sales and termination of auctions and sales.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 16 2011-07-01 2011-07-01 false Delegation of auctions and sales and termination of auctions and sales. 73.73 Section 73.73 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) SULFUR DIOXIDE ALLOWANCE SYSTEM Auctions, Direct Sales,...

  19. 40 CFR 73.73 - Delegation of auctions and sales and termination of auctions and sales.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 17 2014-07-01 2014-07-01 false Delegation of auctions and sales and termination of auctions and sales. 73.73 Section 73.73 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) SULFUR DIOXIDE ALLOWANCE SYSTEM Auctions, Direct Sales,...

  20. 40 CFR 73.73 - Delegation of auctions and sales and termination of auctions and sales.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 17 2012-07-01 2012-07-01 false Delegation of auctions and sales and termination of auctions and sales. 73.73 Section 73.73 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) SULFUR DIOXIDE ALLOWANCE SYSTEM Auctions, Direct Sales,...

  1. 7 CFR 29.36 - Auction market.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Auction market. 29.36 Section 29.36 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... INSPECTION Regulations Definitions § 29.36 Auction market. A place to which tobacco is delivered by...

  2. 7 CFR 29.36 - Auction market.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 2 2011-01-01 2011-01-01 false Auction market. 29.36 Section 29.36 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... INSPECTION Regulations Definitions § 29.36 Auction market. A place to which tobacco is delivered by...

  3. Alternative implementations of electric power auctions

    SciTech Connect

    Dekrajangpetch, S.; Sheble, G.B.

    1998-12-31

    Auctions are considered pricing mechanism of choice for the competitive electric power market. This paper outlines alternative structures for auction implementation. The issue of choosing between single-sided and double-sided auctions is discussed in this paper. To ensure the reliability of the power system, some ancillary services must be provided. this paper addresses various issues of ancillary services; for example, which ancillary services should be bundled and which should be unbundled (i.e., traded under separate contracts). Previous research has indicated that auctions can be formulated as a linear program and this linear program can be solved efficiently. However, when mixed integer solutions are required, it may be impossible to formulate the problem as a linear program. The authors discuss factors concerning this problem and attempt to identify whether auctions are required to implement as a mixed integer program.

  4. Collusion in Auctions for Emission Permits: An Experimental Analysis

    ERIC Educational Resources Information Center

    Burtraw, Dallas; Goeree, Jacob; Holt, Charles A.; Myers, Erica; Palmer, Karen; Shobe, William

    2009-01-01

    Environmental markets have several institutional features that provide a new context for the use of auctions and that have not been studied previously. This paper reports on laboratory experiments testing three auction forms--uniform and discriminatory price sealed-bid auctions and an ascending clock auction. We test the ability of subjects to…

  5. 31 CFR 356.20 - How does the Treasury determine auction awards?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... hundredth of a whole percentage point, for example, 17.13%. (b) Determining the interest rate for new note and bond issues. We set the interest rate at a 1/8 of one percent increment. If a Treasury inflation-protected securities auction results in a negative or zero yield, the interest rate will be set at zero,...

  6. 78 FR 61350 - Tribal Mobility Fund Phase I Auction (Auction 902); Short-Form Application Filing Window...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-03

    .... In the list of bidding areas released with the Auction 902 Procedures Public Notice, 78 FR 56875... COMMISSION Tribal Mobility Fund Phase I Auction (Auction 902); Short-Form Application Filing Window... Bureau, Auctions and Spectrum Access Division: For Tribal Mobility Fund Phase I questions:...

  7. Security approaches in using tablet computers for primary data collection in clinical research.

    PubMed

    Wilcox, Adam B; Gallagher, Kathleen; Bakken, Suzanne

    2013-01-01

    Next-generation tablets (iPads and Android tablets) may potentially improve the collection and management of clinical research data. The widespread adoption of tablets, coupled with decreased software and hardware costs, has led to increased consideration of tablets for primary research data collection. When using tablets for the Washington Heights/Inwood Infrastructure for Comparative Effectiveness Research (WICER) project, we found that the devices give rise to inherent security issues associated with the potential use of cloud-based data storage approaches. This paper identifies and describes major security considerations for primary data collection with tablets; proposes a set of architectural strategies for implementing data collection forms with tablet computers; and discusses the security, cost, and workflow of each strategy. The paper briefly reviews the strategies with respect to their implementation for three primary data collection activities for the WICER project.

  8. Spiral of Hatred: Social Effects in Buyer-Seller Cross-Comments Left on Internet Auctions

    NASA Astrophysics Data System (ADS)

    Nielek, Radoslaw; Wawer, Aleksander; Wierzbicki, Adam

    An auction platform is a dynamic environment where a rich variety of social effects can be observed. Most of those effects remain unnoticed or even hidden to ordinary users. The in-depth studies of such effects should allow us to identify and understand the key factors influencing users’ behaviour. The material collected from the biggest Polish auction house has been analyzed. NLP algorithms were applied to extract sentiment-related content from collected comments. Emotional distance between negative, neutral and positive comments has been calculated. The obtained results confirm the existence of the spiral-of-hatred effect but also indicate that much more complex patterns of mutual relations between sellers and buyers exist. The last section contains a several suggestions which can prove useful to improve trustworthiness of users’ reports and security of an auction platform in general.

  9. Sequential Auctions in Uncertain Information Settings

    NASA Astrophysics Data System (ADS)

    Fatima, Shaheen; Wooldridge, Michael; Jennings, Nicholas R.

    This paper analyzes sequential auctions for private value objects using second-price sealed-bid rules. Now, the equilibrium bids for such auctions depend on the information uncertainty of the bidders. Specifically, there are three key auction parameters that the bidders could be uncertain about: the valuations of the objects for sale, the number of objects for sale, and the number of participating bidders. We analyse the bidding behaviour for each of these three sources of uncertainty. For each setting, we first find the equilibrium bidding strategies for the individual auctions that comprise a series. Then we analyze the effect of these uncertainties on the computational and economic properties of the equilibrium solution. The former analysis is essential if we want to use software agents to bid on our behalf. The latter is essential because both the auctioneer and the bidders want to know how these uncertainties affect their profits. Thus we compare the outcomes for these settings from the perspective of the bidders (i.e., in terms of their profits), from the perspective of the auctioneer (i.e., in terms of his revenue), and from a global perspective (i.e., in terms of auction efficiency).

  10. Quantum auctions: Facts and myths

    NASA Astrophysics Data System (ADS)

    Piotrowski, Edward W.; Sładkowski, Jan

    2008-06-01

    Quantum game theory, whatever opinions may be held due to its abstract physical formalism, have already found various applications even outside the orthodox physics domain. In this paper we introduce the concept of a quantum auction, its advantages and drawbacks. Then we describe the models that have already been put forward. A general model involves Wigner formalism and infinite dimensional Hilbert spaces - we envisage that the implementation might not be an easy task. But a restricted model advocated by the Hewlett-Packard group (Hogg et al.) seems to be much easier to implement. We focus on problems related to combinatorial auctions and technical assumptions that are made. Powerful quantum algorithms for finding solutions would extend the range of possible applications. Quantum strategies, being qubits, can be teleported but are immune from cloning - therefore extreme privacy of the agent’s activity could in principle be guaranteed. Then we point out some key problems that have to be solved before commercial use would be possible. With present technology, optical networks, single photon sources and detectors seems to be sufficient for an experimental realization in the near future.

  11. Bayesian Auctions with Friends and Foes

    NASA Astrophysics Data System (ADS)

    Chen, Po-An; Kempe, David

    We study auctions whose bidders are embedded in a social or economic network. As a result, even bidders who do not win the auction themselves might derive utility from the auction, namely, when a friend wins. On the other hand, when an enemy or competitor wins, a bidder might derive negative utility. Such spite and altruism will alter the bidding strategies. A simple and natural model for bidders’ utilities in these settings posits that the utility of a losing bidder i as a result of bidder j winning is a constant (positive or negative) fraction of bidder j’s utility.

  12. 77 FR 38803 - Mobility Fund Phase I Auction Updated Data For Auction 901

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-29

    ... Public Notice, 77 FR 32092, May 31, 2012, the Bureaus described how they identified census blocks... COMMISSION Mobility Fund Phase I Auction Updated Data For Auction 901 AGENCY: Federal Communications... Competition Bureaus (Bureaus) announce updated data files of census blocks eligible for the Mobility...

  13. Competitive Financing Mechanisms: Auctions Used by Federal Agencies.

    ERIC Educational Resources Information Center

    Joyner, Carlotta C.

    This report reviews auctions used by various federal agencies to examine the feasibility of using similar auctions to determine interest rates for student borrowing through the Federal Family Education Loan Program (FFELP) and the William D. Ford Federal Direct Loan Program. The review identified 31 different auctions, divided into two major…

  14. 41 CFR 102-38.95 - What is an auction?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false What is an auction? 102... Sales Process Competitive Sales § 102-38.95 What is an auction? An auction is a sale where the bid... sale. Normally, the bidder with the highest bid at the close of each bidding process is awarded...

  15. 41 CFR 102-38.95 - What is an auction?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false What is an auction? 102... Sales Process Competitive Sales § 102-38.95 What is an auction? An auction is a sale where the bid... sale. Normally, the bidder with the highest bid at the close of each bidding process is awarded...

  16. 41 CFR 102-38.95 - What is an auction?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false What is an auction? 102... Sales Process Competitive Sales § 102-38.95 What is an auction? An auction is a sale where the bid... sale. Normally, the bidder with the highest bid at the close of each bidding process is awarded...

  17. 41 CFR 102-38.95 - What is an auction?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false What is an auction? 102... Sales Process Competitive Sales § 102-38.95 What is an auction? An auction is a sale where the bid... sale. Normally, the bidder with the highest bid at the close of each bidding process is awarded...

  18. Bidding Agents That Perpetrate Auction Fraud

    NASA Astrophysics Data System (ADS)

    Trevathan, Jarrod; McCabe, Alan; Read, Wayne

    This paper presents a software bidding agent that inserts fake bids on the seller's behalf to inflate an auction's price. This behaviour is referred to as shill bidding. Shill bidding is strictly prohibited by online auctioneers, as it defrauds unsuspecting buyers by forcing them to pay more for the item. The malicious bidding agent was constructed to aid in developing shill detection techniques. We have previously documented a simple shill bidding agent that incrementally increases the auction price until it reaches the desired profit target, or it becomes too risky to continue bidding. This paper presents an adaptive shill bidding agent which when used over a series of auctions with substitutable items, can revise its strategy based on bidding behaviour in past auctions. The adaptive agent applies a novel prediction technique referred to as the Extremum Consistency (EC) algorithm, to determine the optimal price to aspire for. The EC algorithm has successfully been used in handwritten signature verification for determining the maximum and minimum values in an input stream. The agent's ability to inflate the price has been tested in a simulated marketplace and experimental results are presented.

  19. 77 FR 57085 - Mobility Fund Phase I Auction; Release of Files with Recalculated Road Miles for Auction 901...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    .../ecfs/ . 1. In the Auction 901 Procedures Public Notice, 77 FR 32092, May 31, 2012, the Bureaus... Notice, 77 FR 7152, February 10, 2012, in calculating the number of road miles associated with each... COMMISSION Mobility Fund Phase I Auction; Release of Files with Recalculated Road Miles for Auction 901;...

  20. China’s Land Market Auctions: Evidence of Corruption?

    PubMed Central

    Cai, Hongbin; Henderson, J. Vernon; Zhang, Qinghua

    2013-01-01

    This paper studies the urban land market in China in 2003—2007. In China, all urban land is owned by the state. Leasehold use rights for land for (re)development are sold by city governments and are a key source of city revenue. Leasehold sales are viewed as a major venue for corruption, prompting a number of reforms over the years. Reforms now require all leasehold rights be sold at public auction. There are two main types of auction: regular English auction and an unusual type which we call a “two stage auction”. The latter type of auction seems more subject to corruption, and to side deals between potential bidders and the auctioneer. Absent corruption, theory suggests that two stage auctions would most likely maximize sales revenue for properties which are likely to have relatively few bidders, or are “cold”, which would suggest negative selection on property unobservables into such auctions. However, if such auctions are more corruptible, that could involve positive selection as city officials divert hotter properties to a more corruptible auction form. The paper finds that, overall, sales prices are lower for two stage auctions, and there is strong evidence of positive selection. The price difference is explained primarily by the fact that two stage auctions typically have just one bidder, or no competition despite the vibrant land market in Chinese cities. PMID:25506125

  1. 47 CFR 1.2208 - Public notice of auction completion and auction results.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... PROCEDURE Grants by Random Selection Competitive Bidding Proceedings Broadcast Television Spectrum Reverse... broadcast television spectrum incentive auction conducted under section 6403 of the Spectrum Act, public... indicate that the reassignments of television channels and reallocations of broadcast television...

  2. 43 CFR 2546.4 - Public auctions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 43 Public Lands: Interior 2 2013-10-01 2013-10-01 false Public auctions. 2546.4 Section 2546.4 Public Lands: Interior Regulations Relating to Public Lands (Continued) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR LAND RESOURCE MANAGEMENT (2000) COLOR-OF-TITLE AND OMITTED LANDS Snake...

  3. 43 CFR 2546.4 - Public auctions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 43 Public Lands: Interior 2 2012-10-01 2012-10-01 false Public auctions. 2546.4 Section 2546.4 Public Lands: Interior Regulations Relating to Public Lands (Continued) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR LAND RESOURCE MANAGEMENT (2000) COLOR-OF-TITLE AND OMITTED LANDS Snake...

  4. 43 CFR 2546.4 - Public auctions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 43 Public Lands: Interior 2 2011-10-01 2011-10-01 false Public auctions. 2546.4 Section 2546.4 Public Lands: Interior Regulations Relating to Public Lands (Continued) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR LAND RESOURCE MANAGEMENT (2000) COLOR-OF-TITLE AND OMITTED LANDS Snake...

  5. 43 CFR 2546.4 - Public auctions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 43 Public Lands: Interior 2 2014-10-01 2014-10-01 false Public auctions. 2546.4 Section 2546.4 Public Lands: Interior Regulations Relating to Public Lands (Continued) BUREAU OF LAND MANAGEMENT, DEPARTMENT OF THE INTERIOR LAND RESOURCE MANAGEMENT (2000) COLOR-OF-TITLE AND OMITTED LANDS Snake...

  6. Books at Auction: The Art of Deaccessioning.

    ERIC Educational Resources Information Center

    Model, Peter

    1981-01-01

    Lack of space and budget cuts force many libraries to weed out books and to be selective in accepting collection bequests. The approach for deciding which books to weed out and whether to dispose of these books through dealers or auctions are decisions private clubs and many libraries must make. (RBF)

  7. 7 CFR 46.25 - Auction sales.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... companies which publish catalogs of offerings will be responsible for furnishing the auction company for... for sale by an owner, his name shall be shown in the catalog listing as owner. When a joint account... catalog a shipment without disclosing true ownership, if known, or the name of an agent's principal,...

  8. 7 CFR 46.25 - Auction sales.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... companies which publish catalogs of offerings will be responsible for furnishing the auction company for... for sale by an owner, his name shall be shown in the catalog listing as owner. When a joint account... catalog a shipment without disclosing true ownership, if known, or the name of an agent's principal,...

  9. 7 CFR 46.25 - Auction sales.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... companies which publish catalogs of offerings will be responsible for furnishing the auction company for... for sale by an owner, his name shall be shown in the catalog listing as owner. When a joint account... catalog a shipment without disclosing true ownership, if known, or the name of an agent's principal,...

  10. Lessons from the Electricity Auctions in Brazil

    SciTech Connect

    Dutra, Joisa; Menezes, Flavio

    2005-12-01

    The first lesson to emerge from the recent auctions falls within a category that might be described as 'higher costs of reforms in developing economies.' These range from bidders' fears of future government-imposed price caps to technical issues, such as the potential loss of efficiency resulting from bidders' lack of knowledge about ceiling prices, reference supply, and the demand reduction mechanism.

  11. Experiments in Deaccessioning: Archives and Online Auctions.

    ERIC Educational Resources Information Center

    Doylen, Michael

    2001-01-01

    Discussion of the need for archives to remove duplicate or unneeded materials from their collection focuses on the legal and ethical issues raised for archives by the use of online auction venues in deaccessioning unwanted materials, based on experiences at the University of Wisconsin. (Author/LRW)

  12. Auction-based bandwidth allocation in the Internet

    NASA Astrophysics Data System (ADS)

    Wei, Jiaolong; Zhang, Chi

    2002-07-01

    It has been widely accepted that auctioning which is the pricing approach with minimal information requirement is a proper tool to manage scare network resources. Previous works focus on Vickrey auction which is incentive compatible in classic auction theory. In the beginning of this paper, the faults of the most representative auction-based mechanisms are discussed. And then a new method called uniform-price auction (UPA), which has the simplest auction rule is proposed and it's incentive compatibility in the network environment is also proved. Finally, the basic mode is extended to support applications which require minimum bandwidth guarantees for a given time period by introducing derivative market, and a market mechanism for network resource allocation which is predictable, riskless, and simple for end-users is completed.

  13. The role of the EPA auctions in the SO{sub 2} allowance market: What the first two auctions revealed

    SciTech Connect

    Critchfield, L.R.

    1995-12-31

    Title IV of the Clean Air Act Amendments of 1990 created a market-based trading program to reduce sulfur dioxide emissions from electric power plants. In order to stimulate and support this new market, the Act provided for the annual auction of a small portion of the total emission allowances allocated to utilities each year. This paper discusses how the first EPA auctions in 1993 played a large role in creating market value for allowances while the second more accurately reflected market demand. Also addressed is how the market has responded to the design of the auctions and the government rules associated with these auctions. In addition, the paper mentions the role of the Chicago Board of Trade in administering and establishing a market for the EPA auctions and what the future of the EPA auctions may be.

  14. Auction design and the market for sulfur dioxide emissions

    SciTech Connect

    Joskow, P.L.; Schmalensee, R.; Bailey, E.M.

    1997-12-31

    Title IV of the Clean Air Act Amendments of 1990 created a market for electric utility emissions of sulfur dioxide (SO{sub 2}). Recent papers have argued that flaws in the design of the auctions that are part of this market have adversely affected its performance. These papers incorrectly assume that trade can only occur at auctions, however. Our empirical analysis of the SO{sub 2} emissions market shows that the auctions have become a small part of a relatively efficient market and that the auction design problems that have attracted the most attention have had no effect on actual market prices.

  15. Auctions vs negotiations: a study of price differentials.

    PubMed

    Kjerstad, Egil

    2005-12-01

    Recent contributions in auction and bargaining theory suggest that a procurer should place more faith in the power of competition among alternative suppliers than in his or her own negotiating skill. Based on data from 216 contracts between procurers and suppliers of medical and surgical articles, we test whether auctions and bargaining result in significantly different prices. The main results are that auctions give 'thicker' markets compared with negotiations, as expected, but that auctions do not result in significantly lower prices compared with negotiations. PMID:15945037

  16. Security risk assessment of the primary layer of wavelength division multiplexing passive optical network

    NASA Astrophysics Data System (ADS)

    Koudelka, Petr; Siska, Petr; Latal, Jan; Poboril, Radek; Hajek, Lukas; Kepak, Stanislav; Vasinek, Vladimir

    2015-01-01

    Next-generation passive optical access networks come to the fore nowadays. These optical next-generation networks are the response to the increasing qualitative requirements from end users. Technologies using Time Division Multiplexing include NG-PON (XG-PON 1 and XG-PON 2) and 10GEPON. Their advantage is the applicability to older topologies, which are operated by the original technology of passive optical access networks. Wavelength Division Multiplexing Passive Optical Network (WDM-PON) is an alternative also belonging to next-generation networks. Time Division Multiplexing is in this case replaced by Wavelength Division Multiplexing. Certain variants of WDM-PON use a combination of broadband light source, optical circulator, optical phased array and tunable FP laser. Construction of the terminal units (ONU) is advantageous because it can always tune in to the appropriate wavelength in the given optical DWDM channel (100 GHz). The disadvantage is the increased security risk on the primary layer due to channel crosstalk in an optical phased array (AWG). The aim of this paper is to assess the degree of security risk in real conditions. The article includes both simulation and real measurements in C + L bands with 100 GHz DWDM spacing.

  17. Health Auctions: a Valuation Experiment (HAVE) study protocol

    PubMed Central

    Kularatna, Sanjeewa; Petrie, Dennis; Scuffham, Paul A; Byrnes, Joshua

    2016-01-01

    Introduction Quality-adjusted life years are derived using health state utility weights which adjust for the relative value of living in each health state compared with living in perfect health. Various techniques are used to estimate health state utility weights including time-trade-off and standard gamble. These methods have exhibited limitations in terms of complexity, validity and reliability. A new composite approach using experimental auctions to value health states is introduced in this protocol. Methods and analysis A pilot study will test the feasibility and validity of using experimental auctions to value health states in monetary terms. A convenient sample (n=150) from a population of university staff and students will be invited to participate in 30 auction sets with a group of 5 people in each set. The 9 health states auctioned in each auction set will come from the commonly used EQ-5D-3L instrument. At most participants purchase 2 health states, and the participant who acquires the 2 ‘best’ health states on average will keep the amount of money they do not spend in acquiring those health states. The value (highest bid and average bid) of each of the 24 health states will be compared across auctions to test for reliability across auction groups and across auctioneers. A test retest will be conducted for 10% of the sample to assess reliability of responses for health states auctions. Feasibility of conducting experimental auctions to value health states will also be examined. The validity of estimated health states values will be compared with published utility estimates from other methods. This pilot study will explore the feasibility, reliability and validity in using experimental auction for valuing health states. Ethics and dissemination Ethical clearance was obtained from Griffith University ethics committee. The results will be disseminated in peer-reviewed journals and major international conferences. PMID:27056589

  18. A Classroom Auction with Externalities: Applied to Mergers and Acquisitions

    ERIC Educational Resources Information Center

    Meister, J. Patrick; Anderson, Kyle J.

    2007-01-01

    The authors describe an in-class exercise in which students participate in an auction to buy US Airways. The exercise is based on events of late 1995, in which neither United nor American Airlines decided to bid for US Airways. Two teams of students participate in an English auction. Students learn that the equilibrium of the sequential game is…

  19. A Trustworthy Internet Auction Model with Verifiable Fairness.

    ERIC Educational Resources Information Center

    Liao, Gen-Yih; Hwang, Jing-Jang

    2001-01-01

    Describes an Internet auction model achieving verifiable fairness, a requirement aimed at enhancing the trust of bidders in auctioneers. Analysis results demonstrate that the proposed model satisfies various requirements regarding fairness and privacy. Moreover, in the proposed model, the losing bids remain sealed. (Author/AEF)

  20. A Combinatorial Auction among Versatile Experts and Amateurs

    NASA Astrophysics Data System (ADS)

    Ito, Takayuki; Yokoo, Makoto; Matsubara, Shigeo

    Auctions have become an integral part of electronic commerce and a promising field for applying multi-agent technologies. Correctly judging the quality of auctioned goods is often difficult for amateurs, in particular, in Internet auctions. However, experts can correctly judge the quality of goods. In this situation, it is difficult to make experts tell the truth and attain an efficient allocation, since experts have a clear advantage over amateurs and they would not reveal their valuable information without some reward. In our previous work, we have succeeded in developing such auction protocols under the following two cases: (1) the case of a single-unit auction among experts and amateurs, and (2) the case of a combinatorial auction among single-skilled experts and amateurs. In this paper, we focus on versatile experts. Versatile experts have an interest in, and expert knowledge on the qualities of several goods. In the case of versatile experts, there would be several problems, e.g., free riding problems, if we simply extended the previous VCG-style auction protocol. Thus, in this paper, we employ PORF (price-oriented, rationing-free) protocol for designing our new protocol to realize a strategy-proof auction protocol for experts. In the protocol, the dominant strategy for experts is truth-telling. Also, for amateurs, truth-telling is the best response when two or more experts select the dominant strategy. Furthermore, the protocol is false-name-proof.

  1. 75 FR 8070 - Closed Auction of Broadcast Construction Permits Scheduled for July 20, 2010; Auction 88...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-23

    ... announces the auction of certain broadcast FM, AM, and FM Translator construction permits scheduled to... certain broadcast FM, AM, and FM Translator construction permits and sought comment on the procedures to... resolve mutual exclusivity between applications for new AM stations on 640 kHz and 1230 kHz in the...

  2. Detecting Fraud in Internet Auction Systems

    NASA Astrophysics Data System (ADS)

    Peng, Yanlin; Zhang, Linfeng; Guan, Yong

    Fraud compromises the thriving Internet auction market. Studies have shown that fraudsters often manipulate their reputations through sophisticated collusions with accomplices, enabling them to defeat the reputation-based feedback systems that are used to combat fraud. This paper presents an algorithm that can identify colluding fraudsters in real time. Experiments with eBay transaction data show that the algorithm has low false negative and false positive rates. Furthermore, the algorithm can identify fraudsters who are innocent at the time of the data collection, but engage in fraudulent transactions soon after they accumulate good feedback ratings.

  3. Rationality, irrationality and escalating behavior in lowest unique bid auctions.

    PubMed

    Radicchi, Filippo; Baronchelli, Andrea; Amaral, Luís A N

    2012-01-01

    Information technology has revolutionized the traditional structure of markets. The removal of geographical and time constraints has fostered the growth of online auction markets, which now include millions of economic agents worldwide and annual transaction volumes in the billions of dollars. Here, we analyze bid histories of a little studied type of online auctions--lowest unique bid auctions. Similarly to what has been reported for foraging animals searching for scarce food, we find that agents adopt Lévy flight search strategies in their exploration of "bid space". The Lévy regime, which is characterized by a power-law decaying probability distribution of step lengths, holds over nearly three orders of magnitude. We develop a quantitative model for lowest unique bid online auctions that reveals that agents use nearly optimal bidding strategies. However, agents participating in these auctions do not optimize their financial gain. Indeed, as long as there are many auction participants, a rational profit optimizing agent would choose not to participate in these auction markets.

  4. Auction Mechanism to Allocate Air Traffic Control Slots

    NASA Technical Reports Server (NTRS)

    Raffarin, Marianne

    2003-01-01

    This article deals with an auction mechanism for airspace slots, as a means of solving the European airspace congestion problem. A disequilibrium, between Air Traffic Control (ATC) services supply and ATC services demand are at the origin of almost one fourth of delays in the air transport industry in Europe. In order to tackle this congestion problem, we suggest modifying both pricing and allocation of ATC services, by setting up an auction mechanism. Objects of the auction will be the right for airlines to cross a part of the airspace, and then to benefit from ATC services over a period corresponding to the necessary time for the crossing. Allocation and payment rules have to be defined according to the objectives of this auction. The auctioneer is the public authority in charge of ATC services, whose aim is to obtain an efficient allocation. Therefore, the social value will be maximized. Another objective is to internalize congestion costs. To that end, we apply the principle of Clarke-Groves mechanism auction: each winner has to pay the externalities imposed on other bidders. The complex context of ATC leads to a specific design for this auction.

  5. Smarter than Others? Conjectures in Lowest Unique Bid Auctions

    PubMed Central

    Hu, Rui; Chen, Qinghua

    2015-01-01

    Research concerning various types of auctions, such as English auctions, Dutch auctions, highest-price sealed-bid auctions, and second-price sealed-bid auctions, is always a topic of considerable interest in interdisciplinary fields. The type of auction, known as a lowest unique bid auction (LUBA), has also attracted significant attention. Various models have been proposed, but they often fail to explain satisfactorily the real bid-distribution characteristics. This paper discusses LUBA bid-distribution characteristics, including the inverted-J shape and the exponential decrease in the upper region. The authors note that this type of distribution, which initially increases and later decreases, cannot be derived from the symmetric Nash equilibrium framework based on perfect information that has previously been used. A novel optimization model based on non-perfect information is presented. The kernel of this model is the premise that agents make decisions to achieve maximum profit based on imaginary information or assumptions regarding the behavior of others. PMID:25849631

  6. Statistical theory of the continuous double auction

    NASA Astrophysics Data System (ADS)

    Smith, Eric; Doyne Farmer, J.; Gillemot, László; Krishnamurthy, Supriya

    2003-12-01

    Most modern financial markets use a continuous double auction mechanism to store and match orders and facilitate trading. In this paper we develop a microscopic dynamical statistical model for the continuous double auction under the assumption of IID random order flow, and analyse it using simulation, dimensional analysis, and theoretical tools based on mean field approximations. The model makes testable predictions for basic properties of markets, such as price volatility, the depth of stored supply and demand versus price, the bid-ask spread, the price impact function, and the time and probability of filling orders. These predictions are based on properties of order flow and the limit order book, such as share volume of market and limit orders, cancellations, typical order size, and tick size. Because these quantities can all be measured directly there are no free parameters. We show that the order size, which can be cast as a non-dimensional granularity parameter, is in most cases a more significant determinant of market behaviour than tick size. We also provide an explanation for the observed highly concave nature of the price impact function. On a broader level, this work suggests how stochastic models based on zero intelligence agents may be useful to probe the structure of market institutions. Like the model of perfect rationality, a stochastic zero intelligence model can be used to make strong predictions based on a compact set of assumptions, even if these assumptions are not fully believable.

  7. The communications spectrum: Frequency allocations and auctions

    NASA Astrophysics Data System (ADS)

    Pritchard, Wilbur

    1997-01-01

    Demands on the communications spectrum have increased sharply because of the growth in radio communication services, the large bandwidths now required, and the rapid increases in world population. The problem will be exacerbated by the requirements of high definition television and the enormous amounts of information that will be transmitted by radio. The electromagnetic spectrum is a finite natural resource of great value used for emergency communications and military operations as well as for commercial purposes. Both government and the marketplace have proper roles in the allocation of its resources. There are no viable alternatives to international organizations such as the International Telecommunication Union or to agencies such as the Federal Communications Commission for the regulation of radio communication and the assignment of spectrum to essential public services. Although government auctions of spectrum are justifiable where there is no way to distinguish among commercial entities seeking to use the same bands for similar services, the practice is inherently inequitable and discourages development of new uses for the spectrum by removing investment protection. Recommended alternatives to auctions are: (1) lotteries, which keep assets and proceeds in the economy; and (2) ongoing charges for current as well as new users of the spectrum.

  8. Truthful Auction for CPU Time Slots

    NASA Astrophysics Data System (ADS)

    Zhang, Qiang; Li, Minming

    We consider the task of designing a truthful auction mechanism for CPU time scheduling problem. There are m commodities (time slots) T = {t 1, t 2, ...,t m } for n buyers I = {1,2,...,n}. Each buyer requires a number of time slots s i for its task. The valuation function of buyer i for a bundle of time slots T i is v i (T i ) = w i (m - t), where t is the last time slot in T i and |T i | = s i . The utility u i of buyer i is v i (T i ) - p(T i ). It is well-known that Vickrey-Clarke-Groves (VCG) mechanism gives the incentive to bid truthfully. Although optimal social welfare is computationally feasible in CPU time scheduling problem, VCG mechanism may produce low revenue. We design an auction which also maintains the incentives for bidders to bid truthfully. In addition, we perform simulations and observe that our truthful mechanism produces more revenue than VCG on average.

  9. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  10. 31 CFR 363.202 - What marketable Treasury securities may I purchase and hold through my TreasuryDirect ® account?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... security that is available for purchase through the TreasuryDirect ® website. One day each week, marketable securities that are scheduled for auction within 8 weeks will be made available on the TreasuryDirect...

  11. 31 CFR 363.202 - What marketable Treasury securities may I purchase and hold through my TreasuryDirect ® account?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... security that is available for purchase through the TreasuryDirect ® website. One day each week, marketable securities that are scheduled for auction within 8 weeks will be made available on the TreasuryDirect...

  12. 78 FR 68839 - Tribal Mobility Fund Phase I Auction Rescheduled for February 25, 2014; Notice of Changes to...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-15

    ... requirements as set out in the Auction 902 Procedures Public Notice, 78 FR 56875, September 16, 2013, remain... to Auction 902: (1) A revised auction tutorial incorporating the revised dates and deadlines will...

  13. A Research Study on Secure Attachment Using the Primary Caregiving Approach

    ERIC Educational Resources Information Center

    Ebbeck, Marjory; Phoon, Dora Mei Yong; Tan-Chong, Elizabeth Chai Kim; Tan, Marilyn Ai Bee; Goh, Mandy Lian Mui

    2015-01-01

    A child's positive sense of well-being is central to their overall growth and development. With an increasing number of mothers in the workforce, many infants and toddlers spend much time in child care services. Hence it is crucial that caregivers provide a secure base for the child to develop secure attachment with educarers. Given multiple…

  14. A Study of Central Auction Based Wholesale Electricity Markets

    NASA Astrophysics Data System (ADS)

    Ceppi, Sofia; Gatti, Nicola

    The deregulation of electricity markets produced significant economic benefits, reducing prices to customers and opening several opportunities for new actors, e.g., new generators and distributors. A prominent scientific and technological challenge is the automation of such markets. In particular, we focus our attention on wholesale electricity markets based on a central auction. In these markets, generators sell electricity by means of a central auction to a public authority. Instead, the distribution of electricity to customers takes part in retail markets. The main works presented in the literature model wholesale markets as oligopolies, neglecting thus the specific auction mechanism. In this paper, we enrich these models by introducing an auction mechanism shaped on that used in the Italian wholesale electricity market, we solve the winner determination problem, and we preliminarily study the problem of searching for equilibria.

  15. Auction fever: exploring informational social influences on bidder choices.

    PubMed

    Chen, Yi-Fen

    2011-01-01

    Previous investigations of herd behavior have identified the importance of informational social influences in consumer decision making. This research presents three studies examining herd behavior in online auctions. The three studies addressed the influence on bidder online choices of herd cues frequently found in online auctions, including bid number, feedback ratings, and number of questions and answers. This research also investigated the effect of different levels of herd cues on bidder online choices under high and low brand awareness in online auctions. The experimental results demonstrated that bidders use online herd cues when making decisions in online auctions. Additionally, different levels of herd cues influence bidder online choices in both high and low brand awareness product situations.

  16. Auction fever: exploring informational social influences on bidder choices.

    PubMed

    Chen, Yi-Fen

    2011-01-01

    Previous investigations of herd behavior have identified the importance of informational social influences in consumer decision making. This research presents three studies examining herd behavior in online auctions. The three studies addressed the influence on bidder online choices of herd cues frequently found in online auctions, including bid number, feedback ratings, and number of questions and answers. This research also investigated the effect of different levels of herd cues on bidder online choices under high and low brand awareness in online auctions. The experimental results demonstrated that bidders use online herd cues when making decisions in online auctions. Additionally, different levels of herd cues influence bidder online choices in both high and low brand awareness product situations. PMID:21192763

  17. 6. East rear, cattle auction arena below in background, Omaha ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    6. East rear, cattle auction arena below in background, Omaha livestock market offices above. View to west. - South Omaha Union Stock Yards, Stock Yards Autopark, 2900 "O" Plaza, Omaha, Douglas County, NE

  18. Document of the Month: Photograph of a Land Auction.

    ERIC Educational Resources Information Center

    Alexander, Mary

    1979-01-01

    Photograph of a land auction in Imperial, California, 1904, accompanied by a history of the federal government's policy on the distribution and development of publicly owned land. Suggestions for using the photograph as historical evidence are included. (KC)

  19. Y-12 Groundwater Protection Program Extent Of The Primary Groundwater Contaminants At The Y-12 National Security Complex

    SciTech Connect

    2013-12-01

    This report presents data summary tables and maps used to define and illustrate the approximate lateral extent of groundwater contamination at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee. The data tables and maps address the primary (i.e., most widespread and mobile) organic, inorganic, and radiological contaminants in the groundwater. The sampling locations, calculated contaminant concentrations, plume boundary values, and paired map format used to define, quantify, delineate, and illustrate the approximate extent of the primary organic, inorganic, and radiological contaminants in groundwater at Y-12 are described.

  20. Statistical mechanics of budget-constrained auctions

    NASA Astrophysics Data System (ADS)

    Altarelli, F.; Braunstein, A.; Realpe-Gomez, J.; Zecchina, R.

    2009-07-01

    Finding the optimal assignment in budget-constrained auctions is a combinatorial optimization problem with many important applications, a notable example being in the sale of advertisement space by search engines (in this context the problem is often referred to as the off-line AdWords problem). On the basis of the cavity method of statistical mechanics, we introduce a message-passing algorithm that is capable of solving efficiently random instances of the problem extracted from a natural distribution, and we derive from its properties the phase diagram of the problem. As the control parameter (average value of the budgets) is varied, we find two phase transitions delimiting a region in which long-range correlations arise.

  1. 75 FR 4891 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-29

    ... Securities Exchange Act Release No. 55575 (April 3, 2007), 72 FR 17963 (April 10, 2007) (SR-ISE-2006-59... to Exchange rules, FXCMM trading licenses are sold pursuant to a ``Dutch'' auction.\\6\\ FXCMMs are...

  2. [Primary health care in Ecuador: services provided by the Ministry of Health and Rural Social security Services].

    PubMed

    Robertson, R L; Castro, C E; Gómez, L C; Gwynne, G; Tinajero Baca, C L; Zschock, D K

    1991-10-01

    The present study will examine three common premises in the field of international public health: that the primary care services offered by agencies of the Ministries of Health (MH) are less costly than those offered by Social Security institutions, that the former services are inferior to the latter, and that funds are distributed more equitably by the MH centers among their various recipient populations. The 1986 study compared the costs, quality, and equity of the services in 15 primary care centers in Ecuador--eight Ministry of Health centers and seven rural Social Security (RSS) centers--examining budgetary data from 1985 and obtaining information through a questionnaire and interviews with the personnel at those centers. Average costs were calculated by standardized accounting techniques, and it was confirmed that for several important services, especially medical consultations, these costs were much lower in the Ministry centers than in the Social Security centers. However, no differences in the cost of dental care were detected. The evaluation of quality, based on an analysis of the production structure and process, did not yield uniform results. On the one hand, the distribution of personnel and the allocation of funds for drugs and other supplies indicated that the RSS agencies provided better quality services. On the other hand, a questionnaire revealed that the MH health workers' knowledge of various principles of primary care was superior to that of the RSS workers. Upon comparing the per capita budget of the two types of entities, it was confirmed that the Ministry of Health had more equitable per capita coverage than rural Social Security. The implications of these findings for Ecuador and other developing countries are discussed and several recommendations made.

  3. The association of family food security and depression in mothers having primary school children in Ray-Iran

    PubMed Central

    2014-01-01

    Background As a major public health problem, food insecurity has adverse social and psychological effects, in addition to the impact on public health. This study aimed to determine the association of household food security and depression in mothers with primary school children in Ray County. Methods This descriptive, analytical cross-sectional study was conducted on 430 mothers with primary school children in the spring 2010. During a two-stage cluster sampling, an 18-items food security questionnaire (USDA) and the Beck depression inventory were completed via interviewing mothers. Chi-squared test, one-way analysis of variance, simple regression and stepwise multiple regression were used to describe and analyze data, and to identify related factors using SPSS-16 software. Results The prevalence of food insecurity and depression in mothers were 50.2% and 51.4% respectively. Also 34.6% of mothers in the "food secure" group were depressed and 77.8% in "food insecure with hunger" group were depressed and this difference was statistically significant. Twelve out of the 20 examined variables (age, family size, number of children, economic status, home ownership, employment households, educational level of the mother and also the head of household, height, energy intake, and carbohydrate and protein intakes) were significantly associated with food security and depression. Food insecurity and depression in mothers with primary school children in Ray County showed a significant positive correlation (P < 0.001). Conclusion The prevalence of household food insecurity and depression in the studied population were high. Since there is a significant relationship between food insecurity and depression, more attention must be paid to this group. PMID:24940566

  4. 31 CFR 356.23 - How are the auction results announced?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... conclusion of the auction, we will announce the auction results through a press release that is available on our Web site at http://www.treasurydirect.gov. (b) The press release will include such information...

  5. 31 CFR 356.23 - How are the auction results announced?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... conclusion of the auction, we will announce the auction results through a press release that is available on our Web site at http://www.treasurydirect.gov. (b) The press release will include such information...

  6. 31 CFR 356.23 - How are the auction results announced?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...) After the conclusion of the auction, we will announce the auction results through a press release that is available on our Web site at http://www.treasurydirect.gov. (b) The press release will...

  7. 31 CFR 356.23 - How are the auction results announced?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... conclusion of the auction, we will announce the auction results through a press release that is available on our Web site at http://www.treasurydirect.gov. (b) The press release will include such information...

  8. 31 CFR 356.23 - How are the auction results announced?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... conclusion of the auction, we will announce the auction results through a press release that is available on our Web site at http://www.treasurydirect.gov. (b) The press release will include such information...

  9. 75 FR 57947 - Auction of VHF Commercial Television Station Construction Permits Scheduled for February 15, 2011...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-23

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Auction of VHF Commercial Television Station Construction Permits Scheduled for February 15, 2011; Comment Sought on Competitive Bidding Procedures for Auction 90 AGENCY: Federal Communications...

  10. Competition in decentralized electricity markets: Three papers on electricity auctions

    NASA Astrophysics Data System (ADS)

    Harbord, David William Cameron

    This thesis consists of three self-contained papers on the analysis of electricity auctions written over a period of twelve years. The first paper models price competition in a decentralized wholesale market for electricity as a first-price, sealed-bid, multi-unit auction. In both the pure and mixed-strategy equilibria of the model, above marginal cost pricing and inefficient despatch of generating units occur. An alternative regulatory pricing rule is considered and it is shown that offering to supply at marginal cost can be induced as a dominant strategy for all firms. The second paper analyses strategic interaction between long-term contracts and price competition in the British electricity wholesale market, and confirms that forward contracts will tend to put downward pressure on spot market prices. A 'strategic commitment' motive for selling forward contracts is also identified: a generator may commit itself to bidding lower prices into the spot market in order to ensure that it will be despatched with its full capacity. The third paper characterizes bidding behavior and market outcomes in uniform and discriminatory electricity auctions. Uniform auctions result in higher average prices than discriminatory auctions, but the ranking in terms of productive efficiency is ambiguous. The comparative effects of other market design features, such as the number of steps in suppliers' bid functions, the duration of bids and the elasticity of demand are analyzed. The paper also clarifies some methodological issues in the analysis of electricity auctions. In particular we show that analogies with continuous share auctions are misplaced so long as firms are restricted to a finite number of bids.

  11. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks

    PubMed Central

    Li, Zhen; Jing, Tao; Ma, Liran; Huo, Yan; Qian, Jin

    2016-01-01

    The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. Yet, the use of a large number of IoT devices can severely worsen the spectrum scarcity problem. The usable spectrum resources are almost entirely occupied, and thus, the increasing demands of radio access from IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as cellular telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric and asymmetric ciphers) may not be suitable for CIoT networks since these networks are composed of low-profile devices. In this paper, we address the security issues in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative in nature, we propose to employ cooperative jamming to achieve secure transmission. In our proposed cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the Signal to Interference plus Noise Ratio (SINR) at the eavesdropper subject to the Quality of Service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper (ECSI). By using Semi-Definite Programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative

  12. Auctionable fixed transmission rights for congestion management

    NASA Astrophysics Data System (ADS)

    Alomoush, Muwaffaq Irsheid

    the transaction by the ISO, take a decision to expand the existing system, or retain the original structure of the system. Also, the thesis investigates the impact of wheeling transactions on congestion management, where we present a generalized mathematical model for the Fixed Transmission Right (FTR) auction. The auction guarantees FTR availability to all participants on a non-discriminatory basis, in which system users are permitted to buy, sell and trade FTRs through an auction. When FTRs are utilized with LMPs, they increase the efficient use of the transmission system and let a transmission customer gain advantageous features such as acquiring a mechanism to offset the extra cost due to congestion charges, providing financial and operational certainty and making system users pay for the actual use of the congested paths. The thesis also highlighted FTR trading in secondary markets to self-arrange access across different paths, create long-term transmission rights and provide more commercial certainty.

  13. 49 CFR 580.9 - Odometer record retention for auction companies.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... HIGHWAY TRAFFIC SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) ODOMETER DISCLOSURE REQUIREMENTS § 580.9 Odometer record retention for auction companies. Each auction company shall establish and... following records: (a) The name of the most recent owner (other than the auction company); (b) The name...

  14. Using Laboratory Experiments for Policymaking: An Example from the Georgia Irrigation Reduction Auction

    ERIC Educational Resources Information Center

    Cummings, Ronald G.; Holt, Charles A.; Laury, Susan K.

    2004-01-01

    In recent years, interest has been growing in policy applications of different auction systems. This paper reports a series of experiments that were used to design and implement an auction in a unique policymaking environment. In April 2000, the Georgia legislature passed a law that mandated that the state hold an auction in drought years to pay…

  15. 75 FR 21627 - Auction of Lower and Upper Paging Bands Licenses Rescheduled for June 15, 2010; Status of Short...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-26

    ... and upper paging bands spectrum. This auction, which is designated as Auction 87, was initially... COMMISSION Auction of Lower and Upper Paging Bands Licenses Rescheduled for June 15, 2010; Status of Short...,603 licenses for lower and upper paging bands designated Auction 87. DATES: Upfront payments are...

  16. Essays on applied auction problems in electric generation and in neighboring jurisdictions

    SciTech Connect

    Eastman-Perl, K.A.

    1993-01-01

    This work consists of three essays. The first essay, [open quotes]Contract Selection and Performance in Competitive Bidding for Electric Generation,[close quotes], studies the new practice of competitive bidding among third parties to supply utilities with electric generating capacity. The other two essays, entitled [open quotes]First Price Auctions in Neighboring Jurisdictions,[close quotes] and [open quotes]Second Price Auctions in Neighboring Jurisdictions,[close quotes] study the general problem of auctions when there are several auctioneers that can observe each other and can use information from these observations strategically. The first essay notes that competitive bidding programs for electric generation are really auctions of long-term contracts between utility and third parties. Bids and contracts from Maine were studied. Since Maine has a wealth of alternative fuels, such as wood and hydroelectric, the applicability of this study is limited to states with significant alternative fuel resources. The second and third essays consider auctions in neighboring jurisdictions. One concerns first-price auctions (low bid, wins, and is paid its bid), and the other concerns second-price auctions (low bid wins, and is paid the second lowest bid). One town initially holds an auction, the results of which are public information. Another town can use this public information to negotiate with the winner of the initial auction. Firms always bid higher in an initial first-price auction than they would if a neighboring town were not present. In equilibrium, firms are no worse off than they would be if both towns acted independently, and the negotiating town benefits at the expense of the town initially auctioning. In second-price auctions, the incentive compatibility property is preserved if relatively lower cost firms bid in the initial auction. The town initially conducting the auction is unaffected, and the negotiating town benefits at the firm's expense.

  17. Essays on empirical analysis of multi-unit auctions: Impacts of financial transmission rights on the restructured electricity industry

    NASA Astrophysics Data System (ADS)

    Zang, Hailing

    This dissertation uses recently developed empirical methodologies for the study of multi-unit auctions to test the impacts of Financial Transmission Rights (FTRs) on the competitiveness of restructured electricity markets. FTRs are a special type of financial option that hedge against volatility in the cost of transporting electricity over the grid. Policy makers seek to use the prices of FTRs as market signals to incentivize efficient investment and utilization of transmission capacity. However, prices will not send the correct signals if market participants strategically use FTRs. This dissertation uses data from the Texas electricity market to test whether the prices of FTRs are efficient to achieve such goals. The auctions studied are multi-unit, uniform-price, sealed-bid auctions. The first part of the dissertation studies the auctions on the spot market of the wholesale electricity industry. I derive structural empirical models to test theoretical predictions as to whether bidders fully internalize the effect of FTRs on profits into their bidding decisions. I find that bidders are learning as to how to optimally bid above marginal cost for their inframarginal capacities. The bidders also learn to bid to include FTRs into their profit maximization problem during the course of the first year. But starting from the second year, they deviated from optimal bidding that includes FTRs in the profit maximization problems. Counterfactual analysis show that the primary effect of FTRs on market outcomes is changing the level of prices rather than production efficiency. Finally, I find that in most months, the current allocations of FTRs are statistically equivalent to the optimal allocations. The second part of the dissertation studies the bidding behavior in the FTR auctions. I find that FTRs' strategic impact on the FTR purchasing behavior is significant for large bidders---firms exercising market power in the FTR auctions. Second, trader forecasts future FTR credit

  18. Multi-unit auctions with budget-constrained bidders

    NASA Astrophysics Data System (ADS)

    Ghosh, Gagan Pratap

    In my dissertation, I investigate the effects of budget-constraints in multi-unit auctions. This is done in three parts. First, I analyze a case where all bidders have a common budget constraint. Precisely, I analyze an auction where two units of an object are sold at two simultaneous, sealed bid, first-price auctions, to bidders who have demand for both units. Bidders differ with respect to their valuations for the units. All bidders have an identical budget constraint which binds their ability to spend in the auction. I show that if valuation distribution is atom-less, then their does not exist any symmetric equilibrium in this auction game. In the second and third parts of my thesis, I analyze the sale of licenses for the right to drill for oil and natural gas in the Outer Continental Shelf (OCS) of the United States. These sales are conducted using simultaneous sealed-bid first-price auctions for multiple licenses, each representing a specific area (called a tract). Using aspects of observed bidding-behavior, I first make a prima facie case that bidders are budget-constrained in these auctions. In order to formalize this argument, I develop a simple extension of the standard model (where bidders differ in their valuations for the objects) by incorporating (random) budgets for the bidders. The auction-game then has a two-dimensional set of types for each player. I study the theoretical properties of this auction, assuming for simplicity that two units are being sold. I show that this game has an equilibrium in pure strategies that is symmetric with respect to the players and with respect to the units. The strategies are essentially pure in the sense that each bidder-type has a unique split (up to a permutation) of his budget between the two auctions. I then characterize the equilibrium in terms of the bid-distribution and iso-bid curves in the value-budget space. I derive various qualitative features of this equilibrium, among which are: (1) under mild

  19. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.

    PubMed

    Li, Zhen; Jing, Tao; Ma, Liran; Huo, Yan; Qian, Jin

    2016-03-07

    The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric cryptography and asymmetric cryptography) may be compromised in CIoT networks, since these types of networks are heterogeneous. In this paper, we address the security issue in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative networks, we propose to employ cooperative jamming to achieve secrecy transmission. In the cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the signal to interference plus noise ratio (SINR) at the eavesdropper subject to the quality of service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the considered minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper. By using semi-definite programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme

  20. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.

    PubMed

    Li, Zhen; Jing, Tao; Ma, Liran; Huo, Yan; Qian, Jin

    2016-01-01

    The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric cryptography and asymmetric cryptography) may be compromised in CIoT networks, since these types of networks are heterogeneous. In this paper, we address the security issue in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative networks, we propose to employ cooperative jamming to achieve secrecy transmission. In the cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the signal to interference plus noise ratio (SINR) at the eavesdropper subject to the quality of service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the considered minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper. By using semi-definite programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme

  1. Spectrum sharing in cognitive radio networks--an auction-based approach.

    PubMed

    Wang, Xinbing; Li, Zheng; Xu, Pengchao; Xu, Youyun; Gao, Xinbo; Chen, Hsiao-Hwa

    2010-06-01

    Cognitive radio is emerging as a promising technique to improve the utilization of the radio frequency spectrum. In this paper, we consider the problem of spectrum sharing among primary (or "licensed") users (PUs) and secondary (or "unlicensed") users (SUs). We formulate the problem based on bandwidth auction, in which each SU makes a bid for the amount of spectrum and each PU may assign the spectrum among the SUs by itself according to the information from the SUs without degrading its own performance. We show that the auction is a noncooperative game and that Nash equilibrium (NE) can be its solution. We first consider a single-PU network to investigate the existence and uniqueness of the NE and further discuss the fairness among the SUs under given conditions. Then, we present a dynamic updating algorithm in which each SU achieves NE in a distributed manner. The stability condition of the dynamic behavior for this spectrum-sharing scheme is studied. The discussion is generalized to the case in which there are multiple PUs in the network, where the properties of the NE are shown under appropriate conditions. Simulations were used to evaluate the system performance and verify the effectiveness of the proposed algorithm.

  2. 29 CFR 780.617 - Adjunct livestock auction operations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Employment in Agriculture and Livestock Auction Operations Under the Section 13(b)(13) Exemption Requirements... referred to in section 13(b)(13) are those engaged in by the farmer “as an adjunct” to the raising of... claim exemption under section 13(b)(13). To qualify under the exemption provision, the...

  3. 29 CFR 780.617 - Adjunct livestock auction operations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Employment in Agriculture and Livestock Auction Operations Under the Section 13(b)(13) Exemption Requirements... referred to in section 13(b)(13) are those engaged in by the farmer “as an adjunct” to the raising of... claim exemption under section 13(b)(13). To qualify under the exemption provision, the...

  4. Understanding Persuasive Online Sales Messages from eBay Auctions

    ERIC Educational Resources Information Center

    White, Barbara Jo; Clapper, Danial; Noel, Rita; Fortier, Jenny; Grabolosa, Pierre

    2007-01-01

    Online auctions are dominated by eBay, which started bringing together buyers and sellers in 1995. eBay product listings can easily be used in business communication courses to better understand online sales messages. One great advantage is that the vast majority of nearly 15 million listings a day are written and assembled by everyday consumers…

  5. Making Marketing Principles Tangible: Online Auctions as Living Case Studies

    ERIC Educational Resources Information Center

    Wood, Charles M.; Suter, Tracy A.

    2004-01-01

    This article presents an effective course supplement for Principles of Marketing classes. An experiential project involving online auctions is offered to instructors seeking to create a more participatory student environment and an interactive teaching style. A number of learning points are illustrated that allow instructors to use an auction…

  6. Double-Auction Market Simulation Software for Very Large Classes

    ERIC Educational Resources Information Center

    Ironside, Brian; Joerding, Wayne; Kuzyk, Pat

    2004-01-01

    The authors provide a version of a double-auction market simulation designed for classes too large for most computer labs to accommodate in one sitting. Instead, students play the game from remote computers, wherever they may be and at any time during a given time period specified by the instructor. When the window of time expires, students can…

  7. Empirical regularities of opening call auction in Chinese stock market

    NASA Astrophysics Data System (ADS)

    Gu, Gao-Feng; Ren, Fei; Ni, Xiao-Hui; Chen, Wei; Zhou, Wei-Xing

    2010-01-01

    We study the statistical regularities of an opening call auction using the ultra-high-frequency data of 22 liquid stocks traded on the Shenzhen Stock Exchange in 2003. The distribution of the relative price, defined as the relative difference between the order price in the opening call auction and the closing price on the last trading day, is asymmetric and that the distribution displays a sharp peak at the zero relative price and a relatively wide peak at the negative relative price. The detrended fluctuation analysis (DFA) method is adopted to investigate the long-term memory of relative order prices. We further study the statistical regularities of order sizes in the opening call auction, and observe a phenomenon of number preference, known as order size clustering. The probability density function (PDF) of order sizes could be well fitted by a q-Gamma function, and the long-term memory also exists in order sizes. In addition, both the average volume and the average number of orders decrease exponentially with the price level away from the best bid or ask price level in the limit-order book (LOB) established immediately after the opening call auction, and a price clustering phenomenon is observed.

  8. Teaching Auction Strategy Using Experiments Administered Via the Internet

    ERIC Educational Resources Information Center

    Asker, John; Grosskopf, Brit; McKinney, C. Nicholas; Niederle, Muriel; Roth, Alvin E.; Weizsacker, Georg

    2004-01-01

    The authors present an experimental design used to teach concepts in the economics of auctions and implications for e-Business procurement. The experiment is easily administered and can be adapted to many different treatments. The chief innovation is that it does not require the use of a lab or class time. Instead, the design can be implemented on…

  9. 15. Detail view of the original auction podium in the ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    15. Detail view of the original auction podium in the 1937 arena (main section), with the west bleachers at the left, the north bleachers at the right, and the monitor roof structure, supported by posts, above; looking northwest - Ewing Livestock Market, South side of First Avenue North, 500 feet west of Route 724, Ewing, Lee County, VA

  10. 41 CFR 102-38.95 - What is an auction?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false What is an auction? 102-38.95 Section 102-38.95 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION PERSONAL PROPERTY 38-SALE OF PERSONAL...

  11. Design and Promotion Strategy of Marketing Platform of Aquatic Auction based on Internet

    NASA Astrophysics Data System (ADS)

    Peng, Jianliang

    For the online trade and promotion of aquatic products and related materials through the network between supply and demand, the design content and effective promotional strategies of aquatic auctions online marketing platform is proposed in this paper. Design elements involve the location of customer service, the basic function of the platform including the purchase of general orders, online auctions, information dissemination, and recommendation of fine products, human services, and payment preferences. Based on network and mobile e-commerce transaction support, the auction platform makes the transaction of aquatic products well in advance. The results are important practical value for the design and application of online marketing platform of aquatic auction.

  12. The Security Education Concepts in the Textbooks of the National and Civic Education of the Primary Stage in Jordan--An Analytical Study

    ERIC Educational Resources Information Center

    Al-Edwan, Zaid Suleiman

    2016-01-01

    The present study aimed at exploring the concepts of the security education in the textbooks of the national and civic education of the higher primary stage in Jordan. It adopted the descriptive analytical method. The study sample consisted of the textbooks of the national and civic education for the basic eighth, ninth and tenth grades. To…

  13. Auctions with Dynamic Populations: Efficiency and Revenue Maximization

    NASA Astrophysics Data System (ADS)

    Said, Maher

    We study a stochastic sequential allocation problem with a dynamic population of privately-informed buyers. We characterize the set of efficient allocation rules and show that a dynamic VCG mechanism is both efficient and periodic ex post incentive compatible; we also show that the revenue-maximizing direct mechanism is a pivot mechanism with a reserve price. We then consider sequential ascending auctions in this setting, both with and without a reserve price. We construct equilibrium bidding strategies in this indirect mechanism where bidders reveal their private information in every period, yielding the same outcomes as the direct mechanisms. Thus, the sequential ascending auction is a natural institution for achieving either efficient or optimal outcomes.

  14. Auction-based distributed efficient economic operations of microgrid systems

    NASA Astrophysics Data System (ADS)

    Zou, Suli; Ma, Zhongjing; Liu, Xiangdong

    2014-12-01

    This paper studies the economic operations of the microgrid in a distributed way such that the operational schedule of each of the units, like generators, load units, storage units, etc., in a microgrid system, is implemented by autonomous agents. We apply and generalise the progressive second price (PSP) auction mechanism which was proposed by Lazar and Semret to efficiently allocate the divisible network resources. Considering the economic operation for the microgrid systems, the generators play as sellers to supply energy and the load units play as the buyers to consume energy, while a storage unit, like battery, super capacitor, etc., may transit between buyer and seller, such that it is a buyer when it charges and becomes a seller when it discharges. Furthermore in a connected mode, each individual unit competes against not only the other individual units in the microgrid but also the exogenous main grid possessing fixed electricity price and infinite trade capacity; that is to say, the auctioneer assigns the electricity among all individual units and the main grid with respect to the submitted bid strategies of all individual units in the microgrid in an economic way. Due to these distinct characteristics, the underlying auction games are distinct from those studied in the literature. We show that under mild conditions, the efficient economic operation strategy is a Nash equilibrium (NE) for the PSP auction games, and propose a distributed algorithm under which the system can converge to an NE. We also show that the performance of worst NE can be bounded with respect to the system parameters, say the energy trading price with the main grid, and based upon that, the implemented NE is unique and efficient under some conditions.

  15. Auction-based resource allocation game under a hierarchical structure

    NASA Astrophysics Data System (ADS)

    Cui, Yingying; Zou, Suli; Ma, Zhongjing

    2016-01-01

    This paper studies a class of auction-based resource allocation games under a hierarchical structure, such that each supplier is assigned a certain amount of resource from a single provider and allocates it to its buyers with auction mechanisms. To implement the efficient allocations for the underlying hierarchical system, we first design an auction mechanism, for each local system composed of a supplier and its buyers, which inherits the advantages of the progressive second price mechanism. By employing a dynamic algorithm, each local system converges to its own efficient Nash equilibrium, at which the efficient resource allocation is achieved and the bidding prices of all the buyers in this local system are identical with each other. After the local systems reach their own equilibria respectively, the resources assigned to suppliers are readjusted via a dynamic hierarchical algorithm with respect to the bidding prices associated with the implemented equilibria of local systems. By applying the proposed hierarchical process, the formulated hierarchical system can converge to the efficient allocation under certain mild conditions. The developed results in this work are demonstrated with simulations.

  16. Auctions and alternative procedures for allocating pollution rights

    SciTech Connect

    Lyon, R.M.

    1982-02-01

    This paper considers two different types of auctions which the government could use to sell discharge rights: (1) an auction where rights are sold for a single clearing price, and (2) a special type of discriminating auction that discourages strategic manipulation of bids by individual dischargers. Based on both theoretical and practical considerations, there appears to be a fundamental trade-off between reducing the financial burden of rights purchases and eliminating the incentives for strategic behavior. Very few discharges in either case study would have lower expenses under government sales of rights than under uniform treatment. The simulations also suggest that there may be opportunities for strategic behavior under nonincentive-compatible procedures because of small numbers of dischargers, despite its problems with respect to incentive compatibility, the right allocation approach of free distribution followed by exchange may offer the most desirable package of features. This approach can yield dischargers savings over the expenses of present uniform regulations as well as provide incentives for efficient allocation of treatment efforts. 25 references, 1 figure, 5 tables.

  17. 78 FR 11179 - Auction of Lower and Upper Paging Bands Licenses Scheduled for July 16, 2013; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-15

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Auction of Lower and Upper Paging Bands Licenses Scheduled for July 16, 2013; Comment Sought on Competitive Bidding Procedures for Auction 95 AGENCY: Federal Communications Commission. ACTION:...

  18. 76 FR 1158 - Auction of 700 MHz Band Licenses Scheduled for July 19, 2011; Comment Sought on Competitive...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-07

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Auction of 700 MHz Band Licenses Scheduled for July 19, 2011; Comment Sought on Competitive Bidding Procedures for Auction 92 AGENCY: Federal Communications Commission. ACTION: Notice. ]...

  19. 75 FR 52793 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-27

    ...), 75 FR 16878 (``Original Notice'') (the ``original proposed rule change''). \\4\\ See letters from... Securities Exchange Act Release No. 62550 (July 22, 2010), 75 FR 44296 (``Notice of Amendment No. 1''). II... Made Transparent by the MSRB on Municipal Auction Rate Securities and Variable Rate Demand...

  20. 78 FR 72081 - Closed Auction of AM Broadcast Construction Permits Scheduled for May 6, 2014; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-02

    ... be a ``closed'' auction; only those entities listed in Attachment A to the Auction 84 Comment Public..., 2013. The complete text of the Auction 84 Comment Public Notice, including all attachments and related... Notice and its attachments, as well as related Commission documents, also may be purchased from...

  1. 30 CFR 285.308 - How will MMS conduct an auction for ROW grants and RUE grants?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... and RUE grants? 285.308 Section 285.308 Mineral Resources MINERALS MANAGEMENT SERVICE, DEPARTMENT OF... Obtaining Row Grants and Rue Grants § 285.308 How will MMS conduct an auction for ROW grants and RUE grants... comment; and (2) Conduct a competitive auction for issuing the ROW grant or RUE grant. The auction...

  2. 77 FR 60690 - Auction of FM Broadcast Construction Permits Scheduled for March 26, 2013; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-04

    ... COMMISSION Auction of FM Broadcast Construction Permits Scheduled for March 26, 2013; Comment Sought on.... SUMMARY: This document announces the auction of certain FM broadcast construction permits scheduled to... auction of certain FM broadcast construction permits and seek comment on the procedures to be used...

  3. 30 CFR 585.220 - What auction format may BOEM use in a lease sale?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INTERIOR OFFSHORE RENEWABLE ENERGY AND ALTERNATE USES OF EXISTING FACILITIES ON THE OUTER CONTINENTAL SHELF Issuance of OCS Renewable Energy Leases Competitive Lease Award Process § 585.220 What auction format may... award renewable energy leases and will use one of the following auction formats, as determined...

  4. 30 CFR 285.220 - What auction format may MMS use in a lease sale?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... OFFSHORE RENEWABLE ENERGY ALTERNATE USES OF EXISTING FACILITIES ON THE OUTER CONTINENTAL SHELF Issuance of OCS Renewable Energy Leases Competitive Lease Award Process § 285.220 What auction format may MMS use... renewable energy leases and will use one of the following auction formats, as determined through the...

  5. 30 CFR 585.220 - What auction format may BOEM use in a lease sale?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INTERIOR OFFSHORE RENEWABLE ENERGY AND ALTERNATE USES OF EXISTING FACILITIES ON THE OUTER CONTINENTAL SHELF Issuance of OCS Renewable Energy Leases Competitive Lease Award Process § 585.220 What auction format may... award renewable energy leases and will use one of the following auction formats, as determined...

  6. 30 CFR 285.220 - What auction format may MMS use in a lease sale?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE RENEWABLE ENERGY ALTERNATE USES OF EXISTING FACILITIES ON THE OUTER CONTINENTAL SHELF Issuance of OCS Renewable Energy Leases Competitive Lease Award Process § 285... competitive auctions to award renewable energy leases and will use one of the following auction formats,...

  7. 30 CFR 585.220 - What auction format may BOEM use in a lease sale?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INTERIOR OFFSHORE RENEWABLE ENERGY AND ALTERNATE USES OF EXISTING FACILITIES ON THE OUTER CONTINENTAL SHELF Issuance of OCS Renewable Energy Leases Competitive Lease Award Process § 585.220 What auction format may... award renewable energy leases and will use one of the following auction formats, as determined...

  8. 31 CFR 356.22 - Does the Treasury have any limitations on auction awards?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Does the Treasury have any limitations on auction awards? 356.22 Section 356.22 Money and Finance: Treasury Regulations Relating to Money..., PUBLIC DEBT SERIES NO. 1-93) Determination of Auction Awards; Settlement § 356.22 Does the Treasury...

  9. 29 CFR 780.620 - Minimum wage for livestock auction work.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 3 2014-07-01 2014-07-01 false Minimum wage for livestock auction work. 780.620 Section 780.620 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR... for Exemption § 780.620 Minimum wage for livestock auction work. The application of the exemption...

  10. 29 CFR 780.620 - Minimum wage for livestock auction work.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 3 2013-07-01 2013-07-01 false Minimum wage for livestock auction work. 780.620 Section 780.620 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR... for Exemption § 780.620 Minimum wage for livestock auction work. The application of the exemption...

  11. 29 CFR 780.620 - Minimum wage for livestock auction work.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Minimum wage for livestock auction work. 780.620 Section 780.620 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR... for Exemption § 780.620 Minimum wage for livestock auction work. The application of the exemption...

  12. 29 CFR 780.620 - Minimum wage for livestock auction work.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 3 2012-07-01 2012-07-01 false Minimum wage for livestock auction work. 780.620 Section 780.620 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR... for Exemption § 780.620 Minimum wage for livestock auction work. The application of the exemption...

  13. 29 CFR 780.620 - Minimum wage for livestock auction work.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 3 2011-07-01 2011-07-01 false Minimum wage for livestock auction work. 780.620 Section 780.620 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR... for Exemption § 780.620 Minimum wage for livestock auction work. The application of the exemption...

  14. Sold! The Elementary Classroom Auction as Learning Tool of Communication and Economics

    ERIC Educational Resources Information Center

    Boyd, Josh; Boyd, Gina

    2014-01-01

    An auction, though an economic tool, is essentially a performance dependent on communication (Smith, 1989). The auctioneer dictates the pace, asks for bids, and acknowledges responses; the enterprise is controlled by a voice (Boyce, 2001). Bidders must listen and respond strategically to the communication of the people around them. An auction…

  15. Are Structural Estimates of Auction Models Reasonable? Evidence from Experimental Data

    ERIC Educational Resources Information Center

    Bajari, Patrick; Hortacsu, Ali

    2005-01-01

    Recently, economists have developed methods for structural estimation of auction models. Many researchers object to these methods because they find the strict rationality assumptions to be implausible. Using bid data from first-price auction experiments, we estimate four alternative structural models: (1) risk-neutral Bayes-Nash, (2) risk-averse…

  16. 9 CFR 2.76 - Records: Operators of auction sales and brokers.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Records: Operators of auction sales and brokers. 2.76 Section 2.76 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Records § 2.76 Records: Operators of auction sales...

  17. 9 CFR 2.76 - Records: Operators of auction sales and brokers.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 9 Animals and Animal Products 1 2012-01-01 2012-01-01 false Records: Operators of auction sales and brokers. 2.76 Section 2.76 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Records § 2.76 Records: Operators of auction sales...

  18. 9 CFR 2.76 - Records: Operators of auction sales and brokers.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 9 Animals and Animal Products 1 2014-01-01 2014-01-01 false Records: Operators of auction sales and brokers. 2.76 Section 2.76 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Records § 2.76 Records: Operators of auction sales...

  19. 9 CFR 2.76 - Records: Operators of auction sales and brokers.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 9 Animals and Animal Products 1 2013-01-01 2013-01-01 false Records: Operators of auction sales and brokers. 2.76 Section 2.76 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Records § 2.76 Records: Operators of auction sales...

  20. 9 CFR 2.76 - Records: Operators of auction sales and brokers.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 9 Animals and Animal Products 1 2011-01-01 2011-01-01 false Records: Operators of auction sales and brokers. 2.76 Section 2.76 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Records § 2.76 Records: Operators of auction sales...

  1. Pricing strategies, the strength of bidding intentions, and online auction performance: a cross-cultural study.

    PubMed

    Peng, Yu-Shu; Jan, Lih-Tsyr

    2009-10-01

    Over the past decade, electronic markets based on the Internet, particularly online auctions, have become popular venues for conducting business. Previous studies often focused on the construction of the best bidding model, while few studies have tried to integrate multiple pricing strategies to predict the probability of closing an auction and the price premium. This study constructs a mediated model to examine the relationship among pricing strategies, the strength of bidding intentions, and online auction performance. The sample consists of 1,055 auctions of iPod MP3 players from eBay Web sites in Hong Kong, Singapore, Belgium, and France. Empirical results show that the pricing strategies directly influence both the probability of closing an auction and the level of price premium. The pricing strategies also indirectly influence the price premium through the mediating effect of the strength of bidding intentions. PMID:19817564

  2. Pricing strategies, the strength of bidding intentions, and online auction performance: a cross-cultural study.

    PubMed

    Peng, Yu-Shu; Jan, Lih-Tsyr

    2009-10-01

    Over the past decade, electronic markets based on the Internet, particularly online auctions, have become popular venues for conducting business. Previous studies often focused on the construction of the best bidding model, while few studies have tried to integrate multiple pricing strategies to predict the probability of closing an auction and the price premium. This study constructs a mediated model to examine the relationship among pricing strategies, the strength of bidding intentions, and online auction performance. The sample consists of 1,055 auctions of iPod MP3 players from eBay Web sites in Hong Kong, Singapore, Belgium, and France. Empirical results show that the pricing strategies directly influence both the probability of closing an auction and the level of price premium. The pricing strategies also indirectly influence the price premium through the mediating effect of the strength of bidding intentions.

  3. Identification of shareholder ethics and responsibilities in online reverse auctions for construction projects.

    PubMed

    Hatipkarasulu, Yilmaz; Gill, James H

    2004-04-01

    The increasing number of companies providing internet services and auction tools helped popularize the online reverse auction trend for purchasing commodities and services in the last decade. As a result, a number of owners, both public and private, accepted the online reverse auctions as the bidding technique for their construction projects. Owners, while trying to minimize their costs for construction projects, are also required to address their ethical responsibilities to the shareholders. In the case of online reverse auctions for construction projects, the ethical issues involved in the bidding technique directly reflects on the owner's ethical and social responsibilities to their shareholders. The goal of this paper is to identify the shareholder ethics and responsibilities in online reverse auctions for construction projects by analyzing the ethical issues for the parties involved in the process. The identification of the ethical issues and responsibilities requires clear definition and understanding of professional ethics and the roles of the involved parties. In this paper, first, the concept of professional ethics and social responsibility is described in a general form. To illustrate the ethical issues and responsibilities, a sample case of bidding for a construction project using online reverse auction techniques is presented in which the shareholders were actively involved in questioning the ethical issues. The issues involved in the bidding process and their reflection on the shareholder responsibilities are described and analyzed for each stage of the process. A brief discussion of the overall process is also included to address the general ethical issues involved in online reverse auctions.

  4. Adaptive Sniping for Volatile and Stable Continuous Double Auction Markets

    NASA Astrophysics Data System (ADS)

    Toft, I. E.; Bagnall, A. J.

    This paper introduces a new adaptive sniping agent for the Continuous Double Auction. We begin by analysing the performance of the well known Kaplan sniper in two extremes of market conditions. We generate volatile and stable market conditions using the well known Zero Intelligence-Constrained agent and a new zero-intelligence agent Small Increment (SI). ZI-C agents submit random but profitable bids/offers and cause high volatility in prices and individual trader performance. Our new zero-intelligence agent, SI, makes small random adjustments to the outstanding bid/offer and hence is more cautious than ZI-C. We present results for SI in self-play and then analyse Kaplan in volatile and stable markets. We demonstrate that the non-adaptive Kaplan sniper can be configured to suit either market conditions, but no single configuration is performs well across both market types. We believe that in a dynamic auction environment where current or future market conditions cannot be predicted a viable sniping strategy should adapt its behaviour to suit prevailing market conditions. To this end, we propose the Adaptive Sniper (AS) agent for the CDA. AS traders classify sniping opportunities using a statistical model of market activity and adjust their classification thresholds using a Widrow-Hoff adapted search. Our AS agent requires little configuration, and outperforms the original Kaplan sniper in volatile and stable markets, and in a mixed trader type scenario that includes adaptive strategies from the literature.

  5. Understanding Financial Market States Using an Artificial Double Auction Market.

    PubMed

    Yim, Kyubin; Oh, Gabjin; Kim, Seunghwan

    2016-01-01

    The ultimate value of theories describing the fundamental mechanisms behind asset prices in financial systems is reflected in the capacity of such theories to understand these systems. Although the models that explain the various states of financial markets offer substantial evidence from the fields of finance, mathematics, and even physics, previous theories that attempt to address the complexities of financial markets in full have been inadequate. We propose an artificial double auction market as an agent-based model to study the origin of complex states in financial markets by characterizing important parameters with an investment strategy that can cover the dynamics of the financial market. The investment strategies of chartist traders in response to new market information should reduce market stability based on the price fluctuations of risky assets. However, fundamentalist traders strategically submit orders based on fundamental value and, thereby stabilize the market. We construct a continuous double auction market and find that the market is controlled by the proportion of chartists, Pc. We show that mimicking the real state of financial markets, which emerges in real financial systems, is given within the range Pc = 0.40 to Pc = 0.85; however, we show that mimicking the efficient market hypothesis state can be generated with values less than Pc = 0.40. In particular, we observe that mimicking a market collapse state is created with values greater than Pc = 0.85, at which point a liquidity shortage occurs, and the phase transition behavior is described at Pc = 0.85.

  6. Ergodic transition in a simple model of the continuous double auction.

    PubMed

    Radivojević, Tijana; Anselmi, Jonatha; Scalas, Enrico

    2014-01-01

    We study a phenomenological model for the continuous double auction, whose aggregate order process is equivalent to two independent M/M/1 queues. The continuous double auction defines a continuous-time random walk for trade prices. The conditions for ergodicity of the auction are derived and, as a consequence, three possible regimes in the behavior of prices and logarithmic returns are observed. In the ergodic regime, prices are unstable and one can observe a heteroskedastic behavior in the logarithmic returns. On the contrary, non-ergodicity triggers stability of prices, even if two different regimes can be seen.

  7. Ergodic Transition in a Simple Model of the Continuous Double Auction

    PubMed Central

    Radivojević, Tijana; Anselmi, Jonatha; Scalas, Enrico

    2014-01-01

    We study a phenomenological model for the continuous double auction, whose aggregate order process is equivalent to two independent queues. The continuous double auction defines a continuous-time random walk for trade prices. The conditions for ergodicity of the auction are derived and, as a consequence, three possible regimes in the behavior of prices and logarithmic returns are observed. In the ergodic regime, prices are unstable and one can observe a heteroskedastic behavior in the logarithmic returns. On the contrary, non-ergodicity triggers stability of prices, even if two different regimes can be seen. PMID:24558377

  8. Impacts of climate and land use change on ecosystem hydrology and net primary productivity: Linking water availability to food security in Asia

    NASA Astrophysics Data System (ADS)

    Dangal, S. R. S.; Tian, H.; Pan, S.; Zhang, B.; Yang, J.

    2015-12-01

    The nexus approach to food, water and energy security in Asia is extremely important and relevant as the region has to feed two-third of the world's population and accounts for 59% of the global water consumption. The distribution pattern of food, water and energy resources have been shaped by the legacy effect of both natural and anthropogenic disturbances and therefore are vulnerable to climate change and human activities including land use/cover change (LUCC) and land management (irrigation and nitrogen fertilization). In this study, we used the Dynamic Land Ecosystem Model (DLEM) to examine the effects of climate change, land use/cover change, and land management practices (irrigation and nitrogen fertilization) on the spatiotemporal trends and variability in water availability and its role in limiting net primary productivity (NPP) and food security in the 20th and early 21st centuries. Our specific objectives are to quantify how climate change, LUCC and other environmental changes have interactively affected carbon and water dynamics across the Asian region. In particular, we separated the Asian region into several sub-region based on the primary limiting factor - water, food and energy. We then quantified how changes in environmental factors have altered the water and food resources during the past century. We particularly focused on Net Primary Productivity (NPP) and water cycle (Evapotranspiration, discharge, and runoff) as a measure of available food and water resources, respectively while understanding the linkage between food and water resources in Asia.

  9. Bid distribution derived from consistent mixed strategy in lowest unique bid auction

    NASA Astrophysics Data System (ADS)

    Zhao, Yinan; Chen, Qinghua; Wang, Yougui

    2014-12-01

    The Lowest Unique Bid Auction (LUBA) booms recently through the Internet. A typical distribution pattern of bid price in this reverse auction has been found and needs to be interpreted. The distribution curve is a decreasing one whose slope has a close relationship with the number of agents participating in the auction. To explain this stylized fact, we develop a model assuming that agents prefer to bid on the price at which the probability of winning is higher. The bid distributions of actual auctions with the number of agents less than 200 can be fitted very well using the parameters for the value of items and the number of bids. When this number becomes larger, however, a deviation occurs between prediction and empirical data, which can be adjusted by introducing cognitive illusion of the bid number.

  10. 31 CFR 356.33 - Does the Treasury have any discretion in the auction process?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS (DEPARTMENT OF THE TREASURY... provide a public notice if we change any auction provision, term, or condition. (c) We reserve the...

  11. 31 CFR 356.33 - Does the Treasury have any discretion in the auction process?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS (DEPARTMENT OF THE TREASURY... provide a public notice if we change any auction provision, term, or condition. (c) We reserve the...

  12. Modeling and simulation of a double auction artificial financial market

    NASA Astrophysics Data System (ADS)

    Raberto, Marco; Cincotti, Silvano

    2005-09-01

    We present a double-auction artificial financial market populated by heterogeneous agents who trade one risky asset in exchange for cash. Agents issue random orders subject to budget constraints. The limit prices of orders may depend on past market volatility. Limit orders are stored in the book whereas market orders give immediate birth to transactions. We show that fat tails and volatility clustering are recovered by means of very simple assumptions. We also investigate two important stylized facts of the limit order book, i.e., the distribution of waiting times between two consecutive transactions and the instantaneous price impact function. We show both theoretically and through simulations that if the order waiting times are exponentially distributed, even trading waiting times are also exponentially distributed.

  13. Accommodating individual preferences in nurse scheduling via auctions and optimization.

    PubMed

    De Grano, Melanie L; Medeiros, D J; Eitel, David

    2009-09-01

    This paper describes a two-stage approach to nurse scheduling that considers both nurse preferences and hospital constraints. In the auction stage, nurses bid for their preferred working shifts and rest days using "points". An optimization model awards shifts to the highest bidders insofar as possible while maintaining hospital requirements. In the schedule completion stage, an optimization model allocates the unfilled shifts to nurses who have not yet met their minimum required hours. The approach is demonstrated via a case study in the emergency department at York Hospital. A schedule with a high percentage of awarded bids was generated in a few minutes of computer time. Further experimentation suggests that the approach works well under a variety of conditions.

  14. Accommodating individual preferences in nurse scheduling via auctions and optimization.

    PubMed

    De Grano, Melanie L; Medeiros, D J; Eitel, David

    2009-09-01

    This paper describes a two-stage approach to nurse scheduling that considers both nurse preferences and hospital constraints. In the auction stage, nurses bid for their preferred working shifts and rest days using "points". An optimization model awards shifts to the highest bidders insofar as possible while maintaining hospital requirements. In the schedule completion stage, an optimization model allocates the unfilled shifts to nurses who have not yet met their minimum required hours. The approach is demonstrated via a case study in the emergency department at York Hospital. A schedule with a high percentage of awarded bids was generated in a few minutes of computer time. Further experimentation suggests that the approach works well under a variety of conditions. PMID:19739357

  15. A Combinatorial Auction Based Algorithm for Flexible Seat Reservation Systems

    NASA Astrophysics Data System (ADS)

    Otomura, Kazutoshi; Tomii, Norio

    We present algorithms for flexible seat distribution problems, which is defined as a problem to give an appropriate travel plan to each passenger after receiving their requests concerning their travel demands. Seat distribution problems occur when a flexible seat reservation system is implemented in which passengers are allowed to reserve seats by submitting their demands instead of specifying trains. To solve the seat distribution problem, we have formalized it as a winner determination problem of the combinatorial auction mechanism. It should be noted that difficulty of the seat distribution problem varies depending on instances of the problem, because the number of demands often varies and users' requests sometimes converge on particular trains. This suggests that in order to get solutions with high quality, algorithms that appropriately control the search space are indispensable. In this paper, we present three kinds of such algorithms for the seat distribution problem together with the results of several experiments.

  16. Combining auctions and performance-based payments in a forest enrichment field trial in Western Kenya.

    PubMed

    Khalumba, Mercelyne; Wünscher, Tobias; Wunder, Sven; Büdenbender, Mirjam; Holm-Müller, Karin

    2014-06-01

    Cost-effectiveness is an important aspect in the assessment of payments for environmental services (PES) initiatives. In participatory field trials with communities in Western Kenya, we combined procurement auctions for forest enrichment contracts with performance-based payments and compared the outcomes with a baseline scenario currently used by the Kenyan Forest Service. Procurement auctions were the most cost-effective. The competitive nature of the auction reduced contracting expenses (provision costs), and the result-oriented payments provided additional incentives to care for the planted seedlings, resulting in their improved survival rates (service quantity). These gains clearly exceeded increases in transaction costs associated with conducting an auction. The number of income-poor auction participants and winners was disproportionately high and local institutional buy-in was remarkably strong. Our participatory approach may, however, require adaptations when conducted at a larger scale. Although the number of contracts we monitored was limited and prohibited the use of statistical tests, our study is one of the first to reveal the benefits of using auctions for PES in developing countries.

  17. Combining auctions and performance-based payments in a forest enrichment field trial in Western Kenya.

    PubMed

    Khalumba, Mercelyne; Wünscher, Tobias; Wunder, Sven; Büdenbender, Mirjam; Holm-Müller, Karin

    2014-06-01

    Cost-effectiveness is an important aspect in the assessment of payments for environmental services (PES) initiatives. In participatory field trials with communities in Western Kenya, we combined procurement auctions for forest enrichment contracts with performance-based payments and compared the outcomes with a baseline scenario currently used by the Kenyan Forest Service. Procurement auctions were the most cost-effective. The competitive nature of the auction reduced contracting expenses (provision costs), and the result-oriented payments provided additional incentives to care for the planted seedlings, resulting in their improved survival rates (service quantity). These gains clearly exceeded increases in transaction costs associated with conducting an auction. The number of income-poor auction participants and winners was disproportionately high and local institutional buy-in was remarkably strong. Our participatory approach may, however, require adaptations when conducted at a larger scale. Although the number of contracts we monitored was limited and prohibited the use of statistical tests, our study is one of the first to reveal the benefits of using auctions for PES in developing countries. PMID:24665907

  18. Understanding Financial Market States Using an Artificial Double Auction Market

    PubMed Central

    2016-01-01

    The ultimate value of theories describing the fundamental mechanisms behind asset prices in financial systems is reflected in the capacity of such theories to understand these systems. Although the models that explain the various states of financial markets offer substantial evidence from the fields of finance, mathematics, and even physics, previous theories that attempt to address the complexities of financial markets in full have been inadequate. We propose an artificial double auction market as an agent-based model to study the origin of complex states in financial markets by characterizing important parameters with an investment strategy that can cover the dynamics of the financial market. The investment strategies of chartist traders in response to new market information should reduce market stability based on the price fluctuations of risky assets. However, fundamentalist traders strategically submit orders based on fundamental value and, thereby stabilize the market. We construct a continuous double auction market and find that the market is controlled by the proportion of chartists, Pc. We show that mimicking the real state of financial markets, which emerges in real financial systems, is given within the range Pc = 0.40 to Pc = 0.85; however, we show that mimicking the efficient market hypothesis state can be generated with values less than Pc = 0.40. In particular, we observe that mimicking a market collapse state is created with values greater than Pc = 0.85, at which point a liquidity shortage occurs, and the phase transition behavior is described at Pc = 0.85. PMID:27031110

  19. Understanding Financial Market States Using an Artificial Double Auction Market.

    PubMed

    Yim, Kyubin; Oh, Gabjin; Kim, Seunghwan

    2016-01-01

    The ultimate value of theories describing the fundamental mechanisms behind asset prices in financial systems is reflected in the capacity of such theories to understand these systems. Although the models that explain the various states of financial markets offer substantial evidence from the fields of finance, mathematics, and even physics, previous theories that attempt to address the complexities of financial markets in full have been inadequate. We propose an artificial double auction market as an agent-based model to study the origin of complex states in financial markets by characterizing important parameters with an investment strategy that can cover the dynamics of the financial market. The investment strategies of chartist traders in response to new market information should reduce market stability based on the price fluctuations of risky assets. However, fundamentalist traders strategically submit orders based on fundamental value and, thereby stabilize the market. We construct a continuous double auction market and find that the market is controlled by the proportion of chartists, Pc. We show that mimicking the real state of financial markets, which emerges in real financial systems, is given within the range Pc = 0.40 to Pc = 0.85; however, we show that mimicking the efficient market hypothesis state can be generated with values less than Pc = 0.40. In particular, we observe that mimicking a market collapse state is created with values greater than Pc = 0.85, at which point a liquidity shortage occurs, and the phase transition behavior is described at Pc = 0.85. PMID:27031110

  20. Green Auctions and Reduction of Information Rents in Payments for Environmental Services: An Experimental Investigation in Sunan County, Northwestern China

    PubMed Central

    Deng, Xiaohong; Xu, Zhongmin

    2015-01-01

    Reducing information rents is an important task for government agencies wishing to purchase maximal environmental services with limited budgets. This paper reports on several green auction options for reducing information rents and improving the performance of the “Grain for Green” Payments for environmental services (PES) program implemented in northwestern China. In r experimental auctions and investigations, door-to-door interviews were conducted and bidding envelopes and survey questionnaires were used to determine the offers and the foregone profits of the participants. Three scenarios are analyzed in this paper: a uniform price auction, a discriminatory price auction, and an opportunity-cost system. The results show that compared to the uniform price auction system, the other auction systems can increase the cost-effectiveness of conservation contracting. Competitive bidding can reveal true opportunity costs and can reduce information rents extracted from the government by farmers using private information. The demographics and average bids of these auction types were also analyzed. “Perfect information” in the opportunity-cost offer system has the best performance but is very hard to implement in reality. The results of this research show that the auction is a valuable tool for purchasing conservation contracts in northwestern China, but that in the future, the performance of these auctions should be studied with relaxed model assumptions. PMID:25793263

  1. Green auctions and reduction of information rents in payments for environmental services: an experimental investigation in Sunan County, northwestern China.

    PubMed

    Deng, Xiaohong; Xu, Zhongmin

    2015-01-01

    Reducing information rents is an important task for government agencies wishing to purchase maximal environmental services with limited budgets. This paper reports on several green auction options for reducing information rents and improving the performance of the "Grain for Green" Payments for environmental services (PES) program implemented in northwestern China. In r experimental auctions and investigations, door-to-door interviews were conducted and bidding envelopes and survey questionnaires were used to determine the offers and the foregone profits of the participants. Three scenarios are analyzed in this paper: a uniform price auction, a discriminatory price auction, and an opportunity-cost system. The results show that compared to the uniform price auction system, the other auction systems can increase the cost-effectiveness of conservation contracting. Competitive bidding can reveal true opportunity costs and can reduce information rents extracted from the government by farmers using private information. The demographics and average bids of these auction types were also analyzed. "Perfect information" in the opportunity-cost offer system has the best performance but is very hard to implement in reality. The results of this research show that the auction is a valuable tool for purchasing conservation contracts in northwestern China, but that in the future, the performance of these auctions should be studied with relaxed model assumptions.

  2. 75 FR 44296 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-28

    ... Exchange Act Release No. 61793 (March 26, 2010), 75 FR 16878 (April 2, 2010) (File No. SR-MSRB-2010-02). \\4... on Municipal Auction Rate Securities and Variable Rate Demand Obligations July 22, 2010. On March 10...'') and Variable Rate Demand Obligations (``VRDOs''). The proposed rule change was published for...

  3. Identification of shareholder ethics and responsibilities in online reverse auctions for construction projects.

    PubMed

    Hatipkarasulu, Yilmaz; Gill, James H

    2004-04-01

    The increasing number of companies providing internet services and auction tools helped popularize the online reverse auction trend for purchasing commodities and services in the last decade. As a result, a number of owners, both public and private, accepted the online reverse auctions as the bidding technique for their construction projects. Owners, while trying to minimize their costs for construction projects, are also required to address their ethical responsibilities to the shareholders. In the case of online reverse auctions for construction projects, the ethical issues involved in the bidding technique directly reflects on the owner's ethical and social responsibilities to their shareholders. The goal of this paper is to identify the shareholder ethics and responsibilities in online reverse auctions for construction projects by analyzing the ethical issues for the parties involved in the process. The identification of the ethical issues and responsibilities requires clear definition and understanding of professional ethics and the roles of the involved parties. In this paper, first, the concept of professional ethics and social responsibility is described in a general form. To illustrate the ethical issues and responsibilities, a sample case of bidding for a construction project using online reverse auction techniques is presented in which the shareholders were actively involved in questioning the ethical issues. The issues involved in the bidding process and their reflection on the shareholder responsibilities are described and analyzed for each stage of the process. A brief discussion of the overall process is also included to address the general ethical issues involved in online reverse auctions. PMID:15152854

  4. Competitive bidding for health insurance contracts: lessons from the online HMO auctions.

    PubMed

    Gupta, Alok; Parente, Stephen T; Sanyal, Pallab

    2012-12-01

    Healthcare is an important social and economic component of modern society, and the effective use of information technology in this industry is critical to its success. As health insurance premiums continue to rise, competitive bidding may be useful in generating stronger price competition and lower premium costs for employers and possibly, government agencies. In this paper, we assess an endeavor by several Fortune 500 companies to reduce healthcare procurement costs for their employees by having HMOs compete in open electronic auctions. Although the auctions were successful in generating significant cost savings for the companies in the first year, i.e., 1999, they failed to replicate the success and were eventually discontinued after two more years. Over the past decade since the failed auction experiment, effective utilization of information technologies have led to significant advances in the design of complex electronic markets. Using this knowledge, and data from the auctions, we point out several shortcomings of the auction design that, we believe, led to the discontinuation of the market after three years. Based on our analysis, we propose several actionable recommendations that policy makers can use to design a sustainable electronic market for procuring health insurance.

  5. 75 FR 56533 - Wireless Telecommunications Bureau Postpones Auction of 218-219 MHz Service and Phase II 220 MHz...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-16

    ... COMMISSION Wireless Telecommunications Bureau Postpones Auction of 218-219 MHz Service and Phase II 220 MHz... document announces the postponement of Auction 89. FOR FURTHER INFORMATION CONTACT: Wireless... related documents are also available on the Internet at the Commission's Web site:...

  6. Electronic Reverse Auctions: Integrating an E-Sourcing Tool into a Sales and Purchasing Cross-Course Negotiation Project

    ERIC Educational Resources Information Center

    Williams, Jacqueline A.; Dobie, Kathryn

    2011-01-01

    Electronic reverse auctions are increasingly being used by firms to improve firm financial and operational performance. The described teaching innovation serves as a model for introducing electronic reverse auctions as a central element in a comprehensive negotiation exercise involving sales management and purchasing management students. Results…

  7. 30 CFR 585.308 - How will BOEM conduct an auction for ROW grants and RUE grants?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... and RUE grants? 585.308 Section 585.308 Mineral Resources BUREAU OF OCEAN ENERGY MANAGEMENT... Obtaining Row Grants and Rue Grants § 585.308 How will BOEM conduct an auction for ROW grants and RUE grants... to comment; and (2) Conduct a competitive auction for issuing the ROW grant or RUE grant. The...

  8. 30 CFR 585.308 - How will BOEM conduct an auction for ROW grants and RUE grants?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... and RUE grants? 585.308 Section 585.308 Mineral Resources BUREAU OF OCEAN ENERGY MANAGEMENT... Obtaining Row Grants and Rue Grants § 585.308 How will BOEM conduct an auction for ROW grants and RUE grants... to comment; and (2) Conduct a competitive auction for issuing the ROW grant or RUE grant. The...

  9. 30 CFR 585.308 - How will BOEM conduct an auction for ROW grants and RUE grants?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... and RUE grants? 585.308 Section 585.308 Mineral Resources BUREAU OF OCEAN ENERGY MANAGEMENT... Obtaining Row Grants and Rue Grants § 585.308 How will BOEM conduct an auction for ROW grants and RUE grants... to comment; and (2) Conduct a competitive auction for issuing the ROW grant or RUE grant. The...

  10. 7 CFR 29.75b - Display of baled flue-cured tobacco on auction warehouse floors in designated markets.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 2 2014-01-01 2014-01-01 false Display of baled flue-cured tobacco on auction... AGRICULTURE COMMODITY STANDARDS AND STANDARD CONTAINER REGULATIONS TOBACCO INSPECTION Regulations Mandatory Inspection § 29.75b Display of baled flue-cured tobacco on auction warehouse floors in designated...

  11. 7 CFR 29.75b - Display of baled flue-cured tobacco on auction warehouse floors in designated markets.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 2 2011-01-01 2011-01-01 false Display of baled flue-cured tobacco on auction... AGRICULTURE COMMODITY STANDARDS AND STANDARD CONTAINER REGULATIONS TOBACCO INSPECTION Regulations Mandatory Inspection § 29.75b Display of baled flue-cured tobacco on auction warehouse floors in designated...

  12. 7 CFR 29.75a - Display of burley tobacco on auction warehouse floors in designated markets.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 2 2011-01-01 2011-01-01 false Display of burley tobacco on auction warehouse floors... COMMODITY STANDARDS AND STANDARD CONTAINER REGULATIONS TOBACCO INSPECTION Regulations Mandatory Inspection § 29.75a Display of burley tobacco on auction warehouse floors in designated markets. (a)(1) Each...

  13. 7 CFR 29.75b - Display of baled flue-cured tobacco on auction warehouse floors in designated markets.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Display of baled flue-cured tobacco on auction... AGRICULTURE COMMODITY STANDARDS AND STANDARD CONTAINER REGULATIONS TOBACCO INSPECTION Regulations Mandatory Inspection § 29.75b Display of baled flue-cured tobacco on auction warehouse floors in designated...

  14. 7 CFR 29.75a - Display of burley tobacco on auction warehouse floors in designated markets.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 2 2014-01-01 2014-01-01 false Display of burley tobacco on auction warehouse floors... COMMODITY STANDARDS AND STANDARD CONTAINER REGULATIONS TOBACCO INSPECTION Regulations Mandatory Inspection § 29.75a Display of burley tobacco on auction warehouse floors in designated markets. (a)(1) Each...

  15. 7 CFR 29.75a - Display of burley tobacco on auction warehouse floors in designated markets.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Display of burley tobacco on auction warehouse floors... COMMODITY STANDARDS AND STANDARD CONTAINER REGULATIONS TOBACCO INSPECTION Regulations Mandatory Inspection § 29.75a Display of burley tobacco on auction warehouse floors in designated markets. (a)(1) Each...

  16. 78 FR 21355 - Tribal Mobility Fund Phase I Auction Scheduled for October 24, 2013; Comment Sought on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-10

    ... Mobility Fund Phase I, 77 FR 14012. Petitions for designation as an ETC should be filed in WC Docket No. 09..., 76 FR 73830, November 29, 2011 and 76 FR 81562, December 28, 2011. Auction 902 will award one-time... COMMISSION Tribal Mobility Fund Phase I Auction Scheduled for October 24, 2013; Comment Sought on...

  17. 77 FR 7152 - Mobility Fund Phase I Auction Scheduled for September 27, 2012; Comment Sought on Competitive...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-10

    ... the Commission in the USF/ICC Transformation Order, 76 FR 73830, November 29, 2011 and 76 FR 81562... COMMISSION Mobility Fund Phase I Auction Scheduled for September 27, 2012; Comment Sought on Competitive... Wireline Competition Bureaus announce a reverse auction to award $300 million in one-time Mobility...

  18. 77 FR 11115 - Mobility Fund Phase I Auction Limited Extension of Deadlines for Comments and Reply Comments on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-24

    ... released the Auction 901 Comment Public Notice, 77 FR 7152, February 10, 2012, which seeks comment on... Commission in the USF/ICC Transformation Order, 76 FR 73830, November 29, 2011 and 76 FR 81562, December 28... COMMISSION Mobility Fund Phase I Auction Limited Extension of Deadlines for Comments and Reply Comments...

  19. 75 FR 8703 - Auction of Lower and Upper Paging Bands Licenses Scheduled for May 25, 2010; Notice and Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-25

    ... referred to as the red light rule, that implement the Commission's ] obligations under the Debt Collection... Public Notice, 74 FR 67221, December 18, 2009. i. Licenses to be Offered in Auction 87 2. Auction 87 will... disclosures that may violate 47 CFR 1.2105(c), particularly in light of the limited information procedures...

  20. Physical contact influences how much people pay at celebrity auctions

    PubMed Central

    Newman, George E.; Bloom, Paul

    2014-01-01

    Contagion is a form of magical thinking in which people believe that a person’s immaterial qualities or essence can be transferred to an object through physical contact. Here we investigate how a belief in contagion influences the sale of celebrity memorabilia. Using data from three high-profile estate auctions, we find that people’s expectations about the amount of physical contact between the object and the celebrity positively predicts the final bids for items that belonged to well-liked individuals (e.g., John F. Kennedy) and negatively predicts final bids for items that belonged to disliked individuals (e.g., Bernard Madoff). A follow-up experiment further suggests that these effects are driven by contagion beliefs: when asked to bid on a sweater owned by a well-liked celebrity, participants report that they would pay substantially less if it was sterilized before they received it. However, sterilization increases the amount they would pay for a sweater owned by a disliked celebrity. These studies suggest that magical thinking may still have effects in contemporary Western societies and they provide some unique demonstrations of contagion effects on real-world purchase decisions. PMID:24567388

  1. Physical contact influences how much people pay at celebrity auctions.

    PubMed

    Newman, George E; Bloom, Paul

    2014-03-11

    Contagion is a form of magical thinking in which people believe that a person's immaterial qualities or essence can be transferred to an object through physical contact. Here we investigate how a belief in contagion influences the sale of celebrity memorabilia. Using data from three high-profile estate auctions, we find that people's expectations about the amount of physical contact between the object and the celebrity positively predicts the final bids for items that belonged to well-liked individuals (e.g., John F. Kennedy) and negatively predicts final bids for items that belonged to disliked individuals (e.g., Bernard Madoff). A follow-up experiment further suggests that these effects are driven by contagion beliefs: when asked to bid on a sweater owned by a well-liked celebrity, participants report that they would pay substantially less if it was sterilized before they received it. However, sterilization increases the amount they would pay for a sweater owned by a disliked celebrity. These studies suggest that magical thinking may still have effects in contemporary Western societies and they provide some unique demonstrations of contagion effects on real-world purchase decisions. PMID:24567388

  2. Bidding process in online auctions and winning strategy: Rate equation approach.

    PubMed

    Yang, I; Kahng, B

    2006-06-01

    Online auctions have expanded rapidly over the last decade and have become a fascinating new type of business or commercial transaction in this digital era. Here we introduce a master equation for the bidding process that takes place in online auctions. We find that the number of distinct bidders who bid k times up to the tth bidding progresses, called the k-frequent bidder, seems to scale as n(k)(t) approximately tk(-2.4). The successfully transmitted bidding rate by the k-frequent bidder is likely to scale as q(k)(t) approximately k(-1.4), independent of t for large t. This theoretical prediction is close to empirical data. These results imply that bidding at the last moment is a rational and effective strategy to win in an eBay auction. PMID:16907028

  3. Bidding process in online auctions and winning strategy: Rate equation approach

    NASA Astrophysics Data System (ADS)

    Yang, I.; Kahng, B.

    2006-06-01

    Online auctions have expanded rapidly over the last decade and have become a fascinating new type of business or commercial transaction in this digital era. Here we introduce a master equation for the bidding process that takes place in online auctions. We find that the number of distinct bidders who bid k times up to the t th bidding progresses, called the k -frequent bidder, seems to scale as nk(t)˜tk-2.4 . The successfully transmitted bidding rate by the k -frequent bidder is likely to scale as qk(t)˜k-1.4 , independent of t for large t . This theoretical prediction is close to empirical data. These results imply that bidding at the last moment is a rational and effective strategy to win in an eBay auction.

  4. Mechanism Design for Multi-slot Ads Auction in Sponsored Search Markets

    NASA Astrophysics Data System (ADS)

    Deng, Xiaotie; Sun, Yang; Yin, Ming; Zhou, Yunhong

    In this paper, we study pricing models for multi-slot advertisements, where advertisers can bid to place links to their sales webpages at one or multiple slots on a webpage, called the multi-slot AD auction problem. We develop and analyze several important mechanisms, including the VCG mechanism for multi-slot ads auction, the optimal social welfare solution, as well as two weighted GSP-like protocols (mixed and hybrid). Furthermore, we consider that forward-looking Nash equilibrium and prove its existence in the weighted GSP-like pricing protocols.

  5. 25 CFR 215.4 - Leases to be sold at public auction.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false Leases to be sold at public auction. 215.4 Section 215.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR ENERGY AND MINERALS LEAD AND ZINC MINING... provided in the regulations in this part, no lead and zinc mining lease under this part of restricted...

  6. 25 CFR 215.4 - Leases to be sold at public auction.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false Leases to be sold at public auction. 215.4 Section 215.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR ENERGY AND MINERALS LEAD AND ZINC MINING... provided in the regulations in this part, no lead and zinc mining lease under this part of restricted...

  7. A False-name-Proof Double Auction Protocol for Arbitrary Evaluation Values

    NASA Astrophysics Data System (ADS)

    Sakurai, Yuko; Yokoo, Makoto

    We develop a new false-name-proof double auction protocol called the Generalized Threshold Price Double auction (GTPD) protocol. False-name-proofness generalizes strategy-proofness by incorporating the possibility of false-name bids, e.g., bids submitted using multiple e-mail addresses. An existing protocol called TPD protocol is false-name-proof but can handle only the cases where marginal utilities of each agent always decrease, while our new GTPD protocol can handle arbitrary evaluation values. When marginal utilities can increase, some bids cannot be divided into a single unit (e.g., an all-or-nothing bid). Due to the existence of such indivisible bids, meeting supply/demand becomes difficult. Furthermore, a seller/buyer can submit a false-name-bid by pretending to be a potential buyer/seller to manipulate allocations and payments. In the GTPD protocol, the auctioneer is required to absorb the supply-demand imbalance up to a given upper-bound. Also, the GTPD incorporate a new false-name-proof one-sided auction protocol that is guaranteed to sell/buy a certain number of units. Simulation results show that when the threshold price is set appropriately, this protocol can obtain a good social surplus, and the number of absorbed units is much smaller than the given upper-bound.

  8. Reciprocity in Online Markets: Empirical Studies of Auction and Barter Markets

    ERIC Educational Resources Information Center

    Ye, Shun

    2013-01-01

    My dissertation seeks to understand how reciprocity affects transaction outcomes and mechanism design in online markets. The first essay examines negative reciprocity illustrated as feedback-revoking behavior in the eBay auction market, focusing on its impact and implications for reputation system design. I utilize the biggest policy change of…

  9. 77 FR 9655 - Mobility Fund Phase I Auction Updated List of Potentially Eligible Census Blocks

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-17

    ..., 77 FR 7152, February 10, 2012, comments are due on or before February 24, 2012. Reply comments are... Public Notice, 77 FR 7152, February 10, 2012, all filings in response to the notice must refer to AU... program requirements in the Auction 901 (Mobility Fund Phase I) Comment Public Notice, 77 FR...

  10. 31 CFR 356.33 - Does the Treasury have any discretion in the auction process?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Does the Treasury have any discretion... CIRCULAR, PUBLIC DEBT SERIES NO. 1-93) Miscellaneous Provisions § 356.33 Does the Treasury have any discretion in the auction process? (a) We have the discretion to: (1) Accept, reject, or refuse to...

  11. 25 CFR 215.4 - Leases to be sold at public auction.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Leases to be sold at public auction. 215.4 Section 215.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR ENERGY AND MINERALS LEAD AND ZINC MINING... provided in the regulations in this part, no lead and zinc mining lease under this part of restricted...

  12. 77 FR 69933 - Expanding the Economic and Innovation Opportunities of Spectrum Through Incentive Auctions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-21

    ... Electronic Filing of Documents in Rulemaking Proceedings, 63 FR 24121 (1998). Electronic Filers: Comments may... less complex software than a multiple round auction and thus be easier for the Commission to implement... optimization software to try to find the most efficient way of clearing a specified amount of...

  13. 47 CFR 27.604 - Limitation on licenses won at auction.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 2 2014-10-01 2014-10-01 false Limitation on licenses won at auction. 27.604 Section 27.604 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES Guard Band A and B Blocks (757-758/787-788 MHz and...

  14. 47 CFR 27.604 - Limitation on licenses won at auction.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 2 2013-10-01 2013-10-01 false Limitation on licenses won at auction. 27.604 Section 27.604 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES Guard Band A and B Blocks (757-758/787-788 MHz and...

  15. 27 CFR 31.63 - Agents, auctioneers, brokers, etc., acting on behalf of others.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Exemptions and Exceptions Persons Who Are Not Dealers in Liquors Or Beer § 31.63 Agents, auctioneers, brokers... account of those activities. Those persons, who have no property rights in the liquors sold, may make... beer who merely receive and transmit to a wholesale dealer orders for liquors or beer to be...

  16. 40 CFR 97.421 - Recordation of TR NOX Annual allowance allocations and auction results.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 21 2014-07-01 2014-07-01 false Recordation of TR NOX Annual allowance... TRADING PROGRAMS TR NOX Annual Trading Program § 97.421 Recordation of TR NOX Annual allowance allocations and auction results. (a) By November 7, 2011, the Administrator will record in each TR NOX...

  17. 77 FR 38061 - Mobility Fund Phase I Auction Supplemental Short-Form Instructions and Other Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-26

    ... Notice, 77 FR 32092, May 31, 2012, the Bureaus provided general instructions for completing FCC Form 180... COMMISSION Mobility Fund Phase I Auction Supplemental Short-Form Instructions and Other Information AGENCY... Telecommunications and Wireline ] Competition Bureaus provide supplemental filing instructions for the Mobility...

  18. 25 CFR 215.4 - Leases to be sold at public auction.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 1 2012-04-01 2011-04-01 true Leases to be sold at public auction. 215.4 Section 215.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR ENERGY AND MINERALS LEAD AND ZINC MINING... provided in the regulations in this part, no lead and zinc mining lease under this part of restricted...

  19. 49 CFR Appendix F to Part 599 - Salvage Auction Certification Form

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 7 2011-10-01 2011-10-01 false Salvage Auction Certification Form F Appendix F to Part 599 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY... CONSUMER ASSISTANCE TO RECYCLE AND SAVE ACT PROGRAM Pt. 599, App. F Appendix F to Part 599—Salvage...

  20. 49 CFR Appendix F to Part 599 - Salvage Auction Certification Form

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 7 2014-10-01 2014-10-01 false Salvage Auction Certification Form F Appendix F to Part 599 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY... CONSUMER ASSISTANCE TO RECYCLE AND SAVE ACT PROGRAM Pt. 599, App. F Appendix F to Part 599—Salvage...

  1. 49 CFR Appendix F to Part 599 - Salvage Auction Certification Form

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 7 2013-10-01 2013-10-01 false Salvage Auction Certification Form F Appendix F to Part 599 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY... CONSUMER ASSISTANCE TO RECYCLE AND SAVE ACT PROGRAM Pt. 599, App. F Appendix F to Part 599—Salvage...

  2. Teaching Undergraduate Money and Banking: T-Bill Auctions and Stock Market Models

    ERIC Educational Resources Information Center

    Saros, Daniel E.

    2009-01-01

    The author offers innovative approaches to 3 topics that are typically only briefly mentioned (if at all) in money and banking courses. The first topic is a Treasury bill auction experiment in which students have an opportunity to participate directly. The results from a class of 14 money and banking students are used to explain how an instructor…

  3. See Art History in a New Light: Have an Art Auction

    ERIC Educational Resources Information Center

    Benter, Doris J.

    2008-01-01

    At Portledge School in Locust Valley, New York, ninth graders in their upper school study art history for one semester. The visual arts department has created a vigorous new syllabus culminating in an hour-long mock art auction. The department selects several art movements (e.g., Post-Impressionism, Cubism, Abstract Expressionism, Social Realism,…

  4. 49 CFR Appendix F to Part 599 - Salvage Auction Certification Form

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Salvage Auction Certification Form F Appendix F to Part 599 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY... CONSUMER ASSISTANCE TO RECYCLE AND SAVE ACT PROGRAM Pt. 599, App. F Appendix F to Part 599—Salvage...

  5. 49 CFR Appendix F to Part 599 - Salvage Auction Cerification Form

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Salvage Auction Cerification Form F Appendix F to Part 599 Transportation Other Regulations Relating to Transportation (Continued) NATIONAL HIGHWAY... CONSUMER ASSISTANCE TO RECYCLE AND SAVE ACT PROGRAM Pt. 599, App. F Appendix F to Part 599—Salvage...

  6. Design Implications of Real-Time Feedback in Continuous Combinatorial Auctions: An Experimental Investigation

    ERIC Educational Resources Information Center

    Sanyal, Pallab

    2009-01-01

    Information Technology (IT) has spawned the growth of novel and innovative market mechanisms (such as online auctions) and associated businesses (such as eBay and Priceline) that were not feasible without the capabilities and reach of these modern information technologies. Previous studies on designing trading mechanisms for online markets…

  7. Comparisons of auction mechanisms in a multiple unit setting: A consideration for restructuring electric power markets

    NASA Astrophysics Data System (ADS)

    Bernard, John Charles

    The objective of this study was to compare the performance of five single sided auctions that could be used in restructured electric power markets across different market sizes in a multiple unit setting. Auction selection would profoundly influence an industry over $200 billion in size in the United States, and the consequences of implementing an inappropriate mechanism would be great. Experimental methods were selected to analyze the auctions. Two rounds of experiments were conducted, the first testing the sealed offer last accepted offer (LAO) and first rejected offer (FRO), and the clock English (ENG) and sealed offer English (SOE) in markets of sizes two and six. The FRO, SOE, and ENG used the same pricing rule. Second round testing was on the LAO, FRO, and the nonuniform price multiple unit Vickrey (MUV) in markets of sizes two, four, and six. Experiments lasted 23 and 75 periods for rounds 1 and 2 respectively. Analysis of variance and contrast analysis were used to examine the data. The four performance measures used were price, efficiency, profits per unit, and supply revelation. Five basic principles were also assessed: no sales at losses, all low cost capacity should be offered and sold, no high cost capacity should sell, and the market should clear. It was expected group size and auction type would affect performance. For all performance measures, group size was a significant variable, with smaller groups showing poorer performance. Auction type was significant only for the efficiency performance measure, where clock auctions outperformed the others. Clock auctions also proved superior for the first four principles. The FRO performed poorly in almost all situations, and should not be a preferred mechanism in any market. The ENG was highly efficient, but expensive for the buyer. The SOE appeared superior to the FRO and ENG. The clock improves efficiency over the FRO while less information kept prices under the ENG. The MUV was superior in revealing costs

  8. Efficient Nash Equilibrium Resource Allocation Based on Game Theory Mechanism in Cloud Computing by Using Auction.

    PubMed

    Nezarat, Amin; Dastghaibifard, G H

    2015-01-01

    One of the most complex issues in the cloud computing environment is the problem of resource allocation so that, on one hand, the cloud provider expects the most profitability and, on the other hand, users also expect to have the best resources at their disposal considering the budget constraints and time. In most previous work conducted, heuristic and evolutionary approaches have been used to solve this problem. Nevertheless, since the nature of this environment is based on economic methods, using such methods can decrease response time and reducing the complexity of the problem. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneer's utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider.

  9. The influence of an online auction's product price and e-retailer reputation on consumers' perception, attitude, and behavioral intention.

    PubMed

    Wu, Wann-Yih; Huang, Po-Ching; Fu, Chen-Su

    2011-06-01

    Online auctions combine the conventional auction model with information technology. However, information asymmetry within such auctions causes risks and uncertainties that influence consumer purchase intentions. In this study, a 2 (product price: high vs. low) × 2 (e-retailer reputation: high vs. low) experimental design was used to understand whether the product price and e-retailer reputation will influence consumers' perceived risk, attitude toward the website and purchase intention. The results of this study indicate that perceived risk negatively influences consumer attitude toward the website and online purchase intention, while consumer attitude toward the website positively influences purchase intention. Moreover, involvement moderates the influence of product price and e-retailer reputation only on social risk but does not have a significant effect on consumer attitude toward the website. This study contributes to a more comprehensive understanding of online auction users' behavior. Finally, the managerial implications, limitations and future research directions are also provided. PMID:21332721

  10. The influence of an online auction's product price and e-retailer reputation on consumers' perception, attitude, and behavioral intention.

    PubMed

    Wu, Wann-Yih; Huang, Po-Ching; Fu, Chen-Su

    2011-06-01

    Online auctions combine the conventional auction model with information technology. However, information asymmetry within such auctions causes risks and uncertainties that influence consumer purchase intentions. In this study, a 2 (product price: high vs. low) × 2 (e-retailer reputation: high vs. low) experimental design was used to understand whether the product price and e-retailer reputation will influence consumers' perceived risk, attitude toward the website and purchase intention. The results of this study indicate that perceived risk negatively influences consumer attitude toward the website and online purchase intention, while consumer attitude toward the website positively influences purchase intention. Moreover, involvement moderates the influence of product price and e-retailer reputation only on social risk but does not have a significant effect on consumer attitude toward the website. This study contributes to a more comprehensive understanding of online auction users' behavior. Finally, the managerial implications, limitations and future research directions are also provided.

  11. Equilibrium Strategy and Population-Size Effects in Lowest Unique Bid Auctions

    NASA Astrophysics Data System (ADS)

    Pigolotti, Simone; Bernhardsson, Sebastian; Juul, Jeppe; Galster, Gorm; Vivo, Pierpaolo

    2012-02-01

    In lowest unique bid auctions, N players bid for an item. The winner is whoever places the lowest bid, provided that it is also unique. We use a grand canonical approach to derive an analytical expression for the equilibrium distribution of strategies. We then study the properties of the solution as a function of the mean number of players, and compare them with a large data set of internet auctions. The theory agrees with the data with striking accuracy for small population-size N, while for larger N a qualitatively different distribution is observed. We interpret this result as the emergence of two different regimes, one in which adaptation is feasible and one in which it is not. Our results question the actual possibility of a large population to adapt and find the optimal strategy when participating in a collective game.

  12. Collective induction without cooperation? Learning and knowledge transfer in cooperative groups and competitive auctions.

    PubMed

    Maciejovsky, Boris; Budescu, David V

    2007-05-01

    There is strong evidence that groups perform better than individuals do on intellective tasks with demonstrably correct solutions. Typically, these studies assume that group members share common goals. The authors extend this line of research by replacing standard face-to-face group interactions with competitive auctions, allowing for conflicting individual incentives. In a series of studies involving the well-known Wason selection task, they demonstrate that competitive auctions induce learning effects equally impressive as those of standard group interactions, and they uncover specific and general knowledge transfers from these institutions to new reasoning problems. The authors identify payoff feedback and information pooling as the driving factors underlying these findings, and they explain these factors within the theoretical framework of collective induction.

  13. A Q-Learning-Based Supplier Bidding Strategy in Electricity Auction Market

    NASA Astrophysics Data System (ADS)

    Xiong, Gaofeng; Hashiyama, Tomonori; Okuma, Shigeru

    One of the most important issues for power suppliers in the deregulated electric industry is how to bid into the electricity auction market to satisfy their profit-maximizing goals. Based on the Q-Learning algorithm, this paper presents a novel supplier bidding strategy to maximize supplier’s profit in the long run. In this approach, the supplier bidding strategy is viewed as one kind of stochastic optimal control problem and each supplier can learn from experience. A competitive day-ahead electricity auction market with hourly bids is assumed here, where no supplier possesses the market power and all suppliers winning the market are paid based on their own bid prices. The dynamics and the incomplete information of the market are considered. The impact of suppliers’ strategic bidding on the market price is analyzed. Agent-based simulations are presented. The simulation results show the feasibility of the proposed bidding strategy.

  14. A Supplier Bidding Strategy Through Q-Learning Algorithm in Electricity Auction Markets

    NASA Astrophysics Data System (ADS)

    Xiong, Gaofeng; Hashiyama, Tomonori; Okuma, Shigeru

    One of the most important issues for power suppliers in the deregulated electric industry is how to bid into the electricity auction market to satisfy their profit-maximizing goals. Based on the Q-Learning algorithm, this paper presents a novel supplier bidding strategy to maximize supplier’s profit in the long run. In this approach, the supplier bidding strategy is viewed as a kind of stochastic optimal control problem and each supplier can learn from experience. A competitive day-ahead electricity auction market with hourly bids is assumed here, where no supplier possesses the market power. The dynamics and the incomplete information of the market are considered. The impacts of suppliers’ strategic bidding on the market price are analyzed under uniform pricing rule and discriminatory pricing rule. Agent-based simulations are presented. The simulation results show the feasibility of the proposed bidding strategy.

  15. Biased Random-Key Genetic Algorithms for the Winner Determination Problem in Combinatorial Auctions.

    PubMed

    de Andrade, Carlos Eduardo; Toso, Rodrigo Franco; Resende, Mauricio G C; Miyazawa, Flávio Keidi

    2015-01-01

    In this paper we address the problem of picking a subset of bids in a general combinatorial auction so as to maximize the overall profit using the first-price model. This winner determination problem assumes that a single bidding round is held to determine both the winners and prices to be paid. We introduce six variants of biased random-key genetic algorithms for this problem. Three of them use a novel initialization technique that makes use of solutions of intermediate linear programming relaxations of an exact mixed integer linear programming model as initial chromosomes of the population. An experimental evaluation compares the effectiveness of the proposed algorithms with the standard mixed linear integer programming formulation, a specialized exact algorithm, and the best-performing heuristics proposed for this problem. The proposed algorithms are competitive and offer strong results, mainly for large-scale auctions.

  16. Efficient Nash Equilibrium Resource Allocation Based on Game Theory Mechanism in Cloud Computing by Using Auction

    PubMed Central

    Nezarat, Amin; Dastghaibifard, GH

    2015-01-01

    One of the most complex issues in the cloud computing environment is the problem of resource allocation so that, on one hand, the cloud provider expects the most profitability and, on the other hand, users also expect to have the best resources at their disposal considering the budget constraints and time. In most previous work conducted, heuristic and evolutionary approaches have been used to solve this problem. Nevertheless, since the nature of this environment is based on economic methods, using such methods can decrease response time and reducing the complexity of the problem. In this paper, an auction-based method is proposed which determines the auction winner by applying game theory mechanism and holding a repetitive game with incomplete information in a non-cooperative environment. In this method, users calculate suitable price bid with their objective function during several round and repetitions and send it to the auctioneer; and the auctioneer chooses the winning player based the suggested utility function. In the proposed method, the end point of the game is the Nash equilibrium point where players are no longer inclined to alter their bid for that resource and the final bid also satisfies the auctioneer’s utility function. To prove the response space convexity, the Lagrange method is used and the proposed model is simulated in the cloudsim and the results are compared with previous work. At the end, it is concluded that this method converges to a response in a shorter time, provides the lowest service level agreement violations and the most utility to the provider. PMID:26431035

  17. Research at the auction block: Problems for the fair benefits approach to international research.

    PubMed

    London, Alex John; Zollman, Kevin J S

    2010-01-01

    The "fair benefits" approach to international research is designed to produce results that all can agree are fair without taking a stand on divisive questions of justice. But its appealing veneer of collaboration masks ambiguities at both a conceptual and an operational level. An attempt to put it into practice would look a lot like an auction, leaving little reason to think the outcomes will satisfy even minimal conditions of fairness.

  18. A Centralized Auction Mechanism for the Disability and Survivors Insurance in Chile

    NASA Astrophysics Data System (ADS)

    Reyes H., Gonzalo

    As part of the pension reform recently approved in Chile, the government introduced a centralized auction mechanism to provide the Disability and Survivors (D&S) Insurance that covers recent contributors among the more than 8 million participants in the mandatory private pension system. This paper is intended as a case study presenting the main distortions found in the decentralized operation of the system that led to this reform and the challenges faced when designing a competitive auction mechanism to be implemented jointly by the Pension Fund Managers (AFP). In a typical bilateral contract the AFP retained much of the risk and the Insurance Company acted in practice as a reinsurer. The process to hire this contract was not competitive and colligated companies ended up providing the service. Several distortions affected competition in the market through incentives to cream-skim members by AFPs (since they bear most of the risk) or efforts to block disability claims. Since the price of this insurance is hidden in the fees charged by AFPs for the administration of individual accounts and pension funds there was lack of price transparency. Since new AFPs have no history of members’ disability and mortality profile the insurance contract acted as a barrier to entry in the market of AFP services, especially when D&S insurance costs reached 50% of total costs. Cross-subsidies between members of the same AFP, inefficient risk pooling (due to pooling occurring at the AFP rather than at the system level) and regulatory arbitrage, since AFPs provided insurance not being regulated as an insurance company, were also present. A centralized auction mechanism solves these market failures, but also gives raise to new challenges, such as how to design a competitive auction that attracts participation and deters collusion. Design features that were incorporated in the regulation to tackle these issues, such as dividing coverage into predefined percentage blocks, are presented

  19. Alternative security

    SciTech Connect

    Weston, B.H. )

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.

  20. Clean air, clear market. Making emissions trading work: The role of a computer-assisted auction

    SciTech Connect

    Bartels, C.W.; Marron, D.B.; Lipsky, M.I.

    1993-06-15

    Creating a new commodity presents the chance to develop new markets in which to trade it. In many cases, existing markets can be adapted easily; in other cases it proves worthwhile to develop new forms that reflect special characteristics of the commodity and those who trade it. In the case of the sulfur dioxide (SO[sub 2]) emission allowances created by the Clean Air Act Amendments of 1990, a number of standard market forms already have been adopted. While these will prove useful for handling some transactions, a new Market Clearing Auction (MCA) offers buyers and sellers a centralized marketplace for trading SO[sub 2] emission allowances. The MCA, which was developed by the brokerage firm Cantor Fitzgerald, is a computer-assisted [open quotes]smart[close quotes] auction designed to replicate the outcome of an efficient market in emission allowances, and accepts bids and offers for any possible combination of allowances. Orders can be submitted for streams of allowances. Orders can be submitted for streams of allowances covering more than one year. The auction then determines the combination of bids and offers that maximizes the gains from trades in the market, and establishes uniform market clearing prices for each allowance issue (1995, 1996, and so on). Once executed, trades are settled on a cash-forward basis; that is, allowances are delivered and payments are made at future dates.

  1. 76 FR 46603 - Security Ratings

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-03

    ... than common equity, is eligible to be registered on Form S-3 and Form F-3 if: (i) The issuer has issued... non- convertible securities, other than common equity, in primary offerings for cash, not exchange...-convertible securities, other than common equity, issued in primary offerings for cash, not...

  2. The impact of product information and trials on demand for smokeless tobacco and cigarettes: Evidence from experimental auctions

    PubMed Central

    Rousu, Matthew C.; O'Connor, Richard; Thrasher, James F; June, Kristie; Bansal-Travers, Maansi; Pitcavage, James

    2014-01-01

    Introduction Epidemiological and toxicological evidence suggests lower risk of smokeless tobacco (ST) products compared to cigarettes. Less is known, however, about consumer perceptions and use of novel forms of ST, including snus and dissolvable tobacco. Methods In this study, we conducted in-person experimental auctions in Buffalo, NY, Columbia, SC, and Selinsgrove, PA with 571 smokers to test the impact of information and product trials on smokers’ preferences. Auctions were conducted between November 2010-November 2011. Results We found no evidence of an impact of product trials on demand in our auctions. Anti-ST information increased demand for cigarettes when presented alone, but when presented with Pro-ST information it decreased demand for cigarettes. It did not decrease demand for ST products. Anti-smoking information increased demand for ST products, but did not affect cigarette demand. Conclusions These findings suggest that credible and effective communications about tobacco harm reduction should reinforce the negative effects of smoking. PMID:24321456

  3. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  4. Collection Security.

    ERIC Educational Resources Information Center

    Boss, Richard W.

    1984-01-01

    Presents a systematic approach to the problem of security of library collections and facilities from theft and vandalism. Highlights include responses to losses, defining security needs, typical weaknesses of facilities, policies and procedures that weaken a library's security, conducting a security audit, cost of security, cost-effectiveness, and…

  5. A Winner Determination Algorithm for Combinatorial Auctions Based on Hybrid Artificial Fish Swarm Algorithm

    NASA Astrophysics Data System (ADS)

    Zheng, Genrang; Lin, ZhengChun

    The problem of winner determination in combinatorial auctions is a hotspot electronic business, and a NP hard problem. A Hybrid Artificial Fish Swarm Algorithm(HAFSA), which is combined with First Suite Heuristic Algorithm (FSHA) and Artificial Fish Swarm Algorithm (AFSA), is proposed to solve the problem after probing it base on the theories of AFSA. Experiment results show that the HAFSA is a rapidly and efficient algorithm for The problem of winner determining. Compared with Ant colony Optimization Algorithm, it has a good performance with broad and prosperous application.

  6. Secure Sensor Platform

    SciTech Connect

    Troy Ross, Barry Schoeneman

    2010-08-25

    The Secure Sensor Platform (SSP) software provides a framework of functionality to support the development of low-power autonomous sensors for nuclear safeguards. This framework provides four primary functional blocks of capabilities required to implement autonomous sensors. The capabilities are: communications, security, power management, and cryptography. Utilizing this framework establishes a common set of functional capabilities for seamless interoperability of any sensor based upon the SSP concept.

  7. 47 CFR 27.1213 - Designated entity provisions for BRS in Commission auctions commencing prior to January 1, 2004.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., 2004 for BTA service areas are eligible for special incentives in the auction process. See 47 CFR 1... entity will have both de facto and de jure control of the entity. See 47 CFR 1.2110(i). (g) Records... COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS...

  8. 47 CFR 27.1213 - Designated entity provisions for BRS in Commission auctions commencing prior to January 1, 2004.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., 2004 for BTA service areas are eligible for special incentives in the auction process. See 47 CFR 1... entity will have both de facto and de jure control of the entity. See 47 CFR 1.2110(i). (g) Records... COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS...

  9. 78 FR 50086 - Notice of Competitive Auction for Solar Energy Development on Public Lands in the State of Colorado

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-16

    ... Bureau of Land Management Notice of Competitive Auction for Solar Energy Development on Public Lands in... applicant to submit a right-of-way (ROW) application and a plan of development for solar energy projects on... solicitations of interest and ROW applications within two designated Solar Energy Zones (SEZ): Los Mogotes...

  10. 40 CFR 97.721 - Recordation of TR SO2 Group 2 allowance allocations and auction results.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 22 2013-07-01 2013-07-01 false Recordation of TR SO2 Group 2... SO2 TRADING PROGRAMS TR SO2 Group 2 Trading Program § 97.721 Recordation of TR SO2 Group 2 allowance allocations and auction results. (a) By November 7, 2011, the Administrator will record in each TR SO2 Group...

  11. 40 CFR 97.721 - Recordation of TR SO2 Group 2 allowance allocations and auction results.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 21 2014-07-01 2014-07-01 false Recordation of TR SO2 Group 2... SO2 TRADING PROGRAMS TR SO2 Group 2 Trading Program § 97.721 Recordation of TR SO2 Group 2 allowance allocations and auction results. (a) By November 7, 2011, the Administrator will record in each TR SO2 Group...

  12. 40 CFR 97.621 - Recordation of TR SO2 Group 1 allowance allocations and auction results.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 21 2014-07-01 2014-07-01 false Recordation of TR SO2 Group 1... SO2 TRADING PROGRAMS TR SO2 Group 1 Trading Program § 97.621 Recordation of TR SO2 Group 1 allowance allocations and auction results. (a) By November 7, 2011, the Administrator will record in each TR SO2 Group...

  13. 40 CFR 97.621 - Recordation of TR SO2 Group 1 allowance allocations and auction results.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 22 2013-07-01 2013-07-01 false Recordation of TR SO2 Group 1... SO2 TRADING PROGRAMS TR SO2 Group 1 Trading Program § 97.621 Recordation of TR SO2 Group 1 allowance allocations and auction results. (a) By November 7, 2011, the Administrator will record in each TR SO2 Group...

  14. 47 CFR 27.1213 - Designated entity provisions for BRS in Commission auctions commencing prior to January 1, 2004.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES..., 2004 for BTA service areas are eligible for special incentives in the auction process. See 47 CFR 1... entity will have both de facto and de jure control of the entity. See 47 CFR 1.2110(i). (g)...

  15. 47 CFR 27.1213 - Designated entity provisions for BRS in Commission auctions commencing prior to January 1, 2004.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES..., 2004 for BTA service areas are eligible for special incentives in the auction process. See 47 CFR 1... entity will have both de facto and de jure control of the entity. See 47 CFR 1.2110(i). (g)...

  16. 47 CFR 27.1213 - Designated entity provisions for BRS in Commission auctions commencing prior to January 1, 2004.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES MISCELLANEOUS WIRELESS COMMUNICATIONS SERVICES..., 2004 for BTA service areas are eligible for special incentives in the auction process. See 47 CFR 1... entity will have both de facto and de jure control of the entity. See 47 CFR 1.2110(i). (g)...

  17. 30 CFR 285.308 - How will MMS conduct an auction for ROW grants and RUE grants?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... and RUE grants? 285.308 Section 285.308 Mineral Resources BUREAU OF OCEAN ENERGY MANAGEMENT... Renewable Energy Activities Obtaining Row Grants and Rue Grants § 285.308 How will MMS conduct an auction for ROW grants and RUE grants? (a) If MMS determines that there is competitive interest, we will:...

  18. Reputation mechanism: From resolution for truthful online auctions to the model of optimal one-gambler problem

    SciTech Connect

    Bradonjic, Milan

    2009-01-01

    In this paper we study reputation mechanisms, and show how the notion of reputation can help us in building truthful online auction mechanisms. From the mechanism design prospective, we derive the conditions on and design a truthful online auction mechanism. Moreover, in the case when some agents may lay or cannot have the real knowledge about the other agents reputations, we derive the resolution of the auction, such that the mechanism is truthful. Consequently, we move forward to the optimal one-gambler/one-seller problem, and explain how that problem is refinement of the previously discussed online auction design in the presence of reputation mechanism. In the setting of the optimal one-gambler problem, we naturally rise and solve the specific question: What is an agent's optimal strategy, in order to maximize his revenue? We would like to stress that our analysis goes beyond the scope, which game theory usually discusses under the notion of reputation. We model one-player games, by introducing a new parameter (reputation), which helps us in predicting the agent's behavior, in real-world situations, such as, behavior of a gambler, real-estate dealer, etc.

  19. 78 FR 56875 - Tribal Mobility Fund Phase I Auction Rescheduled for December 19, 2013; Notice and Filing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-16

    ... service support through reverse competitive bidding. The USF/ICC Transformation Order, 76 FR 73830, November 29, 2011 and 76 FR 81562, December 28, 2011, established the Mobility Fund as a universal service... program details. On March 29, 2013, the Bureaus released the Auction 902 Comment Public Notice, 78...

  20. Human remains sold to the highest bidder! A snapshot of the buying and selling of human skeletal remains on eBay, an Internet auction site.

    PubMed

    Huxley, Angie K; Finnegan, Michael

    2004-01-01

    Internet auction sites have become increasingly popular, with diverse items up for sale to the public worldwide. The purposes of this paper are to inform the forensic community that human skeletal remains, old and new, are for sale on the eBay internet auction site, and to advise forensic scientists that eBay does not use a forensic anthropologist to assess photographs of these materials. Over the last few years, this website was "surfed," with numerous auctions during this period. After contacting eBay by email, representatives responded that they adhere to Native American Grave Protection and Repatriation Act (NAGPRA) and that their website indicates that auctions must state that sale of human remains is for instructional purposes only. Based on the photographs, the remains appear to be of prehistoric and modern origin. An unfortunate consequence of such sale may generate interest in stealing remains from graves, mortuaries, hospitals, or county morgues worldwide. PMID:14979339

  1. A novel method for strategy acquisition and its application to a double-auction market game.

    PubMed

    Phelps, Steve; McBurney, Peter; Parsons, Simon

    2010-06-01

    We introduce a method for strategy acquisition in nonzero-sum n -player games and empirically validate it by applying it to a well-known benchmark problem in this domain, namely, the double-auction market. Many existing approaches to strategy acquisition focus on attempting to find strategies that are robust in the sense that they are good all-round performers against all-comers. We argue that, in many economic and multiagent scenarios, the robustness criterion is inappropriate; in contrast, our method focuses on searching for strategies that are likely to be adopted by participating agents, which is formalized as the size of a strategy's basins of attraction under the replicator dynamics. PMID:19906587

  2. Effects of information on young consumers' willingness to pay for genetically modified food: experimental auction analysis.

    PubMed

    Kajale, Dilip B; Becker, T C

    2014-01-01

    This study examines the effects of information on consumers' willingness to pay (WTP) for genetically modified food (GMF). We used Vickrey second price experimental auction method for elicitation of consumer WTP for GM potato chips and GM soya-chocolate bar. The sample used in this study was university students from Delhi, India. Four information formats (positive, negative, no information, and combined information about GM technology) were used for the examination. The results show that, when students received the combine information they were willing to pay around 17%-20% premium for GMF and when received the negative information they demanded around 22% discount for GMF. While the positive- and the no-information formats alone have no considerable effect on consumers' WTP for GMF. Overall, our findings suggest that while doing marketing of GMF in India, the best strategy is to provide combined information about GM technology.

  3. Joint bidding, information pooling, and the performance of petroleum lease auctions

    SciTech Connect

    DeBrock, L.M.; Smith, J.L.

    1983-01-01

    This article uses a game-theoretic bidding model to examine the effect of joint bidding in offshore petroleum lease auctions. It shows that joint bidding increases the total social value of the lease offering and, in most cases, does not significantly decrease the percentage of social value captured by the government. These results follow from the fact that pooling of information concerning a prior unknown tract values allows for more accurate estimates. The anticompetitive effect of a reduced number of bidders tends to be offset by the well-known fact that better informed participants bid more aggressively. The findings are striking in that the model abstracts entirely from the effects of increased entry and greater risk diversification, the two common arguments in support of joint bidding. 12 references, 13 footnotes, 3 figures, 2 tables.

  4. Effects of information on young consumers' willingness to pay for genetically modified food: experimental auction analysis.

    PubMed

    Kajale, Dilip B; Becker, T C

    2014-01-01

    This study examines the effects of information on consumers' willingness to pay (WTP) for genetically modified food (GMF). We used Vickrey second price experimental auction method for elicitation of consumer WTP for GM potato chips and GM soya-chocolate bar. The sample used in this study was university students from Delhi, India. Four information formats (positive, negative, no information, and combined information about GM technology) were used for the examination. The results show that, when students received the combine information they were willing to pay around 17%-20% premium for GMF and when received the negative information they demanded around 22% discount for GMF. While the positive- and the no-information formats alone have no considerable effect on consumers' WTP for GMF. Overall, our findings suggest that while doing marketing of GMF in India, the best strategy is to provide combined information about GM technology. PMID:24735210

  5. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    ERIC Educational Resources Information Center

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  6. Security Locks

    ERIC Educational Resources Information Center

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions affected--perhaps the…

  7. Right of way in the sky: two problems in aircraft self-separation and the auction-based solution.

    PubMed

    Erev, Ido; Barron, Greg; Remington, Roger

    2004-01-01

    There has been a growing movement to give commercial airliners more freedom in choosing their routes and responsibility for detecting and avoiding conflicts. These "free flight" concepts must contain new rules for assigning right of way in potential conflict situations. To evaluate the effect of prospective rules, the current paper derives the expected response of agents who exhibit different levels of sophistication. Traditional game theoretic analysis is used to derive the behavior of rational agents. Computer simulations are used to predict the behavior of boundedly rational reinforcement learners. The results reveal that several seemingly reasonable, straightforward right-of-way rules might lead to undesirable outcomes. These problematic results are robust to the assumed level of rationality. It is shown that these problems can be alleviated by using auctions to resolve competition for right of way. Actual or potential applications of this research include the usage of second price auctions to address right-of-way and similar conflicts.

  8. 31 CFR 356.17 - How and when do I pay for securities awarded in an auction?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS (DEPARTMENT OF THE TREASURY CIRCULAR, PUBLIC DEBT... and payment by paper form. If you are mailing bids to us on a paper form, you may either enclose...

  9. 31 CFR 356.17 - How and when do I pay for securities awarded in an auction?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS (DEPARTMENT OF THE TREASURY CIRCULAR, PUBLIC DEBT... and payment by paper form. If you are mailing bids to us on a paper form, you may either enclose...

  10. 31 CFR 356.17 - How and when do I pay for securities awarded in an auction?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS (DEPARTMENT OF THE TREASURY CIRCULAR, PUBLIC DEBT... and payment by paper form. If you are mailing bids to us on a paper form, you may either enclose...

  11. 31 CFR 356.17 - How and when do I pay for securities awarded in an auction?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Finance (Continued) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS (DEPARTMENT OF THE TREASURY CIRCULAR, PUBLIC DEBT... and payment by paper form. If you are mailing bids to us on a paper form, you may either enclose...

  12. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... TREASURY CIRCULAR, PUBLIC DEBT SERIES NO. 1-93) General Information § 356.4 What are the book-entry systems... this system, account holders maintain accounts in a book-entry, online system directly on the records... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false What are the book-entry systems...

  13. 12 CFR 619.9010 - Additional security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Additional security. 619.9010 Section 619.9010 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9010 Additional security. Supplementary collateral to the primary security taken in connection with the loan....

  14. 12 CFR 619.9010 - Additional security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 7 2014-01-01 2014-01-01 false Additional security. 619.9010 Section 619.9010 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM DEFINITIONS § 619.9010 Additional security. Supplementary collateral to the primary security taken in connection with the loan....

  15. Social Security.

    ERIC Educational Resources Information Center

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  16. Physical Security

    SciTech Connect

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  17. A controlled auction market is a practical solution to the shortage of transplantable organs.

    PubMed

    Kevorkian, J

    1992-01-01

    All attempts relying on pure altruism to meet the demand for transplantable donor organs have failed and continue to fail. The incentive of commercialization of an organ market would seem to be the only practical solution at this time. It is almost impossible to set fixed prices for such priceless items as human organs. The only fair, honest, and feasible approach is the establishment of a free and voluntary national or international auction system under the strict supervision and control of an exclusive, specially created administrative entity free of governmental or other partisan interference. The resultant flow of funds could be enormous and would enhance the welfare of all strata of society. Wealthy buyers would be removed from current waiting lists; the donor pool greatly expanded to perhaps surplus; the resultant money used to relieve the financial burdens on families involved, hospitals, insurance companies--and also used to buy organs for the indigent on waiting lists, pay for surgeries and hospitalization, and thereby increase the income and surgical experience of more surgeons. This proposed new system should include all live as well as brain-dead donors, cadavers and consenting individuals facing purposeful and pointless destruction by judicial execution.

  18. Game auction prices are not related to biodiversity contributions of southern African ungulates and large carnivores.

    PubMed

    Dalerum, Fredrik; Miranda, Maria

    2016-01-01

    There is an urgent need for human societies to become environmentally sustainable. Because public policy is largely driven by economic processes, quantifications of the relationship between market prices and environmental values can provide important information for developing strategies towards sustainability. Wildlife in southern Africa is often privately owned and traded at game auctions to be utilized for commercial purposes mostly related to tourism. This market offers an interesting opportunity to evaluate how market prices relate to biologically meaningful species characteristics. In this market, prices were not correlated with species contributions to either phylogenetic or functional diversity, and species contributions to phylogenetic or functional diversity did not influence the trends in prices over time for the past 20 years. Since this economic market did not seem to appreciate evolutionary or ecologically relevant characteristics, we question if the game tourism market may contribute towards biodiversity conservation in southern Africa. We suggest that market prices in general may have limited values as guides for directing conservation and environmental management. We further suggest that there is a need to evaluate what humans value in biological organisms, and how potentially necessary shifts in such values can be instigated. PMID:26911226

  19. Estimating the impact of different cigarette package warning label policies: the auction method.

    PubMed

    Thrasher, James F; Rousu, Matthew C; Anaya-Ocampo, Rafael; Reynales-Shigematsu, Luz Myriam; Arillo-Santillán, Edna; Hernández-Avila, Mauricio

    2007-12-01

    The study estimated the reduction in demand associated with implementing cigarette package warning labels that contain imagery illustrating the consequences of smoking. The experimental auction method was used, wherein adult smokers in Mexico (n=89) placed separate bids on two packs of cigarettes: one with a text-only warning label and the other with a warning label that included text and a graphic image. Differences in the values attributed to each pack were assessed using t-tests and multivariate regression. The pack with the graphic image had a mean attributed value which was 17% lower ($3.21 pesos) than the pack with the text-only warning, and this difference remained statistically significant within subgroups defined by sociodemographics, amount of smoking, number of quit attempts, and levels of perceived smoking risks. In the multivariate model, the difference in attributed values was greater among females than males, but no such differences were found for other sociodemographic or smoking-related variables. The consistently lower value that smokers attributed to cigarette packages with the graphic warning label indicates that these labels are likely to reduce cigarette demand. PMID:17630221

  20. Learning Based Bidding Strategy for HVAC Systems in Double Auction Retail Energy Markets

    SciTech Connect

    Sun, Yannan; Somani, Abhishek; Carroll, Thomas E.

    2015-07-01

    In this paper, a bidding strategy is proposed using reinforcement learning for HVAC systems in a double auction market. The bidding strategy does not require a specific model-based representation of behavior, i.e., a functional form to translate indoor house temperatures into bid prices. The results from reinforcement learning based approach are compared with the HVAC bidding approach used in the AEP gridSMART® smart grid demonstration project and it is shown that the model-free (learning based) approach tracks well the results from the model-based behavior. Successful use of model-free approaches to represent device-level economic behavior may help develop similar approaches to represent behavior of more complex devices or groups of diverse devices, such as in a building. Distributed control requires an understanding of decision making processes of intelligent agents so that appropriate mechanisms may be developed to control and coordinate their responses, and model-free approaches to represent behavior will be extremely useful in that quest.

  1. Reverse Auction: A Potential Strategy for Reduction of Pharmacological Therapy Cost

    PubMed Central

    Brandão, Sara Michelly Gonçalves; Issa, Victor Sarli; Ayub-Ferreira, Silvia Moreira; Storer, Samantha; Gonçalves, Bianca Gigliotti; Santos, Valter Garcia; Carvas Junior, Nelson; Guimarães, Guilherme Veiga; Bocchi, Edimar Alcides

    2015-01-01

    Background Polypharmacy is a significant economic burden. Objective We tested whether using reverse auction (RA) as compared with commercial pharmacy (CP) to purchase medicine results in lower pharmaceutical costs for heart failure (HF) and heart transplantation (HT) outpatients. Methods We compared the costs via RA versus CP in 808 HF and 147 HT patients followed from 2009 through 2011, and evaluated the influence of clinical and demographic variables on cost. Results The monthly cost per patient for HF drugs acquired via RA was $10.15 (IQ 3.51-40.22) versus $161.76 (IQ 86.05‑340.15) via CP; for HT, those costs were $393.08 (IQ 124.74-774.76) and $1,207.70 (IQ 604.48-2,499.97), respectively. Conclusion RA may reduce the cost of prescription drugs for HF and HT, potentially making HF treatment more accessible. Clinical characteristics can influence the cost and benefits of RA. RA may be a new health policy strategy to reduce costs of prescribed medications for HF and HT patients, reducing the economic burden of treatment. PMID:26200898

  2. Emergence of Cooperative Long-Term Market Loyalty in Double Auction Markets.

    PubMed

    Alorić, Aleksandra; Sollich, Peter; McBurney, Peter; Galla, Tobias

    2016-01-01

    Loyal buyer-seller relationships can arise by design, e.g. when a seller tailors a product to a specific market niche to accomplish the best possible returns, and buyers respond to the dedicated efforts the seller makes to meet their needs. We ask whether it is possible, instead, for loyalty to arise spontaneously, and in particular as a consequence of repeated interaction and co-adaptation among the agents in a market. We devise a stylized model of double auction markets and adaptive traders that incorporates these features. Traders choose where to trade (which market) and how to trade (to buy or to sell) based on their previous experience. We find that when the typical scale of market returns (or, at fixed scale of returns, the intensity of choice) become higher than some threshold, the preferred state of the system is segregated: both buyers and sellers are segmented into subgroups that are persistently loyal to one market over another. We characterize the segregated state analytically in the limit of large markets: it is stabilized by some agents acting cooperatively to enable trade, and provides higher rewards than its unsegregated counterpart both for individual traders and the population as a whole. PMID:27120473

  3. Emergence of Cooperative Long-Term Market Loyalty in Double Auction Markets

    PubMed Central

    Alorić, Aleksandra; Sollich, Peter; McBurney, Peter; Galla, Tobias

    2016-01-01

    Loyal buyer-seller relationships can arise by design, e.g. when a seller tailors a product to a specific market niche to accomplish the best possible returns, and buyers respond to the dedicated efforts the seller makes to meet their needs. We ask whether it is possible, instead, for loyalty to arise spontaneously, and in particular as a consequence of repeated interaction and co-adaptation among the agents in a market. We devise a stylized model of double auction markets and adaptive traders that incorporates these features. Traders choose where to trade (which market) and how to trade (to buy or to sell) based on their previous experience. We find that when the typical scale of market returns (or, at fixed scale of returns, the intensity of choice) become higher than some threshold, the preferred state of the system is segregated: both buyers and sellers are segmented into subgroups that are persistently loyal to one market over another. We characterize the segregated state analytically in the limit of large markets: it is stabilized by some agents acting cooperatively to enable trade, and provides higher rewards than its unsegregated counterpart both for individual traders and the population as a whole. PMID:27120473

  4. Game auction prices are not related to biodiversity contributions of southern African ungulates and large carnivores

    PubMed Central

    Dalerum, Fredrik; Miranda, Maria

    2016-01-01

    There is an urgent need for human societies to become environmentally sustainable. Because public policy is largely driven by economic processes, quantifications of the relationship between market prices and environmental values can provide important information for developing strategies towards sustainability. Wildlife in southern Africa is often privately owned and traded at game auctions to be utilized for commercial purposes mostly related to tourism. This market offers an interesting opportunity to evaluate how market prices relate to biologically meaningful species characteristics. In this market, prices were not correlated with species contributions to either phylogenetic or functional diversity, and species contributions to phylogenetic or functional diversity did not influence the trends in prices over time for the past 20 years. Since this economic market did not seem to appreciate evolutionary or ecologically relevant characteristics, we question if the game tourism market may contribute towards biodiversity conservation in southern Africa. We suggest that market prices in general may have limited values as guides for directing conservation and environmental management. We further suggest that there is a need to evaluate what humans value in biological organisms, and how potentially necessary shifts in such values can be instigated. PMID:26911226

  5. Secure Objectives for School Security

    ERIC Educational Resources Information Center

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  6. Secure PVM

    SciTech Connect

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  7. Secure portal.

    SciTech Connect

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing the secure portal

  8. Exercise-referral scheme to promote physical activity among hypertensive patients: design of a cluster randomized trial in the Primary Health Care Units of Mexico’s Social Security System

    PubMed Central

    2014-01-01

    Background Although the benefits of physical activity (PA) on to prevent and manage non-communicable diseases are well known, strategies to help increase the levels of PA among different populations are limited. Exercise-referral schemes have emerged as one effective approach to promote PA; however, there is uncertainty about the feasibility and effectiveness of these schemes in settings outside high-income countries. This study will examine the effectiveness of a scheme to refer hypertensive patients identified in Primary Health Care facilities (PHCU) of the Mexican social security institution to a group PA program offered in the same institution. Methods and design We will describe the methods of a cluster randomized trial study designed to evaluate the effectiveness of an exercise referral scheme to increasing physical activity in hypertensive patients compared to a non-referral scheme. Four PHCU were selected for the study; the PHCU will take part as the unit of randomization and sedentary hypertensive patients as the unit of assessment. 2 PHCU of control group (GC) will provide information to hypertensive patients about physical activity benefits and ways to increase it safely. 2 PHCU of intervention group (IG) will refer patients to sports facilities at the same institution, to follow a group-based PA program developed to increase the PA levels with a designed based on the Transtheoretical Model and Social Cognitive Theory. To evaluate the effects of the intervention as well as short-term maintenance of the intervention’s effects, PA will be assessed at baseline, at 24 and 32 weeks of follow-up. The main outcome will be the difference before and after intervention in the percentage of participants meeting recommended levels of PA between and within intervention and control groups. PA will be measured through self-report and with objective measure by accelerometer. Discussion This study will allow us to evaluate a multidisciplinary effort to link the primary

  9. Factors affecting the selling price of feeder cattle sold at Arkansas livestock auctions in 2005.

    PubMed

    Barham, B L; Troxel, T R

    2007-12-01

    Data were collected from 15 Arkansas livestock auctions to determine factors affecting selling price. Data included how calves were sold (single or groups), sex, breed or breed type, color, muscle thickness, horn status, frame score, fill, body condition, age, health, BW, and price. Data were randomly collected on 52,401 lots consisting of 105,542 calves. Selling prices for steers ($124.20 +/- 0.07), bulls ($117.93 +/- 0.12), and heifers ($112.81 +/- 0.07) were different from each other (P <0.001). Hereford x Charolais feeder calves sold for the highest price ($122.66 +/- 0.14) and Longhorns sold for the lowest price ($74.52 +/- 0.46). Yellow feeder cattle received the highest selling price ($96.47 +/- 0.12), and spotted or striped feeder cattle received the lowest price ($83.84 +/- 0.23). The selling price of singles was lower than the price for calves sold in groups of 6 or more ($117.26 +/- 0.06 vs. $122.61 +/- 0.21; P <0.001). For cattle classified as having muscle scores of 1, 2, 3, and 4, selling prices were $120.45 +/- 0.05, $111.31 +/- 0.09, $96.28 +/- 0.44, and $82.21 +/- 1.87, respectively. Polled feeder cattle sold for $118.57 +/- 0.05, and horned feeder cattle sold for $114.87 +/- 0.14 (P <0.001). Interactions (P <0.001) were detected between frame score and BW groups, and muscle score and BW groups on the selling price of cattle. A number of management and genetic factors affected the selling price of feeder cattle.

  10. Security in the Schools.

    ERIC Educational Resources Information Center

    Nelson, Jesse

    1997-01-01

    Discusses the benefits of school library security, software security, and computer security systems. Describes specific products for each type of security system. A sidebar lists names and addresses of security manufacturers and distributors. (AEF)

  11. Data security.

    PubMed

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement.

  12. Data security.

    PubMed

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement. PMID:27581899

  13. Cryptographic Combinatorial Securities Exchanges

    NASA Astrophysics Data System (ADS)

    Thorpe, Christopher; Parkes, David C.

    We present a useful new mechanism that facilitates the atomic exchange of many large baskets of securities in a combinatorial exchange. Cryptography prevents information about the securities in the baskets from being exploited, enhancing trust. Our exchange offers institutions who wish to trade large positions a new alternative to existing methods of block trading: they can reduce transaction costs by taking advantage of other institutions’ available liquidity, while third party liquidity providers guarantee execution—preserving their desired portfolio composition at all times. In our exchange, institutions submit encrypted orders which are crossed, leaving a “remainder”. The exchange proves facts about the portfolio risk of this remainder to third party liquidity providers without revealing the securities in the remainder, the knowledge of which could also be exploited. The third parties learn either (depending on the setting) the portfolio risk parameters of the remainder itself, or how their own portfolio risk would change if they were to incorporate the remainder into a portfolio they submit. In one setting, these third parties submit bids on the commission, and the winner supplies necessary liquidity for the entire exchange to clear. This guaranteed clearing, coupled with external price discovery from the primary markets for the securities, sidesteps difficult combinatorial optimization problems. This latter method of proving how taking on the remainder would change risk parameters of one’s own portfolio, without revealing the remainder’s contents or its own risk parameters, is a useful protocol of independent interest.

  14. A Virtual Field Trip to the Real World of Cap and Trade: Environmental Economics and the EPA SO[subscript 2] Allowance Auction

    ERIC Educational Resources Information Center

    Lewis, Lynne Y.

    2011-01-01

    In the spring of 2001, Bates College Environmental Economics classes bought their first sulfur dioxide emissions allowance at U.S. Environmental Protection Agency's annual auction, then conducted by the Chicago Board of Trade. In the spring of 2010, they bought their 22nd through 34th allowances. This article describes a three-part method for…

  15. A revealed preference approach to estimating supply curves for ecosystem services: use of auctions to set payments for soil erosion control in Indonesia.

    PubMed

    Jack, B Kelsey; Leimona, Beria; Ferraro, Paul J

    2009-04-01

    To supply ecosystem services, private landholders incur costs. Knowledge of these costs is critical for the design of conservation-payment programs. Estimating these costs accurately is difficult because the minimum acceptable payment to a potential supplier is private information. We describe how an auction of payment contracts can be designed to elicit this information during the design phase of a conservation-payment program. With an estimate of the ecosystem-service supply curve from a pilot auction, conservation planners can explore the financial, ecological, and socioeconomic consequences of alternative scaled-up programs. We demonstrate the potential of our approach in Indonesia, where soil erosion on coffee farms generates downstream ecological and economic costs. Bid data from a small-scale, uniform-price auction for soil-conservation contracts allowed estimates of the costs of a scaled-up program, the gain from integrating biophysical and economic data to target contracts, and the trade-offs between poverty alleviation and supply of ecosystem services. Our study illustrates an auction-based approach to revealing private information about the costs of supplying ecosystem services. Such information can improve the design of programs devised to protect and enhance ecosystem services.

  16. 78 FR 65982 - Auction of H Block Licenses in the 1915-1920 MHz and 1995-2000 MHz Bands Rescheduled for January...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-04

    ... Comment Public Notice, 78 FR 45524, July 29, 2013. B. Description of Licenses To Be Offered in Auction 96 4. In the H Block Report and Order, 78 FR 50213, August 16, 2013, the Commission concluded that... violate 47 CFR 1.2105(c), particularly in light of the limited information procedures in effect...

  17. Security system

    DOEpatents

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  18. Security seal

    DOEpatents

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  19. Statistical security for Social Security.

    PubMed

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts. PMID:22592944

  20. Nuclear security

    SciTech Connect

    Dingell, J.D.

    1991-02-01

    The Department of Energy's (DOE) Lawrence Livermore National Laboratory, located in Livermore, California, generates and controls large numbers of classified documents associated with the research and testing of nuclear weapons. Concern has been raised about the potential for espionage at the laboratory and the national security implications of classified documents being stolen. This paper determines the extent of missing classified documents at the laboratory and assesses the adequacy of accountability over classified documents in the laboratory's custody. Audit coverage was limited to the approximately 600,000 secret documents in the laboratory's custody. The adequacy of DOE's oversight of the laboratory's secret document control program was also assessed.

  1. 33 CFR 126.35 - Primary responsibility.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Primary responsibility. 126.35...) WATERFRONT FACILITIES HANDLING OF DANGEROUS CARGO AT WATERFRONT FACILITIES § 126.35 Primary responsibility... waterfront facilities from their primary responsibility for the security of such vessels, docks,...

  2. 33 CFR 126.35 - Primary responsibility.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Primary responsibility. 126.35...) WATERFRONT FACILITIES HANDLING OF DANGEROUS CARGO AT WATERFRONT FACILITIES § 126.35 Primary responsibility... waterfront facilities from their primary responsibility for the security of such vessels, docks,...

  3. 31 CFR 356.11 - How are bids submitted in an auction?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... issue the awarded securities in the commercial book-entry system, in TreasuryDirect ®, or in Legacy Treasury Direct ® (See § 356.4). The approved submission methods for these respective systems are explained..., whether or not such bids are authorized. (b) Commercial book-entry system. (1) If you are a submitter...

  4. 31 CFR 356.11 - How are bids submitted in an auction?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... us to issue the awarded securities in the commercial book-entry system, in TreasuryDirect ®, or in Legacy Treasury Direct ® (See § 356.4). The approved submission methods for these respective systems are..., whether or not such bids are authorized. (b) Commercial book-entry system. (1) If you are a submitter...

  5. 31 CFR 356.11 - How are bids submitted in an auction?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... issue the awarded securities in the commercial book-entry system, in TreasuryDirect ®, or in Legacy Treasury Direct ® (See § 356.4). The approved submission methods for these respective systems are explained..., whether or not such bids are authorized. (b) Commercial book-entry system. (1) If you are a submitter...

  6. Responses to the advanced notice of proposed rulemaking EPA published on June 6, 1996 regarding changes to the EPA allowance auctions and elimination of the direct sale

    SciTech Connect

    Critchfield, L.R.

    1997-12-31

    On June 6, 1996, EPA`s Acid Rain Program published an advance notice of proposed rulemaking (ANPRM) in the Federal Register seeking comment on: (1) whether to change the design of the annual sulfur dioxide (SO{sub 2}) allowance auctions; (2) whether to change the timing of the allowance auctions; (3) whether to change the requirement that the minimum price of offered allowances must be in whole dollars, and (4) whether EPA should propose the ability to submit allowance transfers electronically. EPA also published on that day a proposed and direct final rule on whether to eliminate the direct sale. This paper documents the issues addressed in the ANPRM, the comments EPA received, and EPA`s responses to those comments. EPA received comments from 14 separate commenters.

  7. Estimating the impact of various menu labeling formats on parents' demand for fast-food kids' meals for their children: An experimental auction.

    PubMed

    Hobin, Erin; Lillico, Heather; Zuo, Fei; Sacco, Jocelyn; Rosella, Laura; Hammond, David

    2016-10-01

    This study experimentally tested whether parents' demand for fast-food kids' meals for their children is influenced by various menu labeling formats disclosing calorie and sodium information. The study also examined the effect of various menu labeling formats on parents' ability to identify fast-food kids' meals with higher calorie and sodium content. Online surveys were conducted among parents of children aged 3-12. Parents were randomized to view 1 of 5 menu conditions: 1) No Nutrition Information; 2) Calories-Only; 3) Calories + Contextual Statement (CS); 4) Calories, Sodium, + CS; and, 5) Calorie and Sodium in Traffic Lights + CS. Using an established experimental auction study design, parents viewed replicated McDonald's menus according to their assigned condition and were asked to bid on 4 Happy Meals. A randomly selected price was chosen; bids equal to or above this price "won" the auction, and bids less than this price "lost" the auction. After the auction, participants were asked to identify the Happy Meal with the highest calories and sodium content. Adjusting for multiple comparisons and covariates, the Calories, Sodium, + CS menu had a mean attributed value across all 4 Happy Meals which was 8% lower (-$0.31) than the Calories + CS menu (p < 0.05). Significantly more parents in the 4 menu conditions providing calories were able to correctly identify the Happy Meal with the highest calories (p < 0.0001) and significantly more parents in the 2 conditions providing sodium information were able to correctly identify the Happy Meal with the highest sodium content (p < 0.0001). Menus disclosing both calories and sodium information may reduce demand for fast-food kids' meals and better support parents in making more informed and healthier food choices for their children. PMID:27317971

  8. Estimating the impact of various menu labeling formats on parents' demand for fast-food kids' meals for their children: An experimental auction.

    PubMed

    Hobin, Erin; Lillico, Heather; Zuo, Fei; Sacco, Jocelyn; Rosella, Laura; Hammond, David

    2016-10-01

    This study experimentally tested whether parents' demand for fast-food kids' meals for their children is influenced by various menu labeling formats disclosing calorie and sodium information. The study also examined the effect of various menu labeling formats on parents' ability to identify fast-food kids' meals with higher calorie and sodium content. Online surveys were conducted among parents of children aged 3-12. Parents were randomized to view 1 of 5 menu conditions: 1) No Nutrition Information; 2) Calories-Only; 3) Calories + Contextual Statement (CS); 4) Calories, Sodium, + CS; and, 5) Calorie and Sodium in Traffic Lights + CS. Using an established experimental auction study design, parents viewed replicated McDonald's menus according to their assigned condition and were asked to bid on 4 Happy Meals. A randomly selected price was chosen; bids equal to or above this price "won" the auction, and bids less than this price "lost" the auction. After the auction, participants were asked to identify the Happy Meal with the highest calories and sodium content. Adjusting for multiple comparisons and covariates, the Calories, Sodium, + CS menu had a mean attributed value across all 4 Happy Meals which was 8% lower (-$0.31) than the Calories + CS menu (p < 0.05). Significantly more parents in the 4 menu conditions providing calories were able to correctly identify the Happy Meal with the highest calories (p < 0.0001) and significantly more parents in the 2 conditions providing sodium information were able to correctly identify the Happy Meal with the highest sodium content (p < 0.0001). Menus disclosing both calories and sodium information may reduce demand for fast-food kids' meals and better support parents in making more informed and healthier food choices for their children.

  9. [Current status of illegal trade in pharmaceutical products on Internet auction sites in Japan and responses of site administrators to such transactions].

    PubMed

    Ohtani, Hisakazu; Imaoka, Ayuko; Akiyoshi, Takeshi

    2015-01-01

    In Japan, it is illegal to sell pharmaceuticals on Internet auction sites, although a considerable number of pharmaceuticals are listed on such sites. We investigated the current situation regarding the illegal trade in pharmaceuticals on Japanese Internet auction sites and the responses of site administrators to such transactions. We searched for pharmaceuticals and "gray" items that were suspected of being pharmaceuticals on Yahoo-oku! (Yahoo! Auctions, Japan) over a 37-day period and then submitted violation reports indicating that selling pharmaceuticals is illegal or that the description of an item was insufficient. The reports were directed to the site administrators and forwarded to the sellers. One hundred and six pharmaceutical products and 34 gray items were identified during the study period. After the submission of the violation reports, only 28 of the pharmaceutical products and one of the gray items were deleted by the administrator, while 18 of the pharmaceutical products and 7 of the gray items were withdrawn by their sellers. However, 41 pharmaceuticals and 20 gray items were sold. Most of the gray items were listed using characteristic terms or abbreviations without photographic images. More than 70% of the identified pharmaceuticals had a contraindication(s) other than hypersensitivity. In conclusion, the illegal trade in pharmaceuticals on Internet auction sites remains a serious problem in Japan, and the responses of site administrators to such transactions are inadequate. The government and pharmaceutical industry may have to take measures such as providing public and administrative guidance to stop the illegal trade in pharmaceuticals on the Internet.

  10. Predictive Dynamic Security Assessment through Advanced Computing

    SciTech Connect

    Huang, Zhenyu; Diao, Ruisheng; Jin, Shuangshuang; Chen, Yousu

    2014-11-30

    Abstract— Traditional dynamic security assessment is limited by several factors and thus falls short in providing real-time information to be predictive for power system operation. These factors include the steady-state assumption of current operating points, static transfer limits, and low computational speed. This addresses these factors and frames predictive dynamic security assessment. The primary objective of predictive dynamic security assessment is to enhance the functionality and computational process of dynamic security assessment through the use of high-speed phasor measurements and the application of advanced computing technologies for faster-than-real-time simulation. This paper presents algorithms, computing platforms, and simulation frameworks that constitute the predictive dynamic security assessment capability. Examples of phasor application and fast computation for dynamic security assessment are included to demonstrate the feasibility and speed enhancement for real-time applications.

  11. Encouraging stormwater management using a reverse auction: potential to restore stream ecosystems

    EPA Science Inventory

    Stormwater runoff is the primary mechanism by which urbanizing landscapes disrupt natural, stream ecosystems. Source control management has been demonstrated as an effective and cost-efficient method for reducing stormwater runoff; however, sufficiently widespread implementation...

  12. Examining the relationship between psychosocial and behavioral proxies for future consumption behavior: self-reported impact and bidding behavior in an experimental auction study on cigarette labeling

    PubMed Central

    Rousu, Matthew C.; Thrasher, James F.

    2014-01-01

    Experimental and observational research often involves asking consumers to self-report the impact of some proposed option. Because self-reported responses involve no consequence to the respondent for falsely revealing how he or she feels about an issue, self-reports may be subject to social desirability and other influences that bias responses in important ways. In this article, we analyzed data from an experiment on the impact of cigarette packaging and pack warnings, comparing smokers’ self-reported impact (four-item scale) and the bids they placed in experimental auctions to estimate differences in demand. The results were consistent across methods; however, the estimated effect size associated with different warning labels was two times greater for the four-item self-reported response scale when compared to the change in demand as indicated by auction bids. Our study provides evidence that self-reported psychosocial responses provide a valid proxy for behavioral change as reflected by experimental auction bidding behavior. More research is needed to better understand the advantages and disadvantages of behavioral economic methods and traditional self-report approaches to evaluating health behavior change interventions. PMID:24399267

  13. Examining the relationship between psychosocial and behavioral proxies for future consumption behavior: self-reported impact and bidding behavior in an experimental auction study on cigarette labeling.

    PubMed

    Rousu, Matthew C; Thrasher, James F

    2014-04-01

    Experimental and observational research often involves asking consumers to self-report the impact of some proposed option. Because self-reported responses involve no consequence to the respondent for falsely revealing how he or she feels about an issue, self-reports may be subject to social desirability and other influences that bias responses in important ways. In this article, we analyzed data from an experiment on the impact of cigarette packaging and pack warnings, comparing smokers' self-reported impact (four-item scale) and the bids they placed in experimental auctions to estimate differences in demand. The results were consistent across methods; however, the estimated effect size associated with different warning labels was two times greater for the four-item self-reported response scale when compared to the change in demand as indicated by auction bids. Our study provides evidence that self-reported psychosocial responses provide a valid proxy for behavioral change as reflected by experimental auction bidding behavior. More research is needed to better understand the advantages and disadvantages of behavioral economic methods and traditional self-report approaches to evaluating health behavior change interventions. PMID:24399267

  14. Security for grids

    SciTech Connect

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  15. Computer security engineering management

    SciTech Connect

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system.

  16. Transportation Security Administration

    MedlinePlus

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index What Can I Bring? Search form Apples Main menu Administrator Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  17. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  18. Redefining security.

    PubMed

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  19. Redefining security.

    PubMed

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services. PMID:12343986

  20. Information Security Awareness On-Line Materials Design with Knowledge Maps

    ERIC Educational Resources Information Center

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  1. Security guide for subcontractors

    SciTech Connect

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  2. Syphilis - primary

    MedlinePlus

    Primary syphilis; Secondary syphilis; Late syphilis; Tertiary syphilis ... Syphilis is a sexually transmitted, infectious disease caused by the spirochete bacterium Treponema pallidum . This bacterium causes ...

  3. From Secure Memories to Smart Card Security

    NASA Astrophysics Data System (ADS)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  4. Poisson-process generalization for the trading waiting-time distribution in a double-auction mechanism

    NASA Astrophysics Data System (ADS)

    Cincotti, Silvano; Ponta, Linda; Raberto, Marco; Scalas, Enrico

    2005-05-01

    In this paper, empirical analyses and computational experiments are presented on high-frequency data for a double-auction (book) market. Main objective of the paper is to generalize the order waiting time process in order to properly model such empirical evidences. The empirical study is performed on the best bid and best ask data of 7 U.S. financial markets, for 30-stock time series. In particular, statistical properties of trading waiting times have been analyzed and quality of fits is evaluated by suitable statistical tests, i.e., comparing empirical distributions with theoretical models. Starting from the statistical studies on real data, attention has been focused on the reproducibility of such results in an artificial market. The computational experiments have been performed within the Genoa Artificial Stock Market. In the market model, heterogeneous agents trade one risky asset in exchange for cash. Agents have zero intelligence and issue random limit or market orders depending on their budget constraints. The price is cleared by means of a limit order book. The order generation is modelled with a renewal process. Based on empirical trading estimation, the distribution of waiting times between two consecutive orders is modelled by a mixture of exponential processes. Results show that the empirical waiting-time distribution can be considered as a generalization of a Poisson process. Moreover, the renewal process can approximate real data and implementation on the artificial stocks market can reproduce the trading activity in a realistic way.

  5. Building Security into Schools.

    ERIC Educational Resources Information Center

    Kosar, John E.; Ahmed, Faruq

    2000-01-01

    Offers tips for redesigning safer school sites; installing and implementing security technologies (closed-circuit television cameras, door security hardware, electronic security panels, identification cards, metal detectors, and panic buttons); educating students and staff about security functions; and minimizing costs via a comprehensive campus…

  6. Unix Security Cookbook

    NASA Astrophysics Data System (ADS)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  7. School Security Roundtable, 2000.

    ERIC Educational Resources Information Center

    Agron, Joe, Ed.; Anderson, Larry, Ed.

    A roundtable discussion is presented revealing what experts say about school security problems and how they are being addressed. Also included are trend data from the School Security 2000 survey revealing top security concerns, strategies, and security equipment preferences; how site surveys can be used to keep schools safe; and how creating a…

  8. Chapter 3: Energy Security

    SciTech Connect

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  9. Security guide for subcontractors

    SciTech Connect

    Not Available

    1988-01-01

    The objectives of security in the Department of Energy (DOE) contractor/subcontractor program are: (1) to ensure the protection of information which, if related, would endanger the common defense and security of the nation; and (2) to safeguard the plants and installations of the DOE and its contractors in order that research and production programs will not be interrupted. To achieve these objectives, security responsibilities have been divided into three interdependent categories: personnel security, physical security, and security education and quality audits. This guide presents instructions for implementing a security program at a contractor/subcontractor site.

  10. 9 CFR 3.6 - Primary enclosures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Cats 1 Facilities and Operating Standards § 3.6 Primary enclosures. Primary enclosures for dogs and... they: (i) Have no sharp points or edges that could injure the dogs and cats; (ii) Protect the dogs and cats from injury; (iii) Contain the dogs and cats securely; (iv) Keep other animals from entering...

  11. Healthcare is primary.

    PubMed

    Kumar, Raman

    2015-01-01

    India is undergoing a rapid transformation in terms of governance, administrative reforms, newer policy develoment, and social movements. India is also considered one of the most vibrant economies in the world. The current discourse in public space is dominated by issues such as economic development, security, corruption free governance, gender equity, and women safety. Healthcare though remains a pressing need of population; seems to have taken a backseat. In the era of decreasing subsidies and cautious investment in social sectors, the 2(nd) National Conference on Family Medicine and Primary Care 2015 (FMPC) brought a focus on "healthcare" in India. The theme of this conference was "Healthcare is Primary." The conference participants discussed on the theme of why healthcare should be a national priority and why strong primary care should remain at the center of healthcare delivery system. The experts recommended that India needs to strengthen the "general health system" instead of focusing on disease based vertical programs. Public health system should have capacity and skill pool to be able to deliver person centered comprehensive health services to the community. Proactive implementation of policies towards human resource in health is the need of the hour. As the draft National Health Policy 2015 is being debated, "family medicine" (academic primary care), the unfinished agenda of National Health Policy 2002, remains a priority area of implementation. PMID:26985402

  12. Healthcare is primary.

    PubMed

    Kumar, Raman

    2015-01-01

    India is undergoing a rapid transformation in terms of governance, administrative reforms, newer policy develoment, and social movements. India is also considered one of the most vibrant economies in the world. The current discourse in public space is dominated by issues such as economic development, security, corruption free governance, gender equity, and women safety. Healthcare though remains a pressing need of population; seems to have taken a backseat. In the era of decreasing subsidies and cautious investment in social sectors, the 2(nd) National Conference on Family Medicine and Primary Care 2015 (FMPC) brought a focus on "healthcare" in India. The theme of this conference was "Healthcare is Primary." The conference participants discussed on the theme of why healthcare should be a national priority and why strong primary care should remain at the center of healthcare delivery system. The experts recommended that India needs to strengthen the "general health system" instead of focusing on disease based vertical programs. Public health system should have capacity and skill pool to be able to deliver person centered comprehensive health services to the community. Proactive implementation of policies towards human resource in health is the need of the hour. As the draft National Health Policy 2015 is being debated, "family medicine" (academic primary care), the unfinished agenda of National Health Policy 2002, remains a priority area of implementation.

  13. Healthcare is primary

    PubMed Central

    Kumar, Raman

    2015-01-01

    India is undergoing a rapid transformation in terms of governance, administrative reforms, newer policy develoment, and social movements. India is also considered one of the most vibrant economies in the world. The current discourse in public space is dominated by issues such as economic development, security, corruption free governance, gender equity, and women safety. Healthcare though remains a pressing need of population; seems to have taken a backseat. In the era of decreasing subsidies and cautious investment in social sectors, the 2nd National Conference on Family Medicine and Primary Care 2015 (FMPC) brought a focus on “healthcare” in India. The theme of this conference was “Healthcare is Primary.” The conference participants discussed on the theme of why healthcare should be a national priority and why strong primary care should remain at the center of healthcare delivery system. The experts recommended that India needs to strengthen the “general health system” instead of focusing on disease based vertical programs. Public health system should have capacity and skill pool to be able to deliver person centered comprehensive health services to the community. Proactive implementation of policies towards human resource in health is the need of the hour. As the draft National Health Policy 2015 is being debated, “family medicine” (academic primary care), the unfinished agenda of National Health Policy 2002, remains a priority area of implementation. PMID:26985402

  14. [Primary hyperparathyroidism].

    PubMed

    Maruani, G; Cornière, N; Nicolet, L; Baron, S; Courbebaisse, M; Renaud, S; Houillier, P

    2013-10-01

    For the past 40 years, primary hyperparathyroidism has been recognized as a common endocrine disease which is, most often, "non-symptomatic", without the occurrence of nephrolithiasis or osteitis fibrosa cystica. Our knowledge in the pathophysiology has increased largely and diagnosis of primary hyperparathyroidism is usually easy. The only radical treatment is surgery and the surgical indications have been codified by several consensus conferences. For patients who do not undergo surgery, prolonged medical monitoring is needed.

  15. Practical Computer Security through Cryptography

    NASA Technical Reports Server (NTRS)

    McNab, David; Twetev, David (Technical Monitor)

    1998-01-01

    The core protocols upon which the Internet was built are insecure. Weak authentication and the lack of low level encryption services introduce vulnerabilities that propagate upwards in the network stack. Using statistics based on CERT/CC Internet security incident reports, the relative likelihood of attacks via these vulnerabilities is analyzed. The primary conclusion is that the standard UNIX BSD-based authentication system is by far the most commonly exploited weakness. Encryption of Sensitive password data and the adoption of cryptographically-based authentication protocols can greatly reduce these vulnerabilities. Basic cryptographic terminology and techniques are presented, with attention focused on the ways in which technology such as encryption and digital signatures can be used to protect against the most commonly exploited vulnerabilities. A survey of contemporary security software demonstrates that tools based on cryptographic techniques, such as Kerberos, ssh, and PGP, are readily available and effectively close many of the most serious security holes. Nine practical recommendations for improving security are described.

  16. SAS: A Secure Aglet Server

    SciTech Connect

    Jean, Evens; Jiao, Yu; Hurson, Ali R.; Potok, Thomas E

    2007-01-01

    Despite the fact that mobile agents have received increasing attention in various research efforts, the use of the paradigm in practical applications has yet to fully emerge. With the presence of infrastructure to support the development of mobile agent applications, security concerns act as the primary deterrent against such trends. Numerous studies have been conducted to address the security issues of mobile agents with a strong focus on the theoretical aspect of the problem. This work attempts to bridge the gap from theory to practice by analyzing the security mechanisms available in Aglet. We herein propose several mechanisms, stemming from theoretical advancements, intended to protect both agents and hosts in order to foster the development of business applications that fully exploit the benefits of agent technology. The proposed mechanisms lay the foundation for implementation of application specific protocols dotted with access control, secured communication and ability to detect tampering of agent data. We demonstrate our contribution through application scenarios of a prototyped Information Retrieval system.

  17. Digital security technology simplified.

    PubMed

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  18. Primary hyperparathyroidism

    PubMed Central

    Madkhali, Tarıq; Alhefdhi, Amal; Chen, Herbert; Elfenbein, Dawn

    2016-01-01

    Primary hyperparathyroidism is a common endocrine disorder caused by overactivation of parathyroid glands resulting in excessive release of parathyroid hormone. The resultant hypercalcemia leads to a myriad of symptoms. Primary hyperparathyroidism may increase a patient’s morbidity and even mortality if left untreated. During the last few decades, disease presentation has shifted from the classic presentation of severe bone and kidney manifestations to most patients now being diagnosed on routine labs. Although surgery is the only curative therapy, many advances have been made over the past decades in the diagnosis and the surgical management of primary hyperparathyroidism. The aim of this review is to summarize the characteristics of the disease, the work up, and the treatment options. PMID:26985167

  19. 49 CFR 1580.101 - Rail security coordinator.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... private cars, including business/office cars and circus trains, on or connected to the general railroad...) Serves as the primary contact for intelligence information and security-related activities...

  20. Security system signal supervision

    SciTech Connect

    Chritton, M.R. ); Matter, J.C. )

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  1. Security: Progress and Challenges

    ERIC Educational Resources Information Center

    Luker, Mark A.

    2004-01-01

    The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…

  2. School Violence: Physical Security.

    ERIC Educational Resources Information Center

    Utah State Office of Education, Salt Lake City.

    This booklet provides an overview of security technology product areas that might be appropriate and affordable for school applications. Topics cover security concepts and operational issues; security issues when designing for new schools; the role of maintenance; video camera use; walk-through metal detectors; duress alarm devices; and a partial…

  3. Selecting Security Technology Providers

    ERIC Educational Resources Information Center

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  4. Homeland Security and Information.

    ERIC Educational Resources Information Center

    Relyea, Harold C.

    2002-01-01

    Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)

  5. Filling a Security Gap

    ERIC Educational Resources Information Center

    Parks and Recreation, 1978

    1978-01-01

    A new type of public facility security system, utilizing a radio system and voice logging recorder, has effectively improved security at the John F. Kennedy Center for the Performing Arts. The system monitors security operations, provides a reliable record in the case of conflicting claims, and accurately pinpoints the time of events. (DS)

  6. 31 CFR 363.22 - Who has the right to conduct online transactions in book-entry securities?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... transaction in a security held in the primary owner's TreasuryDirect account. (See § 363.20(e)). (ii) If the primary owner has given the secondary owner the right to conduct transactions in a security, and has not revoked that right, then the secondary owner can conduct transactions in the security. Transactions...

  7. 31 CFR 363.22 - Who has the right to conduct online transactions in book-entry securities?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... transaction in a security held in the primary owner's TreasuryDirect account. (See § 363.20(e)). (ii) If the primary owner has given the secondary owner the right to conduct transactions in a security, and has not revoked that right, then the secondary owner can conduct transactions in the security. Transactions...

  8. Secure Transportation Management

    SciTech Connect

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  9. Information Security Management (ISM)

    NASA Astrophysics Data System (ADS)

    Šalgovičová, Jarmila; Prajová, Vanessa

    2012-12-01

    Currently, all organizations have to tackle the issue of information security. The paper deals with various aspects of Information Security Management (ISM), including procedures, processes, organizational structures, policies and control processes. Introduction of Information Security Management should be a strategic decision. The concept and implementation of Information Security Management in an organization are determined by the corporate needs and objectives, security requirements, the processes deployed as well as the size and structure of the organization. The implementation of ISM should be carried out to the extent consistent with the needs of the organization.

  10. Computer Security Systems Enable Access.

    ERIC Educational Resources Information Center

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  11. Balancing Security and Learning. School Security Supplement.

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2002-01-01

    Discusses ways to provide vital safety to schools without inhibiting the learning environment for students. Describes security efforts at Orange County, Florida schools, such as using video cameras, school police officers, and access-control systems. (EV)

  12. Securing collaborative environments

    SciTech Connect

    Agarwal, Deborah; Jackson, Keith; Thompson, Mary

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  13. 33 CFR 6.19-1 - Primary responsibility.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Primary responsibility. 6.19-1... and Waterfront Facilities § 6.19-1 Primary responsibility. Nothing contained in this part shall be... from their primary responsibility for the protection and security of such vessels or...

  14. 46 CFR 169.513 - Types of primary equipment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 7 2011-10-01 2011-10-01 false Types of primary equipment. 169.513 Section 169.513 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Lifesaving and Firefighting Equipment Primary Lifesaving Equipment § 169.513 Types of primary equipment....

  15. 33 CFR 6.19-1 - Primary responsibility.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Primary responsibility. 6.19-1... and Waterfront Facilities § 6.19-1 Primary responsibility. Nothing contained in this part shall be... from their primary responsibility for the protection and security of such vessels or...

  16. 46 CFR 169.513 - Types of primary equipment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Types of primary equipment. 169.513 Section 169.513 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Lifesaving and Firefighting Equipment Primary Lifesaving Equipment § 169.513 Types of primary equipment....

  17. What is Security? A perspective on achieving security

    SciTech Connect

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  18. PACS image security server

    NASA Astrophysics Data System (ADS)

    Cao, Fei; Huang, H. K.

    2004-04-01

    Medical image security in a PACS environment has become a pressing issue as communications of images increasingly extends over open networks, and hospitals are currently hard-pushed by Health Insurance Portability and Accountability Act (HIPAA) to be HIPPA complaint for ensuring health data security. Other security-related guidelines and technical standards continue bringing to the public attention in healthcare. However, there is not an infrastructure or systematic method to implement and deploy these standards in a PACS. In this paper, we first review DICOM Part15 standard for secure communications of medical images and the HIPAA impacts on PACS security, as well as our previous works on image security. Then we outline a security infrastructure in a HIPAA mandated PACS environment using a dedicated PACS image security server. The server manages its own database of all image security information. It acts as an image Authority for checking and certificating the image origin and integrity upon request by a user, as a secure DICOM gateway to the outside connections and meanwhile also as a PACS operation monitor for HIPAA supporting information.

  19. Addressing Software Security

    NASA Technical Reports Server (NTRS)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  20. Beyond grid security

    NASA Astrophysics Data System (ADS)

    Hoeft, B.; Epting, U.; Koenig, T.

    2008-07-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls.

  1. The CSCE forum for security cooperation

    SciTech Connect

    Borawski, J.; George, B.

    1993-10-01

    What are the next steps for arms control in Europe, given the tectonic changes that have shaken the continent over the past four years? Negotiators in Europe, who labored for nearly two decades on the details of conventional force reductions and confidence-building measures, are grappling with that question. On September 22, 1992, a fresh, if perhaps belated, attempt to adapt to the new conditions of the post-Cold War era began in Vienna with the creation of the 54-member Forum for Security Cooperation (FSC). The FSC is the security component of the multifaceted Conference on Security and Cooperation in Europe (CSCEO), which deals with a range of issues, including human rights, in addition to the various items on the security agenda. The forum is facing a task unprecedented in the scope of the CSCE: it is simultaneously trying to address arms control negotiations, security enhancement and cooperation, and conflict prevention. The primary objective of the forum will be to adapt the traditional tools of arms control, including those applied to military activity, to the contemporary {open_quotes}security parlance{close_quotes} of preventive diplomacy, peacemaking, peacekeeping, peace enforcement and peace building.

  2. Center for computer security: Computer Security Group conference. Summary

    SciTech Connect

    Not Available

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  3. Process Control Systems in the Chemical Industry: Safety vs. Security

    SciTech Connect

    Jeffrey Hahn; Thomas Anderson

    2005-04-01

    Traditionally, the primary focus of the chemical industry has been safety and productivity. However, recent threats to our nation’s critical infrastructure have prompted a tightening of security measures across many different industry sectors. Reducing vulnerabilities of control systems against physical and cyber attack is necessary to ensure the safety, security and effective functioning of these systems. The U.S. Department of Homeland Security has developed a strategy to secure these vulnerabilities. Crucial to this strategy is the Control Systems Security and Test Center (CSSTC) established to test and analyze control systems equipment. In addition, the CSSTC promotes a proactive, collaborative approach to increase industry's awareness of standards, products and processes that can enhance the security of control systems. This paper outlines measures that can be taken to enhance the cybersecurity of process control systems in the chemical sector.

  4. Public key infrastructure for DOE security research

    SciTech Connect

    Aiken, R.; Foster, I.; Johnston, W.E.

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  5. Comparing the 2000 and 2005 factors affecting the selling price of feeder cattle sold at Arkansas livestock auctions.

    PubMed

    Troxel, T R; Barham, B L

    2007-12-01

    The objectives of the study were to determine how factors affecting the selling price of feeder calves changed from 2000 to 2005 and to examine the perception that discounts narrow or even disappear as calf supplies decrease and selling prices increase. Data from weekly Arkansas livestock auctions were collected from January 1 to December 31 in 2000 and 2005. Data included calf sex, breed type, color, muscle score, horn status, frame score, fill, condition, health, and BW. Mean selling prices for 2000 and 2005 were $92.91 +/- 15.05 and $118.32 +/- 15.13 (mean +/- SD; $/45.45 kg), respectively. Individual price observations were subtracted from the respective annual means and became the dependent variable. The selling prices for feeder calves sold in groups of 2 to 5 calves and in groups of >/= 6 calves were greater in 2005 than 2000 (P < 0.001). Steers received a greater premium ($6.48 +/- 0.09 vs. $6.02 +/- 0.08; mean +/- SE) and bull calves received greater discounts ($0.30 +/- 0.14 vs. $1.68 +/- 0.09) in 2005 than in 2000. Breeds types that increased in value from 2000 to 2005 were Angus x Hereford, Angus, Angus x Charolais, and Brahman (P < 0.001). Breed types that received a reduced selling price in 2005 compared with 2000 (P < 0.001) were one-fourth Brahman Cross, Charolais, Charolais x Limousin, Hereford x Limousin, Limousin, Limousin x one-fourth Brahman, Longhorn, Saler and Simmental. Yellow-white face, black-white face, black, and gray feeder calves received an increase in selling price from 2000 to 2005 (P < 0.001). Although fewer horned feeder calves were sold in 2005 (P < 0.01), they received greater discounts in 2005 than 2000 (-$2.86 +/- 0.16 and -$0.51 +/- 0.09; P < 0.001). In 2005, large-framed feeder calves did not receive the premium detected in 2000, but medium-framed feeder calves in 2005 received a greater selling price compared with 2000. Feeder calves with a muscle score of 1 received a greater premium in 2005 compared with 2000 ($2.58 +/- 0

  6. Comparing the 2000 and 2005 factors affecting the selling price of feeder cattle sold at Arkansas livestock auctions.

    PubMed

    Troxel, T R; Barham, B L

    2007-12-01

    The objectives of the study were to determine how factors affecting the selling price of feeder calves changed from 2000 to 2005 and to examine the perception that discounts narrow or even disappear as calf supplies decrease and selling prices increase. Data from weekly Arkansas livestock auctions were collected from January 1 to December 31 in 2000 and 2005. Data included calf sex, breed type, color, muscle score, horn status, frame score, fill, condition, health, and BW. Mean selling prices for 2000 and 2005 were $92.91 +/- 15.05 and $118.32 +/- 15.13 (mean +/- SD; $/45.45 kg), respectively. Individual price observations were subtracted from the respective annual means and became the dependent variable. The selling prices for feeder calves sold in groups of 2 to 5 calves and in groups of >/= 6 calves were greater in 2005 than 2000 (P < 0.001). Steers received a greater premium ($6.48 +/- 0.09 vs. $6.02 +/- 0.08; mean +/- SE) and bull calves received greater discounts ($0.30 +/- 0.14 vs. $1.68 +/- 0.09) in 2005 than in 2000. Breeds types that increased in value from 2000 to 2005 were Angus x Hereford, Angus, Angus x Charolais, and Brahman (P < 0.001). Breed types that received a reduced selling price in 2005 compared with 2000 (P < 0.001) were one-fourth Brahman Cross, Charolais, Charolais x Limousin, Hereford x Limousin, Limousin, Limousin x one-fourth Brahman, Longhorn, Saler and Simmental. Yellow-white face, black-white face, black, and gray feeder calves received an increase in selling price from 2000 to 2005 (P < 0.001). Although fewer horned feeder calves were sold in 2005 (P < 0.01), they received greater discounts in 2005 than 2000 (-$2.86 +/- 0.16 and -$0.51 +/- 0.09; P < 0.001). In 2005, large-framed feeder calves did not receive the premium detected in 2000, but medium-framed feeder calves in 2005 received a greater selling price compared with 2000. Feeder calves with a muscle score of 1 received a greater premium in 2005 compared with 2000 ($2.58 +/- 0

  7. NSI security task: Overview

    NASA Technical Reports Server (NTRS)

    Tencati, Ron

    1991-01-01

    An overview is presented of the NASA Science Internet (NSI) security task. The task includes the following: policies and security documentation; risk analysis and management; computer emergency response team; incident handling; toolkit development; user consulting; and working groups, conferences, and committees.

  8. Network Security Is Manageable

    ERIC Educational Resources Information Center

    Roberts, Gary

    2006-01-01

    An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…

  9. Technology's Role in Security.

    ERIC Educational Resources Information Center

    Day, C. William

    1999-01-01

    Examines the use of technology to bolster the school security system, tips on selecting a security consultant, and several basic strategies to make buildings and grounds safer. Technological ideas discussed include the use of telephones in classrooms to expedite care in emergency situations, surveillance cameras to reduce crime, and metal…

  10. Developing a Security Profile.

    ERIC Educational Resources Information Center

    Woodcock, Chris

    1999-01-01

    Examines the questions schools should address when re-evaluating how to protect people, property, and assets. Questions addressed include where and how to begin to improve security in a school, getting the most protection economically, establishing where electronic security should be used, using surveillance cameras and systems, and what the role…

  11. School Security, 2000.

    ERIC Educational Resources Information Center

    Agron, Joe, Ed.; Anderson, Larry, Ed.

    This supplement, a collaboration of "American School & University" and "Access Control & Security Systems Integration" magazines, presents four articles examining equipment and management strategies to ensure school safety. "School Security by the Numbers" (Joe Agron; Larry Anderson) defines the parameters and quantifies the trend in the school…

  12. Secure video communications system

    DOEpatents

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  13. School Safety and Security.

    ERIC Educational Resources Information Center

    California State Dept. of Education, Sacramento.

    This document offers additional guidelines for school facilities in California in the areas of safety and security, lighting, and cleanliness. It also offers a description of technology resources available on the World Wide Web. On the topic of safety and security, the document offers guidelines in the areas of entrances, doors, and controlled…

  14. Incidents of Security Concern

    SciTech Connect

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  15. School Security Technologies

    ERIC Educational Resources Information Center

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  16. Security in the cloud.

    PubMed

    Degaspari, John

    2011-08-01

    As more provider organizations look to the cloud computing model, they face a host of security-related questions. What are the appropriate applications for the cloud, what is the best cloud model, and what do they need to know to choose the best vendor? Hospital CIOs and security experts weigh in.

  17. Water Security Toolkit

    SciTech Connect

    2012-09-11

    The Water Security Toolkit (WST) provides software for modeling and analyzing water distribution systems to minimize the potential impact of contamination incidents. WST wraps capabilities for contaminant transport, impact assessment, and sensor network design with response action plans, including source identification, rerouting, and decontamination, to provide a range of water security planning and real-time applications.

  18. Hydrological extremes and security

    NASA Astrophysics Data System (ADS)

    Kundzewicz, Z. W.; Matczak, P.

    2015-04-01

    Economic losses caused by hydrological extremes - floods and droughts - have been on the rise. Hydrological extremes jeopardize human security and impact on societal livelihood and welfare. Security can be generally understood as freedom from threat and the ability of societies to maintain their independent identity and their functional integrity against forces of change. Several dimensions of security are reviewed in the context of hydrological extremes. The traditional interpretation of security, focused on the state military capabilities, has been replaced by a wider understanding, including economic, societal and environmental aspects that get increasing attention. Floods and droughts pose a burden and serious challenges to the state that is responsible for sustaining economic development, and societal and environmental security. The latter can be regarded as the maintenance of ecosystem services, on which a society depends. An important part of it is water security, which can be defined as the availability of an adequate quantity and quality of water for health, livelihoods, ecosystems and production, coupled with an acceptable level of water-related risks to people, environments and economies. Security concerns arise because, over large areas, hydrological extremes - floods and droughts - are becoming more frequent and more severe. In terms of dealing with water-related risks, climate change can increase uncertainties, which makes the state's task to deliver security more difficult and more expensive. However, changes in population size and development, and level of protection, drive exposure to hydrological hazards.

  19. Addressing Information Security Risk

    ERIC Educational Resources Information Center

    Qayoumi, Mohammad H.; Woody, Carol

    2005-01-01

    Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…

  20. Privacy and Security: A Bibliography.

    ERIC Educational Resources Information Center

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  1. Network systems security analysis

    NASA Astrophysics Data System (ADS)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  2. Indirection and computer security.

    SciTech Connect

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  3. International Nuclear Security

    SciTech Connect

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  4. "Objective" Science at Auction.

    ERIC Educational Resources Information Center

    Mokhiber, Russell

    1998-01-01

    Discusses a report published by the Center for Public Integrity (CPI) entitled Toxic Deception: How the Chemical Industry Manipulates Science, Bends the Law, and Endangers Your Health. Voices concerns that the federal regulatory system receives favors from the chemical industry that create bias. (PVD)

  5. Secure verification by multifactor optical validation

    NASA Astrophysics Data System (ADS)

    Millán, María S.; Pérez-Cabré, Elisabet; Javidi, Bahram

    2006-08-01

    We propose a novel multifactor encryption-authentication technique that reinforces optical security by allowing the simultaneous AND-verification of more than one primary image. We describe a method to obtain four-factor authentication. The authenticators are: two different primary images containing signatures or biometric information and two different white random sequences that act as key codes. So far, optical security techniques deal with a single primary image (an object, a signature, or a biometric signal), not combined primary images. Our method involves double random-phase encoding, fully phase-based encryption and a combined nonlinear JTC and a classical 4f-correlator for simultaneous recognition and authentication of multiple images. There is no a priori constraint about the type of primary images to encode. Two reference images, double-phase encoded and encrypted in an ID tag (or card) are compared with the actual input images obtained in situ from the person whose authentication is wanted. The two key phase codes are known by the authentication processor. The complex-amplitude encoded image of the ID tag has a dim appearance that does not reveal the content of any primary reference image nor the key codes. The encoded image function fullfils the general requirements of invisible content, extreme difficulty in counterfeiting and real-time automatic verification. The possibility of introducing nonlinearities in the Fourier plane of the optical processor will be exploited to improve the system performance. This optical technique is attractive for high-security purposes that require multifactor reliable authentication.

  6. Security of medical multimedia.

    PubMed

    Tzelepi, S; Pangalos, G; Nikolacopoulou, G

    2002-09-01

    The application of information technology to health care has generated growing concern about the privacy and security of medical information. Furthermore, data and communication security requirements in the field of multimedia are higher. In this paper we describe firstly the most important security requirements that must be fulfilled by multimedia medical data, and the security measures used to satisfy these requirements. These security measures are based mainly on modern cryptographic and watermarking mechanisms as well as on security infrastructures. The objective of our work is to complete this picture, exploiting the capabilities of multimedia medical data to define and implement an authorization model for regulating access to the data. In this paper we describe an extended role-based access control model by considering, within the specification of the role-permission relationship phase, the constraints that must be satisfied in order for the holders of the permission to use those permissions. The use of constraints allows role-based access control to be tailored to specifiy very fine-grained and flexible content-, context- and time-based access control policies. Other restrictions, such as role entry restriction also can be captured. Finally, the description of system architecture for a secure DBMS is presented.

  7. Primary hyperoxaluria.

    PubMed

    Lorenzo, Víctor; Torres, Armando; Salido, Eduardo

    2014-05-21

    Primary hyperoxaluria (PH) occurs due to an autosomal recessive hereditary disorder of the metabolism of glyoxylate, which causes excessive oxalate production. The most frequent and serious disorder is due to enzyme deficit of alanine-glyoxylate aminotransferase (PH type I) specific to hepatic peroxisome. As oxalate is not metabolised in humans and is excreted through the kidneys, the kidney is the first organ affected, causing recurrent lithiasis, nephrocalcinosis and early renal failure. With advance of renal failure, particularly in patients on haemodialysis (HD), calcium oxalate is massively deposited in tissues, which is known as oxalosis. Diagnosis is based on family history, the presence of urolithiasis and/or nephrocalcinosis, hyperoxaluria, oxalate deposits in tissue forming granulomas, molecular analysis of DNA and enzyme analysis if applicable. High diagnostic suspicion is required; therefore, unfortunately, in many cases it is diagnosed after its recurrence following kidney transplantation. Conservative management of this disease (high liquid intake, pyridoxine and crystallisation inhibitors) needs to be adopted early in order to delay kidney damage. Treatment by dialysis is ineffective in treating excess oxalate. After the kidney transplant, we normally observe a rapid appearance of oxalate deposits in the graft and the results of this technique are discouraging, with very few exceptions. Pre-emptive liver transplantation, or simultaneous liver and kidney transplants when there is already irreversible damage to the kidney, is the treatment of choice to treat the underlying disease and suppress oxalate overproduction. Given its condition as a rare disease and its genetic and clinical heterogeneity, it is not possible to gain evidence through randomised clinical trials. As a result, the recommendations are established by groups of experts based on publications of renowned scientific rigour. In this regard, a group of European experts (OxalEurope) has

  8. School feeding, school reform, and food security: connecting the dots.

    PubMed

    Levinger, Beryl

    2005-06-01

    Universal access to basic education is a prerequisite for long-term food security, which, in turn, is critical to achieving the Millennium Development goals. This paper examines how Food for Education interventions can contribute to improved food security, improved education outcomes, and a broader set of development goals. Food for Education entails the distribution of food commodities to children who attend school. The commodities may be locally grown and purchased or contributed by aid donors. The food may be consumed by students in school snack, breakfast, or lunch programs. Alternatively, it may be given as a take-home ration for consumption by a family that regularly sends "at-risk" children (usually girls) to school. Four interrelated ideas are discussed: (1) the universalization of primary school education is a prerequisite for food security (defined here as availability of, access to, and proper biologic utilization of food supplies); (2) Food for Education boosts primary school participation and, therefore, food security; (3) the effects of primary school education on food security are greatest wherever "quality standards" are met, although important effects are present even when education quality is modest; and (4) efforts to improve primary education participation (demand) and efforts to improve primary education quality (supply) are highly interrelated and mutually reinforcing. Food for Education is a versatile resource that can be used to address a broad range of issues related to both education supply and demand. To be effective, Food for Education interventions must reflect local education supply and demand realities.

  9. School feeding, school reform, and food security: connecting the dots.

    PubMed

    Levinger, Beryl

    2005-06-01

    Universal access to basic education is a prerequisite for long-term food security, which, in turn, is critical to achieving the Millennium Development goals. This paper examines how Food for Education interventions can contribute to improved food security, improved education outcomes, and a broader set of development goals. Food for Education entails the distribution of food commodities to children who attend school. The commodities may be locally grown and purchased or contributed by aid donors. The food may be consumed by students in school snack, breakfast, or lunch programs. Alternatively, it may be given as a take-home ration for consumption by a family that regularly sends "at-risk" children (usually girls) to school. Four interrelated ideas are discussed: (1) the universalization of primary school education is a prerequisite for food security (defined here as availability of, access to, and proper biologic utilization of food supplies); (2) Food for Education boosts primary school participation and, therefore, food security; (3) the effects of primary school education on food security are greatest wherever "quality standards" are met, although important effects are present even when education quality is modest; and (4) efforts to improve primary education participation (demand) and efforts to improve primary education quality (supply) are highly interrelated and mutually reinforcing. Food for Education is a versatile resource that can be used to address a broad range of issues related to both education supply and demand. To be effective, Food for Education interventions must reflect local education supply and demand realities. PMID:16075566

  10. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    NASA Technical Reports Server (NTRS)

    1985-01-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  11. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    NASA Astrophysics Data System (ADS)

    1985-07-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  12. Teaching Secure Programming

    SciTech Connect

    Bishop, Matt; Frincke, Deb A.

    2005-09-01

    This article discusses issues in teaching secure coding in the context of both academic institutions and training organizations. The emphasis is on the importance of assurance. There is also some discussion of the role of checklists.

  13. Secure Chemical Facilities Act

    THOMAS, 113th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2013-01-23

    01/23/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. Secure Chemical Facilities Act

    THOMAS, 112th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2011-03-31

    03/31/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  15. Intelligent Sensors Security

    PubMed Central

    Bialas, Andrzej

    2010-01-01

    The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IEC 15408) used for IT products and systems. The paper begins with a primer on the Common Criteria, and then a general security model of the intelligent sensor as an IT product is discussed. The paper presents how the security problem of the intelligent sensor is defined and solved. The contribution of the paper is to provide Common Criteria (CC) related security design patterns and to improve the effectiveness of the sensor development process. PMID:22315571

  16. Secure Visas Act

    THOMAS, 111th Congress

    Rep. Smith, Lamar [R-TX-21

    2010-03-04

    04/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. Securing Cabin Baggage Act

    THOMAS, 111th Congress

    Rep. Lipinski, Daniel [D-IL-3

    2009-06-15

    06/17/2009 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. Cognitive Computing for Security.

    SciTech Connect

    Debenedictis, Erik; Rothganger, Fredrick; Aimone, James Bradley; Marinella, Matthew; Evans, Brian Robert; Warrender, Christina E.; Mickel, Patrick

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  19. Department of Homeland Security

    MedlinePlus

    ... TSA Pre✓® Active Shooter Preparedness Hometown Security Countering Violent Extremism Forms Combating Human Trafficking Taking Action on ... Oct 31 Blog DHS Releases Strategy for Countering Violent Extremism Violent extremism is an evolving threat and ...

  20. Secure Chemical Facilities Act

    THOMAS, 111th Congress

    Sen. Lautenberg, Frank R. [D-NJ

    2010-07-15

    07/15/2010 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Security vs. Safety.

    ERIC Educational Resources Information Center

    Sturgeon, Julie

    1999-01-01

    Provides administrative advice on how some safety experts have made college campuses safer and friendlier without breaking the budget. Tips on security and advice on safety management that encompasses the whole environment are highlighted. (GR)

  2. Keep America Secure Act

    THOMAS, 112th Congress

    Rep. Slaughter, Louise McIntosh [D-NY-28

    2012-08-02

    09/05/2012 Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  3. Disarmament and security

    SciTech Connect

    Alley, R.M.

    1985-01-01

    This book contains the following five selections: Opening address; Global disarmament negotiations; Global security and the nuclear balance; Nuclear politics and the environment; and New Zealand's approach: another perspective.

  4. Lemnos Interoperable Security Program

    SciTech Connect

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  5. Secure quantum key distribution

    NASA Astrophysics Data System (ADS)

    Lo, Hoi-Kwong; Curty, Marcos; Tamaki, Kiyoshi

    2014-08-01

    Secure communication is crucial in the Internet Age, and quantum mechanics stands poised to revolutionize cryptography as we know it today. In this Review, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After briefly introducing recent experimental progress and challenges, we survey the latest developments in quantum hacking and countermeasures against it.

  6. Secure video communications systems

    SciTech Connect

    Smith, R.L.

    1991-10-08

    This patent describes a secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  7. Data port security lock

    DOEpatents

    Quinby, Joseph D.; Hall, Clarence S.

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  8. Variable contour securing system

    NASA Technical Reports Server (NTRS)

    Zebus, P. P.; Packer, P. N.; Haynie, C. C. (Inventor)

    1978-01-01

    A variable contour securing system has a retaining structure for a member whose surface contains a variable contour. The retaining mechanism includes a spaced array of adjustable spindles mounted on a housing. Each spindle has a base member support cup at one end. A vacuum source is applied to the cups for seating the member adjacent to the cups. A locking mechanism sets the spindles in a predetermined position once the member has been secured to the spindle support cups.

  9. Security systems engineering overview

    SciTech Connect

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  10. Security systems engineering overview

    NASA Astrophysics Data System (ADS)

    Steele, Basil J.

    1997-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.

  11. [Food security in Mexico].

    PubMed

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance. PMID:25649459

  12. [Food security in Mexico].

    PubMed

    Urquía-Fernández, Nuria

    2014-01-01

    An overview of food security and nutrition in Mexico is presented, based on the analysis of the four pillars of food security: availability, access, utilization of food, and stability of the food supply. In addition, the two faces of malnutrition in Mexico were analyzed: obesity and undernourishment. Data were gathered from the food security indicators of the United Nations's Food and Agriculture Organization, from the Mexican Scale of Food Security, and from the National Health and Nutrition Survey. Mexico presents an index of availability of 3 145 kilocalories per person per day, one of the highest indexes in the world, including both food production and imports. In contrast, Mexico is affected by a double burden of malnutrition: whereas children under five present 14% of stunt, 30% of the adult population is obese. Also, more than 18% of the population cannot afford the basic food basket (food poverty). Using perception surveys, people reports important levels of food insecurity, which concentrates in seven states of the Mexican Federation. The production structure underlying these indicators shows a very heterogeneous landscape, which translates in to a low productivity growth across the last years. Food security being a multidimensional concept, to ensure food security for the Mexican population requires a revision and redesign of public productive and social policies, placing a particular focus on strengthening the mechanisms of institutional governance.

  13. Roadmap on optical security

    NASA Astrophysics Data System (ADS)

    Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam

    2016-08-01

    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections

  14. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  15. Building a Secure Library System.

    ERIC Educational Resources Information Center

    Benson, Allen C.

    1998-01-01

    Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…

  16. A Portable Computer Security Workshop

    ERIC Educational Resources Information Center

    Wagner, Paul J.; Phillips, Andrew T.

    2006-01-01

    We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education to IT professionals and students. It is effective in communicating basic computer security principles…

  17. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    SciTech Connect

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is to provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.

  18. Gross anatomy of network security

    NASA Technical Reports Server (NTRS)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  19. Secure provision of reactive power ancillary services in competitive electricity markets

    NASA Astrophysics Data System (ADS)

    El-Samahy, Ismael

    The research work presented in this thesis discusses various complex issues associated with reactive power management and pricing in the context of new operating paradigms in deregulated power systems, proposing appropriate policy solutions. An integrated two-level framework for reactive power management is set forth, which is both suitable for a competitive market and ensures a secure and reliable operation of the associated power system. The framework is generic in nature and can be adopted for any electricity market structure. The proposed hierarchical reactive power market structure comprises two stages: procurement of reactive power resources on a seasonal basis, and real-time reactive power dispatch. The main objective of the proposed framework is to provide appropriate reactive power support from service providers at least cost, while ensuring a secure operation of the power system. The proposed procurement procedure is based on a two-step optimization model. First, the marginal benefits of reactive power supply from each provider, with respect to system security, are obtained by solving a loadability-maximization problem subject to transmission security constraints imposed by voltage and thermal limits. Second, the selected set of generators is determined by solving an optimal power flow (OPF)-based auction. This auction maximizes a societal advantage function comprising generators' offers and their corresponding marginal benefits with respect to system security, and considering all transmission system constraints. The proposed procedure yields the selected set of generators and zonal price components, which would form the basis for seasonal contracts between the system operator and the selected reactive power service providers. The main objective of the proposed reactive power dispatch model is to minimize the total payment burden on the Independent System Operator (ISO), which is associated with reactive power dispatch. The real power generation is

  20. 76 FR 39884 - Aviation Security Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-07

    ... SECURITY Aviation Security Advisory Committee AGENCY: Transportation Security Administration, DHS. ACTION... Security Administration (TSA) announces the re-establishment of the Aviation Security Advisory Committee...-governmental organizations (NGOs) and stakeholder representatives concerning potential risks to...

  1. Secure Information Sharing

    2005-09-09

    We are develoing a peer-to-peer system to support secure, location independent information sharing in the scientific community. Once complete, this system will allow seamless and secure sharing of information between multiple collaborators. The owners of information will be able to control how the information is stored, managed. ano shared. In addition, users will have faster access to information updates within a collaboration. Groups collaborating on scientific experiments have a need to share information and data.more » This information and data is often represented in the form of files and database entries. In a typical scientific collaboration, there are many different locations where data would naturally be stored. This makes It difficult for collaborators to find and access the information they need. Our goal is to create a lightweight file-sharing system that makes it’easy for collaborators to find and use the data they need. This system must be easy-to-use, easy-to-administer, and secure. Our information-sharing tool uses group communication, in particular the InterGroup protocols, to reliably deliver each query to all of the current participants in a scalable manner, without having to discover all of their identities. We will use the Secure Group Layer (SGL) and Akenti to provide security to the participants of our environment, SGL will provide confldentiality, integrity, authenticity, and authorization enforcement for the InterGroup protocols and Akenti will provide access control to other resources.« less

  2. Biological and Chemical Security

    SciTech Connect

    Fitch, P J

    2002-12-19

    The LLNL Chemical & Biological National Security Program (CBNP) provides science, technology and integrated systems for chemical and biological security. Our approach is to develop and field advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons. Recent events show the importance of civilian defense against terrorism. The 1995 nerve gas attack in Tokyo's subway served to catalyze and focus the early LLNL program on civilian counter terrorism. In the same year, LLNL began CBNP using Laboratory-Directed R&D investments and a focus on biodetection. The Nunn-Lugar-Domenici Defense Against Weapons of Mass Destruction Act, passed in 1996, initiated a number of U.S. nonproliferation and counter-terrorism programs including the DOE (now NNSA) Chemical and Biological Nonproliferation Program (also known as CBNP). In 2002, the Department of Homeland Security was formed. The NNSA CBNP and many of the LLNL CBNP activities are being transferred as the new Department becomes operational. LLNL has a long history in national security including nonproliferation of weapons of mass destruction. In biology, LLNL had a key role in starting and implementing the Human Genome Project and, more recently, the Microbial Genome Program. LLNL has over 1,000 scientists and engineers with relevant expertise in biology, chemistry, decontamination, instrumentation, microtechnologies, atmospheric modeling, and field experimentation. Over 150 LLNL scientists and engineers work full time on chemical and biological national security projects.

  3. Energy and national security.

    SciTech Connect

    Karas, Thomas H.

    2003-09-01

    On May 19 and 20, 2003, thirty-some members of Sandia staff and management met to discuss the long-term connections between energy and national security. Three broad security topics were explored: I. Global and U.S. economic dependence on oil (and gas); II. Potential security implications of global climate change; and III. Vulnerabilities of the U.S. domestic energy infrastructure. This report, rather than being a transcript of the workshop, represents a synthesis of background information used in the workshop, ideas that emerged in the discussions, and ex post facto analysis of the discussions. Each of the three subjects discussed at this workshop has significant U.S. national security implications. Each has substantial technology components. Each appears a legitimate area of concern for a national security laboratory with relevant technology capabilities. For the laboratory to play a meaningful role in contributing to solutions to national problems such as these, it needs to understand the political, economic, and social environments in which it expects its work to be accepted and used. In addition, it should be noted that the problems of oil dependency and climate change are not amenable to solution by the policies of any one nation--even the one that is currently the largest single energy consumer. Therefore, views, concerns, policies, and plans of other countries will do much to determine which solutions might work and which might not.

  4. Computer Security Risk Assessment

    1992-02-11

    LAVA/CS (LAVA for Computer Security) is an application of the Los Alamos Vulnerability Assessment (LAVA) methodology specific to computer and information security. The software serves as a generic tool for identifying vulnerabilities in computer and information security safeguards systems. Although it does not perform a full risk assessment, the results from its analysis may provide valuable insights into security problems. LAVA/CS assumes that the system is exposed to both natural and environmental hazards and tomore » deliberate malevolent actions by either insiders or outsiders. The user in the process of answering the LAVA/CS questionnaire identifies missing safeguards in 34 areas ranging from password management to personnel security and internal audit practices. Specific safeguards protecting a generic set of assets (or targets) from a generic set of threats (or adversaries) are considered. There are four generic assets: the facility, the organization''s environment; the hardware, all computer-related hardware; the software, the information in machine-readable form stored both on-line or on transportable media; and the documents and displays, the information in human-readable form stored as hard-copy materials (manuals, reports, listings in full-size or microform), film, and screen displays. Two generic threats are considered: natural and environmental hazards, storms, fires, power abnormalities, water and accidental maintenance damage; and on-site human threats, both intentional and accidental acts attributable to a perpetrator on the facility''s premises.« less

  5. Practical secure quantum communications

    NASA Astrophysics Data System (ADS)

    Diamanti, Eleni

    2015-05-01

    We review recent advances in the field of quantum cryptography, focusing in particular on practical implementations of two central protocols for quantum network applications, namely key distribution and coin flipping. The former allows two parties to share secret messages with information-theoretic security, even in the presence of a malicious eavesdropper in the communication channel, which is impossible with classical resources alone. The latter enables two distrustful parties to agree on a random bit, again with information-theoretic security, and with a cheating probability lower than the one that can be reached in a classical scenario. Our implementations rely on continuous-variable technology for quantum key distribution and on a plug and play discrete-variable system for coin flipping, and necessitate a rigorous security analysis adapted to the experimental schemes and their imperfections. In both cases, we demonstrate the protocols with provable security over record long distances in optical fibers and assess the performance of our systems as well as their limitations. The reported advances offer a powerful toolbox for practical applications of secure communications within future quantum networks.

  6. Maritime security laboratory for maritime security research

    NASA Astrophysics Data System (ADS)

    Bunin, Barry J.; Sutin, Alexander; Bruno, Michael S.

    2007-04-01

    Stevens Institute of Technology has established a new Maritime Security Laboratory (MSL) to facilitate advances in methods and technologies relevant to maritime security. MSL is designed to enable system-level experiments and data-driven modeling in the complex environment of an urban tidal estuary. The initial focus of the laboratory is on the threats posed by divers and small craft with hostile intent. The laboratory is, however, evolvable to future threats as yet unidentified. Initially, the laboratory utilizes acoustic, environmental, and video sensors deployed in and around the Hudson River estuary. Experimental data associated with boats and SCUBA divers are collected on a computer deployed on board a boat specifically designed and equipped for these experiments and are remotely transferred to a Visualization Center on campus. Early experiments utilizing this laboratory have gathered data to characterize the relevant parameters of the estuary, acoustic signals produced by divers, and water and air traffic. Hydrophones were deployed to collect data to enable the development of passive acoustic methodologies for maximizing SCUBA diver detection distance. Initial results involving characteristics of the estuary, acoustic signatures of divers, ambient acoustic noise in an urban estuary, and transmission loss of acoustic signals in a wide frequency band are presented. These results can also be used for the characterization of abnormal traffic and improvement of underwater communication in a shallow water estuary.

  7. Social Security's special minimum benefit.

    PubMed

    Olsen, K A; Hoffmeyer, D

    Social Security's special minimum primary insurance amount (PIA) provision was enacted in 1972 to increase the adequacy of benefits for regular long-term, low-earning covered workers and their dependents or survivors. At the time, Social Security also had a regular minimum benefit provision for persons with low lifetime average earnings and their families. Concerns were rising that the low lifetime average earnings of many regular minimum beneficiaries resulted from sporadic attachment to the covered workforce rather than from low wages. The special minimum benefit was seen as a way to reward regular, low-earning workers without providing the windfalls that would have resulted from raising the regular minimum benefit to a much higher level. The regular minimum benefit was subsequently eliminated for workers reaching age 62, becoming disabled, or dying after 1981. Under current law, the special minimum benefit will phase out over time, although it is not clear from the legislative history that this was Congress's explicit intent. The phaseout results from two factors: (1) special minimum benefits are paid only if they are higher than benefits payable under the regular PIA formula, and (2) the value of the regular PIA formula, which is indexed to wages before benefit eligibility, has increased faster than that of the special minimum PIA, which is indexed to inflation. Under the Social Security Trustees' 2000 intermediate assumptions, the special minimum benefit will cease to be payable to retired workers attaining eligibility in 2013 and later. Their benefits will always be larger under the regular benefit formula. As policymakers consider Social Security solvency initiatives--particularly proposals that would reduce benefits or introduce investment risk--interest may increase in restoring some type of special minimum benefit as a targeted protection for long-term low earners. Two of the three reform proposals offered by the President's Commission to Strengthen

  8. Secure content objects

    DOEpatents

    Evans, William D.

    2009-02-24

    A secure content object protects electronic documents from unauthorized use. The secure content object includes an encrypted electronic document, a multi-key encryption table having at least one multi-key component, an encrypted header and a user interface device. The encrypted document is encrypted using a document encryption key associated with a multi-key encryption method. The encrypted header includes an encryption marker formed by a random number followed by a derivable variation of the same random number. The user interface device enables a user to input a user authorization. The user authorization is combined with each of the multi-key components in the multi-key encryption key table and used to try to decrypt the encrypted header. If the encryption marker is successfully decrypted, the electronic document may be decrypted. Multiple electronic documents or a document and annotations may be protected by the secure content object.

  9. Double layer secure sketch

    NASA Astrophysics Data System (ADS)

    Li, Cai

    2012-09-01

    Secure sketch has been applied successfully in a wide variety of applications like cryptography, biometric authentication systems and so on. All of these secure sketches have properties in common namely error-tolerance and small entropy loss. The former ensures an input set w' can unlock the system if w' is substantially overlapped with a template set w while the latter means it is hard for an adversary to get the information of w even with the knowledge of s, which is produced by w and stored in the system publicly. In their constructions, they all consider w as a set of atomic elements. However, in the real word, it is very likely the elements in the template set are sets as well. In this paper, we propose a double layer secure sketch to address this issue.

  10. Secure medical digital libraries.

    PubMed

    Papadakis, I; Chrissikopoulos, V; Polemi, D

    2001-12-01

    In this paper, a secure medical digital library is presented. It is based on the CORBA specifications for distributed systems. The described approach relies on a three-tier architecture. Interaction between the medical digital library and its users is achieved through a Web server. The choice of employing Web technology for the dissemination of medical data has many advantages compared to older approaches, but also poses extra requirements that need to be fulfilled. Thus, special attention is paid to the distinguished nature of such medical data, whose integrity and confidentiality should be preserved at all costs. This is achieved through the employment of Trusted Third Parties (TTP) technology for the support of the required security services. Additionally, the proposed digital library employs smartcards for the management of the various security tokens that are used from the above services.

  11. Unfalsifiability of security claims.

    PubMed

    Herley, Cormac

    2016-06-01

    There is an inherent asymmetry in computer security: Things can be declared insecure by observation, but not the reverse. There is no observation that allows us to declare an arbitrary system or technique secure. We show that this implies that claims of necessary conditions for security (and sufficient conditions for insecurity) are unfalsifiable. This in turn implies an asymmetry in self-correction: Whereas the claim that countermeasures are sufficient is always subject to correction, the claim that they are necessary is not. Thus, the response to new information can only be to ratchet upward: Newly observed or speculated attack capabilities can argue a countermeasure in, but no possible observation argues one out. Further, when justifications are unfalsifiable, deciding the relative importance of defensive measures reduces to a subjective comparison of assumptions. Relying on such claims is the source of two problems: once we go wrong we stay wrong and errors accumulate, and we have no systematic way to rank or prioritize measures.

  12. Port and Harbor Security

    SciTech Connect

    Saito, T; Guthmuller, H; DeWeert, M

    2004-12-15

    Port and Harbor Security is a daunting task to which optics and photonics offers significant solutions. We are pleased to report that the 2005 Defense and Security Symposium (DSS, Orlando, FL) will include reports on active and passive photonic systems operating from both airborne and subsurface platforms. In addition to imaging techniques, there are various photonic applications, such as total internal reflection fluorescence (TIRF), which can be used to ''sniff'' for traces of explosives or contaminants in marine. These non-imaging technologies are beyond the scope of this article, but will also be represented at DSS 2005. We encourage colleagues to join our technical group to help us to make our ports and harbors safer and more secure.

  13. Cyber Security Evaluation Tool

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization’s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied tomore » enhance cybersecurity controls.« less

  14. Strategy for IT Security

    NASA Technical Reports Server (NTRS)

    Santiago, S. Scott; Moyles, Thomas J. (Technical Monitor)

    2001-01-01

    This viewgraph presentation provides information on the importance of information technology (IT) security (ITS) to NASA's mission. Several points are made concerning the subject. In order for ITS to be successful, it must be supported by management. NASA, while required by law to keep the public informed of its pursuits, must take precautions due to possible IT-based incursions by computer hackers and other malignant persons. Fear is an excellent motivation for establishing and maintaining a robust ITS policy. The ways in which NASA ITS personnel continually increase security are manifold, however a great deal relies upon the active involvement of the entire NASA community.

  15. Cyber Security Evaluation Tool

    SciTech Connect

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization’s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied to enhance cybersecurity controls.

  16. Secure Control Systems for the Energy Sector

    SciTech Connect

    Smith, Rhett; Campbell, Jack; Hadley, Mark

    2012-03-31

    Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use this technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.

  17. The Security Continuum.

    ERIC Educational Resources Information Center

    Thompson, Ian

    2002-01-01

    Discusses the creation of a comprehensive security strategy for schools, including the importance of tailoring it to a specific school's mission and culture. Describes three classes of tactics (natural, organized, and technical) which can be chosen to implement the strategy. Discusses access control as an example of how strategies and tactics…

  18. Security classification of information

    SciTech Connect

    Quist, A.S.

    1989-09-01

    Certain governmental information must be classified for national security reasons. However, the national security benefits from classifying information are usually accompanied by significant costs -- those due to a citizenry not fully informed on governmental activities, the extra costs of operating classified programs and procuring classified materials (e.g., weapons), the losses to our nation when advances made in classified programs cannot be utilized in unclassified programs. The goal of a classification system should be to clearly identify that information which must be protected for national security reasons and to ensure that information not needing such protection is not classified. This document was prepared to help attain that goal. This document is the first of a planned four-volume work that comprehensively discusses the security classification of information. Volume 1 broadly describes the need for classification, the basis for classification, and the history of classification in the United States from colonial times until World War 2. Classification of information since World War 2, under Executive Orders and the Atomic Energy Acts of 1946 and 1954, is discussed in more detail, with particular emphasis on the classification of atomic energy information. Adverse impacts of classification are also described. Subsequent volumes will discuss classification principles, classification management, and the control of certain unclassified scientific and technical information. 340 refs., 6 tabs.

  19. Designs on Security.

    ERIC Educational Resources Information Center

    Hubler, Gary L.

    1999-01-01

    Discusses design options that can help create a more secure education environment and help staff to supervise students and reduce outside interruptions that can disrupt the learning experience. Suggestions include eliminating stairwells, placing teacher planning rooms strategically along main corridors where they can keep an eye on students, and…

  20. Energy and National Security

    ERIC Educational Resources Information Center

    Abelson, Philip H.

    1973-01-01

    Discussed in this editorial is the need for a broad and detailed government policy on energy use. Oil companies can not be given complete responsibility to demonstrate usage of different energy sources. The government should construct plants because energy is connected with national security. (PS)

  1. Security: Step by Step

    ERIC Educational Resources Information Center

    Svetcov, Eric

    2005-01-01

    This article provides a list of the essential steps to keeping a school's or district's network safe and sound. It describes how to establish a security architecture and approach that will continually evolve as the threat environment changes over time. The article discusses the methodology for implementing this approach and then discusses the…

  2. Metaphors for cyber security.

    SciTech Connect

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  3. Reporters, Curators, Security Chiefs...

    ERIC Educational Resources Information Center

    Black Issues in Higher Education, 1996

    1996-01-01

    Opportunities for employment other than faculty positions in colleges and universities are explored, and the stories of a number of nonfaculty personnel in such areas as computer technology, security, public relations, admissions, sports information, museums, and glee club are recounted. These employees offer insights into how they obtained their…

  4. Today's School Security

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2012-01-01

    Outbreaks of violence at education institutions typically do not rise to the horrific levels of Virginia Tech, Columbine High School, or Oikos University. But incidents that threaten school security--bullying, hazing, online harassment--take place in every month of the year and may occur in any classroom or campus from coast to coast. Schools and…

  5. Transmission Line Security Monitor

    SciTech Connect

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  6. What Price Security?

    ERIC Educational Resources Information Center

    Corson, Dale

    1983-01-01

    A National Academy panel evaluates trade-offs between dangers to national security that arise from technology transfers and threats to the openness of scientific communication that are caused by too much secrecy. Major conclusions/suggestions are discussed. A list of acquisitions from the West affecting Soviet military technology is included.…

  7. Designing Secure Library Networks.

    ERIC Educational Resources Information Center

    Breeding, Michael

    1997-01-01

    Focuses on designing a library network to maximize security. Discusses UNIX and file servers; connectivity to campus, corporate networks and the Internet; separation of staff from public servers; controlling traffic; the threat of network sniffers; hubs that eliminate eavesdropping; dividing the network into subnets; Switched Ethernet;…

  8. Transmission Line Security Monitor

    ScienceCinema

    None

    2016-07-12

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  9. Mastering Mobile Security

    ERIC Educational Resources Information Center

    Panettieri, Joseph C.

    2007-01-01

    Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…

  10. Inequities in Income Security

    ERIC Educational Resources Information Center

    Rosenman, Linda

    1976-01-01

    Whether women choose to work in the home or in business, they receive the worst of both worlds in terms of protection against poverty. The author describes how the income security program discriminates against women and presents ways of eliminating the injustice. (Author)

  11. Campus [in] Security

    ERIC Educational Resources Information Center

    Collett, Stacy

    2007-01-01

    Community colleges, while safe, are not immune to violence. In the wake of the Virginia Tech shootings, community colleges are committed to making campuses safer. From training first responders to understanding and identifying potential threats, the author describes what schools are doing to eradicate their so-called [in] securities and improve…

  12. Safe and Secure

    ERIC Educational Resources Information Center

    Cavanagh, Sean

    2004-01-01

    Since the Sept. 11, 2001, terrorist attacks, student interest in school programs dealing with careers in law, public safety, and national security is on the rise. This article describes students' experiences at the Academy for Law and Public Safety at Butler High School in Butler, New Jersey. This vocational academy is one of a number of career…

  13. Safe and Secure

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2010-01-01

    The education headlines have been filled with grim news about facility closings, teacher layoffs and program cutbacks. When the economic climate is gloomy, few areas of schools and universities are spared. In areas outside the classroom, such as safety and security, the cuts may be larger and come more quickly. When money is scarce, education…

  14. A network security monitor

    SciTech Connect

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. . Dept. of Electrical Engineering and Computer Science)

    1989-11-01

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

  15. Securing smart grid technology

    NASA Astrophysics Data System (ADS)

    Chaitanya Krishna, E.; Kosaleswara Reddy, T.; Reddy, M. YogaTeja; Reddy G. M., Sreerama; Madhusudhan, E.; AlMuhteb, Sulaiman

    2013-03-01

    In the developing countries electrical energy is very important for its all-round improvement by saving thousands of dollars and investing them in other sector for development. For Growing needs of power existing hierarchical, centrally controlled grid of the 20th Century is not sufficient. To produce and utilize effective power supply for industries or people we should have Smarter Electrical grids that address the challenges of the existing power grid. The Smart grid can be considered as a modern electric power grid infrastructure for enhanced efficiency and reliability through automated control, high-power converters, modern communications infrastructure along with modern IT services, sensing and metering technologies, and modern energy management techniques based on the optimization of demand, energy and network availability and so on. The main objective of this paper is to provide a contemporary look at the current state of the art in smart grid communications as well as critical issues on smart grid technologies primarily in terms of information and communication technology (ICT) issues like security, efficiency to communications layer field. In this paper we propose new model for security in Smart Grid Technology that contains Security Module(SM) along with DEM which will enhance security in Grid. It is expected that this paper will provide a better understanding of the technologies, potential advantages and research challenges of the smart grid and provoke interest among the research community to further explore this promising research area.

  16. Application Security Automation

    ERIC Educational Resources Information Center

    Malaika, Majid A.

    2011-01-01

    With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…

  17. CAS. Controlled Access Security

    SciTech Connect

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  18. Learning with Security

    ERIC Educational Resources Information Center

    Jokela, Paivi; Karlsudd, Peter

    2007-01-01

    The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…

  19. Identity security awareness.

    PubMed

    Philipsen, Nayna C

    2004-01-01

    Identity theft is an increasing concern when organizations, businesses, and even childbirth educators ask for a client's Social Security number for identification purposes. In this column, the author suggests ways to protect one's identity and, more importantly, decrease the opportunities for identity theft.

  20. Telemedicine Security: A Systematic Review

    PubMed Central

    Garg, Vaibhav; Brewer, Jeffrey

    2011-01-01

    Telemedicine is a technology-based alternative to traditional health care delivery. However, poor security measures in telemedicine services can have an adverse impact on the quality of care provided, regardless of the chronic condition being studied. We undertook a systematic review of 58 journal articles pertaining to telemedicine security. These articles were selected based on a keyword search on 14 relevant journals. The articles were coded to evaluate the methodology and to identify the key areas of research in security that are being reviewed. Seventy-six percent of the articles defined the security problem they were addressing, and only 47% formulated a research question pertaining to security. Sixty-one percent proposed a solution, and 20% of these tested the security solutions that they proposed. Prior research indicates inadequate reporting of methodology in telemedicine research. We found that to be true for security research as well. We also identified other issues such as using outdated security standards. PMID:21722592

  1. Telemedicine security: a systematic review.

    PubMed

    Garg, Vaibhav; Brewer, Jeffrey

    2011-05-01

    Telemedicine is a technology-based alternative to traditional health care delivery. However, poor security measures in telemedicine services can have an adverse impact on the quality of care provided, regardless of the chronic condition being studied. We undertook a systematic review of 58 journal articles pertaining to telemedicine security. These articles were selected based on a keyword search on 14 relevant journals. The articles were coded to evaluate the methodology and to identify the key areas of research in security that are being reviewed. Seventy-six percent of the articles defined the security problem they were addressing, and only 47% formulated a research question pertaining to security. Sixty-one percent proposed a solution, and 20% of these tested the security solutions that they proposed. Prior research indicates inadequate reporting of methodology in telemedicine research. We found that to be true for security research as well. We also identified other issues such as using outdated security standards.

  2. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  3. Securing Information Technology in Healthcare

    PubMed Central

    Anthony, Denise; Campbell, Andrew T.; Candon, Thomas; Gettinger, Andrew; Kotz, David; Marsch, Lisa A.; Molina-Markham, Andrés; Page, Karen; Smith, Sean W.; Gunter, Carl A.; Johnson, M. Eric

    2014-01-01

    Dartmouth College’s Institute for Security, Technology, and Society conducted three workshops on securing information technology in healthcare, attended by a diverse range of experts in the field. This article summarizes the three workshops. PMID:25379030

  4. 77 FR 55218 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-07

    ... the Transportation Security Administration's (TSA) airport security program that will include lessons learned, and screening techniques associated with airport security. Specifically, there will be...

  5. Securing mobile code.

    SciTech Connect

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements

  6. Asian Energy Security

    SciTech Connect

    Peter Hayes, PhD

    2003-12-01

    OAK-B135 In the Asian Energy Security (AES) Project, Nautilus Institute works together with a network of collaborating groups from the countries of Northeast Asia to evaluate the energy security implications of different national and regional energy ''paths''. The goal of the Asia Energy Security project is to illuminate energy paths--and the energy policy choices that might help to bring them about--that result in a higher degree of energy security for the region and for the world as a whole, that is, to identify energy paths that are ''robust'' in meeting many different energy security and development objectives, while also offering flexibility in the face of uncertainty. In work to date, Nautilus has carefully assembled a network of colleagues from the countries of the region, trained them together as a group in the use of a common, flexible, and transparent energy and environmental analysis planning software tool (LEAP, the Long-range Energy Alternatives Planning system), and worked with them to prepare base-year energy sector models for each country. To date, complete data sets and models for ''Business as Usual'' (BAU) energy paths have been compiled for China, Japan, the Republic of Korea, and the Democratic Peoples' Republic of Korea. A partial data set and BAU path has been compiled for the Russian Far East, and a data set is being started in Mongolia, where a team of researchers has just joined the AES project. In several countries, ''Alternative'' energy paths have been developed as well, or partially elaborated. National energy sector developments, progress on national LEAP modeling, additional LEAP training, and planning for the next phase of the AES project were the topics of a recent (early November) workshop held in Vancouver, British Columbia. With funding from the Department of Energy, Nautilus is poised to build upon the successes of the project to date with a coordinated international effort to research the energy security ramifications of

  7. FOILFEST :community enabled security.

    SciTech Connect

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6

  8. Factors affecting distributed system security

    SciTech Connect

    Nessett, D.M.

    1985-11-13

    Recent work examining distributed system security requirements is critiqued. A notion of trust based on distributed system topology and distributed system node evaluation levels proposed in that work is shown to be deficient. The notion fails to make allowances for the distributed system physical security environment, security factors related to the management of distributed systems by more than one jurisdictive authority and interactions that can occur between nodes supporting different mandatory and discretionary security mechanisms.

  9. Security of Personal Computer Systems: A Management Guide.

    ERIC Educational Resources Information Center

    Steinauer, Dennis D.

    This report describes management and technical security considerations associated with the use of personal computer systems as well as other microprocessor-based systems designed for use in a general office environment. Its primary objective is to identify and discuss several areas of potential vulnerability and associated protective measures. The…

  10. Secure Storage Architectures

    SciTech Connect

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to

  11. Securing a Lock on Safety.

    ERIC Educational Resources Information Center

    Daneman, Kathy

    1998-01-01

    Describes the integration of security systems to provide enhanced security that is both effective and long lasting. Examines combining card-access systems with camera surveillance, and highly visible emergency phones and security officers. as one of many possible combinations. Some systems most capable of being integrated are listed. (GR)

  12. Developing a strategic security plan.

    PubMed

    Potter, Anthony N

    2011-01-01

    Strategic planning is an essential component of a security director job. Every healthcare organization has a strategic plan, and the security department that doesn't is at a major disadvantage when it comes to budgeting, growth and effectiveness. This article describes how a security director can develop and integrate a strategic plan into his organization's mission, vision and values.

  13. The Cyber Security Crisis

    ScienceCinema

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2016-07-12

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  14. The Cyber Security Crisis

    SciTech Connect

    Spafford, Eugene

    2006-05-10

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  15. [Biological security confronting bioterrorism].

    PubMed

    Suárez Fernández, Guillermo

    2002-01-01

    A review is made on Biosecurity at both local and global level in relationship with Bioterrorism as a real threat and its control and prevention. The function of the network of High Security Laboratories around the world able to make immediate diagnosis, research on vaccines, fundamental and urgent epidemiological studies, conform a steady basis to control natural infections and also the possible bioterrorism attacks. PMID:12197209

  16. Save Social Security Act

    THOMAS, 112th Congress

    Rep. McCotter, Thaddeus G. [R-MI-11

    2011-09-12

    09/19/2011 Referred for a period ending not later than September 19, 2011, (or for a later time if the Chairman so designates) to the Subcommittee on Social Security, in each case for consideration of such provisions as fall within the jurisdiction of the subcommittee concerned. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. Security seal. [Patent application

    DOEpatents

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  18. 6 CFR 7.10 - Authority of the Chief Security Officer, Office of Security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Authority of the Chief Security Officer, Office of Security. 7.10 Section 7.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLASSIFIED NATIONAL SECURITY INFORMATION Administration § 7.10 Authority of the Chief Security Officer, Office of Security. (a) The DHS...

  19. Social security financing.

    PubMed

    1980-05-01

    After nearly 2 years of study, the 1979 Advisory Council on Social Security submitted its findings and recommendations in December. In February the Bulletin published the Executive Summary of the Council's report. Because of the continuing wide public interest in the future of social security financing, the Council's detailed findings and recommendations on that subject are published below. The Council unanimously reports that all current and future beneficiaries can count on receiving the payments to which they are entitled. Among the recommendations it calls for are partial financing with nonpayroll-tax revenues. Suggested changes include hospital insurance (HI) financed through portins of personal and corporate income taxes and a part of the HI insurance payroll tax diverted to cash benefits with the balance of this tax repealed. The Council also recommends that the social security cash benefits program be brought into long-run actuarial balance--with a payroll-tax rate increase in the year 2005. It rejects the idea of a value-added tax as being inflationary. Parenthetical remarks represent additional views of the Council members cited. PMID:7423348

  20. Unfalsifiability of security claims.

    PubMed

    Herley, Cormac

    2016-06-01

    There is an inherent asymmetry in computer security: Things can be declared insecure by observation, but not the reverse. There is no observation that allows us to declare an arbitrary system or technique secure. We show that this implies that claims of necessary conditions for security (and sufficient conditions for insecurity) are unfalsifiable. This in turn implies an asymmetry in self-correction: Whereas the claim that countermeasures are sufficient is always subject to correction, the claim that they are necessary is not. Thus, the response to new information can only be to ratchet upward: Newly observed or speculated attack capabilities can argue a countermeasure in, but no possible observation argues one out. Further, when justifications are unfalsifiable, deciding the relative importance of defensive measures reduces to a subjective comparison of assumptions. Relying on such claims is the source of two problems: once we go wrong we stay wrong and errors accumulate, and we have no systematic way to rank or prioritize measures. PMID:27217574

  1. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  2. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  3. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  4. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  5. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  6. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  7. 33 CFR 106.210 - OCS Facility Security Officer (FSO).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.210 OCS Facility Security Officer (FSO). (a)...

  8. 33 CFR 106.210 - OCS Facility Security Officer (FSO).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.210 OCS Facility Security Officer (FSO). (a)...

  9. 33 CFR 106.210 - OCS Facility Security Officer (FSO).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.210 OCS Facility Security Officer (FSO). (a)...

  10. 33 CFR 106.255 - Security systems and equipment maintenance.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance....

  11. 16 CFR 1500.41 - Method of testing primary irritant substances.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Method of testing primary irritant... § 1500.41 Method of testing primary irritant substances. Primary irritation to the skin is measured by a... appropriate solvent and apply the solution as for liquids. The animals are immobilized with patches secured...

  12. SPAN security policies and guidelines

    NASA Technical Reports Server (NTRS)

    Sisson, Patricia L.; Green, James L.

    1989-01-01

    A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure. Therefore, each system manager, must strictly adhere to the requirements and must consider implementing the guidelines discussed. There are areas of vulnerability within the operating system that may not be addressed. However, when a requirement or guideline is discussed, implementation techniques are included. Information related to computer and data security is discussed to provide information on implementation options. The information is presented as it relates to a VAX computer environment.

  13. The cost of IT security.

    PubMed

    McMillan, Mac

    2015-04-01

    Breaches in data security have become commonplace in health care, making IT security a necessary cost for healthcare organizations. Organizations that do not invest proactively in IT security face a significant risk of incurring much greater costs from incidents involving compromised data security. Direct costs of security breaches include the costs of discovery, response, investigation, and notification and also can include state or federal penalties and costs of compliance with corrective action plans and resolution agreements. Hidden costs can include damage to brand, loss of consumer confidence, reduced HCAHPS scores, and--by extension--reduced value-based purchasing payments.

  14. Use of crossbreeding with beef bulls in dairy herds: effect on age, body weight, price, and market value of calves sold at livestock auctions.

    PubMed

    Dal Zotto, R; Penasa, M; De Marchi, M; Cassandro, M; López-Villalobos, N; Bittante, G

    2009-09-01

    The aim of this study was to investigate the effect of different breeds and breed crosses on age (AC, d), BW (kg), price (PR, $/kg), and market value (MV, $/calf) of purebred and crossbred calves sold for veal and beef production. The Kovieh wholesale cattle organization (Bolzano, Italy) grouped calves from several dairy herds located in the Trentino-Südtirol region in Italy and sold them by public auctions. Data on AC, BW, PR, and MV from 96,458 calves were recorded from January 2003 to December 2007 and consisted of 4 pure breeds [2 dairy, Brown Swiss (BS) and Holstein-Friesian (HF); and 2 dual-purpose, Simmental (SI) and Alpine Grey (AG)], and 8 crossbreds by crosses of Limousin (LI) and Belgian Blue (BB) with the 4 dam breeds. Least squares means for AC, BW, PR, and MV were calculated for breeds and breed crosses with a model that included fixed effects of herd of birth, age (except for AC), sex, and breed of the calf, year and season of auction, and interactions between the main effects. The coefficients of determination of the models were 0.41, 0.51, 0.84, and 0.82 for AC, BW, PR, and MV, respectively. Sex, age, and breed were the most relevant sources of variation for BW (P < 0.001), whereas breed and sex were the most important sources of variation for AC, PR, and MV (P < 0.001). Also, PR and MV were significantly influenced (P < 0.01) by all the effects included in the model, except for season x age interaction in the case of MV. Market value of male was greater (P < 0.001) than that of female calves, with the exception of BS (-$28.76/calf) and HF (-$20.70/calf) purebred males. Dual-purpose purebred calves presented greater (P < 0.001) PR and MV than dairy purebreds (MV of $426.97/calf and $307.96/calf for SI and AG, and $256.24/calf and $275.65/calf for BS and HF, respectively). Calves from SI and AG dams had greater (P < 0.001) BW, PR, and MV than calves from BS and HF dams. Calves from SI cows had greater (P < 0.001) BW, PR, and MV than calves from AG

  15. 76 FR 34761 - Classified National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-14

    ... Classified National Security Information AGENCY: Marine Mammal Commission. ACTION: Notice. SUMMARY: This... information, as directed by Information Security Oversight Office regulations. FOR FURTHER INFORMATION CONTACT..., ``Classified National Security Information,'' and 32 CFR part 2001, ``Classified National Security...

  16. Information risk and security modeling

    NASA Astrophysics Data System (ADS)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  17. 7 CFR 1962.41 - Sale of chattel security or EO property by borrowers.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... chattels by selling the property at auction in the borrower's own name. RD 455-3, “Agreement for Sale by...-3 is completed before the sale. (c) Government takes possession. The borrower may also turn...

  18. 7 CFR 1962.41 - Sale of chattel security or EO property by borrowers.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... chattels by selling the property at auction in the borrower's own name. RD 455-3, “Agreement for Sale by...-3 is completed before the sale. (c) Government takes possession. The borrower may also turn...

  19. 7 CFR 1962.41 - Sale of chattel security or EO property by borrowers.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... chattels by selling the property at auction in the borrower's own name. RD 455-3, “Agreement for Sale by...-3 is completed before the sale. (c) Government takes possession. The borrower may also turn...

  20. 7 CFR 1962.41 - Sale of chattel security or EO property by borrowers.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... chattels by selling the property at auction in the borrower's own name. RD 455-3, “Agreement for Sale by...-3 is completed before the sale. (c) Government takes possession. The borrower may also turn...