Problem Description. The Universities participating in this Laboratory XL Project are testing a new environmental management regulatory model which they have championed on behalf of the Laboratory Consortium for Environmental Excellence (LCEE), a Boston-based group of laboratory organizations and academic institutions organized to address environmental management issues in laboratories. To understand the nature of this project, it is useful to consider its regulatory context. The management of chemicals in laboratories is primarily regulated by two Federal statutes: The Occupational Safety and Health Act (OSHA) and the Resource Conservation and Recovery Act (RCRA). While the Occupational Safety Health Administration recognized laboratories as unique settings and developed a performance-based standard to allow laboratories to more efficiently and effectively meet health and safety requirements, the requirements of RCRA are less readily adapted to such a setting. This is in large part because the RCRA program was not designed for a laboratory environment, but rather for those organizations where it has been and is quite successful--manufacturing and industrial operations. The requirement for a hazardous waste determination and the management and handling provisions of RCRA are effective in a manufacturing environment where large quantities of a small number of hazardous wastes are consistently produced. In contrast, university laboratories typically generate relatively small quantities of many different hazardous wastes on a discontinuous basis. Furthermore, there are specific handling and management requirements for “hazardous wastes” under RCRA which may not apply to the larger universe of hazardous chemicals used in the laboratories which are subject to OSHA. Thus, university laboratories are essentially required to implement and track two parallel and not always consistent chemical management systems within the laboratory setting; one under RCRA which includes externally imposed requirements governing the management and handling of “hazardous waste,” and one under OSHA which is a performance-based, internally-developed management system governing the management and handling of “hazardous chemicals.” Such distinctions between, for example, sulfuric acid and waste sulfuric acid are generally “artificial” to laboratory workers who are trained in recognizing and understanding chemical hazards and managing such chemicals in a manner that minimizes these hazards. The implementatio...
Problem Description. Reasons for Request for Regulatory Flexibility The Universities have identified two principal regulatory problem areas, described below:
Problem Description. In order to better motivate the generalization process that led to the design of protocol presented in this paper, let us introduce a model that we will show to encompass various practical problems, and an example situation for which solutions in literature (to the best of our knowledge) do not give satisfactory results.
Problem Description. Suppose we want to create a WCF service with code contracts. A straightforward approach to combine both tech- nologies would be as follows: , , using System.ServiceModel; using System.Diagnostics.Contract; [ServiceContract] public interface IService { [OperationContract] double squareRoot(double d); } public class IServiceImpl : IService { public double squareRoot(double d) { Contract.Requires(d >= 0); return Math.Sqrt(d); }
Problem Description. Since 2010 the process of undertaking voluntary commitments has been launched in Georgia under the Covenant of Mayors which means that the cities joined this initiative aim to reduce the GHG emissions for their territories by 20% till 2020. Main sectors considered by the EU cities within the frames of this initiative are transport and buildings; however, the cities may include some other sectors as well (street lighting, waste management, landscaping, etc.). Following Tbilisi, other self-governing cities of Georgia enthusiastically embraced this initiative and started to join it gradually. 13 self-governments have already joined this initiative, including 9 self- governing cities and 4 municipalities. There have already been developed Sustainable Energy Action Plans (SEAP) for eight self-governing cities and a monitoring report - for Tbilisi. Main sectors considered by the cities of Georgia include transport, buildings, street lighting, waste management and landscaping. Telavi Municipality is located in Kakheti region. It was declared municipality in 2006. From 2014 city of Telavi became self-governing city and Temi Telavi became independent municipality. Its population was 38 721 people in 2014. The climate in the municipality is temperate wet, with moderately cold winter and hot summer. Mean annual temperature equals to 12oC and the annual sum of precipitation makes 700-800 mm. Telavi municipality became a legatee of the signature to the Covenant of Mayors (CoM). Telavi municipality has signed the Covenant of Mayors (CoM) on January 30, 2015 and thus has undertaken an obligation to prepare and implement within its administrative borders the SEAP aimed at the reduction of GHG emissions. The SEAP for the city of Telavi is currently being prepared and is to include Transportation, Buildings, Street lightning, Greening, Waste sectorsas well Agriculturefor both mitigation and adaptation purposes. The municipality of Telavi has neither an appropriate experience, nor skills, or enough technical staff to plan or manage sustainable development process of municipality; Particularly, one of strategic sectors of Telavi, under the short-term strategy of sustainable energy development process, is building sector but in order to move smoothly to clean/low emission buildings carrying out of serious steps and planning awareness raising activities for the population are being required, highlighting advantages of energy savings and utilization of local renewable energy res...
Problem Description. The FRMCS_GTW_REGISTER function is not linked with the MCX registration. It is used only for local binding. Therefore, if the communication service request is requested before the FRMCS GW has performed the MCX registration, the status of the communication gets stucked in “Trying”.
Problem Description. The suitability of a biomass type for a specific conversion technology is determined by different parameters that can ot be directly deduced from the current lignocellulosic biomass classification used in WP1. In other words, based on this current classification we cannot determine if a specific biomass type is suitable for a specific conversion system and to what extend it is suitable and therefore what the value of that biomass type is for a specific conversion system. Therefore we need a system that can classify biomass based on relevant characteristics for determining its suitability for conversion technologies. Such a classification system should help to determine what type of conversion systems are needed to effectively utilise the available biomass types in Europe under competitive conditions. Less suitable biomass will also have to find an energy application. The current international classification system for solid biofuels (ISO 17225 series) should also be taken into account, because this is used in trade.
Problem Description. There has not yet been a consensus on the evaluation and interpretation of word embeddings. There are mainly two types of assessments: intrinsic evalu- ations and extrinsic evaluations. Intrinsic evaluations often investigate the nature of semantics by comparing embedding relations and human cognitive sciences, which include both conscious and subconscious sciences [3, 26, 7]. Meanwhile, extrinsic evaluations focus on the engineering perspective where word embeddings are used as input to downstream tasks and evaluate the performance of embeddings on specific tasks [3]. On the other hand, the task of imparting interpretability has been tackled in various ways in the literature. Some researchers modified the training processes of embeddings to encourage interpretable dimension embedding learning [24, 20], while others suggested mapping from uninterpretable embedding to embeddings with more interpretable dimensions [2, 10]. Although the approaches mentioned above provide better understandings and interpretations to the word embeddings, many intrinsic evaluations have become ineffective due to the emergence of context-based word embeddings, which required contextual information as input. Moreover, we want to explore the possibilities of interpreting word embedding dimensions directly rather than trying to modify the current dimensions. This thesis aims to evaluate and understand context-based word embedding, mainly in the field of word sense disambiguation. We offer a hypothesis that some dimensions do not play a role in representing a word sense. In this work, we propose an algorithm to analyze and visualize the functionalities of specific dimensions to word meanings.
Problem Description. One of the weaknesses in the DHC protocol is that requesting and issuing DHCP addresses is typically done in an unauthenticated way. The new computing device sends a broadcast to the network, asking for an IP address. The DHCP replies to the device with the address to use for subsequent IP communication (among other pieces of information). This unauthenticated use of DHCP provides some attack vectors for adversaries on the network. The following scenario describes the attack vector called rogue DHCP Server which is present on many DHCP networks. In this scenario, an eduroam access network has a legitimate router and a legitimate DHCP server. A malintended eduroam user (or malware-infected device) connects to the network, authenticates, requests an IP address from the legitimate DHCP server and connects to the internet. His communication is properly encrypted through the Access Point (AP). user with account 802.1X: xxxx@xxxxx.xxx EAPoL key AP RADIUS srv DHCP srv Gateway 192.168.1.1 DHCP request? malicious intent DHCP lease [192.168.1.125; GW=192.168.1.1] Figure 2.1: Login of valid user with malicious intent The user then sets up a NAT gateway, which maps from its own IP address range of choice to his obtained IP address; and an own DHCP server, which announces his new NAT address as default gateway and hands out its own IP addresses in his own address range. RADIUS srv DHCP srv Gateway 192.168.1.1 communicates 192.168.1.125 Gateway: 10.0.0.1 DHCP: 10.0.0.1/24 AP
Problem Description eduroam IdPs use data storage (directories, databases, etc.) to store their users’ credentials. There are different technical ways to store user passwords in a secure, non-reversibly encrypted way. When using PEAP, the only option to store the credentials in this way is by employing the NT-Hash function to the password, which is a variant of the MD4 hash function. Many IdPs opt not to use NT-Hashes, but different forms of hashes which provide greater cryptographic strength than MD4. Popular choices are SHA1, SHA256 or their salted derivatives. Such hashes have the drawback that they are not compatible with PEAP. IdPs which use such hashes are forced to deploy EAP-TTLS with cleartext transmission of the user password within the TTLS tunnel (usually PAP). The EAP authentication combination EAP-TTLS+PAP is based on the creation of a secure communication channel using a certificate (EAP-TTLS) and sending user name and password in clear text inside the established tunnel from the user device to the IdP. The secure tunnel extends from the user device to the IdP (authentication server). Although the EAP-TTLS-PAP authentication combination is a common solution, Nokia phones that are able to connect to the wireless network use Symbian OS, which does not support EAP-TTLS+PAP. For more information on this topic, see the Nokia forum thread, EAP-TTLS/PAP support [NOKIAFORUM].