WorldWideScience

Sample records for additional protocol ratification

  1. Communication dated 19 January 2009 received from the Permanent Mission of the United States of America to the Agency regarding ratification by the United States of the Protocol Additional to its safeguards agreement with the Agency

    The Agency has received a communication dated 19 January 2009 from the Permanent Mission of the United States of America to the Agency regarding ratification by the United States of the Protocol Additional to the Agreement between the United States of America and the Agency for the Application of Safeguards in the United States of America. As requested therein, the communication is herewith circulated for information

  2. Law project adopted by the Senate and authorizing the ratification of the additional protocol to the agreement between France, the European atomic energy community and the international atomic energy agency relative to the application of warranties in France

    This project of law concerns an additional protocol to the agreement of warranties signed on September 22, 1998 between France, the European atomic energy community and the IAEA. This agreement concerns the declaration of all information relative to the R and D activities linked with the fuel cycle and involving the cooperation with a foreign country non endowed with nuclear weapons. These information include the trade and processing of nuclear and non-nuclear materials and equipments devoted to nuclear reactors (pressure vessels, fuel loading/unloading systems, control rods, force and zirconium tubes, primary coolant pumps, deuterium and heavy water, nuclear-grade graphite), to fuel reprocessing plants, to isotope separation plants (gaseous diffusion, laser enrichment, plasma separation, electromagnetic enrichment), to heavy water and deuterium production plants, and to uranium conversion plants. (J.S.)

  3. Climate change ratification of the Kyoto Protocol : clearing the air on the debate

    The Kyoto Protocol on Climate Change would commit Canada to limit emissions of greenhouse gases to 6 per cent below 1990 levels by 2008-2012. The Canadian Chamber of Commerce has outlined the following 3 key prerequisites that the federal government should and will have in place before any decision on ratification is made: (1) a detailed plan for achieving the Kyoto reductions, (2) a detailed analysis of environmental and economic impacts associated with Kyoto implementation, and (3) consultations with all stakeholder and the Canadian public once the plan has been released. Currently, Canadian businesses are taking voluntary actions to reduce industrial sector emissions through programs such as the Canadian Industry Program for Energy Conservation. Between 1990 and 1999, industrial sector emissions fell by 6 per cent. However, it was emphasized that despite these efforts, the gap between Canada's Kyoto target and its current greenhouse gas emissions continues to grow because of population and economic growth and rising exports. At the current rate of growth, it is estimated that meeting the Kyoto target could cost the economy up to $30 billion in 2010. The paper also discusses the implementation of key flexibility mechanisms such as carbon sinks, Joint Implementation, the Clean Development Mechanism and credits for export of cleaner energy to the United States, a non-Kyoto country. It is argued that ratification of Kyoto could hurt investments and impact jobs in Canada by making Canadian industries uncompetitive relative to their American counterparts. It is emphasized that full participation by the Canadian public is required in adapting to major lifestyle changes to reduce the use of fossil fuels and other sources of greenhouse gases. In conclusion, the Canadian Chamber of Commerce does not believe that the Kyoto Protocol is the most effective and efficient way of moving forward on the climate change issue and recommends that the federal government develop a made

  4. Model Additional Protocol

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  5. Joint protocol relating to the application of the Vienna Convention and the Paris Convention. Status list as of 12 September 2000. Signature, ratification, acceptance, approval or accession

    The document presents the status of signature, ratification, acceptance, approval or accession of the Joint Protocol Relating to the Application of the Vienna Convention and the Paris Convention as of 12 September 2000. The Joint Protocol entered into force on 27 April 1992

  6. Ratification of the Kyoto Protocol: a citizen's guide to the Canadian climate change policy process

    Canada is faced with the important decision of whether it should ratify the Kyoto Protocol. A reference for stakeholders and non-expert interested parties, this document is a guide into the Canadian Climate Change Policy Process. An understanding of climate science is required for climate policy, as is a knowledge of policy options available to overcome the challenges posed by climate change. The situation is further complicated by international and federal-provincial negotiations over the measures that should be implemented, if any. Climate policy affects all aspects of our lives, especially how we produce and use energy. An overview of climate science is provided in the first section, and the relationship between climate and rising temperatures due to greenhouse gas emissions is established. The sources of greenhouse gases in Canada are identified, with a closer look at the current trends. The Kyoto Protocol, if ratified, calls for Canada to reduce its emissions of greenhouse gases to six per cent below 1990 levels. It is noted that to date, Canada's emissions have risen 19.7 per cent above 1990 levels. The process underlying the international negotiations associated with the Kyoto Protocol, and especially Canada's role in it, are discussed. Flexibility mechanisms are strongly supported by Canada, such as credits for sinks, international carbon trading and credits for Clean Energy Exports. By approving such measures, the integrity of the Protocol would be considerably weakened. The domestic policy-making environment is examined, presenting key federal, provincial business and environmental players. In addition, the policy process in Canada is described, as well as the decisions made up to September 2002. Bibliographic and contact information is added in the last section of the document. 89 refs., 7 tabs., 7 figs

  7. Bill project authorizing the ratification of the amendment to the Kyoto protocol of the 11 December 1997 - Nr 1880

    This bill project first recalls the context of adoption of the amendment (objectives of the Kyoto protocol for the limitation of greenhouse gas emissions, adoption of the amendment in Durban to extend these commitments over a new eight-year long period). It indicates and describes the scope of the amendment according to its two articles and in relationship with the Kyoto protocol. The text of the amendment is provided, and then the text of the French bill project authorizing its ratification. This bill project also recalls the context, indicates the objectives of the amendment, discusses the estimated consequences (notably constraints) of its implementation in terms of reduction of greenhouse gas emissions and, more generally, in the struggle against climate change. These consequences are economic and financial, environmental, legal (and in relationship with the existing legal framework) and administrative. The history of the negotiation process is briefly recalled. It is noticed that five countries have already ratified the amendment at the time of publication of this bill project. Some remarks are made regarding the application of the amendment to the French overseas territories

  8. Decree No. 33/77 of 11 March approving ratification of the Convention on Third Party Liability in the Field of Nuclear Energy, signed in Paris on 29 July 1960 and amended by the Additional Protocol, signed in Paris on 29 January 1964

    This Decree, promulgated on 21 February 1977, approves ratification of the Paris Convention and reproduces the full text of the Convention in French, followed by its translation into Portuguese. The Paris Convention provides an exceptional nuclear liability system and its scope is limited to risks of an exceptional character for which common law rules and practice are not suitable. Under the Convention, liability is absolute, channelled onto the nuclear operator and limited in amount. (NEA)

  9. Report realized on behalf of the Foreign Affairs Commission, of Defense and Armed Forces on the law project allowing the additional protocol ratification to the agreement between France, European Community of the atomic energy and the International Atomic Energy Agency relative to the guaranties application in France

    In a first part the author presents the International Atomic Energy Agency and its missions in the nuclear non proliferation policy especially in the agreements with the states of the TNP (Treaty of Nuclear non Proliferation). the today position of France is then analyzed towards the IAEA and the novations added by the additional protocol. (A.L.B.)

  10. Additional protocol experience in Romania

    Full text: National Commission for Nuclear Activities Control (CNCAN) is the national regulatory body with regulation, authorization and control responsibilities. CNCAN has the right and obligation to ensure that safeguards are applied, in accordance with the terms of the safeguards agreement, on all source or special fissionable material in all peaceful nuclear activities within the State, under its jurisdiction or carried out under its control anywhere, for the exclusive purpose of verifying that such material is not diverted to nuclear weapons or other nuclear explosive devices. CNCAN has built a strong primary and secondary legislation in order to have a strong legal framework to fulfill the NPT, Safeguards Agreement and Additional Protocol requirements. In respect of the non-proliferation issues CNCAN has as a major goal to strengthen the effectiveness and to improve the efficiency of the safeguards system. Also closer co-operation between the IAEA and CNCAN as coordinator of the national system of accounting for and control of nuclear material has been developed by organizing international and national seminars on the implementation of safeguards and the additional protocol. After the entry into force of the Additional Protocol, CNCAN prepared appropriate declarations and answers to the relevant IAEA questions in order to obtain a drawn conclusion of the absence of undeclared nuclear material and nuclear activities within Romania territory. The IAEA evaluated in Romania not only the results of its nuclear material related activities under the Safeguards Agreement but also the results of its broader, more qualitative, evaluation and verification activities under the Additional Protocol. CNCAN assured that the IAEA inspectors have complementary access according to the Additional Protocol as requested in accordance with the provisions of the Safeguards Agreement and the Additional Protocol and cooperated in resolving in a timely manner, any questions or

  11. Bill authorizing the ratification of the protocol amending the Protocol on transitional provisions annexed to the Treaty on European Union, to the Treaty on the Functioning of the European Union and to the Treaty establishing the European Atomic Energy Community

    After an indication of the European Parliament composition, this text describes the transitional provisions adopted as the Lisbon Treaty did not come into effect before the European elections held in June 2009. The document also provides the protocol text signed by the Members States and which amended the protocol on transitional provisions annexed to the Treaty on the European Union, to the Treaty on the Functioning of the European Union and to the Treaty establishing the European Atomic Energy Community. The last part of the document discusses the administrative and legal consequences of this protocol. It also recalls the history of the negotiations and indicates the present status of signatures and ratifications

  12. Workshop to promote the ratification of the protocol on heavy metals across the entire UN ECE region

    NONE

    2009-12-15

    Within the workshop of the German Federal Environment Agency (Dessau-Rosslau, Federal Republic of Germany) at 14th to 16th May, 2008 in Yerevan (Armenia), the following lectures were held: (1) The convention and its protocols - framework and requirements (Tea Aulavuo); (2) Development of the heavy metals protocol up to now (D. Jost); (3) Experiences in transposing the obligations of the HM protocol into national law (Ivan Angelov); (4) Evaluation of concentrations of air pollutants and depositions of HM over the EECCA region (Ilia Ilyin); (5) The effectiveness of the HM protocol - emission reductions and costs (TNO-study) (M. van het Bolscher); (6) Technologies and techniques and their emission reduction potential and costs (Andre Peeters Weem); (7) Synergies of reduction of HM and particulate matter (Katja Kraus); (8) Critical loads / critical levels and effects of HM - integrated assessment (Jean-Paul Hettelingh); (9) Additional technical measures / options and their reduction potential (M. van het Bolscher); (10) Overview of the situation in the EECCA region - evaluation of a questionnaire of the Secretariat of the LRTAP Convention and ideas on revising the protocol and its annexes (Johan Sliggers); (11) Future aims of the TF (Katja Kraus).

  13. Protocol for ADDITION-PRO

    Johansen, Nanna Borup; Hansen, Anne-Louise Smidt; Jensen, Troels M;

    2012-01-01

    disease and microvascular diabetic complications. We also require a better understanding of the mechanisms that underlie and drive early changes in cardiometabolic physiology. The ADDITION-PRO study was designed to address these issues among individuals at different levels of diabetes risk recruited from...... Danish primary care. METHODS/DESIGN: ADDITION-PRO is a population-based, longitudinal cohort study of individuals at high risk for diabetes. 16,136 eligible individuals were identified at high risk following participation in a stepwise screening programme in Danish general practice between 2001 and 2006...... assessment included detailed measurement of anthropometry, body composition, biochemistry, physical activity and cardiovascular risk factors including aortic stiffness and central blood pressure. All ADDITION-PRO participants are being followed for incident cardiovascular disease and death. DISCUSSION: The...

  14. Implementation of the Additional Protocol in Japan

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  15. Kyoto's enemy : the american oil industry's influence in the signing and non-ratification of the Kyoto protocol

    2006-01-01

    Executive Summary This study is an empirical and theoretical analysis of the influence obtained by the American oil industry in the United States decision to first sign and then not ratify the Kyoto Protocol. The purpose of the study is to explore and measure the influence the industry managed to obtain and then compare the period before the signing to the period between the signing and the decision to not ratify Kyoto. By employing theoretical framework, the empirical data collected wi...

  16. The challenges of additional protocol implementation

    Full text: The IAEA Board of Governors approved the Model Protocol Additional to Safeguards Agreements, INFCIRC/540, (referred to as the Additional Protocol) in May 1997. The Additional Protocol provides for new mechanisms that include expanded information on State's nuclear activities to be declared to the IAEA and increased physical access to locations for IAEA inspectors. The objective is to provide the basis for gaining assurance of the absence of undeclared nuclear material and activities in a State. Although the Agency conducted field trials of various aspects of implementation of the Additional Protocol, the first actual implementation experience began with the entry into force of Australia's additional protocol in December of 1997. As of late August 2001,21 states have entered into force an additional protocol and another 35 states have signed the additional protocol but not yet entered the agreement into force. Because implementation of the Additional Protocol requires new activities to be carried out by the IAEA, new procedures, guidelines and training have been developed to support these activities. As more experience is gained these documents are being refined and additional ones developed to meet unforeseen needs. In addition, evaluation and follow-up of the expanded information and the results of increased access has required the Safeguards Department to expand and adapt its procedures and mode of operation. The challenge has been in establishing sufficient measures and the necessary infrastructure for consistent application of the additional protocol in such a way that they can be adapted as needed based on Agency experience. Initial development focused on the logistical aspects of implementing these new activities. These activities include the processing, handling and review of additional protocol declarations; planning, conducting and reporting on complementary access activities; and follow-up activities arising from information review or

  17. Bill authorizing the ratification of the protocol amending the Protocol on transitional provisions annexed to the Treaty on European Union, to the Treaty on the Functioning of the European Union and to the Treaty establishing the European Atomic Energy Community; Projet de loi autorisant la ratification du protocole modifiant le protocole sur les dispositions transitoires annexe au traite sur l'Union europeenne, au traite sur le fonctionnement de l'Union europeenne et au traite instituant la Communaute europeenne de l'energie atomique

    NONE

    2010-07-01

    After an indication of the European Parliament composition, this text describes the transitional provisions adopted as the Lisbon Treaty did not come into effect before the European elections held in June 2009. The document also provides the protocol text signed by the Members States and which amended the protocol on transitional provisions annexed to the Treaty on the European Union, to the Treaty on the Functioning of the European Union and to the Treaty establishing the European Atomic Energy Community. The last part of the document discusses the administrative and legal consequences of this protocol. It also recalls the history of the negotiations and indicates the present status of signatures and ratifications

  18. Report realized on behalf of the Foreign Affairs Commission, of Defense and Armed Forces on the law project allowing the additional protocol ratification to the agreement between France, European Community of the atomic energy and the International Atomic Energy Agency relative to the guaranties application in France; Rapport fait au nom de la commission des affaires etrangeres, de la defense et des forces armees sur le projet de loi autorisant la ratification du protocole additionnel a l'accord entre la France, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties en France

    NONE

    2002-07-01

    In a first part the author presents the International Atomic Energy Agency and its missions in the nuclear non proliferation policy especially in the agreements with the states of the TNP (Treaty of Nuclear non Proliferation). the today position of France is then analyzed towards the IAEA and the novations added by the additional protocol. (A.L.B.)

  19. The challenges of additional protocol implementation

    The IAEA Board of Governors approved the Model Protocol Additional to Safeguards Agreements, INFCIRC/540, (referred to as the Additional Protocol) in May 1997. The Additional Protocol provides for new mechanisms that include expanded information on State's nuclear activities to be declared to the IAEA and increased physical access to locations for IAEA inspectors. Given the expanded capability under the additional protocol for the Agency to draw conclusions regarding the absence of undeclared nuclear material and activities, Safeguards Department staff have had to broaden their outlook with respect to all safeguards activities being conducted. Beyond verification of nuclear material, inspectors are being called upon to conduct a wider range of activities, with more emphasis on observation of indicators of a State's nuclear-related activities and consideration of the consistency of the other information with a State's declarations. This includes consideration of how the evaluation of all information available to the Agency affects the planning and prioritizing of future safeguards activities, for example in resolving questions or inconsistencies in the declared information or selecting locations for conducting complementary access. The implementation of strengthened safeguards and the additional protocol has led to a need to institutionally change the roles of many staff members in the various Safeguards Divisions and increase the interaction between the Divisions to most effectively draw State-level conclusions regarding the absence of undeclared nuclear material and activities. This paper focuses on the significant changes in the roles of safeguards inspectors, in particular facility officers and country officers, in the implementation of strengthened safeguards. It outlines the nature of the changes, and some of the challenges being faced in order to adapt to these roles, including changes in the nature of interaction between the Operations and Support Divisions

  20. Intelligence and treaty ratification

    This paper starts with some comments about where the author thinks the intelligence community fits in the process and then plays this back through the INF negotiations and ratifications as the author saw them unfold. As a general rule in ratification, the first thing to remember is that you are not dealing with an objective process. That the president can sign the treaty and send it to the Senate means that he and others in the executive branch have already accepted that the treaty is a good thing. And they are not bringing it to the Senate saying maybe it is or it is not. They are there to sell the treaty to the Senate, especially to those who may be skeptical, but whose votes will make the difference between a simple majority and the two-thirds you need to get the treaty back to the White House for ratification

  1. Recommendations for Enhancing Implementation of Additional Protocol Declarations

    Japan signed the Additional Protocol (hereafter, AP) in December 1998. The domestic law and regulation had been revised to implement the initial and annual declarations for the Agency and the Additional Protocol came into force in December 1999. Since initial declaration in 2000, Japan has submitted the annual declaration in every May. Until 2010, Japan has made 10 annual declarations. This paper gives recommendations to enhance implementation of Additional Protocol declarations based on 10-year experience in Japan and addresses the following: Current status of additional protocol declaration in Japan; Outline of processing method; AP Information Management System; Recommendations for improving quality of declaration. Preparation of additional protocol declaration in NMCC has been conducted in the course of contract with Japan Safeguards Office (hereafter, JSGO) for safeguards information treatment. (author)

  2. IAEA to implement Safeguards Additional Protocols in the EU

    Full text: IAEA Director General Mohamed ElBaradei welcomed the entry into force today of the Additional Protocols for 15 States of the European Union - France, the United Kingdom and the 13 non-nuclear weapon States of the EU - and the European Atomic Energy Community (EURATOM). The Protocols, which provide the Agency with better tools to verify compliance with nuclear non-proliferation commitments, entered into force when the European Commission informed the Agency that EURATOM's own requirements for entry into force had been met. The 15 States had provided similar notifications over the past years since signing the Protocols in 1998. The simultaneous entry into force of Additional Protocols for the 15 EU States is 'a very positive development and a milestone in our efforts to strengthen the verification regime', said Dr. ElBaradei. 'In my view, the Additional Protocol should become the standard for verification under the Treaty on the Non-Proliferation of Nuclear Weapons (NPT).' He added that the Agency had been preparing for the entry into force of the EU protocols and was confident that, in co-operation with the 15 States and EURATOM, it would be able to ensure effective and efficient implementation in the EU States. The Model Additional Protocol was developed following the discovery of Iraq's clandestine nuclear weapons programme to ensure that the IAEA is given the information and access it needs for timely discovery of any similar activities in States that have pledged not to use nuclear material and activities for weapons purposes. In the past year, Additional Protocols entered into force for 22 countries, and the Agency will now implement Additional Protocols in 58 States, which includes the 15 EU States. The 10 countries joining the EU on 1 May 2004 - seven of which already have brought into force Additional Protocols to their respective safeguards agreements - are expected to gradually accede to the Safeguards Agreement and Additional Protocol covering

  3. Towards wider adherence to the strengthened safeguards system: Additional protocols and small quantities protocols

    During the past few years, the IAEA Secretariat has been implementing a Plan of Action to encourage and facilitate the conclusion of safeguards agreements and additional protocols. Such outreach activities by the IAEA and its Member States have contributed to the IAEA's effectiveness and efficiency objectives through a rapidly increasing number of States with additional protocols. Since 2001, the number of States with additional protocols in force has more than tripled from 24 to 78, while 110 States have signed additional protocols. Of particular importance for the strengthening of safeguards, more than 80% of all States with safeguards significant nuclear activities have concluded additional protocols. Following the IAEA Board of Governors' decisions in 2005 regarding small quantities protocols (SQPs), the Secretariat's outreach activities have also promoted the acceptance of the new standardized SQP text, which allows for initial reports, early information about new facilities and IAEA inspections, while making SQPs unavailable for States with planned or existing nuclear facilities. Since the Board took its decisions, nine States have accepted the modified SQP text and the IAEA has written to all relevant States proposing to modify the existing SQPs. For States that have not yet decided to conclude an additional protocol, the Secretariat has found that this is generally because of policy reasons or administrative hurdles or because of legal or technical obstacles. Specifically, a number of States need to put in place an effective national system for accounting and control of nuclear material and activities. Many States have taken action to strengthen such controls in order to be able to report under their safeguards agreements and additional protocols. This is a positive development from the point of view of strengthened safeguards, and also strengthens the authorities' hand in preventing and detecting attempts at illicit trafficking. Accordingly, the IAEA has

  4. Ratification of the Lisbon Treaty

    Ioana PATRAN

    2008-01-01

    Every country in the EU must ratify according to its own legislation The Lisbon Treaty for it to come into force and for the next elections for the European Parliament to be held according to these new settlements. In the way that the ratification process is presented in this moment, it seems that only in the summer of 2008 the situation will start to clarify and we will know if the Treaty will have a different path from The Constitutional Treaty, becoming just a beautiful memory of the EU re...

  5. 76 FR 24854 - Proposed Information Collection; Comment Request; Additional Protocol Report Forms

    2011-05-03

    ...-related items and materials; and research and development. The Protocol also expands IAEA access to... Bureau of Industry and Security Proposed Information Collection; Comment Request; Additional Protocol.... Abstract The Additional Protocol requires the United States to submit declaration forms to...

  6. The Role of Additional Pulses in Electropermeabilization Protocols

    Suárez, Cecilia; Soba, Alejandro; Maglietti, Felipe; Olaiz, Nahuel; Marshall, Guillermo

    2014-01-01

    Electropermeabilization (EP) based protocols such as those applied in medicine, food processing or environmental management, are well established and widely used. The applied voltage, as well as tissue electric conductivity, are of utmost importance for assessing final electropermeabilized area and thus EP effectiveness. Experimental results from literature report that, under certain EP protocols, consecutive pulses increase tissue electric conductivity and even the permeabilization amount. Here we introduce a theoretical model that takes into account this effect in the application of an EP-based protocol, and its validation with experimental measurements. The theoretical model describes the electric field distribution by a nonlinear Laplace equation with a variable conductivity coefficient depending on the electric field, the temperature and the quantity of pulses, and the Penne's Bioheat equation for temperature variations. In the experiments, a vegetable tissue model (potato slice) is used for measuring electric currents and tissue electropermeabilized area in different EP protocols. Experimental measurements show that, during sequential pulses and keeping constant the applied voltage, the electric current density and the blackened (electropermeabilized) area increase. This behavior can only be attributed to a rise in the electric conductivity due to a higher number of pulses. Accordingly, we present a theoretical modeling of an EP protocol that predicts correctly the increment in the electric current density observed experimentally during the addition of pulses. The model also demonstrates that the electric current increase is due to a rise in the electric conductivity, in turn induced by temperature and pulse number, with no significant changes in the electric field distribution. The EP model introduced, based on a novel formulation of the electric conductivity, leads to a more realistic description of the EP phenomenon, hopefully providing more accurate

  7. International Workshops to Foster Implementation of the IAEA Additional Protocol

    A countrys adherence to the International Atomic Energy Agencys (IAEA) Additional Protocol is an important statement to the world of that countrys commitment to nuclear nonproliferation. Without the Additional Protocol (AP) it is possible, as demonstrated in Iraq, for a country party to the Non-Proliferation Treaty (NPT) to clandestinely work toward nuclear weapons and be undetected by the IAEA. This is because classical safeguards under the NPT are directed at diversion of nuclear material from declared activities. But a country may instead build undeclared activities to produce weapons-grade nuclear material. The AP is directed at detecting those undeclared activities. As of May 2003, 73 countries had signed the AP, but only 35 have entered into force. To further adherence to the AP, the IAEA has held regional, high-level seminars in Japan, South Africa, Kazakhstan, Peru, Romania, and Malaysia to explain AP provisions. To supplement these policy-level seminars, the U.S. Department of Energy (DOE) has undertaken to develop a set of modules of technical competencies required to implement the AP. The intent is to work closely with the IAEA by providing these technical competencies to countries as well as to complement the IAEAs regional seminars and other outreach efforts. This paper briefly describes the technical competency modules.

  8. Implementation of INFCIRC/193 and its additional protocol in the Slovak Republic

    requirements resulting from the Protocol. To enable the ratification of the Protocol Additional, first of all it was necessary to amend the Atomic Law and associated regulations. On 21 June 2004 the president of the Slovak Republic has signed the letter of accession of Slovakia to the safeguards agreement INFCIRC/193 including the relevant Additional Protocol. On 1 December 2005 this agreement entered into force. During the period between 1 May 2004 and 1 December 2005 the Slovak Republic had to report both to the IAEA (according INFCIRC/173) and to the European Commission (according to the Euratom Treaty and Regulation No. 302/2005). Starting from 1 December 2005 the UJD has begun with the implementation of INFCIRC/193 and its Protocol Additional. As an instrument supporting non-proliferation of nuclear weapons a control of export/import of nuclear material, nuclear related and dual-use material, equipment and technologies is being used. The government of the Slovak Republic like many other governments uses for this purpose licensing system. Basic principles for control of export/import of selected goods were defined in the Act No. 26/2002. The act clearly describes requirement of exporters/importers and also responsibility and powers of the regulator which is the Ministry of Economy of SR issuing license. In like manner as for safeguards, after accession to the EU, Regulation 1334/2000 setting up a Community regime for the control of exports of dual-use items and technology entered into force. The role of the UJD in the export/import control system is anchored in the Act No. 541/2004 Coll. The act gives the UJD power to issue permission for export/import of nuclear material, nuclear-related or dual-use material, equipment and technologies a list of which is included in Regulation 1334/2000. In issuing the permission the UJD strictly follows recommendations and requirements of the Regulation 1334/2000 and NSG guidelines published in the IAEA INFCIRC/254 and guidelines of the

  9. The Status of Implementation on Additional Protocol at KAERI

    Under the Additional Protocol, a State is required to provide the IAEA with further information on nuclear related activities, all buildings on a site, etc. through an expanded declaration and further access rights at a nuclear site and any location included in the expanded declaration. This paper describes the implementation status on the expanded declaration and the complementary access at KAERI under the AP. This paper reviewed the implementation status of the AP at KAERI, and there are some practical issues to prepare the expanded declarations as mentioned above. From the view point of the effective and efficient processing of the expanded declaration, it will be necessary to discuss the criterion for the definition of the nuclear fuel cycle-related R and D to be declared under the AP with IAEA

  10. New START: The Contentious Road to Ratification

    Elizabeth Zolotukhina

    2011-01-01

    Full Text Available Senate ratification of the New START treaty re-established effective bilateral inspection and monitoring of American and Russian nuclear holdings and has the potential to further enhance U.S.-Russian cooperation on key issues, including containing the Iranian nuclear program, and further reductions in the two countries' arsenals. Although the accord was widely heralded as a foreign policy success of the Obama administration, the contentious Senate ratification may impede future progress on arms control.

  11. Commercial satellite data as support to the additional protocol declarations

    Full text: Objectives - The overall objective of the project is to show how commercial satellite data can be used for safeguard purposes both at SKI and the International Atomic Energy Agency. Furthermore this project will support IAEA in its process to develop methods to make the best use of provided information such as digitised maps and satellite images. Finally it will give IAEA a case study of the usefulness of satellite data for change detection purposes. Background - The protocol calls among others for an extended/complete declaration of all nuclear fuel cycle-related research and development activities as well as sites where nuclear material is or was customarily used. The declaration shall include descriptions of all buildings at the sites as well as maps. In parallel to the development of the additional protocol IAEA has started to use a variety of measures/techniques both to verify that declarations are complete and correct but also to be able to come to the conclusion that a state has no undeclared nuclear material or undeclared nuclear activities. One such technique is the use of commercial satellite data. The IAEA is now in the process of evaluating the usefulness and effectiveness of such data for safeguard purposes. In order to come to a decision on how to use satellite data IAEA is highly dependant on support from member states which can provide results from case studies etc. Analysis - This project shall provide SKI with digitised maps and commercial satellite data by the means of GIS to verify the descriptions provided by two of the nuclear operators. Furthermore those digital data can be included in the declaration given to IAEA. The overall aim is to enhance the quality of the Swedish declaration including support to IAEA to develop methods to use commercial satellite data. Results - The paper will present experiences and mapping results made during the work. (author)

  12. Recommended Protocol for Round Robin Studies in Additive Manufacturing

    Moylan, Shawn; Brown, Christopher U.; Slotwinski, John

    2016-01-01

    One way to improve confidence and encourage proliferation of additive manufacturing (AM) technologies and parts is by generating more high quality data describing the performance of AM processes and parts. Many in the AM community see round robin studies as a way to generate large data sets while distributing the cost among the participants, thereby reducing the cost to individual users. The National Institute of Standards and Technology (NIST) has conducted and participated in several of these AM round robin studies. While the results of these studies are interesting and informative, many of the lessons learned in conducting these studies concern the logistics and methods of the study and unique issues presented by AM. Existing standards for conducting interlaboratory studies of measurement methods, along with NIST’s experience, form the basis for recommended protocols for conducting AM round robin studies. The role of round robin studies in AM qualification, some of the limitations of round robin studies, and the potential benefit of less formal collaborative experiments where multiple factors, AM machine being only one, are varied simultaneously are also discussed. PMID:27274602

  13. Development of the strengthened safeguards system and the Additional Protocol

    For the past 30 years, the IAEA's safeguards system has contributed to the international non-proliferation regime by providing, inter alia, assurances regarding the peaceful uses of declared nuclear material. However, the discovery of a clandestine nuclear weapons program in Iraq in 1991 drew world-wide attention to the need to strengthen the system to address the absence of undeclared nuclear material and activities. Efforts to strengthen the IAEA's safeguards system began in 1991 and culminated in 1997 when the IAEA's Board of Governors approved a Model Protocol Additional to IAEA Safeguards Agreements which greatly expands the legal basis and scope of IAEA safeguards. Within this strengthened system it is expected that the IAEA be able to provide assurance not only of the absence of diversion of declared nuclear material but also on the absence of undeclared nuclear material and activities. This is to be done within a safeguards system that uses an optimal combination of all safeguards measures available, thereby achieving maximum effectiveness and efficiency within the available resources. The paper summarizes the evolution of the safeguards system, describes strengthened safeguards, reports on the status of implementing the strengthening measures, and outlines plans for integrating all available safeguards measures. (author)

  14. The Role of Additional Pulses in Electropermeabilization Protocols

    Suárez, Cecilia; Soba, Alejandro; Maglietti, Felipe; Olaiz, Nahuel; Marshall, Guillermo

    2014-01-01

    Electropermeabilization (EP) based protocols such as those applied in medicine, food processing or environmental management, are well established and widely used. The applied voltage, as well as tissue electric conductivity, are of utmost importance for assessing final electropermeabilized area and thus EP effectiveness. Experimental results from literature report that, under certain EP protocols, consecutive pulses increase tissue electric conductivity and even the permeabilization amount. H...

  15. Green certificates - additional instruments at Kyoto Protocol's flexible mechanisms

    The paper presents four mechanisms, designed to realize certain objectives - to stimulate the use of electricity produced from renewable energy sources and to mitigate greenhouse gas emissions. The operation mode of these mechanisms is analyzed and their common characteristics are determined, as well as the possibility to interact each other. The systems analysed are Tradable Green Certificates and Flexible Mechanisms of Kyoto Protocol. The Green Certificates System is explained more thoroughly because the Romanian Government chose them to promote electricity from renewable energy sources on the internal electricity market. The main characteristic of these systems, which combine elements of centralization with the use of market mechanisms are outlined

  16. THE LISBON TREATY: A SINUOUS RATIFICATION

    Adrian-Gabriel Corpădean

    2011-01-01

    This article deals with the intricate ratification process of the Lisbon Treaty, while focusing on the thorny issues of Euroscepticism and democratic deficit within the European Union in the current institutional context. The study is based on a wide research endeavour, whose purpose has been to encompass multiple points of view on the future of the European Union, seen from the perspective of the Treaty of Lisbon and its reception in all member states. These viewpoints include the ones found...

  17. THE LISBON TREATY: A SINUOUS RATIFICATION

    Adrian-Gabriel Corpădean

    2011-03-01

    Full Text Available This article deals with the intricate ratification process of the Lisbon Treaty, while focusing on the thorny issues of Euroscepticism and democratic deficit within the European Union in the current institutional context. The study is based on a wide research endeavour, whose purpose has been to encompass multiple points of view on the future of the European Union, seen from the perspective of the Treaty of Lisbon and its reception in all member states. These viewpoints include the ones found in the speciality literature, as well as in the press that published representative articles during the debates on the ratification of the Lisbon Treaty. Useful attempts are made in order to classify the member states of the EU according to various relevant criteria in their attitude germane to the ratification of the Treaty, so as to outline new waves of Euroscepticism, opt-outs and criticism. Apart from an institutional and a legal perspective, this study presents a large number of political, national and even cultural aspects encountered in attitudes and courses of action pertaining to the future of European Construction, seen through the eyes of the reform process carried out by the latest EU major legal document.

  18. Report made on the behalf of the Foreign Affairs Commission on the bill project nr 2932 authorizing the ratification of the protocol modifying the protocol on transitory dispositions attached to the Treaty on the European Union, to the Treaty on the functioning of the European Union, and to the Treaty establishing the European Atomic Energy Community

    This report first describes and comments the consequences of the Lisbon Treaty in terms of composition for the European Parliament, and more particularly the debate about the design of an efficient and representative parliament, the election mode and the seat distribution. Then, it describes how the modification protocol has been elaborated, its content (general architecture, eighteen additional seats for twelve member States and their election modalities), and its implementation (agenda and method)

  19. State system of accounting for and control of nuclear materials and Protocol Additional in the Slovak Republic

    proposed procedures at the facility for nuclear materials accountancy and control with special reference to material balance areas and key measurement points, measurements of flow and procedures for physical inventory taking. This document is prepared by the IAEA using the Design Information Questionnaire supplied by the facility operator. The Nuclear Regulatory Authority of the Slovak Republic uses computerised system for SSAC - Code ZARUKY 3.00. This code should be able to communicate with the database of operators, which are allowed to handle nuclear material and it should reflect all limitations specified in theirs permissions. It is created on a system with fully satisfactory safety, strictly defined confidentiality and in a system, which allows the access of several users in parallel. As a new component of the code the system for reporting in accordance with the requirements of the Additional Protocol will be incorporated. Starting after political changes in the Central Europe in the beginning of nineties the Slovak Republic is facing a new type of crime illicit trafficking of nuclear and radioactive materials. Direct economical losses in this case are not comparable with the impact on proliferation and radiation safety risk. The government of the Slovak Republic is aware of the situation and has prepared some measures, which may help us to cope with this problem. These measures were mostly concentrated on detection on the state border as well as inside the state. However, the most important is a state system of measures how to prevent removal of material into illegal use. The Protocol Additional was signed by the government of the Slovak Republic in September 1999. However, The Protocol cannot be ratified, as the laws now in effect in the Slovak Republic do not make it possible to meet all requirements resulting from the Protocol. To enable the ratification of the Protocol Additional, first of all it is necessary to amend the Atomic Law and associated regulations

  20. A Relation between the Protocol Partition Number and the Quasi-Additive Bound

    Kamiyama, Naoyuki

    2010-01-01

    In this note, we show that the linear programming for computing the quasi-additive bound of the formula size of a Boolean function presented by Ueno [MFCS'10] is equivalent to the dual problem of the linear programming relaxation of an integer programming for computing the protocol partition number. Together with the result of Ueno [MFCS'10], our results imply that there exists no gap between our integer programming for computing the protocol partition number and its linear programming relaxa...

  1. Implementation of the Additional Protocol in the European Union - prospect and impact

    Most of the fifteen current Member States of the EU have signed and ratified the Protocol Additional to the Safeguards Agreement INFCIRC/193. The Additional Protocol will enter into force when all 15 Member States have completed their internal legal requirements for its implementation and when the European Commission notifies the IAEA that the legal instruments to bring the AP into force are in place. This is expected to be during 2003. Euratom's role in the implementation of the Additional Protocol by the IAEA will be limited to facilitating the provision of information and services required. Euratom will not perform an evaluation of the Additional Protocol measures, nor will it draw safeguards conclusions regarding the absence of undeclared nuclear material and activities. The future enlargement of the EU in 2004 brings with it 10 countries already under Agency Safeguards, some with the Additional Protocol in force and others well on the road to Integrated Safeguards. All of these factors will have an impact, not only within the IAEA and Euratom themselves, but, importantly, on the relationship and cooperation between both organizations

  2. Verifying compliance with nuclear non-proliferation undertakings: IAEA safeguards agreements and additional protocols

    This report provides background information on safeguards and explains procedures for States to conclude Additional Protocols to comprehensive Safeguards Agreements with the IAEA. Since the IAEA was founded in 1957, its safeguards system has been an indispensable component of the nuclear non-proliferation regime and has facilitated peaceful nuclear cooperation. In recognition of this, the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) makes it mandatory for all non-nuclear-weapon States (NNWS) party to the Treaty to conclude comprehensive safeguards agreements with the IAEA, and thus allow for the application of safeguards to all their nuclear material. Under Article III of the NPT, all NNWS undertake to accept safeguards, as set forth in agreements to be negotiated and concluded with the IAEA, for the exclusive purpose of verification of the fulfilment of the States' obligations under the NPT. In May 1997, the IAEA Board of Governors approved the Model Additional Protocol to Safeguards Agreements (reproduced in INFCIRC/540(Corr.)) which provided for an additional legal authority. In States that have both a comprehensive safeguards agreement and an additional protocol in force, the IAEA is able to optimize the implementation of all safeguards measures available. In order to simplify certain procedures under comprehensive safeguards agreements for States with little or no nuclear material and no nuclear material in a facility, the IAEA began making available, in 1971, a 'small quantities protocol' (SQP), which held in abeyance the implementation of most of the detailed provisions of comprehensive safeguards agreements for so long as the State concerned satisfied these criteria. The safeguards system aims at detecting and deterring the diversion of nuclear material. Such material includes enriched uranium, plutonium and uranium-233, which could be used directly in nuclear weapons. It also includes natural uranium and depleted uranium, the latter of which is

  3. 15 CFR 781.2 - Purposes of the Additional Protocol and APR.

    2010-01-01

    ... Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL.../Infcircs/index.html), except that it excludes IAEA access to activities with direct national security... about aspects of the U.S. civil nuclear fuel cycle, including: Mining and concentration of nuclear...

  4. Declarations pursuant to the Articles 2 and 3 of the Model Additional Protocol

    Articles 2 and 3 of the Model Additional Protocol specify the content and the time limits of the information to be provided by the States into the framework of the Safeguard Agreements. To standardize the presentation of this information the IAEA has prepared guidelines for the preparation of the documents. A detailed explanation of the guidelines is given in the paper

  5. CLASS ACTION AGAINST THE NON-IMMEDIACY OF RATIFICATION OF THE 1990 MIGRANT WORKERS CONVENTION

    Wisnu Aryo Dewanto

    2014-01-01

    Ratification of treaties in Indonesia can be regarded as mere political acts, as ratification itself  does not yet rule for its enforcement in Indonesia’s jurisdiction. As stipulated in Article 11 of the 1945Indonesian Constitution, these ratifications are still subject to consent from the Indonesian House of Representatives (DPR) as they are the appointed institution in Indonesia with treaty-making powers. The act of ratification by the Indonesian Government is regarded as a ratification onl...

  6. Iran to sign additional protocol and suspend uranium enrichment and reprocessing

    Full text: Iran's representative to the IAEA, Ambassador Ali Akbar Salehi, today delivered a letter to IAEA Director General, Mohamed ElBaradei conveying his Government's acceptance of the Additional Protocol. Mr. Salehi also informed the Director General that Iran had decided, as of today, to suspend all uranium enrichment-related and reprocessing activities in Iran - specifically, to suspend all activities on the site of Natanz, not to produce feed material for enrichment processes and not to import enrichment-related items. 'This is a welcome and positive development,' IAEA Director General Mohamed ElBaradei said. The IAEA intends to verify, in the context of the Safeguards Agreement and the Additional Protocol, the implementation by Iran of these decisions. At its meeting on 12 September, the IAEA Board of Governors adopted a resolution calling on Iran to sign, ratify and fully implement the Additional Protocol promptly and unconditionally, and as a confidence building measure to act henceforth in accordance with the Additional Protocol. The Board also called on Iran to suspend all further uranium enrichment and reprocessing activities, pending provision by the Director General of the assurances required by Member States and pending satisfactory application of the provisions of the Additional Protocol. Also today, Mr. ElBaradei has released his report to IAEA Member States on the 'Implementation of the NPT Safeguards Agreement in the Islamic Republic of Iran' for consideration at the 20 November Board of Governors' meeting. Unless the IAEA Board decides otherwise, the document's circulation is restricted and it cannot be released to the press. (IAEA)

  7. Verifying compliance with nuclear non-proliferation undertakings: IAEA safeguards agreements and additional protocols

    This report provides background information on safeguards and explains procedures for States to conclude Additional Protocols to comprehensive Safeguards Agreements with the IAEA. Since the IAEA was founded in 1957, its safeguards system has been an indispensable component of the nuclear non-proliferation regime and has facilitated peaceful nuclear cooperation. In recognition of this, the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) makes it mandatory for all non-nuclear-weapon States (NNWS) party to the Treaty to conclude comprehensive safeguards agreements with the IAEA, and thus allow for the application of safeguards to all their nuclear material. Under Article III of the NPT, all NNWS undertake to accept safeguards, as set forth in agreements to be negotiated and concluded with the IAEA, for the exclusive purpose of verification of the fulfilment of the States' obligations under the NPT. In May 1997, the IAEA Board of Governors approved the Model Additional Protocol to Safeguards Agreements (reproduced in INFCIRC/540(Corr.)) which provided for an additional legal authority. In States that have both a comprehensive safeguards agreement and an additional protocol in force, the IAEA is able to optimize the implementation of all safeguards measures available. In order to simplify certain procedures under comprehensive safeguards agreements for States with little or no nuclear material and no nuclear material in a facility, the IAEA began making available, in 1971, a 'small quantities protocol' (SQP), which held in abeyance the implementation of most of the detailed provisions of comprehensive safeguards agreements for so long as the State concerned satisfied these criteria. The safeguards system aims at detecting and deterring the diversion of nuclear material. Such material includes enriched uranium, plutonium and uranium-233, which could be used directly in nuclear weapons. It also includes natural uranium and depleted uranium, the latter of which is

  8. Latest approaches of Kyoto protocol

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  9. Approach to integrate current safeguards measures with Additional Protocol requirements at national level

    Peru approved the Additional Protocol and then new obligations have to be fulfilled. Until now classic safeguards has been applied to two Material Balance Zones and reports are being periodically sent to IAEA as established in the subsidiary arrangements and the records of nuclear materials are kept in the State System for Control and Accountability. The new commitments were analyzed to determine the magnitude of needed efforts. The recommended guidelines to submit information under the new protocol was also reviewed. Co-ordinations were made with Customs organization and with Ministry of Industry to obtain information about the material and equipment specified in the annexes of Protocol. It is expected that implementation of the new measures and activities will increase the volume of records and the reports to IAEA. However, some of these efforts may be saved if adjustments are made in future subsidiary arrangements. (author)

  10. Law project (no. 1329) adopted by the Senate and authorizing the ratification of the agreement between the French Republic, the European Atomic Energy Community and the International Atomic Energy Agency relative to the enforcement of warranties in the framework of the treaty of nuclear weapons prohibition in South America and the Caribbeans area (two protocols together)

    The French Senate adopted on January 6, 2004 the project of law which authorizes the ratification of the agreement between France, the European atomic energy community and the IAEA about the enforcement of warranties in the framework of the treaty of interdiction of nuclear weapons in South America and in the Caribbean area signed in Vienna (Austria) on March 21, 2000. The text of this treaty is attached to this law. (J.S.)

  11. Site Definition in the Additional Protocol how to Focus on The Real Issues

    Nuclear sites represent a key element in the Additional Protocol. In order to ensure that a state does not use collocated declared activities and buildings to cover up clandestine activities, the state is requested to give information about every building on the site and the IAEA is given far reaching access rights to all places on these sites. This seemed to be a logical approach that would not lead to many implementation difficulties. The reality however showed to be slightly different. The definition of the site under the Article 2a(iii) declaration turned out to be one of the most important practical issues when preparing for the implementation of the Additional Protocol. Straightforward for standard facilities, it needs careful consideration for sites of a research centres or nuclear institutes in the middle of a university campus. The site has to be carefully defined as it has a direct influence on the amount of information to be provided to the IAEA, the Agency's rights for Complementary Access, and the building owner obligations to grant this access in often a very short notice. Sites should be large enough to meet the objectives of the Additional Protocol. On the other hand there is no reason that buildings that do not contribute to the nuclear mission of the site should be part of it. The site boundaries should, therefore, be set in such way that no unnecessary burden is put on building operators that have no functional relationship with nearby nuclear activities

  12. U.S. Additional Protocol Outreach Program-Tabletop Exercises to Implement the AP

    The Office of International Regimes and Agreement (NA-243) is the lead office in the Department of Energy (DOE) to assist DOE and National Nuclear Security Administration (NNSA) sites in the preparation of providing declarations on relevant civilian, nuclear fuel cycle-related research and development activities to the International Atomic Energy Agency (IAEA). This is in accordance to the implementation of the ''Protocol Additional to the AGreement between the United STates and the International Atomic Energy Agency for the Applications of Safeguards in the United States. In preparation for entry-into-force, NA-243 conducted two tabletop exercises under the Additional Protocol Outreach Program. The first one, held in May 2004 at Los Alamos National Laboratory, focused on the factors important to protect national security assets and intellectual property. The other, held in August 2004 at the Idaho National Laboratory explored the level of detail or granularity for reporting declarable activities. Both tabletops invited participants from the national laboratories and DOE/NNSA organizations. Discussions were based around the process to identify potential declarable activities relating to the nuclear fuel cycle-related R and D projects from the Advanced Fuel Cycle Initiative program. The two tabletop exercises provided recommendations and conclusions that would be helpful to other DOE/NNSA locations for preparing for and reporting relevant and concise information to the IAEA under the Additional Protocol. This paper provides details on the events, discussions, observations, and lessons learned from both the LANL and INL tabletop exercises.

  13. Additional factors for the estimation of mean glandular breast dose using the UK mammography dosimetry protocol

    The UK and European protocols for mammographic dosimetry use conversion factors that relate incident air kerma to the mean glandular dose (MGD) within the breast. The conversion factors currently used were obtained by computer simulation of a model breast with a composition of 50% adipose and 50% glandular tissues by weight (50% glandularity). Relative conversion factors have been calculated which allow the extension of the protocols to breasts of varying glandularity and for a wider range of mammographic x-ray spectra. The data have also been extended to breasts of a compressed thickness of 11 cm. To facilitate the calculation of MGD in patient surveys, typical breast glandularities are tabulated for women in the age ranges 40-49 and 50-64 years, and for breasts in the thickness range 2-11 cm. In addition, tables of equivalent thickness of polymethyl methacrylate have been provided to allow the simulation for dosimetric purposes of typical breasts of various thicknesses. (author)

  14. Approach to integrate current safeguards measures with additional protocol requirements at national level

    Peru adhered to the Additional Protocol in March 2000 which was also approved by the Congress in May 2001. After approval by law the obligations derived from this Additional Protocol will be in force after 180 days. After the signing of the Protocol an approach was designed to help better fulfill these requirements in an integrated way with the previous measures. As first stage, a review of the current state of safeguards was undertaken. Under the current agreement (an INFCIRC/153 type agreement) the reporting is less complicated and inexpensive to be carried out because these reports include only the declared nuclear material and the features of declared facilities where the nuclear material is used. No other related facility or material or activity needs to be declared. In Peru there are only two MBAs where low enriched uranium (LEU) is used and the record system includes general ledgers, inventory records and operational books. The results of national inspections and copies of reports and communications sent to the IAEA are also kept in this system. Under the agreement and subsidiary arrangements material balance reports (MBR), physical inventory listings (PIL) and inventory change reports (ICR) are prepared and submitted to the IAEA at scheduled periods. The MBR and PIL reports are sent after yearly regular inspections carried out by the IAEA. The ICR is sent just every time when an import or export of nuclear material is made. The time devoted to carry out all of these activities is not so extensive for both the State System for Accountability and Control (SSAC) and the users because of the limited nuclear activities in the country. Because of the characteristics and limited quantities of nuclear material the efforts for inspection and reporting activities are few. Another subject under review was the procedure for controlling the imports of nuclear material. Under the current agreement this subject was not a problem, as all of the radioactive and nuclear

  15. 25 CFR 81.7 - Adoption, ratification, or revocation by majority vote.

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Adoption, ratification, or revocation by majority vote... TRIBAL REORGANIZATION UNDER A FEDERAL STATUTE § 81.7 Adoption, ratification, or revocation by majority... those actually voting are in favor of adoption, ratification, or revocation. The total vote...

  16. 48 CFR 2901.602-3 - Ratification of unauthorized commitments.

    2010-10-01

    ... Director, Division of Acquisition Management Services, for submission to the Procurement Review Board... unauthorized commitments. 2901.602-3 Section 2901.602-3 Federal Acquisition Regulations System DEPARTMENT OF... Authority, and Responsibilities 2901.602-3 Ratification of unauthorized commitments. (a) If the HCA...

  17. Report made on the behalf of the Foreign Affairs Commission on the bill project nr 2932 authorizing the ratification of the protocol modifying the protocol on transitory dispositions attached to the Treaty on the European Union, to the Treaty on the functioning of the European Union, and to the Treaty establishing the European Atomic Energy Community; Rapport fait au nom de la Commission des Affaires Etrangeres sur le Projet de Loi n. 2932, autorisant la ratification du protocole modifiant le protocole sur les dispositions transitoires annexe au traite sur l'Union europeenne, au traite sur le fonctionnement de l'Union europeenne et au traite instituant la Communaute europeenne de l'energie atomique

    NONE

    2011-07-01

    This report first describes and comments the consequences of the Lisbon Treaty in terms of composition for the European Parliament, and more particularly the debate about the design of an efficient and representative parliament, the election mode and the seat distribution. Then, it describes how the modification protocol has been elaborated, its content (general architecture, eighteen additional seats for twelve member States and their election modalities), and its implementation (agenda and method)

  18. A geo-portal for data management and integration in the context of the additional protocol

    Since the entry into force of the Additional Protocol, nuclear safeguards is faced with an abundance of information from different sources which require effective tools for the collection, storage, analysis and retrieval of data. Over the last years, the Joint Research Centre (JRC) has developed a number of tools supporting the preparation, management and verification of AP declarations, which were demonstrating the usefulness of Geographic Information Systems (GIS) for this purpose. Following these experiences, DG-TREN has asked the JRC to develop a Geo-Portal integrating the diverse databases at DG-TREN and providing a single point of access to all safeguards-relevant information. Based on the same platform, NUMAS was developed with the objective of integrating information from various sources in view making available information on Nuclear Fuel Cycle. The article describes the objectives and the features of both systems. (author)

  19. A geo-portal for data management and integration in the context of the additional protocol

    The Directorate General for Energy and Transport of the European Commission (DG-TREN) is responsible for the implementation of the EURATOM Safeguards system and the Safeguards Agreements and Additional Protocols under the Non Proliferation Treaty. In particular since the entry into force of the Additional Protocol, DG-TREN is faced with an abundance of information from different sources which require effective tools for the collection, storage, analysis and retrieval of data. Over the last years, the Joint Research Centre (JRC) developed a number of tools supporting the preparation, management and verification of AP declarations showing the usefulness of (Geographic Information System (GIS) for this purpose. Following these experiences, DG-TREN asked the JRC to develop a Geo-Portal integrating the diverse databases at DG-TREN and providing a single point of access to all relevant information. The proposed system is sketched and has the following features: - It is a multi-tier system (database, application server, client application) which is compatible with the existing IT architecture at DG-TREN. Particular attention is paid on respecting the strict security requirements associated with the information. - It implements a geo-database containing all locations and geographic features of interest (sites, buildings, mines, R and D activities, etc). Every geographic feature has a link to each existing item of information that is associated with this feature, e.g. a site contains links to all relevant AP declarations, inspector reports, supporting documentation, etc) - An application server transfers the data to the client application using standard web protocols thus providing maximum flexibility for possible extensions and also facilitating deployment and maintenance. The system will be installed within the secure DG-TREN network which protects the information from unauthorised external access. - The GIS client application provides a single point of access to all data

  20. Extraction and Analysis of Information Related to Research & Development Declared Under an Additional Protocol

    The additional protocol (AP) provides important tools to strengthen and improve the effectiveness and efficiency of the safeguards system. Safeguards are designed to verify that States comply with their international commitments not to use nuclear material or to engage in nuclear-related activities for the purpose of developing nuclear weapons or other nuclear explosive devices. Under an AP based on INFCIRC/540, a State must provide to the IAEA additional information about, and inspector access to, all parts of its nuclear fuel cycle. In addition, the State has to supply information about its nuclear fuel cycle-related research and development (R&D) activities. The majority of States declare their R&D activities under the AP Articles 2.a.(i), 2.a.(x), and 2.b.(i) as part of initial declarations and their annual updates under the AP. In order to verify consistency and completeness of information provided under the AP by States, the Agency has started to analyze declared R&D information by identifying interrelationships between States in different R&D areas relevant to safeguards. The paper outlines the quality of R&D information provided by States to the Agency, describes how the extraction and analysis of relevant declarations are currently carried out at the Agency and specifies what kinds of difficulties arise during evaluation in respect to cross-linking international projects and finding gaps in reporting. In addition, the paper tries to elaborate how the reporting quality of AP information with reference to R&D activities and the assessment process of R&D information could be improved. (author)

  1. Non-proliferation of nuclear weapons and nuclear security. IAEA safeguards agreements and additional protocols

    One of the most urgent challenges facing the International Atomic Energy Agency (IAEA) is to strengthen the Agency's safeguards system for verification in order to increase the likelihood of detecting any clandestine nuclear weapons programme in breach of international obligations. The IAEA should be able to provide credible assurance not only about declared nuclear material in a State but also about the absence of undeclared material and activities. Realising the full potential of the strengthened system will require that all States bring into force their relevant safeguards agreements, as well as additional protocols thereto. Today, 45 years after the Agency's foundation, its verification mission is as relevant as ever. This is illustrated by the special challenges encountered with regard to verification in Iraq and North Korea in the past decade. Moreover, the horrifying events of 11 September 2001 demonstrated all too well the urgent need to strengthen worldwide control of nuclear and other radioactive material. The IAEA will continue to assist States in their efforts to counter the spread of nuclear weapons and to prevent, detect and respond to illegal uses of nuclear and radioactive material. Adherence by as many States as possible to the strengthened safeguards system is a crucial component in this endeavour

  2. Experience of implementing the additional protocol in the EU - The first years

    Full text: The Additional Protocol (AP) is in force in all 25 Member States of the European Union (EU). The three APs related to the Safeguards Agreements INFCIRC/193, INFCIRC/263 and INFCIRC/290 entered into force on 30 April 2004 covering the fifteen states members of the EU at that time. These APs are all trilateral agreements between the IAEA, the Member States and the European Atomic Energy Community (Euratom), reflecting the role of Euratom has as regional safeguards authority for accountancy and control (RSAC) in the European Union. They are also the only trilateral APs currently in force in the world. At the time of the EU enlargement in 2004 the AP was in force in seven of the ten new Member States. These States have been reporting to the IAEA on the basis of their bilateral APs for several years. In the remaining three new Member States the AP was brought into force after their accession to the EU. These states are now preparing their initial declarations. The European Commission is a supra-national body, which in addition to its role as a RSAC, is also a nuclear operator and an important component of Europe's nuclear research capacity. It therefore declares its own activities relevant to the AP as a separate entity and party to the AP. Thanks to its role as a focal point in implementing the AP in the European Union, the Commission has accumulated an ample experience in reporting, following up and in matters relating to Complementary Access. The paper reviews this experience and presents an outlook of the future challenges of the AP implementation in the EU. (author)

  3. Vienna convention on civil liability for nuclear damage and optional protocol concerning the compulsory settlement of disputes. Status lists as of 12 September 2000. Signature, ratification, accession, or succession. Declarations/reservations made upon expressing consent to be bound and objections thereto. Declarations/reservations made upon signature

    The document provides the status list to the Protocol to Amend the Vienna Convention on Civil Liability for Nuclear Damage and optional protocol concerning the compulsory settlement of disputes as of 12 September 2000

  4. Kyoto protocol cooperation: does government corruption facilitate environmental lobbying?.

    Fredriksson, Per G.; Neumayer, Eric; Ujhelyi, Gergely

    2007-01-01

    Does environmental lobbying affect the probability of environmental treaty ratification? Does the level of government corruption play a role for the success of such lobbying? In this paper, we propose that a more corruptible government may be more responsive to the demands of the environmental lobby. We use several stratified hazard models and panel data from 170 countries on the timing of Kyoto Protocol ratification to test this hypothesis. We find that increased environmental lobby group ac...

  5. Kyoto Protocol one step closer

    Showstack, Randy

    The European Union (EU) could soon decide to ratify the Kyoto Protocol on climate change, following a 4 March meeting of the European Commissions environment council to approve the treaty.European Commission President Romani Prodi said the council's move enables the 15 EU member states to take the steps toward simultaneous ratification together with the commission before 1 June."I urge our partners both in the developed and in the developing countries to also ratify the Kyoto Protocol soon," he said.

  6. Implementation of the IAEA Additional Protocol in the Philippines: USDOE/PNRI Cooperation

    The Philippines entered into force the International Atomic Energy Agency (IAEA) Additional Protocol (AP) in February 2010. The Philippine Nuclear Research Institute (PNRI) is the government agency responsible for implementing the AP. In June 2010 the IAEA invited the U.S. Department of Energy (DOE) to help conduct a joint national training seminar on the AP. DOE presented to PNRI its AP international technical assistance program, administered by the International Nuclear Safeguards and Engagement Program (INSEP), which helps partner countries implement the AP. In coordination with the IAEA, DOE established this program in 2008 to complement IAEA AP seminars with long-term country-specific cooperation from the perspective of a Member State. The US version of the AP is the same version as that of non-nuclear weapon states except for the addition of a national security exclusion. Due to this, DOE cooperation with other countries enables the sharing of valuable lessons learned in implementing the AP. DOE/INSEP described to PNRI the various areas of cooperation it offers to interested countries, whether they are preparing for entry into force or already implementing the AP. Even countries that have entered the AP into force are sometimes not fully prepared to implement it well, and welcome cooperation to improve their implementation process. PNRI and DOE/INSEP subsequently agreed to cooperate in several areas to enhance the efficiency and effectiveness of the Philippines AP implementation. These areas include providing working-level training to PNRI staff and preparing an information document that details that training for future reference, assisting with the development of an outreach program and procedures for AP reporting and complementary access, and identifying Annex II equipment and non-nuclear materials whose export must be reported under the AP. DOE laboratory representatives, funded by INSEP, met again with PNRI in February 2011 to provide training for PNRI AP

  7. Law project (no. 1329) adopted by the Senate and authorizing the ratification of the agreement between the French Republic, the European Atomic Energy Community and the International Atomic Energy Agency relative to the enforcement of warranties in the framework of the treaty of nuclear weapons prohibition in South America and the Caribbeans area (two protocols together); Projet de loi (no. 1329) adopte par le Senat autorisant la ratification de l'accord entre la Republique francaise, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties dans le cadre du traite visant l'interdiction des armes nucleraires en Amerique latine et dans les Caraibes (ensemble deux protocoles)

    NONE

    2004-01-01

    The French Senate adopted on January 6, 2004 the project of law which authorizes the ratification of the agreement between France, the European atomic energy community and the IAEA about the enforcement of warranties in the framework of the treaty of interdiction of nuclear weapons in South America and in the Caribbean area signed in Vienna (Austria) on March 21, 2000. The text of this treaty is attached to this law. (J.S.)

  8. 75 FR 4323 - Additional Quantitative Fit-testing Protocols for the Respiratory Protection Standard

    2010-01-27

    ... article published in a peer-reviewed industrial-hygiene journal describing the protocol and explaining how..., and from 500 to 1000 for full facepieces. Peer-reviewed industrial-hygiene journal article. The peer... the studies described in the peer-reviewed journal article well controlled, and conducted......

  9. The Effects of AFGP Addition and Removing Protocol of CPA on Vitrification Cryopreservation of Osteoblasts

    2005-01-01

    1 Introduction Vitrification is an effective method for cryopreservation of cells~([1, 2]). However, cells are usually damaged due to the osmotic injury caused by the higher concentrations of cryoprotective agents (CPA) during CPA removing. The ice recrystallization in thawing solution can also hurt cells seriously. Antifreeze glycoprotein (AFGPs) is extremely efficient at inhibiting ice recrystallization~([3]).The effects of Removing protocols and AFGP on cell viability were investigated. 2 Materials and M...

  10. Does ratification of human-rights treaties have effects on population health?

    Palmer, Alexis; Tomkinson, Jocelyn; Phung, Charlene; Ford, Nathan; Joffres, Michel; Fernandes, Kimberly A; Zeng, Leilei; Lima, Viviane; Montaner, Julio S G; Guyatt, Gordon H; Mills, Edward J

    2009-06-01

    Human-rights treaties indicate a country's commitment to human rights. Here, we assess whether ratification of human-rights treaties is associated with improved health and social indicators. Data for health (including HIV prevalence, and maternal, infant, and child [corruption index), gathered from 170 countries, showed no consistent associations between ratification of human-rights treaties and health or social outcomes. Established market economy states had consistently improved health compared with less wealthy settings, but this was not associated with treaty ratification. The status of treaty ratification alone is not a good indicator of the realisation of the right to health. We suggest the need for stringent requirements for ratification of treaties, improved accountability mechanisms to monitor compliance of states with treaty obligations, and financial assistance to support the realisation of the right to health. PMID:19501746

  11. Implementation of the Additional Protocol: Verification activities at uranium mines and mills

    Full text: The mining and milling of uranium is the first in a long chain of processes required to produce nuclear materials in a form suitable for use in nuclear weapons. Misuse of a declared uranium mining/milling facility, in the form of understatement of production, would be hard to detect with the same high level of confidence as afforded by classical safeguards on other parts of the nuclear fuel cycle. For these reasons, it would not be cost-effective to apply verification techniques based on classical safeguards concepts to a mining/milling facility in order to derive assurance of the absence of misuse. Indeed, these observations have been recognised in the Model Protocol (INFCIRC/540): 'the Agency shall not mechanistically or systematically seek to verify' information provided to it by States (Article 4.a.). Nevertheless, complementary access to uranium mining/milling sites 'on a selective basis in order to assure the absence of undeclared nuclear material and activities' (Article 4.a.(i)) is provided for. On this basis, therefore, this paper will focus predominantly on options other than site access, which are available to the Agency for deriving assurance that declared mining/milling operations are not misused. Such options entail the interpretation and analysis of information provided to the Agency including, for example, from declarations, monitoring import/export data, open source reports, commercial satellite imagery, aerial photographs, and information provided by Member States. Uranium mining techniques are diverse, and the inventories, flows and uranium assays which arise at various points in the process will vary considerably between mines, and over the operating cycle of an individual mine. Thus it is essentially impossible to infer any information, which can be used precisely to confirm, or otherwise, declared production by measuring or estimating any of those parameters at points within the mining/milling process. The task of attempting to

  12. The entry into force of the Additional Protocol in the European Union: The new dimension of safeguards in Europe

    Recio, M. [Deputy Direction General for Nuclear Energy, Direction General for Energy Policy and Mines Ministry of Industry, Tourism and Trade, Paseo de la Castellana, 160 Madrid 28046 (Spain)]. E-mail: MRecio@mityc.es; Prieto, N. [Asesoria Juridica, Direccion de Division Administracion, Enresa, c/Emilio Vargas, 7, Madrid 28043 (Spain)]. E-mail: nprs@enresa.es

    2006-07-01

    The Additional Protocol to the Safeguards Agreement with the International Atomic Energy Agency (IAEA) has entered into force on 30 April 2004. This completes the implementation in the EU of what undoubtedly represents the most ambitious project undertaken by the IAEA, designed to reinforce its current safeguards system, a project that the international community considers to be a key component strengthening the fight against one of the most serious threats for world security: nuclear proliferation. (author)

  13. Report made on behalf of the commission of foreign affairs about the law project, adopted by the Senate, authorizing the ratification of the agreement between the French Republic, the European Atomic Energy Community and the International Atomic Energy Agency relative to the enforcement of warranties in the framework of the treaty of nuclear weapons prohibition in South America and the Caribbeans area (two protocols together); Rapport fait au nom de la commission des affaires etrangeres sur le projet de loi, adopte par le senat, autorisant la ratification de l'accord entre la Republique francaise, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties dans le cadre du traite visant l'interdiction des armes nucleaires en Amerique latine et dans les Caraibes (ensemble deux protocoles)

    NONE

    2004-07-01

    This report comments the reasons of the signature of the agreement between France, EURATOM and the IAEA for the reinforcement of IAEA's non-proliferation controls in the South America and Caribbean areas (law project no. 1329). The ratification of this agreement will have only few concrete consequences but will contribute to the promotion of non-proliferation and to the enforcement of warranties in the framework of the treaty of interdiction of nuclear weapons in South America and in the Caribbean area (signed in Vienna, Austria, on March 21, 2000). The commission of foreign affairs adopted this law project on March 3, 2004. (J.S.)

  14. Protocol Additional to the agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency for the application of safeguards in France

    The text of the Protocol Additional to the Agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency for the Application of Safeguards in France is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 22 September 1998. Pursuant to Article 16 of the Additional Protocol, the Protocol entered into force on 30 April 2004, the date on which the Agency received written notification that the European Atomic Energy Community and France had met their respective internal requirements for entry into force

  15. Protocol Additional to the Agreement between the People's Republic of China and the International Atomic Energy Agency for the Application of Safeguards in China

    The text of the Protocol Additional to the Safeguards Agreement concluded between the People's Republic of China and the International Atomic Energy Agency for the application of safeguards in China is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 November 1998. It was signed in Vienna on 31 December 1998. Pursuant to Article 10 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from China written notification that China's statutory and constitutional requirements for entry into force have been met, i.e. on 28 March 2002

  16. Protocol Additional to the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America

    The text of the Protocol Additional to the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 11 June 1998. It was signed in Vienna on 12 June 1998

  17. Does ratification of human-rights treaties have effects on population health?

    Palmer, Alexis; Tomkinson, Jocelyn; Phung, Charlene; Ford, Nathan; Joffres, Michel; Fernandes, Kimberly A; Zeng, Leilei; Lima, Viviane; Montaner, Julio S.G.; Guyatt, Gordon H; Mills, Edward J.

    2009-01-01

    Human-rights treaties indicate a country's commitment to human rights. Here, we assess whether ratification of human-rights treaties is associated with improved health and social indicators. Data for health (including HIV prevalence, and maternal, infant, and child [

  18. Hierarchical Management to be Implemented on Ratification Risk of Certification Institution

    2007-01-01

    @@ Recently, the China National Accreditation Service for Conformity Assessment (CNAS) has promulgated Measures for Hierarchical Management of Ratification Risk of Certification Institution (hereinafter referred to as Measures), which was put into execution.

  19. The Kyoto Protocol: Can We Meet?

    Boromisa, Ana-Maria; Tišma, Sanja

    2008-01-01

    Integration into the EU is one of strategic foreign policy goals of Croatia. Before accession, Croatia has to align with the EU policies and legislation. The European Commission in its Croatia 2007 Progress report identified ratification of the Kyoto Protocol as progress regarding environmental chapter of accession negotiations. By ratifying the Kyoto Protocol in May 2007 Croatia pledged to reduce greenhouse gases by 5% in the first commitment period, 2008-2012, from the amount released into ...

  20. Improving a mother to child HIV transmission programme through health system redesign: quality improvement, protocol adjustment and resource addition.

    Michele S Youngleson

    Full Text Available BACKGROUND: Health systems that deliver prevention of mother to child transmission (PMTCT services in low and middle income countries continue to underperform, resulting in thousands of unnecessary HIV infections of newborns each year. We used a combination of approaches to health systems strengthening to reduce transmission of HIV from mother to infant in a multi-facility public health system in South Africa. METHODOLOGY/PRINCIPAL FINDINGS: All primary care sites and specialized birthing centers in a resource constrained sub-district of Cape Metro District, South Africa, were enrolled in a quality improvement (QI programme. All pregnant women receiving antenatal, intrapartum and postnatal infant care in the sub-district between January 2006 and March 2009 were included in the intervention that had a prototype-innovation phase and a rapid spread phase. System changes were introduced to help frontline healthcare workers to identify and improve performance gaps at each step of the PMTCT pathway. Improvement was facilitated and spread through the use of a Breakthrough Series Collaborative that accelerated learning and the spread of successful changes. Protocol changes and additional resources were introduced by provincial and municipal government. The proportion of HIV-exposed infants testing positive declined from 7.6% to 5%. Key intermediate PMTCT processes improved (antenatal AZT increased from 74% to 86%, PMTCT clients on HAART at the time of labour increased from 10% to 25%, intrapartum AZT increased from 43% to 84%, and postnatal HIV testing from 79% to 95% compared to baseline. CONCLUSIONS/SIGNIFICANCE: System improvement methods, protocol changes and addition/reallocation of resources contributed to improved PMTCT processes and outcomes in a resource constrained setting. The intervention requires a clear design, leadership buy-in, building local capacity to use systems improvement methods, and a reliable data system. A systems improvement

  1. Will markets direct investments under the Kyoto Protocol ?

    Larson, Donald F.; Breustedt, Gunnar

    2007-01-01

    Under the Kyoto Protocol, countries can meet treaty obligations by investing in projects that reduce or sequester greenhouse gases elsewhere. Prior to ratification, treaty participants agreed to launch country-based pilot projects, referred to collectively as Activities Implemented Jointly (AIJ), to test novel aspects of the project-related provisions. Relying on a 10-year history of proje...

  2. Lessons Learned at the Idaho National Laboratory for the Entry into Force of the U.S. Additional Protocol

    For a number of years, the Idaho National Laboratory (INL) has been preparing for the entry into force of the U.S. Additional Protocol (AP). These preparations included attending training, participating in tabletop exercises, preparing draft declarations, developing INL-specific guidance documents, preparing for and hosting a mock complementary access visit, and preparing declarations for official submittal. All of these activities, the training materials, and software developed by other U.S. DOE national laboratories (PNNL, ORNL, LANL, and BNL) were very helpful in preparing for the entry into force of the AP. As with any endeavor of this size and complexity, however, there are always instances where even the best preparations and advanced planning do not anticipate every challenge. As the DOE's lead nuclear energy research and development facility, the INL faced many unique challenges. The majority of research conducted at the INL is nuclear fuel cycle related, most of which is not protected by the National Security Exclusion. This paper describes the lessons learned from the INL's experience of preparing for the entry into force of the AP, specifically how translating and implementing general principles into actual activities proved to be one of many challenges, and provides general suggestions on how to respond effectively and efficiently to routine annual data calls and other AP requests

  3. 87. Austrian ratification of the Convention on Assistance in the Case of a Nuclear Accident or Radiological Emergency

    This is the notification of the Austrian ratification of the Convention, resulting in the entry into force of the Convention for Austria on 22 December 1989. The ratification included a declaration concerning Article 10 paragraph 5(b). The text of the Convention is reproduced in English, French and German. (NEA)

  4. Impératifs et limites de la croissance

    Rolf Steppacher

    2006-07-01

    Full Text Available La théorie de la croissance domine l’actualité. Pourtant, il devient chaque jour plus évident que la poursuite de ce programme mondial n’est pas indéfiniment réalisable, compte tenu des limites imposées par les écosystèmes. Plus surprenant encore, l’impératif de croissance est parvenu à se dissimuler sous le masque de la durabilité. Devenu « durable » ou « soutenable », le développement s’accommode plutôt bien du capitalisme, sans questionner pour autant le cœur du paradoxe contemporain : comment parler de durabilité sans remettre en cause en même temps le système économique ? Comment maintenir une croissance illimitée – elle-même alimentée par une industrie publicitaire créatrice de désirs illimités – sans remettre parallèlement en question l’utilisation que nous faisons des ressources non renouvelables ? Plus que jamais et à l’heure où le développement durable s’impose comme le nouveau messianisme technologique, il devient vital de s’interroger sur le fonctionnement nécessairement problématique des économies modernes et de leurs choix énergétiques. Aller au-delà du consensus politique actuel fondé sur la tyrannie de la croissance, ne pas succomber à l’incantation technocratique, penser l’action, l’innovation et les transformations économiques génératrices du bien-être, concevoir que toute société porte en elle un projet qui ne se réduit pas à une capacité gestionnaire, rechercher les sources de la richesse et les raisons de sa fin possible. Voilà quelques-unes des ambitions de Rolf Steppacher, économiste à l’institut universitaire d’études du développement (IUED à Genève et observateur critique de l’évolution du développement durable et de son pendant, la décroissance. Il nous livre ici quelques clés d’interprétation. Entretien réalisé par Olivier Walther.

  5. The Kyoto protocol : Russian opportunities: OIES paper: RIIA Briefing Note

    Müller, Benito

    2004-01-01

    Much, possibly too much, of the most recent debate on Russian ratification of the Kyoto Protocol has centred around the issue whether the Kyoto emission limit would hinder Russian economic growth, particularly in the context of the ambitious decadal Russian growth targets. The aim of this paper is to return the focus of the debate to the opportunities which the Kyoto Protocol could afford the Russian economy and which would be lost if Russia fails to grasp them by bringing the ...

  6. Carrying out"Administrative Ratification Law"%行政许可法:推进产业发展的法制化

    夏竞辉

    2004-01-01

    It is said that "Administrative Ratification Law" is put into practice from 1st July this year. Then the State Council and MII both issue related schemes in order to promote the implementation of "Administration Ratification Law". The enforcement of the "Administrative Ratification Law" will have a great and deep influence on the transfer of the governmental functions, reform of administrative methods and advancement of legal administration. The comparative centralization of administrative ratification right and the unified handling of administrative ratification reflected in the law can be said a summary and extension of the latest years, successful experience and is also a legal confirmation of this kind of practice.

  7. Model protocol additional to the agreement(s) between state(s) and the International Atomic Energy Agency for the application of safeguards

    This document is a model Additional Protocol designed for States having a Safeguards Agreement with the Agency, in order to strengthen the effectiveness and improve the efficiency of the safeguard system as a contribution to global nuclear non-proliferation objectives

  8. Model Protocol Additional to the Agreement(s) between State(s) and the International Atomic Energy Agency for the application of safeguards

    This document is a model Additional Protocol designed for States having a Safeguards Agreement with the Agency, in order to strengthen the effectiveness and improve the efficiency of the safeguards system as a contribution to global nuclear non-proliferation objectives

  9. A field exercise course to train IAEA Safeguards inspectors in implementing the additional protocol and performing complementary access activities

    The International Atomic Energy Agency (IAEA) Department of Safeguards has the task of implementing the Additional Protocol (AP) in the Member States that have signed agreements bringing that treaty into force. The IAEA inspector under the traditional INFCIRC/153 safeguards has been an accountant focused on the declared nuclear material stores of a Member State. The INFCIRC/540 Strengthened Safeguards System (SSS) provides the Agency and its inspectors with the right to investigate a Member State's nuclear programme to see if all declared activities are in order and no undeclared activities exist. This broadening of the scope of the inspector's responsibilities has changed the training of the inspectors to orient them to being an investigator compared to an accountant. The Safeguards training department has created a curriculum of courses that provides the background to train the inspectorate into this new inspection regime. The United States Support Program (USSP) has contributed to this curriculum by putting together a course at Brookhaven National Laboratory (BNL) in Additional Protocol Complementary Access (APCA) to give the IAEA the opportunity to provide inspectors a necessary field exercise in a realistic environment at a research site. Brookhaven National Laboratory contains three shutdown nuclear research reactors, operating particle accelerators, hot cells, radioactive waste storage, laser laboratories, and magnet production facilities on a large site very similar to numerous research facilities around the world situated in non-nuclear weapon states (NNWS). The USSP Team created an Article 2 declaration containing annotated maps of the site, descriptions of the buildings on site, satellite and aerial photographs of the area, and a declaration of research activities on the site. The declaration is as realistic to actual BNL research except that proprietary and security concerns of the BNL site have been taken into account. The USSP Team felt the best

  10. Guidelines and format for preparation and submission of declarations pursuant to Articles 2 and 3 of the Model Protocol Additional to Safeguards Agreements

    The information to be provided to the International Atomic Energy Agency (hereinafter referred to as 'the Agency') by States under an additional protocol (INFCIRC/540) is identified in Article 2. The timing with which the information is to be provided is specified in Article 3. It was widely recognized during the negotiation of the additional protocol that States and the Agency would need explanation and guidance, regarding the information to be declared, beyond that possible to incorporate in the language of the protocol itself. The Board of Governors, meeting in special session on 15 May 1997 to approve the additional protocol, was assured that such guidance would be quickly available to States. The initial Additional Protocol Reporting Guidelines, drawing from Programme 93+2 documentation and the negotiating record of Committee 24, were published in August 1997. A simplified set of Guidelines was subsequently produced for States whose safeguards agreement includes a small quantities protocol. The Guidelines serve two purposes. First, they provide specificity as to what information is required and at what level of detail. Second, the Guidelines provide a consistent reporting format. The Guidelines have been supplemented with Agency developed software, the PROTOCOL REPORTER, which simplifies the process through which States can prepare and submit their declarations electronically. There is no legal requirement that States follow the Guidelines in preparing and submitting their Article 2 declarations. However, if States submit declarations prepared according to these Guidelines, it will reduce greatly the Agency's workload in processing, reviewing and storing the information provided. With minor exceptions, all States that have submitted declarations prior to 2004 have followed the Guidelines. The process of improving the Guidelines, based on the cumulative experience of States and the Agency, began in mid-2002. The process involved the development of a detailed

  11. The Geneva Protocol of 1925

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare

  12. Remote Sensing and the Kyoto Protocol: A Workshop Summary

    Rosenqvist, Ake; Imhoff, Marc; Milne, Anthony; Dobson, Craig

    2000-01-01

    The Kyoto Protocol to the United Nations Framework Convention on Climate Change contains quantified, legally binding commitments to limit or reduce greenhouse gas emissions to 1990 levels and allows carbon emissions to be balanced by carbon sinks represented by vegetation. The issue of using vegetation cover as an emission offset raises a debate about the adequacy of current remote sensing systems and data archives to both assess carbon stocks/sinks at 1990 levels, and monitor the current and future global status of those stocks. These concerns and the potential ratification of the Protocol among participating countries is stimulating policy debates and underscoring a need for the exchange of information between the international legal community and the remote sensing community. On October 20-22 1999, two working groups of the International Society for Photogrammetry and Remote Sensing (ISPRS) joined with the University of Michigan (Michigan, USA) to convene discussions on how remote sensing technology could contribute to the information requirements raised by implementation of, and compliance with, the Kyoto Protocol. The meeting originated as a joint effort between the Global Monitoring Working Group and the Radar Applications Working Group in Commission VII of the ISPRS, co-sponsored by the University of Michigan. Tile meeting was attended by representatives from national government agencies and international organizations and academic institutions. Some of the key themes addressed were: (1) legal aspects of transnational remote sensing in the context of the Kyoto Protocol; (2) a review of the current and future and remote sensing technologies that could be applied to the Kyoto Protocol; (3) identification of areas where additional research is needed in order to advance and align remote sensing technology with the requirements and expectations of the Protocol; and 94) the bureaucratic and research management approaches needed to align the remote sensing

  13. What the Kyoto Protocol means for Russians

    The only impediment to the Kyoto protocol entering into force now is the Russians. The only global agreement to save climate, which has been ratified by 110 countries, is still in limbo. This article presents an up-to-the-minute analysis of the reasons. The history of progress up to and back from ratification is summarised, including the latest facts from early June 2003. The views of all relevant ministries, business, Parliament and the general public are briefly presented, as are the intentions and/or plans. It is clear that there is progress toward ratification, but serious opposition still exists. The selfish interests of agencies, clumsy bureaucracy and misunderstandings should and can be overcome

  14. Protocol additional to the agreement between Australia and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    The document reproduces the text of the Protocol Additional to the Agreement (INFCIRC/217) concluded between Australia and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons. Conclusion of the Additional Protocol was authorized by the Board of Governors on 23 September 1997 and signed in Vienna on the same date. The Additional Protocol entered into force on 12 December 1997

  15. Vicissitudes of Nagoya Protocol in Colombia

    The fair and equitable sharing of benefits arising from the utilization of genetic resources is not only one of the central objectives of the Nagoya Protocol, but also a challenge for communities of scientists, researchers, and indigenous ancestral generally for the educational community. It is therefore essential to know what the real and material implications for the population, the ratification of the Nagoya Protocol, which despite having sufficient justification and argued, highlights the need to develop legal tools, economic, technological and education for proper and fair implementation.

  16. The Fiscal Pact and the Problem of its Ratification - Selected Aspects

    Andrzej Borodo

    2013-12-01

    Full Text Available The treaty on Stability, Coordination and Governance in the Economic and Monetary Union dated 2 March 2012 (called the fiscal act is the law rela-ting to the economic and budgetary matters of the Member States of the European Union, mainly to the deficit and public debt. The treaty in focus encroaches on the budgetary powers of the Parliament and the government. On February 2012, the Parliament passed the act of law entitling the President of the Republic of Poland to ratify the treaty. The procedure for the ratification of the treaty appears to be questionable. A question arises whether the content of the treaty justifies the adoption of the law authorizing the ratification by ordinary or qualified majority (in accordance with Article 89, paragraph 1 of the Constitution, or paragraph 1 and 2 of Article 90 of the Constitution.

  17. Brazil and the strengthening of safeguard system of the International Atomic Energy Agency: from the four-part agreement to the additional protocol

    The main objective of this paper is to analyse the evolution of IAEA verification system, that constitutes one of the main fundaments of the Non-proliferation nuclear weapons regimen, and to point out elements that contribute to inform the Brazilian position related to the Model Protocol additional to agreements for safeguard application: instrument that comprehend the most recent multilateral efforts of the nuclear verification

  18. Convention on nuclear safety. Signature, ratification, acceptance, approval or accession. Status as of 17 March 1997

    The document presents the status as of 17 March 1997 of signature, ratification, acceptance, approval or accession by Member States of the Convention on Nuclear Safety adopted on 17 June 1994 by the Diplomatic Conference convened by the IAEA at its Headquarters between 14-17 June 1994. The Convention entered into force on 24 October 1996. There are 65 signatories and 35 parties. Reservations/declarations deposited upon signature are also included

  19. L’impératif en français parlé

    Nguyen Minh Chinh

    2016-01-01

    Full Text Available Dans la grammaire française, l’impératif est considéré comme le moyen typique pour exprimer l’injonction. Il peut être utilisé pour tout but injonctif, du plus léger (prière, sollicitation au plus péremptoire (ordre, commandement. Cependant, l’impératif n’exprime pas toujours la valeur injonctive proprement dite, les locuteurs peuvent l’utiliser pour d’autres buts tels que l’expression de la condition ou de l’interrogation, etc. Partant de l’idée qu’à l’oral chaque genre a son vocabulaire de construction, ses formes d’organisation, ses contenus attendus, ses modes productifs, la caractérisation des genres est un préalable à la constitution de corpus utilisables pour des tâches de l’étude. Je présenterai dans cet article l’analyse des caractéristiques pragmatiques des énoncés impératifs et de leur répartition en m’appuyant sur l’analyse des occurrences retirées de 5 situations différentes.

  20. Protocol Additional to the Agreement Between the Republic of Burundi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of Burundi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 13 June 2007. It was signed in Vienna on 27 September 2007. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 27 September 2007, upon signature by the representatives of Burundi and the Agency

  1. Protocol Additional to the agreement between the Republic of Colombia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America

    The text of the Protocol Additional to the Agreement between the Republic of Colombia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 25 November 2004. It was signed in Vienna on 11 May 2005. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 5 March 2009, the date on which the Agency received from Colombia written notification that Colombia's statutory and constitutional requirements for entry into force had been met

  2. Protocol Additional to the agreement between the Government of Iceland and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Government of Iceland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 9 September 2003. It was signed in Vienna on 12 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Iceland and the Agency, i.e., on 12 September 2003

  3. Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 5 March 2013. It was signed on 22 March 2013 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 22 March 2013, upon signature by the representatives of the Denmark and the Agency.

  4. Protocol Additional to the Agreement between Saint Kitts and Nevis and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non‑Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between Saint Kitts and Nevis and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 10 September 2013. It was signed on 16 April 2014 in Basseterre, Saint Kitts and Nevis, and on 19 May 2014 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 May 2014, upon signature by the representatives of Saint Kitts and Nevis and the Agency

  5. Protocol Additional to the agreement between the Republic of Madagascar and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Madagascar and the Agency, i.e., on 18 September 2003

  6. Protocol between the government of the Republic of Latvia and the International Atomic Energy Agency additional to the agreement for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Latvia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 7 December 2000. It was signed in Vienna on 12 July 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Latvia and the Agency, i.e. on 12 July 2001

  7. Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 18 June 2003. It was signed on 6 February 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 9 May 2007, the date on which the Agency received from Kazakhstan written notification that Kazakhstan's statutory and constitutional requirements for entry into force had been met

  8. Protocol Additional to the agreement between the Republic of Malta and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of Malta and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 28 November 2002. It was signed on 24 April 2003 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 12 July 2005, the date on which the Agency received from Malta written notification that Malta's statutory and constitutional requirements for entry into force had been met

  9. Protocol Additional to the agreement between the Government of the Republic of South Africa and the International Atomic Energy Agency for the application of safeguards in connection With the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Safeguards Agreement 1 concluded between the Government of the Republic of South Africa and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 12 June 2002. It was signed in Vienna on 13 September 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of South Africa and the Agency, i.e. on 13 September 2002

  10. Protocol additional to the agreement between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Safeguards Agreement' concluded between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 September 2000. It was signed in Vienna on 30 March 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Bangladesh and the Agency, i.e. on 30 March 2001

  11. Protocol Additional to the Agreement between the Republic of Botswana and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of Botswana and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 20 September 2005. It was signed on 21 July 2006 in Gaborone, Botswana, and on 24 August 2006 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 24 August 2006, upon signature by the representatives of Botswana and the Agency

  12. Protocol Additional to the agreement between the Republic of Afghanistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of Afghanistan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 1 March 2005. It was signed on 19 July 2005 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 July 2005, upon signature by the representatives of Afghanistan and the Agency

  13. Protocol Additional to the agreement between Ukraine and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 15 August 2000 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 24 January 2006, the date on which the Agency received from Ukraine written notification that Ukraine's constitutional requirements for entry into force had been met

  14. Protocol Additional to the agreement between the Republic of Palau and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of Palau and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 1 March 2005. It was signed on 10 May 2005 in New York and 13 May 2005 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 13 May 2005, upon signature by the representatives of Palau and the Agency

  15. Protocol additional to the agreement between the Republic of Mali and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Safeguards Agreement 1 concluded between the Republic of Mali and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 10 September 2002. It was signed in Vienna on 12 September 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Mali and the Agency, i.e. on 12 September 2002

  16. The Kyoto Protocol: one more stage in the climate change negotiations

    This article notices on the internal difficulties that will be generated around the ratification of the Kyoto Protocol in developed countries as United States, Canada and Japan, given the position of industries like the vehicles and the energetic, that try to dilate the commitments assumed in December of 1997. It is emphasized in the North American case, taking into account their contribution in the global greenhouse gases emissions and the importance of their participation in an international agreement on the topic of the climate change, assuming a critical position about the Senate's decision of conditioning the agreement's ratification to the assumption of commitments of developing countries

  17. Study to the effectiveness of the UNECE Persistent Organic Pollutants (POP). Protocol and cost of additional measures. Phase II: Estimated emission reduction and cost of options for a possible revision of the POP Protocol

    Denier van der Gon, H.A.C.; Visschedijk, A.J.H.; Bolscher, M. van het

    2006-01-01

    The rationale is that during the review of the POP Protocol there will be a need for an assessment of the potential for further emission reduction and costs of a possible revision of the Protocol. The sources of POPs listed in the Protocol that are to be addressed revision of the POP Protocol have b

  18. Will The Kyoto Protocol Affect Growth in Russia?

    Lecocq, Franck; Shalizi, Zmarak

    2004-01-01

    In light of the recent argument that rapid economic growth in Russia over the next decade, might result in emissions higher than the Kyoto target, thereby putting much-needed growth at risk, the authors revisit the discussion on the costs and benefits of ratification of the Kyoto Protocol by Russia. They conclude that even under a very high economic growth assumption, and even under very c...

  19. Addition of novobiocin in pre-enrichment step can improve Salmonella culture protocol of modified semisolid Rappaport-Vassiliadis

    Jensen, Annette Nygaard; Sørensen, Gitte; Baggesen, Dorte Lau; Bødker, Rene; Hoorfar, Jeffrey

    2003-01-01

    , 90 samples opposed to 50 yielded a strong positive reading (+++) when Novobiocin was applied. Growth was on average 0.3 scores higher when pre-enriched with Novobiocin. The difference in growth score medians of the two methods was highly significant (Sign test; p <0.001). Despite the increased...... sensitivity, 13 culture-positive samples were missed when using the Novobiocin-containing BPW. In conclusion, a simple addition of Novobiocin in the BPW pre-enrichment step of fecal samples may facilitate reading and thereby detection of Salmonella on MSRV. The increase of Salmonella in the semi-quantitative......The aim was to investigate the effect of addition of Novobiocin to the non-selective buffered peptone water (BPW) for pre-enrichment of Salmonella in connection with plating on modified semisolid Rappaport-Vassiliadis (MSRV). In a semi-quantitative study, the level of Salmonella following pre...

  20. Bill project authorizing the ratification of the statutes of the International Renewable Energy Agency (IRENA)

    After a presentation text describing the content of each of the 20 articles of the statutes of the International Renewable Energy Agency (IRENA), this document contains the full text of these statutes. A third text is the bill project authorizing the ratification of these statutes, and described the economic, financial, social, environmental, administrative or juridical consequences of the implementation of the agreement or convention associated with the creation of the agency. The text also recalls the negotiation process, and indicates the place given to the French language

  1. REVIEW OF THE NEGOTIATION OF THE MODEL PROTOCOL ADDITIONAL TO THE AGREEMENT(S) BETWEEN STATE(S) AND THE INTERNATIONAL ATOMIC ENERGY AGENCY FOR THE APPLICATION OF SAFEGUARDS, INFCIRC/540 (Corrected) VOLUME II/III IAEA COMMITTEE 24, Major Issues Underlying the Model Additional Protocol (1996-1997).

    Rosenthal, M.D.; Saum-Manning, L.; Houck, F.

    2010-01-01

    Volume I of this Review traces the origins of the Model Additional Protocol. It covers the period from 1991, when events in Iraq triggered an intensive review of the safeguards system, until 1996, when the IAEA Board of Governors established Committee 24 to negotiate a new protocol to safeguards agreement. The period from 1991-1996 set the stage for this negotiation and shaped its outcome in important ways. During this 5-year period, many proposals for strengthening safeguards were suggested and reviewed. Some proposals were dropped, for example, the suggestion by the IAEA Secretariat to verify certain imports, and others were refined. A rough consensus was established about the directions in which the international community wanted to go, and this was reflected in the draft of an additional protocol that was submitted to the IAEA Board of Governors on May 6, 1996 in document GOV/2863, Strengthening the Effectiveness and Improving the Efficiency of the Safeguards System - Proposals For Implementation Under Complementary Legal Authority, A Report by the Director General. This document ended with a recommendation that, 'the Board, through an appropriate mechanism, finalize the required legal instrument taking as a basis the draft protocol proposed by the Secretariat and the explanation of the measures contained in this document.'

  2. Law project for the application of additional protocol to the agreement between France and the atomic energy european community and the international atomic energy agency relative to the application of guaranties in France, signed at Vienna the 22 september 1998

    This law project aims to allow the application of the additional protocol. This protocol plans the transmission, by France, to IAEA of defined information. These information concern materials and nuclear activities non declared by States not owning the nuclear weapon. (A.L.B.)

  3. Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons. Entry into Force

    Pursuant to Article 17 of the Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Additional Protocol), the Additional Protocol, which had been applied provisionally from 17 February 2010, entered into force on 10 October 2012, the date upon which the Agency received written notification from Iraq that Iraq's statutory and/or constitutional requirements for entry into force had been met

  4. Making a Historical Survey of a State's Nuclear Ambitions. Impact of Historical Developments of a State's National Nuclear Non-Proliferation Policy on Additional Protocol Implementation

    In 1998, SKI initiated a project to conduct a historical survey of the Swedish nuclear weapons research for the period 1945-1972. IAEA became interested and accepted it in 2000 as a support program task to increase transparency and to support the implementation of the Additional Protocol in Sweden. The main purpose of the Additional Protocol is to make the IAEA control system more efficient with regard to nuclear material, facilities and research. Other countries have now shown interest to follow the Swedish example and to make their own reviews of their past nuclear energy and nuclear weapons research. The most important aim is to produce basic information for IAEA on the nuclear activities of the past and to refine and strengthen the instruments of the Safeguard System within the Additional Protocol. The first objective of this report is to present a short summary of the Swedish historical survey, as well as similar projects in other countries dealing with nuclear-related and nuclear weapons research reviews. These tasks are dealt with in chapter 2. Secondly, the objective is to present a general model of how a national base survey can be designed. The model is based on the Swedish experiences and it has been designed to also serve as a guideline for other countries to strengthen their safeguards systems within the framework of the Additional Protocol. Since other States declared that they would make similar historical surveys, the SKI decided to work out a model that could be used by other countries intending to conduct such studies. Estonia, Latvia and Lithuania are participating in a co-operation project to carry out such nationally base surveys under the auspices of the Swedish Nuclear Power Inspectorate. Finland is also conducting such a survey, but it is done independently, albeit in close exchange of views between SKI and its Finnish counterpart, STUK. This is described in chapter 3. The third objective is to develop a pedagogic methodology for teaching

  5. Protocol Additional to the Agreement between the Republic of Singapore and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of Singapore and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 20 September 2005. It was signed in Vienna on 22 September 2005

  6. Protocol Additional to the Agreement between the Republic of The Gambia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of The Gambia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 3 March 2010. It was signed on 7 October 2011 in Banjul, The Gambia, and on 18 October 2011 in Vienna, Austria

  7. Protocol Additional to the Agreement between the Government of the Republic of Turkey and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Turkey and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 7 June 2000. It was signed in Vienna on 6 July 2000

  8. Protocol Additional to the Agreement between the Republic of Panama and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America

    The text of the Protocol Additional to the Safeguards Agreement 1 concluded between the Republic of Panama and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America (TLATELOLCO) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 29 November 2001. It was signed in the City of Panama on 11 December 2001

  9. Protocol Additional to the Agreement between Uruguay and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between Uruguay and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 23 September 1997. It was signed in Vienna on 29 September 1997

  10. Protocol Additional to the Agreement between Mongolia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear weapons

    The text of the Protocol Additional to the Agreement between Mongolia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 September 2001. It was signed in Vienna on 5 December 2001

  11. Protocol Additional to the Agreement between Mauritius and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between Mauritius and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 14 September 2004. It was signed on 9 December 2004 in Vienna

  12. Protocol Additional to the Agreement between the Government of the Republic of Ghana and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Government of the Republic of Ghana and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 12 June 1998

  13. Protocol Additional to the agreement between the Republic of Armenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons. Entry into force

    Pursuant to Article 17 of the Protocol Additional to the Agreement between the Republic of Armenia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons, the Additional Protocol entered into force on 28 June 2004, the date on which the Agency received from Armenia written notification that Armenia's statutory and/or constitutional requirements for entry into force had been met

  14. Protocol between the Democratic Republic of Congo and the International Atomic Energy Agency Additional to the Agreement for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of Zaire and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT)1 is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 28 November 2002. It was signed in Vienna on 9 April 2003

  15. Protocol additional to the agreement between the Holy See and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/187) concluded between the Holy See and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, and signed in Vienna on 24 September 1998, when it entered into force

  16. Protocol Additional to the Agreement between the Republic of Uzbekistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/508) concluded between the Republic of Uzbekistan and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 22 September 1998, and applied provisionally as from the date of signature

  17. Protocol additional to the agreement between the Hashemite Kingdom of Jordan and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/258) concluded between the Hashemite Kingdom of Jordan and the IAEA for the application of safeguards in connection with the Treaty for the Non-proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 18 March 1998 and it entered into force on 28 july 1998

  18. Protocol Additional to the agreement between New Zealand and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/185) concluded between New Zealand and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 24 September 1998, and it entered into force on the same date

  19. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria

  20. Protocol Additional to the Agreement between the Government of the Republic of Malawi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Government of the Republic of Malawi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 November 2006. It was signed on 5 May 2007 in Lilongwe, Malawi, and on 26 July 2007 in Vienna, Austria

  1. Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003

  2. Protocol Additional to the Agreement between the Socialist People's Libyan Arab Jamahiriya and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Socialist People's Libyan Arab Jamahiriya and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 9 March 2004. It was signed on 10 March 2004 in Vienna

  3. Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 4 March 2008. It was signed in Vienna on 23 July 2010

  4. Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 September 1997. It was signed in Vienna on 30 September 1997

  5. Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 9 October 2008 in Vienna

  6. Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 22 April 2010 in Berlin, Germany, and on 26 April 2010 in Vienna, Austria

  7. Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non- Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 15 August 2000 in Vienna

  8. Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 5 March 2013. It was signed on 22 March 2013 in Vienna, Austria

  9. Protocol Additional to the Agreement between the Principality of Monaco and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/524) concluded between the Principality of Monaco and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 25 November 1998, signed in Vienna on 30 September 1999, and entered into force on the same date

  10. Protocol additional to the agreement between the Government of the Republic of Ghana and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/226) concluded between the Government of the Republic of Ghana and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 11 June 1998, and signed in Vienna on 12 June 1998. Pending entry into force, the Protocol is being applied provisionally as from the date of signature, i.e. 12 June 1998

  11. Implications of international protocols on energy markets

    Ratification of the Kyoto Protocol will have significant medium and long term implications for the economies of Annex B and non-Annex B countries. It is shown that the adoption of a system of internationally tradable emission quotas would result in three 'dividends' compared with an outcome where Article 17 trading - relating to emissions trading - is prohibited. First, trading would improve the environmental effectiveness of the protocol because the extent of carbon dioxide equivalent leakage would be reduced. Second, the overall cost of meeting the agreed Annex B targets would be reduced thus leading to greater certainty that the protocol will be implemented in full. Third, a disparity in the differential impacts of Annex B abatement policies on different developing countries would be reduced under emissions trading, leading to a more equitable outcome for these countries

  12. Protocol Additional to the agreement between the Union of the Comoros and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Union of the Comoros and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2005. It was signed in Vienna on 13 December 2005. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 20 January 2009, the date on which the Agency received from the Union of the Comoros written notification that Comoros' statutory and constitutional requirements for entry into force had been met

  13. Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 December 2000. It was signed in Vienna, Austria on 9 January 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 December 2011, the date on which the Agency received from the Principality of Andorra written notification that its statutory and constitutional requirements for entry into force had been met.

  14. Protocol Additional to the agreement between Canada and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Safeguards Agreement concluded between Canada and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 24 September 1998. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from Canada written notification that Canada's statutory and/or constitutional requirements for entry into force have been met, i.e. on 8 September 2000

  15. Protocol Additional to the agreement between the Republic of Azerbaijan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Azerbaijan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 7 June 2000. It was signed in Vienna on 5 July 2000. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from Azerbaijan written notification that Azerbaijan's statutory and/or constitutional requirements for entry into force have been met, i.e. on 29 November 2000

  16. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 21 April 2011, the date on which the Agency received from the Kingdom of Morocco written notification that Morocco's statutory and constitutional requirements for entry into force had been met

  17. Protocol additional to the agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 23 September 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 7 February 2005, the date on which the Agency received from the United Republic of Tanzania written notification that the United Republic of Tanzania's statutory and/or constitutional requirements for entry into force had been met

  18. Protocol Additional to the agreement between the Republic of Seychelles and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of Seychelles and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Protocol Additional on 18 March 2003. It was signed on 29 March 2004 in Windhoek and on 7 April 2004 in Vienna. Pursuant to Article 17 of the Protocol Additional, the Protocol entered into force on 13 October 2004, the date on which the Agency received from the Republic of Seychelles written notification that the Republic of Seychelles's statutory and/or constitutional requirements for entry into force had been met

  19. Protocol Additional to the agreement between the Czech Republic and the International Atomic Energy Agency for the application of safeguards in connection With the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Czech Republic and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 20 September 1999. It was signed in Vienna on 28 September 1999. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from the Czech Republic written notification that the Czech Republic's statutory and/or constitutional requirements for entry into force have been met, i.e. on 1 July 2002

  20. Protocol additional to the agreement between the Republic of Tajikistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement concluded between the Republic of Tajikistan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Protocol Additional on 12 June 2002. It was signed on 2 July 2003 in Vienna and on 7 July 2003 in Tashkent. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 14 December 2004, the date on which the Agency received from the Republic of Tajikistan written notification that the Republic of Tajikistan's statutory and/or constitutional requirements for entry into force had been met

  1. Protocol Additional to the Agreement Between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 3 March 2009. It was signed in Vienna on 8 April 2009. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 20 December 2010, the date on which the Agency received from the United Arab Emirates written notification that the United Arab Emirates' statutory and constitutional requirements for entry into force had been met

  2. Protocol Additional to the agreement between the Swiss Confederation and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Swiss Confederation and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 16 June 2000 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 1 February 2005, the date upon which the Agency received from the Swiss Confederation written notification that the Swiss Confederation's statutory and/or constitutional requirements for entry into force had been met

  3. Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 6 March 2007. It was signed on 10 August 2007 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 17 September 2012, the date on which the Agency received from the Socialist Republic of Viet Nam written notification that Vietnam's statutory and constitutional requirements for entry into force had been met

  4. Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (Spanish Edition)

    The text of the Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 December 2000. It was signed in Vienna, Austria on 9 January 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 December 2011, the date on which the Agency received from the Principality of Andorra written notification that its statutory and constitutional requirements for entry into force had been met.

  5. Protocol Additional to the agreement between the Republic of Cyprus and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of Cyprus and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 November 1998. It was signed in Vienna on 29 July 1999. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 February 2003, the date on which the Agency received from the Republic of Cyprus written notification that Cyprus' statutory and constitutional requirements for entry into force had been met

  6. Protocol Additional to the agreement between the Republic of Chile and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean

    The text of the Protocol Additional to the Agreement between the Republic of Chile and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 10 September 2002. It was signed in Vienna on 19 September 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 3 November 2003, the date on which the Agency received from Chile written notification that Chile's statutory and/or constitutional requirements for entry into force had been met

  7. Protocol between the Russian Federation and the International Atomic Energy Agency Additional to the Agreement between the Union of Soviet Socialist Republics and the International Atomic Energy Agency for the Application of Safeguards in the Union of Soviet Socialist Republics

    The text of the Protocol between the Russian Federation and the International Atomic Energy Agency Additional to the Agreement between the Union of Soviet Socialist Republics and the International Atomic Energy Agency for the Application of Safeguards in the Union of Soviet Socialist Republics is reproduced in this document for the information of all Members. The Board of Governors approved the Protocol on 21 March 2000. It was signed on 22 March 2000 in Vienna. Pursuant to Article 11 of the Additional Protocol, the Protocol entered into force on 16 October 2007, the date on which the Agency received from the Russian Federation written notification that the procedures of the Russian Federation required for entry into force had been met

  8. Protocol Additional to the Agreement between the Government of the Republic of Lithuania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Government of the Republic of Lithuania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 8 December 1997, signed in Vienna on 11 March 1998, and entered into force on 5 July 2000

  9. Protocol Additional to the Agreement between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 25 November 1998, signed in Vienna on 26 November 1998, and entered into force on 22 August 2000

  10. Protocol Additional to the Agreement between the People's Republic of Bulgaria and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the People's Republic of Bulgaria and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 24 September 1998, and entered into force on 10 October 2000

  11. Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons

    The document reproduces the text of the Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons (NPT), which was approved by the Board of Governors on 20 September 1999 and signed in Vienna on 29 September 1999. The Protocol entered into force on 29 September 1999

  12. Protocol Additional to the Agreement between the Government of Japan and the International Atomic Energy Agency in implementation of Article III.1 and 4 of the Treaty on the Non-Proliferation of Nuclear Weapons

    The document reproduces the text of the Protocol Additional to the Agreement between the Government of Japan and the International Atomic Energy Agency in implementation of Article III.1 and 4 of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT), which was approved by the Board of Governors on 25 November 1998 and signed in Vienna on 4 December 1998. The Protocol entered into force on 16 December 1998

  13. 3 July 1985: Convention signed in Brussels on 31 January 1963, supplementary to the Paris Convention of 29 July 1960 on Third Party Liability in the Field of Nuclear Energy and Act approving the Protocols to amend the Paris Convention and the Brussels Supplementary Convention

    This Act refers to the Brussels Supplementary Convention approved by Belgium in 1966 and ratified on 20 August 1985 and approves ratification of the Protocols of 16 November 1982 to amend the Paris Convention and the Brussels Supplementary Convention respectively. The Protocols are reproduced in French, Dutch and German. (NEA)

  14. Statement by the Iraqi Ministry of Foreign Affairs on the twentieth anniversary of Iraq's ratification of the treaty on the non-proliferation of nuclear weapons (NPT)

    The document reproduces the full text of the statement made by the Iraqi Ministry of Foreign Affairs on the twentieth anniversary of Iraq's ratification of the Treaty on the Non-Proliferation of Nuclear Weapons

  15. Vienna convention on civil liability for nuclear damage. Signatures, ratifications, accessions and successions and text of reservations/declarations. Status as of 31 December 1996

    The document refers to the Vienna Convention on Civil Liability for Nuclear Damage (IAEA-INFCIRC-500), giving the status of signatures, ratifications, accessions and successions, and the texts of reservations/declarations as of 31 December 1996

  16. Explaining Political Party Performance in European Communication: A Qualitative Comparative Analysis of Party Political Cueing in domestic EU Treaty Ratification.

    Packham, Kathrin

    2009-01-01

    Political parties messages or cues constitute important factors shaping public attitudes not only on domestic matters but also on issues of European integration and constitutionalisation. The question explored in the book is, how national political parties communication matters for European integration. The study aims at providing explanations for the politicisation of European contentious politics here EU treaty ratification by analysing patterns of variation in political parties public comm...

  17. Dismantling of a Breakthrough: The Kyoto Protocol – Just Symbolic Policy!

    Böhringer, Christoph; Vogt, Carsten

    2002-01-01

    We show that U.S. withdrawal from the Kyoto Protocol is straightforward under political economy considerations. The reason is that U.S. compliance costs exceed low willingness to pay for dealing with global warming in the U.S. The withdrawal had a crucial impact on the concretion of the Protocol prior to its likely ratification at the end of 2002. Remaining non-EU Parties to the Kyoto Protocol gained veto bargaining power and, thus, were successful in asserting far reaching concessions from t...

  18. Locoregionally Advanced Head and Neck Cancer Treated With Primary Radiotherapy: A Comparison of the Addition of Cetuximab or Chemotherapy and the Impact of Protocol Treatment

    Purpose: The addition of platinum-based chemotherapy (ChRT) or cetuximab (ExRT) to concurrent radiotherapy (RT) has resulted in improved survival in Phase III studies for locoregionally advanced head and neck cancer (LAHNC). However the optimal treatment regimen has not been defined. A retrospective study was performed to compare outcomes in patients who were treated definitively with ExRT or ChRT. Methods: Cetuximab with concurrent RT was used to treat 29 patients with LAHNC, all of whom had tumors of the oral cavity, oropharynx, or larynx. All patients were T2 to T4 and overall American Joint Committee on Cancer Stage III to IVB, with a Karnofsky Performance Status (KPS) score of 60 or greater. ChRT was used to treat 103 patients with similar characteristics. Patients were evaluated for locoregional control (LRC), distant metastasis-free survival (DMFS), disease-specific survival (DSS), and overall survival (OS). Median follow-up for patients alive at last contact was 83 months for those treated with ExRT and 53 months for those treated with ChRT. Cox proportional hazard models were used to assess independent prognostic factors. Results: The LRC, DMFS, and DSS were not significantly different, with 3-year rates of 70.7%, 92.4%, and 78.6% for ExRT and 74.7%, 86.6%, and 76.5% for ChRT, respectively. The OS was significantly different between the two groups (p = 0.02), with 3-year rates of 75.9% for ExRT and 61.3% for ChRT. OS was not significant when patients who were on protocol treatments of ExRT or ChRT were compared. Also, OS was not significant when multivariate analysis was used to control for potential confounding factors. Conclusion: In our single-institution retrospective review of patients treated with ExRT or ChRT, no significant differences were found in LRC, DMFS, DSS, or OS

  19. Protocol Additional to the Agreement between the Republic of Armenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Armenia and the IAEA for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). It was approved by the Board of Governors on 23 September 1997, signed in Vienna on 29 September 1997, and it will enter into force on the date the Agency receives written notification that Armenia's statutory and/or constitutional requirements for entry into force have been met. Pending entry into force, this Protocol shall apply provisionally from the date of signature, i.e., 29 September 1997

  20. A field exercise course to train IAEA safeguards inspectors in implementing the additional protocol and performing complementary access activities (LA-UR-06-5798)

    Full text: The IAEA Department of Safeguards has the task of implementing the Additional Protocol (AP) in the Member States that have signed agreements bringing that treaty into force. The IAEA inspector under the traditional INFCIRC/153 safeguards has been an accountant focused on the declared nuclear material stores of a Member State. The INFCIRC/540 Strengthened Safeguards System (SSS) provides the Agency and its inspectors with the right to investigate a Member State's nuclear programme to see if all declared activities are in order and no undeclared activities exist. This broadening of the scope of the inspector's responsibilities has changed the training of the inspectors to orient them to being an investigator compared to an accountant. The Safeguards training department has created a curriculum of courses that provides the background to train the inspectorate into this new inspection regime. The United States Support Program (USSP) has contributed to this curriculum by putting together a course at Brookhaven National Laboratory (BNL) in Additional Protocol Complementary Access (APCA) to give the IAEA the opportunity to provide inspectors a necessary field exercise in a realistic environment at a research site. Brookhaven National Laboratory contains three shutdown nuclear research reactors, operating particle accelerators, hot cells, radioactive waste storage, laser laboratories, and magnet production facilities on a large site very similar to numerous research facilities around the world situated in non-nuclear weapon states (NNWS). The BNL team created an Article 2 declaration containing annotated maps of the site, descriptions of the buildings on site, satellite and aerial photographs of the area, and a declaration of research activities on the site. The declaration is as realistic to actual BNL research except that proprietary and security concerns of the BNL site have been taken into account. The BNL team felt the best training vehicle provides a

  1. Claims to success: advocacy for the protocol on the rights of women in Africa – solidarity for African women’s rights and the use of information and communication technologies

    K. Kemp (Karoline)

    2010-01-01

    textabstractThe goal of this particular research has been to examine the role of information and communication technologies (ICTs) in policy advocacy as applied by civil society. Taking the Solidarity for African Women’s Rights coalition and their work towards the ratification of the Protocol on Wom

  2. Carbon emissions: the economic benefits of the Kyoto Protocol

    The third Conference of the Parties in Kyoto set the target of reducing greenhouse-gas emissions by an average of 5.3 per cent with respect to 1990 values by 2008 - 2012. One of the main objections to the protocol's ratification is that compliance would pose an unbearable economic burden on the countries involved. But we show here that this is not the case if costs apart from the direct costs of energy production are also considered. Costs are also incurred in rectifying damage to human health, material goods, agriculture and the environment related to greenhouse-gas emissions. (author)

  3. Bill project authorizing the ratification of the statutes of the International Renewable Energy Agency (IRENA); Projet de Loi autorisant la ratification des statuts de l'Agence internationale pour les energies renouvelables (IRENA)

    NONE

    2011-07-01

    After a presentation text describing the content of each of the 20 articles of the statutes of the International Renewable Energy Agency (IRENA), this document contains the full text of these statutes. A third text is the bill project authorizing the ratification of these statutes, and described the economic, financial, social, environmental, administrative or juridical consequences of the implementation of the agreement or convention associated with the creation of the agency. The text also recalls the negotiation process, and indicates the place given to the French language

  4. U.S. ratification of the CRC and reducing child poverty: can we get there from here?

    Aber, J Lawrence; Hammond, Andrew S; Thompson, Scott M

    2010-01-01

    If the United States finally ratifies the United Nations Convention of the Rights of the Child (CRC), will it improve the country's to effectively combat child poverty and thereby improve child well-being? This article addresses this and related questions in two ways. First, the authors examine how ratification of the CRC has influenced the efforts of other wealthy Anglophone countries to reduce child poverty. Second, they draw on lessons learned from these other countries' efforts to generate predictions about America's postratification future. The authors conclude that, while the CRC is a compelling, practical tool, a communications strategy and business plan are necessary complements to achieve desired results. PMID:21361163

  5. Clean energy exports and the Kyoto Protocol

    This paper discussed Canada's attempt in international negotiations to gain credits for energy exports that may result in greenhouse gas emission reductions in the United States. It examined how well founded this position is from an environmental perspective and in terms of international equity and political reality. The author emphasized that the clean energy export issue does not provide a legitimate reason to delay Canada's ratification of the Kyoto Protocol, and cautioned that further renegotiation of Kyoto targets for the first commitment period would not be practical and would jeopardize Canada's international standing. The author did note, however, that for the second commitment period, this issue could be reintroduced. Although the problem can potentially be resolved by granting credits to producers and exempting emissions, it was suggested that the most effective approach would be for countries to factor energy export considerations into their negotiating positions

  6. Protocol Additional to the agreement between the Republic of Hungary and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The document reproduces the text of the Protocol Additional to the agreement between the Republic of Hungary and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 25 November 1998, signed in Vienna on 26 November 1998, and entered into force on 4 April 2000

  7. Protocol Additional to the agreement between the Kingdom of Norway and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The document reproduces the text of the Protocol Additional to the agreement between the Kingdom of Norway and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 24 March 1999, signed in Vienna on 29 September 1999, and entered into force on 16 May 2000

  8. Protocol Additional to the Agreement between the Republic of Armenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons. Amendment of Article 17

    The document reproduces the amendment to the Article 17 of the Protocol Additional to the Agreement between the Republic of Armenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons. The amendment was approved by the Board of Governors in June 1999, and entered into force on 10 September 1999

  9. Protocol Additional the the agreement between the Republic of Croatia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The document reproduces the text of the Protocol Additional to the agreement between the Republic of Croatia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 14 September 1998, signed in Vienna on 22 September 1998, and entered into force on 6 July 2000

  10. Protocol Additional to the agreement between the Republic of Poland and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The document reproduces the text of the Protocol Additional to the agreement between the Republic of Poland and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 23 September 1997, signed in Vienna on 30 September 1997, and entered into force on 5 May 2000

  11. Bilateral sweat tests with two different methods as a part of cystic fibrosis newborn screening (CF NBS protocol and additional quality control.

    Anna Nowakowska

    2010-11-01

    Full Text Available Infants with positive CF newborn screening (NBS results are called to a CF Centre for verification. Those, in whom the sweat test is elevated, undergo further medical procedures. The aim of our study was to evaluate the applicability of Nanoduct - a new system measuring sweat conductivity and giving immediate results in a CF NBS protocol. Measurements with Nanoduct were compared with the classic pilocarpine method. During 3 years 487 infants from CF NBS had both sweat tests performed on the same day, at the same CF centre. CF infants had a mean conductivity of 99.8 Âą 1 8.8 mmol/L and a mean chloride concentration of 74.0 Âą 18.4 mmol/L. Non-CF infants values were 29.8 Âą 7.7 mmol/L and 19.2 Âą 6.6 mmol/L respectively. A good correlation between both tests was found (95% confidence level (CI; r=0.87. The optimal cut off, based on follow up experience of screened children, for conductivity tests was 50 mmol/L and for chloride concentration was 34 mmol/L (no lost CF, 11 false positive with 100% sensitivity and 97.5 % specificity. In conclusion Nanoduct is a very useful and reliable tool in CF NBS protocol, allowing more time efficient organization of the diagnostic and training procedures. Simultaneous bilateral sweat testing with two different methods (concentration and conductivity provides an extra quality control system.

  12. A simple protocol for the michael addition of indoles with electron deficient olefins catalysed by TBAHS in aqueous media and their broad spectrum antibacterial activity

    M Damodiran; R Senthil Kumar; P M Sivakumar; Mukesh Doble; Paramasivan T Perumal

    2009-01-01

    Tetrabutylammonium hydrogen sulfate catalysed addition of indoles to electron deficient olefins in water generated the corresponding Michael adducts in good to excellent yield. The Michael addition of indole occurred regioselectively at position 3 and the -alkylated products have not been observed. The synthesized compounds were tested for their antibacterial activity against four microorganisms namely, E. coli NCIM 2931, S. aureus NCIM 5021, P. vulgaris NCIM 2813, P. aeruginosa NCIM 5029 by micro dilution method. These compounds showed MIC (Minimum Inhibitory Concentration) values in the range of 0.16-2.67 M.

  13. Nouvelle méthode d'évaluation des cycles régénératifs

    Duparquet, Alain

    2013-01-01

    Les turbines à vapeur basés sur les cycles de Rankine et de Hirn comportant des soutirages régénératifs sont utilisés dans l'industrie depuis le début du 20 ème sciècle. C'est partucilièrement le cas dans les installations de production d'électricité.Tout le monde connaît la célèbre relation de Carnot qui dit que le meilleur rendement théorique d'un cycle obéit à l'hypothèse des compressions et détentes isentropiques.Cet article étudie une machine à vapeur comportant des soutirages régénérati...

  14. The ADDITION-Cambridge trial protocol: a cluster – randomised controlled trial of screening for type 2 diabetes and intensive treatment for screen-detected patients

    Kinmonth Ann; Prevost A Toby; Barling Roslyn S; Williams Kate M; Simmons Rebecca K; Echouffo-Tcheugui Justin B; Wareham Nicholas J; Griffin Simon J

    2009-01-01

    Abstract Background The increasing prevalence of type 2 diabetes poses a major public health challenge. Population-based screening and early treatment for type 2 diabetes could reduce this growing burden. However, the benefits of such a strategy remain uncertain. Methods and design The ADDITION-Cambridge study aims to evaluate the effectiveness and cost-effectiveness of (i) a stepwise screening strategy for type 2 diabetes; and (ii) intensive multifactorial treatment for people with screen-de...

  15. Protocol for ADDITION-PRO: a longitudinal cohort study of the cardiovascular experience of individuals at high risk for diabetes recruited from Danish primary care

    Johansen Nanna B

    2012-12-01

    Full Text Available Abstract Background Screening programmes for type 2 diabetes inevitably find more individuals at high risk for diabetes than people with undiagnosed prevalent disease. While well established guidelines for the treatment of diabetes exist, less is known about treatment or prevention strategies for individuals found at high risk following screening. In order to make better use of the opportunities for primary prevention of diabetes and its complications among this high risk group, it is important to quantify diabetes progression rates and to examine the development of early markers of cardiovascular disease and microvascular diabetic complications. We also require a better understanding of the mechanisms that underlie and drive early changes in cardiometabolic physiology. The ADDITION-PRO study was designed to address these issues among individuals at different levels of diabetes risk recruited from Danish primary care. Methods/Design ADDITION-PRO is a population-based, longitudinal cohort study of individuals at high risk for diabetes. 16,136 eligible individuals were identified at high risk following participation in a stepwise screening programme in Danish general practice between 2001 and 2006. All individuals with impaired glucose regulation at screening, those who developed diabetes following screening, and a random sub-sample of those at lower levels of diabetes risk were invited to attend a follow-up health assessment in 2009–2011 (n = 4,188, of whom 2,082 (50% attended. The health assessment included detailed measurement of anthropometry, body composition, biochemistry, physical activity and cardiovascular risk factors including aortic stiffness and central blood pressure. All ADDITION-PRO participants are being followed for incident cardiovascular disease and death. Discussion The ADDITION-PRO study is designed to increase understanding of cardiovascular risk and its underlying mechanisms among individuals at high risk of diabetes

  16. The ADDITION-Cambridge trial protocol: a cluster – randomised controlled trial of screening for type 2 diabetes and intensive treatment for screen-detected patients

    Kinmonth Ann

    2009-05-01

    Full Text Available Abstract Background The increasing prevalence of type 2 diabetes poses a major public health challenge. Population-based screening and early treatment for type 2 diabetes could reduce this growing burden. However, the benefits of such a strategy remain uncertain. Methods and design The ADDITION-Cambridge study aims to evaluate the effectiveness and cost-effectiveness of (i a stepwise screening strategy for type 2 diabetes; and (ii intensive multifactorial treatment for people with screen-detected diabetes in primary care. 63 practices in the East Anglia region participated. Three undertook the pilot study, 33 were allocated to three groups: no screening (control, screening followed by intensive treatment (IT and screening plus routine care (RC in an unbalanced (1:3:3 randomisation. The remaining 27 practices were randomly allocated to IT and RC. A risk score incorporating routine practice data was used to identify people aged 40–69 years at high-risk of undiagnosed diabetes. In the screening practices, high-risk individuals were invited to take part in a stepwise screening programme. In the IT group, diabetes treatment is optimised through guidelines, target-led multifactorial treatment, audit, feedback, and academic detailing for practice teams, alongside provision of educational materials for newly diagnosed participants. Primary endpoints are modelled cardiovascular risk at one year, and cardiovascular mortality and morbidity at five years after diagnosis of diabetes. Secondary endpoints include all-cause mortality, development of renal and visual impairment, peripheral neuropathy, health service costs, self-reported quality of life, functional status and health utility. Impact of the screening programme at the population level is also assessed through measures of mortality, cardiovascular morbidity, health status and health service use among high-risk individuals. Discussion ADDITION-Cambridge is conducted in a defined high-risk group

  17. The Text of the Agreement of 5 April 1973 between The Netherlands and the Agency for the Application of Safeguards with Respect to The Netherlands Antilles in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons and Additional Protocol 1 to the Treaty for the Prohibition of Nuclear Weapons in Latin America

    The text of the Agreement of 5 April 1973, and of the two Protocols thereto, between The Netherlands and the Agency for the application of safeguards with respect to The Netherlands Antilles in connection with the Treaty on the Non-Proliferation of Nuclear Weapons and with Additional Protocol I to the Treaty for the Prohibition of Nuclear Weapons in Latin America is reproduced in this document for the information of all Members. The Agreement and the two Protocols thereto entered into force on 5 June 1975, pursuant to Article 24 of the Agreement and to Article II of each of the Protocols.

  18. The Text of the Agreement of 5 April 1973 between The Netherlands and the Agency for the Application of Safeguards with respect to Surinam in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons and Additional Protocol I to the Treaty for the Prohibition of Nuclear Weapons in Latin America

    The text of the Agreement of 5 April 1973, and of the two Protocols thereto, between The Netherlands and the Agency for the application of safeguards with respect to Surinam in connection with the Treaty on the Non-Proliferation of Nuclear Weapons and with Additional Protocol I to the Treaty for the Prohibition of Nuclear Weapons in Latin America is reproduced in this document for the information of all Members.The Agreement and the two Protocols thereto entered into force on 5 June 1975, pursuant to Article 24 of the Agreement and to Article II of each of the Protocols.

  19. The Kyoto Protocol : Canada's risky rush to judgement

    This paper outlined the 4 proposed policy options to implement the Kyoto Protocol in Canada and presented reasons why the Canadian timetable to ratify the Kyoto Protocol is an unrealistic and unsound policy. The Canadian Prime Minister will ask Parliament to ratify the agreement before the end of 2002 but the authors claim that before any decision regarding ratification is made, the government should cost out all relevant options, under all reasonable contingencies. For policy purposes, this paper focuses on reductions of carbon dioxide. Canada's obligation is to reduce them 6 per cent below 1990 levels by 2010, but because of economic growth, emissions among participating countries may be 30 per cent above their aggregate target. In addition, the withdrawal of the United States means that about two-thirds of the world's emissions are not covered by Kyoto. The first policy option involves the selling of emission permits covering about 80 per cent of domestic emitters. It results in 16 MT of domestic emissions reductions being accomplished and 128 MT of foreign permits being purchased. This first option is considered to be the least costly of the four. The second option relies on command-and-control measures in which 104 MT worth of new targeted measures are forced through. Although the government has not provided cost estimates for option 2, it is likely to be much more costly than option 1. The third option slightly adjusts the mix of permits trading and command-and-control measures, and distributes the permits freely instead of selling them. Only the large emitters are involved in the trading system, covering 40 per cent of domestic emission sources. The cost of emissions reductions would be lower than under option 1. The fourth and final option combines tradable permits systems in which only large emitters are involved, but where permits are distributed according to sectoral emission reduction costs, expected future emission growth rates as well as economic

  20. Addition of telephone coaching to a physiotherapist-delivered physical activity program in people with knee osteoarthritis: A randomised controlled trial protocol

    Bennell Kim L

    2012-12-01

    data. Follow-up assessments will also occur at 12 and 18 months. Discussion The findings will help determine whether the addition of telephone coaching sessions can improve sustainability of outcomes from a physiotherapist-delivered physical activity intervention in people with knee OA. Trial Registration Australian New Zealand Clinical Trials Registry reference: ACTRN12612000308897

  1. Optimising corticosteroid injection for lateral epicondylalgia with the addition of physiotherapy: A protocol for a randomised control trial with placebo comparison

    Brooks Peter

    2009-06-01

    Full Text Available Abstract Background Corticosteroid injection and physiotherapy are two commonly prescribed interventions for management of lateral epicondylalgia. Corticosteroid injections are the most clinically efficacious in the short term but are associated with high recurrence rates and delayed recovery, while physiotherapy is similar to injections at 6 weeks but with significantly lower recurrence rates. Whilst practitioners frequently recommend combining physiotherapy and injection to overcome harmful effects and improve outcomes, study of the benefits of this combination of treatments is lacking. Clinicians are also faced with the paradox that the powerful anti-inflammatory corticosteroid injections work well, albeit in the short term, for a non-inflammatory condition like lateral epicondylalgia. Surprisingly, these injections have not been rigorously tested against placebo injections. This study primarily addresses both of these issues. Methods A randomised placebo-controlled clinical trial with a 2 × 2 factorial design will evaluate the clinical efficacy, cost-effectiveness and recurrence rates of adding physiotherapy to an injection. In addition, the clinical efficacy and adverse effects of corticosteroid injection beyond that of a placebo saline injection will be studied. 132 participants with a diagnosis of lateral epicondylalgia will be randomly assigned by concealed allocation to one of four treatment groups – corticosteroid injection, saline injection, corticosteroid injection with physiotherapy or saline injection with physiotherapy. Physiotherapy will comprise 8 sessions of elbow manipulation and exercise over an 8 week period. Blinded follow-up assessments will be conducted at baseline, 4, 8, 12, 26 and 52 weeks after randomisation. The primary outcome will be a participant rating of global improvement, from which measures of success and recurrence will be derived. Analyses will be conducted on an intention-to-treat basis using linear

  2. After Indonesia’s Ratification: The ASEAN Agreement on Transboundary Haze Pollution and Its Effectiveness As a Regional Environmental Governance Tool

    Daniel Heilmann

    2015-01-01

    Full Text Available On 20 January 2015 Indonesia deposited its instrument of ratification for the ASEAN Agreement on Transboundary Haze Pollution with the ASEAN Secretariat, becoming the last ASEAN member state to join the treaty. Haze pollution poses a serious health threat to the people of Indonesia, Singapore and Malaysia, and for decades haze pollution has been a highly contentious issue among ASEAN member states. This article argues that Indonesia’s ratification will not be an immediate game changer. The mechanisms of the agreement are too weak to contribute much to a reduction of haze pollution in the region. The agreement is designed according to the ASEAN way: a non-binding approach that is based on the principles of state sovereignty and non-intervention. This makes it unlikely that the agreement itself will bring about change, even now that all ASEAN member states have ratified it.

  3. Baudrit Alain. L’apprentissage coopératif : origines et évolutions d’une méthode pédagogique

    Develay, Michel

    2010-01-01

    Le vocable « l’apprentissage coopératif » est spontanément relié en France à des auteurs comme Célestin Freinet ou à des mouvements pédagogiques comme l’Office central de la coopération à l’école (OCCE). Le mérite de l’ouvrage d’Alain Baudrit est de nous ouvrir à des travaux de recherche étrangers à propos de ce qu’il considère comme une méthode pédagogique. L’auteur consacre le premier chapitre de son ouvrage à « des entrées multiples » à propos de l’apprentissage coopératif. Il est question...

  4. Report on the behalf of the Foreign Affairs, Defence and Armed Forces Commission on: the bill project (accelerated procedure) authorizing the ratification of the joint procurement agreement for a designation by auction of common bid platforms, and the bill project (accelerated procedure) authorizing the ratification of the joint procurement agreement for a designation by auction of an auction monitor. Nr 171

    This document first presents the currently operating greenhouse gas emission quota trading scheme and its evolution according to which quotas will be put up for auction. Then, it more precisely describes different aspects of this arrangement: general economy of the auction system, common auction platforms, auction monitor, and market procedures. Consequences on the French law are presented. The ratification procedure is discussed

  5. Protocol Additional to the Agreement between the Republic of Guatemala and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin-America and the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of Guatemala and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 29 November 2001. It was signed in Guatemala City on 14 December 2001

  6. Protocol Additional to the Agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for teh Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 12 June 2002

  7. Protocol Additional to the Agreement between the Dominican Republic and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Dominican Republic and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 November 2006. It was signed in Vienna on 20 September 2007

  8. A secure additive protocol for card players

    Cordon-Franco, Andres; Fernandez-Duque, David; Joosten, Joost J; Soler-Toscano, Fernando

    2011-01-01

    Consider three players Alice, Bob and Cath who hold a, b and c cards, respectively, from a deck of d=a+b+c cards. The cards are all different and players only know their own cards. Suppose Alice and Bob wish to communicate their cards to each other without Cath learning whether Alice or Bob holds a specific card. Considering the cards as consecutive natural numbers 0,1,..., we investigate general conditions for when Alice or Bob can safely announce the sum of the cards they hold modulo an appropriately chosen integer. We demonstrate that this holds whenever a,b>2 and c=1. Because Cath holds a single card, this also implies that Alice and Bob will learn the card deal from the other player's announcement.

  9. Protocol Additional to the Agreement between the United Mexican States and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the United Mexican States and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 9 March 2004. It was signed on 29 March 2004 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 4 March 2011, the date on which the Agency received from the United Mexican States written notification that Mexico's statutory and constitutional requirements for entry into force had been met

  10. Protocol Additional to the Agreement between the Republic of Cuba and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean and the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of Cuba and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 9 September 2003. It was signed on 18 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 3 June 2004, the date on which the Agency received from Cuba written notification that Cuba's statutory and/or constitutional requirements for entry into force had been met

  11. Protocol Additional to the Agreement of 31 October 1975 between the Government of the Republic of Korea and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement of 31 October 1975 between the Government of the Republic of Korea and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 24 March 1999 and signed in Vienna on 21 June 1999. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 February 2004, the date on which the Agency received from the Republic of Korea written notification that the Republic of Korea's statutory and/or constitutional requirements for entry into force had been met

  12. Protocol Additional to the agreement between the United Kingdom of Great Britain and Northern Ireland, the European Atomic Energy Community and the International Atomic Energy Agency for the application of safeguards in the United Kingdom of Great Britain and Northern Ireland in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the United Kingdom of Great Britain and Northern Ireland, the European Atomic Energy Community and the International Atomic Energy Agency for the Application of Safeguards in the United Kingdom of Great Britain and Northern Ireland in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 22 September 1998. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 30 April 2004, the date on which the Agency received written notification that the European Atomic Energy Community and the United Kingdom had met their respective internal requirements for entry into force

  13. Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2005. It was signed on 7 July 2006 in Sydney and 14 July 2006 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 14 July 2006, upon signature by the representatives of the Republic of the Fiji Islands and the Agency

  14. Protocol Additional to the agreement between the Republic of El Salvador and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of El Salvador and the International Atomic Energy Agency in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 23 September 2002. It was signed on 5 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 24 May 2004, the date on which Agency received from El Salvador written notification that El Salvador's statutory and/or constitutional requirements for entry into force had been met

  15. Protocol Additional to the agreement between the Republic of Paraguay and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of Paraguay and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 12 June 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 15 September 2004, the date on which the Agency received from Paraguay written notification that Paraguay's statutory and/or constitutional requirements for entry into force had been met

  16. Protocol Additional to the agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the application of safeguards in connection with the treaty for the prohibition of nuclear weapons in Latin America and the treaty on the non-proliferation of nuclear weapons

    The text of the Protocol Additional to the Agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 12 June 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 18 February 2005, the date on which the Agency received from Nicaragua written notification that Nicaragua's statutory and/or constitutional requirements for entry into force had been met

  17. Protocol Additional to the Agreement between Jamaica and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between Jamaica and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 12 June 2002. It was signed in Vienna on 19 March 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Jamaica and the Agency, i.e. on 19 March 2003

  18. The roles of parties with different commitments under the Kyoto Protocol and implications for NAFTA

    A government perspective on climate change negotiations was presented with particular reference to Canada's cleaner energy exports, the Kyoto mechanism and the second commitment period. The author emphasized the importance of cleaner energy exports for Canada, although progress is likely to be slow in this area because of the opposition among other Parties. Whatever approach the United States takes to trading, it must be compatible with the Kyoto Protocol. Eligibility for trading in North America was discussed with reference to what effect Canada's ratification of the Protocol would have on energy exports. It was noted that if Canada ratifies, it could be both a buyer and a seller, whereas the United States could only buy and Mexico could only sell. The author also suggested that developing countries or major emitters should take on commitments in order to provide greater compatibility in the North American context, especially if the United States rejoined the Kyoto Protocol

  19. Cryptographic Protocols:

    Geisler, Martin Joakim Bittel

    in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons....... We have implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single......; benchmarks show that the approach is practical....

  20. Report on the behalf of the Commission for Foreign Affairs on the bill project adopted by the Senate, bearing application of the additional protocol to the agreement between France, the European Atomic Energy Community, and the International Atomic Energy Agency related to the application of guarantees in France, signed in Vienna on the 22 September 1998. Nr 3428

    This report first discusses an international context which requires a strengthened regime of nuclear non proliferation. It outlines that the struggle against nuclear proliferation is more than ever a matter of concern (a severe threat for peace, security and stability, a contrasted situation with noticeable advances in some countries and regions on the one hand, and severe proliferation crisis on the other hand). It analyses the contribution of the additional protocol to the strengthening of the non proliferation regime: a necessary strengthening of the IAEA guarantee system, the NPT as a keystone of the non proliferation regime, and a perfectible regime on other issues. The second part outlines that the bill project consolidates the French participation to the IAEA guarantee system. The Commission works are then reported, notably the detailed examination of the different bill project articles which deal with declaration obligations, international verification, penal arrangements, and arrangements related to overseas territories and other arrangements. Appendices propose an impact study, a comparative table between the text transmitted by the Senate and the provisions of the additional protocol, a comparison between the French additional protocol and the model adopter in 1997, a comparative table of additional protocols adopted by other countries, and a list of additional protocols

  1. A study protocol of a randomised controlled trial incorporating a health economic analysis to investigate if additional allied health services for rehabilitation reduce length of stay without compromising patient outcomes

    Peiris Casey

    2010-11-01

    alongside the randomised controlled trial. Discussion This paper outlines the study protocol for the first fully powered randomised controlled trial incorporating a health economic analysis to establish if additional Saturday allied health services for rehabilitation inpatients reduces length of stay without compromising discharge outcomes. If successful, this trial will have substantial health benefits for the patients and for organizations delivering rehabilitation services. Clinical trial registration number Australian and New Zealand Clinical Trials Registry ACTRN12609000973213

  2. Submission to the British Columbia government on the Kyoto Protocol

    The Business Council provided its comments concerning the Kyoto Protocol and climate change to the government of British Columbia, recommending that a clear position be established quickly on the matter. The adopted position should also be disseminated broadly to allow stake holders sufficient time to prepare for the upcoming meetings of the Joint Ministers and First Ministers. The federal government has announced that the decision on whether to ratify the Kyoto Protocol will be made before the end of 2002, and this decision will have numerous effects on the people of British Columbia, businesses, workers, and consumers alike. The Business Council of British Columbia believes that the unique interests of the province can best be protected by a proactive approach. Actions plans are being prepared by several of the other provinces and territories, who have already stated their position concerning the Kyoto Protocol. The long-term risks of climate change for British Columbia have not been determined nor have the elements of a provincial approach. The following elements should be included in British Columbia's position on the Kyoto Protocol, according to the Business Council of British Columbia: (1) a credible and cost-effective implementation plan that does not unduly burden the province and other jurisdictions must be developed before Canada decides to ratify the Protocol. British Columbia should go on the record stating it does not support the ratification of the Kyoto Protocol in its present form. (2) the province should advocate for a national approach to climate change that can be achieved within a reasonable time frame, reflects the long-term nature of the problem, and is in agreement with the economic development objectives of British Columbia, (3) a plan detailing how the province intends to deal with the growth of greenhouse gas emissions should supplement and support the position of the province on the Kyoto Protocol. Consumers and business should be engaged

  3. Rational Protocols

    Cachin, Christian

    Security research continues to provide a plethora of new protocols and mechanisms; these solutions patch either existing vulnerabilities found in practical systems or solve hypothetical security problems in the sense that the problem is often conceived at the same time when the first solution is proposed. Yet only a very small fraction of this research is relevant to ordinary users in the sense that they are willing to actually deploy the technology.

  4. Arguments en faveur de l'Administration électronique : Extraits du rapport de l'OCDE L'Administration électronique : un impératif

    OECD

    2003-01-01

    Le Projet d’administration électronique de l’OCDE se fonde sur l’hypothèse que l’administration électronique peut permettre de réformer le mode de fonctionnement des administrations publiques et de mettre en place une administration plus coopérative et davantage axée sur le client. Pour cela, il convient de surmonter des enjeux importants. Un prochain rapport de l’OCDE, « L’administration électronique : un impératif », s’intéresse aux possibilités et aux incidences de l’administration électro...

  5. GENERIC VERIFICATION PROTOCOL FOR DETERMINATION OF EMISSIONS REDUCTIONS OBTAINED BY USE OF ALTERNATIVE OR REFORMULATED LIQUID FUELS, FUEL ADDITIVES, FUEL EMULSIONS AND LUBRICANTS FOR HIGHWAY AND NONROAD USE DISEL ENGINES AND LIGHT DUTY GASOLINE ENGINES AND VEHICLES

    This report sets standards by which the emissions reduction provided by fuel and lubricant technologies can be tested and be tested in a comparable way. It is a generic protocol under the Environmental Technology Verification program.

  6. Bill authorizing the approval of the additional protocol to the construction agreement between the French government and the International organization of fusion energy for the joint implementation of the ITER project, and relative to the role of the labour inspection on the ITER international organization site and dealing with occupational health and safety

    The aim of the additional protocol to the construction agreement between the French Government and the ITER Organization is to allow the French labour inspection services to control the good respect of the French occupational health and safety regulation at the project site (Cadarache, Bouches du Rhone) and to play its role of adviser to the persons responsible for the organization. This bill gives permission to the approval of this additional protocol. It allows the labour inspectors to do their job on the ITER site. (J.S.)

  7. Protocol Additional to the Agreement between the Republic of Ecuador and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Ecuador and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 20 September 1999. It was signed in Vienna on 1 October 1999

  8. Protocol Additional to the Agreement between the Republic of Costa Rica and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of Costa Rica and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 29 November 2001. It was signed in in San Jose, Costa Rica on 12 December 2001

  9. Protocol Additional to the Agreement between Antigua and Barbuda and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between Antigua and Barbuda and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 10 September 2013. It was signed on 30 October 2013 in St. John's, Antigua and Barbuda, and on 15 November 2013 in Vienna, Austria

  10. Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2005. It was signed on 7 July 2006 in Sydney and 14 July 2006 in Vienna

  11. Histology protocols

    CarloAlberto Redi

    2010-06-01

    Full Text Available Tim D. Hewitson & Ian A. Darby (Eds Humana press, Totowa, New Jersey (USA Series: Springer Protocols Methods in Molecular Biology, Volume 611, 2010 Pages: 230; € 83.15 ISBN: 978-1-60327-344-2 Impressive as it can sounds in the era that Biology see a clear dominance of reductionism with the idea that complexity can be disentagled more and more thanks to the use of molecular tools, the reader will remain fascinated by this slim and agile volume devoted to bring together what apparently are two separeted words: molecular biology and histology. Simply remembering to the youngest scientists.....

  12. Report on the behalf of the Foreign Affairs Commission on the bill project n 3080 authorizing the ratification of the statutes of the International Renewable Energy Agency (IRENA)

    This document first recalls that the creation of the International Renewable Energy Agency (IRENA) is due to a German initiative. It recalls the rather quick negotiations (2007-2009) which led to the creation of the Agency, outlines that its statutes were inspired by those of other organizations coming under the United Nations. It comments the content of the article which defines the agency's missions. Then it discusses some questions which have been shelved: the absence of China and Russia, the risk of non ratification by the United States, the language issue. In a second part, the document reports the discussions during the bill examination by the Commission. An appendix indicates the countries which have signed or ratified the IRENA statutes

  13. Testing for identification of locking, maintenance and ratification of large expansion joints; Teste para identificacao de travamento, manutencao e aceitacao de junta de expansao de grande porte

    Veiga, Jordana Luiza Barbosa da Costa; Lemos, Ricardo Jose Fernandes; Medeiros, Jorivaldo [Petroleo Brasileiro S.A. (PETROBRAS), Rio de Janeiro, RJ (Brazil)

    2012-07-01

    Piping systems connected to large machines must have high reliability. In particular systems that have traditionally turbo expander large diameter and operate at high temperatures (up to 760 deg C) and low pressure (less than 4 kgf/cm2). This paper focuses on verification, maintenance and ratification of the correct functioning of expansion joints ('JE') of a piping system (72 inches external diameter), connected to a turbo expander system. After verification of 'JE's' locking, it was necessary to intervene in the system to restore the correct operation, for reasons of delivery, only maintenance was carried out in the expansion joints connected to this system. These expansion joints were tested before and after the maintenance to ensure proper operation after installation and verify that the locking system had its origin in 'JE'. This paper presents the degradation observed in JE, maintenance performed and the results of the tests. (author)

  14. Nr 621 - Report on the behalf of the Commission of foreign affairs, defence and armed forces on the bill project on the application of the additional protocol to the agreement between France, the European Atomic Energy Community, and the International Atomic Energy Agency related to the application of guarantees in France, signed in Vienna on the 22 September 1998

    This report concerns an additional protocol which aims at reinforcing the efficiency of the international guarantee system. This system is part of an international approach for the struggle against nuclear weapon proliferation. The authors outline the necessary evolution of law to deal with the risk of development of clandestine military nuclear programs. They present the role of the IAEA, its organisation, its financing, and outline its reinforced role within the frame of the NPT (Non Proliferation Treaty) and of generalised guarantee agreements (a typology of these agreements is given). They also outline the limits of this guarantee system, and the necessity of its adaptation through an additional protocol. They discuss the difficulty of an international application (notably in the cases of Iran and North Korea). The articles are then discussed. They deal with definitions, declaration obligations, international verification, penal arrangements, arrangements related to overseas territories and other arrangements. The commission discussion is reported, and tables give comparisons between agreements

  15. Brazil and the strengthening of safeguard system of the International Atomic Energy Agency: from the four-part agreement to the additional protocol; O Brasil e o fortalecimento do sistema de salvaguardas da Agencia Internacional de Energia Atomica: do acordo quadripartite ao protocolo adicional

    Moura, Carmen Lidia Richter Ribeiro

    2001-07-01

    The main objective of this paper is to analyse the evolution of IAEA verification system, that constitutes one of the main fundaments of the Non-proliferation nuclear weapons regimen, and to point out elements that contribute to inform the Brazilian position related to the Model Protocol additional to agreements for safeguard application: instrument that comprehend the most recent multilateral efforts of the nuclear verification

  16. Protocol between Romania and the International Atomic Energy Agency additional to the agreement between the Socialist Republic of Romania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    The document reproduces the text of the Protocol Additional to the agreement between Romania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 9 June 1999, signed in Vienna on 11 June 1999, and entered into force on 7 July 2000

  17. Effective Protocols for Mobile Communications and Networking

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  18. Mobile internet protocol analysis

    Brachfeld, Lawrence J.

    1999-01-01

    Mobile Internet Protocol (IP) is a proposed standard that builds on the current Internet Protocol by making the fact that a user is mobile transparent to applications and higher level protocols such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet while maintaining any current conne...

  19. Coded Splitting Tree Protocols

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  20. A review of the Protocol Reporter v.2.0

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on November 14th, 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on June 21st, 1999 and entered into force on February 19th, 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports have been submitted through Protocol Reporter provided by IAEA. Protocol Reporter is a computer system that facilitates preparation of reports by Member States of Declarations pursuant to Article 2 and 3 of the Protocol Additional to Safeguards Agreements (Additional Protocol). Protocol Reporter version 1.0 was developed by the IAEA in 1999 to help Member States structure electronic data storage and reporting formats in a way which is compatible with the guidelines on the Additional Protocol and its data handling system. However, Protocol Reporter version 1.0 had several limitations in data management and Member states requested upgraded software. In order to meet the demand, IAEA developed and released Protocol Reporter version 2.0 in 2008. Member states, consequently, should declare and submit the additional reports through the new version of the protocol reporter. This paper aimed to provide a brief overview of Protocol Reporter v.2.0 and highlight the improvements over the previous version

  1. Report made on behalf of the Commission of foreign affairs about the bill, adopted by the Senate, authorizing the approval of the additional protocol to the construction agreement between the French government and the International organization of fusion energy for the joint implementation of the ITER project, and relative to the role of the labour inspection on the ITER international organization site and dealing with occupational health and safety

    The aim of the additional protocol to the construction agreement between the French Government and the ITER Organization is to allow the French labour inspection services to control the good respect of the French occupational health and safety regulation at the project site (Cadarache, Bouches du Rhone) and to play its role of adviser to the persons responsible for the organization. A bill authorizing the approval of this additional protocol was adopted by the French Senate. This report is the examination by the Commission of foreign affairs of this bill. It presents, first the ITER project, its opportunities for Europe and France, and its juridical framework which favours transparency. Then it introduces the additional protocol as an additional element of transparency and as an exception to the traditional rules of the international right as well. Finally, the authorization of this approval by the Commission of foreign affairs is presented in the form of a single article. (J.S.)

  2. Failure of Kak quantum key distribution protocol

    Ching-Nung Yang; Su-Hsuan Chu; Bing-Ling Lu

    2005-01-01

    Kak's quantum key distribution (QKD) protocol provides not only the distribution but also the integrity of secret key simultaneously in quantum channel. Consequently the additional exchange of information, used to check whether an eavesdropper exists, is unnecessary. In this comment, we will point out the failure of Kak's protocol and show that Kak's protocol does not have the joint distribution and integration that the author declares in [1].

  3. Security Protocol Verification: Symbolic and Computational Models

    Blanchet, Bruno

    2012-01-01

    Security protocol verification has been a very active research area since the 1990s. This paper surveys various approaches in this area, considering the verification in the symbolic model, as well as the more recent approaches that rely on the computational model or that verify protocol implementations rather than specifications. Additionally, we briefly describe our symbolic security protocol verifier ProVerif and situate it among these approaches.

  4. Reading the Kyoto Protocol. Ethical aspects of the convention on climate change

    The Kyoto Protocol to the United Nations Framework Convention on Climate Change aims to reduce greenhouse gas emissions by urging the international community to take measures preventing 'dangerous man-made interference with the climate system'. Since its publication in 1997, the Kyoto Protocol has triggered heated debates among scientists and politicians. According to a number of critics, the questions as to whether global warming is caused by human intervention, and whether taking appropriate measures could reduce the trend, has not yet been conclusively answered. In a limited number of countries, this situation has led to a delay in the ratification process. Only when these disputes were settled in February 2005 the Kyoto Protocol became legally binding on all the signatories. If predictions are accurate, measures have to be taken to prevent a global catastrophe. This leads to another, much overlooked, but no less important question, namely how mankind can be motivated to accept the burden attached to the measures proposed by the Kyoto Protocol; in other words, how do we find and formulate an ethical basis for measures forcing us to sacrifice some of our wealth and riches, for a cleaner, more sustainable world?

  5. Methow and Columbia Rivers studies: summary of data collection, comparison of database structure and habitat protocols, and impact of additional PIT tag interrogation systems to survival estimates, 2008-2012

    Martens, Kyle D.; Tibbits, Wesley T.; Watson, Grace A.; Newsom, Michael A.; Connolly, Patrick J.

    2014-01-01

    designed to show some initial analysis and to disseminate summary information that could potentially be used in ongoing modeling efforts by USGS, Reclamation, and University of Idaho. The second chapter documents the database of fish and habitat data collected by USGS from 2004 through 2012 and compares USGS habitat protocols to the Columbia Habitat Monitoring Program (CHaMP) protocol. The third chapter is a survival analysis of fish moving through Passive Integrated Transponder (PIT) tag interrogation systems in the Methow and Columbia Rivers. It examines the effects of adding PIT tags and/or PIT tag interrogation systems on survival estimates of juvenile steelhead and Chinook salmon.

  6. MTP: An atomic multicast transport protocol

    Freier, Alan O.; Marzullo, Keith

    1990-01-01

    Multicast transport protocol (MTP); a reliable transport protocol that utilizes the multicast strategy of applicable lower layer network architectures is described. In addition to transporting data reliably and efficiently, MTP provides the client synchronization necessary for agreement on the receipt of data and the joining of the group of communicants.

  7. Economic analysis of a phase III clinical trial evaluating the addition of total androgen suppression to radiation versus radiation alone for locally advanced prostate cancer (Radiation Therapy Oncology Group protocol 86-10)

    Purpose: To evaluate the cost-effectiveness of adding hormone therapy to radiation for patients with locally advanced prostate cancer, using a Monte Carlo simulation of a Markov Model. Methods and Materials: Radiation Therapy Oncology Group (RTOG) protocol 86-10 randomized patients to receive radiation therapy (RT) alone or RT plus total androgen suppression (RTHormones) 2 months before and during RT for the treatment of locally advanced prostate cancer. A Markov model was designed with Data Pro (TreeAge Software, Williamstown, MA). The analysis took a payer's perspective. Transition probabilities from one state of health (i.e., with no disease progression or with hormone-responsive metastatic disease) to another were calculated from published rates pertaining to RTOG 86-10. Patients remained in one state of health for 1 year. Utility values for each health state and treatment were obtained from the literature. Distributions were sampled at random from the treatment utilities according to a second-order Monte Carlo simulation technique. Results: The mean expected cost for the RT-only treatments was $29,240 (range, $29,138-$29,403). The mean effectiveness for the RT-only treatment was 5.48 quality-adjusted life years (QALYs) (range, 5.47-5.50). The mean expected cost for RTHormones was $31,286 (range, $31,058-$31,555). The mean effectiveness was 6.43 QALYs (range, 6.42-6.44). Incremental cost-effectiveness analysis showed RTHormones to be within the range of cost-effectiveness at $2,153/QALY. Cost-effectiveness acceptability curve analysis resulted in a >80% probability that RTHormones is cost-effective. Conclusions: Our analysis shows that adding hormonal treatment to RT improves health outcomes at a cost that is within the acceptable cost-effectiveness range

  8. Mac protocols for cyber-physical systems

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  9. Efficient secure two-party protocols

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  10. A New Watermarking Protocol against Conspiracy

    ZHANG Jun; KOU Weidong; FAN Kai; CAO Xuefei

    2006-01-01

    A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided.

  11. Research on Protocol Migration

    汪芸; 顾冠群; 等

    1996-01-01

    This paper elaborates the concept and model of protocol migration in network interconnection.Migration strategies and principles are discussed and several cases are studied in detail which show the basic procedure and techniques used in protocol migration.

  12. Protocol Implementation Generator

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...

  13. Training program to prepare the U.S. DOE laboratories for the entry into force of the protocol additional to the agreement between the United States of America and the International Atomic Energy Agency for the application of safeguards in the United

    Boyer, Brian David [Los Alamos National Laboratory; Stevens, Rebecca C [Los Alamos National Laboratory; Uribe, Eva C [Los Alamos National Laboratory; Sandoval, M Analisa [Los Alamos National Laboratory; Valente, John N [Los Alamos National Laboratory; Valente, John U [BNL; Jo, Jae H [BNL; Sellen, Joana [U.S. DOE/NNSA; Wonder, Edward [QINETIQ-NORTH AMERICA

    2009-01-01

    In 2008, a joint team from Brookhaven National Laboratory (BNL) and Los Alamos National Laboratory (LANL) consisting of specialists in training IAEA inspectors in the use of complementary access activities formulated a training program to prepare the U.S DOE laboratories for the entry into force of the U.S. Additional Protocol. Since the U.S. Additional Protocol would allow for IAEA access to the DOE laboratories under the aegis of complementary access activities, the DOE laboratories would need to prepare for such visits. The goal of the training was to ensure that the DOE laboratories would successfully host an IAEA complementary access. In doing so, the labs must be able to provide the IAEA with the information that the IAEA would need to resolve its questions about the U.S. Declaration and declared activities at the lab, and also protect certain equities, as provided under the U.S. Additional Protocol Article 1.b and c. which set forth a 'National Security Exclusion.' This 'NSE' states that the AP provisions apply within the United States 'excluding only instances where its application would result in access by the Agency to activities with direct national security significance to the United States or to location or information associated with such activities.' These activities are referred to collectively as DNSS-direct national security significance. Furthermore, the U.S. has a specific right to employ managed access, without prejudice to the right under Article 1.b, in connection with activities of DNSS. The provisions in Articles 1.b and 1.c are unique to the U.S. AP, and are additional to the more general right, under Article 7, to use managed access to protect from disclosure proprietary and/or proliferation-sensitive information, and to meet safety and security requirements, that is incorporated directly from the Model Additional Protocol. The BNL-LANL team performed training at Lawrence Livermore National Laboratory, Idaho

  14. Training program to prepare the U.S. DOE laboratories for the entry into force of the protocol additional to the agreement between the United States of America and the International Atomic Energy Agency for the application of safeguards in the United

    In 2008, a joint team from Brookhaven National Laboratory (BNL) and Los Alamos National Laboratory (LANL) consisting of specialists in training IAEA inspectors in the use of complementary access activities formulated a training program to prepare the U.S DOE laboratories for the entry into force of the U.S. Additional Protocol. Since the U.S. Additional Protocol would allow for IAEA access to the DOE laboratories under the aegis of complementary access activities, the DOE laboratories would need to prepare for such visits. The goal of the training was to ensure that the DOE laboratories would successfully host an IAEA complementary access. In doing so, the labs must be able to provide the IAEA with the information that the IAEA would need to resolve its questions about the U.S. Declaration and declared activities at the lab, and also protect certain equities, as provided under the U.S. Additional Protocol Article 1.b and c. which set forth a 'National Security Exclusion.' This 'NSE' states that the AP provisions apply within the United States 'excluding only instances where its application would result in access by the Agency to activities with direct national security significance to the United States or to location or information associated with such activities.' These activities are referred to collectively as DNSS-direct national security significance. Furthermore, the U.S. has a specific right to employ managed access, without prejudice to the right under Article 1.b, in connection with activities of DNSS. The provisions in Articles 1.b and 1.c are unique to the U.S. AP, and are additional to the more general right, under Article 7, to use managed access to protect from disclosure proprietary and/or proliferation-sensitive information, and to meet safety and security requirements, that is incorporated directly from the Model Additional Protocol. The BNL-LANL team performed training at Lawrence Livermore National Laboratory, Idaho National Laboratory, and Oak

  15. Adaptation of TURN protocol to SIP protocol

    Guezouri, Mustapha; Keche, Mokhtar

    2010-01-01

    Today, SIP is a protocol par Excellence in the field of communication over Internet. But, the fact that it belongs to the application layer constitutes a weakness vis-a-vis the NAT traversal. This weakness is due to the way in which the server replies to the requests of clients on the one hand. On the other, it is caused by the dynamic allocation of UDP ports for emission and reception of packets RTP/RTCP. The TURN Protocol may face this weakness. However, its use requires a certain number of exchanges between the clients and a TURN server before establishing the multimedia sessions and this increase the latent time. In this article, we propose to adapt TURN protocol for applications based on SIP protocol such as telephony over Internet, conference video, etc. This adaptation optimises the establishment of multimedia sessions by integrating a manager of TCP connections and multimedia flow controller into SIP Proxy server.

  16. Blind Collective Signature Protocol

    Nikolay A. Moldovyan

    2011-06-01

    Full Text Available Using the digital signature (DS scheme specified by Belarusian DS standard there are designed the collective and blind collective DS protocols. Signature formation is performed simultaneously by all of the assigned signers, therefore the proposed protocols can be used also as protocols for simultaneous signing a contract. The proposed blind collective DS protocol represents a particular implementation of the blind multisignature schemes that is a novel type of the signature schemes. The proposed protocols are the first implementations of the multisignature schemes based on Belarusian signature standard.

  17. Efficient decentralized consensus protocols

    Lakshman, T. V.; Agrawala, A. K.

    1986-01-01

    Decentralized consensus protocols are characterized by successive rounds of message interchanges. Protocols which achieve a consensus in one round of message interchange require O(N-squared) messages, where N is the number of participants. In this paper, a communication scheme, based on finite projective planes, which requires only O(N sq rt N) messages for each round is presented. Using this communication scheme, decentralized consensus protocols which achieve a consensus within two rounds of message interchange are developed. The protocols are symmetric, and the communication scheme does not impose any hierarchical structure. The scheme is illustrated using blocking and nonblocking commit protocols, decentralized extrema finding, and computation of the sum function.

  18. Is the Kyoto Protocol an adequate environmental agreement to resolve the climate change problem?

    The lack of understanding on how to handle the issue of global warming, which is embodied by the Kyoto Protocol, among the various nations of the world reached a point where environmental policy-makers saw a number of possible scenarios to global warming before the last meeting on Climate Change in July 2001 in Bonn: Amendments to the Kyoto Protocol, by changing the current targets and timetable into a long-term view of the global warming issue. The U.S. does not agree with the Kyoto Protocol Therefore, it will not do anything about it in terms of its ratification. A middle ground between the two previous options. The idea is the creation of a new mechanism where nations meet in international environmental for a voluntarily exchange of views with no legal commitments. In order to move forward, we should stop thinking of the global warming issue only in a cost-benefit analysis and instead take more into account public health and safety requirements. Since the U.S. and EU representatives may well find themselves deadlocked again when they meet at the end of October 2001 in Morocco for the next climate change convention, the author would like to make some recommendations at the end of this article. (author)

  19. Food additives

    ... this page: //medlineplus.gov/ency/article/002435.htm Food additives To use the sharing features on this page, please enable JavaScript. Food additives are substances that become part of a food ...

  20. Protocol for the ADDITION-Plus study: a randomised controlled trial of an individually-tailored behaviour change intervention among people with recently diagnosed type 2 diabetes under intensive UK general practice care

    Fanshawe Tom

    2011-04-01

    Full Text Available Abstract Background The increasing prevalence of type 2 diabetes poses both clinical and public health challenges. Cost-effective approaches to prevent progression of the disease in primary care are needed. Evidence suggests that intensive multifactorial interventions including medication and behaviour change can significantly reduce cardiovascular morbidity and mortality among patients with established type 2 diabetes, and that patient education in self-management can improve short-term outcomes. However, existing studies cannot isolate the effects of behavioural interventions promoting self-care from other aspects of intensive primary care management. The ADDITION-Plus trial was designed to address these issues among recently diagnosed patients in primary care over one year. Methods/Design ADDITION-Plus is an explanatory randomised controlled trial of a facilitator-led, theory-based behaviour change intervention tailored to individuals with recently diagnosed type 2 diabetes. 34 practices in the East Anglia region participated. 478 patients with diabetes were individually randomised to receive (i intensive treatment alone (n = 239, or (ii intensive treatment plus the facilitator-led individual behaviour change intervention (n = 239. Facilitators taught patients key skills to facilitate change and maintenance of key behaviours (physical activity, dietary change, medication adherence and smoking, including goal setting, action planning, self-monitoring and building habits. The intervention was delivered over one year at the participant's surgery and included a one-hour introductory meeting followed by six 30-minute meetings and four brief telephone calls. Primary endpoints are physical activity energy expenditure (assessed by individually calibrated heart rate monitoring and movement sensing, change in objectively measured dietary intake (plasma vitamin C, medication adherence (plasma drug levels, and smoking status (plasma cotinine levels at

  1. Block Advertisement Protocol

    Nemirovsky, Danil

    2015-01-01

    Bitcoin, a decentralized cryptocurrency, has attracted a lot of attention from academia, financial service industry and enthusiasts. The trade-off between transaction confirmation throughput and centralization of hash power do not allow Bitcoin to perform at the same level as modern payment systems. Block Advertisement Protocol is proposed as a step to resolve this issue. The protocol allows block mining and block relaying to happen in parallel. The protocol dictates a miner to advertise the ...

  2. Security of RFID protocols

    van Deursen, Ton

    2011-01-01

    Radio-frequency identification (RFID) is a technology that uses radio waves to exchange data between RFID readers and tags. The low manufacturing costs and small size and the lack of need of a power source make RFID tags useful in many applications, but also impose a strong need for secure RFID protocols. The first part of this thesis considers the analysis of untraceability of RFID protocols. We start by designing a formal syntax and semantics for security protocols. We define untraceab...

  3. "Counterfactual" quantum protocols

    Vaidman, Lev

    2016-01-01

    The counterfactuality of recently proposed protocols is analyzed. A definition of `counterfactuality' is offered and it is argued that an interaction-free measurement of the presence of an opaque object can be named `counterfactual', while proposed "counterfactual" measurements of the absence of such objects are not counterfactual. The quantum key distribution protocols which rely only on measurements of the presence of the object are counterfactual, but quantum direct communication protocols...

  4. Military veterans with mental health problems: a protocol for a systematic review to identify whether they have an additional risk of contact with criminal justice systems compared with other veterans groups

    Taylor James

    2012-11-01

    Full Text Available Abstract Background There is concern that some veterans of armed forces, in particular those with mental health, drug or alcohol problems, experience difficulty returning to a civilian way of life and may subsequently come into contact with criminal justice services and imprisonment. The aim of this review is to examine whether military veterans with mental health problems, including substance use, have an additional risk of contact with criminal justice systems when compared with veterans who do not have such problems. The review will also seek to identify veterans’ views and experiences on their contact with criminal justice services, what contributed to or influenced their contact and whether there are any differences, including international and temporal, in incidence, contact type, veteran type, their presenting health needs and reported experiences. Methods/design In this review we will adopt a methodological model similar to that previously used by other researchers when reviewing intervention studies. The model, which we will use as a framework for conducting a review of observational and qualitative studies, consists of two parallel synthesis stages within the review process; one for quantitative research and the other for qualitative research. The third stage involves a cross study synthesis, enabling a deeper understanding of the results of the quantitative synthesis. A range of electronic databases, including MEDLINE, PsychINFO, CINAHL, will be systematically searched, from 1939 to present day, using a broad range of search terms that cover four key concepts: mental health, military veterans, substance misuse, and criminal justice. Studies will be screened against topic specific inclusion/exclusion criteria and then against a smaller subset of design specific inclusion/exclusion criteria. Data will be extracted for those studies that meet the inclusion criteria, and all eligible studies will be critically appraised. Included

  5. Diagrammatization of the Transmission Control Protocol

    Sabah Al-Fedaghi

    2012-09-01

    Full Text Available With the wide spread of Internet services, developers and users need a greater understanding of the technology of networking. Acquiring a clear understanding of communication protocols is an important step in understanding how a network functions; however, many protocols are complicated, and explaining them can be demanding. In addition, protocols are often explained in terms of traffic analysis and oriented toward technical staff and those already familiar with network protocols. This paper aims at proposing a diagrammatic methodology to represent protocols in general, with a focus on the Transmission Control Protocol and Secure Sockets Layer in particular. The purpose is to facilitate understanding of protocols for learning and communication purposes. The methodology is based on the notion of flow of primitive things in a system with six stages: creation, release, transfer, arrival, acceptance, and processing. Though the method presents a basic description of protocols without in-depth analysis of all aspects and mechanisms, the resultant conceptual description is a systematic specification that utilizes a few basic notions that assist in illustrating functionality and support comprehension.

  6. Protocol Additional to the Agreement between the Republic of Austria, the Kingdom of Belgium, the Kingdom of Denmark, the Republic of Finland, the Federal Republic of Germany, the Hellenic Republic, Ireland, the Italian Republic, the Grand Duchy of Luxembourg, the Kingdom of The Netherlands, the Portuguese Republic, the Kingdom of Spain, the Kingdom of Sweden, the European Atomic Energy Community and the International Atomic Energy Agency in implementation of Article III, (1) and (4) of the Treaty on the Non-Proliferation of Nuclear Weapons. Accession of Estonia and the Slovak Republic

    Article 17.a. of the Protocol Additional to the Agreement between the Republic of Austria, the Kingdom of Belgium, the Kingdom of Denmark, the Republic of Finland, the Federal Republic of Germany, the Hellenic Republic, Ireland, the Italian Republic, the Grand Duchy of Luxembourg, the Kingdom of The Netherlands, the Portuguese Republic, the Kingdom of Spain, the Kingdom of Sweden, the European Atomic Energy Community and the International Atomic Energy Agency in implementation of Article III, (1) and (4) of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) provides that the Additional Protocol shall come into force on the date on which the Agency receives from the Community and the Signatory States written notification that their respective requirements for entry into force have been met. Article 23(a) of INFCIRC/193 provides the means for non-signatory States of the Additional Protocol to express their consent to be bound by the Additional Protocol

  7. Commemoration of Montreal Protocol

    CUCULEANU Georgeta

    2008-01-01

    The paper presents the main provisions of the Convention from Vienna for the Protection of the Ozone Layer, the 1987 Montreal Protocol on Substances that deplete the Ozone Layer and its Amendments. The restricting and banning programmes of these substances, some consequences on the environment of the absence of the Protocol and some alternative substances are also presented.

  8. Unconditionally Secure Protocols

    Meldgaard, Sigurd Torkel

    the bottleneck of sorting networks. And we show how to utilize this construction for four-player MPC. Another line of work has results about the power of correlated randomness; meaning in a preprocessing phase the participants in a MPC protocol receive samples from some joint distribution to aid them implement......This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how...... the secure computation. Especially we look at the communication complexity of protocols in this model, and perfectly secure protocols. We show general protocols for any finite functionality with statistical security and optimal communication complexity (but exponential amount of preprocessing). And for two...

  9. Additivity dominance

    Paul Rozin

    2009-10-01

    Full Text Available Judgments of naturalness of foods tend to be more influenced by the process history of a food, rather than its actual constituents. Two types of processing of a ``natural'' food are to add something or to remove something. We report in this study, based on a large random sample of individuals from six countries (France, Germany, Italy, Switzerland, UK and USA that additives are considered defining features of what makes a food not natural, whereas ``subtractives'' are almost never mentioned. In support of this, skim milk (with major subtraction of fat is rated as more natural than whole milk with a small amount of natural vitamin D added. It is also noted that ``additives'' is a common word, with a synonym reported by a native speaker in 17 of 18 languages, whereas ``subtractive'' is lexicalized in only 1 of the 18 languages. We consider reasons for additivity dominance, relating it to omission bias, feature positive bias, and notions of purity.

  10. Guidance for States Implementing Comprehensive Safeguards Agreements and Additional Protocols

    This publication is aimed at enhancing States’ understanding of the safeguards obligations of both the State and the IAEA, and at improving the cooperation between States and the IAEA in safeguards implementation. It is principally intended for State or regional safeguards regulatory authorities and facility operators, and is a reference document that is supported by detailed guidance and examples in safeguards implementation practices presented in other publications in the series. (This version is the 2016 update.)

  11. On using Mobile IP Protocols

    Fayza A. Nada

    2006-01-01

    Full Text Available The recent advances in wireless communication technology and the unprecedented growth of the Internet have paved the way for wireless networking and IP mobility. Mobile Internet protocol has been designed within the IETF to support the mobility of users who wish to connect to the Internet and maintain communications as they move from place to place. This study describes and summarizes the current Internet draft for mobile IP (MIPv4 with its major components: agent discovery, registration and tunneling. In addition, we outline the available encapsulation techniques and route optimization procedure. In the end, we describe the design of the new protocol for transparent routing of IPv6 packets to mobile IPv6 nodes operating in the Internet.

  12. IPv6 Protocol Analyzer

    2002-01-01

    With the emerging of next generation Intemet protocol (IPv6), it is expected to replace the current version of Internet protocol (IPv4) that will be exhausted in the near future. Besides providing adequate address space, some other new features are included into the new 128 bits of IP such as IP auto configuration, quality of service, simple routing capability, security, mobility and multicasting. The current protocol analyzer will not be able to handle IPv6 packets. This paper will focus on developing protocol analyzer that decodes IPv6 packet. IPv6 protocol analyzer is an application module,which is able to decode the IPv6 packet and provide detail breakdown of the construction of the packet. It has to understand the detail construction of the IPv6, and provide a high level abstraction of bits and bytes of the IPv6 packet.Thus it increases network administrators' understanding of a network protocol,helps he/she in solving protocol related problem in a IPv6 network environment.

  13. ATM and Internet protocol

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  14. Playing With Population Protocols

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  15. Linear Logical Voting Protocols

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification....... In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the single-winner first-past-the-post (SW- FPTP) and single transferable vote (STV) protocols demonstrate that this approach leads to concise...

  16. Additivity dominance

    Paul Rozin; Claude Fischler; Christy Shields-Argeles

    2009-01-01

    Judgments of naturalness of foods tend to be more influenced by the process history of a food, rather than its actual constituents. Two types of processing of a ``natural'' food are to add something or to remove something. We report in this study, based on a large random sample of individuals from six countries (France, Germany, Italy, Switzerland, UK and USA) that additives are considered defining features of what makes a food not natural, whereas ``subtractives'' are almost never mentioned....

  17. Dual Mode Vehicle with In-Wheel Motor: Regenerative Braking Optimization Véhicule bi-mode avec moteurs roues : optimisation du freinage récupératif

    Le Solliec G.

    2013-03-01

    Full Text Available To meet the growing need for mobility of people and goods while massively reducing CO2 emissions, the electrification of vehicles is an essential solution. The variety of vehicles and their use results in innovative solutions for adapted architecture. This is especially true for light commercial vehicles where the objective is to promote full electric use in urban conditions (zero emission vehicle while maintaining significant range autonomy on road. The project VelRoue, a partnership between Renault, Michelin and IFP Energies nouvelles, aims to develop a dedicated dual-mode vehicle using a conventional thermal powertrain on the front axle and in-wheel motors on the rear one each powertrain to its use and makes it possible to achieve a low level of homologation CO2 emissions. In addition to features that meet the specific use of a commercial vehicle, in this paper we will particularly demonstrate the benefit of such an architecture to optimize the regenerative braking while ensuring a safe dynamic behaviour. Pour faire face au besoin croissant de mobilité des personnes et des biens tout en réduisant massivement les émissions de CO2, l’électrification des véhicules est une solution majeure. La grande variété des véhicules et de leur utilisation conduit à la mise en place d’architectures adaptées et donc de solutions innovantes. Cela est particulièrement le cas pour le développement de véhicules utilitaires dont l’objectif est de promouvoir un usage tout électrique en ville (véhicule zéro émission tout en maintenant une autonomie significative pour un usage extra-urbain. Le projet VelRoue, un partenariat entre Renault, Michelin et IFP Energies nouvelles, a pour objectif le développement d’un véhicule utilitaire bi-mode utilisant un groupe motopropulseur thermique traditionnel sur le train avant et des moteurs roues sur le train arrière. Chaque système de propulsion sera alors séparément optimisé à son utilisation

  18. A Review of Fair Exchange Protocols

    Abdullah AlOtaibi

    2012-08-01

    Full Text Available Recently, the Internet has become an essential business platform, aiding trading, distribution and sales between organisations, consumers and even between consumers themselves. This technology revolution has brought e-commerce to an entirely new level, which therefore has raised some new security issues. Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and secured; they should protect both parties from fraudulent users and subsequently promote the growth of e-commerce. There are some protocols, known as fair exchange protocols, in e-commerce that are designed to guarantee fairness between the customer and the merchant so that neither party gains any advantage over the other. Therefore, in this paper, we review these protocols in detail. In addition, we present a survey of three fair exchange protocols based on online TTP from different application areas. In particular, we review these protocols with regard to certain properties, namely, fairness, correctness of product, customer's anonymity, timeliness and channel requirement.

  19. 1996 : Track Count Protocol

    US Fish and Wildlife Service, Department of the Interior — The goal of St. Vincent National Wildlife Refuge's Track Count Protocol is to provide an index to the population size of game animals inhabiting St. Vincent Island.

  20. Village Level Protocol

    Ankur Dumka

    2014-01-01

    Here in this paper we have proposed for a protocol to be implemented at the village level. As at the village level as there are few agencies to be contacted at village level so this uses a local label addressing of 4 bits to support 16 agencies with 3 bits Time to live header which checks weather a packet is reached or not. Thus being small packet size this protocol is faster and able to support fast network service at village level.

  1. USA-USSR protocol

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  2. Protocol to the 1979 Convention on Long-range Transboundary Air Pollution on Heavy Metals and Executive Body decision 19981/1 on the criteria and procedures for adding heavy metals and products to the Protocol on heavy metals

    NONE

    1998-12-31

    The Protocol to the Convention on Long-Range Transboundary Air Pollution aims to control emissions of heavy metals caused by anthropogenic activities that are subject to long-range transboundary atmospheric transport and are likely to have significant adverse effects on human health or the environment, in accordance with the provision of 19 Articles. Each Party is obliged to reduce its total annual emissions of cadmium, lead and mercury from the level of emission in the reference year (either 1990 or a year between 1985 and 1995 inclusive) by taking effective measures, using the best available techniques (described in an annex for each stationary source), and applying the limit values defined for each stationary source category. Other Articles relate to technology information exchange, policies and measures to implement the Protocol, research, development and monitoring, reporting, calculating emissions, compliance, reviews, settlements of disputes and amendments. The Protocol is open for signature from June 1998 in Aarhus, Denmark and in New York until 21 December 1998 and will be in force on the ninetieth day following the date of deposit of the 16th instrument of ratification, acceptance, approval or accession. 7 apps. 12 tabs.

  3. Privacy-Preserving Protocols for Eigenvector Computation

    Pathak, Manas A

    2010-01-01

    In this paper, we present a protocol for computing the dominant eigenvector of a collection of private data distributed across multiple parties, with the individual parties unwilling to share their data. Our proposed protocol is based on secure multiparty computation with a trusted third-party arbitrator who deals with data encrypted by the other parties using an additive homomorphic cryptosystem. We also augment the protocol with randomization to make it difficult, with a high probability, for any party to estimate properties of the data belonging to other parties from the intermediate steps. The previous approaches towards this problem were based on expensive QR decomposition of correlation matrices, we present an efficient algorithm using the power iteration method. We present an analysis of the correctness, security, efficiency of protocol and experiments over a prototype implementation.

  4. A Secure DSDV Protocol for Manets

    M.Kalavathi

    2013-05-01

    Full Text Available This paper presents a secure destination-sequenced distance-vector routing protocol (SDSDV for ad hoc mobile wireless networks. The proposed protocol is based on the regular DSDV protocol. Within SDSDV, each node maintains two one-way hash chains about each node in the network. Two additional fields, which we call AL (alteration field and AC (accumulation field, are added to each entry of the update packets to carry the hash values. With proper use of the elements of the hash chains, the sequence number and the metric values on a route can be protected from being arbitrarily tampered. In comparison with the secure efficient distance vector (SEAD protocol previously proposed in the literature provides only lower bound protection on the metrics, SDSDV can provide complete protection.

  5. Climate change in Latin America and the Caribbean. A review of the Bonn and Marrakech decisions and their effect on the clean development mechanism of the Kyoto protocol

    The objective of this document is to present an overview of recent climate change developments, in particular with regards to carbon markets under the Clean Development Mechanism (CDM). The document is divided into three sections. The first section describes the history of the climate change negotiations. Section two presents an overview of the recent decisions adopted at the last international meetings (Bonn Agreements and Marrakech Accord), which have improved the odds of ratification of the Kyoto Protocol by 2002. The third section analyzes the carbon credit market. The first part of this section briefly presents the available information regarding real carbon credit transactions, while the second section focuses on the literature review of several theoretical models and presents the theoretical estimates of the price and size of the carbon market

  6. The mother of all protocols: Restructuring quantum information's family tree

    Abeyesinghe, A; Hayden, P; Winter, A; Abeyesinghe, Anura; Devetak, Igor; Hayden, Patrick; Winter, Andreas

    2006-01-01

    We give a simple, direct proof of the "mother" protocol of quantum information theory. In this new formulation, it is easy to see that the mother, or rather her generalization to the fully quantum Slepian-Wolf protocol, simultaneously accomplishes two goals: quantum communication-assisted entanglement distillation, and state transfer from the sender to the receiver. As a result, in addition to her other "children," the mother protocol generates the state merging primitive of Horodecki, Oppenheim and Winter, a fully quantum reverse Shannon theorem, and a new class of distributed compression protocols for correlated quantum sources which are optimal for sources described by separable density operators. Moreover, the mother protocol described here is easily transformed into the so-called "father" protocol whose children provide the quantum capacity and the entanglement-assisted capacity of a quantum channel, demonstrating that the division of single-sender/single-receiver protocols into two families was unnecess...

  7. Convention on early notification of a nuclear accident and convention on assistance in the case of a nuclear accident or radiological emergency. Status lists as of 12 September 2000. Signature, ratification, acceptance, approval, accession or succession. Declarations/reservations made upon expressing consent to be bound and objections thereto. Declarations/reservations made upon signature

    This document includes the information given in document INFCIRC/335/Add.9 and INFCIRC/336/Add. 10. It accordingly supersedes that document. It contains signatures, ratification, acceptance, approval, accession or successions, as well as declarations/reservations made upon signature by the countries and-or organizations with have accepted it

  8. Convention on the physical protection of nuclear material. Status list as of 12 September 2000. Signature, ratification, acceptance, approval, accession or succession. Declarations/reservations made upon expressing consent to be bound and objections thereto. Declarations/reservations made upon signature

    This document contains signatures, ratifications, acceptance, approval, accession or succession of the Convention on the physical protection of nuclear material as well as declarations/reservations made upon expressing consent to be bound and objections thereto and declarations made upon signature

  9. Minority Languages of the Russian Federation: Perspectives for a Ratification of the European Charter of Regional and Minority Languages. Mercator Working Papers = Las lenguas minoritarias de la Federacion Rusa Perspectivas para una ratificacion de la Carta Europea de las Lenguas Regionales y Minoritarias. Mercator Documentos de trabajo.

    Vieytez, Eduardo J. Ruiz

    This paper describes the linguistic plurality of the Russian Federation, assessing the impact that the hypothetical ratification of the European Charter of Regional and Minority Languages could have on it. Four sections focus on the following: (1) "Introduction"; (2) "Part 1--The Linguistic Plurality of the Russian Federation": the linguistic…

  10. Convention on Early Notification of a Nuclear Accident and Convention on Assistance in the Case of a Nuclear Accident or Radiological Emergency. Status lists as of 30 September 2002. Signature, ratification, acceptance, approval, accession or succession. Declarations/reservations made upon expressing consent to be bound and objections thereto. Declarations/reservations made upon signature

    This document includes the information given in document INFCIRC/335/Add.10 and INFCIRC/336/Add. 11. It accordingly supersedes that document. It contains signatures, ratification, acceptance, approval, accession or successions, as well as declarations/reservations made upon signature by the countries and-or organizations with have accepted it

  11. Debunking myths of protocol registration

    Chang Stephanie M; Slutsky Jean

    2012-01-01

    Abstract Developing and registering protocols may seem like an added burden to systematic review investigators. This paper discusses benefits of protocol registration and debunks common misperceptions on the barriers of protocol registration. Protocol registration is easy to do, reduces duplication of effort and benefits the review team by preventing later confusion.

  12. DNA repair protocols

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  13. Vertical Protocol Composition

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    composition, and it is truly commonplace in today’s communication with the diversity of VPNs and secure browser sessions. In fact, it is normal that we have several layers of secure channels: For instance, on top of a VPN-connection, a browser may establish another secure channel (possibly with a different...... end point). Even using the same protocol several times in such a stack of channels is not unusual: An application may very well establish another TLS channel over an established one. We call this selfcomposition. In fact, there is nothing that tells us that all these compositions are sound, i.e., that...... the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and...

  14. Security Protocols in a Nutshell

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  15. Business protocol in integrated Europe

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  16. Impersonation Attack on EKE Protocol

    Shirisha Tallapally

    2010-01-01

    The key exchange protocol is one of the most elegant ways of establishing secure communication between pair of users by using a session key. The passwords are of low entropy, hence the protocol should resist all types of password guessing attacks. Recently ECC-3PEKE protocol has been proposed by Chang and Chang. They claimed the protocol is secure, efficient and practical. Unless their claims Yoon and Yoo presented an Undetectable online password guessing attack on the above protocol. A key r...

  17. Maximally efficient protocols for direct secure quantum communication

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate. -- Highlights: ► Two protocols for deterministic secure quantum communication (DSQC) are proposed. ► One of the above protocols is maximally efficient. ► It is modified to an equivalent protocol of quantum secure direct communication (QSDC). ► It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. ► Efficient QSDC protocols are always more efficient than their DSQC counterparts.

  18. Annexe C. État de ratifications, réserves et déclarations de la Convention américaine relative aux droits de l’homme

    2014-01-01

    (Suscrite à San José, Costa Rica, le 22 de novembre 1969, à la Conférence spécialisée interaméricaine sur les droits de l’homme) ENTRÉE EN VIGUEUR : Le 18 juillet, conformément à l’article 74.2 de la Convention. DÉPOSITAIRE : Le Secrétariat général de l’OEA (Instrument original et ratifications). TEXTE : Série sur les Traités, OEA, n° 36. ENREGISTRÉ ONU : Le 27 août 1979, n° 17 955 Tous les Etats qui figurent sur la liste ont signé la Convention le 22 novembre 1969, à l’exception de ceux in...

  19. Security Protocol Design: A Case Study Using Key Distribution Protocols

    Reiner Dojen

    2009-10-01

    Full Text Available Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services include data confidentiality, radio link encryption, message integrity, mobile subscriber authentication, electronic payment, certified e-mail, contract signing and nonrepudiation. This paper is concerned with design of effective security protocols. Security protocols are introduced and some common attacks against security protocols are discussed. The vulnerabilities that lead to theattacks are analyzed and guidelines for effective security protocol design are proposed. The presented guidelines are applied to the Andrew Secure RPC protocol and its adapted versions. It is demonstrated that compliance with the guidelines successfully avoidsfreshness and parallel session attacks.

  20. A family of quantum protocols

    Devetak, I; Winter, A

    2003-01-01

    We introduce two dual, purely quantum protocols: for entanglement distillation assisted by quantum communication (``mother'' protocol) and for entanglement assisted quantum communication (``father'' protocol). We show how a large class of ``children'' protocols (including many previously known ones) can be derived from the two by direct application of teleportation or super-dense coding. Furthermore, the parent may be recovered from most of the children protocols by making them ``coherent''. We also summarize the various resource trade-offs these protocols give rise to.

  1. A Survey on Coverage Control Protocols in Wireless Sensor Networks

    V.Nivedhitha; B.Baranidharan; B. Santhi

    2013-01-01

    Coverage control algorithms play an important role in Wireless sensor network. Effective coverage control algorithms sense its coverage area with less energy spent. These coverage control models falls under various approaches like clustering, evolutionary, mobility based approaches. This paper makes a detailed survey on coverage control protocols coming under various classifications. In addition, it also discussed several protocols working mechanism with its evaluation metrics.

  2. Variations on Kak's Three Stage Quantum Cryptography Protocol

    Thomas, James Harold

    2007-01-01

    This paper introduces a variation on Kak's three-stage quanutm key distribution protocol which allows for defence against the man in the middle attack. In addition, we introduce a new protocol, which also offers similar resiliance against such an attack.

  3. Requiem for Kyoto: An Economic Analysis of the Kyoto Protocol

    Nordhaus, William D.; Joseph G. Boyer

    1998-01-01

    This paper uses the newly developed RICE-98 model to analyze the economics of the Kyoto Protocol. It analyzes versions of the Kyoto Protocol that have different approaches to trading emissions rights and compares these with efficient approaches. The major conclusions are: (a) the global cost of the Kyoto Protocol is $716 billion in present value, (b) the United States bears almost two-thirds of the global cost; and (c) the benefit-cost ratio of the Kyoto Protocol is 1/7. Additionally, the emi...

  4. Revisiting the BAN-modified Andrew Secure RPC protocol

    Gugel, Alberto; Aziz, Benjamin; Hamilton, Geoff

    2014-01-01

    We have analysed the well-known BAN modified Andrew Secure RPC authentication protocol by means of the AVISPA Web tool considering all the available back-ends and with the basic configurations of sessions. The protocol has been found vulnerable to a replay/mutation attack based on homomorphism by one of the back-ends. In order to fix it, we integrated into the protocol a common solution, including a new addition to the original protocol and the solution proposed by Liu, Ma and Yang, who earli...

  5. Phototherapy Modalities and Protocols

    Ayten Ferahbaş

    2010-12-01

    Full Text Available Over the past few years, the development of irradiation devices with new emission spectra has led to an expanded role for phototherapy in the treatment of skin diseases. This development is best illustrated by the increasing frequency with which 311 nm UVB phototherapy is used for the treatment of psoriasis and vitiligo, especially. Another example is UVA1 340-400 nm. UVA1 was first used to treat patients with atopic dermatitis, but it has been found to be efficacious in several other skin diseases. This is overview of the protocols for phototherapy with UV in the treatment of skin diseases as currently used according to recent literature review. There are, of course, other protocols in use that are effective.

  6. Symmetric cryptographic protocols

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  7. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  8. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    Ning Li

    2016-03-01

    Full Text Available Underwater acoustic sensor networks (UASNs have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  9. Protocols for Microcontrollers Networks

    López, Ricardo A.

    2011-01-01

    The microcontrollers are embedded in our way of life and are found in many devices. The ability of Very High Scale Integration (VLSI) - with almost exponential growth in recent years makes these devices every day contain functions previously unthinkable. Therefore, a grouping of these networked devices creates a very powerful system, which equipped with a standard protocol that allows interconnection to the Internet gives you a virtually unlimited range of scalability. For these reasons, t...

  10. Seismic protocol urges sensitivity

    This paper is a preliminary summary of a protocol manual for conducting seismic surveys in various topographic and geographic situations to minimize environmental impacts. The manual aims at addressing unique issues for six different types of ecological environments in such a way as to enhance contractors' overall awareness of the types of environmental issues they may encounter, along with some common sense methods of dealing with them. Those six environments are marine, coastal, rain forest, arctic, semi-level terrains, and mountainous

  11. Dysphonia risk screening protocol

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  12. An automatic protocol composition checker

    Kojovic, Ivana

    2012-01-01

    Formal analysis is widely used to prove security properties of the protocols. There are tools to check protocols in isolation, but in fact we use many protocols in parallel or even vertically stacked, e.g. running an application protocol (like login) over a secure channel (like TLS) and in general it is unclear if that is safe. There are several works that give sufficient conditions for parallel and vertical composition, but there exists no program to check whether these conditions are actual...

  13. Protocol to the 1979 Convention on Long-range Transboundary Air Pollution on Persistent Organic Pollutants and Executive Body decision 1998/2 on information to be submitted and the procedure for adding substances to Annexes I, II or III to the Protocol on persistent organic pollutants

    NONE

    1998-12-31

    The Protocol to the Convention on Long-Range Transboundary Air Pollution aims to control, reduce or eliminate discharges, emissions and losses of persistent organic pollutants, in accordance with the provision of the 20 Articles. Substances scheduled to be eliminated from production are: aldrin, chlordane, chlordecone, DDT, dieldrin, endrin, heptachlor and hexabromobiphenyl. DDT and HCH have some specific restrictions on use defined. Parties are also obliged to reduce total annual emissions of polycyclic aromatic hydrocarbons (PAHs), dioxins and furans (PCDD/F), and hexachlorobenzene, from the level of emission in the reference year (either 1990 or year between 1985 and 1995 inclusive), by best available techniques and to within limit values specified for each stationary source category, and for mobile pollution sources (motor vehicles). Other Articles list exemptions to the Protocol, technology information exchange, public awareness, policies and measures for implementation, research, development and monitoring, reporting procedures, reviews, compliance, settlement of disputes and amendments. The Protocol is open for signature from June 1998 (in Aarhus, Denmark) and until 21 December 1998 in New York and comes into force on the 90th day, after deposit of the 16th instrument of ratification, acceptance, approval or accession. The Protocol concerns emissions from fossil fuel and wood fuels combustion, waste incineration, thermal processes in the metallurgical industry, coke combustion and motor vehicles. 18 tabs.

  14. A Lightweight Buyer-Seller Watermarking Protocol

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  15. Protocol for Communication Networking for Formation Flying

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  16. FRENCH PROTOCOL CARDS

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  17. FRENCH PROTOCOL CARDS

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  18. Provenance Query Protocol

    Miles, S.; Moreau, L; Groth, P; Tan, V.; Munroe, S; Jiang, Sheng

    2006-01-01

    A related document defines schemas to be used for documentation about the execution of a process. It also defines the provenance of a data item as the process that led to that item. A provenance query is a query for the provenance of a data item and the results of such a query is documentation of the process that led to the item. In this document, we specify a protocol by which a querying actor and provenance store can communicate in performing a provenance query. This primarily takes the for...

  19. Transfusion protocol in trauma

    Kaur Paramjit

    2011-01-01

    Full Text Available Blood and blood components are considered drugs because they are used in the treatment of diseases. As with any drug, adverse effects may occur, necessitating careful consideration of therapy. Like any other therapeutic decision, the need for transfusion should be considered on the basis of risks and benefits and alternative treatments available to avoid over- and under-transfusion. This review is focused on the blood transfusion protocol in trauma patients with hemorrhagic shock. Besides, issues related to emergency and massive transfusion have also been elaborated. We conducted a comprehensive MEDLINE search and reviewed the relevant literature, with particular reference to emergency medical care in trauma.

  20. Background of the implementation of the Protocol the Convention against Torture: Monitoring places of detention and prevention of torture in Uruguay

    Álvaro Garcé García y Santos

    2014-07-01

    Full Text Available The ratification of the Optional Protocol of the Convention against Torture had for our country, the significance of an ethical and juridical commitment of giving priority to the prevention of abuses for all the people deprived from liberty who are in jails or in other places of detention, as a consequence of a judicial decision or by virtue of an administrative mandate. Among the obligations established by the said Protocol it is found the one of setting up a National Mechanism of Prevention, technically and economically independent, in charge of the systematic monitoring of the detention centers. The creation of the National Institution of Human Rights, together with the legal mandate the same bears to coordinate its duties with the pre-existing Parliamentary Commissioner, finally brings the certain possibility of fulfilling with the obligations arising from the Protocol. At the same time, the original national solution, unparalleled in the region, implies a series of juridical complexities approached in this work. The cooperation between the two State Institutions involved in the matter, so as to avoid a useless overlapping of duties, brings up a promising future in relation to the prevention of torture in Uruguay.

  1. Protocol Additional to the Agreement between the Republic of Austria, the Kingdom of Belgium, the Kingdom of Denmark, the Republic of Finland, the Federal Republic of Germany, the Hellenic Republic, Ireland, the Italian Republic, the Grand Duchy of Luxembourg, the Kingdom of The Netherlands, the Portuguese Republic, the Kingdom of Spain, the Kingdom of Sweden, the European Atomic Energy Community and the International Atomic Energy Agency in implementation of Article III, (1) and (4) of the Treaty on the Non-Proliferation of Nuclear Weapons. Accession of the Czech Republic

    The Agency received from the Czech Republic on 18 May 2009 and from the European Atomic Energy Community on 1 October 2009, notification that their respective requirements had been met. Accordingly, the Additional Protocol came into force for the Czech Republic on 1 October 2009

  2. PROFILE: Environmental Impact Assessment Under the National Environmental Policy Act and the Protocol on Environmental Protection to the Antarctic Treaty.

    Ensminger; McCold; Webb

    1999-07-01

    / Antarctica has been set aside by the international community for protection as a natural reserve and a place for scientific research. Through the Antarctic Treaty of 1961, the signing nations agreed to cooperate in protecting the antarctic environment, in conducting scientific studies, and in abstaining from the exercise of territorial claims. The 1991 signing of the Protocol on Environmental Protection to the Antarctic Treaty (Protocol) by representatives of the 26 nations comprising the Antarctic Treaty Consultative Parties (Parties) significantly strengthened environmental protection measures for the continent. The Protocol required ratification by each of the governments individually prior to official implementation. The US government ratified the Protocol by passage of the Antarctic Science, Tourism, and Conservation Act of 1997. Japan completed the process by ratifying the Protocol on December 15, 1997. US government actions undertaken in Antarctica are subject to the requirements of both the Protocol and the US National Environmental Policy Act (NEPA). There are differences in the scope and intent of the Protocol and NEPA; however, both require environmental impact assessment (EIA) as part of the planning process for proposed actions that have the potential for environmental impacts. In this paper we describe the two instruments and highlight key similarities and differences with particular attention to EIA. Through this comparison of the EIA requirements of NEPA and the Protocol, we show how the requirements of each can be used in concert to provide enhanced environmental protection for the antarctic environment. NEPA applies only to actions of the US government; therefore, because NEPA includes certain desirable attributes that have been refined and clarified through numerous court cases, and because the Protocol is just entering implementation internationally, some recommendations are made for strengthening the procedural requirements of the Protocol

  3. Dynamically Adaptable Improved OLSR (DA-IOLSR Protocol

    P.S.Vinayagam,

    2016-05-01

    Full Text Available Optimized Link State Routing (OLSR protocol is a proactive type of routing protocol that uses Multipoint Relay (MPR set as the virtual backbone structure. The existing literature has identified various issues with respect to its backbone structure and has accordingly proposed improvements. In this paper, the focus is on improving the OLSR protocol by employing a Connected Dominating Set (CDS based virtual backbone structure that is dynamically adaptable to rapid topology changes. A new Dynamically Adaptable Improved Optimized Link State Routing (DA-IOLSR protocol is proposed that uses the local topology information to adapt the virtual backbone to topology changes. This assumes significance especially in networks that experience very high mobility. Changes in the network topology caused by node additions, node deletions and node mobility are taken care of. Simulations are carried out to assess the performance of DA-IOLSR protocol and OLSR protocol. Packet delivery achieved by both the protocols is examined under varying mobility by using various combinations of node speed and pause time values. It is found that DA-IOLSR protocol provides better packet delivery as compared to OLSR protocol, under varying mobility conditions.

  4. Security and SCADA protocols

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  5. A quartet of speculative impact scenarios of Kyoto Protocol implementation in Canada

    This presentation was intended to stimulate thought about the implementation of the Kyoto Protocol. The author proposes four potential scenarios for the Canadian economy under the Kyoto Protocol and offers speculation regarding the ramifications of non-compliance. The author notes that Canada's expectation of achieving a greenhouse gas (GHG) reduction target of 6 per cent below 1990 levels by 2012-2015 was based on achieving credits for actions already taken, for clean energy exports to the United States, and for carbon sequestration. These actions have been largely rejected by the international community and the issue of ratification is still questionable in several developed and developing countries. This presentation outlined the following 4 scenarios and presented their impacts, assumptions underlying estimates, and scenario probability: (1) Kyoto within international trading and clean energy exports; (2) Kyoto with only internal trading; (3) Kyoto without trading; and (4) Kyoto without immediate action. The first scenario, although deemed unlikely, has a high potential for attaining reductions through sequestration, as well as a high potential for technology and energy transfer. The second scenario is considered possible, but unlikely. It assumes that least cost solutions are less available and biological sequestration credits are unlikely. The third scenario is considered to be more probable than the first two, but no mechanism exists to find or promote least cost solutions. Sequestration would be more available in some provinces than in others. The fourth and final scenario is considered to be the most probable, with investment into existing energy efficiency programs. The author cautioned that the actions taken by the current government may lead Canada into failure to attain greenhouse gas obligations, which in turn could be used by climate alarmist groups to justify implementation of the third scenario. 7 refs

  6. Formal Verification of Quantum Protocols

    Nagarajan, R; Nagarajan, Rajagopal; Gay, Simon

    2002-01-01

    We propose to analyse quantum protocols by applying formal verification techniques developed in classical computing for the analysis of communicating concurrent systems. One area of successful application of these techniques is that of classical security protocols, exemplified by Lowe's discovery and fix of a flaw in the well-known Needham-Schroeder authentication protocol. Secure quantum cryptographic protocols are also notoriously difficult to design. Quantum cryptography is therefore an interesting target for formal verification, and provides our first example; we expect the approach to be transferable to more general quantum information processing scenarios. The example we use is the quantum key distribution protocol proposed by Bennett and Brassard, commonly referred to as BB84. We present a model of the protocol in the process calculus CCS and the results of some initial analyses using the Concurrency Workbench of the New Century (CWB-NC).

  7. Stream Control Transmission Protocol Steganography

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2010-01-01

    Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating systems like BSD, Linux, HP-UX or Sun Solaris. It is also supported in Cisco network devices operating system (Cisco IOS) and may be used in Windows. This paper describes potential steganographic methods that may be applied to SCTP and may pose a threat to network security. Proposed methods utilize new, characteristic SCTP features like multi-homing and multistreaming. Identified new threats and suggested countermeasures may be used as a supplement to RFC 5062, which describes security attacks in SCTP protocol and can induce further standard modifications.

  8. Survey protocol for invasive species

    Menza, Charles

    2009-01-01

    This protocol was developed by the Biogeography Branch of NOAA’s Center for Coastal Monitoring and Assessment to support invasive species research by the Papahānaumokuākea Marine National Monument. The protocol’s objective is to detect Carijoa riisei and Hypnea musciformis in deepwater habitats using visual surveys by technical divers. Note: This protocol is designed to detect the presence or absence of invasive species. A distinct protocol is required to collect information on abundance ...

  9. Protocols for Scholarly Communication

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  10. Mobile Multilayer IPsec protocol

    T.Gayathri

    2009-08-01

    Full Text Available A mobile user moves around and switches between wireless cells, subnets and domains, it needs to maintain the session continuity. At the same time security of signaling and transport media should not be compromised. A multi-layer security framework involving user authentication, packet based encryption and access control mechanism can provide the desired level of security to the mobile users. Supporting streaming traffic in a mobile wireless Internet is faced with several challenges due to continuous handoff experienced by a mobile user. These challenges include dynamic binding, location management, quality of service and end-to-end security for signaling and transport. Mobile users will use heterogeneous radio access networking technologies. Mobile multilayer IPsec protocol (MML IPSec extends ML-IPSec to deal with mobility and make it suitable for wireless networks. MML-IPSec is integration of ML-IPSec and mobile IP.

  11. A PROGRAMMED LABOUR - PROTOCOL

    Savita

    2014-12-01

    Full Text Available A Prospective randomized Clinical study of outcome of labour following. “A Programmed labour. Protocol” was done at Department of OBG, MRMC Gulbarga. The Protocol was aimed with dual. Objective of Providing Pain relief during labour and teaching the goal of safe motherhood by optimizing objective outcome. AIMS AND OBJECTIVES: Shortening of duration of labour. Effect of labour analgesia. Monitoring of the events during labour. Lowering the incidence of operative deliveries. METHODS: 100 cases primi pregnant women admitted in labour room are randomly selected. It is designed to apply to low risk primi parous, singleton cephalic presentation without evidence of CPD and spontaneous onset of labour. RESULTS: Shortened duration of all the stages of Labour, especially significant reduction in duration of active phase of labour. CONCLUSION: The programmed labour is simple easy and effective method for painless and safe delivery.

  12. PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS

    Mickalonis, J.

    2014-09-16

    The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

  13. Compiling and securing cryptographic protocols

    Chevalier, Yannick

    2009-01-01

    Protocol narrations are widely used in security as semi-formal notations to specify conversations between roles. We define a translation from a protocol narration to the sequences of operations to be performed by each role. Unlike previous works, we reduce this compilation process to well-known decision problems in formal protocol analysis. This allows one to define a natural notion of prudent translation and to reuse many known results from the literature in order to cover more crypto-primitives. In particular this work is the first one to show how to compile protocols parameterised by the properties of the available operations.

  14. Static Validation of Security Protocols

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.; Nielson, Hanne Riis; Nielson, Flemming

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  15. A Study of MAC Protocols for WBANs

    Sana Ullah

    2009-12-01

    Full Text Available The seamless integration of low-power, miniaturised, invasive/non-invasive lightweight sensor nodes have contributed to the development of a proactive and unobtrusive Wireless Body Area Network (WBAN. A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal dailylife activities. This monitoring requires the low-power operation of invasive/non-invasive sensor nodes. In other words, a power-efficient Medium Access Control (MAC protocol is required to satisfy the stringent WBAN requirements, including low-power consumption. In this paper, we first outline the WBAN requirements that are important for the design of a low-power MAC protocol. Then we study low-power MAC protocols proposed/investigated for a WBAN with emphasis on their strengths and weaknesses. We also review different power-efficient mechanisms for a WBAN. In addition, useful suggestions are given to help the MAC designers to develop a low-power MAC protocol that will satisfy the stringent requirements.

  16. A study of MAC protocols for WBANs.

    Ullah, Sana; Shen, Bin; Islam, S M Riazul; Khan, Pervez; Saleem, Shahnaz; Kwak, Kyung Sup

    2010-01-01

    The seamless integration of low-power, miniaturised, invasive/non-invasive lightweight sensor nodes have contributed to the development of a proactive and unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal dailylife activities. This monitoring requires the low-power operation of invasive/non-invasive sensor nodes. In other words, a power-efficient Medium Access Control (MAC) protocol is required to satisfy the stringent WBAN requirements, including low-power consumption. In this paper, we first outline the WBAN requirements that are important for the design of a low-power MAC protocol. Then we study low-power MAC protocols proposed/investigated for a WBAN with emphasis on their strengths and weaknesses. We also review different power-efficient mechanisms for a WBAN. In addition, useful suggestions are given to help the MAC designers to develop a low-power MAC protocol that will satisfy the stringent requirements. PMID:22315531

  17. Service discovery with routing protocols for MANETs

    Gu, Xuemai; Shi, Shuo

    2005-11-01

    Service discovery is becoming an important topic as its use throughout the Internet becomes more widespread. In Mobile Ad hoc Networks (MANETs), the routing protocol is very important because it is special network. To find a path for data, and destination nodes, nodes send packets to each node, creating substantial overhead traffic and consuming much time. Even though a variety of routing protocols have been developed for use in MANETs, they are insufficient for reducing overhead traffic and time. In this paper, we propose SDRP: a new service discovery protocol combined with routing policies in MANETs. The protocol is performed upon a distributed network. We describe a service by a unique ID number and use a group-cast routing policy in advertisement and request. The group-cast routing policy decreases the traffic in networks, and it is efficient to find destination node. In addition, the nodes included in the reply path also cache the advertisement information, and it means when each node finds a node next time, they can know where it is as soon as possible, so they minimize the time. Finally, we compare SDRP with both Flood and MAODV in terms of overload, and average delay. Simulation results show SDRP can spend less response time and accommodate even high mobility network environments.

  18. Paper presented to the Commission des transports et de l'environnement in the context of the general consultation concerning the implementation of the Kyoto Protocol in Quebec

    Climate change is a major issue facing Quebec's population and future generations. The scientific community generally agrees on the negative effects resulting from global climate change on human health, the environment and the economy. In 1997, the Kyoto Protocol was adopted by industrialized countries, whereby countries agreed to reduce their emissions of greenhouse gases (GHG) by a certain percentage, calculated from 1990 levels. In the case of Canada, this percentage was 6 per cent, for the first commitment period covering 2008-2012. Quebec's performance on the issue of GHG emissions compares favorably to that of other Canadian provinces, even to that of other industrialized countries. Canada ratified the Kyoto Protocol in December 2002. The Quebec National Assembly called for a parliamentary committee to meet on 18 February 2003 on the implementation of the Kyoto Protocol. Hydro-Quebec, since 1997, has favored the ratification of the Kyoto Protocol by the Canadian government. In this document, Hydro-Quebec makes its position known in the context of this debate and the commercial context of the electric power industry in 2003. The first section of the document was devoted to the favorable performance of Hydro-Quebec, on the retroactive and prospective aspects of GHG emissions with regard to the entire electric power industry in Canada. In the second section, an explanation was provided, in the context of deregulation of the electricity market in North America, on the implementation of the Kyoto Protocol in Quebec and in Canada and how it becomes a major commercial issue for Hydro-Quebec. The analysis was conducted in light of the mandate of Hydro-Quebec to provide a secure and reliable service to its customers. refs., 1 fig

  19. SPECT/CT workflow and imaging protocols

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  20. Clinical validation protocols for noninvasive blood pressure monitors and their recognition by regulatory authorities and professional organizations: rationale and considerations for a single unified protocol or standard.

    Ng, Kim-Gau

    2013-10-01

    Standardized protocols for validating the clinical accuracy of noninvasive blood pressure (NIBP) monitors have been available since 1987. Some of them were developed by standards bodies and others by professional organizations. They have been well-tested through use and progressively improved through multiple revisions; however, many methodological differences exist between them. In addition, for the purpose of regulatory approval or marketing clearance, some protocols are recognized in some countries but not in others; thus, manufacturers have to validate their NIBP monitors to more than one protocol in order to market them worldwide. The use of different protocols not only makes it difficult to compare one device with another but also complicates the validation, regulatory approval, marketing, and public acceptance of NIBP monitors, creating undue burden on manufacturers and unnecessary confusion among users. There is a need for protocol developers, standards bodies, and regulatory authorities to work together to develop and agree on a single unified protocol or standard, one that builds on the strengths of the various protocols that have been developed so far. It is apparent that there is already a trend toward convergence of the various protocols into two protocols, namely, the ISO 81060-2:2009 standard and the 2010 European Society of Hypertension International Protocol. With further reconciliation and consensus, it should be possible to integrate the best features of the ISO, European Society of Hypertension, and other protocols, along with further improvements, into a single unified protocol or standard. PMID:23709002

  1. Updatable Queue Protocol Based On TCP For Virtual Reality Environment

    Al-Howaide, Ala'a Z; Salhieh, Ayad M

    2011-01-01

    The variance in number and types of tasks required to be implemented within Distributed Virtual Environments (DVE) highlights the needs for communication protocols can achieve consistency. In addition, these applications have to handle an increasing number of participants and deal with the difficult problem of scalability. Moreover, the real-time requirements of these applications make the scalability problem more difficult to solve. In this paper, we have implemented Updatable Queue Abstraction protocol (UQA) on TCP (TCP-UQA) and compared it with original TCP, UDP, and Updatable Queue Abstraction based on UDP (UDP-UQA) protocols. Results showed that TCP-UQA was the best in queue management.

  2. Protocols for Scholarly Communication

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  3. Internet Protocol Television (IPTV

    Lokesh Mittal

    2012-09-01

    Full Text Available IPTV is one of the mostly used technology of Internet and IP application. IPTV is a service for the delivery of broadcast TV, movies on demand and other interactive multimedia services over a secure, end-to-end operator managed broadband IP data network with desired QoS to the public with a broadband Internet connection. IPTV system may also include Internet services such as Web access and VoIP where it may be called Triple Play and is typically supplied by a broadband operator using the same infrastructure. IPTV is not the Internet Video that simply allows users to watch videos, like movie previews and web-cams, over the Internet in a best effort fashion. IPTV technology offers revenue-generating opportunities for the telecom and cable service providers. For traditional telephone service providers, Triple Play is delivered using a combination of optical fiber and Digital Subscriber Line (DSL technologies to its residential base. IPTV is a system where a digital television service is delivered by using Internet Protocol over a network infrastructure, which may include delivery by a broadband connection. A general definition of IPTV is television content that, instead of being delivered through traditional broadcast and cable formats, is received by the viewer through the technologies used for computer networks. In this paper I am trying to discuss this topic as my knowledge, including what is IPTV, how it works, its advantages and its applications

  4. A Dialogue Game Protocol for Agent Purchase Negotiations

    McBurney, P.; van Eijk, R.M.; Parsons, S.; Amgoud, L.

    2003-01-01

    We propose a dialogue game protocol for purchase negotiation dialogues which identifies appropriate speech acts, defines constraints on their utterances, and specifies the different sub-tasks agents need to perform in order to engage in dialogues according to this protocol. Our formalism combines a dialogue game similar to those in the philosophy of argumentation with a model of rational consumer purchase decision behaviour adopted from marketing theory. In addition to the dialogue game proto...

  5. AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL

    2005-01-01

    In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication.Various attacks on this protocol are described and enhanced in the literature. Recently, Ku and Wang proposed an improved authenticated key agreement protocol, where they asserted the protocol could withstand the existing attacks. This paper shows that Ku and Wang's protocol is still vulnerable to the modification attack and presents an improved authenticated key agreement protocol to enhance the security of Ku and Wang's protocol. The protocol has more efficient performance by replacing exponentiation operations with message authentication code operations.

  6. Modular approach to the design and analysis of password-based security protocols

    FENG DengGuo; CHEN WeiDong

    2007-01-01

    In this paper, a general framework for designing and analyzing password-based security protocols is presented, First we introduce the concept of "weak computational indistinguishability" based on current progress of password-based security protocols. Then, we focus on cryptographic foundations for password-based security protocols, i.e., the theory of "weak pseudorandomness". Furthermore, based on the theory of weak pseudorandomness, we present a modular approach to design and analysis of password-based security protocols. Finally, applying the modular approach, we design two kinds of password-based security protocols, i.e.,password-based session key distribution (PSKD) protocol and protected password change (PPC) protocol. In addition to having forward secrecy and improved efficiency, new protocols are proved secure.

  7. Data Link Layer Protocol Simulator User Guide

    Nataf, Emmanuel

    2008-01-01

    The data link layer protocol simulator allows to write protocol and to see them in execution. This guide describes a step by step approach from simple information communication without any control to windows protocols. A protocol oriented java API is defined to write protocol algorithms.

  8. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    Mandellos, George J.; Koukias, Michael N.; Ioannis St. Styliadis; Lymberopoulos, Dimitrios K.

    2010-01-01

    Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG) provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP), body temperature (Temp), Carbon dioxide (CO2), bloo...

  9. Protocol Additional to the Agreement between the Republic of Austria, the Kingdom of Belgium, the Kingdom of Denmark, the Republic of Finland, the Federal Republic of Germany, the Hellenic Republic, Ireland, the Italian Republic, the Grand Duchy of Luxembourg, the Kingdom of The Netherlands, the Portuguese Republic, the Kingdom of Spain, the Kingdom of Sweden, the European Atomic Energy Community and the International Atomic Energy Agency in implementation of Article III, (1) and (4) of the Treaty on the Non-Proliferation of Nuclear Weapons

    The text of the Protocol Additional to the Agreement between the Republic of Austria, the Kingdom of Belgium, the Kingdom of Denmark, the Republic of Finland, the Federal Republic of Germany, the Hellenic Republic, Ireland, the Italian Republic, the Grand Duchy of Luxembourg, the Kingdom of The Netherlands, the Portuguese Republic, the Kingdom of Spain, the Kingdom of Sweden, the European Atomic Energy Community and the International Atomic Energy Agency in implementation of Article III, (1) and (4) of the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 22 September 1998

  10. Performance Evaluation of Security Protocols

    Genge, Bela

    2009-01-01

    We propose a comparative performance evaluation of security protocols. The novelty of our approach lies in the use of a polynomial mathematical model that captures the performance of classes of cryptographic algorithms instead of capturing the performance of each algorithm separately, approach that is used in other papers. A major advantage of using such a model is that it does not require implementation-specific information, because the decision is based on comparing the estimated performances of protocols instead of actually evaluating them. The approach is validated by comparatively evaluating the performances of 1000 automatically generated security protocols against the performances of their actual implementations.

  11. Improved Authenticated Multi-Key Agreement Protocol

    ZHANG Hua; YUAN Zheng; WEN Qiaoyan

    2006-01-01

    Zhou et al give an attack on Harn's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.

  12. Session Initiation Protocol Attacks and Challenges

    Keshavarz, Hassan; Sattari, Mohammad Reza Jabbarpour; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are comp...

  13. Comparison of a new whole-body continuous-table-movement protocol versus a standard whole-body MR protocol for the assessment of multiple myeloma

    Weckbach, S. [University Hospital Munich-Grosshadern Campus, Department of Clinical Radiology, Munich (Germany); University Hospital Mannheim, Medical Faculty Mannheim, University of Heidelberg, Department of Clinical Radiology and Nuclear Medicine, Mannheim (Germany); Michaely, H.J.; Schoenberg, S.O.; Dinter, D.J. [University Hospital Mannheim, Medical Faculty Mannheim, University of Heidelberg, Department of Clinical Radiology and Nuclear Medicine, Mannheim (Germany); Stemmer, A. [Siemens AG, Healthcare Sector, Imaging and IT Division, Magnetic Resonance, Erlangen (Germany)

    2010-12-15

    To evaluate a whole body (WB) continuous-table-movement (CTM) MR protocol for the assessment of multiple myeloma (MM) in comparison to a step-by-step WB protocol. Eighteen patients with MM were examined at 1.5T using a WB CTM protocol (axial T2-w fs BLADE, T1-w GRE sequence) and a step-by-step WB protocol including coronal/sagittal T1-w SE and STIR sequences as reference. Protocol time was assessed. Image quality, artefacts, liver/spleen assessability, and the ability to depict bone marrow lesions less than or greater than 1 cm as well as diffuse infiltration and soft tissue lesions were rated. Potential changes in the Durie and Salmon Plus stage and the detectability of complications were assessed. Mean protocol time was 6:38 min (CTM) compared to 24:32 min (standard). Image quality was comparable. Artefacts were more prominent using the CTM protocol (P = 0.0039). Organ assessability was better using the CTM protocol (P < 0.001). Depiction of bone marrow and soft tissue lesions was identical without a staging shift. Vertebral fractures were not detected using the CTM protocol. The new protocol allows a higher patient throughput and facilitates the depiction of extramedullary lesions. However, as long as vertebral fractures are not detectable, the protocol cannot be safely used for clinical routine without the acquisition of an additional sagittal sequence. (orig.)

  14. Assessment of Established Survey Protocols

    US Fish and Wildlife Service, Department of the Interior — A form and instructions for quickly and briefly assessing a previously prior to 2013 reviewed or approved survey protocol for use as a National or Regional survey...

  15. Automatic Sequencing for Experimental Protocols

    Hsieh, Paul F.; Stern, Ivan

    We present a paradigm and implementation of a system for the specification of the experimental protocols to be used for the calibration of AXAF mirrors. For the mirror calibration, several thousand individual measurements need to be defined. For each measurement, over one hundred parameters need to be tabulated for the facility test conductor and several hundred instrument parameters need to be set. We provide a high level protocol language which allows for a tractable representation of the measurement protocol. We present a procedure dispatcher which automatically sequences a protocol more accurately and more rapidly than is possible by an unassisted human operator. We also present back-end tools to generate printed procedure manuals and database tables required for review by the AXAF program. This paradigm has been tested and refined in the calibration of detectors to be used in mirror calibration.

  16. SNOMED CT® Encoded Cancer Protocols

    van Berkum, Monique M.

    2003-01-01

    SNOMED Clinical Terms® (SNOMED CT®) is being used to encode the Cancer Protocols published by the College of American Pathologists (CAP). As of January 1, 2004, one of the standards set for approved cancer programs by the American College of Surgeons Commission on Cancer will be that at least 90% of surgical pathology reports contain all essential data elements identified in the CAP Cancer Protocols.

  17. Neonatal euthanasia: The Groningen Protocol*

    Vizcarrondo, Felipe E.

    2014-01-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criter...

  18. Secure E-payment Protocol

    Sattar J Aboud

    2009-11-01

    Full Text Available The vast spreading of information in the last decade has led to greatdevelopment in e-commerce. For instance, e-trade and e-bank are two mainInternet services that implement e-transaction from anyplace in the world. Thishelps merchant and bank to ease the financial transaction process and to giveuser friendly services at any time. However, the cost of workers andcommunications falls down considerably while the cost of trusted authority andprotecting information is increased. E-payment is now one of the most centralresearch areas in e-commerce, mainly regarding online and offline paymentscenarios. In this paper, we will discuss an important e-payment protocol namelyKim and Lee scheme examine its advantages and delimitations, whichencourages the author to develop more efficient scheme that keeping allcharacteristics intact without concession of the security robustness of theprotocol. The suggest protocol employs the idea of public key encryption schemeusing the thought of hash chain. We will compare the proposed protocol with Kimand Lee protocol and demonstrate that the proposed protocol offers moresecurity and efficiency, which makes the protocol workable for real worldservices.

  19. A Recovery Method for Greedy Routing Protocols in Web Communications

    Sheetal Kaushik

    2012-01-01

    Full Text Available Greedy Perimeter Stateless Routing (GPSR protocol is an appropriate and the most well-known routing protocol for high mobile vehicular ad-hoc networks. The protocol includes two routing modes, the greedy mode and the recovery mode, and utilizes a neighbor list to make a route decision. However, not only does the neighbor list in the protocol involve stale neighbor information, but also the stale nodes inherit a higher selection priority in the greedy mode according to the routing policy; besides, the useful redundant route information can be eliminated during planarization in the recovery mode. To overcome those problems, we propose a new recovery mode, named as Greedy Border Superiority Routing (GBSR, along with an Adaptive Neighbor list Management (ANM scheme. A node generates aborder superior graph instead of generating a planar graph whenthe node faces the local maximum. Packets in the recovery modecan escape from the recovery mode as fast as possible using thegraph. Here, GBSR protocol has the same assumption as that ofGPSR, and does not require any additional information. With anetwork simulator, GBSR and ANM are evaluated using two vehicle mobility scenarios. GBSR shows higher network performance in comparison with GPSR protocol. In addition, we accomplish a nearly stale-free neighbor list using the ANM scheme.

  20. A Voting Protocol Based on the Controlled Quantum Operation Teleportation

    Tian, Juan-Hong; Zhang, Jian-Zhong; Li, Yan-Ping

    2016-05-01

    Based on the controlled quantum operation teleportation, a secure voting protocol is proposed in this paper. Genuine four-qubit entangled state functions as the quantum channel. The eligible voter's quantum operation which represents his vote information can be transmitted to the tallyman Bob with the help of the scrutineer Charlie. Voter's quantum identity authentication provides the anonymity of voters'ID, which is ensured by a zero-knowledge proof of the notary organization CA. Charlie's supervision in the whole voting process can make the protocol satisfy verifiability and non-reusability so as to avoid Bob's dishonest behaviour. The security analysis shows that the voting protocol satisfies unforgeability, and has great advantages over some relevant researches. Additionally, the quantum operation can be transmitted successfully with the probability 1, which can make the protocol reliable and practical.

  1. A Secure and Efficient Buyer-Seller Watermarking Protocol

    Yuping Hu

    2009-06-01

    Full Text Available The Digital watermarking technology has become increasing popular in the protection digital copyright. However, in the practical application, the watermarking algorithms should be combined with a secure copyright protection protocol to solve the copyright protection problems completely. In this paper, a novel buyer-seller watermarking protocol is proposed for piracy tracing, in which a memoryless Watermark Certification Authority (WCA can offer a number of watermarks for a buyer simultaneously, avoiding itself being involved in each digital transaction operated between the buyer and the seller. Besides, in order to guarantee the anonymity of the buyer, the WCA can provide the buyer with an encrypted digital certificate and have it submitted directly to the seller by the buyer. In addition, the proposed protocol also can resolve other problems, such as the customer right problem, the binding attack problem, the anonymity problem, the conspiracy problem, the dispute problem. The analyses indicate that the proposed protocol is secure and practical.

  2. Efficient Protocols for Principal Eigenvector Computation over Private Data

    Manas A. Pathak

    2011-12-01

    Full Text Available In this paper we present a protocol for computing the principal eigenvector of a collection of data matrices belonging to multiple semi-honest parties with privacy constraints. Our proposed protocol is based on secure multi-party computation with a semi-honest arbitrator who deals with data encrypted by the other parties using an additive homomorphic cryptosystem. We augment the protocol with randomization and oblivious transfer to make it difficult for any party to estimate properties of the data belonging to other parties from the intermediate steps. The previous approaches towards this problem were based on expensive QR decomposition of correlation matrices, we present an efficient algorithm using the power iteration method. We present an analysis of the correctness, security, and efficiency of protocol along with experimental results using a prototype implementation over simulated data and USPS handwritten digits dataset.

  3. Monoclonal antibodies technology. Protocols

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x107 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x107 spleen cells to 1x106 myeloma cells (ratio 10:1). Centrifuge

  4. New dimensions in SNMP Protocol in Romania

    Alice Nastovici

    2009-01-01

    In this year 2009, after e-finance shock made in each banks who worked with Simple NetworkManagement Protocol (SNMP) default community string and vulnerability:- If you do not absolutely require SNMP, disable it- If you must use SNMP, use the same policy for community names as used for passwords.Make sure that they are difficult to guess or crack and that they are chanced periodically- Validate and check community names using SNMPwalk. Additional information can be foundat http://www.2nd.com/...

  5. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    George J. Mandellos

    2010-01-01

    Full Text Available Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP, body temperature (Temp, Carbon dioxide (CO2, blood oxygen saturation (SPO2, and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System.

  6. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  7. Les systèmes coopératifs dans les transports : une approche coordonnée qui nécessite une affirmation des champs de compétence. Recherche Transports Sécurité Vol29 N113, juin 2013

    GILLIERON, Pierre Yves; MARAIS, Juliette; Peyret, François; KAPARIAS, Ioannis

    2013-01-01

    Introduction du dossier "les systèmes coopératifs dans les transports : une approche coordonnée qui nécessite une affirmation des champs de compétence. Les nouvelles technologies de l’information révolutionnent l’organisation de notre société avec un impact sur le monde du travail, sur notre rapport avec les autres et sur notre mobilité. Le domaine des transports avec ses multiples challenges liés à la gestion du trafic et des infrastructures, à la diffusion d’information et...

  8. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David

    2014-06-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersede its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.

  9. Fault-tolerant quantum cryptographic protocols with collective detection over the collective amplitude damping channel

    Huang, Wei; Su, Qi; Li, Yan-Bing; Sun, Ying

    2014-07-01

    In this paper, a quantum key distribution (QKD) protocol, which can be immune to collective amplitude damping noise, is proposed with collective detection strategy. Then a multi-party quantum secret sharing (MQSS) protocol and a quantum private comparison (QPC) protocol are introduced as two applications of the proposed QKD protocol. Except for one participant who is responsible for preparing and measuring quantum states, the rest of the users in each of these protocols only need to perform certain unitary operations due to the utilization of collective detection. Therefore, in addition to the advantage of being secure against collective amplitude damping noise, the proposed protocols still have the advantages of higher qubit efficiency and lower cost for implementation. Moreover, the security of these protocols is guaranteed by theorems on quantum operation discrimination.

  10. Superselection rules and quantum protocols

    We show that superselection rules do not enhance the information-theoretic security of quantum cryptographic protocols. Our analysis employs two quite different methods. The first method uses the concept of a reference system--in a world subject to a superselection rule, unrestricted operations can be simulated by parties who share access to a reference system with suitable properties. By this method, we prove that if an n-party protocol is secure in a world subject to a superselection rule, then the security is maintained even if the superselection rule is relaxed. However, the proof applies only to a limited class of superselection rules, those in which the superselection sectors are labeled by unitary irreducible representations of a compact symmetry group. The second method uses the concept of the format of a message sent between parties--by verifying the format, the recipient of a message can check whether the message could have been sent by a party who performed charge-conserving operations. By this method, we prove that protocols subject to general superselection rules (including those pertaining to non-Abelian anyons in two dimensions) are no more secure than protocols in the unrestricted world. However, the proof applies only to two-party protocols. Our results show in particular that, if no assumptions are made about the computational power of the cheater, then secure quantum bit commitment and strong quantum coin flipping with arbitrarily small bias are impossible in a world subject to superselection rules

  11. 21 CFR 1301.18 - Research protocols.

    2010-04-01

    ..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol... security provisions (as proscribed in paragraph (a)(2)(vi) of this section for a research protocol) to, and... be in lieu of a research protocol to the Administration as required in paragraph (a) of this...

  12. Emergency department radiation accident protocol.

    Leonard, R B; Ricks, R C

    1980-09-01

    Every emergency department faces the potential problem of handling one or more victims of a radiation accident. While emergency departments near nuclear power plants or isotope production laboratories probably have a detailed protocol for such emergencies, a similar protocol is needed for the emergency department that may have to handle an isolated event, such as a vehicular accident that spills radioactive material and contaminates passengers or bystanders. This communication attempts to answer that need, presenting a step-by-step protocol for decontamination of a radiation victim, the rationale on which each step is based, a list of needed supplies, and a short summary of decorporation procedures that should be started in the emergency department. PMID:7425419

  13. Cryptographie Quantique : Protocoles et Graphes

    Javelle, Jérôme

    2014-01-01

    Je souhaite réaliser un modèle théorique optimal pour les protocoles de partage de secret quantique basé sur l'utilisation des états graphes. Le paramètre représentatif d'un partage de secret à seuil est, entre autres la taille du plus grand ensemble de joueurs qui ne peut pas accéder au secret. Je souhaite donc trouver un famille de protocoles pour laquelle ce paramètre est le plus petit possible. J'étudie également les liens entre les protocoles de partage de secret quantique et des famille...

  14. Analysis of the Transport Layer Security protocol

    Firing, Tia Helene

    2010-01-01

    In this master thesis we have presented a security analysis of the TLS protocol with particular emphasis on the recently discovered renegotiation attack. From our security proof we get that the Handshake protocol with renegotiation, including the fix from IETF, is secure, and hence not vulnerable to the renegotiation attack anymore. We have also analysed the Handshake protocol with session resumption, and the Application data protocol together with the Record protocol. Both of these prot...

  15. Analyzing security of Authenticated Routing Protocol (ARAN)

    Seema Mehla; Bhawna Gupta; Preeti Nagrath

    2010-01-01

    Ad hoc network allow nodes to communicate beyond their direct wireless transmission range by introducing cooperation in mobile computer (nodes). Many proposed routing protocol for ad hoc network operate in an ad hoc fashion, as on demand routing protocol often have low overhead and faster reaction time than other type of routingbased on periodic protocol. However variety of attacks targeting routing protocol have been identified. By attacking the routing protocol attacker can absorb network t...

  16. Optimistic Non-repudiation Protocol Analysis

    Santos Santiago, Judson; Vigneron, Laurent

    2007-01-01

    Non-repudiation protocols with session labels have a number of vulnerabilities. Recently Cederquist, Corin and Dashti have proposed an optimistic non-repudiation protocol that avoids altogether the use of session labels. We have specified and analysed this protocol using an extended version of the AVISPA Tool and one important fault has been discovered. We describe the protocol, the analysis method, show two attack traces that exploit the fault and propose a correction to the protocol.

  17. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  18. Security Flaws in a Recent Ultralightweight RFID Protocol

    Peris-Lopez, Pedro; Tapiador, J M E; van der Lubbe, Jan C A

    2009-01-01

    In 2006, Peris-Lopez et al. [1, 2, 3] initiated the design of ultralightweight RFID protocols -with the UMAP family of protocols- involving only simple bitwise logical or arithmetic operations such as bitwise XOR, OR, AND, and addition. This combination of operations was revealed later to be insufficient for security. Then, Chien et al. proposed the SASI protocol [4] with the aim of offering better security, by adding the bitwise rotation to the set of supported operations. The SASI protocol represented a milestone in the design of ultralightweight protocols, although certain attacks have been published against this scheme [5, 6, 7]. In 2008, a new protocol, named Gossamer [8], was proposed that can be considered a further development of both the UMAP family and SASI. Although no attacks have been published against Gossamer, Lee et al. [9] have recently published an alternative scheme that is highly reminiscent of SASI. In this paper, we show that Lee et al.'s scheme fails short of many of its security object...

  19. Extensible Authentication Protocol Overview and Its Applications

    Youm, Heung Youl

    The Extensible Authentication Protocol (EAP) is an authentication framework that supports multiple authentication mechanisms [38] between a peer and an authentication server in a data communication network. EAP is used as a useful tool for enabling user authentication and distribution of session keys. There are numerous EAP methods that have been developed by global SDOs such as IETF, IEEE, ITU-T, and 3GPP. In this paper, we analyze the most widely deployed EAP methods ranging from the EAP-TLS [27] to the EAP-PSK [25]. In addition, we derive the security requirements of EAP methods meet, evaluate the typical EAP methods in terms of the security requirements, and discuss the features of the existing widely-deployed EAP methods. In addition, we identify two typical use cases for the EAP methods. Finally, recent global standardization activities in this area are reviewed.

  20. Trail-Using Ant Behavior Based Energy-Efficient Routing Protocol in Wireless Sensor Networks

    Soon-gyo Jung; Byungseok Kang; Sanggil Yeoum; Hyunseung Choo

    2016-01-01

    Swarm Intelligence (SI) observes the collective behavior of social insects and other animal societies. Ant Colony Optimization (ACO) algorithm is one of the popular algorithms in SI. In the last decade, several routing protocols based on ACO algorithm have been developed for Wireless Sensor Networks (WSNs). Such routing protocols are very flexible in distributed system but generate a lot of additional traffic and thus increase communication overhead. This paper proposes a new routing protocol...

  1. Quantum cryptography: individual eavesdropping with the knowledge of the error-correcting protocol

    The quantum key distribution protocol BB84 combined with the repetition protocol for error correction is analysed from the point of view of its security against individual eavesdropping relying on quantum memory. It is shown that the mere knowledge of the error-correcting protocol changes the optimal attack and provides the eavesdropper with additional information on the distributed key. (fifth seminar in memory of d.n. klyshko)

  2. An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Recently, Giri et al.'s proposed a RSA cryptosystem based remote user authentication scheme for telecare medical information system and claimed that the protocol is secure against all the relevant security attacks. However, we have scrutinized the Giri et al.'s protocol and pointed out that the protocol is not secure against off-line password guessing attack, privileged insider attack and also suffers from anonymity problem. Moreover, the extension of password guessing attack leads to more security weaknesses. Therefore, this protocol needs improvement in terms of security before implementing in real-life application. To fix the mentioned security pitfalls, this paper proposes an improved scheme over Giri et al.'s scheme, which preserves user anonymity property. We have then simulated the proposed protocol using widely-accepted AVISPA tool which ensures that the protocol is SAFE under OFMC and CL-AtSe models, that means the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The informal cryptanalysis has been also presented, which confirmed that the proposed protocol provides well security protection on the relevant security attacks. The performance analysis section compares the proposed protocol with other existing protocols in terms of security and it has been observed that the protocol provides more security and achieves additional functionalities such as user anonymity and session key verification. PMID:26123833

  3. Testing heated flint palaeodose protocols using dose recovery procedures

    Thermoluminescence (TL) dating of materials from archaeological contexts has been shown to be an accurate method when comparisons are made with other chronometric dating methods; however, little has been published on the verification of the measurement protocols used to determine the equivalent dose (palaeodose). Instead of testing TL dating protocols for heated flint using archaeological material with unknown thermal and radiation history, dose recovery tests for three samples of different geological origin are presented. These samples exhibit TL emission in the UV, blue and orange-red wavelengths. In addition to the two multiple aliquot protocols (standard additive-regeneration and normalization) generally used to determine the palaeodose, the single-aliquot-regenerative-dose (SAR) TL and OSL procedure, a 'short' SAR-TL and isothermal luminescence (IT) decay procedures are applied using detection windows limited to these emissions. Accurate dose recovery is obtained for the standard and normalization protocols in the commonly employed detection window (UV-blue), the 'short' SAR in the orange-red window and some IT measurements. While the standard techniques give the most accurate and precise results, detection of the TL and IT orange-red emission in connection with a 'short' SAR protocol also gave accurate and precise results. Such procedures are especially suitable for samples too small for standard multiple aliquot techniques, which require large samples

  4. Bundle Security Protocol for ION

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  5. Symbolic Analysis of Cryptographic Protocols

    Dahl, Morten

    concrete protocol by Blumberg et al. using one-way functions and commitments for providing various location based vehicle services, and report on our ndings and experience of carrying out its analysis using the ProVerif tool. Third, we make an abstract model of the powerful simulation-based Universally...

  6. A Student Teamwork Induction Protocol

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  7. About models of security protocols

    Comon-Lundh, Hubert

    2008-01-01

    In this paper, mostly consisting of definitions, we revisit the models of security protocols: we show that the symbolic and the computational models (as well as others) are instances of a same generic model. Our definitions are also parametrized by the security primitives, the notion of attacker and, to some extent, the process calculus.

  8. Recursive Ping-Pong Protocols

    Huttel, Hans; Srba, Jiri

    2004-01-01

    This paper introduces a process calculus with recursion which allows us to express an unbounded number of runs of the ping-pong protocols introduced by Dolev and Yao. We study the decidability issues associated with two common approaches to checking security properties, namely reachability analysis...

  9. The Kyoto Protocol and China

    佘巧云

    2005-01-01

    The kyoto Protocol is an agreement to the United Nations Framework Convention on CLimate Change (UNFCCC)2,an international treaty on global warming .It is a legally binding agreement under which industrialized countries will reduce their collective emissions of greenhouse gases by an average of 5.2% compared to the level of 1990 during the 2008-12 period.

  10. Kyoto protocol on climate change

    This article reports a short overview of main points of Kyoto protocol to United Nations Framework Convention on climate Change and of some options still to be defined, evolutions of Italian emissions with respect to other European countries, check of decree by inter ministerial committee on economic planning on national plan to reduce emissions

  11. Performance Evaluation of Security Protocols

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele;

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of...... possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  12. Performance Evaluation of Security Protocols

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele; Degano, Pierpablo; Nielson, Flemming; Nielson, Hanne Riis; Priami, Corrado

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of...

  13. Petri Nets in Cryptographic Protocols

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...

  14. Protocol biopsies for renal transplantation

    Rush David

    2010-01-01

    Full Text Available Protocol biopsies in renal transplantation are those that are procured at predetermined times post renal transplantation, regardless of renal function. These biopsies have been useful to study the natural history of the transplanted kidney as they have detected unexpected - i.e. "subclinical" pathology. The most significant subclinical pathologies that have been detected with protocol biopsies have been acute lesions, such as cellular and antibody mediated rejection, and chronic lesions, such as interstitial fibrosis and tubular atrophy, and transplant glomerulopathy. The potential benefit of early recognition of the above lesions is that their early treatment may result in improved long-term outcomes. Conversely, the identification of normal histology on a protocol biopsy, may inform us about the safety of reduction in overall immunosuppression. Our centre, as well as others, is attempting to develop non-invasive methods of immune monitoring of renal transplant patients. However, we believe that until such methods have been developed and validated, the protocol biopsy will remain an indispensable tool for the complete care of renal transplant patients.

  15. Improved Secure Address Resolution Protocol

    Abhishek Samvedi; Sparsh Owlak; Vijay Kumar Chaurasia

    2014-01-01

    In this paper, an improved secure address resolution protocol is presented where ARP spoofing attack is prevented. The proposed methodology is a centralised methodology for preventing ARP spoofing attack. In the proposed model there is a central server on a network or subnet which prevents ARP spoofing attack.

  16. Energy-efficient Hybrid Key Management Protocol for Wireless Sensor Networks

    Tim Landstra

    2009-09-01

    Full Text Available In this paper, an energy-efficient hybrid key management (EHKM protocol is proposed in which the heterogeneous security requirements of a wireless sensor network are considered to provide differing levels of security with minimum communication overhead. Additionally, it allows the dynamic creation of high security subnetworks within the wireless sensor network and provides subnetworks with a mechanism for dynamically creating a secure key using a novel and dynamic group key management protocol. The proposed energy-efficient protocol utilizes a combination of pre-deployed group keys and initial trustworthiness of nodes to create a level of trust between neighbors in the network. This trust is later used to allow secure communication between neighbors when creating a dynamic, high security subnetwork within the sensor network. This static and dynamic key management combination creates a hybrid key management protocol. Analysis of the proposed protocol with network and cluster sizes and different node failures is performed using the Ns2 network simulator. Additionally, the protocol is compared to other protocols, for example LEAP and a recent dynamic group key management protocol. Additionally, the security of the proposed protocol is analyzed against various attacks by an adversary. Also the overhead due to communication and computation is investigated.

  17. Session Initiation Protocol Attacks and Challenges

    Keshavarz, Hassan; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.

  18. How to write a protocol: part 2.

    Thomas, Kathy; Farrell, Mary Beth

    2015-03-01

    Clinical protocols play an important role in the provision of high-quality care in nuclear medicine. Properly written protocols help to ensure that nuclear medicine procedures are performed in a standardized, reproducible manner so that patients receive high-quality care. The following article is the second in a 2-part series on how to write a protocol. A framework for composing protocols and the components of clinical imaging protocols were detailed in the first article. This article details the framework and components of protocols for cardiac stress testing, therapy, and quality control. PMID:25655345

  19. Novel analysis and improvement of Yahalom protocol

    CHEN Chun-ling; YU Han; L(U) Heng-shan; WANG Ru-chuan

    2009-01-01

    The modified version of Yahalom protocol improved by Burrows, Abradi, and Needham (BAN) still has security drawbacks. This study analyzed such flaws in a detailed way from the point of strand spaces, which is a novel method of analyzing protocol's security. First, a mathematical model of BAN-Yahalom protocol is constructed. Second, penetrators' abilities are restricted with a rigorous and formalized definition. Moreover, to increase the security of this protocol against potential attackers in practice, a further improvement is made to the protocol. Future application of this re-improved protocol is also discussed.

  20. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  1. Proposed quality control protocol of a dual energy bone densitometer from Spanish protocol for quality control of radiology

    In this paper we propose additional testing to complete the tests by the Spanish Protocol for Quality Control of Diagnostic Radiology, taking into account the particular characteristics of these units, and including these tests in the estimation of patient dose dose assessment area. There is also the possibility to independently verify the quality control tests that are done automatically.

  2. Protocol Additional to the Agreement between the Republic of Austria, the Kingdom of Belgium, the Kingdom of Denmark, the Republic of Finland, the Federal Republic of Germany, the Hellenic Republic, Ireland, the Italian Republic, the Grand Duchy of Luxembourg, the Kingdom of The Netherlands, the Portuguese Republic, the Kingdom of Spain, the Kingdom of Sweden, the European Atomic Energy Community and the International Atomic Energy Agency in implementation of Article III, (1) and (4) of the Treaty on the Non-Proliferation of Nuclear Weapons. Accession of the Czech Republic

    Protocol Additional to the Agreement between the Republic of Austria, the Kingdom of Belgium, the Kingdom of Denmark, the Republic of Finland, the Federal Republic of Germany, the Hellenic Republic, Ireland, the Italian Republic, the Grand Duchy of Luxembourg, the Kingdom of The Netherlands, the Portuguese Republic, the Kingdom of Spain, the Kingdom of Sweden, the European Atomic Energy Community and the International Atomic Energy Agency in implementation of Article III, (1) and (4) of the Treaty on the Non-Proliferation of Nuclear Weapons. Accession of the Czech Republic

  3. KoralQuery -- A General Corpus Query Protocol

    Bingel, Joachim; Diewald, Nils

    The task-oriented and format-driven development of corpus query systems has led to the creation of numerous corpus query languages (QLs) that vary strongly in expressiveness and syntax. This is a severe impediment for the interoperability of corpus analysis systems, which lack a common protocol. In...... this paper, we present KoralQuery, a JSON-LD based general corpus query protocol, aiming to be independent of particular QLs, tasks and corpus formats. In addition to describing the system of types and operations that KoralQuery is built on, we exemplify the representation of corpus queries in the...

  4. SECURING VIRTUAL IMAGES USING BLIND AUTHENTICATION PROTOCOL

    RAVIKIRAN PEELUKHANA,

    2011-04-01

    Full Text Available The cloud virtualization technology improves the economy of scale for data centers through server consolidation, application consolidation and resources consolidation. Virtualization allows the provider to move Virtual Images from more congested host to less-congested hosts, as required. Enterprises also get improved server reliability, which in turn increases application performance. Despite these benefits, it includes major security challenges with the portability of Virtual Images between different cloud providers.The security and integrity of Virtual images is the foundation for the overall security of the cloud. Many of the Virtual images are intended to be shared by diverse and unrelated users. Unfortunately, existing approaches to cloud security built by cloud practitioners fall short when dealing with Virtual images. Secure transmission of virtual Images can bepossible by providing authentication using Blind Authentication protocol (BAP. The proposed approach authenticates the allocation of virtual images using Blind authentication protocol. It provides provable protection against replay and client side attacks even if the keys of the user are compromised. The encryption also provides template protection, revocability and alleviates the concerns on privacy in widespread use of biometrics. Carrying out the authentication in the encrypted domain is a secure process, while the encryption key acts as an additional layer of security.

  5. Separable states improve protocols with finite randomness

    It is known from Bell's theorem that quantum predictions for some entangled states cannot be mimicked using local hidden variable (LHV) models. From a computer science perspective, LHV models may be interpreted as classical computers operating on a potentially infinite number of correlated bits originating from a common source. As such, Bell inequality violations achieved through entangled states are able to characterize the quantum advantage of certain tasks, so long as the task itself imposes no restriction on the availability of correlated bits. However, if the number of shared bits is limited, additional constraints are placed on the possible LHV models, and separable, i.e. disentangled states may become a useful resource. Bell violations are therefore no longer necessary to achieve a quantum advantage. Here we show that, in particular, separable states improve the so-called random access codes, which is a class of communication problem wherein one party tries to read a portion of the data held by another distant party in the presence of finite shared randomness and limited classical communication. We also show how the bias of classical bits can be used to avoid wrong answers in order to achieve the optimal classical protocol and how the advantage of quantum protocols is linked to quantum discord. (paper)

  6. Energy Efficiency and Emissions Trading. A PEEREA perspective after the entry into force of the Kyoto Protocol and of the EU ETS

    The year 2005 was of particular importance for the climate change discussions. The Kyoto Protocol entered into force in February, following the Russian ratification. At the same time, the largest emission-trading scheme for CO2, the EU ETS came into operation. By the end of the year the first Meeting of the Parties to the UNFCCC took place in Montreal. The PEEREA Group discussed on several occasions the contribution of the Kyoto flexible mechanisms to boosting energy efficiency improvements. The role of energy efficiency projects in achieving climate change objectives was equally underlined. In 2004 a report was elaborated and subsequently printed on Carbon Trading and Energy Efficiency, with the understanding that the PEEREA Group will revisit the subject in order to reflect on new developments in this area. This paper, prepared by the Secretariat with the consultancy support of EcoSecurities, served the discussion and debate in the PEEREA Group on the latest developments and opportunities for energy efficiency in the climate change process. The paper provides only a brief introduction of the main concepts, as they were presented and discussed in the 2004 report. The focus is now on the operation of the EU ETS and on the implications for both EU and non EU PEEREA countries of the Linking Directive on the use of JI/CDM mechanisms in relation to improving energy efficiency

  7. Design for Additive Manufacturing

    Bertran Comellas, Martí

    2012-01-01

    This Thesis, Design for Additive Manufacturing, has been mainly focused on the design process and the considerations to be taken into account when designing parts for Additive Manufacturing. It starts with an introduction to Additive Manufacturing, the different technologies and processes are described to let the readers understand their operating principle, materials used and their strengths and weaknesses. The applications of Additive manufacturing are also explained in the introductory ...

  8. Automated addition of Chelex solution to tubes containing trace items

    Stangegaard, Michael; Hansen, Thomas Møller; Hansen, Anders Johannes; Morling, Niels

    2011-01-01

    Extraction of DNA from trace items for forensic genetic DNA typing using a manual Chelex based extraction protocol requires addition of Chelex solution to sample tubes containing trace items. Automated of addition of Chelex solution may be hampered by high viscosity of the solution and fast...

  9. Neonatal euthanasia: The Groningen Protocol*

    Vizcarrondo, Felipe E.

    2014-01-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criteria are not based on firm moral principles. The taking of the life of a seriously ill person is not the solution to the pain and suffering of the dying process. It is the role of the medical professional to care for the ailing patient with love and compassion, always preserving the person's dignity. Neonatal euthanasia is not ethically permissible. PMID:25473136

  10. Neonatal euthanasia: The Groningen Protocol.

    Vizcarrondo, Felipe E

    2014-11-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criteria are not based on firm moral principles. The taking of the life of a seriously ill person is not the solution to the pain and suffering of the dying process. It is the role of the medical professional to care for the ailing patient with love and compassion, always preserving the person's dignity. Neonatal euthanasia is not ethically permissible. PMID:25473136

  11. Chapter 14: Chiller Evaluation Protocol

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  12. Kyoto: protocol on climate protection

    At the 3rd Conference of the Signatory States to the United Nations Climate Framework Convention held in Kyoto, the so-called Kyoto Protocol on the UN Climate Framework Convention was adopted unanimously, after two years of difficult and complex negotiations, on December 11, 1997. The protocol for the first time includes legally binding obligations for the industrialized countries requiring them to reduce their greenhouse gas emissions between 2008 and 2012 by a total of 5.2% relative to the 1990 level. In meeting this obligation, the industrialized countries assumed different levels of reduction and limitation, respectively. Thus, e.g., the EU countries accepted a Communitywide reduction by 8%, while the USA is obliged to reduce by 7% and Japan by 6%. (orig.)

  13. Superposition Attacks on Cryptographic Protocols

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus;

    2011-01-01

    information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security of...... string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...... several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  14. Analysis of the Similarities and Differences between MPLS Label Distribution Protocols RSVP and CR-LDP

    Muhammad Asif

    2012-01-01

    Full Text Available MPLS is a new technology that offers to open up the Internet by providing many additional services to applications using IP. MPLS forwards data using labels that are attached to each data packet. These labels must be distributed between the nodes that comprise the network. Many of the new services that ISPs want to offer rely on Traffic Engineering functions. There are currently two label distribution protocols that provide support for Traffic Engineering: Resource ReSerVation Protocol (RSVP and Constraint-based Routed Label Distribution Protocol (CR-LDP. Although the two protocols provide a similar level of service, the way they operate is different, and the detailed function they offer is also not consistent. Hardware vendors and network providers need clear information to help them decide which protocol to implement in a Traffic Engineered MPLS network. Each protocol has its champions and detractors, and the specifications are still under development. Recognizing that the choice of label distribution protocol is crucial for the success of device manufacturers and network providers; this White Paper explains the similarities and important differences between the two protocols, to help identify which protocol is the right one to use in a particular environment. Data Connection€™s DC-MPLS family of portable MPLS products offers solutions for both the RSVP and CR-LDP label distribution protocols.

  15. How to write a protocol: part 1.

    Thomas, Kathy; Farrell, Mary Beth

    2015-03-01

    Clinical imaging protocols play an important role in the provision of high-quality care in nuclear medicine. It is imperative that all nuclear medicine facilities have protocols for every procedure performed. However, creating protocols that are detailed, unambiguous, and consistent is often easier said than done. Properly written protocols help to ensure that nuclear medicine procedures are performed in a standardized, reproducible manner so that patients receive high-quality care. This 2-part article provides technologists with a framework for composing comprehensive protocols. Part 1 discusses the secrets to successfully composing protocols ensuring they are detailed and step-by-step along with the importance of basing protocols on evidence from published guidelines and peer-reviewed literature. The components and important aspects of clinical imaging protocols are detailed. PMID:25613336

  16. DSTC Layering Protocols in Wireless Cooperative Networks

    Elamvazhuthi, P S; Dey, B K

    2008-01-01

    In adhoc wireless relay networks, layers of relays are used to communicate from a source to a destination to achieve better reliability. In this paper, we consider five protocols derived from an earlier proposed protocol, where the relays do a simple processing before transmitting and as a result achieve distributed space-time code. Four of the protocols discussed utilize more complicated relaying schemes than simple layered protocols proposed in earlier literature. We have analyzed the effectiveness of these protocols in various power loss configurations among the paths. Optimum power allocation of the total power among various transmissions have been found by reasonable fine search for all the protocols. Bit error rate plots are compared under optimum power allocation for these protocols. From the simulation results, we draw some guidelines as to which protocol is good for what kind of environment.

  17. Automatic analysis of distance bounding protocols

    Malladi, Sreekanth; Kothapalli, Kishore

    2010-01-01

    Distance bounding protocols are used by nodes in wireless networks to calculate upper bounds on their distances to other nodes. However, dishonest nodes in the network can turn the calculations both illegitimate and inaccurate when they participate in protocol executions. It is important to analyze protocols for the possibility of such violations. Past efforts to analyze distance bounding protocols have only been manual. However, automated approaches are important since they are quite likely to find flaws that manual approaches cannot, as witnessed in literature for analysis pertaining to key establishment protocols. In this paper, we use the constraint solver tool to automatically analyze distance bounding protocols. We first formulate a new trace property called Secure Distance Bounding (SDB) that protocol executions must satisfy. We then classify the scenarios in which these protocols can operate considering the (dis)honesty of nodes and location of the attacker in the network. Finally, we extend the const...

  18. A student teamwork induction protocol

    Kamau, Caroline; Spong, A.

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in HE. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group contract) designed to minimize social loafing, optimize coordination (by boosting good information sampling) and orient group dynamics towards the task. In the absen...

  19. Building America House Simulation Protocols

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  20. Heuristic Methods for Security Protocols

    Qurat ul Ain Nizamani; Emilio Tuosto

    2009-01-01

    Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.

  1. Analysing Protocol Stacks for Services

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial standa...... financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  2. Feasible quantum communication complexity protocol

    I show that a simple multiparty communication task can be performed more efficiently with quantum communication than with classical communication, even with low detection efficiency η. The task is a communication complexity problem in which distant parties need to compute a function of the distributed inputs, while minimizing the amount of communication between them. A realistic quantum optical setup is suggested that can demonstrate a five-party quantum protocol with higher-than-classical performance, provided η>0.33

  3. Power Control Protocols in VANET

    Samara, Ghassan; Salem, Amer O. Abu; Alhmiedat, Tareq

    2013-01-01

    Vehicular Ad hoc Networks (VANET) is one of the most challenging research area in the field of the Mobile Ad hoc Network (MANET), Power control is a critical issue in VANETwhere is should be managed carefully to help the channel to have high performance. In this paper a comparative study in the published protocols in the field of safety message dynamic power control will be presented and evaluated.

  4. Bounding Component Behavior via Protocols

    Plášil, František; Višňovský, Stanislav; Besta, Miloslav

    Los Alamitos : IEEE Computer Society, 1999 - (Firesmith, D.; Riehle, R.; Pour, G.; Meyer, B.), s. 387-398 ISBN 0-7695-0278-4. [TOOLS /30./. Santa Barbara (US), 01.08.1999-05.08.1999] R&D Projects: GA AV ČR IAA2030902; GA ČR GA201/99/0244 Institutional research plan: AV0Z1030915 Keywords : software components * behavior protocols * software architecture Subject RIV: JC - Computer Hardware ; Software

  5. Security Protocol for Active Networks

    Cheng, L.; Galis, A.

    2006-01-01

    Active packets carrying management and control code have a dynamic nature and support dynamic routing. Thus, active packets must be protected in an end-to-end and hop-to-hop fashion. In this paper, we present a novel approach, known as security protocol for active networks (SPAN), which enables an active packet to be securely transmitted during (instead of after) Security Association (SA) and management negotiations along a new execution path

  6. TWO PRIVACY-PRESERVING PROTOCOLS FOR POINT-CURVE RELATION

    Liu Liang; Wu Chunying; Li Shundong

    2012-01-01

    Numerous privacy-preserving issues have emerged along with the fast development of Internet,both in theory and in real-life applications.To settle the privacy-preserving problems,secure multi-party computation is essential and critical.In this paper,we have solved two problems regarding to how to determine the position relation between points and curves without revealing any private information.Two protocols have been proposed in order to solve the problems in different conditions.In addition,some building blocks have been developed,such as scalar product protocol,so that we can take advantage of them to settle the privacy-preserving computational geometry problems which are a kind of special secure multi-party computation problems.Moreover,oblivious transfer and power series expansion serve as significant parts in our protocols.Analyses and proofs have also been given to argue our conclusion.

  7. Wireless Plug and Play Control Systems: Hardware, Networks, and Protocols

    Meybodi, Soroush Afkhami

    2012-01-01

    protocols that can fulfill the stringent requirements of P3C case studies in general. In this part, after a thorough review of available Access and Routing protocols in industrial wireless networks, a combination of a deterministic Medium Access Control (MAC) protocol and a clustered flooding-based routing...... accordance with the control topology. Functionality of the new routing metric is verified by simulations within a flooding-based routing algorithm. The results of this research project create a clear and concise interface for the other work packages of P3C which are concluded earlier.......This dissertation reports the result of efforts to identify and solve the problems that arise when a control system is to be designed for various industrial case studies of the Plug and Play Process Control (P3C) project that require autonomous addition/removal of sensors, actuators and subsystems...

  8. ACSEPP On-Line Electronic Payment Protocol

    WANG Shao-bin; ZHU Xian; HONG Fan

    2004-01-01

    With analyzing the existing on-line electronic payment protocols, this paper presents a new on-line electronic payment protocol named ACSEPP: Anonymous, Convenient and Secure Electronic Payment Protocol.Its aim is to design a practical electronic payment protocol which is both secure and convenient.Without using PKI_CA frame, it realized the anonymity of consumer and merchant, the convenient of handling, the low cost of maintenance and the security.

  9. A father protocol for quantum broadcast channels

    Dupuis, F; Dupuis, Fr\\'ed\\'eric; Hayden, Patrick

    2006-01-01

    We present a new protocol for quantum broadcast channels based on the fully quantum Slepian-Wolf protocol. The protocol yields an achievable rate region for entanglement-assisted transmission of quantum information through a quantum broadcast channel that can be considered the quantum analogue of Marton's region for classical broadcast channels. The protocol can be adapted to yield achievable rate regions for unassisted quantum communication and for entanglement-assisted classical communication. Regularized versions of all three rate regions are provably optimal.

  10. Component versioning for protocol configuration management

    CHEN Tian-zhou; HE Zhen-jie; HUANG Jiang-wei; DAI Hong-jun

    2005-01-01

    Classical software configuration management which deals with source code versioning becomes insufficient when most components are distributed in binary form. As an important aspect of software configuration, protocol configuration also encounters those problems. This paper focuses on solving protocol component versioning issues for protocol configuration management on embedded system, incorporating the following versioning issues: version identification, version description and protocol component archiving and retrieving based on the version library.

  11. Crypto-Verifying Protocol Implementations in ML

    Bhargavan, K.; Corin, R.J.; Fournet, C.

    2007-01-01

    We intend to narrow the gap between concrete implementations and verified models of cryptographic protocols. We consider protocols implemented in F#, a variant of ML, and verified using CryptoVerif, Blanchet's protocol verifier for computational cryptography. We experiment with compilers from F# code to CryptoVerif processes, and from CryptoVerif declarations to F# code. We present two case studies: an implementation of the Otway-Rees protocol, and an implementation of a simplified password-b...

  12. Simple and Efficient Contract Signing Protocol

    Alaraj, Abdullah M.

    2012-01-01

    In this paper, a new contract signing protocol is proposed based on the RSA signature scheme. The protocol will allow two parties to sign the same contract and then exchange their digital signatures. The protocol ensures fairness in that it offers parties greater security: either both parties receive each other's signatures or neither does. The protocol is based on offline Trusted Third Party (TTP) that will be brought into play only if one party fails to sign the contract. Otherwise, the TTP...

  13. A father protocol for quantum broadcast channels

    Dupuis, Frédéric; Hayden, Patrick; Li, Ke

    2006-01-01

    A new protocol for quantum broadcast channels based on the fully quantum Slepian-Wolf protocol is presented. The protocol yields an achievable rate region for entanglement-assisted transmission of quantum information through a quantum broadcast channel that can be considered the quantum analogue of Marton's region for classical broadcast channels. The protocol can be adapted to yield achievable rate regions for unassisted quantum communication and for entanglement-assisted classical communica...

  14. Static Validation of a Voting Protocol

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    The desired security properties of electronic voting protocols include verifiability, accuracy, democracy and fairness. In this paper we use a static program analysis tool to validate these properties for one of the classical voting protocols under appropriate assumptions. The protocol is...

  15. Cryptanalysis on Cheng et al. protocol

    Thakur, Tejeshwari

    2016-06-01

    Deployment of new node in any wireless sensor network is a sensitive task. This is the reason why, an Access Control Protocol is required in WSN. In this paper, we demonstrate that Access Control Protocol proposed by Cheng et al.[1] for Wireless Sensor Network is insecure. The reason is that this protocol fails to resist the active attack.

  16. Mean Response Time Approximation for HTTP Transactions over Transport Protocols

    Y. J. Lee

    2014-12-01

    Full Text Available This paper addresses mean response time that end-users experience when using the Internet. HTTP (Hyper Text Transfer Protocol is a widely used transfer protocol to retrieve web objects in the Internet. Generally, HTTP uses TCP (Transmission Control Protocol in a transport layer. But it is known that HTTP interacts with TCP inefficiently. As an example of such inefficiencies, HTTP does not require TCP to deliver the rigid order, which may cause head-of-line blocking. As another transport layer protocol, SCTP (Stream Control Transmission Protocol has attractive features such as multi-streaming and multi-homing unlike TCP. Within an SCTP association, multi-streaming allows for independent delivery among streams, thus can avoid the head-of-line blocking. In addition, SCTP provides very large number of streams; therefore, it can transfer multiple objects more efficiently than the typical HTTP/1.1 over TCP which limits the number of pipelines. Mean response time is one of the main measures that end users using Internet concern. This paper presents the simple analytical model and algorithm to find the mean response time for HTTP over SCTP including the previous HTTP over TCP. Some computational experiences show that the proposed model and algorithm are well approximated to the real environment. Also, it is shown that mean response time for HTTP over SCTP can be less than that for HTTP over TCP.

  17. Cognitive Radio MAC Protocol for WLAN

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    but opportunistically access any other under-utilized licensed spectrum without a license. The application scenario of C-CSMA/CA is infrastructure BSS (Basic Service Set) WLAN. C-CSMA/CA efficiently exploits the inherent characteristics of CSMA/CA to design distributed cooperative outband sensing to...... explore spectrum hole; moreover, it designs dual inband sensing scheme to detect primary user appearance. Additionally, C-CSMA/CA has the advantage to effectively solve the cognitive radio self-coexistence issues in the overlapping CR BSSs scenario. It also realizes station-based dynamic resource......To solve the performance degradation issue in current WLAN caused by the crowded unlicensed spectrum, we propose a cognitive radio (CR) media access protocol, C-CSMA/CA. The basic idea is that with cognitive radio techniques the WLAN devices can not only access the legacy WLAN unlicensed spectrum...

  18. New dimensions in SNMP Protocol in Romania

    Alice Nastovici

    2009-06-01

    Full Text Available In this year 2009, after e-finance shock made in each banks who worked with Simple NetworkManagement Protocol (SNMP default community string and vulnerability:- If you do not absolutely require SNMP, disable it- If you must use SNMP, use the same policy for community names as used for passwords.Make sure that they are difficult to guess or crack and that they are chanced periodically- Validate and check community names using SNMPwalk. Additional information can be foundat http://www.2nd.com/functionSNMPwalk.php- Filter SNMP (port 161/udp at the border-router or firewall unless it is absolutely necessary topool or manage devices from outside of the local network, where possible read-only

  19. Low-cost, low-input RNA-seq protocols perform nearly as well as high-input protocols

    Peter A. Combs

    2015-03-01

    Full Text Available Recently, a number of protocols extending RNA-sequencing to the single-cell regime have been published. However, we were concerned that the additional steps to deal with such minute quantities of input sample would introduce serious biases that would make analysis of the data using existing approaches invalid. In this study, we performed a critical evaluation of several of these low-volume RNA-seq protocols, and found that they performed slightly less well in per-gene linearity of response, but with at least two orders of magnitude less sample required. We also explored a simple modification to one of these protocols that, for many samples, reduced the cost of library preparation to approximately $20/sample.

  20. Additives in yoghurt production

    Milna Tudor

    2008-02-01

    Full Text Available In yoghurt production, mainly because of sensory characteristics, different types of additives are used. Each group, and also each substance from the same group has different characteristics and properties. For that reason, for improvement of yoghurt sensory characteristics apart from addition selection, the quantity of the additive is very important. The same substance added in optimal amount improves yoghurt sensory attributes, but too small or too big addition can reduce yoghurt sensory attributes. In this paper, characteristics and properties of mostly used additives in yoghurt production are described; skimmed milk powder, whey powder, concentrated whey powder, sugars and artificial sweeteners, fruits, stabilizers, casein powder, inulin and vitamins. Also the impact of each additive on sensory and physical properties of yoghurt, syneresis and viscosity, are described, depending on used amount added in yoghurt production.

  1. Additive usage levels.

    Langlais, R

    1996-01-01

    With the adoption of the European Parliament and Council Directives on sweeteners, colours and miscellaneous additives the Commission is now embarking on the project of coordinating the activities of the European Union Member States in the collection of the data that are to make up the report on food additive intake requested by the European Parliament. This presentation looks at the inventory of available sources on additive use levels and concludes that for the time being national legislation is still the best source of information considering that the directives have yet to be transposed into national legislation. Furthermore, this presentation covers the correlation of the food categories as found in the additives directives with those used by national consumption surveys and finds that in a number of instances this correlation still leaves a lot to be desired. The intake of additives via food ingestion and the intake of substances which are chemically identical to additives but which occur naturally in fruits and vegetables is found in a number of cases to be higher than the intake of additives added during the manufacture of foodstuffs. While the difficulties are recognized in contributing to the compilation of food additive intake data, industry as a whole, i.e. the food manufacturing and food additive manufacturing industries, are confident that in a concerted effort, use data on food additives by industry can be made available. Lastly, the paper points out that with the transportation of the additives directives into national legislation and the time by which the food industry will be able to make use of the new food legislative environment several years will still go by; food additives use data by the food industry will thus have to be reviewed at the beginning of the next century. PMID:8792135

  2. Vicarious Michael Addition

    2006-01-01

    C-H bond can undergo vicarious Michael addition reaction (VMA) with doubleactivated double bond in the absence of strong base and catalyst under mild conditions.Intramolecular H-bonding, electron-withdrawing inductive effect, and steric hindrance at aposition of nucleophile facilitates C-H addition over N-H addition. By using VMA, high branching multiplicity, novel branching pattern, controllable density and distribution of functional groups can be envisioned for novel dendrimer synthesis.

  3. Wire + Arc Additive Manufacturing

    Williams, Stewart W.; Martina, Filomeno; Addison, Adrian C.; Ding, Jialuo; Pardal, Goncalo; Colegrove, Paul A.

    2016-01-01

    Depositing large components (>10 kg) in titanium, aluminium, steel and other metals is possible using Wire + Arc Additive Manufacturing. This technology adopts arc welding tools and wire as feedstock for additive manufacturing purposes. High deposition rates, low material and equipment costs, and good structural integrity make Wire+Arc Additive Manufacturing a suitable candidate for replacing the current method of manufacturing from solid billets or large forgings, especially with regards to ...

  4. Simple and Efficient Contract Signing Protocol

    Alaraj, Abdullah M

    2012-01-01

    In this paper, a new contract signing protocol is proposed based on the RSA signature scheme. The protocol will allow two parties to sign the same contract and then exchange their digital signatures. The protocol ensures fairness in that it offers parties greater security: either both parties receive each other's signatures or neither does. The protocol is based on offline Trusted Third Party (TTP) that will be brought into play only if one party fails to sign the contract. Otherwise, the TTP remains inactive. The protocol consists of only three messages that are exchanged between the two parties.

  5. Sequence Patterns of Identity Authentication Protocols

    Tao Hongcai; He Dake

    2006-01-01

    From the viewpoint of protocol sequence, analyses are made of the sequence patterns of possible identity authentication protocol under two cases: with or without the trusted third party (TTP). Ten feasible sequence patterns of authentication protocol with TTP and 5 sequence patterns without TTP are gained. These gained sequence patterns meet the requirements for identity authentication,and basically cover almost all the authentication protocols with TTP and without TTP at present. All of the sequence patterns gained are classified into unilateral or bilateral authentication. Then , according to the sequence symmetry, several good sequence patterns with TTP are evaluated. The accompolished results can provide a reference to design of new identity authentication protocols.

  6. Optimizing One Fair Document Exchange Protocol

    Alaraj, Abdullah M

    2012-01-01

    This paper presents an efficient fair document exchange protocol. The exchange of the documents will be between two parties. The protocol is based on the verifiable and recoverable encryption of a document's key. This verifiable and recoverable encryption of the document's key will allow one party to verify the encrypted key. It will also ensure this party that the Semi Trusted Third Party will be able to recover the key if the other party misbehaves. The protocol also incorporates the concept of enforcing the honesty of one party. The proposed protocol consists of only three messages and is more efficient than related protocols.

  7. Vulnerabilities in Quantum Key Distribution Protocols

    Kuhn, D R

    2003-01-01

    Recently proposed quantum key distribution protocols are shown to be vulnerable to a classic man-in-the-middle attack using entangled pairs created by Eve. It appears that the attack could be applied to any protocol that relies on manipulation and return of entangled qubits to create a shared key. The protocols that are cryptanalyzed in this paper were proven secure with respect to some eavesdropping approaches, and results reported here do not invalidate these proofs. Rather, they suggest that quantum cryptographic protocols, like conventional protocols, may be vulnerable to methods of attack that were not envisaged by their designers.

  8. Novel Ω-protocols for NP

    2008-01-01

    Ω-protocols, introduced by Garay, Mackenzie and Yang, is a variant of S-protocols with online extractor which is a useful tool to overcome the nest effect in concurrent scenario. In this work, we construct an Ω-protocol for Hamiltonian cycle problem, and therefore, it allows us to present Ω-protocol for any NP relation. For most general NP relations, our construction of Ω-protocols is much more efficient than the informal one described by Garay et al. and we believe that the method for our construction may be of independent interest.

  9. Developing security protocols in χ-Spaces

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    an implementation of SPL (Security Protocol Language), a formal model for studying security protocols. In this paper we discuss the use of χ-Spaces as a tool for developing robust security protocol implementations. To make the case, we take a family of key-translation protocols due to Woo and Lam and......It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...... of formal protocol verification. Verification, however, is usually carried out on an abstract model not at all related with a protocol’s implementation. Experience shows that security breaches introduced in implementations of successfully verified models are rather common. The χ-Spaces framework is...

  10. Desynchronization Attacks on RFID Security Protocols

    Miaolei Deng

    2013-02-01

    Full Text Available The characteristics of radio frequency identification (RFID systems introduce growing security and privacy concerns. RFID systems need security protocols to provide confidentiality, user privacy, mutual authentication and etc. Many security protocols for the RFID system have been presented. This paper analyze several of the newest RFID security protocols which proposed by Niu et al., Fu et al. and Habibi et al. respectively form the security viewpoint of data desynchronization attack. These lightweight protocols were expected to proposed security protections for the RFID system and safeguard against almost all major attacks. However, we found that these RFID security protocols were vulnerable to the attack of data desynchronization. Based on strand spaces model, data desynchronization attacks on these protocols were analyzed and described. Furthermore, improvements to overcome the security vulnerabilities of two protocols presented by Niu et al. and Fu et al. were given.

  11. Language, Semantics, and Methods for Security Protocols

    Crazzolara, Federico

    Security protocols help in establishing secure channels between communicating systems. Great care needs therefore to be taken in developing and implementing robust protocols. The complexity of security-protocol interactions can hide, however, security weaknesses that only a formal analysis can...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...... representation and do not address how to build up protocol representations in a compositional fashion. This dissertation presents a new, event-based approach to reasoning about security protocols. We seek a broader class of models to show how event-based models can be structured in a compositional way and so...

  12. Authenticating Tripartite Key Agreement Protocol with Pairings

    Sheng-Li Liu; Fang-Guo Zhang; Ke-Fei Chen

    2004-01-01

    In this paper, an authenticated tripartite key agreement protocol is proposed, which is an ID-based one with pairings. This protocol involves only one round. The authenticity of the protocol is assured by a special signature scheme, so that messages carrying the information of two ephemeral keys can be broadcasted authentically by an entity. Consequently, one instance of the protocol results in eight session keys for three entities. In other word, one instance of the protocol generates a session key, which is eight times longer than those obtained from traditional key agreement protocols. Security attributes of the protocol are presented, and the computational overhead and bandwidth of the broadcast messages are analyzed as well.

  13. Generalized routing protocols for multihop relay networks

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  14. Planetary Protection Alternate Protocol Certification

    Baker, Amy; Barengoltz, Jack; Tisdale, David

    The talk presents a standardized approach for new method certification or alterative testing protocol (ATP) certification against the existing U.S. Planetary Protection Standards. In consideration of new method certification there are two phases of activities that are relevant to the certification process. The first is sample acquisition which typically incorporates swab or wipes sampling on relevant hardware, associated facilities and ground support equipment. The sampling methods introduce considerations of field sampling efficiency as it relates to spore distribution on the spacecraft, spacecraft material influences on the ability of the swab or wipe to remove spores from the hardware, the types of swabs and wipes used (polyester, cotton, macrofoam), and human sampling influences. The second portion of a new protocol certification looks specifically at the lab work-up or analysis of the samples provided to the laboratory. Variables in this process include selection of appropriate biomarkers, extraction efficiencies (removal of spores or constituents of interest from the sampling device), and a method's ability to accurately determine the number of spores present in the sample with a statistically valid level of confidence as described by parameters such as precision, accuracy, robustness, specificity and sensitivity. Considerations for alternative testing protocols such as those which utilize bioburden reduction techniques include selection of appropriate biomarkers for testing, test materials and a defined statistical approach that provides sufficient scientific data to support the modification of an existing NASA specification or the generation of a new NASA specification. Synergies between the U.S. and European Space Agency approaches will also be discussed.

  15. Protocols for calibrating multibeam sonar

    Foote, Kenneth G.; Chu, Dezhang; Hammar, Terence R.; Baldwin, Kenneth C.; Mayer, Larry A.; Hufnagle, Lawrence C. jr.; Jech, J. Michael

    2005-01-01

    Development of protocols for calibrating multibeam sonar by means of the standard-target method is documented. Particular systems used in the development work included three that provide the water-column signals, namely the SIMRAD SM2000/90- and 200-kHz sonars and RESON SeaBat 8101 sonar, with operating frequency of 240 kHz. Two facilities were instrumented specifically for the work: a sea well at the Woods Hole Oceanographic Institution and a large, indoor freshwater tank at the University o...

  16. Optical protocols for terabit networks

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  17. Research on Container Behaviors Protocol

    2006-01-01

    With the development of middleware technology, there are some new features to be adopted on demand in middleware platform based on container component. Aiming at the adaptation of middleware platform, from the nature of component container, this paper begins with behaviors features of EJB (Enterprise Java Bean) container, extracts general behaviors protocol of container, and defines its formal behaviors specification. In the end, the interactive relationship of components is described by WRIGHT language, and the configuration of whole system is shown. The method proposed in this paper mines the hidden features of framework of component container, and applies to refactor middleware platform in reflection and aspect-oriented programming technology.

  18. Secure E-Commerce Protocol

    Khalid Haseeb, Muhammad Arshad, Shoukat Ali, Shazia Yasin

    2011-04-01

    Full Text Available E-commerce has presented a new way of doing business all over the world using internet.Organizations have changed their way of doing business from a traditional approach to embrace ecommerceprocesses. As individuals and businesses increase information sharing, a concernregarding the exchange of money securely and conveniently over the internet increases. Therefore,security is a necessity in an e-commerce transaction. The purpose of this paper is to present atoken based Secure E-commerce Protocol. The purpose of this paper is to present a paradigm thatis capable of satisfying security objectives by using token based security mechanism.

  19. NEURAPRO-E study protocol

    Markulev, Connie; McGorry, Patrick D; Nelson, Barnaby;

    2016-01-01

    response to omega-3 PUFA treatment in the UHR group. CONCLUSION: This is the protocol of the NeuraproE study. Utilizing a large sample, results from this study will be important in informing indicated prevention strategies for schizophrenia and other psychotic disorders, which may be the strongest avenue...... polyunsaturated fatty acids (PUFAs), coupled with the falling transition rate in ultra high-risk (UHR) samples, mean that further study of such benign, potentially neuroprotective interventions is clinically and ethically required. Employing a multicentre approach, enabling a large sample size, this study will...

  20. Trust relationships in exchange protocols

    González-Deleito Collell, Nicolás

    2005-01-01

    Les protocoles d'échange d'informations représentent un des grands domaines actuels de recherche en sécurité informatique, et sont entre autres à la base des mécanismes de commerce électronique. Ils sont par exemple nécessaires à la réalisation d'un achat en ligne, à la signature d'un contrat électronique et au courrier électronique recommandé. Dans ces exemples, les échanges d'informations consistent à échanger respectivement un objet électronique contre un paiement, des signatures digitales...

  1. Trypanosoma spp. ring test protocol

    Test material will be chosen by the coordinating lab for incorporation into a proficiency panel after repeated testing by more than one analyst on multiple PCR runs on different days. Test material: suitable test material will be provided. Protocol and laboratory procedures: Each laboratory is allowed to use their own 'in-house' test procedure (SOPs will nevertheless be provided by the respective laboratories for comparison and evaluation). Each PCR should be executed on two separate occasions. Test material used will be coded and sent as a blind panel to the participants. Each participating laboratory will be given a unique set of codes

  2. New Models for Population Protocols

    Michail, Othon

    2010-01-01

    Wireless sensor networks are about to be part of everyday life. Homes and workplaces capable of self-controlling and adapting air-conditioning for different temperature and humidity levels, sleepless forests ready to detect and react in case of a fire, vehicles able to avoid sudden obstacles or possibly able to self-organize routes to avoid congestion, and so on, will probably be commonplace in the very near future. Mobility plays a central role in such systems and so does passive mobility, that is, mobility of the network stemming from the environment itself. The population protocol model was

  3. Protocolized Resuscitation of Burn Patients.

    Cancio, Leopoldo C; Salinas, Jose; Kramer, George C

    2016-10-01

    Fluid resuscitation of burn patients is commonly initiated using modified Brooke or Parkland formula. The fluid infusion rate is titrated up or down hourly to maintain adequate urine output and other endpoints. Over-resuscitation leads to morbid complications. Adherence to paper-based protocols, flow sheets, and clinical practice guidelines is associated with decreased fluid resuscitation volumes and complications. Computerized tools assist providers. Although completely autonomous closed-loop control of resuscitation has been demonstrated in animal models of burn shock, the major advantages of open-loop and decision-support systems are identifying trends, enhancing situational awareness, and encouraging burn team communication. PMID:27600131

  4. Internet protocol television (IPTV) services

    Nuuri, Aminullah

    2011-01-01

    The purpose of this thesis is to know what IPTV is and how the IPTV network architectures work. The role of IPTV is to deliver video, audio and data commonly called triple play services over an IP network. This thesis describes how video on demand (VOD) shows its relation to the IPTV and introduces unicast and multicast services, IPTV protocols such as RTP and RSTP, IPTV set-top box and some other common ways of this particular technology. It also demonstrates how the Sonera IPTV system deliv...

  5. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  6. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Alavalapati Goutham Reddy

    Full Text Available Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  7. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  8. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols. PMID:27163786

  9. Additive and polynomial representations

    Krantz, David H; Suppes, Patrick

    1971-01-01

    Additive and Polynomial Representations deals with major representation theorems in which the qualitative structure is reflected as some polynomial function of one or more numerical functions defined on the basic entities. Examples are additive expressions of a single measure (such as the probability of disjoint events being the sum of their probabilities), and additive expressions of two measures (such as the logarithm of momentum being the sum of log mass and log velocity terms). The book describes the three basic procedures of fundamental measurement as the mathematical pivot, as the utiliz

  10. Use of limited MR protocol (coronal STIR) in the evaluation of patients with hip pain

    To assess the role of a limited MR protocol (coronal STIR) as the initial part of the MR examination in patients with hip pain. Eighty-five patients presenting with hip pain, and normal radiographs of the pelvis, and who underwent our full MR protocol for hips were included retrospectively in the study. The full protocol consists of coronal T1-weighted and short tau inversion-recovery (STIR), and axial T2-weighted sequences. Ninety-three MR examinations were performed. Two radiologists interpreted the STIR (limited) examinations and the full studies separately, masked to each other's findings and to the final diagnosis. Comparison between the two protocols was then undertaken. For both readers, all normal MR examinations on the coronal STIR limited protocol were normal on the full protocol, with an interobserver reliability of 0.96. The STIR protocol was able to detect the presence or absence of an abnormality in 100% of cases (sensitivity). The STIR-only protocol provided a specific diagnosis in only 65% of cases (specificity). A normal coronal STIR study of the hips in patients with hip pain and normal radiographs precludes the need for further pelvic MR sequences. Any abnormality detected on this limited protocol should be further assessed by additional MR sequences. (orig.)

  11. Evaluation and Application of the Strand-Specific Protocol for Next-Generation Sequencing

    Kuo-Wang Tsai

    2015-01-01

    Full Text Available Next-generation sequencing (NGS has become a powerful sequencing tool, applied in a wide range of biological studies. However, the traditional sample preparation protocol for NGS is non-strand-specific (NSS, leading to biased estimates of expression for transcripts overlapped at the antisense strand. Strand-specific (SS protocols have recently been developed. In this study, we prepared the same RNA sample by using the SS and NSS protocols, followed by sequencing with Illumina HiSeq platform. Using real-time quantitative PCR as a standard, we first proved that the SS protocol more precisely estimates gene expressions compared with the NSS protocol, particularly for those overlapped at the antisense strand. In addition, we also showed that the sequence reads from the SS protocol are comparable with those from conventional NSS protocols in many aspects. Finally, we also mapped a fraction of sequence reads back to the antisense strand of the known genes, originally without annotated genes located. Using sequence assembly and PCR validation, we succeeded in identifying and characterizing the novel antisense genes. Our results show that the SS protocol performs more accurately than the traditional NSS protocol and can be applied in future studies.

  12. Model Checking a Byzantine-Fault-Tolerant Self-Stabilizing Protocol for Distributed Clock Synchronization Systems

    Malekpour, Mahyar R.

    2007-01-01

    This report presents the mechanical verification of a simplified model of a rapid Byzantine-fault-tolerant self-stabilizing protocol for distributed clock synchronization systems. This protocol does not rely on any assumptions about the initial state of the system. This protocol tolerates bursts of transient failures, and deterministically converges within a time bound that is a linear function of the self-stabilization period. A simplified model of the protocol is verified using the Symbolic Model Verifier (SMV) [SMV]. The system under study consists of 4 nodes, where at most one of the nodes is assumed to be Byzantine faulty. The model checking effort is focused on verifying correctness of the simplified model of the protocol in the presence of a permanent Byzantine fault as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period. Although model checking results of the simplified model of the protocol confirm the theoretical predictions, these results do not necessarily confirm that the protocol solves the general case of this problem. Modeling challenges of the protocol and the system are addressed. A number of abstractions are utilized in order to reduce the state space. Also, additional innovative state space reduction techniques are introduced that can be used in future verification efforts applied to this and other protocols.

  13. Toward Synthesis, Analysis, and Certification of Security Protocols

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  14. Food Additives and Hyperkinesis

    Wender, Ester H.

    1977-01-01

    The hypothesis that food additives are causally associated with hyperkinesis and learning disabilities in children is reviewed, and available data are summarized. Available from: American Medical Association 535 North Dearborn Street Chicago, Illinois 60610. (JG)

  15. Groups – Additive Notation

    Coghetto Roland

    2015-06-01

    Full Text Available We translate the articles covering group theory already available in the Mizar Mathematical Library from multiplicative into additive notation. We adapt the works of Wojciech A. Trybulec [41, 42, 43] and Artur Korniłowicz [25].

  16. Efficient Cooperative Protocols for Full-Duplex Relaying over Nakagami-m Fading Channels

    Khafagy, Mohammad Galal

    2015-02-24

    In this work, efficient protocols are studied for full-duplex relaying (FDR) with loopback interference over Nakagami-m block fading channels. Recently, a selective decodeand- forward (DF) protocol was proposed for FDR, and was shown to outperform existing protocols in terms of outage over Rayleigh-fading channels. In this work, we propose an incremental selective DF protocol that offers additional power savings, yet yields the same outage performance. We evaluate their outage performance over independent non-identically distributed Nakagami-m fading links, and study their relative performance in terms of the signal-to-noise ratio cumulative distribution function via closed-form expressions. The offered diversity gain is also derived. In addition, we study their performance relative to their half-duplex counterparts, as well as known non-selective FDR protocols. We corroborate our theoretical results with simulation, and confirm that selective cooperation protocols outperform the known non-selective protocols in terms of outage. Finally, we show that depending on the loopback interference level, the proposed protocols can outperform their half-duplex counterparts when high spectral efficiencies are targeted.

  17. Sparse Additive Models

    Ravikumar, Pradeep; Lafferty, John; Liu, Han; Wasserman, Larry

    2007-01-01

    We present a new class of methods for high-dimensional nonparametric regression and classification called sparse additive models (SpAM). Our methods combine ideas from sparse linear modeling and additive nonparametric regression. We derive an algorithm for fitting the models that is practical and effective even when the number of covariates is larger than the sample size. SpAM is closely related to the COSSO model of Lin and Zhang (2006), but decouples smoothing and sparsity, enabling the use...

  18. Additively Manufactured Propulsion System

    Dushku, Matthew; Mueller, Paul

    2012-01-01

    New high-performance, carbon-fiber reinforced polymer material allows additive manufacturing to produce pressure vessels capable of high pressures (thousands of pounds per square inch). This advancement in turn allows integral hybrid propulsion which is revolutionary for both CubeSats and additively-manufactured spacecraft. Hybrid propulsion offers simplicity as compared to bipropellant liquid propulsion, significantly better safety compared to solid or monopropellant hydrazine propulsion, an...

  19. Protocols development for security and privacy of radio frequency identification systems

    Sabbagha, Fatin

    There are benefits to adopting radio frequency identification (RFID) technology, although there are methods of attack that can compromise the system. This research determined how that may happen and what possible solutions can keep that from happening. Protocols were developed to implement better security. In addition, new topologies were developed to handle the problems of the key management. Previously proposed protocols focused on providing mutual authentication and privacy between readers and tags. However, those protocols are still vulnerable to be attacked. These protocols were analyzed and the disadvantages shown for each one. Previous works assumed that the channels between readers and the servers were secure. In the proposed protocols, a compromised reader is considered along with how to prevent tags from being read by that reader. The new protocols provide mutual authentication between readers and tags and, at the same time, remove the compromised reader from the system. Three protocols are proposed. In the first protocol, a mutual authentication is achieved and a compromised reader is not allowed in the network. In the second protocol, the number of times a reader contacts the server is reduced. The third protocol provides authentication and privacy between tags and readers using a trusted third party. The developed topology is implemented using python language and simulates work to check the efficiency regarding the processing time. The three protocols are implemented by writing codes in C language and then compiling them in MSP430. IAR Embedded workbench is used, which is an integrated development environment with the C/C++ compiler to generate a faster code and to debug the microcontroller. In summary, the goal of this research is to find solutions for the problems on previously proposed protocols, handle a compromised reader, and solve key management problems.

  20. RSRP: A Robust Secure Routing Protocol in MANET

    Sinha Ditipriya

    2014-05-01

    Full Text Available In this paper, we propose a novel algorithm RSRP to build a robust secure routing protocol in mobile ad-hoc networks (MANETs. This algorithm is based on some basic schemes such as RSA_CRT for encryption and decryption of messages; CRT for safety key generation, Shamir’s secret sharing principle for generation of secure routes. Those routes which are free from any malicious node and which belong to the set of disjoint routes between a source-destination pair are considered as probable routes. Shamir’s secret sharing principle is applied on those probable routes to obtain secure routes. Finally, most trustworthy and stable route is selected among those secure routes. Selection of the final route depends on some criteria of the nodes present in a route e.g.: battery power, mobility and trust value. In addition, complexity of key generation is reduced to a large extent by using RSA-CRT instead of RSA. In turn, the routing becomes less expensive and most secure and robust one. Performance of this routing protocol is then compared with non-secure routing protocols (AODV and DSR, secure routing scheme using secret sharing, security routing protocol using ZRP and SEAD depending on basic characteristics of these protocols. All such comparisons show that RSRP shows better performance in terms of computational cost, end-to-end delay and packet dropping in presence of malicious nodes in the MANET, keeping the overhead in terms of control packets same as other secure routing protocols.

  1. nPAKE+:A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords

    Zhi-guo Wan; Robert H. Deng; Feng Bao; Bart Preneel; Ming Gu

    2009-01-01

    Although two-party password-authenticated key exchange (PAKE) protocols have been intensively studied in recent years, group PAKE protocols have received little attention. In this paper, we propose a tree-based group PAKE protocol -- nPAKE+ protocol under the setting where each party shares an independent password with a trusted server. The nPAKE+ protocol is a novel combination of the hierarchical key tree structure and the password-based Diffie-Hellman exchange, and hence it achieves substantial gain in computation efficiency. In particular, the computation cost for each client in our protocol is only O(log n). Additionally, the hierarchical feature of nPAKE+ enables every subgroup to obtain its own subgroup key in the end. We also prove the security of our protocol under the random oracle model and the ideal cipher model.

  2. Efficient MAC Protocol for Subcarrier-Wise Rate Adaptation over WLAN

    Sung Won Kim

    2010-01-01

    Full Text Available While bit-loading algorithms over wireless systems have been extensively studied, the development of a protocol which implements bit-loading-based rate adaptation over wireless systems has not been highlighted. The design of such a protocol is not a trivial problem, due to the overhead associated with the feedback information. In this paper, a novel protocol is proposed to provide an efficient way to implement subcarrier-wise rate adaptation in OFDM-based wireless systems. When receiving a Ready-To-Send (RTS packet, the receiver determines the number of bits to be allocated on each subcarrier through channel estimation. This decision is delivered to the sender using an additional OFDM symbol in the Clear-To-Send (CTS packet. That is, bit-allocation over subcarriers is achieved using only one additional OFDM symbol. The protocol enhances the channel efficiency in spite of the overhead of one additional OFDM symbol.

  3. Additive Manufacturing Infrared Inspection

    Gaddy, Darrell

    2014-01-01

    Additive manufacturing is a rapid prototyping technology that allows parts to be built in a series of thin layers from plastic, ceramics, and metallics. Metallic additive manufacturing is an emerging form of rapid prototyping that allows complex structures to be built using various metallic powders. Significant time and cost savings have also been observed using the metallic additive manufacturing compared with traditional techniques. Development of the metallic additive manufacturing technology has advanced significantly over the last decade, although many of the techniques to inspect parts made from these processes have not advanced significantly or have limitations. Several external geometry inspection techniques exist such as Coordinate Measurement Machines (CMM), Laser Scanners, Structured Light Scanning Systems, or even traditional calipers and gages. All of the aforementioned techniques are limited to external geometry and contours or must use a contact probe to inspect limited internal dimensions. This presentation will document the development of a process for real-time dimensional inspection technique and digital quality record of the additive manufacturing process using Infrared camera imaging and processing techniques.

  4. Telomerase Repeated Amplification Protocol (TRAP)

    Mender, Ilgen; Shay, Jerry W.

    2016-01-01

    Telomeres are found at the end of eukaryotic linear chromosomes, and proteins that bind to telomeres protect DNA from being recognized as double-strand breaks thus preventing end-to-end fusions (Griffith et al., 1999). However, due to the end replication problem and other factors such as oxidative damage, the limited life span of cultured cells (Hayflick limit) results in progressive shortening of these protective structures (Hayflick and Moorhead, 1961; Olovnikov, 1973). The ribonucleoprotein enzyme complex telomerase-consisting of a protein catalytic component hTERT and a functional RNA component hTR or hTERC- counteracts telomere shortening by adding telomeric repeats to the end of chromosomes in ~90% of primary human tumors and in some transiently proliferating stem-like cells (Shay and Wright, 1996; Shay and Wright, 2001). This results in continuous proliferation of cells which is a hallmark of cancer. Therefore, telomere biology has a central role in aging, cancer progression/metastasis as well as targeted cancer therapies. There are commonly used methods in telomere biology such as Telomere Restriction Fragment (TRF) (Mender and Shay, 2015b), Telomere Repeat Amplification Protocol (TRAP) and Telomere dysfunction Induced Foci (TIF) analysis (Mender and Shay, 2015a). In this detailed protocol we describe Telomere Repeat Amplification Protocol (TRAP). The TRAP assay is a popular method to determine telomerase activity in mammalian cells and tissue samples (Kim et al., 1994). The TRAP assay includes three steps: extension, amplification, and detection of telomerase products. In the extension step, telomeric repeats are added to the telomerase substrate (which is actually a non telomeric oligonucleotide, TS) by telomerase. In the amplification step, the extension products are amplified by the polymerase chain reaction (PCR) using specific primers (TS upstream primer and ACX downstream primer) and in the detection step, the presence or absence of telomerase is

  5. The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

    Seema Mehla

    2010-05-01

    Full Text Available the Extensible Authentication Protocol (EAP is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. The EAP reauthentication Protocol provides a consistent, methodindependentand low-latency re-authentication. It is extension to current EAP mechanism to support intradomain handoff authentication. This paper analyzed the performance of the EAP re-authentication protocol, andcompared it with that of the EAP-TLS protocol. The result shows that the authentication delay of EAP reauthentication protocol is only twentieth of that in the EAPTLS protocol.

  6. Novel construction of Secure RFID Authentication Protocol

    Shafiqul Abidin

    2014-10-01

    Full Text Available This article proposes an efficient and secure authentication protocol for secure and low-cost RFID systems in random oracles. Security is one of the prime concerns of RFID system. Proposed protocol relies on Elliptic Curve Discrete Logarithm Problem (ECDLP to achieve security. The protocol achieves the most important security goals scalability, anonymity and anti-cloning for RFID system. A password based protocol has vulnerability on fixed password. This can be exploited by threats. In the proposed protocol, there is a provision to change the password of the Tags. Hence the vulnerability can be reduced in an acceptable level. Computation cost is very less as compare to the other protocols.

  7. The Simplest Protocol for Oblivious Transfer

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...

  8. Symmetric cryptographic protocols for extended millionaires' problem

    LI ShunDong; WANG DaoShun; DAI YiQi

    2009-01-01

    Yao's millionaires' problem is a fundamental problem in secure multiparty computation, and its solutions have become building blocks of many secure multiparty computation solutions. Unfortunately,most protocols for millionaires' problem are constructed based on public cryptography, and thus are inefficient. Furthermore, all protocols are designed to solve the basic millionaires' problem, that is,to privately determine which of two natural numbers is greater. If the numbers are real, existing solutions do not directly work. These features limit the extensive application of the existing protocols. This study introduces and refines the first symmetric cryptographic protocol for the basic millionaires' problem, and then extends the symmetric cryptographic protocol to privately determining which of two real numbers is greater, which are called the extended millionaires' problem, and proposes corresponding Constructed based on symmetric cryptography, these protocols are very efficient.

  9. VANET Routing Protocols: Pros and Cons

    Paul, Bijan; Bikas, Md Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol has taken significant attention. So, it is very necessary to identify the pros and cons of routing protocols which can be used for further improvement or development of any new routing protocol. This paper presents the pros and cons of VANET routing protocols for inter vehicle communication.

  10. Summary Report on Unconditionally Secure Protocols

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  11. Additives for the Axe

    2011-01-01

    On May 1,China will begin to ban the production and use of two food additives commonly used to "bleach" flour,benzoyl peroxide and calcium peroxide.The decision was made after 10 years of wrangling between the policy makers,manufacturers,scientists and consumers.The Ministry of Health said in a statement it was applying the ban in response to consumers’ concerns about chemical substances in food,and technical improvements that had made the two additives unnecessary in flour processing.Minister of Health Chen Zhu has also said

  12. From additivity to synergism

    Ritz, Christian; Streibig, Jens Carl

    2014-01-01

    Interest in synergistic or antagonistic effects through mixture experiments has grown immensely over the past two decades, not the least within in pharmacology and toxicology. Several definitions of reference models exist; one commonly used reference model is concentration or dose addition, which...... assumes compounds, when administrated simultaneously, do not interfere with each other at the site of action. We focus on statistical modelling that allows evaluation of dose addition. We will describe several statistical approaches that are suitable for analysis mixture data where synergistic or...

  13. Training parents to implement pediatric feeding protocols.

    Mueller, Michael M; Piazza, Cathleen C; Moore, James W; Kelley, Michael E; Bethke, Stephanie A; Pruett, Angela E; Oberdorff, Amanda J; Layer, Stacy A

    2003-01-01

    Four different multicomponent training packages were evaluated to increase the treatment integrity of parents implementing pediatric feeding protocols. In Study 1 we exposed 3 parents to a training package that consisted of written protocols (baseline), verbal instructions, therapist modeling, and rehearsal training. Results suggested that the package was successful in increasing treatment integrity of the feeding protocols to high levels. Study 2 investigated three different parent-training ...

  14. Formal Support for Standardizing Protocols with State

    Guttman, Joshua D.; Liskov, Moses D.; Ramsdell, John D.; Rowe, Paul D.

    2015-01-01

    Many cryptographic protocols are designed to achieve their goals using only messages passed over an open network. Numerous tools, based on well-understood foundations, exist for the design and analysis of protocols that rely purely on message passing. However, these tools encounter difficulties when faced with protocols that rely on non-local, mutable state to coordinate several local sessions. We adapt one of these tools, {\\cpsa}, to provide automated support for reasoning about state. We us...

  15. Bitcoin-NG: A Scalable Blockchain Protocol

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  16. Faked states attack and quantum cryptography protocols

    Denny, Travis

    2011-01-01

    Leveraging quantum mechanics, cryptographers have devised provably secure key sharing protocols. Despite proving the security in theory, real-world application falls short of the ideal. Last year, cryptanalysts completed an experiment demonstrating a successful eavesdropping attack on commercial quantum key distribution (QKD) systems. This attack exploits a weakness in the typical real-world implementation of quantum cryptosystems. Cryptanalysts have successfully attacked several protocols. In this paper, we examine the Kak quantum cryptography protocol and how it may perform under such attacks.

  17. Security in network environment-network protocols

    Fessl, Jaromír

    2011-01-01

    Work is focused on network protocols features and security characteristics. Overview of protocols is made through all layers of OSI model and by this design structured. For each layer is made summary of interesting facts. Separate chapter is dedicated for VPN and for implementation possibilities of VPN. In chapter Practical problems are reflected most important problems of actual security (from network protocol point of view) concerned on SSL/TLS, SMTP and DNS. Together with security charact...

  18. Security analysis of session initiation protocol

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  19. VULNERABILITIES OF THE SSL/TLS PROTOCOL

    Jelena Ćurguz

    2016-01-01

    This paper analyzes vulnerabilities of the SSL/TLS Handshake protocol, which is responsible for authentication of the parties in the communication and negotiation of security parameters that will be used to protect confidentiality and integrity of the data. It will be analyzed the attacks against the implementation of Handshake protocol, as well as the attacks against the other elements necessary to SSL/TLS protocol to discover security flaws that were exploited, modes of attac...

  20. Security Aspects of Distance-Bounding Protocols

    Onete, Maria Cristina

    2012-01-01

    Authentication protocols, run between a so-called prover and a so-called verifier, enable the verifier to decide whether a prover is legitimate or not. Such protocols enable access control, and are used in e.g.~logistics, public transport, or personal identification. An authentication protocol is considered secure if an adversary cannot impersonate a legitimate prover. Such an adversary may eavesdrop authentication attempts between a legitimate prover and a legitimate verifier, interact with ...