1,101 research outputs found

    The Political Economy of Giving: Legitimacy, Welfare, and the Influence of Foreign NGOs in China

    Get PDF
    Since the death of Mao and the rise of reformers in China, the world has eagerly awaited the results of changes sweeping through the developing nation. Deng Xiaoping and his successors have promised reform, which has come in the form of market liberalization. Now, after 20 years of reform, the Chinese people have seen a boom of economic prosperity. Their nation has joined the WTO and taken a central role in the world economy. Reform has also reduced political oversight of people’s daily lives and allowed the economy and society to exist in a less regulated environment. That being said, liberalization has also had dramatic effects on the delivery of social welfare, a major component of the socialist system, which is still the official goal of market development. To relieve enterprises of the burden of welfare delivery and allow the market to flourish through capitalist initiatives, the Party / state was obliged to reduce taxation on state owned enterprises in hopes of freeing capital with which the enterprises could invest. However, this both put more pressure on the government to deliver resources and reduced the state budget with which to do so. As the government’s share of national GDP dwindled, the state began accessing bank capital to finance welfare programs. Doing so has in turn depleted bank resources and left the nation in dire need of foreign capital donation. It was in this landscape that foreign non-government organizations (NGO’s) emerged; delivering both efficient and equitable changes to existing welfare delivery systems and much needed foreign capital. The Chinese Communist Party’s dependency on performance legitimacy through the social contract system directly led to escalating financial problems. NGOs, in pursuing their own goals, have enhanced the delivery of welfare in China and, in turn, helped to maintain the legitimacy of Party / state rule

    A knowledge discovery approach for the detection of power grid state variable attacks

    Get PDF
    As the level of sophistication in power system technologies increases, the amount of system state parameters being recorded also increases. This data not only provides an opportunity for monitoring and diagnostics of a power system, but it also creates an environment wherein security can be maintained. Being able to extract relevant information from this pool of data is one of the key challenges still yet to be obtained in the smart grid. The potential exists for the creation of innovative power grid cybersecurity applications, which harness the information gained from advanced analytics. Such analytics can be based on the extraction of key features from statistical measures of reported and contingency power system state parameters. These applications, once perfected, will be able to alert upon potential cyber intrusions providing a framework for the creation of power system intrusion detection schemes derived from the cyber-physical perspective. With the power grid having a growing cyber dependency, these systems are becoming increasingly the target of attacks. The current power grid is undergoing a state of transition where new monitoring and control devices are being constantly added. These newly connected devices, by means of the cyber infrastructure, are capable of executing remote control decisions along with reporting sensor data back to a centralized location. This dissertation is an examination of advanced data mining and data analytic techniques for the development of a framework for detecting malicious cyber activity in the power grid based solely on reported power system state parameters. Through this examination, results indicate the successful development of a cyber-event detection framework capable of detecting and localizing 92% of the simulated cyber-events. In focusing on specific types of intrusions, this work describes the utilization of machine learning techniques to examine key features of multiple power systems for the detection of said intrusions. System analysis is preformed using the Newton-Raphson method to solve the nonlinear power system partial differential power flow equations for a 5-Bus and 14-Bus power system. This examination offers the theory and simulated implementation examples behind a context specific detection approach for securing the current and next generation\u27s critical infrastructure power grid

    A Power Grid Incident Identification Based on Physically Derived Cyber-Event Detection

    Get PDF
    This article proposes a cyber-event detection framework to aid in incident Identification and digital forensics cases aimed at investigating cyber crime committed against the critical infrastructure power grid. However, unlike other similar investigative techniques, the proposed approach examines only the physical information to derive a cyber conclusion. The developed framework extracts information from the physical parameters stored in historical databases of SCADA systems. The framework uses a pseudo-trusted model derived from randomly selected power system observations found in the historical databases. Afterwards, a technique known as Bayesian Model Averaging is used to average the models and create a more trusted model. Results indicate a successful Classification of on average 89% for the simulated cyber events of varying magnitudes

    Non-HFE haemochromatosis

    Get PDF
    Non-HFE hereditary haemochromatosis (HH) refers to a genetically heterogeneous group of iron overload disorders that are unlinked to mutations in the HFE gene. The four main types of non-HFE HH are caused by mutations in the hemojuvelin, hepcidin,, transferrin receptor 2 and ferroportin genes. Juvenile haemochromatosis is an autosomal recessive disorder and can be caused by mutations in either hemojuvelin or hepcidin. An adult onset form of HH similar to HFE-HH is caused by homozygosity for mutations in transferrin receptor 2. The autosomal dominant iron overload disorder ferroportin disease is caused by mutations in the iron exporter ferroportin. The clinical characteristics and molecular basis of the various types of non-HFE haemochromatosis are reviewed. The study of these disorders and the molecules involved has been invaluable in improving our understanding of the mechanisms involved in the regulation of iron metabolism

    Change Management Controls Compliance With The Sarbanes-Oxley Act Of 2002: An Example From Practice

    Get PDF
    Publicly held firms and the assurance services industry are currently struggling with the implementation of standards set forth in the Sarbanes-Oxley Act of 2002 (SOX).  How to meet and assess SOX standards is considered by professionals to be uncharted territory.  This study reports the details of an actual SOX audit.  An international computer component manufacturing corporation engaged information system auditors from a Big 4 firm to determine whether change management procedures in two areas in their Finance Department were compliant with SOX.  Audit results indicated internal control deficiencies in the two areas audited.   SOX compliance was thus determined to be weak and unreliable.  In addition to reporting audit procedures actually used in practice to test SOX compliance, this case study presents key change management control procedures firms must have in place to be SOX compliant.  We provide helpful practical guidance for corporations and audit firms involved with SOX compliance audits.  In addition, this study has value for corporate internal control training sessions as well as general applicability for accounting information systems (AIS) and management information systems (MIS) courses.

    History and Politics in the Thought of Karl Jaspers

    Full text link
    A relatively overlooked but important work, The Origin and Goal of History, by Karl Jaspers is examined with regard the intellectual history of its development and influence, and its structure and prospects for contemporary and future relevance for political theory. Emphasis is placed on the argument that the central aspect of the work has been neglected in recent, important literature: its connection of a universal historical narrative with a theory of contemporary politics

    Diffusion as a Ruler: Modeling Kinesin Diffusion as a Length Sensor for Intraflagellar Transport

    Get PDF
    An important question in cell biology is whether cells are able to measure size, either whole cell size or organelle size. Perhaps cells have an internal chemical representation of size that can be used to precisely regulate growth, or perhaps size is just an accident that emerges due to constraint of nutrients. The eukaryotic flagellum is an ideal model for studying size sensing and control because its linear geometry makes it essentially one-dimensional, greatly simplifying mathematical modeling. The assembly of flagella is regulated by intraflagellar transport (IFT), in which kinesin motors carry cargo adaptors for flagellar proteins along the flagellum and then deposit them at the tip, lengthening the flagellum. The rate at which IFT motors are recruited to begin transport into the flagellum is anticorrelated with the flagellar length, implying some kind of communication between the base and the tip and possibly indicating that cells contain some mechanism for measuring flagellar length. Although it is possible to imagine many complex scenarios in which additional signaling molecules sense length and carry feedback signals to the cell body to control IFT, might the already-known components of the IFT system be sufficient to allow length dependence of IFT? Here we investigate a model in which the anterograde kinesin motors unbind after cargo delivery, diffuse back to the base, and are subsequently reused to power entry of new IFT trains into the flagellum. By mathematically modeling and simulating such a system, we are able to show that the diffusion time of the motors can in principle be sufficient to serve as a proxy for length measurement. We found that the diffusion model can not only achieve a stable steady-state length without the addition of any other signaling molecules or pathways, but also is able to produce the anticorrelation between length and IFT recruitment rate that has been observed in quantitative imaging studies

    Spectral Absorption Coefficient of Additive Manufacturing Polymers

    Get PDF
    As NASA turns to additive manufacturing processes, there is a need to ensure that the parts they produce are reliable. This is especially true when creating parts in space, where resources are limited and failure could result in catastrophe. Active thermography has shown potential as a non-destructive quality assurance technique for additive manufacturing processes. Heat transfer models used in active thermography techniques require accurate material property measurements in order to extract useful information about the system, including defect location. The spectral absorption coefficient, which determines the depth at which radiative power is absorbed into a surface, is a material property necessary for performing active thermography on AM polymers. This paper presents measurements of spectral absorption coefficients of polymers commonly used in additive manufacturing. Spectral absorption coefficients for fully dense PLA, ABS, and Nylon 12 samples are reported. Future work is needed to measure the spectral absorption coefficients of different materials and colored filaments commonly used in additive manufacturing
    • …
    corecore