44 resultados para concession agreement
em Queensland University of Technology - ePrints Archive
Resumo:
The concession agreement is the core feature of BOT projects, with the concession period being the most essential feature in determining the time span of the various rights, obligations and responsibilities of the government and concessionaire. Concession period design is therefore crucial for financial viability and determining the benefit/cost allocation between the host government and the concessionaire. However, while the concession period and project life span are essentially interdependent, most methods to date consider their determination as contiguous events that are determined exogenously. Moreover, these methods seldom consider the, often uncertain, social benefits and costs involved that are critical in defining, pricing and distributing benefits and costs between the various parties and evaluating potentially distributable cash flows. In this paper, we present the results of the first stage of a research project aimed at determining the optimal build-operate-transfer (BOT) project life span and concession period endogenously and interdependently by maximizing the combined benefits of stakeholders. Based on the estimation of the economic and social development involved, a negotiation space of the concession period interval is obtained, with its lower boundary creating the desired financial return for the private investors and its upper boundary ensuring the economic feasibility of the host government as well as the maximized welfare within the project life. The outcome of the new quantitative model is considered as a suitable basis for future field trials prior to implementation. The structure and details of the model are provided in the paper with Hong Kong tunnel project as a case study to demonstrate its detailed application. The basic contributions of the paper to the theory of construction procurement are that the project life span and concession period are determined jointly and the social benefits taken into account in the examination of project financial benefits. In practical terms, the model goes beyond the current practice of linear-process thinking and should enable engineering consultants to provide project information more rationally and accurately to BOT project bidders and increase the government's prospects of successfully entering into a contract with a concessionaire. This is expected to generate more negotiation space for the government and concessionaire in determining the major socioeconomic features of individual BOT contracts when negotiating the concession period. As a result, the use of the model should increase the total benefit to both parties.
Resumo:
Since 2003, Mainland China has been promoting the public–private partnership (PPP) procurement model in the waste-to-energy incineration sector to reduce the waste burying rate and improve environmental quality. Five critical risk factors (CRFs) that affect the construction and operation of waste-to-energy incineration projects have been identified from real-life risk events of 14 PPP waste-to-energy incineration plants through content analysis. These risk factors are insufficient waste supply, disposal of non-licensed waste, environmental risk, payment risk, and lack of supporting infrastructure. A recently completed PPP waste-to-energy incineration plant, the Shanghai Tianma project, was investigated to learn from the effective management of CRFs. First-hand data about the Shanghai Tianma project was collected, with a focus on project negotiation and concession agreement. Lessons learned about risk management were acquired. This paper presents a detailed study of the contractual structure, risk sharing scheme, risk response measures to CRFs, and project transfer of a PPP project. The study results will provide governments with management implications to prepare equitable concession agreements and benefit private investors by effectively mitigating and managing risks in future PPP waste-to-energy incineration projects.
Resumo:
Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted.
Resumo:
Objective: To assess extent of coder agreement for external causes of injury using ICD-10-AM for injury-related hospitalisations in Australian public hospitals. Methods: A random sample of 4850 discharges from 2002 to 2004 was obtained from a stratified random sample of 50 hospitals across four states in Australia. On-site medical record reviews were conducted and external cause codes were assigned blinded to the original coded data. Code agreement levels were grouped into the following agreement categories: block level, 3-character level, 4-character level, 5th-character level, and complete code level. Results: At a broad block level, code agreement was found in over 90% of cases for most mechanisms (eg, transport, fall). Percentage disagreement was 26.0% at the 3-character level; agreement for the complete external cause code was 67.6%. For activity codes, the percentage of disagreement at the 3-character level was 7.3% and agreement for the complete activity code was 68.0%. For place of occurrence codes, the percentage of disagreement at the 4-character level was 22.0%; agreement for the complete place code was 75.4%. Conclusions: With 68% agreement for complete codes and 74% agreement for 3-character codes, as well as variability in agreement levels across different code blocks, place and activity codes, researchers need to be aware of the reliability of their specific data of interest when they wish to undertake trend analyses or case selection for specific causes of interest.
Resumo:
We introduce a formal model for certificateless authenticated key exchange (CL-AKE) protocols. Contrary to what might be expected, we show that the natural combination of an ID-based AKE protocol with a public key based AKE protocol cannot provide strong security. We provide the first one-round CL-AKE scheme proven secure in the random oracle model. We introduce two variants of the Diffie-Hellman trapdoor the introduced by \cite{DBLP:conf/eurocrypt/CashKS08}. The proposed key agreement scheme is secure as long as each party has at least one uncompromised secret. Thus, our scheme is secure even if the key generation centre learns the ephemeral secrets of both parties.
Resumo:
The case study of Lusoponte illustrates the concession awarded by the Portuguese Government to finance, design, build and operate two bridges over the Tagus in Lisbon, Portugal. It includes an overview of the project's background and an analysis of the main risk categories stating both the actual risks encountered and the mitigation measures adopted. Throughout the project a great attention was given to whole life cycle costs, and gains in efficiency and cost control. Among the lessons that can be learned from both the public and private sector is that a complete risk management analysis must include not only the technical factors but also a realistic assessment of environmental and social risks. These were the risks that were somewhat overseen and that caused the main problems to the project's development.
Resumo:
We show how to construct a certificateless key agreement protocol from the certificateless key encapsulation mechanism introduced by \cite{lippold-ICISC_2009} in ICISC 2009 using the \cite{DBLP:conf/acisp/BoydCNP08} protocol from ACISP 2008. We introduce the Canetti-Krawczyk (CK) model for certificateless cryptography, give security notions for Type I and Type II adversaries in the CK model, and highlight the differences to the existing e$^2$CK model discussed by \cite{DBLP:conf/pairing/LippoldBN09}. The resulting CK model is more relaxed thus giving more power to the adversary than the original CK model.
Resumo:
The decision in QCOAL Pty Ltd v Cliffs Australia Coal Pty Ltd [2010] QSC 479 involved an examination of a number of issues relating to the assessment of costs under the Legal Profession Act 2007 (Qld). The decision highlights a range of issues which, in slightly different circumstances, may have deprived the successful party of the right to recover costs by reference to the costs agreement.