Proposed Work Sample Clauses

Proposed Work. Describe work to be performed, the estimated hours of work, and a list of deliverables to be prepared. Please submit proposal to [County Task PM Name, Title, Email, Phone] on or before [Due Date, Time]. If you have any questions or need additional information, please contact the County Task PM listed above, or [Alternate County Person Name, Title, Email, Phone]. [Name] [Title] Attachments:
AutoNDA by SimpleDocs
Proposed Work. State authorizes Tenant to conduct the following Proposed Work on the Property: Installation of four (4) steel pilings. Tenant’s Proposed Work is considered Work and subject to the terms and conditions of this Lease. If the Proposed Work is not commenced within five years of the Commencement Date of the Lease, or if Tenant is required to renew, extend, modify, or obtain a new regulatory permit for the Proposed Work, Tenant shall obtain State’s prior written consent before conducting the Proposed Work pursuant to Section 7.3 of the Lease.
Proposed Work. The intent of the project is to provide the City of Xxxxxx with a “Toolbox” of maintenance and evaluation methods for sewer rehabilitation, evaluation, and/or eliminating groundwater inflow and infiltration in to the City’s collection system. The services shall include but not be limited to cleaning, CCTV Inspection, and annual evaluation and analysis of the sewer system for future rehab planning. The City may also use smoke testing and manhole inspections for further evaluation of the system. Rehabilitation tools may include CIPP, manhole rehabilitation by cementitious coating, chemical injection grouting, Cured-In-Place-Manhole (CIPM) liners or a combination thereof. Other rehabilitation services may include chemical grouting of pipe joints and lateral connections. It is the City’s intent to issue an annual purchase order based on the unit prices in this contract for approximately $200,000.00 to $300,000.00, pending yearly budget approval by the City Council. The City will provide a written scope of work for each individual purchase order. Each scope issued may not include all the items listed in this bid. The City does anticipate cleaning, CCTV inspections, and CIPP work to be a service requested each year. Services shall also include data reports in Access and/or Excel format, that shall allow the City to parse the data provided by the Contractor/Bidder by diameter, type pipe, type and severity of defect, priority of completion, etc. Said report(s) shall also include pertinent information regarding the project, a detailed analysis per line segment of CCTV inspection done that includes severity ratings, likelihood of failure, and indices for both structural and operation and maintenance severity ratings. It must include a summary of all totals noted on the CCTV project, including active and defective taps, likely point repairs, manholes that should be raised to grade, etc. with a budgetary format with estimated unit prices included. It should be further noted that said analysis and reports shall be the basis for future rehabilitation work on the sanitary system and are a critical component of the Contractor’s successful bid. All reports and deliverables (at project end), shall be per NASSCO PACP codes and standards.
Proposed Work. The objectives and scope of initial borehole drilling and testing at Ignace is briefly summarized as follows, with details provided in the individual Test Plans for each work package.
Proposed Work. This section shall include a summary of work proposed as a rolling three (3) month forecast for the next reporting period, by a certain date, and by whom.
Proposed Work. The proposed system for optimal group key agreement algorithm for social network can be done by four different compositions .they are asfollows
Proposed Work. A. The Recipient's Project Proposal, dated 06/01/2023 entitled Montana Statewide BLM GNA Prescribed Fire Support, is accepted by the BLM and incorporated herein, as part of this agreement in order to serve as the project work plan. Additional documents incorporated by reference: The following recipient documents BLM-GNA-2023-000093, dated 06/01/2023 to include: Standard Form (SF) 424 Application for Federal Assistance, SF424A, Budget Information - Non-Construction Programs, SF424B, Assurances - Non-Construction Programs, Budget Detail, and signed Certification Regarding Lobbying - Certification for Contracts, Grants, Loans and Cooperative Agreements.
AutoNDA by SimpleDocs
Proposed Work. A. The Recipient's Project Proposal, dated 07/10/2020 entitled Oregon Youth Corps/BLM Youth Employment Program, is accepted by the BLM and incorporated herein, as part of this agreement in order to serve as the project work plan. Additional documents incorporated by reference: The following recipient documents GRANT13169619, dated 07/15/2020 to include: Standard Form (SF) 424 Application for Federal Assistance, SF424A, Budget Information - Non-Construction Programs, SF424B, Assurances - Non-Construction Programs, Budget Detail, and signed Certification Regarding Lobbying - Certification for Contracts, Grants, Loans and Cooperative Agreements.
Proposed Work. CHAOS better than traditional cryptosystem . In[7] Compared to traditional cryptosystems like RSA, ECC offers equivalent security with smaller key sizes, faster computation, lower power consumption, as well as memory and bandwidth savings. In[8,9] It is especially useful for mobile devices which are typically limited in terms of their CPU, power and network connectivity. Thus the key generation time in ECC is smaller when compared to RSA, but the key generation time is larger in ECC when compared to CHAOS. Hence CHAOS is better than the traditional cryptosystems. Proposed system can be explained by the Chebyshev polynomial: Chebyshev polynomial composition property is presented by Xxxxx and Xxxxxxxxx. This shows the theory of two element key agreement idea which permits the imparting elements to trade open keys via unprotected channel and creates a common secret key among them. They accept that distribution of private data is via some safe medium however it is constrained to MANET. Chebyshev polynomialTn(x):[–1,1] → [–1,1] is defined as Tn(x) = cos(narccos(x)). This polynomial maps 𝑇𝑛: R->R of degree n is defined using reccurence relation as 𝑇𝑛*x=2x𝑇𝑛−1(x)-𝑇𝑛−2(x), where n≥2,𝑇0(x)=1, and 𝑇1(x)=x.
Proposed Work. In Our System there are three role such as user, admin & cloud when, data are upload the file then encryption and admin encryption at content level then cloud take file and encryption at file level and generated the block of user and split file into multiple chunks and stored into block level. \\ In System there are four Roles in Application Data Provider, user, Admin, Cloud Server provider when Data Provider upload the Data in different Group while uploading the admin get the file and encryption at content level and Generated the key and that key and Data are send to Cloud server provider(CSP). When the Cloud Server Provider encryption at file level and Update the Key and Stored in different Group, When user search the Data from Cloud from different Group. When other user gets the Data from different group then reconstruction algorithm is applied on Data. Algorithms:- • Block Generating (v, k+1, 1) :- generating a new block :-
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!