WorldWideScience

Sample records for absolutely secure processing

  1. Secure Processing Lab

    Data.gov (United States)

    Federal Laboratory Consortium — The Secure Processing Lab is the center of excellence for new and novel processing techniques for the formation, calibration and analysis of radar. In addition, this...

  2. Process Expression of Security Automaton

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Security is an essential aspect for mobile systems. Usually, mobile system modeling and its security policies specification are realized in different techniques. So when constructed a mobile system using formal methods it is difficult to verify if the system comply with any given security policies. A method was introduced to express security automata which specifying enforceable security policies as processes in an extended π-calculus. In this extended π-calculus, an exception termination process was introduced, called bad. Any input which violating a security automaton will correspond to a step of transformation of the process that specifying the security automaton to exception termination process. Our method shows that any security automata which specifying enforceable security policies would decide a process in the extended π-calculus.

  3. Absolute regularity and ergodicity of Poisson count processes

    CERN Document Server

    Neumann, Michael H

    2012-01-01

    We consider a class of observation-driven Poisson count processes where the current value of the accompanying intensity process depends on previous values of both processes. We show under a contractive condition that the bivariate process has a unique stationary distribution and that a stationary version of the count process is absolutely regular. Moreover, since the intensities can be written as measurable functionals of the count variables, we conclude that the bivariate process is ergodic. As an important application of these results, we show how a test method previously used in the case of independent Poisson data can be used in the case of Poisson count processes.

  4. Hilbertian sine as an absolute measure of Bayesian inference in ISR, homeland security, medicine, and defense

    Science.gov (United States)

    Jannson, Tomasz; Wang, Wenjian; Hodelin, Juan; Forrester, Thomas; Romanov, Volodymyr; Kostrzewski, Andrew

    2016-05-01

    In this paper, Bayesian Binary Sensing (BBS) is discussed as an effective tool for Bayesian Inference (BI) evaluation in interdisciplinary areas such as ISR (and, C3I), Homeland Security, QC, medicine, defense, and many others. In particular, Hilbertian Sine (HS) as an absolute measure of BI, is introduced, while avoiding relativity of decision threshold identification, as in the case of traditional measures of BI, related to false positives and false negatives.

  5. Process Models for Security Architectures

    Directory of Open Access Journals (Sweden)

    Floarea NASTASE

    2006-01-01

    Full Text Available This paper presents a model for an integrated security system, which can be implemented in any organization. It is based on security-specific standards and taxonomies as ISO 7498-2 and Common Criteria. The functionalities are derived from the classes proposed in the Common Criteria document. In the paper we present the process model for each functionality and also we focus on the specific components.

  6. Secure Inter-Process Communication

    Directory of Open Access Journals (Sweden)

    Valentin Radulescu

    2013-12-01

    Full Text Available This article reveals the necessity in modern distributed systems for authentication of a process running in a distributed system and to provide a secure channel for inter-process communication in which both the client authenticates to the server and the server authenticates to the client. The distributed system is a client-server system based on ENEA LINX inter-process communication framework. Enea LINX is a Linux open source project which allows processes to exchange information between several media channels: shared memory (local process communication, Ethernet (local network inter process communication, TCP/IP (inter process communication through Internet in which nodes are communicating regardless of the underlying media. Because ENEA LINX offers no security mechanism it appears the need for securing the communicating over LINX protocol. Process authentication disables the need for personal authentication of the user and also prevents an attacker from starting a process which will harm the entire system. Besides authentication, using public key combined with symmetric key technologies the secure inter-process communication system must provide integrity and confidentiality.

  7. Process Security in Chemical Engineering Education

    Science.gov (United States)

    Piluso, Cristina; Uygun, Korkut; Huang, Yinlun; Lou, Helen H.

    2005-01-01

    The threats of terrorism have greatly alerted the chemical process industries to assure plant security at all levels: infrastructure-improvement-focused physical security, information-protection-focused cyber security, and design-and-operation-improvement-focused process security. While developing effective plant security methods and technologies…

  8. Dynamic security assessment processing system

    Science.gov (United States)

    Tang, Lei

    The architecture of dynamic security assessment processing system (DSAPS) is proposed to address online dynamic security assessment (DSA) with focus of the dissertation on low-probability, high-consequence events. DSAPS upgrades current online DSA functions and adds new functions to fit into the modern power grid. Trajectory sensitivity analysis is introduced and its applications in power system are reviewed. An index is presented to assess transient voltage dips quantitatively using trajectory sensitivities. Then the framework of anticipatory computing system (ACS) for cascading defense is presented as an important function of DSAPS. ACS addresses various security problems and the uncertainties in cascading outages. Corrective control design is automated to mitigate the system stress in cascading progressions. The corrective controls introduced in the dissertation include corrective security constrained optimal power flow, a two-stage load control for severe under-frequency conditions, and transient stability constrained optimal power flow for cascading outages. With state-of-the-art computing facilities to perform high-speed extended-term time-domain simulation and optimization for large-scale systems, DSAPS/ACS efficiently addresses online DSA for low-probability, high-consequence events, which are not addressed by today's industrial practice. Human interference is reduced in the computationally burdensome analysis.

  9. National Security Technology Incubator Evaluation Process

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  10. Absolutely Secure Communications by Johnson-like Noise and Kirchhoff's Laws

    OpenAIRE

    Kish, Laszlo B.

    2009-01-01

    We survey the most important results and some recent developments about the secure key exchange protocol where the security is based on the Second Law of Thermodynamics and the robustness of classical physical information. We conclude that a classical physical system offers a higher level of control and security during the communication. We also mention some recent attempts inspired by this communicator to create other systems where Alice and Bob do not form an organic single system and/or th...

  11. Absolutely Secure Communications by Johnson-like Noise and Kirchhoff's Laws

    CERN Document Server

    Kish, Laszlo B

    2009-01-01

    We survey the most important results and some recent developments about the secure key exchange protocol where the security is based on the Second Law of Thermodynamics and the robustness of classical physical information. We conclude that a classical physical system offers a higher level of control and security during the communication. We also mention some recent attempts inspired by this communicator to create other systems where Alice and Bob do not form an organic single system and/or the Second Law is irrelevant. It seems philosophically that they cannot be unconditionally secure, however it is yet an open question how to crack them; how can they be best used for conditionally secure communications, and what are the practical implications.

  12. First Dutch Process Control Security Event

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2008-01-01

    Many organisations do not manage the information security of their process control systems (PCS). As risk is increasing, there is an urgent need for publicprivate collaboration against potential cyber crime in this domain.

  13. Surviving security how to integrate people, process, and technology

    CERN Document Server

    Andress, Amanda

    2003-01-01

    WHY DO I NEED SECURITY? Introduction The Importance of an Effective Security Infrastructure People, Process, and Technology What Are You Protecting Against? Types of Attacks Types of Attackers Security as a Competitive Advantage Choosing a Solution Finding Security Employees The Layered Approach UNDERSTANDING REQUIREMENTS AND RISK What Is Risk? Embracing Risk Information Security Risk Assessment Assessing Risk Insurance SECURITY POLICIES AND PROCEDURES Internal Focus Is Key Security Awareness and Education Policy Life Cycle Developing Policies Components of a Security Policy Sample Security Po

  14. A process framework for information security management

    Directory of Open Access Journals (Sweden)

    Knut Haufe

    2016-01-01

    Full Text Available Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization's information security. Key elements of the operation of an ISMS are ISMS processes. However, and in spite of its importance, an ISMS process framework with a description of ISMS processes and their interaction as well as the interaction with other management processes is not available in the literature. Cost benefit analysis of information security investments regarding single measures protecting information and ISMS processes are not in the focus of current research, mostly focused on economics. This article aims to fill this research gap by proposing such an ISMS process framework as the main contribution. Based on a set of agreed upon ISMS processes in existing standards like ISO 27000 series, COBIT and ITIL. Within the framework, identified processes are described and their interaction and interfaces are specified. This framework helps to focus on the operation of the ISMS, instead of focusing on measures and controls. By this, as a main finding, the systemic character of the ISMS consisting of processes and the perception of relevant roles of the ISMS is strengthened.

  15. A process framework for information security management

    Directory of Open Access Journals (Sweden)

    Knut Haufe

    2016-01-01

    Full Text Available Securing sensitive organizational data has become increasingly vital to organizations. An Information Security Management System (ISMS is a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization's information security. Key elements of the operation of an ISMS are ISMS processes. However, and in spite of its importance, an ISMS process framework with a description of ISMS processes and their interaction as well as the interaction with other management processes is not available in the literature. Cost benefit analysis of information security investments regarding single measures protecting information and ISMS processes are not in the focus of current research, mostly focused on economics. This article aims to fill this research gap by proposing such an ISMS process framework as the main contribution. Based on a set of agreed upon ISMS processes in existing standards like ISO 27000 series, COBIT and ITIL. Within the framework, identified processes are described and their interaction and interfaces are specified. This framework helps to focus on the operation of the ISMS, instead of focusing on measures and controls. By this, as a main finding, the systemic character of the ISMS consisting of processes and the perception of relevant roles of the ISMS is strengthened.

  16. Third Dutch Process Security Control Event

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2009-01-01

    On June 4th, 2009, the third Dutch Process Control Security Event took place in Amsterdam. The event, organised by the Dutch National Infrastructure against Cybercrime (NICC), attracted both Dutch process control experts and members of the European SCADA and Control Systems Information Exchange (Eur

  17. Improving industrial process control systems security

    CERN Document Server

    Epting, U; CERN. Geneva. TS Department

    2004-01-01

    System providers are today creating process control systems based on remote connectivity using internet technology, effectively exposing these systems to the same threats as corporate computers. It is becoming increasingly difficult and costly to patch/maintain the technical infrastructure monitoring and control systems to remove these vulnerabilities. A strategy including risk assessment, security policy issues, service level agreements between the IT department and the controls engineering groups must be defined. In addition an increased awareness of IT security in the controls system engineering domain is needed. As consequence of these new factors the control system architectures have to take into account security requirements, that often have an impact on both operational aspects as well as on the project and maintenance cost. Manufacturers of industrial control system equipment do however also propose progressively security related solutions that can be used for our active projects. The paper discusses ...

  18. Security Policy Enforcement Through Refinement Process

    CERN Document Server

    Stouls, Nicolas

    2010-01-01

    In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process. We argue that it is possible to build a formal link between concrete and abstract terms, which can be dynamically computed from the environment data. In order to progressively introduce configuration data and then simplify the proof obligations, we use the B refinement process. We present a case study modeling a network monitor. This program, described by refinement following the layers of the TCP/IP suite protocol, has to warn for all observed events which do not respect the security policy. To design this model, we use the event-B method because it is suitable for modeling network concepts. This work has been done within the framework of the POTESTAT project, based on the research of network testing methods from a high-level security policy.

  19. The absolute chronology and thermal processing of solids in the solar protoplanetary disk

    DEFF Research Database (Denmark)

    Connelly, James Norman; Bizzarro, Martin; Krot, Alexander N.;

    2012-01-01

    Transient heating events that formed calcium-aluminum - rich inclusions (CAIs) and chondrules are fundamental processes in the evolution of the solar protoplanetary disk, but their chronology is not understood. Using U-corrected Pb-Pb dating, we determined absolute ages of individual CAIs...

  20. STANDARDIZING TYPE Ia SUPERNOVA ABSOLUTE MAGNITUDES USING GAUSSIAN PROCESS DATA REGRESSION

    Energy Technology Data Exchange (ETDEWEB)

    Kim, A. G.; Aldering, G.; Aragon, C.; Bailey, S.; Childress, M.; Fakhouri, H. K.; Nordin, J. [Physics Division, Lawrence Berkeley National Laboratory, 1 Cyclotron Road, Berkeley, CA 94720 (United States); Thomas, R. C. [Computational Cosmology Center, Computational Research Division, Lawrence Berkeley National Laboratory, 1 Cyclotron Road MS 50B-4206, Berkeley, CA 94720 (United States); Antilogus, P.; Bongard, S.; Canto, A.; Cellier-Holzem, F.; Guy, J. [Laboratoire de Physique Nucleaire et des Hautes Energies, Universite Pierre et Marie Curie Paris 6, Universite Denis Diderot Paris 7, CNRS-IN2P3, 4 place Jussieu, F-75252 Paris Cedex 05 (France); Baltay, C. [Department of Physics, Yale University, New Haven, CT 06250-8121 (United States); Buton, C.; Kerschhaggl, M.; Kowalski, M. [Physikalisches Institut, Universitaet Bonn, Nussallee 12, D-53115 Bonn (Germany); Chotard, N. [Tsinghua Center for Astrophysics, Tsinghua University, Beijing 100084 (China); Copin, Y.; Gangler, E. [Universite de Lyon, F-69622 Lyon (France); and others

    2013-04-01

    We present a novel class of models for Type Ia supernova time-evolving spectral energy distributions (SEDs) and absolute magnitudes: they are each modeled as stochastic functions described by Gaussian processes. The values of the SED and absolute magnitudes are defined through well-defined regression prescriptions, so that data directly inform the models. As a proof of concept, we implement a model for synthetic photometry built from the spectrophotometric time series from the Nearby Supernova Factory. Absolute magnitudes at peak B brightness are calibrated to 0.13 mag in the g band and to as low as 0.09 mag in the z = 0.25 blueshifted i band, where the dispersion includes contributions from measurement uncertainties and peculiar velocities. The methodology can be applied to spectrophotometric time series of supernovae that span a range of redshifts to simultaneously standardize supernovae together with fitting cosmological parameters.

  1. Standardizing Type Ia Supernova Absolute Magnitudes Using Gaussian Process Data Regression

    CERN Document Server

    Kim, A G; Aldering, G; Antilogus, P; Aragon, C; Bailey, S; Baltay, C; Bongard, S; Buton, C; Canto, A; Cellier-Holzem, F; Childress, M; Chotard, N; Copin, Y; Fakhouri, H K; Gangler, E; Guy, J; Kerschhaggl, M; Kowalski, M; Nordin, J; Nugent, P; Paech, K; Pain, R; Pécontal, E; Pereira, R; Perlmutter, S; Rabinowitz, D; Rigault, M; Runge, K; Saunders, C; Scalzo, R; Smadja, G; Tao, C; Weaver, B A; Wu, C

    2013-01-01

    We present a novel class of models for Type Ia supernova time-evolving spectral energy distributions (SED) and absolute magnitudes: they are each modeled as stochastic functions described by Gaussian processes. The values of the SED and absolute magnitudes are defined through well-defined regression prescriptions, so that data directly inform the models. As a proof of concept, we implement a model for synthetic photometry built from the spectrophotometric time series from the Nearby Supernova Factory. Absolute magnitudes at peak $B$ brightness are calibrated to 0.13 mag in the $g$-band and to as low as 0.09 mag in the $z=0.25$ blueshifted $i$-band, where the dispersion includes contributions from measurement uncertainties and peculiar velocities. The methodology can be applied to spectrophotometric time series of supernovae that span a range of redshifts to simultaneously standardize supernovae together with fitting cosmological parameters.

  2. Process Control/SCADA system vendor security awareness and security posture.

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Lüders, S.

    2009-01-01

    A starting point for the adequate security of process control/SCADA systems is the security awareness and security posture by the manufacturers, vendors, system integrators, and service organisations. The results of a short set of questions indicate that major security improvements are required in t

  3. Process Control/SCADA system vendor security awareness and security posture.

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Lüders, S.

    2009-01-01

    A starting point for the adequate security of process control/SCADA systems is the security awareness and security posture by the manufacturers, vendors, system integrators, and service organisations. The results of a short set of questions indicate that major security improvements are required in

  4. Secure VM for Monitoring Industrial Process Controllers

    Energy Technology Data Exchange (ETDEWEB)

    Dasgupta, Dipankar [ORNL; Ali, Mohammad Hassan [University of Memphis; Abercrombie, Robert K [ORNL; Schlicher, Bob G [ORNL; Sheldon, Frederick T [ORNL; Carvalho, Marco [Institute of Human and Machine Cognition

    2011-01-01

    In this paper, we examine the biological immune system as an autonomic system for self-protection, which has evolved over millions of years probably through extensive redesigning, testing, tuning and optimization process. The powerful information processing capabilities of the immune system, such as feature extraction, pattern recognition, learning, memory, and its distributive nature provide rich metaphors for its artificial counterpart. Our study focuses on building an autonomic defense system, using some immunological metaphors for information gathering, analyzing, decision making and launching threat and attack responses. In order to detection Stuxnet like malware, we propose to include a secure VM (or dedicated host) to the SCADA Network to monitor behavior and all software updates. This on-going research effort is not to mimic the nature but to explore and learn valuable lessons useful for self-adaptive cyber defense systems.

  5. Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal

    Directory of Open Access Journals (Sweden)

    Errol A. Blake

    2007-12-01

    Full Text Available Database security has evolved; data security professionals have developed numerous techniques and approaches to assure data confidentiality, integrity, and availability. This paper will show that the Traditional Database Security, which has focused primarily on creating user accounts and managing user privileges to database objects are not enough to protect data confidentiality, integrity, and availability. This paper is a compilation of different journals, articles and classroom discussions will focus on unifying the process of securing data or information whether it is in use, in storage or being transmitted. Promoting a change in Database Curriculum Development trends may also play a role in helping secure databases. This paper will take the approach that if one make a conscientious effort to unifying the Database Security process, which includes Database Management System (DBMS selection process, following regulatory compliances, analyzing and learning from the mistakes of others, Implementing Networking Security Technologies, and Securing the Database, may prevent database breach.

  6. Security of legacy process control systems : Moving towards secure process control systems

    NARCIS (Netherlands)

    Oosterink, M.

    2012-01-01

    This white paper describes solutions which organisations may use to improve the security of their legacy process control systems. When we refer to a legacy system, we generally refer to old methodologies, technologies, computer systems or applications which are still in use, despite the fact that ne

  7. Security of legacy process control systems : Moving towards secure process control systems

    NARCIS (Netherlands)

    Oosterink, M.

    2012-01-01

    This white paper describes solutions which organisations may use to improve the security of their legacy process control systems. When we refer to a legacy system, we generally refer to old methodologies, technologies, computer systems or applications which are still in use, despite the fact that

  8. Threat Prioritization Process for the Czech Security Strategy Making

    National Research Council Canada - National Science Library

    Milos Balaban; Oldrich Krulik; Vladimir Krulik; Jan Ludvik; Ludek Moravec; Antonin Rasek; Libor Stejskal

    2012-01-01

    This article offers systematic view of a process of identification of security threats and, subsequently, their use in the making of strategic documents, notably the Security Strategy of the Czech Republic...

  9. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    CERN Document Server

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  10. Absolute quantification of dehydroacetic acid in processed foods using quantitative ¹H NMR.

    Science.gov (United States)

    Ohtsuki, Takashi; Sato, Kyoko; Furusho, Noriko; Kubota, Hiroki; Sugimoto, Naoki; Akiyama, Hiroshi

    2013-11-15

    An absolute quantification method for the determination of dehydroacetic acid in processed foods using quantitative (1)H NMR was developed and validated. The level of dehydroacetic acid was determined using the proton signals of dehydroacetic acid referenced to 1,4-bis (trimethylsilyl) benzene-d4 after simple solvent extraction from processed foods. All the recoveries from three processed foods spiked at two different concentrations were larger than 85%. The proposed method also proved to be precise, with inter-day precision and excellent linearity. The limit of quantification was confirmed as 0.13g/kg in processed foods, which is sufficiently low for the purposes of monitoring dehydroacetic acid. Furthermore, the method is rapid and easy to apply, and provides International System of Units traceability without the need for authentic analyte reference materials. Therefore, the proposed method is a useful and practical tool for determining the level of dehydroacetic acid in processed foods.

  11. Perspectives of Security Ensuring within the Framework of Barcelona Process

    Directory of Open Access Journals (Sweden)

    T N Kirabaev

    2009-06-01

    Full Text Available Barcelona process was aimed to become an important mechanism in the realization of ideas of peace, stability and security ensuring in the Mediterranean Sea region. Cooperation in the sphere of security ensuring means openness of the regional states, social and economic reforms, human rights protection. The article deals with the problem of security ensuring by nonmilitary means.

  12. Optimal control with absolutely continuous strategies for spectrally negative Levy processes

    CERN Document Server

    Kyprianou, Andreas E; Perez, Jose-Luis

    2010-01-01

    In the last few years there has been renewed interest in the classical control problem of de Finetti for the case that underlying source of randomness is a spectrally negative Levy process. In particular a significant step forward is made in an article of Loeffen where it is shown that a natural and very general condition on the underlying Levy process which allows one to proceed with the analysis of the associated Hamilton-Jacobi-Bellman equation is that its Levy measure is absolutely continuous, having completely monotone density. In this paper we consider de Finetti's control problem but now with the restriction that control strategies are absolutely continuous with respect to Lebesgue measure. This problem has been considered by Asmussen and Taksar, Jeanblanc and Shiryaev and Boguslavskaya in the diffusive case and Gerber and Shiu for the case of a Cramer-Lundberg process with exponentially distributed jumps. We show the robustness of the condition that the underlying Levy measure has a completely monoton...

  13. Word recognition in competing babble and the effects of age, temporal processing, and absolute sensitivity.

    Science.gov (United States)

    Snell, Karen B; Mapes, Frances M; Hickman, Elizabeth D; Frisina, D Robert

    2002-08-01

    This study was designed to clarify whether speech understanding in a fluctuating background is related to temporal processing as measured by the detection of gaps in noise bursts. Fifty adults with normal hearing or mild high-frequency hearing loss served as subjects. Gap detection thresholds were obtained using a three-interval, forced-choice paradigm. A 150-ms noise burst was used as the gap carrier with the gap placed close to carrier onset. A high-frequency masker without a temporal gap was gated on and off with the noise bursts. A continuous white-noise floor was present in the background. Word scores for the subjects were obtained at a presentation level of 55 dB HL in competing babble levels of 50, 55, and 60 dB HL. A repeated measures analysis of covariance of the word scores examined the effects of age, absolute sensitivity, and temporal sensitivity. The results of the analysis indicated that word scores in competing babble decreased significantly with increases in babble level, age, and gap detection thresholds. The effects of absolute sensitivity on word scores in competing babble were not significant. These results suggest that age and temporal processing influence speech understanding in fluctuating backgrounds in adults with normal hearing or mild high-frequency hearing loss.

  14. Absolute quantification for benzoic acid in processed foods using quantitative proton nuclear magnetic resonance spectroscopy.

    Science.gov (United States)

    Ohtsuki, Takashi; Sato, Kyoko; Sugimoto, Naoki; Akiyama, Hiroshi; Kawamura, Yoko

    2012-09-15

    The absolute quantification method of benzoic acid (BA) in processed foods using solvent extraction and quantitative proton nuclear magnetic resonance spectroscopy was developed and validated. BA levels were determined using proton signals (δ(H) 7.53 and 7.98) referenced to 2-dimethyl-2-silapentane-5-sulfonate-d(6) sodium salt (DSS-d(6)) after simple solvent extraction from processed foods. All recoveries from several kinds of processed foods, spiked at their specified maximum Japanese usage levels (0.6-2.5 g kg(-1)) and at 0.13 g kg(-1) and 0.063 g kg(-1), were greater than 80%. The limit of quantification was confirmed as 0.063 g kg(-1) in processed foods, which was sufficiently low for the purposes of monitoring BA. The accuracy of the proposed method is equivalent to the conventional method using steam-distillation extraction and high-performance liquid chromatography. The proposed method was both rapid and simple. Moreover, it provided International System of Units traceability without the need for authentic analyte standards. Therefore, the proposed method is a useful and practical tool for determining BA levels in processed foods.

  15. Easy Absolute Values? Absolutely

    Science.gov (United States)

    Taylor, Sharon E.; Mittag, Kathleen Cage

    2015-01-01

    The authors teach a problem-solving course for preservice middle-grades education majors that includes concepts dealing with absolute-value computations, equations, and inequalities. Many of these students like mathematics and plan to teach it, so they are adept at symbolic manipulations. Getting them to think differently about a concept that they…

  16. Security Processing for High End Embedded System with Cryptographic Algorithms

    Directory of Open Access Journals (Sweden)

    M.Shankar

    2012-01-01

    Full Text Available This paper is intended to introduce embedded system designers and design tool developers to the challenges involved in designing secure embedded systems. The challenges unique to embedded systems require new approaches to security covering all aspects of embedded system design from architecture to implementation. Security processing, which refers to the computations that must be performed in a system for the purpose of security, can easily overwhelm thecomputational capabilities of processors in both low- and highendembedded systems. The paper also briefs on the security enforced in a device by the use of proprietary security technology and also discusses the security measures taken during the production of the device. We also survey solution techniques to address these challenges, drawing from both current practice and emerging esearch, and identify open research problems that will require innovations in embedded system architecture and design methodologies.

  17. Process Control Systems in the Chemical Industry: Safety vs. Security

    Energy Technology Data Exchange (ETDEWEB)

    Jeffrey Hahn; Thomas Anderson

    2005-04-01

    Traditionally, the primary focus of the chemical industry has been safety and productivity. However, recent threats to our nation’s critical infrastructure have prompted a tightening of security measures across many different industry sectors. Reducing vulnerabilities of control systems against physical and cyber attack is necessary to ensure the safety, security and effective functioning of these systems. The U.S. Department of Homeland Security has developed a strategy to secure these vulnerabilities. Crucial to this strategy is the Control Systems Security and Test Center (CSSTC) established to test and analyze control systems equipment. In addition, the CSSTC promotes a proactive, collaborative approach to increase industry's awareness of standards, products and processes that can enhance the security of control systems. This paper outlines measures that can be taken to enhance the cybersecurity of process control systems in the chemical sector.

  18. Absolute quantitative analysis for sorbic acid in processed foods using proton nuclear magnetic resonance spectroscopy.

    Science.gov (United States)

    Ohtsuki, Takashi; Sato, Kyoko; Sugimoto, Naoki; Akiyama, Hiroshi; Kawamura, Yoko

    2012-07-13

    An analytical method using solvent extraction and quantitative proton nuclear magnetic resonance (qHNMR) spectroscopy was applied and validated for the absolute quantification of sorbic acid (SA) in processed foods. The proposed method showed good linearity. The recoveries for samples spiked at the maximum usage level specified for food in Japan and at 0.13 g kg(-1) (beverage: 0.013 g kg(-1)) were larger than 80%, whereas those for samples spiked at 0.063 g kg(-1) (beverage: 0.0063 g kg(-1)) were between 56.9 and 83.5%. The limit of quantification was 0.063 g kg(-1) for foods (and 0.0063 g kg(-1) for beverages containing Lactobacillus species). Analysis of the SA content of commercial processed foods revealed quantities equal to or greater than those measured using conventional steam-distillation extraction and high-performance liquid chromatography quantification. The proposed method was rapid, simple, accurate, and precise, and provided International System of Units traceability without the need for authentic analyte standards. It could therefore be used as an alternative to the quantification of SA in processed foods using conventional method.

  19. Absolute quantitative analysis for sorbic acid in processed foods using proton nuclear magnetic resonance spectroscopy

    Energy Technology Data Exchange (ETDEWEB)

    Ohtsuki, Takashi, E-mail: ohtsuki@nihs.go.jp [National Institute of Health Sciences, 1-18-1 Kamiyoga, Setagaya-ku, Tokyo 158-8501 (Japan); Sato, Kyoko; Sugimoto, Naoki; Akiyama, Hiroshi; Kawamura, Yoko [National Institute of Health Sciences, 1-18-1 Kamiyoga, Setagaya-ku, Tokyo 158-8501 (Japan)

    2012-07-13

    Highlights: Black-Right-Pointing-Pointer A method using qHNMR was applied and validated to determine SA in processed foods. Black-Right-Pointing-Pointer This method has good accuracy, precision, selectiveness, and linearity. Black-Right-Pointing-Pointer The proposed method is more rapid and simple than the conventional method. Black-Right-Pointing-Pointer We found that the proposed method is reliable for the accurate determination of SA. Black-Right-Pointing-Pointer This method can be used for the monitoring of SA in processed foods. - Abstract: An analytical method using solvent extraction and quantitative proton nuclear magnetic resonance (qHNMR) spectroscopy was applied and validated for the absolute quantification of sorbic acid (SA) in processed foods. The proposed method showed good linearity. The recoveries for samples spiked at the maximum usage level specified for food in Japan and at 0.13 g kg{sup -1} (beverage: 0.013 g kg{sup -1}) were larger than 80%, whereas those for samples spiked at 0.063 g kg{sup -1} (beverage: 0.0063 g kg{sup -1}) were between 56.9 and 83.5%. The limit of quantification was 0.063 g kg{sup -1} for foods (and 0.0063 g kg{sup -1} for beverages containing Lactobacillus species). Analysis of the SA content of commercial processed foods revealed quantities equal to or greater than those measured using conventional steam-distillation extraction and high-performance liquid chromatography quantification. The proposed method was rapid, simple, accurate, and precise, and provided International System of Units traceability without the need for authentic analyte standards. It could therefore be used as an alternative to the quantification of SA in processed foods using conventional method.

  20. Telescope Spectrophotometric and Absolute Flux Calibration, and National Security Applications, Using a Tunable Laser on a Satellite

    CERN Document Server

    Albert, J; Rhodes, J; Albert, Justin; Burgett, William; Rhodes, Jason

    2006-01-01

    We propose a tunable laser-based satellite-mounted spectrophotometric and absolute flux calibration system, to be utilized by ground- and space-based telescopes. As uncertainties on the photometry, due to imperfect knowledge of both telescope optics and the atmosphere, will in the near future begin to dominate the uncertainties on fundamental cosmological parameters such as Omega_Lambda and w in measurements from SNIa, weak gravitational lensing, and baryon oscillations, a method for reducing such uncertainties is needed. We propose to improve spectrophotometric calibration, currently obtained using standard stars, by placing a tunable laser and a wide-angle light source on a satellite by early next decade (perhaps included in the upgrade to the GPS satellite network) to improve absolute flux calibration to 0.1% and relative spectrophotometric calibration to better than 0.001% across the visible and near-infrared spectrum. As well as fundamental astrophysical applications, the system proposed here potentially...

  1. Investigating 2010 Northern Cascadia ETS Processes With Absolute Gravity & Deformation Measurements Near Port Renfrew, British Columbia

    Science.gov (United States)

    Henton, J. A.; Dragert, H.; Wang, K.; Kao, H.; Lambert, A.

    2010-12-01

    The monitoring of subduction zone Episodic Tremor and Slip (ETS) has been carried out primarily using seismic data for tremor and continuous Global Positioning System (GPS) and strain- or tilt-meter observations for transient slip. The regularity of ETS episodes in the forearc of the northern Cascadia Subduction Zone has recently allowed us to schedule a series of absolute gravity (AG) measurements to augment these other data and thereby help in understanding the physical processes involved in the generation of ETS. High-precision AG observations are sensitive to vertical motion of the observation site as well as mass redistribution during transient deformation. For the 2010 ETS event in the northern Cascadia, AG observations were carried out at Port Renfrew, British Columbia. The Port Renfrew region was targeted since it has typically had large (~7mm) vertical displacements measured at a nearby GPS site. Additionally this region has experienced large strains during past ETS episodes. The closest PBO borehole strainmeter to Port Renfrew, B004 (Sekiu, WA), typically experiences ETS shear strain transients exceeding 100 nanostrain. In this contribution, we focus on the analysis of the multiple epoch series of AG observations at Port Renfrew during the 2010 ETS event. The ratio of the change of surface gravity (Δg) to vertical displacement (Δh) during the ETS event will also be examined. This ratio provides unique constraints on processes involved in generating observed gravity signals and will help us explore the mechanism of ETS.

  2. Research on information security system of waste terminal disposal process

    Science.gov (United States)

    Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei

    2017-05-01

    Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.

  3. Internal Challenges of Ukrainian Security Process

    Science.gov (United States)

    2014-12-12

    proposes to study aspects that may influence security system adaptation, such as corruption, bureaucracy , decentralization of power, and Clausewitz’s...adaptation, such as corruption, bureaucracy , decentralization of power, and Clausewitz’s triad relationship between the military and people. iv...issue that could have alerted Ukrainian leadership was the Tuzla Crisis in October of 2003. At the end of September 2003, the Russian Federation began

  4. Image Processing Oriented to Security Optimization

    Directory of Open Access Journals (Sweden)

    Ion Ivan

    2010-06-01

    Full Text Available This paper presents the main aspects of the digital content security. It describes the content of watermarking, presenting the steganography concept. SteganoGraphy application is presented and the algorithm used is analyzed. Optimization techniques are introduces to minimize the risk of discovering the information embedded into digital content by means of invisible watermarking. Techniques of analyzing the digital content results and identify the possible countermeasures for optimizing the steganography algorithm are presented.

  5. Dissociation of procedural and semantic memory in absolute-pitch processing.

    Science.gov (United States)

    Hsieh, I-Hui; Saberi, Kourosh

    2008-06-01

    We describe two memory-retrieval systems in absolute-pitch (AP) processing and propose existence of a universal internal pitch template to which subpopulations of musicians selectively gain access through the two systems. In Experiment I, AP and control musicians adjusted the frequency of a pure tone to match the pitch of a visually displayed randomly selected musical note. In Experiment II the same subjects vocally produced within 2s the pitch associated with a randomly selected musical note label. AP musicians, but not controls, were highly accurate in frequency matching. Surprisingly, both AP and non-AP groups were extremely accurate in voicing the target pitch as determined from an FFT of the recorded voiced notes (i.e., sigma=0.97, 0.90 semitones, respectively). Spectrogram analysis showed that notes voiced by non-AP musicians are accurate from onset of voicing suggesting that pitch accuracy does not result from an auditory-motor feedback loop. Findings support existence of two memory-retrieval systems for musical pitch: a semantic associative form of memory used by AP musicians, and a more widespread form of procedural memory which allows precise access to internal pitch representations through the vocal-motor system.

  6. Process Control System Cyber Security Standards - An Overview

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans

    2006-05-01

    The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

  7. Absolute Summ

    Science.gov (United States)

    Phillips, Alfred, Jr.

    Summ means the entirety of the multiverse. It seems clear, from the inflation theories of A. Guth and others, that the creation of many universes is plausible. We argue that Absolute cosmological ideas, not unlike those of I. Newton, may be consistent with dynamic multiverse creations. As suggested in W. Heisenberg's uncertainty principle, and with the Anthropic Principle defended by S. Hawking, et al., human consciousness, buttressed by findings of neuroscience, may have to be considered in our models. Predictability, as A. Einstein realized with Invariants and General Relativity, may be required for new ideas to be part of physics. We present here a two postulate model geared to an Absolute Summ. The seedbed of this work is part of Akhnaton's philosophy (see S. Freud, Moses and Monotheism). Most important, however, is that the structure of human consciousness, manifest in Kenya's Rift Valley 200,000 years ago as Homo sapiens, who were the culmination of the six million year co-creation process of Hominins and Nature in Africa, allows us to do the physics that we do. .

  8. Effective Electronic Security: Process for the Development and Validation from Requirements to Testing

    Science.gov (United States)

    2013-06-01

    ALTERNATIVE DEVELOPMENT We will bankrupt ourselves in the vain search for absolute security. Dwight D. Eisenhower The method used to take an...The mysterious stranger and other stories (1st ed.). New York: Harper & Bros. United Kingdom Home Office. (2012). Security industry authority

  9. 49 CFR Appendix A to Part 580 - Secure Printing Processes and Other Secure Processes

    Science.gov (United States)

    2010-10-01

    ... an engraved plate meets the paper under extremely high pressure forcing the paper into the incisions... the production of bank-notes and other security documents whereby an engraved plate meets the paper under extremely high pressure forcing the paper into the incisions below the surface of the plate....

  10. The process matters: cyber security in industrial control systems

    NARCIS (Netherlands)

    Hadžiosmanović, Dina

    2014-01-01

    An industrial control system (ICS) is a computer system that controls industrial processes such as power plants, water and gas distribution, food production, etc. Since cyber-attacks on an ICS may have devastating consequences on human lives and safety in general, the security of ICS is important. I

  11. The process matters: cyber security in industrial control systems

    NARCIS (Netherlands)

    Hadziosmanovic, D.

    2014-01-01

    An industrial control system (ICS) is a computer system that controls industrial processes such as power plants, water and gas distribution, food production, etc. Since cyber-attacks on an ICS may have devastating consequences on human lives and safety in general, the security of ICS is important. I

  12. 48 CFR 1337.110-70 - Personnel security processing requirements.

    Science.gov (United States)

    2010-10-01

    ... where foreign national access to any DOC facility or DOC IT system is required. The language of the... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Personnel security processing requirements. 1337.110-70 Section 1337.110-70 Federal Acquisition Regulations System DEPARTMENT...

  13. Derivation of the Limits for Control Chart Using the Median Absolute Deviation for Monitoring Non-Normal Process

    Directory of Open Access Journals (Sweden)

    P. I. Azubuike

    2012-01-01

    Full Text Available Problem statement: The Shewhart and S control charts, in the literature, were combined to evaluate the stability of a process. These charts were based on the fundamental assumption of normality of the quality characteristics under investigation. Approach: In practice, the normality assumption was often violated by real life data, therefore, use of the Shewhart and S control charts on real life data might leads to misplacement of control limits. There were many alternatives in the literature to handle non-normality of quality characteristics. The Median Absolute Deviation (MAD claimed in the literature to be the best estimate when the data under consideration is non-normal. Thus in this study, we derived the control limits for the-control chart using the median absolute deviation for monitoring process stability when the quality characteristic under investigation was non-normal. Results: The derived control limits were compared with the control limits when the sample standard deviation was used as a measure of controlling the process variability using manufacturing process (real life data. Furthermore, a simulation study was carried out to evaluate the performance of the proposed MAD based control charts on both normal and non-normal process. Conclusion: The obtained results show that the derived control limit is an improvement on the control limit of the Shewhart and that the MAD control charts performed better for non-normal process than for normal process.

  14. Evaluation of Two Absolute Radiometric Normalization Algorithms for Pre-processing of Landsat Imagery

    Institute of Scientific and Technical Information of China (English)

    Xu Hanqiu

    2006-01-01

    In order to evaluate radiometric normalization techniques, two image normalization algorithms for absolute radiometric correction of Landsat imagery were quantitatively compared in this paper, which are the Illumination Correction Model proposed by Markham and Irish and the Illumination and Atmospheric Correction Model developed by the Remote Sensing and GIS Laboratory of the Utah State University. Relative noise, correlation coefficient and slope value were used as the criteria for the evaluation and comparison, which were derived from pseudo-invariant features identified from multitemtween the normalized multitemporal images were significantly reduced when the seasons of multitemporal images were different. However, there was no significant difference between the normalized and unnormalized images with a similar seasonal condition. Furthermore, the correction results of two algorithms are similar when the images are relatively clear with a uniform atmospheric condition. Therefore, the radiometric normalization procedures should be carried out if the multitemporal images have a significant seasonal difference.

  15. Absolute advantage

    NARCIS (Netherlands)

    J.G.M. van Marrewijk (Charles)

    2008-01-01

    textabstractA country is said to have an absolute advantage over another country in the production of a good or service if it can produce that good or service using fewer real resources. Equivalently, using the same inputs, the country can produce more output. The concept of absolute advantage can a

  16. Priming the Secure Attachment Schema: Effects on Emotion Information Processing

    Directory of Open Access Journals (Sweden)

    Panoraia Andriopoulos

    2015-04-01

    Full Text Available The present study examined the effects of secure schema activation on selective attention towards attachment-related and emotional information. Seventy two participants were randomly allocated into two conditions–subliminal priming of mental representations of supportive attachment figures (a Picasso sketch of a mother holding a baby and looking into his eyes and a no priming condition followed by an administration of a dot probe task that included positive and negative attachment-related and emotion words. The results showed that the activation of the secure prime in conjunction with chronic attachment orientations affected the processing of positive and negative attachment-unrelated emotional information. Results highlight relationships between higher-order processes of the attachment system (attachment schema activation with early stage information processing (selective attention as assessed by the dot probe task. Methodological issues are discussed with reference to the priming method used and the traditional version of the dot-probe task.

  17. Guidelines for Automatic Data Processing Physical Security and Risk Management. Federal Information Processing Standards Publication 31.

    Science.gov (United States)

    National Bureau of Standards (DOC), Washington, DC.

    These guidelines provide a handbook for use by federal organizations in structuring physical security and risk management programs for their automatic data processing facilities. This publication discusses security analysis, natural disasters, supporting utilities, system reliability, procedural measures and controls, off-site facilities,…

  18. Absolute Intensities of the Vacuum Ultraviolet Spectra in a Metal-Etch Plasma Processing Discharge

    Energy Technology Data Exchange (ETDEWEB)

    Aragon, B.P.; Blain, M.G.; Hamilton, T.W.; Jarecki, R.L.; Woodworth, J.R.

    1998-12-09

    In this paper we report absolute intensities of vacuum ultraviolet and near ultraviolet emission lines (4.8 eV to 18 eV ) for aluminum etching discharges in an inductively coupled plasma reactor. We report line intensities as a function of wafer type, pressure, gas mixture and rf excitation level. IrI a standard aluminum etching mixture containing C12 and BC13 almost all the light emitted at energies exceeding 8.8 eV was due to neutral atomic chlorine. Optical trapping of the WV radiation in the discharge complicates calculations of VUV fluxes to the wafer. However, we see total photon fluxes to the wailer at energies above 8.8 eV on the order of 4 x 1014 photons/cm2sec with anon- reactive wafer and 0.7 x 10 `4 photons/cm2sec with a reactive wtier. The maj ority of the radiation observed was between 8.9 and 9.3 eV. At these energies, the photons have enough energy to create electron-hole pairs in Si02, but may penetrate up to a micron into the Si02 before being absorbed. Relevance of these measurements to vacuum-W photon-induced darnage of Si02 during etching is discussed.

  19. 20 CFR 423.3 - Other process directed to the Social Security Administration or the Commissioner.

    Science.gov (United States)

    2010-04-01

    ... Administration or the Commissioner. 423.3 Section 423.3 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.3 Other process directed to the Social Security Administration or the... on the Social Security Administration or the Commissioner of Social Security in his or her...

  20. All-optical signal processing technique for secure optical communication

    Science.gov (United States)

    Qian, Feng-chen; Su, Bing; Ye, Ya-lin; Zhang, Qian; Lin, Shao-feng; Duan, Tao; Duan, Jie

    2015-10-01

    Secure optical communication technologies are important means to solve the physical layer security for optical network. We present a scheme of secure optical communication system by all-optical signal processing technique. The scheme consists of three parts, as all-optical signal processing unit, optical key sequence generator, and synchronous control unit. In the paper, all-optical signal processing method is key technology using all-optical exclusive disjunction (XOR) gate based on optical cross-gain modulation effect, has advantages of wide dynamic range of input optical signal, simple structure and so on. All-optical XOR gate composed of two semiconductor optical amplifiers (SOA) is a symmetrical structure. By controlling injection current, input signal power, delay and filter bandwidth, the extinction ratio of XOR can be greater than 8dB. Finally, some performance parameters are calculated and the results are analyzed. The simulation and experimental results show that the proposed method can be achieved over 10Gbps optical signal encryption and decryption, which is simple, easy to implement, and error-free diffusion.

  1. 10 CFR 95.49 - Security of automatic data processing (ADP) systems.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security of automatic data processing (ADP) systems. 95.49 Section 95.49 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.49 Security...

  2. 20 CFR 423.5 - Process against Social Security Administration officials in their individual capacities.

    Science.gov (United States)

    2010-04-01

    ... Administration officials in their individual capacities. 423.5 Section 423.5 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.5 Process against Social Security Administration officials in their individual capacities. Process to be served on Social Security Administration officials in their...

  3. Absolute laser based in-situ determination of HCl in the reaction chamber of combustion processes and gasification processes; Absolute laserbasierte in situ Bestimmung von HCI im Reaktionsraum von Verbrennungs- und Vergasungsprozessen

    Energy Technology Data Exchange (ETDEWEB)

    Ortwein, P.; Woiwode, W.; Gisi, M.; Ebert, V.; Wagner, S. [Heidelberg Univ. (Germany). Physikalisch Chemisches Institut; Eberhard, M.; Kolb, T. [ITC-TAB, Forschungszentrum Karlsruhe, Eggenstein-Leopoldshafen (Germany)

    2009-07-01

    The release of hydrochloric acid (HCl) is an important parameter for the industrial processes of combustion and gasification. This parameter has to be determined for the active monitoring till to the ppm range. On basis of a Vertical Cavity Surface Emitting laser (VCSEL) with 1,742 nm a new TDLAS spectrometer for the absolute in situ determination of hydrochloric acid during the processes of combustion and gasification was developed and used for a calibration-free absorption measurement of the HCl R3 line with minimal transversal sensitivity to the disturbing species CO{sub 2} and H{sub 2}O. In an extractive application with a 10 cm long gas cell, an optical dissolution of 10{sup -}4 and a detection limit of 240 ppb . m at a time resolution of 12.5 s can be achieved. In the case of a time resolution of 1 s, the application of the spectrometer in the case of in-situ measurements in a biomass combustion (T = 900 C, p = 1 bar, L = 36 cm) resulted in an optical dissolution of 1.9 . 10{sup -}4. This corresponds to a detection limit of 9 ppm . m and a signal-noise ratio of 25: 1. First in-situ measurements in an air flow gasifier (T = 1,100 C, p = 1 bar, L = 28 cm) supply an optical dissolution of 2.3 . 10{sup -}4 and a detection limit of 13 ppm . m.

  4. A security modeling approach for web-service-based business processes

    DEFF Research Database (Denmark)

    Jensen, Meiko; Feja, Sven

    2009-01-01

    The rising need for security in SOA applications requires better support for management of non-functional properties in web-based business processes. Here, the model-driven approach may provide valuable benefits in terms of maintainability and deployment. Apart from modeling the pure functionality...... of a process, the consideration of security properties at the level of a process model is a promising approach. In this work-in-progress paper we present an extension to the ARIS SOA Architect that is capable of modeling security requirements as a separate security model view. Further we provide...... a transformation that automatically derives WS-SecurityPolicy-conformant security policies from the process model, which in conjunction with the generated WS-BPEL processes and WSDL documents provides the ability to deploy and run the complete security-enhanced process based on Web Service technology. © 2009 IEEE....

  5. A security modeling approach for web-service-based business processes

    DEFF Research Database (Denmark)

    Jensen, Meiko; Feja, Sven

    2009-01-01

    The rising need for security in SOA applications requires better support for management of non-functional properties in web-based business processes. Here, the model-driven approach may provide valuable benefits in terms of maintainability and deployment. Apart from modeling the pure functionality...... a transformation that automatically derives WS-SecurityPolicy-conformant security policies from the process model, which in conjunction with the generated WS-BPEL processes and WSDL documents provides the ability to deploy and run the complete security-enhanced process based on Web Service technology....... of a process, the consideration of security properties at the level of a process model is a promising approach. In this work-in-progress paper we present an extension to the ARIS SOA Architect that is capable of modeling security requirements as a separate security model view. Further we provide...

  6. The Impact of Migration Processes on the National Security of Kazakhstan

    Science.gov (United States)

    Korganova, Saipzhamal S.; Taubayeva, Mirash Y.; Sultanov, Serik A.; Rysbayeva, Saule Zh.; Sultanova, Valida I.; Zhumabekov, Madiyr U.; Raximshikova, Mavluda K.

    2016-01-01

    The purpose of this study is to analyze the impact of migration processes on the national security of Kazakhstan. However, it should be noted that national security is an expression of national interests and it is provided by means of resources and efforts of a particular state. Consequently, social security is an expression of the public…

  7. Lessons from Burundi’s Security Sector Reform Process

    Science.gov (United States)

    2014-11-01

    International Security Sector Advisory Team. 7 Mémorandum d’Entente entre le Gouvernement de la République du Burundi et les Ministres des Affaires...and Fabien Nsengimana, Evaluation du Volet Gouvernance du Programme DSS, October 28, 2013. Nicole Ball, Putting Governance at the Heart of Security

  8. Social Security Administration Public Inquiry Data - Average Processing Time (in days)

    Data.gov (United States)

    Social Security Administration — This dataset shows the average processing time for completed inquiries. The data source is the Electronic Management of Assignments and Correspondence system (EMAC)....

  9. REGULATION OF MIGRATORY PROCESSES AS BASIS OF RUSSIAN NATIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    V. A. Silantyeva

    2016-01-01

    Full Text Available The article deals with modern problems of migration, given the attempt to identify the causes of the migratory crisis in Europe, shows the state migration policy of Russia. Despite features of migration policy in separately taken European state, consequences of migratory processes for the countries of Europe the general. In Russia long time there was no complete system of the migratory legislation. However in recent years Russia has considerably progressed in the solution of migratory problems: the Concept of the state migration policy of the Russian Federation for the period till 2025 within which the principles and the main activities of the Russian Federation in the sphere of migration are established is accepted. It, in our opinion, has allowed reducing the number of labor migrants and those who illegally work in the territory of the Russian Federation. Based on the study of existing theoretical approaches, standards and applicable regulations made some conclusions about the nature of migration control. It was found that the effective implementation of the state migration policy will contribute to socioeconomic and demographic development, national security and maintain stability in society.

  10. Security information processing system in Mitsui Miike Coal Mine

    Energy Technology Data Exchange (ETDEWEB)

    Ikeda, Tsutomu; Makino, Hideyuki (Mitsui Coal Mining Co., Ltd., Tokyo (Japan))

    1988-10-25

    A comment says that the security system failed to properly function to combine and reckon the information reported and the data detected by the sensor at the time of past disasters. An integrated data processing system which incorporates the independent function to predict an accident and is capable of offering a guideline to take the lead in evacuation and to prevent the spread of disaster has been developed. It is capable of obviating any disaster while directing the operation of various equipment in the pit and the fluctuation of environmental conditions in the pit including the gas concentration and temperature. Furthermore, it works to prevent the spread of disaster at the time of emergency. The major features of the system are that the system is designed to ignore the fluctuation of CO condensation at the time of normal blasting and to quickly and accurately catch any premonitory fluctuation when it detects any abnormal fluctuation. It combines the plural numbers of data indicating the possible accident and arrange them in order. Then it displays the data warning the workers on the CRT. When the machines replace manual labor, the problem is that the machines cannot make systematic response, which is the most advantageous point of the manual supervision. Development of a software capable of making systematic judgement as a man does is hope for in the future. 4 figures, 2 tables.

  11. Coordination and organization of security software process for power information application environment

    Science.gov (United States)

    Wang, Qiang

    2017-09-01

    As an important part of software engineering, the software process decides the success or failure of software product. The design and development feature of security software process is discussed, so is the necessity and the present significance of using such process. Coordinating the function software, the process for security software and its testing are deeply discussed. The process includes requirement analysis, design, coding, debug and testing, submission and maintenance. In each process, the paper proposed the subprocesses to support software security. As an example, the paper introduces the above process into the power information platform.

  12. Application of the JDL data fusion process model for cyber security

    Science.gov (United States)

    Giacobe, Nicklaus A.

    2010-04-01

    A number of cyber security technologies have proposed the use of data fusion to enhance the defensive capabilities of the network and aid in the development of situational awareness for the security analyst. While there have been advances in fusion technologies and the application of fusion in intrusion detection systems (IDSs), in particular, additional progress can be made by gaining a better understanding of a variety of data fusion processes and applying them to the cyber security application domain. This research explores the underlying processes identified in the Joint Directors of Laboratories (JDL) data fusion process model and further describes them in a cyber security context.

  13. Application Security for the Android Platform Processes, Permissions, and Other Safeguards

    CERN Document Server

    Six, Jeff

    2011-01-01

    This book will educate readers on the need for application security and secure coding practices when designing any app. No prior knowledge of security or secure programming techniques is assumed. The book will discuss the need for such practices, how the Android environment is structured with respect to security considerations, what services and techniques are available on the platform to protect data, and how developers can build and code applications that address the risk to their applications and the data processed by them. This text is especially important now, as Android is fast becoming

  14. Relating multiset rewriting and process algebras for security protocol analysis

    NARCIS (Netherlands)

    Bistarelli, Stefano; Cervesato, Iliano; Lenzini, Gabriele; Martinelli, Fabio

    2005-01-01

    When formalizing security protocols, different specification languages support very different reasoning methodologies, whose results are not directly or easily comparable. Therefore, establishing clear mappings among different frameworks is highly desirable, as it permits various methodologies to co

  15. Intelligent techniques in signal processing for multimedia security

    CERN Document Server

    Santhi, V

    2017-01-01

    This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications’ algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face condi...

  16. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  17. 31 CFR 375.23 - How does the securities delivery process work?

    Science.gov (United States)

    2010-07-01

    ... the securities delivery process work? If any of the offers you submitted are accepted, you must... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance...

  18. 77 FR 52692 - NIST Federal Information Processing Standard (FIPS) 140-3 (Second Draft), Security Requirements...

    Science.gov (United States)

    2012-08-30

    ... National Institute of Standards and Technology NIST Federal Information Processing Standard (FIPS) 140-3... sections of Federal Information Processing Standard 140-3 (Second Draft), Security Requirements for... may be sent to: Chief, Computer Security Division, Information Technology Laboratory, Attention:...

  19. Absolutely Fabulous!

    DEFF Research Database (Denmark)

    Hjorth, Daniel

    2013-01-01

    in entrepreneurship research – the “vanishing presence” of the entrepreneur in processual studies of entrepreneurship. To avoid performative contradiction, the paper seeks to contextualise this attempt in guiding principles provided by process philosophy. Findings – Without a process view, “the subject” as entity...... and self-constitutive res cogitans (thinking thing or mind) will take priority over subjectification, and the paper will loose the possibility to think and study the process of becoming-subject in its own terms. Originality/value – Understanding entrepreneurship as organisation-creation, the paper here...

  20. Process Control System Cyber Security Standards - An Overview

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans; V Stanley Scown; Rolf Carlson; Shabbir Shamsuddin; George Shaw; Jeff Dagle; Paul W Oman; Jeannine Schmidt

    2005-10-01

    The use of cyber security standards can greatly assist in the protection of critical infrastructure by providing guidelines and requisite imperatives in the implementation of computer-controlled systems. These standards are most effective when the engineers and operators using the standards understand what each of the standards addresses and does not address. This paper provides a review and comparison of ten documents dealing with control system cyber security. It is not meant to be a complete treatment of all applicable standards; rather, this is an exemplary analysis showing the benefits of comparing and contrasting differing documents.

  1. The Effect of Information Security Management on Organizational Processes Integration in Supply Chain

    OpenAIRE

    Mohsen Shafiei Nikabadi; Ahmad Jafarian; Azam Jalili Bolhasani

    2012-01-01

    : The major purpose of this article was that how information security management has effect on supply chain integration and the effect of implementing "information security management system" on enhancing supplies chain integration. In this respect, current research was seeking a combination overview to these tow approaches (Information Security Management and Organizational Processes Integration by Enterprise Resources Planning System) and after that determined factors of these two import...

  2. What's under the hood? Improving SCADA security with process awareness

    NARCIS (Netherlands)

    Chromik, Justyna J.; Remke, Anne; Haverkort, Boudewijn R.

    2016-01-01

    SCADA networks are an essential part of monitoring and controlling physical infrastructures, such as the power grid. Recent news item show that tampering with the data exchanged in a SCADA network occurs and has severe consequences. A possible way of improving the security of SCADA networks is to us

  3. Securing the Data Storage and Processing in Cloud Computing Environment

    Science.gov (United States)

    Owens, Rodney

    2013-01-01

    Organizations increasingly utilize cloud computing architectures to reduce costs and energy consumption both in the data warehouse and on mobile devices by better utilizing the computing resources available. However, the security and privacy issues with publicly available cloud computing infrastructures have not been studied to a sufficient depth…

  4. Securing the Data Storage and Processing in Cloud Computing Environment

    Science.gov (United States)

    Owens, Rodney

    2013-01-01

    Organizations increasingly utilize cloud computing architectures to reduce costs and energy consumption both in the data warehouse and on mobile devices by better utilizing the computing resources available. However, the security and privacy issues with publicly available cloud computing infrastructures have not been studied to a sufficient depth…

  5. Absolute Zero.

    Science.gov (United States)

    Jones, Rebecca

    1997-01-01

    So far the courts have supported most schools' zero-tolerance policies--even those banning toy weapons, over-the-counter drugs, and unseemly conduct. However, wide-ranging get-tough policies can draw criticism. Policy experts advise school boards to ask the community, decide what people want, allow some wiggle room, create an appeals process,…

  6. Secure Query Processing and Routing in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    R. Jebakumar

    2012-09-01

    Full Text Available Data storage has become an important issue inwireless Sensor Networks (WSN as a hugeamount of collected data needed to be archived forfuture reference. Storage nodes are introducedhere to store the data collected from the sensors intheir proximities. The storage nodes alleviate theheavy load of transmitting all data to a centralplace for archiving and reducing thecommunication cost induced by the networkquery. This paper proposes a new securitymechanism to store the data and the queryprocessing through the secure routing in WSN,and also addresses the storage node placement,aiming to minimize the total energy cost forgathering data to the storage nodes, replyingqueries and level of encryption for extend thesecurity for data communication. This paperexamines the secure routing protocol for queryprocessing and data transmission in it.

  7. Accuracy, security, and processing time comparisons of biometric fingerprint recognition system using digital and optical enhancements

    Science.gov (United States)

    Alsharif, Salim; El-Saba, Aed; Jagapathi, Rajendarreddy

    2011-06-01

    Fingerprint recognition is one of the most commonly used forms of biometrics and has been widely used in daily life due to its feasibility, distinctiveness, permanence, accuracy, reliability, and acceptability. Besides cost, issues related to accuracy, security, and processing time in practical biometric recognition systems represent the most critical factors that makes these systems widely acceptable. Accurate and secure biometric systems often require sophisticated enhancement and encoding techniques that burdens the overall processing time of the system. In this paper we present a comparison between common digital and optical enhancementencoding techniques with respect to their accuracy, security and processing time, when applied to biometric fingerprint systems.

  8. 76 FR 7817 - Announcing Draft Federal Information Processing Standard 180-4, Secure Hash Standard, and Request...

    Science.gov (United States)

    2011-02-11

    ... National Institute of Standards and Technology Announcing Draft Federal Information Processing Standard 180... Draft Federal Information Processing Standard (FIPS) 180-4, Secure Hash Standard (SHS), for public... sent to: Chief, Computer Security Division, Information Technology Laboratory, Attention: Comments...

  9. Implication of Secure Micropayment System Using Process Oriented Structural Design by Hash chaining in Mobile Network

    Directory of Open Access Journals (Sweden)

    Chitra Kiran N.

    2012-01-01

    Full Text Available The proposed system presents a novel approach of designing a highly secured and robust process oriented architecture for micropayment system in wireless adhoc network. Deployment of any confidential transaction over dynamic nature of wireless adhoc network will strike a high amount of security challenges which is very difficult to identify which poses a great difficulty in designing and effective countermeasures. The current work designs the security process using hash chain and Simple Public Key Infrastructure to be implemented on newly designed digital agreement of broker along with paving new secure routing for secure m-transaction as an efficient alternative for digital coin. The system stimulates the intermediate nodes to cooperate for facilitating secure and reliable transaction from source to destination nodes. The system consists of high end encryption using hash function is also independent of any Trusted Third Party when the network topology frequency changes, thereby it is flexible, lightweight, and reliable for secure micropayment systems. The analysis result shows the system is highly robust and secure ensuring anonymity, privacy, non-repudiation offline payment system over wireless adhoc network.

  10. The Effect of Information Security Management on Organizational Processes Integration in Supply Chain

    Directory of Open Access Journals (Sweden)

    Mohsen Shafiei Nikabadi

    2012-03-01

    Full Text Available : The major purpose of this article was that how information security management has effect on supply chain integration and the effect of implementing "information security management system" on enhancing supplies chain integration. In this respect, current research was seeking a combination overview to these tow approaches (Information Security Management and Organizational Processes Integration by Enterprise Resources Planning System and after that determined factors of these two important issue by factor analysis. Researchers using a series of comments in the automotive experts (production planning and management and supply chain experts and caregivers car makers and suppliers in the first level and second level supply chain industry. In this way, it has been done that impact on how information security management processes enterprise supply chain integration with the help of statistical correlation analysis. The results of this investigation indicated effect of "information security management system" various dimensions that were coordination of information, prevent human errors and hardware, the accuracy of information and education for users on two dimensions of internal and external integration of business processes, supply chain and finally, it can increased integration of business processes in supply chain. At the end owing to quite these results, deployment of "information security management system" increased the integration of organizational processes in supply chain. It could be demonstrate with the consideration of relation of organizational integration processes whit the level of coordination of information, prevent errors and accuracy of information throughout the supply chain.

  11. «Security» in industrial frying processes.

    Directory of Open Access Journals (Sweden)

    Kochhar, S. R.

    1998-08-01

    Full Text Available . It is well known that equipment design features can have a profound effect on the working life of a frying oil, and consequently on secure/safe operation of the industrial deep-frying at high temperatures. The design aspects of the cooker should eliminate known factors of heat degradation/oxidation in the frying oil while maintaining outputs of products of consistent quality. For instance, the pro-oxidant catalyst copper or brass valves/fittings must not be employed. Continuous removal of debris/sediment and the maintenance of uniform oil temperatures leads to the development of FFAs at a lower rate, better taste, colour and appearance of the product. Security thermostats are fitted to each heating element in many modern, small-scale catering fryers. These are designed to trip out if the primary thermostat fails to function. Also the current isolation switch cuts off the electrical supply if the element head is not placed correctly in the fryer. In both catering and industrial frying operations, smoke haze can be a problem. The volatile break-down products such as FFAs, etc. formed in the oil being heated at high temperatures give rise to smoke, which if not controlled can enhance fire hazards due to their lower flash point. The smoke point is of most benefit in assessing the quality of a frying oil, since it is mainly the FFAs produced in the frying operation which contribute to the smoke haze. Commercial frying oils as well as the entire frying installation including cooker design, must meet strict quality and safety requirements. These features become extremely important, especially in the industrial flash frying operation when the frying oil is heated to a higher temperature of 200°G. High oil quality and high smoke/flash point frying oils are essential characteristics of the flash frying operation. These days, two important features namely carbon dioxide blanketing system and a waste air cleaning system have become standard design items

  12. Providing security for automated process control systems at hydropower engineering facilities

    Science.gov (United States)

    Vasiliev, Y. S.; Zegzhda, P. D.; Zegzhda, D. P.

    2016-12-01

    This article suggests the concept of a cyberphysical system to manage computer security of automated process control systems at hydropower engineering facilities. According to the authors, this system consists of a set of information processing tools and computer-controlled physical devices. Examples of cyber attacks on power engineering facilities are provided, and a strategy of improving cybersecurity of hydropower engineering systems is suggested. The architecture of the multilevel protection of the automated process control system (APCS) of power engineering facilities is given, including security systems, control systems, access control, encryption, secure virtual private network of subsystems for monitoring and analysis of security events. The distinctive aspect of the approach is consideration of interrelations and cyber threats, arising when SCADA is integrated with the unified enterprise information system.

  13. A design pattern for event-based processing of security-enriched SOAP messages

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko; Lo Iacono, Luigi

    2010-01-01

    For Web Services in Cloud Computing contexts, the efficient processing of XML documents is a major topic of interest. Especially for WS-Security-enriched messages, processing performance nowadays tends to become a major issue. Streaming XML processing approaches lead to valuable optimization due...

  14. Teaching Absolute Value Meaningfully

    Science.gov (United States)

    Wade, Angela

    2012-01-01

    What is the meaning of absolute value? And why do teachers teach students how to solve absolute value equations? Absolute value is a concept introduced in first-year algebra and then reinforced in later courses. Various authors have suggested instructional methods for teaching absolute value to high school students (Wei 2005; Stallings-Roberts…

  15. Goal-Equivalent Secure Business Process Re-engineering

    DEFF Research Database (Denmark)

    Acosta, Hugo Andrés Lópes; Massacci, Fabio; Zannone, Nicola

    2008-01-01

    The introduction of information technologies in health care systems often requires to re-engineer the business processes used to deliver care. Obviously, the new and re-engineered processes are observationally different and thus we cannot use existing model-based techniques to argue that they are......The introduction of information technologies in health care systems often requires to re-engineer the business processes used to deliver care. Obviously, the new and re-engineered processes are observationally different and thus we cannot use existing model-based techniques to argue...

  16. System of economics' security management in economic activity of meat processing enterprises formation

    Directory of Open Access Journals (Sweden)

    Iryna Sosnovska

    2015-11-01

    Full Text Available This article is devoted to creation of economics' security management system production and economic activity of meat current processing enterprises. The article reflects research results of various scientists scientific works regarding interpretation of economic security system and shows the lack of this concept single interpretation. There are summarized observation of current activities of meat processing plants specifics as a conclusion there are a large number of different programs and concepts that are embedded in large industrial plants, but they are internal and are not system using. The factors that determine the necessity of system of the economics' security management of enterprises formation are specified. This text highlighted objectives and principles of enterprises system economic security management that clearly reflect its effectiveness in the production of business enterprises.

  17. Towards securing SCADA systems against process-related threats

    NARCIS (Netherlands)

    Hadziosmanovic, Dina; Bolzoni, Damiano; Hartel, Pieter

    2010-01-01

    We propose a tool-assisted approach to address process-related threats on SCADA systems. Process-related threats have not been addressed before in a systematic manner. Our approach consists of two steps: threat analysis and threat mitigation. For the threat analysis, we combine two methodologies (PH

  18. Designing and Securing an Event Processing System for Smart Spaces

    Science.gov (United States)

    Li, Zang

    2011-01-01

    Smart spaces, or smart environments, represent the next evolutionary development in buildings, banking, homes, hospitals, transportation systems, industries, cities, and government automation. By riding the tide of sensor and event processing technologies, the smart environment captures and processes information about its surroundings as well as…

  19. Designing and Securing an Event Processing System for Smart Spaces

    Science.gov (United States)

    Li, Zang

    2011-01-01

    Smart spaces, or smart environments, represent the next evolutionary development in buildings, banking, homes, hospitals, transportation systems, industries, cities, and government automation. By riding the tide of sensor and event processing technologies, the smart environment captures and processes information about its surroundings as well as…

  20. 78 FR 22361 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Science.gov (United States)

    2013-04-15

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations of Unfairness, Prejudice, Partiality, Bias, Misconduct, or Discrimination by Administrative...

  1. 78 FR 8217 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Science.gov (United States)

    2013-02-05

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations of Unfairness, Prejudice, Partiality, Bias, Misconduct, or Discrimination by Administrative...

  2. 78 FR 9987 - Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations...

    Science.gov (United States)

    2013-02-12

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Social Security Ruling, SSR 13-1p; Titles II and XVI: Agency Processes for Addressing Allegations of Unfairness, Prejudice, Partiality, Bias, Misconduct, or Discrimination by Administrative...

  3. Threat prioritization process For the Czech Security Strategy making/Proces prioritizace hrozeb pro tvorbu bezpecnostni Strategie Ceske Republiky

    National Research Council Canada - National Science Library

    Balaban, Milos; Krulik, Oldrich; Krulik, Vladimir; Ludvik, Jan; Moravec, Ludek; Rasek, Antonin; Stejskal, Libor

    2012-01-01

    This article offers systematic view of a process of identification of security threats and, subsequently, their use in the making of strategic documents, notably the Security Strategy of the Czech Republic...

  4. Absolute airborne gravimetry

    Science.gov (United States)

    Baumann, Henri

    This work consists of a feasibility study of a first stage prototype airborne absolute gravimeter system. In contrast to relative systems, which are using spring gravimeters, the measurements acquired by absolute systems are uncorrelated and the instrument is not suffering from problems like instrumental drift, frequency response of the spring and possible variation of the calibration factor. The major problem we had to resolve were to reduce the influence of the non-gravitational accelerations included in the measurements. We studied two different approaches to resolve it: direct mechanical filtering, and post-processing digital compensation. The first part of the work describes in detail the different mechanical passive filters of vibrations, which were studied and tested in the laboratory and later in a small truck in movement. For these tests as well as for the airborne measurements an absolute gravimeter FG5-L from Micro-G Ltd was used together with an Inertial navigation system Litton-200, a vertical accelerometer EpiSensor, and GPS receivers for positioning. These tests showed that only the use of an optical table gives acceptable results. However, it is unable to compensate for the effects of the accelerations of the drag free chamber. The second part describes the strategy of the data processing. It is based on modeling the perturbing accelerations by means of GPS, EpiSensor and INS data. In the third part the airborne experiment is described in detail, from the mounting in the aircraft and data processing to the different problems encountered during the evaluation of the quality and accuracy of the results. In the part of data processing the different steps conducted from the raw apparent gravity data and the trajectories to the estimation of the true gravity are explained. A comparison between the estimated airborne data and those obtained by ground upward continuation at flight altitude allows to state that airborne absolute gravimetry is feasible and

  5. 10 CFR 1016.8 - Approval for processing access permittees for security facility approval.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Approval for processing access permittees for security facility approval. 1016.8 Section 1016.8 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) SAFEGUARDING OF... approval. (a) An access permittee who has a need to use, process, store, reproduce, transmit, or handle...

  6. Biometric Secured Result Processing Software For Nigerian Tertiary Institutions

    Directory of Open Access Journals (Sweden)

    Oladipo Oluwasegun

    2015-08-01

    Full Text Available Abstract One of the challenges facing result processing in Nigerian tertiary institutions is the problem of insecurity. Untraceable changes are made to students result and this result to various disasters such as innocent people losing their jobs since their innocence cannot be proven. Biometric based systems operate on behavioral and physiological biometric data to identify a person and grant required access to a user. Physiological characteristics such as fingerprint remains unchanged throughout an individuals life time and thus it can serve as a viable means of identifying and authenticating users who are to access a system. In this study fingerprint biometric based result processing software is developed to ensure that users are well authenticated and are made to see only what they are pre-configured to see and work with. The fingerprint authentication system was developed using visual basic.net. Staff fingerprints were enrolled into the system to form a biometric template which the system validates against at every login attempt on the result processing software. The digital personal one touch ID sdk and other libraries were used in developing the authentication system. The result processing software also ensures that all write transactions to the database are confirmed and identified by forcing another biometric authentication at the point of making a write request to the web server and associated database. This ensures that the exact person initiating the transaction was the same user who logged in to the application. The users identified at login and various confirmation milestones set for write transactions are logged into a table for future reference and audit trail. Conclusively the developed system has helped to eradicate the problem of user impersonation by ensuring only authorized users are made to access the software and in-turn participate in result processing activities.

  7. An efficient forward-secure group certificate digital signature scheme to enhance EMR authentication process.

    Science.gov (United States)

    Yu, Yao-Chang; Hou, Ting-Wei

    2014-05-01

    The frequently used digital signature algorithms, such as RSA and the Digital Signature Algorithm (DSA), lack forward-secure function. The result is that, when private keys are renewed, trustworthiness is lost. In other words, electronic medical records (EMRs) signed by revoked private keys are no longer trusted. This significant security threat stands in the way of EMR adoption. This paper proposes an efficient forward-secure group certificate digital signature scheme that is based on Shamir's (t,n) threshold scheme and Schnorr's digital signature scheme to ensure trustworthiness is maintained when private keys are renewed and to increase the efficiency of EMRs' authentication processes in terms of number of certificates, number of keys, forward-secure ability and searching time.

  8. Zephyr: A secure Internet process to streamline engineering

    Energy Technology Data Exchange (ETDEWEB)

    Jordan, C.W.; Niven, W.A.; Cavitt, R.E. [and others

    1998-05-12

    Lawrence Livermore National Laboratory (LLNL) is implementing an Internet-based process pilot called `Zephyr` to streamline engineering and commerce using the Internet. Major benefits have accrued by using Zephyr in facilitating industrial collaboration, speeding the engineering development cycle, reducing procurement time, and lowering overall costs. Programs at LLNL are potentializing the efficiencies introduced since implementing Zephyr. Zephyr`s pilot functionality is undergoing full integration with Business Systems, Finance, and Vendors to support major programs at the Laboratory.

  9. Security Evaluation of Power Network Information System Based on Analytic Network Process

    Directory of Open Access Journals (Sweden)

    Jianchang Lu

    2013-04-01

    Full Text Available After the building of the power network, many enterprises are faced with a potential information security issue, the unstable factors threaten to the normal operation of the network information system, which is caused by the computer network defects. Aiming at this point, potential security dangers of power network information system were analyzed. Then an index system based on the security evaluation of power network information systems was established. Applying the analytic network process to get the weights of each index, the evaluation process can be accessed by fuzzy comprehensive evaluation method. The weights of each index are decided by ANP, which can remedy the defects of analytic hierarchy process that the interaction among indexes cannot be reflected. Example analysis is performed by the Super Decisions software to verify feasibility and effectiveness of the proposed evaluation model mentioned in the paper.

  10. Use of a participatory planning process as a way to build community food security.

    Science.gov (United States)

    McCullum, Christine; Pelletier, David; Barr, Donald; Wilkins, Jennifer

    2002-07-01

    The purpose of this study was to determine the multiple meanings of community food security among stakeholders with diverse interests and to assess the degree to which these stakeholders could find common ground around community food security during a participatory planning process called a search conference. The conceptual framework of citizen politics guided all aspects of the research design. In-depth, qualitative interviews were conducted with 44 participants purposefully recruited to attend a 2 1/2 h-day search conference. Open-ended questionnaires were distributed to all participants during the search conference, and a document review was performed. Prior to the search conference, 4 community food secruity groups emerged: anti-hunger advocates (n=12), agricultural visionaries (n=12), food traditionalists (n=10), and agricultural entrepreneurs (n=8). Participants were able to find common ground around 6 community food security action agendas: distribution of surplus food, education, family and community values, food processing and marketing, legislative initiatives and action, and new agriculture. Other salient community food security issues emerged, but they were not included on any of the action agendas. Formal training in facilitation, negotiation, conflict resolution, and how to influence the public policy-making process will enable dietetics professionals to effectively collaborate with community-based groups that have a stake in food security issues.

  11. Markovian Process and Novel Secure Algorithm for Big Data in Two-Hop Wireless Networks

    Directory of Open Access Journals (Sweden)

    K. Thiagarajan

    2015-06-01

    Full Text Available This paper checks the correctness of our novel algorithm for secure, reliable and flexible transmission of big data in two-hop wireless networks using cooperative jamming scheme of attacker location unknown through Markovian process. Big data has to transmit in two-hop from source-to-relay and relay-to-destination node by deploying security in physical layer. Based on our novel algorithm, the nodes of the network can be identifiable, the probability value of the data absorbing nodes namely capture node C, non-capture node NC, eavesdropper node E, in each level depends upon the present level to the next level, the probability of transition between two nodes is same at all times in a given time slot to ensure more secure transmission of big data. In this paper, maximum probability for capture nodes is considered to justify the efficient transmission of big data through Markovian process.

  12. Measuring Security of Web Services in Requirement Engineering Phase

    Directory of Open Access Journals (Sweden)

    Davoud Mougouei

    2015-05-01

    Full Text Available Addressing security in early stages of web service development has always been a major engineering trend. However, to assure security of web services it is required to perform security evaluation in a rigorous and tangible manner. The results of such an evaluation if performed in early stages of the development process can be used to improve the quality of the target web service. On the other hand, it is impossible to remove all of the security faults during the security analysis of web services. As a result, absolute security is never possible to achieve and a security failure may occur during the execution of web service. To avoid security failures, a measurable level of fault tolerance is required to be achieved through partial satisfaction of security goals. Thus any proposed measurement technique must care for this partiality. Even though there are some approaches toward assessing the security of web services but still there is no precise model for evaluation of security goal satisfaction specifically during the requirement engineering phase. This paper introduces a Security Measurement Model (SMM for evaluating the Degree of Security (DS in security requirements of web services by taking into consideration partial satisfaction of security goals. The proposed model evaluates overall security of the target service through measuring the security in Security Requirement Model (SRM of the service. The proposed SMM also takes into account cost, technical ability, impact and flexibility as the key features of security evaluation.

  13. Absolute polarimetry at RHIC

    CERN Document Server

    Okada, H; Bravar, A; Bunce, G; Dhawan, S; Eyser, K O; Gill, R; Haeberli, W; Huang, H; Jinnouchi, O; Makdisi, Y; Nakagawa, I; Nass, A; Saitô, N; Stephenson, E; Sviridia, D; Wise, T; Wood, J; Zelenski, A

    2007-01-01

    Precise and absolute beam polarization measurements are critical for the RHIC spin physics program. Because all experimental spin-dependent results are normalized by beam polarization, the normalization uncertainty contributes directly to final physics uncertainties. We aimed to perform the beam polarization measurement to an accuracy of $\\Delta P_{beam}/P_{beam} < 5%$. The absolute polarimeter consists of Polarized Atomic Hydrogen Gas Jet Target and left-right pairs of silicon strip detectors and was installed in the RHIC-ring in 2004. This system features \\textit{proton-proton} elastic scattering in the Coulomb nuclear interference (CNI) region. Precise measurements of the analyzing power $A_N$ of this process has allowed us to achieve $\\Delta P_{beam}/P_{beam} =4.2%$ in 2005 for the first long spin-physics run. In this report, we describe the entire set up and performance of the system. The procedure of beam polarization measurement and analysis results from 2004-2005 are described. Physics topics of $A...

  14. A Risk Management Process for Consumers: The Next Step in Information Security

    NARCIS (Netherlands)

    van Cleeff, A.

    2010-01-01

    Simply by using information technology, consumers expose themselves to considerable security risks. Because no technical or legal solutions are readily available, and awareness programs have limited impact, the only remedy is to develop a risk management process for consumers. Consumers need to

  15. Developing a new assessment procedure of social information processing in adolescents within secure residential care

    NARCIS (Netherlands)

    van Rest, Maaike M.; van Bokhoven, Irene; van Nieuwenhuijzen, Maroesjka; Embregts, Petri J. C. M.; Vriens, Aart; Matthys, Walter

    2014-01-01

    The purpose of the present study was to develop a new assessment procedure of social information processing (SIP) for adolescents, to explore its validity and to examine whether it differentiated between IQ groups. Ninety-four adolescents within secure residential care were administered the SIP inst

  16. "An absolutely necessary piece": A qualitative study of legal perspectives on medical affidavits in the asylum process.

    Science.gov (United States)

    Scruggs, Elizabeth; Guetterman, Timothy C; Meyer, Anna C; VanArtsdalen, Jamie; Heisler, Michele

    2016-11-01

    A key challenge for asylum seekers in the United States is being able to provide evidence of prior persecution in their home countries. Medical/psychological affidavits corroborating applicants' accounts often make the difference between successful and unsuccessful applications. The purpose of this study was to identify the unmet demand for and features of effective medical/psychological affidavits in the asylum process, as well as the personal and systemic barriers for asylum seekers. This is a qualitative study of semi-structured interviews with legal professionals who work in asylum law. Sixteen asylum lawyers and one Board of Immigration Appeals accredited representative practicing in the state of Michigan, United States, participated in this study. All participants noted that a vast majority of their asylum cases would benefit from a medical affidavit but that they have difficulty finding qualified physicians with experience writing such affidavits and testifying as expert witnesses. The major barriers to obtaining medical/psychological evaluations included inability to pay for services, lack of practitioner availability, and lack of practitioner training. The participants reported that features of a strong medical affidavit included clear, concise, and corroborative accounts that supported the applicant's story from a diagnostic perspective and forensic descriptions that reinforced the credibility of the applicant. Several also noted that medical/psychological evaluations frequently would reveal additional details and incidents of trauma beyond those stated in the applicant's preliminary statement. The study results suggest substantial unmet need for trained physicians to perform medical and psychological evaluations on a pro bono basis. Lawyers' recommendations regarding effective medical affidavits and necessary ongoing support for asylum applicants should inform current efforts to improve physician and lawyer collaborations on asylum cases. Copyright

  17. WPA/WPA2 Password Security Testing using Graphics Processing Units

    OpenAIRE

    Sorin Andrei Visan

    2013-01-01

    This thesis focuses on the testing of WPA/WPA 2 password strength. Recently, due to progress in calculation power and technology, new factors must be taken into account when choosing a WPA/WPA2 secure password. A study regarding the security of the current deployed password is reported here.Harnessing the computational power of a single and old generation GPU (NVIDIA 610M released in December 2011), we have accelerated the process of recovering a password up to 3 times faster than in the case...

  18. Secured Communication for Business Process Outsourcing Using Optimized Arithmetic Cryptography Protocol Based on Virtual Parties

    Science.gov (United States)

    Pathak, Rohit; Joshi, Satyadhar

    Within a span of over a decade, India has become one of the most favored destinations across the world for Business Process Outsourcing (BPO) operations. India has rapidly achieved the status of being the most preferred destination for BPO for companies located in the US and Europe. Security and privacy are the two major issues needed to be addressed by the Indian software industry to have an increased and long-term outsourcing contract from the US. Another important issue is about sharing employee’s information to ensure that data and vital information of an outsourcing company is secured and protected. To ensure that the confidentiality of a client’s information is maintained, BPOs need to implement some data security measures. In this paper, we propose a new protocol for specifically for BPO Secure Multi-Party Computation (SMC). As there are many computations and surveys which involve confidential data from many parties or organizations and the concerned data is property of the organization, preservation and security of this data is of prime importance for such type of computations. Although the computation requires data from all the parties, but none of the associated parties would want to reveal their data to the other parties. We have proposed a new efficient and scalable protocol to perform computation on encrypted information. The information is encrypted in a manner that it does not affect the result of the computation. It uses modifier tokens which are distributed among virtual parties, and finally used in the computation. The computation function uses the acquired data and modifier tokens to compute right result from the encrypted data. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved. Also we have analyzed the specific case of Indian BPO.

  19. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  20. Absolute nuclear material assay

    Science.gov (United States)

    Prasad, Manoj K [Pleasanton, CA; Snyderman, Neal J [Berkeley, CA; Rowland, Mark S [Alamo, CA

    2012-05-15

    A method of absolute nuclear material assay of an unknown source comprising counting neutrons from the unknown source and providing an absolute nuclear material assay utilizing a model to optimally compare to the measured count distributions. In one embodiment, the step of providing an absolute nuclear material assay comprises utilizing a random sampling of analytically computed fission chain distributions to generate a continuous time-evolving sequence of event-counts by spreading the fission chain distribution in time.

  1. Security Risk Assessment Process for UAS in the NAS CNPC Architecture

    Science.gov (United States)

    Iannicca, Dennis Christopher; Young, Daniel Paul; Suresh, Thadhani; Winter, Gilbert A.

    2013-01-01

    This informational paper discusses the risk assessment process conducted to analyze Control and Non-Payload Communications (CNPC) architectures for integrating civil Unmanned Aircraft Systems (UAS) into the National Airspace System (NAS). The assessment employs the National Institute of Standards and Technology (NIST) Risk Management framework to identify threats, vulnerabilities, and risks to these architectures and recommends corresponding mitigating security controls. This process builds upon earlier work performed by RTCA Special Committee (SC) 203 and the Federal Aviation Administration (FAA) to roadmap the risk assessment methodology and to identify categories of information security risks that pose a significant impact to aeronautical communications systems. A description of the deviations from the typical process is described in regards to this aeronautical communications system. Due to the sensitive nature of the information, data resulting from the risk assessment pertaining to threats, vulnerabilities, and risks is beyond the scope of this paper

  2. Digital image processing in the SECURE concealed-object detection system

    Science.gov (United States)

    Smith, Steven W.

    1993-04-01

    A new technology has been developed for detecting explosives and other dangerous objects concealed under persons' clothing. The 'Subambient Exposure, Computer Utilized Reflected Energy' (SECURE) method uses a very low level of back-scattered x-rays in conjunction with digital image processing to produce an image of the person and any concealed objects. Image processing algorithms, used in the system are directed at presenting information to a human operator in the best possible manner for foreign object detection. These algorithms are viewed as being near optimum, and additional development is probably not justified. Algorithm development is needed in the area of automatic threat detection. This has the potential of reducing the invasion of privacy associated with having a security operator view each image. It also has the potential of reducing the serious problem of operator complacency. In one approach, the new algorithm must (1) recognize and isolate objects in the image, (2) discriminate between concealed objects and human anatomy, and (3) discriminate between dangerous and benign concealed objects. The images produced with the SECURE technology are extremely noisy due to the low levels of radiation used. Any algorithm developed must perform well in this noisy environment. Execution of the algorithm must be accomplished in less than a few seconds. Hardware to implement the algorithm must be of a complexity and cost compatible with the commercial SECURE system.

  3. Managing information security in a process industrial environment; Gestao de seguranca da informacao em processos industriais

    Energy Technology Data Exchange (ETDEWEB)

    Pereira, Raphael Gomes; Aguiar, Leandro Pfleger de [Siemens Company (Brazil)

    2008-07-01

    With the recently globalization expansion (growth), the exploration of energetic resources is crossing over countries boundaries, resulting in worldwide companies exploring Oil and Gas fields available in any place of the world. To the government's bodies, this information about those fields should be treated as a national security interest subject by bringing an adequate management and protection to all the important and critical information and assets, and making possible, at the same time, the freedom and transparency in concurrence processes. This create a complex security context to be managed, where information disruption might, for instance, imply in broke of integrity in public auctions processes as a result of privileged information usage. Furthermore, with the terrorism problem, the process itself becomes an attractive target for different kinds of attacks, motivated by the opportunism to explore the known incapacity of the big industries in well manage their large and complex environments. With all transformations that are happening in productive processes, as the growing TCP/IP protocol usage, the Windows operating systems adoption in SCADA systems and the integration of industrial with business network, are factors that contribute to an eminent landscape of problems. This landscape demonstrates the need from the organizations and countries that are operating in energetic resources exploration, for renew their risk management areas, establishing a unique and integrated process to protect information security infrastructure. This work presents a study of the challenges to be faced by the organizations while rebuilding their internal processes to integrate the risk management and information security areas, as long as a set of essential steps to establish an affective corporative governance of risk management and compliance aspects. Moreover, the work presents the necessary points of the government involvement to improve all the regulatory aspects

  4. Absolute neutrino mass update

    CERN Document Server

    Päs, H; P\\"as, Heinrich; Weiler, Thomas J.

    2002-01-01

    The determination of absolute neutrino masses is crucial for the understanding of theories underlying the standard model, such as SUSY. We review the experimental prospects to determine absolute neutrino masses and the correlations among approaches, using the Delta m^2's inferred from neutrino oscillation experiments and assuming a three neutrino Universe.

  5. ABSOLUTE NEUTRINO MASSES

    DEFF Research Database (Denmark)

    Schechter, J.; Shahid, M. N.

    2012-01-01

    We discuss the possibility of using experiments timing the propagation of neutrino beams over large distances to help determine the absolute masses of the three neutrinos.......We discuss the possibility of using experiments timing the propagation of neutrino beams over large distances to help determine the absolute masses of the three neutrinos....

  6. Optimisation of the securities portfolio as a part of the risk management process

    Directory of Open Access Journals (Sweden)

    Srečko Devjak

    2004-01-01

    Full Text Available Securities of Slovene companies are listed at the Ljubljana Stock Exchange. Market capitalisation at the Ljubljana Stock Exchange has been growing since 1996 due to new listings of equities. On the basis of financial data time series for listed equities, the financial investor can calculate a risk for each individual security with a selected risk measure and can determine an optimal portfolio, subject to selected constraints. In this paper, we shall consequently determine an optimal portfolio of equities for the financial investor, investing his assets only in selected equities listed at the Ljubljana Stock Exchange. Selecting an appropriate risk measure is especially important for a commercial bank in a risk management process. Commercial banks can use internal models in the risk management process and for the purpose of capital charges as well. An optimal portfolio will be calculated, using a non-linear mathematical model.

  7. Real-time network security situation visualization and threat assessment based on semi-Markov process

    Science.gov (United States)

    Chen, Junhua

    2013-03-01

    To cope with a large amount of data in current sensed environments, decision aid tools should provide their understanding of situations in a time-efficient manner, so there is an increasing need for real-time network security situation awareness and threat assessment. In this study, the state transition model of vulnerability in the network based on semi-Markov process is proposed at first. Once events are triggered by an attacker's action or system response, the current states of the vulnerabilities are known. Then we calculate the transition probabilities of the vulnerability from the current state to security failure state. Furthermore in order to improve accuracy of our algorithms, we adjust the probabilities that they exploit the vulnerability according to the attacker's skill level. In the light of the preconditions and post-conditions of vulnerabilities in the network, attack graph is built to visualize security situation in real time. Subsequently, we predict attack path, recognize attack intention and estimate the impact through analysis of attack graph. These help administrators to insight into intrusion steps, determine security state and assess threat. Finally testing in a network shows that this method is reasonable and feasible, and can undertake tremendous analysis task to facilitate administrators' work.

  8. Rethinking maternal sensitivity: mothers' comments on infants' mental processes predict security of attachment at 12 months.

    Science.gov (United States)

    Meins, E; Fernyhough, C; Fradley, E; Tuckey, M

    2001-07-01

    This study investigated predictors of attachment security in a play context using a sample of 71 mothers and their 6-month-old infants. We sought to rethink the concept of maternal sensitivity by focusing on mothers' ability accurately to read the mental states governing infant behaviour. Five categories were devised to assess this ability, four of which were dependent on maternal responses to infant behaviours, such as object-directed activity. The fifth, mothers' Appropriate minded-related comments, assessed individual differences in mothers' proclivity to comment appropriately on their infants' mental states and processes. Higher scores in this fifth category related to a secure attachment relationship at 12 months. Maternal sensitivity and Appropriate mind-related comments were independent predictors of attachment security at 12 months, respectively accounting for 6.5% and 12.7% of its variance. We suggest that these findings are in line with current theorising on internal working models of attachment, and may help to explain security-related differences in mentalising abilities.

  9. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    Energy Technology Data Exchange (ETDEWEB)

    Madden, Michael S.

    2010-05-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  10. Priming the Secure Attachment Schema Affects the Emotional Face Processing Bias in Attachment Anxiety: An fMRI Research.

    Science.gov (United States)

    Tang, Qingting; Chen, Xu; Hu, Jia; Liu, Ying

    2017-01-01

    Our study explored how priming with a secure base schema affects the processing of emotional facial stimuli in individuals with attachment anxiety. We enrolled 42 undergraduate students between 18 and 27 years of age, and divided them into two groups: attachment anxiety and attachment secure. All participants were primed under two conditions, the secure priming using references to the partner, and neutral priming using neutral references. We performed repeated attachment security priming combined with a dual-task paradigm and functional magnetic resonance imaging. Participants' reaction times in terms of responding to the facial stimuli were also measured. Attachment security priming can facilitate an individual's processing of positive emotional faces; for instance, the presentation of the partner's name was associated with stronger activities in a wide range of brain regions and faster reaction times for positive facial expressions in the subjects. The current finding of higher activity in the left-hemisphere regions for secure priming rather than neutral priming is consistent with the prediction that attachment security priming triggers the spread of the activation of a positive emotional state. However, the difference in brain activity during processing of both, positive and negative emotional facial stimuli between the two priming conditions appeared in the attachment anxiety group alone. This study indicates that the effect of attachment secure priming on the processing of emotional facial stimuli could be mediated by chronic attachment anxiety. In addition, it highlights the association between higher-order processes of the attachment system (secure attachment schema priming) and early-stage information processing system (attention), given the increased attention toward the effects of secure base schema on the processing of emotion- and attachment-related information among the insecure population. Thus, the following study has applications in providing

  11. A design pattern for event-based processing of security-enriched SOAP messages

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko; Lo Iacono, Luigi

    2010-01-01

    For Web Services in Cloud Computing contexts, the efficient processing of XML documents is a major topic of interest. Especially for WS-Security-enriched messages, processing performance nowadays tends to become a major issue. Streaming XML processing approaches lead to valuable optimization due...... to lower resource consumption, but their adoption requires major conceptional changes in the processing application. In this paper, we present a pattern for architectural concepts that employ the SAX-based streaming processing approach. Its major benefit - apart from providing the performance advantage...... - consists in a convenient, modular architecture that can easily be extended with new modules and new types of events without modification of existing modules. © 2010 IEEE....

  12. Sustaining World Food Security with Improved Cassava Processing Technology: The Nigeria Experience

    Directory of Open Access Journals (Sweden)

    Peter O. Kolawole

    2010-11-01

    Full Text Available Cassava is a very important food crop that is capable of providing food security. However, a lot of problems prevent the development and use of modern equipment for its production. Most of the cassava produced still comes from peasant farmers who depend on manual tools for their field operations and these farmers have made Nigeria the world’s largest producer of the crop. An increase in production of cassava to sustain the world food security needs improved machinery to allow its continuous cultivation and processing. Reasons for the low success recorded in the mechanization of cassava harvesting and processing were traced, and the attempts that have been made in the recent past by various engineers in Nigeria researching towards achieving mechanized harvesting and processing of cassava are well explained. The machinery required for cassava production in Africa, the development of new machines, and the need for more research and development in harvesting and processing machineries, which can reduce poverty worldwide and make food available and accessible for all, are also discussed. Research efforts made and the challenges facing the engineers, farmers, scientists and food processors towards achieving mechanical harvesting and processing of cassava are presented. Breeding a cassava variety with a regular shape for easy mechanization is one solution that could help the engineers worldwide.

  13. NGS Absolute Gravity Data

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The NGS Absolute Gravity data (78 stations) was received in July 1993. Principal gravity parameters include Gravity Value, Uncertainty, and Vertical Gradient. The...

  14. Decoherence at absolute zero

    OpenAIRE

    Sinha, Supurna

    2005-01-01

    We present an analytical study of the loss of quantum coherence at absolute zero. Our model consists of a harmonic oscillator coupled to an environment of harmonic oscillators at absolute zero. We find that for an Ohmic bath, the offdiagonal elements of the density matrix in the position representation decay as a power law in time at late times. This slow loss of coherence in the quantum domain is qualitatively different from the exponential decay observed in studies of high temperature envir...

  15. Absolute biological needs.

    Science.gov (United States)

    McLeod, Stephen

    2014-07-01

    Absolute needs (as against instrumental needs) are independent of the ends, goals and purposes of personal agents. Against the view that the only needs are instrumental needs, David Wiggins and Garrett Thomson have defended absolute needs on the grounds that the verb 'need' has instrumental and absolute senses. While remaining neutral about it, this article does not adopt that approach. Instead, it suggests that there are absolute biological needs. The absolute nature of these needs is defended by appeal to: their objectivity (as against mind-dependence); the universality of the phenomenon of needing across the plant and animal kingdoms; the impossibility that biological needs depend wholly upon the exercise of the abilities characteristic of personal agency; the contention that the possession of biological needs is prior to the possession of the abilities characteristic of personal agency. Finally, three philosophical usages of 'normative' are distinguished. On two of these, to describe a phenomenon or claim as 'normative' is to describe it as value-dependent. A description of a phenomenon or claim as 'normative' in the third sense does not entail such value-dependency, though it leaves open the possibility that value depends upon the phenomenon or upon the truth of the claim. It is argued that while survival needs (or claims about them) may well be normative in this third sense, they are normative in neither of the first two. Thus, the idea of absolute need is not inherently normative in either of the first two senses.

  16. Adapting Rational Unified Process (RUP) approach in designing a secure e-Tendering model

    Science.gov (United States)

    Mohd, Haslina; Robie, Muhammad Afdhal Muhammad; Baharom, Fauziah; Darus, Norida Muhd; Saip, Mohamed Ali; Yasin, Azman

    2016-08-01

    e-Tendering is an electronic processing of the tender document via internet and allow tenderer to publish, communicate, access, receive and submit all tender related information and documentation via internet. This study aims to design the e-Tendering system using Rational Unified Process approach. RUP provides a disciplined approach on how to assign tasks and responsibilities within the software development process. RUP has four phases that can assist researchers to adjust the requirements of various projects with different scope, problem and the size of projects. RUP is characterized as a use case driven, architecture centered, iterative and incremental process model. However the scope of this study only focusing on Inception and Elaboration phases as step to develop the model and perform only three of nine workflows (business modeling, requirements, analysis and design). RUP has a strong focus on documents and the activities in the inception and elaboration phases mainly concern the creation of diagrams and writing of textual descriptions. The UML notation and the software program, Star UML are used to support the design of e-Tendering. The e-Tendering design based on the RUP approach can contribute to e-Tendering developers and researchers in e-Tendering domain. In addition, this study also shows that the RUP is one of the best system development methodology that can be used as one of the research methodology in Software Engineering domain related to secured design of any observed application. This methodology has been tested in various studies in certain domains, such as in Simulation-based Decision Support, Security Requirement Engineering, Business Modeling and Secure System Requirement, and so forth. As a conclusion, these studies showed that the RUP one of a good research methodology that can be adapted in any Software Engineering (SE) research domain that required a few artifacts to be generated such as use case modeling, misuse case modeling, activity

  17. Absolute luminosity measurements at LHCb

    CERN Document Server

    Hopchev, Plamen

    2011-01-01

    Absolute luminosity measurements are of general interest for colliding-beam experiments at storage rings. These measurements are necessary to determine the absolute cross-sections of reaction processes and are valuable to quantify the performance of the accelerator. LHCb has applied two methods to determine the absolute scale of its luminosity measurements for proton-proton collisions at the LHC running at a centre-of-mass energy of 7 TeV. In addition to the classic ``van der Meer'' scan method a novel technique has been developed which makes use of direct imaging of the individual beams using both proton-gas and proton-proton interactions. The beam imaging method is made possible by the high resolution of the LHCb vertex detector and the close proximity of the detector to the beams, and allows beam parameters such as positions, angles and widths to be determined. We describe both methods and compare the two results. In addition, we present the techniques used to transport the absolute luminosity measurement ...

  18. Absolute nutrient concentration measurements in cell culture media: 1H q-NMR spectra and data to compare the efficiency of pH-controlled protein precipitation versus CPMG or post-processing filtering approaches

    Directory of Open Access Journals (Sweden)

    Luca Goldoni

    2016-09-01

    Full Text Available The NMR spectra and data reported in this article refer to the research article titled “A simple and accurate protocol for absolute polar metabolite quantification in cell cultures using q-NMR” [1]. We provide the 1H q-NMR spectra of cell culture media (DMEM after removal of serum proteins, which show the different efficiency of various precipitating solvents, the solvent/DMEM ratios, and pH of the solution. We compare the data of the absolute nutrient concentrations, measured by PULCON external standard method, before and after precipitation of serum proteins and those obtained using CPMG (Carr-Purcell-Meiboom-Gill sequence or applying post-processing filtering algorithms to remove, from the 1H q-NMR spectra, the proteins signal contribution. For each of these approaches, the percent error in the absolute value of every measurement for all the nutrients is also plotted as accuracy assessment.

  19. The Design Process of Physical Security as Applied to a U.S. Border Point of Entry

    Energy Technology Data Exchange (ETDEWEB)

    Wagner, G.G.

    1998-10-26

    This paper describes the design process of physical security as applied to a U.S. Border Port of Entry (PoE). Included in this paper are descriptions of the elements that compose U.S. border security. The physical security design will describe the various elements that make up the process as well as the considerations that must be taken into account when dealing with system integration of those elements. The distinctions between preventing unlawful entry and exit of illegal contraband will be emphasized.

  20. Database Security for an Integrated Solution to Automate Sales Processes in Banking

    Directory of Open Access Journals (Sweden)

    Alexandra Maria Ioana FLOREA

    2013-05-01

    Full Text Available In order to maintain a competitive edge in a very active banking market the implementation of a web-based solution to standardize, optimize and manage the flow of sales / pre-sales and generating new leads is requested by a company. This article presents the realization of a development framework for software interoperability in the banking financial institutions and an integrated solution for achieving sales process automation in banking. The paper focuses on presenting the requirements for security and confidentiality of stored data and also on presenting the identified techniques and procedures to implement these requirements.

  1. Financial security of the state in terms of globalization processes escalation

    Directory of Open Access Journals (Sweden)

    Svitlana Tkalenko

    2013-02-01

    Full Text Available The article provides review of the globalization and global integration processes impact on the financial sector formation characterized by an increase in financial flows with the lead role played by transnational corporations and transnational banks. The globalization study has been already reflected by numerous scientific publications and various issues of reputable international academic journals describing the process as irreversible and objective along with demonstrating globalization merits and demerits, etc. In the 21st century, globalization is an issue discussed by everyone: ranging from presidents, prime ministers and members of parliament supposed to solve problems of any scale taking into consideration the global development phenomenon, to ordinary citizens. Today, globalization has obviously become a major trend of the modern world development, which is why issues implying sound development assurance become pressing for each country. The article dwells upon the main component of economic security — the financial one (Ukraine case study. Thus, we are engaged in studying the global development trend in terms of assuring security of the state under conditions of financial flows globalization and existence of global integration processes.

  2. Aerial secure display by use of polarization-processing display with retarder film and retro-reflector

    Science.gov (United States)

    Ito, Shusei; Uchida, Keitaro; Mizushina, Haruki; Suyama, Shiro; Yamamoto, Hirotsugu

    2017-02-01

    Security is one of the big issues in automated teller machine (ATM). In ATM, two types of security have to be maintained. One is to secure displayed information. The other is to secure screen contamination. This paper gives a solution for these two security issues. In order to secure information against peeping at the screen, we utilize visual cryptography for displayed information and limit the viewing zone. Furthermore, an aerial information screen with aerial imaging by retro-reflection, named AIRR enables users to avoid direct touch on the information screen. The purpose of this paper is to propose an aerial secure display technique that ensures security of displayed information as well as security against contamination problem on screen touch. We have developed a polarization-processing display that is composed of a backlight, a polarizer, a background LCD panel, a gap, a half-wave retarder, and a foreground LCD panel. Polarization angle is rotated with the LCD panels. We have constructed a polarization encryption code set. Size of displayed images are designed to limit the viewing position. Furthermore, this polarization-processing display has been introduced into our aerial imaging optics, which employs a reflective polarizer and a retro-reflector covered with a quarter-wave retarder. Polarization-modulated light forms the real image over the reflective polarizer. We have successfully formed aerial information screen that shows the secret image with a limited viewing position. This is the first realization of aerial secure display by use of polarization-processing display with retarder-film and retro-reflector.

  3. Being Secure

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    As the world wrestles with challenges from nontraditional security threats, a new concept of security management is emerging Security has traditionally been seen as the means of defending a territory, primarily through the use of military power. However, as the world evolves through the process of globalization, so too does the concept of security. It now incorporates military, political, economic, societal and environmental issues, as well as the many links that bind them. Yet for most people in the wor...

  4. Security Transition Program Office (STPO), technology transfer of the STPO process, tools, and techniques

    Energy Technology Data Exchange (ETDEWEB)

    Hauth, J.T.; Forslund, C.R.J.; Underwood, J.A.

    1994-09-01

    In 1990, with the transition from a defense mission to environmental restoration, the U.S. Department of Energy`s (DOE`s) Hanford Site began a significant effort to diagnose, redesign, and implement new safeguards and security (SAS) processes. In 1992 the Security Transition Program Office (STPO) was formed to address the sweeping changes that were being identified. Comprised of SAS and other contractor staff with extensive experience and supported by staff experienced in organizational analysis and work process redesign, STPO undertook a series of tasks designed to make fundamental changes to SAS processes throughout the Hanford Site. The goal of STPO is to align the SAS work and organization with the new Site mission. This report describes the key strategy, tools, methods, and techniques used by STPO to change SAS processes at Hanford. A particular focus of this review is transferring STPO`s experience to other DOE sites and federal agency efforts: that is, to extract, analyze, and provide a critical review of the approach, tools, and techniques used by STPO that will be useful to other DOE sites and national laboratories in transitioning from a defense production mode to environmental restoration and other missions. In particular, what lessons does STPO provide as a pilot study or model for implementing change in other transition activities throughout the DOE complex? More broadly, what theoretical and practical contributions do DOE transition efforts, such as STPO, provide to federal agency streamlining efforts and attempts to {open_quotes}reinvent{close_quotes} government enterprises in the public sector? The approach used by STPO should provide valuable information to those examining their own processes in light of new mission requirements.

  5. Towards Realising Secure and Efficient Image and Video Processing Applications on Quantum Computers

    Directory of Open Access Journals (Sweden)

    Abdullah M. Iliyasu

    2013-07-01

    Full Text Available Exploiting the promise of security and efficiency that quantum computing offers, the basic foundations leading to commercial applications for quantum image processing are proposed. Two mathematical frameworks and algorithms to accomplish the watermarking of quantum images, authentication of ownership of already watermarked images and recovery of their unmarked versions on quantum computers are proposed. Encoding the images as 2n-sized normalised Flexible Representation of Quantum Images (FRQI states, with n-qubits and 1-qubit dedicated to capturing the respective information about the colour and position of every pixel in the image respectively, the proposed algorithms utilise the flexibility inherent to the FRQI representation, in order to confine the transformations on an image to any predetermined chromatic or spatial (or a combination of both content of the image as dictated by the watermark embedding, authentication or recovery circuits. Furthermore, by adopting an apt generalisation of the criteria required to realise physical quantum computing hardware, three standalone components that make up the framework to prepare, manipulate and recover the various contents required to represent and produce movies on quantum computers are also proposed. Each of the algorithms and the mathematical foundations for their execution were simulated using classical (i.e., conventional or non-quantum computing resources, and their results were analysed alongside other longstanding classical computing equivalents. The work presented here, combined together with the extensions suggested, provide the basic foundations towards effectuating secure and efficient classical-like image and video processing applications on the quantum-computing framework.

  6. Estimating Absolute Site Effects

    Energy Technology Data Exchange (ETDEWEB)

    Malagnini, L; Mayeda, K M; Akinci, A; Bragato, P L

    2004-07-15

    The authors use previously determined direct-wave attenuation functions as well as stable, coda-derived source excitation spectra to isolate the absolute S-wave site effect for the horizontal and vertical components of weak ground motion. They used selected stations in the seismic network of the eastern Alps, and find the following: (1) all ''hard rock'' sites exhibited deamplification phenomena due to absorption at frequencies ranging between 0.5 and 12 Hz (the available bandwidth), on both the horizontal and vertical components; (2) ''hard rock'' site transfer functions showed large variability at high-frequency; (3) vertical-motion site transfer functions show strong frequency-dependence, and (4) H/V spectral ratios do not reproduce the characteristics of the true horizontal site transfer functions; (5) traditional, relative site terms obtained by using reference ''rock sites'' can be misleading in inferring the behaviors of true site transfer functions, since most rock sites have non-flat responses due to shallow heterogeneities resulting from varying degrees of weathering. They also use their stable source spectra to estimate total radiated seismic energy and compare against previous results. they find that the earthquakes in this region exhibit non-constant dynamic stress drop scaling which gives further support for a fundamental difference in rupture dynamics between small and large earthquakes. To correct the vertical and horizontal S-wave spectra for attenuation, they used detailed regional attenuation functions derived by Malagnini et al. (2002) who determined frequency-dependent geometrical spreading and Q for the region. These corrections account for the gross path effects (i.e., all distance-dependent effects), although the source and site effects are still present in the distance-corrected spectra. The main goal of this study is to isolate the absolute site effect (as a function of frequency

  7. Absolute Gravimetry in Fennoscandia

    DEFF Research Database (Denmark)

    Pettersen, B. R; TImmen, L.; Gitlein, O.

    motions) has its major axis in the direction of southwest to northeast and covers a distance of about 2000 km. Absolute gravimetry was made in Finland and Norway in 1976 with a rise-and fall instrument. A decade later the number of gravity stations was expanded by JILAg-5, in Finland from 1988, in Norway...

  8. CC-Case as an Integrated Method of Security Analysis and Assurance over Life-cycle Process

    Directory of Open Access Journals (Sweden)

    Tomoko Kaneko

    2015-05-01

    Full Text Available Secure system design faces many risks such as information leakage and denial of service. We propose a method named CC-Case to describe se-curity assurance cases based on the security struc-tures and thereat analysis. CC-Case uses Common Criteria (ISO/IEC15408. While the scope of CC-Case mainly focuses to the requirement stage, CC-Case can handle the life-cycle process of sys-tem design that contains the requirement, design, implementation, test and the maintenance stages. It can make countermeasure easily against the situation which an unexpected new threat produced by invisible attackers incessantly.

  9. The Design Process of Physical Security as Applied to a U.S. Border Port of Entry

    Energy Technology Data Exchange (ETDEWEB)

    Wagner, G.G.

    1999-02-22

    This paper details the application of a standard physical security system design process to a US Border Port of Entry (PoE) for vehicle entry/exit. The physical security design methodology is described as well as the physical security similarities to facilities currently at a US Border PoE for vehicles. The physical security design process description includes the various elements that make up the methodologies well as the considerations that must be taken into account when dealing with system integration of those elements. The distinctions between preventing unlawful entry/exit of illegal contraband and personnel are described. The potential to enhance the functions of drug/contraband detection in the Pre-Primary Inspection area through the application of emerging technologies are also addressed.

  10. Proces prioritizace hrozeb pro tvorbu Bezpecnostní strategie Ceské republiky/Threat Prioritization Process for the Czech Security Strategy Making

    National Research Council Canada - National Science Library

    Milos Balabán; Oldrich Krulík; Vladimír Krulík; Jan Ludvík; Ludek Moravec; Antonín Rasek; Libor Stejskal

    2012-01-01

    This article offers systematic view of a process of identification of security threats and, subsequently, their use in the making of strategic documents, notably the Security Strategy of the Czech Republic...

  11. Optical fibre multi-parameter sensing with secure cloud based signal capture and processing

    Science.gov (United States)

    Newe, Thomas; O'Connell, Eoin; Meere, Damien; Yuan, Hongwei; Leen, Gabriel; O'Keeffe, Sinead; Lewis, Elfed

    2016-05-01

    Recent advancements in cloud computing technologies in the context of optical and optical fibre based systems are reported. The proliferation of real time and multi-channel based sensor systems represents significant growth in data volume. This coupled with a growing need for security presents many challenges and presents a huge opportunity for an evolutionary step in the widespread application of these sensing technologies. A tiered infrastructural system approach is adopted that is designed to facilitate the delivery of Optical Fibre-based "SENsing as a Service- SENaaS". Within this infrastructure, novel optical sensing platforms, deployed within different environments, are interfaced with a Cloud-based backbone infrastructure which facilitates the secure collection, storage and analysis of real-time data. Feedback systems, which harness this data to affect a change within the monitored location/environment/condition, are also discussed. The cloud based system presented here can also be used with chemical and physical sensors that require real-time data analysis, processing and feedback.

  12. Design and Analysis of Optimization Algorithms to Minimize Cryptographic Processing in BGP Security Protocols.

    Science.gov (United States)

    Sriram, Vinay K; Montgomery, Doug

    2017-07-01

    The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router.

  13. WPA/WPA2 Password Security Testing using Graphics Processing Units

    Directory of Open Access Journals (Sweden)

    Sorin Andrei Visan

    2013-12-01

    Full Text Available This thesis focuses on the testing of WPA/WPA 2 password strength. Recently, due to progress in calculation power and technology, new factors must be taken into account when choosing a WPA/WPA2 secure password. A study regarding the security of the current deployed password is reported here.Harnessing the computational power of a single and old generation GPU (NVIDIA 610M released in December 2011, we have accelerated the process of recovering a password up to 3 times faster than in the case of using only our CPUs power.We have come to the conclusion that using a modern GPU (mid-end class, the password recovery time could be reduced up to 10 times or even much more faster when using a more elaborate solution such as a GPU cluster service/distributed work between multiple GPUs. This fact should raise an alarm signal to the community as to the way users pick their passwords, as passwords are becoming more and more unsecure as greater calculation power becomes available.

  14. Absolute Neutrino Mass Determination

    CERN Document Server

    Päs, H

    2001-01-01

    We discuss four approaches to the determination of absolute neutrino mass. These are the measurement of the zero-neutrino double beta decay rate, of the tritium decay end-point spectrum, of the cosmic ray spectrum above the GZK cutoff, and the cosmological measurement of the power spectrum governing the CMB and large scale structure. The first two approaches are sensitive to the mass eigenstates coupling to the electron neutrino, whereas the latter two are sensitive to the heavy component of the cosmic neutrino background. All mass eigenstates are related by the $\\Delta m^2$'s inferred from neutrino oscillation data. Consequently, the potential for absolute mass determination of each of the four approaches is correlated with the other three, in ways that we point out.

  15. INDICATOR ANALYSIS IN THE PROCESS OF FINANCIAL SECURITY MANAGEMENT FOR THE WHOLESALE FOODSTUFF SECTOR

    Directory of Open Access Journals (Sweden)

    Rafał Balina

    2016-06-01

    Full Text Available Presented is the indicator analysis in the process of fi nancial security management for Poland’s wholesale foods sector. The study examined 160 wholesalers of foodstuff s, beverages and tobacco products (Polish commercial classifi - cations – PKD – from 46.31z to 46.39z, during the period 2008–2014. The study took advantage of corporate balance sheets, and profi ts and loss accounts of fi rms organized as limited liability entities and companies for scrutiny were chosen randomly. It was found that wholesaler liquidity diffi culty is a signal for other entities of fi nancial commercial stress which can consequently indicate diffi culty in payment for entrusted goods. The study confi rmed that the scrutinized companies have diffi culty in improving their liquidity and profi tability, potentially leading to bankruptcy as a result of negative opinions from potential investors. 

  16. Security of distributed processing of medical image data using JINI technology.

    Science.gov (United States)

    Ruminski, Jacek

    2007-01-01

    Health Care Organizations (HCOs) are highly computerized using broadband networks for data communication within and outside of their departments. However their computer resources are usually task oriented, and not effectively used. Already introduced and new standards for e-Health (e.g. DICOM, TC251-standards) offer workflow management models to organize different resources towards a one, complex task. Distributed processing can be used to implement such models. Similarly, computational resources can be used for any complicated problem-solving task inside a HCO department, between HCO departments and between HCOs. In this article the security analysis of Jini-based computational grids and cost of safeguards introduction is presented. The Jini-based GRID was analyzed in two medical parametric imaging tasks: active, dynamic infrared imaging and dynamic susceptibility contrast imaging (DSC-MRI).

  17. Android Apps for Absolute Beginners

    CERN Document Server

    Jackson, Wallace

    2011-01-01

    Anybody can start building simple apps for the Android platform, and this book will show you how! Android Apps for Absolute Beginners takes you through the process of getting your first Android applications up and running using plain English and practical examples. It cuts through the fog of jargon and mystery that surrounds Android application development, and gives you simple, step-by-step instructions to get you started.* Teaches Android application development in language anyone can understand, giving you the best possible start in Android development * Provides simple, step-by-step exampl

  18. Absolutely Indecomposable Modules

    CERN Document Server

    Göbel, Rüdiger

    2007-01-01

    A module is called absolutely indecomposable if it is directly indecomposable in every generic extension of the universe. We want to show the existence of large abelian groups that are absolutely indecomposable. This will follow from a more general result about R-modules over a large class of commutative rings R with endomorphism ring R which remains the same when passing to a generic extension of the universe. It turns out that `large' in this context has the precise meaning, namely being smaller then the first omega-Erdos cardinal defined below. We will first apply result on large rigid trees with a similar property established by Shelah in 1982, and will prove the existence of related ` R_omega-modules' (R-modules with countably many distinguished submodules) and finally pass to R-modules. The passage through R_omega-modules has the great advantage that the proofs become very transparent essentially using a few `linear algebra' arguments accessible also for graduate students. The result gives a new constru...

  19. Mechanisms of Power within a Community-Based Food Security Planning Process

    Science.gov (United States)

    McCullum, Christine; Pelletier, David; Barr, Donald; Wilkins, Jennifer; Habicht, Jean-Pierre

    2004-01-01

    A community food security movement has begun to address problems of hunger and food insecurity by utilizing a community-based approach. Although various models have been implemented, little empirical research has assessed how power operates within community-based food security initiatives. The purpose of this research was to determine how power…

  20. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  1. Absolute Gravimetry in Fennoscandia

    DEFF Research Database (Denmark)

    Pettersen, B. R; TImmen, L.; Gitlein, O.

    The Fennoscandian postglacial uplift has been mapped geometrically using precise levelling, tide gauges, and networks of permanent GPS stations. The results identify major uplift rates at sites located around the northern part of the Gulf of Bothnia. The vertical motions decay in all directions...... motions) has its major axis in the direction of southwest to northeast and covers a distance of about 2000 km. Absolute gravimetry was made in Finland and Norway in 1976 with a rise-and fall instrument. A decade later the number of gravity stations was expanded by JILAg-5, in Finland from 1988, in Norway...... from 1991, and in Sweden from 1992. FG5 was introduced in these three countries in 1993 (7 stations) and continued with an extended campaign in 1995 (12 stations). In 2003 a project was initiated by IfE, Hannover to collect observations simultaneously with GRACE on an annual cycle. New instruments were...

  2. Optical tweezers absolute calibration

    CERN Document Server

    Dutra, R S; Neto, P A Maia; Nussenzveig, H M

    2014-01-01

    Optical tweezers are highly versatile laser traps for neutral microparticles, with fundamental applications in physics and in single molecule cell biology. Force measurements are performed by converting the stiffness response to displacement of trapped transparent microspheres, employed as force transducers. Usually, calibration is indirect, by comparison with fluid drag forces. This can lead to discrepancies by sizable factors. Progress achieved in a program aiming at absolute calibration, conducted over the past fifteen years, is briefly reviewed. Here we overcome its last major obstacle, a theoretical overestimation of the peak stiffness, within the most employed range for applications, and we perform experimental validation. The discrepancy is traced to the effect of primary aberrations of the optical system, which are now included in the theory. All required experimental parameters are readily accessible. Astigmatism, the dominant effect, is measured by analyzing reflected images of the focused laser spo...

  3. Absolute multilateration between spheres

    Science.gov (United States)

    Muelaner, Jody; Wadsworth, William; Azini, Maria; Mullineux, Glen; Hughes, Ben; Reichold, Armin

    2017-04-01

    Environmental effects typically limit the accuracy of large scale coordinate measurements in applications such as aircraft production and particle accelerator alignment. This paper presents an initial design for a novel measurement technique with analysis and simulation showing that that it could overcome the environmental limitations to provide a step change in large scale coordinate measurement accuracy. Referred to as absolute multilateration between spheres (AMS), it involves using absolute distance interferometry to directly measure the distances between pairs of plain steel spheres. A large portion of each sphere remains accessible as a reference datum, while the laser path can be shielded from environmental disturbances. As a single scale bar this can provide accurate scale information to be used for instrument verification or network measurement scaling. Since spheres can be simultaneously measured from multiple directions, it also allows highly accurate multilateration-based coordinate measurements to act as a large scale datum structure for localized measurements, or to be integrated within assembly tooling, coordinate measurement machines or robotic machinery. Analysis and simulation show that AMS can be self-aligned to achieve a theoretical combined standard uncertainty for the independent uncertainties of an individual 1 m scale bar of approximately 0.49 µm. It is also shown that combined with a 1 µm m‑1 standard uncertainty in the central reference system this could result in coordinate standard uncertainty magnitudes of 42 µm over a slender 1 m by 20 m network. This would be a sufficient step change in accuracy to enable next generation aerospace structures with natural laminar flow and part-to-part interchangeability.

  4. Implementation of a security system in the radiotherapy process; Implantacion de un sistema de seguridad en el proceso radioterapico

    Energy Technology Data Exchange (ETDEWEB)

    Orellana Salas, A.; Melgar Perez, J.; Arrocha Aceveda, J. F.

    2011-07-01

    Systems of work within the field of health are complex. Even the most routine activities involving chain and coordinate a number of actions to be developed by different professionals of different specialties. These systems often fail due to a combination of small errors along the process, each insufficient to cause an accident. We must ensure safe systems of work for each process we are involved, so it is essential to implement security systems to evaluate and find the vulnerabilities in all phases of the process. In the Service of Radio Physics and Radiation Protection of Punta de Europa Hospital has implemented a security system for radiotherapy process after the analysis and evaluation of the safety culture of the Service.

  5. The Brain Mechanism of Musical Absolute Pitch Processing%音乐绝对音高信息加工的脑机制

    Institute of Scientific and Technical Information of China (English)

    侯建成; 董奇

    2011-01-01

    音乐绝对音高(absolute pitch,AP)一直是音乐心理学者感兴趣的问题.AP能力是一种特殊的音乐能力.ERP研究表明具有AP能力的群体只需较少的认知资源进行音高加工,同时不同AP能力的加工机制也不同;功能神经成像研究表明大脑左侧额叶背侧后部和左侧颞叶平面对AP加工发挥重要作用;脑结构研究发现AP群体的某些脑区皮层厚度低于没有绝对音高能力(Non-AP)群体,这可能与AP特殊的加工机制有关.AP能力形成需要先天遗传和后天环境的共同作用,其相互作用的脑机制需结合行为遗传学的研究方法及成果.

  6. Absolutely covert quantum communication

    CERN Document Server

    Bradler, Kamil; Siopsis, George; Weedbrook, Christian

    2016-01-01

    We present truly ultimate limits on covert quantum communication by exploiting quantum-mechanical properties of the Minkowski vacuum in the quantum field theory framework. Our main results are the following: We show how two parties equipped with Unruh-DeWitt detectors can covertly communicate at large distances without the need of hiding in a thermal background or relying on various technological tricks. We reinstate the information-theoretic security standards for reliability of asymptotic quantum communication and show that the rate of covert communication is strictly positive. Therefore, contrary to the previous conclusions, covert and reliable quantum communication is possible.

  7. A Novel Multi-Secret Sharing Approach for Secure Data Warehousing and On-Line Analysis Processing in the Cloud

    OpenAIRE

    Attasena, Varunya; Harbi, Nouria; Darmont, Jérôme

    2015-01-01

    International audience; Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications, including data warehouses and on-line analytical processing. However, storing and transferring sensitive data into the cloud raises legitimate security concerns. In this paper, we propose a new multi-secret sharing approach for deploying data warehouses in the cloud and allowing on-line analysis processing, while enforcing ...

  8. A Novel Multi-Secret Sharing Approach for Secure Data Warehousing and On-Line Analysis Processing in the Cloud

    OpenAIRE

    Attasena, Varunya; Harbi, Nouria; Darmont, Jérôme

    2017-01-01

    Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications, including data warehouses and on-line analytical processing. However, storing and transferring sensitive data into the cloud raises legitimate security concerns. In this paper, we propose a new multi-secret sharing approach for deploying data warehouses in the cloud and allowing on-line analysis processing, while enforcing data privacy, integrity ...

  9. Modelling Efficient Process Oriented Architecture for Secure Mobile Commerce Using Hybrid Routing Protocol in Mobile Adhoc Network

    Directory of Open Access Journals (Sweden)

    Chitra Kiran N

    2012-01-01

    Full Text Available The proposed research work presents a novel approach of process oriented architecture for secure mobile commerce framework using uniquely designed hybrid mobile adhoc routing protocols using reactive and proactive type in real time test-bed. The research work discusses about deployment of mobile commerce which is one of the emerging trend in mobile applications with huge demands. Majority of the existing system lacks either QoS or efficient security protocol when it relates to secure mobile transaction due to the reason that development in wireless technology involved in m-commerce is still in its nascent stage. The real time test bed has been implemented with 20 Intel Atom processor with 32 bit OS establishing an adhoc network and by providing a random mobility to achieve any file type transfer from node to node. For the real-time set up purpose, the experiment is conducted in wireless infrastructure with mobility using G-based Linksys wireless router. Iteration of experiments conducted shows a satisfactory results. This research journal will provide insights with various parameters, security requirements, and concepts which is required in creating a robust model for secure m-commerce system.

  10. Enhancing food security through a multi-stakeholder process: the global agenda for sustainable livestock

    NARCIS (Netherlands)

    Breeman, G.E.; Dijkman, J.; Termeer, C.J.A.M.

    2015-01-01

    Feeding the world is not only a complex technical matter, but also a demanding governance issue. As food security has all the characteristics of a wicked problem (variety of problem definitions, conflicting interests, interconnectedness across scales, inherent uncertainties), conventional governance

  11. Influencia de los parámetros de proceso, en el comportamiento del parámetro vibración absoluta en turbinas de vapor. // Influence of process parameters of the behaviour of absolute vibration parameters in steam turbine.

    Directory of Open Access Journals (Sweden)

    F. de la Torre Silva

    2008-01-01

    Full Text Available Este trabajo muestra el estudio realizado en turbinas de vapor de pequeña capacidad de generación de las centralestermoeléctricas cubanas, relacionadas con la influencia estadística entre parámetros de proceso de la turbina, respecto alparámetro vibración absoluta, medidos en las chumaceras de la turbina. Se utilizan las bases de datos de los sistemas demonitoreado on-line de la turbina. Se exponen las relaciones existentes entre los principales parámetros seleccionados paraeste estudio.Palabras claves: Monitorado on-line, Monitorado de la condición, Parámetros de proceso, Vibraciónabsoluta, Turbinas de vapor.______________________________________________________________________________AbstractThis work show the estudy in small steam turbine capacity of generation in cubans thermoelectric power station to relative withstatistical influence between steam process parameters regarding absolute vibration parameter, in the steam housing measurements.Themselves use database as steam on-line monitoring systems. Expose the existing relation between the principal selection parametersfor this study.Key Words: On.line monitoring, Condition monitoring, Process parameters, Absolute vibration, SteamTurbine.

  12. Mechanisms and Tools to Ensure the Economic Security of the Regions of Ukraine in the Process of Decentralization

    Directory of Open Access Journals (Sweden)

    Biluk Rostislav R.

    2015-09-01

    Full Text Available The article is aimed at substantiation of the applied mechanisms and tools for systemic ensuring the economic security of the regions of Ukraine in the process of decentralized reorganization of the executive powers. It has been revealed that in Ukraine a considerable number of projects of laws have been developed, legislation acts and policy documents have been passed, declarative provisions for the decentralization of powers as well as for reforming the local governance have been presented. It has been confirmed that the decentralization of powers in Ukraine is a necessary step, given the European integration course of the both foreign policy and the internal economic development of the State. However, it has been determined that an administrative-territorial reform may not only positively affect the economic security of region, but can lead to some negative results as well. It has been found that such planning of both the economic development of region and ensuring its security, on the one hand, has its risks, and on the other hand, generates new opportunities and prospects. A complex mechanism for ensuring economic security of the region, including institutional, organizational and economic constituents, has been proposed.

  13. The Role of International Juridical Process in International Security and Civil-Military Relations

    Science.gov (United States)

    2002-12-01

    137 Elizabeth Neuffer , The Key to my neighbor’s house: Seeking Justice in Bosnia and Rwanda...Security Service, Word of Experts, CCMR Belgrade. Available [online] at: http//www.ccmr-bg.org/analize/rec/word2.htm, 11/10/2002. 37. Neuffer Elizabeth

  14. Improving SCADA security of a local process with a power grid model

    NARCIS (Netherlands)

    Chromik, Justyna J.; Remke, Anne; Haverkort, Boudewijn R.

    2016-01-01

    Security of networks controlling smart grids is an important subject. The shift of the power grid towards a smart grid results in more distributed control functions, while intrusion detection of the control network mostly remains centrally based. Moreover, existing local (host-based) intrusion detec

  15. Collaborative Decision Making Process for Complex Defense, Security and Stability Challenges

    NARCIS (Netherlands)

    Bemmel, I.E. van; Eikelboom, A.R.

    2014-01-01

    How to intervene in crises and conflicts? How to cope with complex challenges in the field of defense, security and stability? Questions like these are difficult to answer due to amongst others the involvement of multiple stakeholders that contribute to these complex challenges and need to cooperate

  16. Notes on absolute Hodge classes

    CERN Document Server

    Charles, François

    2011-01-01

    We survey the theory of absolute Hodge classes. The notes include a full proof of Deligne's theorem on absolute Hodge classes on abelian varieties as well as a discussion of other topics, such as the field of definition of Hodge loci and the Kuga-Satake construction.

  17. Policy Needs for Social Security in the Process of Citizenization of the Peri-urban Farmers:A Case Study of Hefei City

    Institute of Scientific and Technical Information of China (English)

    TAN Jiang-lin; CHEN Rui; NI Wen-cong

    2012-01-01

    We conduct a survey of transformational towns and villages in High-tech Development District, Yaohai District and Shushan District, Hefei City. Using data, we analyze the "sideline effect" and inherent contradiction of transformational cities, research the policy needs for social security and its trend in the citizenization process of the peri-urban farmers. On this basis, we construct the social security policy system that can adapt to the accelerated process of urbanization. Finally, we put forth the following recommendations for the social security policy in the citizenization process of the peri-urban farmers: distinguishing different groups’ policy needs for social security; attaching importance to people’s dynamic policy needs for social security in urbanization; focusing on the adaptability of social security policy transformation in urbanization; attaching importance to the social psychosocial environment of social security policy transformation in urbanization; achieving the trinity of non-farm conversion, urbanization and citizenization in the process of urbanization; strengthening the government’s dominant position in the building of social security policy system.

  18. Reforming The U.S. Security Assistance Export Process To Build Existing Capabilities

    Science.gov (United States)

    2015-12-01

    military sales because the programs have significant implications for foreign policy (Shapiro 2012, 27). The department not only promotes Foreign...engaging in effective international competition for the sale of the controlled goods (Ferguson and Kerr 2014, 3). In spite of this, many political...since they have a direct effect on security assistance. Additionally, the findings highlight redundancies in the execution of the programs because of

  19. Performance evaluation of fingerprint image processing for high Security Ad-hoc network

    OpenAIRE

    P.Velayutham; Dr.T.G.Palanivelu

    2010-01-01

    With the rapid development of wireless technology, various mobile devices have been developed for military and civilian applications. Defense research and development has shown increasing interest in ad-hoc networks because a military has to be mobile peer-to-peer is a good architecture for mobile communication in coalition operations. In this paper, the methodology proposed is an novel robust approach on secure fingerprint authentication and matching techniques to implement in ad-hoc wireles...

  20. A cohesive modular system for real-time stereoscopic secure image processing and evaluation

    Science.gov (United States)

    Galli, Raffaello; Lazarus, Ed

    2007-02-01

    In this paper we define an innovative modular real-time system to visualize, capture, manage, securely preserve, store and playback stereoscopic images. The system, called "Solid-Look" together with the cameras "StereOpsis" will allow military, EOD specialists, and private industry operators to literally "see through the robot's eyes". The system enables the operator to control the robot as if his/her head were located on the robot itself, positioning and zooming the camera to the visual target object using the operator's eye and head movement, without any wearable devices and allowing the operator's hands to perform other tasks. The stereo cameras perform zooming and image stabilization for a controlled and smooth vision. The display enables stereoscopic vision without the need of glasses. Every image frame is authenticated, encrypted and timestamped to allow certainty and confidentiality during post-capture playback or to show evidence in court. The system secures the ability to operate it, requiring administrator's biometrical authentication. Solid-Look modular design can be used in multiple industries from Homeland Security to Pharmaceutical including research, forensic and underwater inspections and will certainly provide great benefit to the performance, speed and accuracy of the operations.

  1. Security giving in surrogacy motherhood process as a caring model for commissioning mothers: A theory synthesis.

    Science.gov (United States)

    Zandi, Mitra; Vanaki, Zohreh; Shiva, Marziyeh; Mohammadi, Eesa; Bagheri-Lankarani, Narges

    2016-07-01

    Despite the increasing use of surrogacy, there are no caring theories/models that serve as the basis for nursing care to surrogacy commissioning mothers. This study has designed a model for caring of surrogacy commissioning mothers in 2013. The theory synthesis of Walker and Avant's strategies of theory construction (2011) was used to design a caring model/theory. The theory synthesis includes three stages: (i) selection of focal concept (the concept of "security giving in motherhood" was selected); (ii) review of studies in order to identify factors related to focal concept relevant studies (42 articles and 13 books) were reviewed, statements and concepts related to focal concept were then extracted and classified, and their relations were specified; and (iii) organization of concepts and statements within a relevant general and effective manifestation of the phenomenon under study which led to developing of a model. In this caring model/theory, entitled "security giving in surrogacy motherhood", nurses roles were conceptualized within the conceptual framework that includes three main roles: (i) coordination; (ii) participation; and (iii) security giving (physical, emotional, and legal support; empowerment; presence; relationship management between both parties and advocacy). Training surrogacy specialist nurses and establishment of surrogacy care centers are important factors for implementation of the model. This model could help to provided better caring for surrogacy clients, especially for commissioning mothers. © 2016 Japan Academy of Nursing Science.

  2. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development....

  3. 77 FR 13294 - Announcing Approval of Federal Information Processing Standard (FIPS) Publication 180-4, Secure...

    Science.gov (United States)

    2012-03-06

    ... National Institute of Standards and Technology Announcing Approval of Federal Information Processing... announces the Secretary of Commerce's approval of Federal Information Processing Standard (FIPS) Publication... announces the Secretary of Commerce's approval of Federal Information Processing Standard (FIPS)...

  4. Editorial: 3DIM-DS 2015: Optical image processing in the context of 3D imaging, metrology, and data security

    Science.gov (United States)

    Alfalou, Ayman

    2017-02-01

    Following the first International Symposium on 3D Imaging, Metrology, and Data Security (3DIM-DS) held in Shenzhen during september 2015, this special issue gathers a series of articles dealing with the main topics discussed during this symposium. These topics highlighted the importance of studying complex data treatment systems and intensive calculations designed for high dimensional imaging and metrology for which high image quality and high transmission speed become critical issues in a number of technological applications. A second purpose was to celebrate the International Year of Light by emphasizing the important role of optics in actual information processing systems.

  5. Survey of information security

    Institute of Scientific and Technical Information of China (English)

    SHEN ChangXiang; ZHANG HuangGuo; FENG DengGuo; CAO ZhenFu; HUANG JiWu

    2007-01-01

    The 21st century is the age of information when information becomes an important strategic resource. The information obtaining, processing and security guarantee capability are playing critical roles in comprehensive national power, and information security is related to the national security and social stability. Therefore, we should take measures to ensure the information security of our country. In recent years, momentous accomplishments have been obtained with the rapid development of jnformation security technology. There are extensive theories about information security and technology. However, due to the limitation of length, this article mainly focuses on the research and development of cryptology, trusted computing, security of network, and information hiding, etc.

  6. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  7. Secure portal.

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing

  8. Synchrophasor Sensing and Processing based Smart Grid Security Assessment for Renewable Energy Integration

    Science.gov (United States)

    Jiang, Huaiguang

    With the evolution of energy and power systems, the emerging Smart Grid (SG) is mainly featured by distributed renewable energy generations, demand-response control and huge amount of heterogeneous data sources. Widely distributed synchrophasor sensors, such as phasor measurement units (PMUs) and fault disturbance recorders (FDRs), can record multi-modal signals, for power system situational awareness and renewable energy integration. An effective and economical approach is proposed for wide-area security assessment. This approach is based on wavelet analysis for detecting and locating the short-term and long-term faults in SG, using voltage signals collected by distributed synchrophasor sensors. A data-driven approach for fault detection, identification and location is proposed and studied. This approach is based on matching pursuit decomposition (MPD) using Gaussian atom dictionary, hidden Markov model (HMM) of real-time frequency and voltage variation features, and fault contour maps generated by machine learning algorithms in SG systems. In addition, considering the economic issues, the placement optimization of distributed synchrophasor sensors is studied to reduce the number of the sensors without affecting the accuracy and effectiveness of the proposed approach. Furthermore, because the natural hazards is a critical issue for power system security, this approach is studied under different types of faults caused by natural hazards. A fast steady-state approach is proposed for voltage security of power systems with a wind power plant connected. The impedance matrix can be calculated by the voltage and current information collected by the PMUs. Based on the impedance matrix, locations in SG can be identified, where cause the greatest impact on the voltage at the wind power plants point of interconnection. Furthermore, because this dynamic voltage security assessment method relies on time-domain simulations of faults at different locations, the proposed approach

  9. Absoluteness or relativity of morality

    Directory of Open Access Journals (Sweden)

    I. A. Kadievskaya

    2014-02-01

    Full Text Available Article is dedicated to the case study of absoluteness or relativity of morals. The questions are in a new way comprehended: Can exist absolute morals? Is how its content? Is necessary it for humanity? Is moral personality absolute value? Does justify the purpose of means? It is substantiated, that reflecting about the problem of absoluteness or relativity of morals, one ought not to be abstracted from the religion ­ billions of people find in it the basis of their morals. Accumulated ethical experience is infinitely rich and diverse in humanity: it includes and the proclaimed prophets godly revelations, and the brilliant enlightenment of secular philosophers. Are analyzed such concepts, as morals, absolute morals, relativity, moral rigorizm, moral personality, formal ethics. The specific character of the moral relativity, which proclaims historicity and changeability of standards and standards of human behavior, is established. Moral rigorizm is understood as the principle, according to which the man must act only from the considerations of moral debt, whereas all other external motivations (interest, happiness, friendship, etc have no moral value. Is shown the priority significance of the nerigoristskoy formal ethics, in which strong idealizations and abstractions of the ethics of moral rigorizma are substituted by the weaker ­ more realistic and more humane. In the nerigoristskoy formal ethics, as in the life, moral estimations completely can be and in the overwhelming majority of the cases are relative.

  10. The Potential Impact of Climate Change on Soil Properties and Processes and Corresponding Influence on Food Security

    Directory of Open Access Journals (Sweden)

    Eric C. Brevik

    2013-07-01

    Full Text Available According to the IPCC, global temperatures are expected to increase between 1.1 and 6.4 °C during the 21st century and precipitation patterns will be altered. Soils are intricately linked to the atmospheric/climate system through the carbon, nitrogen, and hydrologic cycles. Because of this, altered climate will have an effect on soil processes and properties. Recent studies indicate at least some soils may become net sources of atmospheric C, lowering soil organic matter levels. Soil erosion by wind and water is also likely to increase. However, there are many things we need to know more about. How climate change will affect the N cycle and, in turn, how that will affect C storage in soils is a major research need, as is a better understanding of how erosion processes will be influenced by changes in climate. The response of plants to elevated atmospheric CO2 given limitations in nutrients like N and P, and how that will influence soil organic matter levels, is another critical research need. How soil organic matter levels react to changes in the C and N cycles will influence the ability of soils to support crop growth, which has significant ramifications for food security. Therefore, further study of soil-climate interactions in a changing world is critical to addressing future food security concerns.

  11. Database applicaton for absolute spectrophotometry

    Science.gov (United States)

    Bochkov, Valery V.; Shumko, Sergiy

    2002-12-01

    32-bit database application with multidocument interface for Windows has been developed to calculate absolute energy distributions of observed spectra. The original database contains wavelength calibrated observed spectra which had been already passed through apparatus reductions such as flatfielding, background and apparatus noise subtracting. Absolute energy distributions of observed spectra are defined in unique scale by means of registering them simultaneously with artificial intensity standard. Observations of sequence of spectrophotometric standards are used to define absolute energy of the artificial standard. Observations of spectrophotometric standards are used to define optical extinction in selected moments. FFT algorithm implemented in the application allows performing convolution (deconvolution) spectra with user-defined PSF. The object-oriented interface has been created using facilities of C++ libraries. Client/server model with Windows Socket functionality based on TCP/IP protocol is used to develop the application. It supports Dynamic Data Exchange conversation in server mode and uses Microsoft Exchange communication facilities.

  12. Security Dialogues: Building Better Relationships between Security and Business

    OpenAIRE

    Ashenden, D.; Lawrence, D.

    2016-01-01

    In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff. Published in IEEE Security and Privacy (2016) vol 14/3 pp 82-87 (http://doi.ieeecomputers...

  13. Food security, agricultural subsidies, energy, and the environment: a process of 'glocalization' in Sri Lanka

    Energy Technology Data Exchange (ETDEWEB)

    Mendis, P.

    2001-07-01

    This paper analyzes the interplay of policy dilemma in the areas of food security, agricultural subsidies, energy consumption, and the environment in the 'glocalization' process of Sri Lanka. It demonstrates that the domestic agricultural and food sector is intricately interconnected with the global economy and world market forces. While this paper gives a primary focus on domestic rice production and wheat import policies, it further examines the environmental consequences and public health issues that are associated with the process of 'glocalization' as part of globalization. This 'glocalization' has led to a series of intended and unintended externalities for Sri Lanka whose economic integration is irreversibly linked to agricultural and subsidy policies of other food exporting and producing countries of Asia and the United States. (author)

  14. Learning in a unidimensional absolute identification task.

    Science.gov (United States)

    Rouder, Jeffrey N; Morey, Richard D; Cowan, Nelson; Pfaltz, Monique

    2004-10-01

    We tested whether there is long-term learning in the absolute identification of line lengths. Line lengths are unidimensional stimuli, and there is a common belief that learning of these stimuli quickly reaches a low-level asymptote of about seven items and progresses no more. We show that this is not the case. Our participants served in a 1.5-h session each day for over a week. Although they did not achieve perfect performance, they continued to improve day by day throughout the week and eventually learned to distinguish between 12 and 20 line lengths. These results are in contrast to common characterizations of learning in absolute identification tasks with unidimensional stimuli. We suggest that this learning reflects improvement in short-term processing.

  15. Assessment of the ecological security of immobilized enzyme remediation process with biological indicators of soil health.

    Science.gov (United States)

    Zhang, Ying; Dong, Xiaonan; Jiang, Zhao; Cao, Bo; Ge, Shijie; Hu, Miao

    2013-08-01

    This study used the enzymes extracted from an atrazine-degrading strain, Arthrobacter sp. DNS10, which had been immobilized by sodium alginate to rehabilitate atrazine-polluted soil. Meanwhile, a range of biological indices were selected to assess the ecological health of contaminated soils and the ecological security of this bioremediation method. The results showed that there was no atrazine detected in soil samples after 28 days in EN+AT (the soil containing atrazine and immobilized enzyme) treatment. However, the residual atrazine concentration of the sample in AT (the soil containing atrazine only) treatment was about 5.02 ± 0.93 mg kg(-1). These results suggest that the immobilized enzyme exhibits an excellent ability in atrazine degradation. Furthermore, the immobilized enzyme could relieve soil microbial biomass carbon and soil microbial respiration intensity to 772.33 ± 34.93 mg C kg(-1) and 5.01 ± 0.17 mg CO(2) g(-1) soil h(-1), respectively. The results of the polymerase chain reaction-degeneration gradient gel electrophoresis experiment indicated that the immobilized enzyme also could make the Shannon-Wiener index and evenness index of the soil sample increase from 1.02 and 0.74 to 1.51 and 0.84, respectively. These results indicated that the immobilized enzymes not only could relieve the impact from atrazine on the soil, but also revealed that the immobilized enzymes did no significant harm on the soil ecological health.

  16. Performance evaluation of fingerprint image processing for high Security Ad-hoc network

    Directory of Open Access Journals (Sweden)

    P.Velayutham

    2010-06-01

    Full Text Available With the rapid development of wireless technology, various mobile devices have been developed for military and civilian applications. Defense research and development has shown increasing interest in ad-hoc networks because a military has to be mobile peer-to-peer is a good architecture for mobile communication in coalition operations. In this paper, the methodology proposed is an novel robust approach on secure fingerprint authentication and matching techniques to implement in ad-hoc wireless networks. This is a difficult problem in ad-hoc network, as it involves bootstrapping trust between the devices. This journal would present a solution, which provides fingerprint authentication techniques to share their communication in ad-hoc network. In this approach, devices exchange a corresponding fingerprint with master device for mutual communication, which will then allow them to complete an authenticated key exchange protocol over the wireless link. The solution based on authenticating user fingerprint through the master device, and this master device handshakes with the corresponding slave device for authenticating the fingerprint all attacks on the wireless link, and directly captures the user's device that was proposed to talk to a particular unknown device mentioned previously in their physical proximity. The system is implemented in C# and the user node for a variety of different devices with Matlab.

  17. An All Fiber White Light Interferometric Absolute Temperature Measurement System

    Directory of Open Access Journals (Sweden)

    Jeonggon Harrison Kim

    2008-11-01

    Full Text Available Recently the author of this article proposed a new signal processing algorithm for an all fiber white light interferometer. In this article, an all fiber white light interferometric absolute temperature measurement system is presented using the previously proposed signal processing algorithm. Stability and absolute temperature measurement were demonstrated. These two tests demonstrated the feasibility of absolute temperature measurement with an accuracy of 0.015 fringe and 0.0005 fringe, respectively. A hysteresis test from 373K to 873K was also presented. Finally, robustness of the sensor system towards laser diode temperature drift, AFMZI temperature drift and PZT non-linearity was demonstrated.

  18. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  19. Through the eye of the PLC: semantic security monitoring for industrial processes

    NARCIS (Netherlands)

    Hadziosmanovic, Dina; Sommer, Robin; Zambon, Emmanuele; Hartel, Pieter H.

    2014-01-01

    Off-the-shelf intrusion detection systems prove an ill fit for protecting industrial control systems, as they do not take their process semantics into account. Specifically, current systems fail to detect recent process control attacks that manifest as unauthorized changes to the configuration of a

  20. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  1. Relativistic Absolutism in Moral Education.

    Science.gov (United States)

    Vogt, W. Paul

    1982-01-01

    Discusses Emile Durkheim's "Moral Education: A Study in the Theory and Application of the Sociology of Education," which holds that morally healthy societies may vary in culture and organization but must possess absolute rules of moral behavior. Compares this moral theory with current theory and practice of American educators. (MJL)

  2. Absolute Standards for Climate Measurements

    Science.gov (United States)

    Leckey, J.

    2016-10-01

    In a world of changing climate, political uncertainty, and ever-changing budgets, the benefit of measurements traceable to SI standards increases by the day. To truly resolve climate change trends on a decadal time scale, on-orbit measurements need to be referenced to something that is both absolute and unchanging. One such mission is the Climate Absolute Radiance and Refractivity Observatory (CLARREO) that will measure a variety of climate variables with an unprecedented accuracy to definitively quantify climate change. In the CLARREO mission, we will utilize phase change cells in which a material is melted to calibrate the temperature of a blackbody that can then be observed by a spectrometer. A material's melting point is an unchanging physical constant that, through a series of transfers, can ultimately calibrate a spectrometer on an absolute scale. CLARREO consists of two primary instruments: an infrared (IR) spectrometer and a reflected solar (RS) spectrometer. The mission will contain orbiting radiometers with sufficient accuracy to calibrate other space-based instrumentation and thus transferring the absolute traceability. The status of various mission options will be presented.

  3. A Framework for an Institutional High Level Security Policy for the Processing of Medical Data and their Transmission through the Internet

    OpenAIRE

    Ilioudis, Christos; Pangalos, George

    2001-01-01

    Background The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. Objective To develop a High Level Security Policy...

  4. About features of the system and process approaches creating ІТ projects in the field of information security

    OpenAIRE

    Kozhedub, Yuliya

    2015-01-01

    The article presents a summary theoretical study known scientific approaches to the creation of IT projects in the field of information security, which they introduce for information security systems. The study also was based on international instruments that they used experts in the field of information security. Generally accepted international practice of standardization and scientific approaches used during the creation of IT projects in the field of information security are the main fact...

  5. On the Role of Multi-Scale Processes in CO2 Storage Security and Integrity

    Science.gov (United States)

    Pruess, K.; Kneafsey, T. J.

    2008-12-01

    Consideration of multiple scales in subsurface processes is usually referred to the spatial domain, where we may attempt to relate process descriptions and parameters from pore and bench (Darcy) scale to much larger field and regional scales. However, multiple scales occur also in the time domain, and processes extending over a broad range of time scales may be very relevant to CO2 storage and containment. In some cases, such as in the convective instability induced by CO2 dissolution in saline waters, space and time scales are coupled in the sense that perturbations induced by CO2 injection will grow concurrently over many orders of magnitude in both space and time. In other cases, CO2 injection may induce processes that occur on short time scales, yet may affect large regions. Possible examples include seismicity that may be triggered by CO2 injection, or hypothetical release events such as "pneumatic eruptions" that may discharge substantial amounts of CO2 over a short time period. This paper will present recent advances in our experimental and modeling studies of multi-scale processes. Specific examples that will be discussed include (1) the process of CO2 dissolution-diffusion-convection (DDC), that can greatly accelerate the rate at which free-phase CO2 is stored as aqueous solute; (2) self- enhancing and self-limiting processes during CO2 leakage through faults, fractures, or improperly abandoned wells; and (3) porosity and permeability reduction from salt precipitation near CO2 injection wells, and mitigation of corresponding injectivity loss. This work was supported by the Office of Basic Energy Sciences and by the Zero Emission Research and Technology project (ZERT) under Contract No. DE-AC02-05CH11231 with the U.S. Department of Energy.

  6. Signal processing approaches to secure physical layer communications in multi-antenna wireless systems

    CERN Document Server

    Hong, Y-W Peter; Kuo, C-C Jay

    2013-01-01

    This book introduces various signal processing approaches to enhance physical layer secrecy in multi-antenna wireless systems. Wireless physical layer secrecy has attracted much attention in recent years due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping. While most articles on physical layer secrecy focus on the information-theoretic aspect, we focus specifically on the signal processing aspects, including beamforming and precoding techniques for data transmission and discriminatory training schemes for channel estimation. The discussions will c

  7. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  8. Office of Command Security Total Quality Management Plan

    Science.gov (United States)

    1989-07-01

    outlines the Office of Command Security instruction for TQM implementation. Keywords: TQM ( Total Quality Management ), DLA Office of Command Security, Continuous process improvement, Automatic data processing security.

  9. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  10. Physics of negative absolute temperatures

    Science.gov (United States)

    Abraham, Eitan; Penrose, Oliver

    2017-01-01

    Negative absolute temperatures were introduced into experimental physics by Purcell and Pound, who successfully applied this concept to nuclear spins; nevertheless, the concept has proved controversial: a recent article aroused considerable interest by its claim, based on a classical entropy formula (the "volume entropy") due to Gibbs, that negative temperatures violated basic principles of statistical thermodynamics. Here we give a thermodynamic analysis that confirms the negative-temperature interpretation of the Purcell-Pound experiments. We also examine the principal arguments that have been advanced against the negative temperature concept; we find that these arguments are not logically compelling, and moreover that the underlying "volume" entropy formula leads to predictions inconsistent with existing experimental results on nuclear spins. We conclude that, despite the counterarguments, negative absolute temperatures make good theoretical sense and did occur in the experiments designed to produce them.

  11. Optomechanics for absolute rotation detection

    Science.gov (United States)

    Davuluri, Sankar

    2016-07-01

    In this article, we present an application of optomechanical cavity for the absolute rotation detection. The optomechanical cavity is arranged in a Michelson interferometer in such a way that the classical centrifugal force due to rotation changes the length of the optomechanical cavity. The change in the cavity length induces a shift in the frequency of the cavity mode. The phase shift corresponding to the frequency shift in the cavity mode is measured at the interferometer output to estimate the angular velocity of absolute rotation. We derived an analytic expression to estimate the minimum detectable rotation rate in our scheme for a given optomechanical cavity. Temperature dependence of the rotation detection sensitivity is studied.

  12. A Survey on Cloud Computing Security Issues, Vendor Evaluation and Selection Process: World Future Society

    Directory of Open Access Journals (Sweden)

    Arun Sangwan

    2014-05-01

    Full Text Available Cloud computing is an emerging technology which could replace long-established IT systems. Cloud computing made big strides forward in 2013, and if a host of industry experts proves correct, it will make even bigger advances in 2014. As Forbes, CxoToday, GigaOM, and other news services that cover technology report, the experts forecast many more companies joining clouds or creating their own; new professional services emerging to manage the clouds and the data within them; and the clouds’ expansion transforming IT and work life in general trough out the world. Cloud computing makes it possible for an organizations’ IT to be more malleable, save costs and process information and data faster than with long-established IT. Cloud computing is the operating of programs and storage of data and files in an online network, not on physical disks and hardware’s. Cloud computing arises from the IT technicians desire to add another layer of separation in processing information. Cloud Vendor Evaluation & Selection offering leverages the database to accelerate the identification and screening of candidate vendors in four-step vendor evaluation and selection process.

  13. An Expert Elicitation Process in Support of Groundwater Model Evaluation for Frenchman Flat, Nevada National Security Site

    Energy Technology Data Exchange (ETDEWEB)

    Chapman Jenny,Pohlmann Karl

    2011-02-01

    The U.S. Department of Energy is implementing corrective actions at facilities where nuclear-related operations were conducted in Nevada. Among the most significant sites being addressed are the locations of underground nuclear tests on the Nevada National Security Site (NNSS). The process for implementing corrective actions for the Underground Test Area (UGTA) locations is defined in Appendix VI of a Federal Facility Agreement and Consent Order (1996, as amended). In broad terms, Appendix VI describes a Corrective Action Investigation followed by a Corrective Action Decision, and implementation of a Corrective Action Plan prior to closure. The Frenchman Flat Corrective Action Unit (CAU) is farthest along in the UGTA corrective action process. It includes ten underground tests within the Frenchman Flat topographic basin, in the southeastern portion of the NNSS. Data have been collected from drilling exploration, hydrologic testing, and field and laboratory studies. Modeling has been completed at a variety of scales and focusing on a variety of flow and transport aspects ranging from regional boundary conditions to process dynamics within a single nuclear cavity. The culmination of the investigations is a transport model for the Frenchman Flat CAU (Stoller Navarro Joint Venture, 2009) that has undergone rigorous peer review and been accepted by the State of Nevada, setting the stage for the Corrective Action Decision and progression from the investigation phase to the corrective action phase of the project.

  14. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  15. The Efficiency of Requesting Process for Formal Business-Documents in Indonesia: An Implementation of Web Application Base on Secure and Encrypted Sharing Process

    Directory of Open Access Journals (Sweden)

    Aris Budi Setyawan

    2014-12-01

    Full Text Available In recent business practices, the need of the formal document for business, such as the business license documents, business domicile letters, halal certificates, and other formal documents, is desperately needed and becomes its own problems for businesses, especially for small and medium enterprises. One stop service unit that was conceived and implemented by the government today, has not been fully integrated yet. Not all permits (related with formal document for business can be completed and finished in one place, businesses are still have to move from one government department to another government department to get a formal document for their business. With these practices, not only a lot of the time and cost will be sacrificed, but also businesses must always fill out a form with the same field. This study aims to assess and identify the problem, especially on applying the formal document for business, and use it as inputs for the development of a web application based on secure and encrypted sharing process. The study starts with a survey of 200 businesses that have applied the formal document for their business, to map the initial conditions of applying the formal document for business in Indonesia . With these applications that are built based on these needs, it is expected that not only the time, cost, and physical effort from both parties are becoming more efficient, but also the negative practices of bureaucratic and economic obstacles in business activities can be minimized, so the competitiveness of business and their contribution for national economy will increase.Keywords : Formal documents, Efficiencies, Web application, Secure and encrypted sharing process, SMEs

  16. Global trends in relative and absolute wealth concentrations

    OpenAIRE

    2014-01-01

    This paper compares changes in relative and absolute wealth concentrations to establish if both processes have followed similar trajectories. The findings indicate that while the level of relative wealth concentration has increased recently, it is not extraordinarily high in an historical perspective. On the contrary, the level of absolute wealth concentration is most likely higher than that previously occurred because of the increase in the wealth holdings and population size of high net wor...

  17. Security intelligence a practitioner's guide to solving enterprise security challenges

    CERN Document Server

    Li, Qing

    2015-01-01

    Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo

  18. Air Force Security Assistance Center Foreign Military Sales Center Institutionalizes How It ’Develops and Executes International Agreements" by Linking Strategic Initiatives to the Balanced Scorecard Process

    Science.gov (United States)

    2004-01-01

    Linking Strategic Initiatives to the Balanced Scorecard Process By Len Walton Tiyette McDaniel Schneata Shyne-Turner Air Force Security Assistance Center...with short term actions. The Balanced Scorecard (BSC) methodology is being institutionalized to ensure continuous process change driven by...Linking Strategic Initiatives to the Balanced Scorecard Process 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  19. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriat...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development.......When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...

  20. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  1. Toward The Absolute Age of M92 With MIST

    Science.gov (United States)

    Choi, Jieun; Conroy, Charlie; Dotter, Aaron; Weisz, Daniel; Rosenfield, Philip; Dolphin, Andrew

    2016-08-01

    Globular clusters provide a fundamental link between stars and galaxies. For example, it has been suggested that ultra faint dwarf galaxies formed all of their stars prior to the epoch of reionization, but this conclusion hinges entirely on the striking similarity of their stellar populations to the ancient, metal-poor globular cluster M92. The accurate measurement of absolute ages of ancient globular clusters therefore has direct implications for the formation histories of the smallest galaxies in the Universe. However, a reliable determination of the absolute ages of globular clusters has proven to be a challenge due to uncertainties in stellar physics and complications in how the models are compared to observations. I will present preliminary results from a comprehensive study to measure the absolute age of M92 using high-quality HST archival imaging data. We pair our new MESA Isochrones and Stellar Tracks (MIST) models with a full CMD fitting framework to jointly fit multi-color CMDs, taking into account the uncertainties in abundances, distance, and stellar physics. The goal of this project is two-fold. First, we aim to provide the most secure absolute age of M92 to date with robustly estimated uncertainties. Second, we explore and quantify the degeneracies between uncertain physical quantities and model variables, such as the distance, mixing-length-alpha parameter, and helium abundance, with the ultimate goal of better constraining these unknowns with data from ongoing and future surveys such as K2, Gaia, TESS, JWST, and WFIRST.

  2. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...... will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general....

  3. While Working Around Security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard...... of security experiences in design. The methods: Mobile probing, Prompted exploration workshops, and Acting out security involve potential future users in the process of designing IT security sensitive IT artifacts. Mobile probing collects narratives of user encounters with IT security. Prompted exploration...... of a research through design process. An everyday mobile digital signature solution has been designed, and the design problem, the design process, and the design results are presented in this dissertation. Several of my empirical findings show that the way users experience security does matter. Users...

  4. Cosmology with Negative Absolute Temperatures

    CERN Document Server

    Vieira, J P P; Lewis, Antony

    2016-01-01

    Negative absolute temperatures (NAT) are an exotic thermodynamical consequence of quantum physics which has been known since the 1950's (having been achieved in the lab on a number of occasions). Recently, the work of Braun et al (2013) has rekindled interest in negative temperatures and hinted at a possibility of using NAT systems in the lab as dark energy analogues. This paper goes one step further, looking into the cosmological consequences of the existence of a NAT component in the Universe. NAT-dominated expanding Universes experience a borderline phantom expansion ($w<-1$) with no Big Rip, and their contracting counterparts are forced to bounce after the energy density becomes sufficiently large. Both scenarios might be used to solve horizon and flatness problems analogously to standard inflation and bouncing cosmologies. We discuss the difficulties in obtaining and ending a NAT-dominated epoch, and possible ways of obtaining density perturbations with an acceptable spectrum.

  5. Cosmology with negative absolute temperatures

    Science.gov (United States)

    Vieira, J. P. P.; Byrnes, Christian T.; Lewis, Antony

    2016-08-01

    Negative absolute temperatures (NAT) are an exotic thermodynamical consequence of quantum physics which has been known since the 1950's (having been achieved in the lab on a number of occasions). Recently, the work of Braun et al. [1] has rekindled interest in negative temperatures and hinted at a possibility of using NAT systems in the lab as dark energy analogues. This paper goes one step further, looking into the cosmological consequences of the existence of a NAT component in the Universe. NAT-dominated expanding Universes experience a borderline phantom expansion (w inflation and bouncing cosmologies. We discuss the difficulties in obtaining and ending a NAT-dominated epoch, and possible ways of obtaining density perturbations with an acceptable spectrum.

  6. Advance Achieved for Global Secure Quantum Communication

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    @@ In today's Information Age, the protection of information is of .critical importance for national security, business firms, and private individuals. The common long-distance communication technology is poor in keeping privacy as it is vulnerable to eavesdropping. Quantum cryptography, a new approach to communication based on certain phenomena of quantum physics, is considered the absolute secure method in this regard.

  7. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  8. Linux Security Cookbook

    CERN Document Server

    Barrett, Daniel J; Byrnes, Robert G

    2003-01-01

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-fol

  9. Database and applications security integrating information security and data management

    CERN Document Server

    Thuraisingham, Bhavani

    2005-01-01

    This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections, each of which focuses on a key concept of secure databases and applications, this book deals with all aspects of technology, including secure relational databases, inference problems, secure object databases, secure distributed databases and emerging

  10. Microsoft Security Bible A Collection of Practical Security Techniques

    CERN Document Server

    Mullen, Timothy "Thor"

    2011-01-01

    Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications

  11. Absolute Measurement Fiber-optic Sensors in Large Structural Monitoring

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    The security of civil engineering is an important task due to the economic, social and environmental significance. Compared with conventional sensors, the optical fiber sensors have their unique characteristics.Being durable, stable and insensitive to external perturbations,they are particular interesting for the long-term monitoring of civil structures.Focus is on absolute measurement optical fiber sensors, which are emerging from the monitoring large structural, including SOFO system, F-P optical fiber sensors, and fiber Bragg grating sensors. The principle, characteristic and application of these three kinds of optical fiber sensors are described together with their future prospects.

  12. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  13. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  14. Security planning an applied approach

    CERN Document Server

    Lincke, Susan

    2015-01-01

    This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serv

  15. LTE security

    CERN Document Server

    Forsberg, Dan; Moeller, Wolf-Dietrich

    2010-01-01

    Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms em

  16. Absolutely separating quantum maps and channels

    Science.gov (United States)

    Filippov, S. N.; Magadov, K. Yu; Jivulescu, M. A.

    2017-08-01

    Absolutely separable states ϱ remain separable under arbitrary unitary transformations U\\varrho {U}\\dagger . By example of a three qubit system we show that in a multipartite scenario neither full separability implies bipartite absolute separability nor the reverse statement holds. The main goal of the paper is to analyze quantum maps resulting in absolutely separable output states. Such absolutely separating maps affect the states in a way, when no Hamiltonian dynamics can make them entangled afterwards. We study the general properties of absolutely separating maps and channels with respect to bipartitions and multipartitions and show that absolutely separating maps are not necessarily entanglement breaking. We examine the stability of absolutely separating maps under a tensor product and show that {{{Φ }}}\\otimes N is absolutely separating for any N if and only if Φ is the tracing map. Particular results are obtained for families of local unital multiqubit channels, global generalized Pauli channels, and combination of identity, transposition, and tracing maps acting on states of arbitrary dimension. We also study the interplay between local and global noise components in absolutely separating bipartite depolarizing maps and discuss the input states with high resistance to absolute separability.

  17. Absolute configuration of isovouacapenol C

    Directory of Open Access Journals (Sweden)

    Hoong-Kun Fun

    2010-08-01

    Full Text Available The title compound, C27H34O5 {systematic name: (4aR,5R,6R,6aS,7R,11aS,11bR-4a,6-dihydroxy-4,4,7,11b-tetramethyl-1,2,3,4,4a,5,6,6a,7,11,11a,11b-dodecahydrophenanthro[3,2-b]furan-5-yl benzoate}, is a cassane furanoditerpene, which was isolated from the roots of Caesalpinia pulcherrima. The three cyclohexane rings are trans fused: two of these are in chair conformations with the third in a twisted half-chair conformation, whereas the furan ring is almost planar (r.m.s. deviation = 0.003 Å. An intramolecular C—H...O interaction generates an S(6 ring. The absolute configurations of the stereogenic centres at positions 4a, 5, 6, 6a, 7, 11a and 11b are R, R, R, S, R, S and R, respectively. In the crystal, molecules are linked into infinite chains along [010] by O—H...O hydrogen bonds. C...O [3.306 (2–3.347 (2 Å] short contacts and C—H...π interactions also occur.

  18. Measurement of the absolute speed is possible?

    OpenAIRE

    Shevchenko, Sergey V.; Vladimir V. Tokarevsky

    2016-01-01

    One of popular problems, which  are experimentally studied in physics in a long time, is the testing of the special relativity theory, first of all – measurements of isotropy and constancy of light speed; as well as attempts to determine so called “absolute speed”, i.e. the Earth speed in the absolute spacetime (absolute reference frame), if this spacetime (ARF) exists.  Corresponding experiments aimed at the measuring of proper speed of some reference frame in oth...

  19. To measure the absolute speed is possible?

    OpenAIRE

    Shevchenko, Sergey; Tokarevsky, Vladimir

    2013-01-01

    One of popular problems, which are experimentally studied in physics in a long time, is the testing of the special relativity theory, first of all – measurements of isotropy and constancy of light speed; as well as attempts to determine so called “absolute speed”, i.e. the Earth speed in the absolute spacetime (absolute reference frame), if this spacetime (ARF) exists. Corresponding experiments aimed at the measuring of proper speed of some reference frame in other one, incl...

  20. The influence of powerful states of the Security Council during democratization processes the case of Côte D’ivoire

    Directory of Open Access Journals (Sweden)

    Vanessa Villalibre Fernández

    2009-01-01

    Full Text Available The Security Council is composed by 15 states: five of them (France, United Kingdom, United States, Russia and China exercising on a permanent basis and ten others exercise for two years. This difference is important to observe their influence on the global policy. Permanent states are in a better position to organize the Council’s agenda, but also to control the decisions to take thanks to their right of veto. Concerning the case of Côte d’Ivoire, France has played a crucial role in fostering the political process and deploys peacekeeping troops, also initiating the Council’s involvement and preparing statements and resolutions. For this reason, the measuresconcerning democratization processes taken by the Security Council in the African continent in general and in Cote d’Ivoire in particular provides a striking example of how the building or dismantling of states depends critically on external influences, both multilateral and unilateral pressures.

  1. Routers Exchange Information Security Process AnaIysis%路由器交换过程中信息安全分析

    Institute of Scientific and Technical Information of China (English)

    高海燕

    2014-01-01

    The router is one of the main equipment for reaIizing muIti computer LAN and Internet connection, is wideIy used in our work and Iife. Internet router network through the TCP/IP protocoI, and TCP/IP protocoI security vuInerabiIities exist, therefore, the router has become the main at ack object. The criminaIs and hackers access routers exchange processes in the IP address controI at ached to the router or network computer exchange of information and data message decode network transmission in the process of router. This paper anaIyzes the information security routers exchange process, security router, the information security strategy to buiId routers exchange process.%路由器是实现多台电脑组建局域网并连接互联网的主要设备之一,在我们工作和生活之中被普遍应用。路由器的联网通过TCP/IP协议连接互联网,而网络协议TCP/IP协议存在安全漏洞,因此路由器便成为主要攻击的对象。不法分子和黑客通过获取路由器交换过程中的IP地址控制路由器所连接的联网电脑,或者在路由器交换过程中的报文破译网络传输的信息和数据。本文对路由器交换过程中的信息安全进行分析,安全优化路由器,构建路由器交换过程中信息安全策略。

  2. Web security a whitehat perspective

    CERN Document Server

    Wu, Hanqing

    2015-01-01

    MY VIEW OF THE SECURITY WORLDView of the IT Security WorldBrief History of Web SecurityBrief History of Chinese HackersDevelopment Process of Hacking TechniquesRise of Web SecurityBlack Hat, White HatBack to Nature: The Essence of Secret SecuritySuperstition: There Is No Silver BulletSecurity Is an Ongoing ProcessSecurity ElementsHow to Implement Safety AssessmentAsset ClassificationThreat AnalysisRisk AnalysisDesign of Security ProgramsArt of War of White HatPrinciples of Secure by DefaultBlacklist, WhitelistPrinciple of Least PrivilegePrinciple of Defense in DepthPrinciples of Data and Code

  3. Neural Sensitivity to Absolute and Relative Anticipated Reward in Adolescents

    Science.gov (United States)

    Vaidya, Jatin G.; Knutson, Brian; O'Leary, Daniel S.; Block, Robert I.; Magnotta, Vincent

    2013-01-01

    Adolescence is associated with a dramatic increase in risky and impulsive behaviors that have been attributed to developmental differences in neural processing of rewards. In the present study, we sought to identify age differences in anticipation of absolute and relative rewards. To do so, we modified a commonly used monetary incentive delay (MID) task in order to examine brain activity to relative anticipated reward value (neural sensitivity to the value of a reward as a function of other available rewards). This design also made it possible to examine developmental differences in brain activation to absolute anticipated reward magnitude (the degree to which neural activity increases with increasing reward magnitude). While undergoing fMRI, 18 adolescents and 18 adult participants were presented with cues associated with different reward magnitudes. After the cue, participants responded to a target to win money on that trial. Presentation of cues was blocked such that two reward cues associated with $.20, $1.00, or $5.00 were in play on a given block. Thus, the relative value of the $1.00 reward varied depending on whether it was paired with a smaller or larger reward. Reflecting age differences in neural responses to relative anticipated reward (i.e., reference dependent processing), adults, but not adolescents, demonstrated greater activity to a $1 reward when it was the larger of the two available rewards. Adults also demonstrated a more linear increase in ventral striatal activity as a function of increasing absolute reward magnitude compared to adolescents. Additionally, reduced ventral striatal sensitivity to absolute anticipated reward (i.e., the difference in activity to medium versus small rewards) correlated with higher levels of trait Impulsivity. Thus, ventral striatal activity in anticipation of absolute and relative rewards develops with age. Absolute reward processing is also linked to individual differences in Impulsivity. PMID:23544046

  4. Operating System Security

    CERN Document Server

    Jaeger, Trent

    2008-01-01

    Operating systems provide the fundamental mechanisms for securing computer processing. Since the 1960s, operating systems designers have explored how to build "secure" operating systems - operating systems whose mechanisms protect the system against a motivated adversary. Recently, the importance of ensuring such security has become a mainstream issue for all operating systems. In this book, we examine past research that outlines the requirements for a secure operating system and research that implements example systems that aim for such requirements. For system designs that aimed to

  5. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  6. Generalized Software Security Framework

    Directory of Open Access Journals (Sweden)

    Smriti Jain

    2011-01-01

    Full Text Available Security of information has become a major concern in today's digitized world. As a result, effective techniques to secure information are required. The most effective way is to incorporate security in the development process itself thereby resulting into secured product. In this paper, we propose a framework that enables security to be included in the software development process. The framework consists of three layers namely; control layer, aspect layer and development layer. The control layer illustrates the managerial control of the entire software development process with the help of governance whereas aspect layer recognizes the security mechanisms that can be incorporated during the software development to identify the various security features. The development layer helps to integrate the various security aspects as well as the controls identified in the above layers during the development process. The layers are further verified by a survey amongst the IT professionals. The professionals concluded that the developed framework is easy to use due to its layered architecture and, can be customized for various types of softwares.

  7. Qualitative and Quantitative Security Analyses for ZigBee Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yuksel, Ender

    applications, home automation, and traffic control. The challenges for research in this area are due to the unique features of wireless sensor devices such as low processing power and associated low energy. On top of this, wireless sensor networks need secure communication as they operate in open fields...... methods and techniques in different areas and brings them together to create an efficient verification system. The overall ambition is to provide a wide range of powerful techniques for analyzing models with quantitative and qualitative security information. We stated a new approach that first verifies...... low level security protocol s in a qualitative manner and guarantees absolute security, and then takes these verified protocols as actions of scenarios to be verified in a quantitative manner. Working on the emerging ZigBee wireless sensor networks, we used probabilistic verification that can return...

  8. The Department of Defense Information Security Process: A Study of Change Acceptance and Past-Performance-Based Outsourcing

    Science.gov (United States)

    Hackney, Dennis W. G.

    2011-01-01

    Subchapter III of Chapter 35 of Title 44, United States Code, Federal Information Security Management Act of 2002; Department of Defense (DoD) Directive 8500.01E, Information Assurance, October 24, 2002; DoD Directive 8100.1, Global Information Grid Overarching Policy, September 19, 2002; and DoD Instruction 8500.2, Information Assurance…

  9. Understanding the Adoption Process of National Security Technology: An Integration of Diffusion of Innovations and Volitional Behavior Theories.

    Science.gov (United States)

    Iles, Irina A; Egnoto, Michael J; Fisher Liu, Brooke; Ackerman, Gary; Roberts, Holly; Smith, Daniel

    2017-03-01

    After the 9/11 terrorist attacks, the U.S. government initiated several national security technology adoption programs. The American public, however, has been skeptical about these initiatives and adoption of national security technologies has been mandated, rather than voluntary. We propose and test a voluntary behavioral intention formation model for the adoption of one type of new security technology: portable radiation detectors. Portable radiation detectors are an efficient way of detecting radiological and nuclear threats and could potentially prevent loss of life and damage to individuals' health. However, their functioning requires that a critical mass of individuals use them on a daily basis. We combine the explanatory advantages of diffusion of innovation with the predictive power of two volitional behavior frameworks: the theory of reasoned action and the health belief model. A large sample survey (N = 1,482) investigated the influence of factors identified in previous diffusion of innovation research on portable radiation detector adoption intention. Results indicated that nonfinancial incentives, as opposed to financial incentives, should be emphasized in persuasive communications aimed at fostering adoption. The research provides a new integration of diffusion of innovation elements with determinants of volitional behavior from persuasion literature, and offers recommendations on effective communication about new security technologies to motivate public adoption and enhance national safety. © 2017 Society for Risk Analysis.

  10. EU Security Strategy

    Institute of Scientific and Technical Information of China (English)

    Hong Jianjun

    2007-01-01

    The European Security and Defence Policy (ESDP) comprises an important part of the EU's Common Foreign and Security Policy (CFSP). The aim of ESDP is to strengthen the EU's external ability to act through the development of civilian and military capabilities for international conflict prevention and crisis management. In December 2003, the EU adopted its first European Security Strategy (ESS). Ever since then, the implementation of the ESS has been regarded as one of the biggest challenges for the EU in CFSP/ESDP matters. Although much progress has been made in its independent security and defence-building process, EU still faces serious problems and difficulties in this policy area. This paper tries to examine these recent developments, assess their impacts in regional-global security, and analyze existing problems and future trends. Finally, the author also examines EU-China engagements in recent years and explores possibilities for their future cooperation in the area of international security.

  11. Absolute, Extreme-Ultraviolet, Solar Spectral Irradiance Monitor (AESSIM)

    Science.gov (United States)

    Huber, Martin C. E.; Smith, Peter L.; Parkinson, W. H.; Kuehne, M.; Kock, M.

    1988-01-01

    AESSIM, the Absolute, Extreme-Ultraviolet, Solar Spectral Irradiance Monitor, is designed to measure the absolute solar spectral irradiance at extreme-ultraviolet (EUV) wavelengths. The data are required for studies of the processes that occur in the earth's upper atmosphere and for predictions of atmospheric drag on space vehicles. AESSIM is comprised of sun-pointed spectrometers and newly-developed, secondary standards of spectral irradiance for the EUV. Use of the in-orbit standard sources will eliminate the uncertainties caused by changes in spectrometer efficiency that have plagued all previous measurements of the solar spectral EUV flux.

  12. Absolute Income, Relative Income, and Happiness

    Science.gov (United States)

    Ball, Richard; Chernova, Kateryna

    2008-01-01

    This paper uses data from the World Values Survey to investigate how an individual's self-reported happiness is related to (i) the level of her income in absolute terms, and (ii) the level of her income relative to other people in her country. The main findings are that (i) both absolute and relative income are positively and significantly…

  13. Newton On Absolute Space A Commentary

    CERN Document Server

    Adewole, A I A

    2001-01-01

    Newton seems to have stated a quantitative relationship between the position of a body in relative space and the position of the body in absolute space in the first scholium of his Principia. We show that if this suspected relationship is assumed to hold, it will dispel many errors and misrepresentations that have befallen Newton's ideas on absolute space.

  14. Investigating Absolute Value: A Real World Application

    Science.gov (United States)

    Kidd, Margaret; Pagni, David

    2009-01-01

    Making connections between various representations is important in mathematics. In this article, the authors discuss the numeric, algebraic, and graphical representations of sums of absolute values of linear functions. The initial explanations are accessible to all students who have experience graphing and who understand that absolute value simply…

  15. Monolithically integrated absolute frequency comb laser system

    Energy Technology Data Exchange (ETDEWEB)

    Wanke, Michael C.

    2016-07-12

    Rather than down-convert optical frequencies, a QCL laser system directly generates a THz frequency comb in a compact monolithically integrated chip that can be locked to an absolute frequency without the need of a frequency-comb synthesizer. The monolithic, absolute frequency comb can provide a THz frequency reference and tool for high-resolution broad band spectroscopy.

  16. Node security

    CERN Document Server

    Barnes, Dominic

    2013-01-01

    A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this book will enable you to ensure security of your applications. An understanding of JavaScript is a prerequisite, and some experience with Node is recommended, though not required.

  17. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  18. IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY

    Directory of Open Access Journals (Sweden)

    Mohamed Elboukhari

    2010-07-01

    Full Text Available Quantum Cryptography or Quantum Key Distribution (QKD solves the key distribution problem byallowing the exchange of a cryptographic key between two remote parties with absolute security,guaranteed by the laws of quantum physics. Extensive studies have been undertaken on QKD since it wasnoted that quantum computers could break public key cryptosystems based on number theory. Actually,the progress of research in this field allows the implementation of QKD outside of laboratories. Effortsare made to exploit this technology in the existing communication networks and to improve theperformance and reliability of the implemented technologies. Some research is in progress for theintegration of QKD with the protocols in different layers of OSI model. The examples of such researcheffort are the integration of QKD in point-to-point protocol (PPP OSI layer 2 and the integration ofQKD with IPSEC at OSI layer-3. All these works are moving towards the utilization of QKD technologyfor enhancing the security of modern computing applications on the internet. In this paper, we present anovel extension of the TLS protocol based on QKD. We introduce a scheme for integrating QuantumCryptography in this protocol. Our approach improves the security of the process of authentication anddata encryption. Also, we describe an example to illustrate the feasibility of our scheme’simplementation.

  19. Effective Selection: A Study of First-Line Supervisor Selection Processes in the Department of Homeland Security

    Science.gov (United States)

    2011-03-01

    survive in a free market economy. Unlike the private sector, the federal government is not concerned about profits and loss and worries less about...all DHS agencies as a strategy to cut down costs associated with implementing best practices for first-line supervisor selection. Additionally, by...U.S. Coast Guard (CG) HSAD U.S. Secret Service (SS) HSBB Immigration and Customs Enforcement (ICE) HSBC Transportation Security Administration (TSA

  20. Absolute quantitation of protein posttranslational modification isoform.

    Science.gov (United States)

    Yang, Zhu; Li, Ning

    2015-01-01

    Mass spectrometry has been widely applied in characterization and quantification of proteins from complex biological samples. Because the numbers of absolute amounts of proteins are needed in construction of mathematical models for molecular systems of various biological phenotypes and phenomena, a number of quantitative proteomic methods have been adopted to measure absolute quantities of proteins using mass spectrometry. The liquid chromatography-tandem mass spectrometry (LC-MS/MS) coupled with internal peptide standards, i.e., the stable isotope-coded peptide dilution series, which was originated from the field of analytical chemistry, becomes a widely applied method in absolute quantitative proteomics research. This approach provides more and more absolute protein quantitation results of high confidence. As quantitative study of posttranslational modification (PTM) that modulates the biological activity of proteins is crucial for biological science and each isoform may contribute a unique biological function, degradation, and/or subcellular location, the absolute quantitation of protein PTM isoforms has become more relevant to its biological significance. In order to obtain the absolute cellular amount of a PTM isoform of a protein accurately, impacts of protein fractionation, protein enrichment, and proteolytic digestion yield should be taken into consideration and those effects before differentially stable isotope-coded PTM peptide standards are spiked into sample peptides have to be corrected. Assisted with stable isotope-labeled peptide standards, the absolute quantitation of isoforms of posttranslationally modified protein (AQUIP) method takes all these factors into account and determines the absolute amount of a protein PTM isoform from the absolute amount of the protein of interest and the PTM occupancy at the site of the protein. The absolute amount of the protein of interest is inferred by quantifying both the absolute amounts of a few PTM

  1. Issues in Biometric Security

    African Journals Online (AJOL)

    Ogechukwu Iloanusi

    crime prevention, data and information security, terrorist ... acquisition, digital signal processing, feature ... Images are digital ... biometric data comprise a template. ..... International passports. ➙ Airport. ➙ E-banking, ATM. ➙ Insurance. ➙ Voting.

  2. Design of secure operating systems with high security levels

    Institute of Scientific and Technical Information of China (English)

    QING SiHan; SHEN ChangXiang

    2007-01-01

    Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national and international standards and criteria, in combination with our experience in the design and development of the ANSHENG v4.0 secure operating system with high security level (hereafter simply referred to as ANSHENG OS), this paper addresses the following key issues in the design of secure operating systems with high security levels: security architecture, security policy models, and covert channel analysis. The design principles of security architecture and three basic security models: confidentiality,integrity, and privilege control models are discussed, respectively. Three novel security models and new security architecture are proposed. The prominent features of these proposals, as well as their applications to the ANSHENG OS, are elaborated.Cover channel analysis (CCA) is a well-known hard problem in the design of secure operating systems with high security levels since to date it lacks a sound theoretical basis and systematic analysis approach. In order to resolve the fundamental difficulties of CCA, we have set up a sound theoretical basis for completeness of covert channel identification and have proposed a unified framework for covert channel identification and an efficient backward tracking search method. The successful application of our new proposals to the ANSHENG OS has shown that it can help ease and speedup the entire CCA process.

  3. Secure Method Invocation in JASON

    NARCIS (Netherlands)

    Brinkman, Richard; Hoepman, Jaap-Henk

    2002-01-01

    We describe the Secure Method Invocation (SMI) framework implemented for Jason, our Javacard As Secure Objects Networks platform. Jason realises the secure object store paradigm, that reconciles the card-as-storage-element and card-as-processing-element views. In this paradigm, smart cards are viewe

  4. Automated absolute phase retrieval in across-track interferometry

    Science.gov (United States)

    Madsen, Soren N.; Zebker, Howard A.

    1992-01-01

    Discussed is a key element in the processing of topographic radar maps acquired by the NASA/JPL airborne synthetic aperture radar configured as an across-track interferometer (TOPSAR). TOPSAR utilizes a single transmit and two receive antennas; the three-dimensional target location is determined by triangulation based on a known baseline and two measured slant ranges. The slant range difference is determined very accurately from the phase difference between the signals received by the two antennas. This phase is measured modulo 2pi, whereas it is the absolute phase which relates directly to the difference in slant range. It is shown that splitting the range bandwidth into two subbands in the processor and processing each individually allows for the absolute phase. The underlying principles and system errors which must be considered are discussed, together with the implementation and results from processing data acquired during the summer of 1991.

  5. PROFIT – THE ABSOLUTE EXPRESSION OF PROFITABILITY

    Directory of Open Access Journals (Sweden)

    Daniela SIMTION

    2013-12-01

    Full Text Available Profitability of an economic unit is expressed through a system of indicators, because "no index or economic category can reflect the total, perfect, complex reality of economic phenomena or processes. Each expresses a side of concrete, essential details (indexes, but a full one (economic category. This system of indexes for profitability is characterized by a higher degree of consolidation, of reflection of the economic-financial results. They must be correlated to the other indexes of economic efficiency from the various subsystems that constitute the factors which determine the actual amount of profit and the rate of return. Each indicator has a certain form of expression according to the phenomena to which it refers. Thus, they can be expressed in relative sizes as medium sizes or indexes. They can also be expressed in physical, conventional or value units. The ability to develop monetary results can not be judged independently to the employed means for achieving them. Therefore, the profitability analysis is not limited to investigating its absolute indexes but also the relative ones, obtained by comparing the results to the means employed or consumed for developing the specific activity

  6. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  7. The Simplicity Argument and Absolute Morality

    Science.gov (United States)

    Mijuskovic, Ben

    1975-01-01

    In this paper the author has maintained that there is a similarity of thought to be found in the writings of Cudworth, Emerson, and Husserl in his investigation of an absolute system of morality. (Author/RK)

  8. The Simplicity Argument and Absolute Morality

    Science.gov (United States)

    Mijuskovic, Ben

    1975-01-01

    In this paper the author has maintained that there is a similarity of thought to be found in the writings of Cudworth, Emerson, and Husserl in his investigation of an absolute system of morality. (Author/RK)

  9. Magnifying absolute instruments for optically homogeneous regions

    CERN Document Server

    Tyc, Tomas

    2011-01-01

    We propose a class of magnifying absolute optical instruments with a positive isotropic refractive index. They create magnified stigmatic images, either virtual or real, of optically homogeneous three-dimensional spatial regions within geometrical optics.

  10. The risks of absolute medical confidentiality.

    Science.gov (United States)

    Crook, M A

    2013-03-01

    Some ethicists argue that patient confidentiality is absolute and thus should never be broken. I examine these arguments that when critically scrutinised, become porous. I will explore the concept of patient confidentiality and argue that although, this is a very important medical and bioethical issue, this needs to be wisely delivered to reduce third party harm or even detriment to the patient. The argument for absolute confidentiality is particularly weak when it comes to genetic information and inherited disease.

  11. Analysis on Business Process-Oriented Information Security Risk%面向业务过程的信息安全风险分析

    Institute of Scientific and Technical Information of China (English)

    范士喜

    2015-01-01

    为了能够充分描述业务及信息资产依赖的关系,以便在评估威胁的业务影响时,能综合考虑资产依赖程度和业务安全目标或需求,建立了一个内部依赖的递阶层次结构的资产依赖模型,结合网络分析法( ANP)计算组织业务在保密性、可用性和完整性上对资产的依赖程度,以反映业务对资产的安全需求,威胁对业务的影响由威胁强度和安全需求共同确定。实例分析表明,ANP 方法得到的资产依赖性结果与现实更相符,从而为风险评估结果的合理性提供了保证。%In the information age, business process has become an important information security risk factor. However, there is lack of models to adequately describe the dependencies among business processes and information assets and in the process evaluating the impact of threat on business, the dependencies and security objectives or requirements of business have not been taken into account simultaneously, which has a negative impact on risk assessment result. This study presents an asset dependency diagram with hierarchical structure and inner dependencies and Analytic Network Process ( ANP ) is used to calculate the dependency degrees of organization business on information assets about confidentiality,integrity and availability respectively, which reflect the security requirements of business to assets. Based on this,the impact of a threat on business is determined by threat strength and security requirements. An example shows that the results about asset dependency according to ANP are more in line with reality,therefore the reasonableness of the risk assessment result is ensured.

  12. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  13. Security Engineering

    Science.gov (United States)

    2012-01-31

    attacks cannot be completely addressed by traditional perimeter security solutions [ Wulf and Jones, 2009], as they have been in the past. A new...the mainstay of the current cyber security solution space [ Wulf and Jones, 2009]. This has enabled the system engineering and security communities...Number: H98230-08-D-0171 DO 002 TO 002 RT 028 Report No. SERC-2012-TR-028 January 31, 2012 UNCLASSIFIED 37 W. A. Wulf and A. K. Jones, Reflections on cyber security, Science Magazine, vol. 326, 2009, pp. 943-944.

  14. Grid Security

    CERN Document Server

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  15. Absolute luminosity measurements with the LHCb detector at the LHC

    CERN Document Server

    Aaij, R; Adinolfi, M; Adrover, C; Affolder, A; Ajaltouni, Z; Albrecht, J; Alessio, F; Alexander, M; Alkhazov, G; Alvarez Cartelle, P; Alves, A A; Amato, S; Amhis, Y; Anderson, J; Appleby, R B; Aquines Gutierrez, O; Archilli, F; Arrabito, L; Artamonov, A; Artuso, M; Aslanides, E; Auriemma, G; Bachmann, S; Back, J J; Bailey, D S; Balagura, V; Baldini, W; Barlow, R J; Barschel, C; Barsuk, S; Barter, W; Bates, A; Bauer, C; Bauer, Th; Bay, A; Bediaga, I; Belous, K; Belyaev, I; Ben-Haim, E; Benayoun, M; Bencivenni, G; Benson, S; Benton, J; Bernet, R; Bettler, M-O; van Beuzekom, M; Bien, A; Bifani, S; Bizzeti, A; Bjørnstad, P M; Blake, T; Blanc, F; Blanks, C; Blouw, J; Blusk, S; Bobrov, A; Bocci, V; Bondar, A; Bondar, N; Bonivento, W; Borghi, S; Borgia, A; Bowcock, T J V; Bozzi, C; Brambach, T; van den Brand, J; Bressieux, J; Brett, D; Brisbane, S; Britsch, M; Britton, T; Brook, N H; Brown, H; Büchler-Germann, A; Burducea, I; Bursche, A; Buytaert, J; Cadeddu, S; Caicedo Carvajal, J M; Callot, O; Calvi, M; Calvo Gomez, M; Camboni, A; Campana, P; Carbone, A; Carboni, G; Cardinale, R; Cardini, A; Carson, L; Carvalho Akiba, K; Casse, G; Cattaneo, M; Charles, M; Charpentier, Ph; Chiapolini, N; Ciba, K; Cid Vidal, X; Ciezarek, G; Clarke, P E L; Clemencic, M; Cliff, H V; Closier, J; Coca, C; Coco, V; Cogan, J; Collins, P; Constantin, F; Conti, G; Contu, A; Cook, A; Coombes, M; Corti, G; Cowan, G A; Currie, R; D'Almagne, B; D'Ambrosio, C; David, P; De Bonis, I; De Capua, S; De Cian, M; De Lorenzi, F; De Miranda, J M; De Paula, L; De Simone, P; Decamp, D; Deckenhoff, M; Degaudenzi, H; Deissenroth, M; Del Buono, L; Deplano, C; Deschamps, O; Dettori, F; Dickens, J; Dijkstra, H; Diniz Batista, P; Donleavy, S; Dordei, F; Dosil Suárez, A; Dossett, D; Dovbnya, A; Dupertuis, F; Dzhelyadin, R; Eames, C; Easo, S; Egede, U; Egorychev, V; Eidelman, S; van Eijk, D; Eisele, F; Eisenhardt, S; Ekelhof, R; Eklund, L; Elsasser, Ch; d'Enterria, D G; Esperante Pereira, D; Estève, L; Falabella, A; Fanchini, E; Färber, C; Fardell, G; Farinelli, C; Farry, S; Fave, V; Fernandez Albor, V; Ferro-Luzzi, M; Filippov, S; Fitzpatrick, C; Fontana, M; Fontanelli, F; Forty, R; Frank, M; Frei, C; Frosini, M; Furcas, S; Gallas Torreira, A; Galli, D; Gandelman, M; Gandini, P; Gao, Y; Garnier, J-C; Garofoli, J; Garra Tico, J; Garrido, L; Gaspar, C; Gauvin, N; Gersabeck, M; Gershon, T; Ghez, Ph; Gibson, V; Gligorov, V V; Göbel, C; Golubkov, D; Golutvin, A; Gomes, A; Gordon, H; Grabalosa Gándara, M; Graciani Diaz, R; Granado Cardoso, L A; Graugés, E; Graziani, G; Grecu, A; Gregson, S; Gui, B; Gushchin, E; Guz, Yu; Gys, T; Haefeli, G; Haen, C; Haines, S C; Hampson, T; Hansmann-Menzemer, S; Harji, R; Harnew, N; Harrison, J; Harrison, P F; He, J; Heijne, V; Hennessy, K; Henrard, P; Hernando Morata, J A; van Herwijnen, E; Hicks, E; Hofmann, W; Holubyev, K; Hopchev, P; Hulsbergen, W; Hunt, P; Huse, T; Huston, R S; Hutchcroft, D; Hynds, D; Iakovenko, V; Ilten, P; Imong, J; Jacobsson, R; Jaeger, A; Jahjah Hussein, M; Jans, E; Jansen, F; Jaton, P; Jean-Marie, B; Jing, F; John, M; Johnson, D; Jones, C R; Jost, B; Kandybei, S; Karacson, M; Karbach, T M; Keaveney, J; Kerzel, U; Ketel, T; Keune, A; Khanji, B; Kim, Y M; Knecht, M; Koblitz, S; Koppenburg, P; Kozlinskiy, A; Kravchuk, L; Kreplin, K; Kreps, M; Krocker, G; Krokovny, P; Kruse, F; Kruzelecki, K; Kucharczyk, M; Kukulak, S; Kumar, R; Kvaratskheliya, T; La Thi, V N; Lacarrere, D; Lafferty, G; Lai, A; Lambert, D; Lambert, R W; Lanciotti, E; Lanfranchi, G; Langenbruch, C; Latham, T; Le Gac, R; van Leerdam, J; Lees, J-P; Lefèvre, R; Leflat, A; Lefrançois, J; Leroy, O; Lesiak, T; Li, L; Li Gioi, L; Lieng, M; Liles, M; Lindner, R; Linn, C; Liu, B; Liu, G; Lopes, J H; Lopez Asamar, E; Lopez-March, N; Luisier, J; Machefert, F; Machikhiliyan, I V; Maciuc, F; Maev, O; Magnin, J; Malde, S; Mamunur, R M D; Manca, G; Mancinelli, G; Mangiafave, N; Marconi, U; Märki, R; Marks, J; Martellotti, G; Martens, A; Martin, L; Martín Sánchez, A; Martinez Santos, D; Massafferri, A; Matev, R; Mathe, Z; Matteuzzi, C; Matveev, M; Maurice, E; Maynard, B; Mazurov, A; McGregor, G; McNulty, R; Mclean, C; Meissner, M; Merk, M; Merkel, J; Messi, R; Miglioranzi, S; Milanes, D A; Minard, M-N; Monteil, S; Moran, D; Morawski, P; Mountain, R; Mous, I; Muheim, F; Müller, K; Muresan, R; Muryn, B; Musy, M; Mylroie-Smith, J; Naik, P; Nakada, T; Nandakumar, R; Nardulli, J; Nasteva, I; Nedos, M; Needham, M; Neufeld, N; Nguyen-Mau, C; Nicol, M; Nies, S; Niess, V; Nikitin, N; Oblakowska-Mucha, A; Obraztsov, V; Oggero, S; Ogilvy, S; Okhrimenko, O; Oldeman, R; Orlandea, M; Otalora Goicochea, J M; Owen, P; Pal, B; Palacios, J; Palutan, M; Panman, J; Papanestis, A; Pappagallo, M; Parkes, C; Parkinson, C J; Passaleva, G; Patel, G D; Patel, M; Paterson, S K; Patrick, G N; Patrignani, C; Pavel-Nicorescu, C; Pazos Alvarez, A; Pellegrino, A; Penso, G; Pepe Altarelli, M; Perazzini, S; Perego, D L; Perez Trigo, E; Pérez-Calero Yzquierdo, A; Perret, P; Perrin-Terrin, M; Pessina, G; Petrella, A; Petrolini, A; Pie Valls, B; Pietrzyk, B; Pilar, T; Pinci, D; Plackett, R; Playfer, S; Plo Casasus, M; Polok, G; Poluektov, A; Polycarpo, E; Popov, D; Popovici, B; Potterat, C; Powell, A; du Pree, T; Prisciandaro, J; Pugatch, V; Puig Navarro, A; Qian, W; Rademacker, J H; Rakotomiaramanana, B; Rangel, M S; Raniuk, I; Raven, G; Redford, S; Reid, M M; dos Reis, A C; Ricciardi, S; Rinnert, K; Roa Romero, D A; Robbe, P; Rodrigues, E; Rodrigues, F; Rodriguez Perez, P; Rogers, G J; Roiser, S; Romanovsky, V; Rouvinet, J; Ruf, T; Ruiz, H; Sabatino, G; Saborido Silva, J J; Sagidova, N; Sail, P; Saitta, B; Salzmann, C; Sannino, M; Santacesaria, R; Santamarina Rios, C; Santinelli, R; Santovetti, E; Sapunov, M; Sarti, A; Satriano, C; Satta, A; Savrie, M; Savrina, D; Schaack, P; Schiller, M; Schleich, S; Schmelling, M; Schmidt, B; Schneider, O; Schopper, A; Schune, M -H; Schwemmer, R; Sciubba, A; Seco, M; Semennikov, A; Senderowska, K; Sepp, I; Serra, N; Serrano, J; Seyfert, P; Shao, B; Shapkin, M; Shapoval, I; Shatalov, P; Shcheglov, Y; Shears, T; Shekhtman, L; Shevchenko, O; Shevchenko, V; Shires, A; Silva Coutinho, R; Skottowe, H P; Skwarnicki, T; Smith, A C; Smith, N A; Sobczak, K; Soler, F J P; Solomin, A; Soomro, F; Souza De Paula, B; Spaan, B; Sparkes, A; Spradlin, P; Stagni, F; Stahl, S; Steinkamp, O; Stoica, S; Stone, S; Storaci, B; Straticiuc, M; Straumann, U; Styles, N; Subbiah, V K; Swientek, S; Szczekowski, M; Szczypka, P; Szumlak, T; T'Jampens, S; Teodorescu, E; Teubert, F; Thomas, C; Thomas, E; van Tilburg, J; Tisserand, V; Tobin, M; Topp-Joergensen, S; Tran, M T; Tsaregorodtsev, A; Tuning, N; Ubeda Garcia, M; Ukleja, A; Urquijo, P; Uwer, U; Vagnoni, V; Valenti, G; Vazquez Gomez, R; Vazquez Regueiro, P; Vecchi, S; Velthuis, J J; Veltri, M; Vervink, K; Viaud, B; Videau, I; Vilasis-Cardona, X; Visniakov, J; Vollhardt, A; Voong, D; Vorobyev, A; Voss, H; Wacker, K; Wandernoth, S; Wang, J; Ward, D R; Webber, A D; Websdale, D; Whitehead, M; Wiedner, D; Wiggers, L; Wilkinson, G; Williams, M P; Williams, M; Wilson, F F; Wishahi, J; Witek, M; Witzeling, W; Wotton, S A; Wyllie, K; Xie, Y; Xing, F; Yang, Z; Young, R; Yushchenko, O; Zavertyaev, M; Zhang, F; Zhang, L; Zhang, W C; Zhang, Y; Zhelezov, A; Zhong, L; Zverev, E; Zvyagin, A

    2012-01-01

    Absolute luminosity measurements are of general interest for colliding-beam experiments at storage rings. These measurements are necessary to determine the absolute cross-sections of reaction processes and are valuable to quantify the performance of the accelerator. LHCb has applied two methods to determine the absolute scale of its luminosity measurements for proton-proton collisions at the LHC with a centre-of-mass energy of 7 TeV. In addition to the classic ``van der Meer scan'' method a novel technique has been developed which makes use of direct imaging of the individual beams using beam-gas and beam-beam interactions. This beam imaging method is made possible by the high resolution of the LHCb vertex detector and the close proximity of the detector to the beams, and allows beam parameters such as positions, angles and widths to be determined. The results of the two methods have comparable precision and are in good agreement. Combining the two methods, an overall precision of 3.5\\% in the absolute lumi...

  16. Four Years of Absolute Gravity in the Taiwan Orogen (AGTO)

    Science.gov (United States)

    Mouyen, Maxime; Masson, Frédéric; Hwang, Cheinway; Cheng, Ching-Chung; Le Moigne, Nicolas; Lee, Chiung-Wu; Kao, Ricky; Hsieh, Nicky

    2010-05-01

    AGTO is a scientific project between Taiwanese and French institutes, which aim is to improve tectonic knowledge of Taiwan primarily using absolute gravity measurements and permanent GPS stations. Both tools are indeed useful to study vertical movements and mass transfers involved in mountain building, a major process in Taiwan located at the convergent margin between Philippine Sea plate and Eurasian plate. This convergence results in two subductions north and south of Taiwan (Ryukyu and Manilla trenches, respectively), while the center is experiencing collision. These processes make Taiwan very active tectonically, as illustrated by numerous large earthquakes and rapid uplift of the Central Range. High slopes of Taiwan mountains and heavy rains brought by typhoons together lead to high landslides and mudflows risks. Practically, absolute gravity measurements have been yearly repeated since 2006 along a transect across south Taiwan, from Penghu to Lutao islands, using FG5 absolute gravimeters. This transect contains ten sites for absolute measurements and has been densified in 2008 by incorporating 45 sites for relative gravity measurements with CG5 gravimeters. The last relative and absolute measurements have been performed in November 2009. Most of the absolute sites have been measured with a good accuracy, about 1 or 2 ?Gal. Only the site located in Tainan University has higher standard deviation, due to the city noise. We note that absolute gravity changes seem to follow a trend in every site. However, straightforward tectonic interpretation of these trends is not valuable as many non-tectonic effects are supposed to change g with time, like groundwater or erosion. Estimating and removing these effects leads to a tectonic gravity signal, which has theoretically two origins : deep mass transfers around the site and vertical movements of the station. The latter can be well constrained by permanent GPS stations located close to the measurement pillar. Deep mass

  17. Quantum circuit for security proof of quantum key distribution without encryption of error syndrome and noisy processing

    CERN Document Server

    Tamaki, Kiyoshi

    2010-01-01

    One of the simplest security proofs of quantum key distribution is based on the so-called complementarity scenario, which involves the complementarity control of an actual protocol and a virtual protocol [M. Koashi, e-print arXiv:0704.3661 (2007)]. The existing virtual protocol has a limitation in classical postprocessing, i.e., the syndrome for the error-correction step has to be encrypted. In this paper, we remove this limitation by constructing a quantum circuit for the virtual protocol. Moreover, our circuit with a shield system gives an intuitive proof of why adding noise to the sifted key increases the bit error rate threshold in the general case in which one of the parties does not possess a qubit. Thus, our circuit bridges the simple proof and the use of wider classes of classical postprocessing.

  18. Can Japan Contribute to the Post Millennium Development Goals? Making Human Security Mainstream through the TICAD Process

    Science.gov (United States)

    Takahashi, Kenzo; Kobayashi, Jun; Nomura-Baba, Marika; Kakimoto, Kazuhiro; Nakamura, Yasuhide

    2013-01-01

    In 2013, the fifth Tokyo International Conference on African Development (TICAD V) will be hosted by the Japanese government. TICAD, which has been held every five years, has played a catalytic role in African policy dialogue and a leading role in promoting the human security approach (HSA). We review the development of the HSA in the TICAD dialogue on health agendas and recommend TICAD’s role in the integration of the HSA beyond the 2015 agenda. While health was not the main agenda in TICAD I and II, the importance of primary health care, and the development of regional health systems was noted in TICAD III. In 2008, when Japan hosted both the G8 summit and TICAD IV, the Takemi Working Group developed strong momentum for health in Africa. Their policy dialogues on global health in Sub-Saharan Africa incubated several recommendations highlighting HSA and health system strengthening (HSS). HSA is relevant to HSS because it focuses on individuals and communities. It has two mutually reinforcing strategies, a top-down approach by central or local governments (protection) and a bottom-up approach by individuals and communities (empowerment). The “Yokohama Action Plan,” which promotes HSA was welcomed by the TICAD IV member countries. Universal health coverage (UHC) is a major candidate for the post-2015 agenda recommended by the World Health Organization. We expect UHC to provide a more balanced approach between specific disease focus and system-based solutions. Japan’s global health policy is coherent with HSA because human security can be the basis of UHC-compatible HSS. PMID:24155655

  19. Can Japan Contribute to the Post Millennium Development Goals? Making Human Security Mainstream through the TICAD Process.

    Science.gov (United States)

    Takahashi, Kenzo; Kobayashi, Jun; Nomura-Baba, Marika; Kakimoto, Kazuhiro; Nakamura, Yasuhide

    2013-09-01

    In 2013, the fifth Tokyo International Conference on African Development (TICAD V) will be hosted by the Japanese government. TICAD, which has been held every five years, has played a catalytic role in African policy dialogue and a leading role in promoting the human security approach (HSA). We review the development of the HSA in the TICAD dialogue on health agendas and recommend TICAD's role in the integration of the HSA beyond the 2015 agenda. While health was not the main agenda in TICAD I and II, the importance of primary health care, and the development of regional health systems was noted in TICAD III. In 2008, when Japan hosted both the G8 summit and TICAD IV, the Takemi Working Group developed strong momentum for health in Africa. Their policy dialogues on global health in Sub-Saharan Africa incubated several recommendations highlighting HSA and health system strengthening (HSS). HSA is relevant to HSS because it focuses on individuals and communities. It has two mutually reinforcing strategies, a top-down approach by central or local governments (protection) and a bottom-up approach by individuals and communities (empowerment). The "Yokohama Action Plan," which promotes HSA was welcomed by the TICAD IV member countries. Universal health coverage (UHC) is a major candidate for the post-2015 agenda recommended by the World Health Organization. We expect UHC to provide a more balanced approach between specific disease focus and system-based solutions. Japan's global health policy is coherent with HSA because human security can be the basis of UHC-compatible HSS.

  20. Information Security Standards

    Directory of Open Access Journals (Sweden)

    Dan Constantin Tofan

    2011-09-01

    Full Text Available The use of standards is unanimously accepted and gives the possibility of comparing a personal security system with a given frame of reference adopted at an international level. A good example is the ISO 9000 set of standards regarding the quality management system, which is a common reference regardless of the industry in which a certain company activates. Just like quality control standards for other industrial processes such as manufacturing and customer service, information security standards demonstrate in a methodical and certifiable manner that an organization conforms to industry best practices and procedures. This article offers a review of the world’s most used information security standards.

  1. Combinatorial Selection and Least Absolute Shrinkage via the CLASH Algorithm

    CERN Document Server

    Kyrillidis, Anastasios

    2012-01-01

    The least absolute shrinkage and selection operator (LASSO) for linear regression exploits the geometric interplay of the $\\ell_2$-data error objective and the $\\ell_1$-norm constraint to arbitrarily select sparse models. Guiding this uninformed selection process with sparsity models has been precisely the center of attention over the last decade in order to improve learning performance. To this end, we alter the selection process of LASSO to explicitly leverage combinatorial sparsity models (CSMs) via the combinatorial selection and least absolute shrinkage (CLASH) operator. We provide concrete guidelines how to leverage combinatorial constraints within CLASH, and characterize CLASH's guarantees as a function of the set restricted isometry constants of the sensing matrix. Finally, our experimental results show that CLASH can outperform both LASSO and model-based compressive sensing in sparse estimation.

  2. Security of quantum key distribution source

    OpenAIRE

    Simonsen, Eivind Sjøtun

    2010-01-01

    Cryptography has begun its journey into the field of quantum information theory. Classical cryptography has shown weaknesses, which may be exploited in the future, either by development in mathematics, or by quantum computers. Quantum key distribution (QKD) is a promising path for cryptography to enable secure communication in the future. Although the theory of QKD promises absolute security, the reality is that current quantum crypto systems have flaws in them, as perfect devices have proven...

  3. A global algorithm for estimating Absolute Salinity

    Directory of Open Access Journals (Sweden)

    T. J. McDougall

    2012-12-01

    Full Text Available The International Thermodynamic Equation of Seawater – 2010 has defined the thermodynamic properties of seawater in terms of a new salinity variable, Absolute Salinity, which takes into account the spatial variation of the composition of seawater. Absolute Salinity more accurately reflects the effects of the dissolved material in seawater on the thermodynamic properties (particularly density than does Practical Salinity.

    When a seawater sample has standard composition (i.e. the ratios of the constituents of sea salt are the same as those of surface water of the North Atlantic, Practical Salinity can be used to accurately evaluate the thermodynamic properties of seawater. When seawater is not of standard composition, Practical Salinity alone is not sufficient and the Absolute Salinity Anomaly needs to be estimated; this anomaly is as large as 0.025 g kg−1 in the northernmost North Pacific. Here we provide an algorithm for estimating Absolute Salinity Anomaly for any location (x, y, p in the world ocean.

    To develop this algorithm, we used the Absolute Salinity Anomaly that is found by comparing the density calculated from Practical Salinity to the density measured in the laboratory. These estimates of Absolute Salinity Anomaly however are limited to the number of available observations (namely 811. In order to provide a practical method that can be used at any location in the world ocean, we take advantage of approximate relationships between Absolute Salinity Anomaly and silicate concentrations (which are available globally.

  4. Use of Statechart Assertions for Modeling Human-in-the-Loop Security Analysis and Decision-Making Processes

    Science.gov (United States)

    2012-06-01

    THIS PAGE INTENTIONALLY LEFT BLANK xv LIST OF ACRONYMS AND ABBREVIATIONS BPM Business Process Model BPMN Business Process Modeling Notation C&A...checking leads to an improvement in the quality and success of enterprise software development. Business Process Modeling Notation ( BPMN ) is an...emerging standard that allows business processes to be captured in a standardized format. BPMN lacks formal semantics which leaves many of its features

  5. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  6. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  7. Jasminum flexile flower absolute from India--a detailed comparison with three other jasmine absolutes.

    Science.gov (United States)

    Braun, Norbert A; Kohlenberg, Birgit; Sim, Sherina; Meier, Manfred; Hammerschmidt, Franz-Josef

    2009-09-01

    Jasminum flexile flower absolute from the south of India and the corresponding vacuum headspace (VHS) sample of the absolute were analyzed using GC and GC-MS. Three other commercially available Indian jasmine absolutes from the species: J. sambac, J. officinale subsp. grandiflorum, and J. auriculatum and the respective VHS samples were used for comparison purposes. One hundred and twenty-one compounds were characterized in J. flexile flower absolute, with methyl linolate, benzyl salicylate, benzyl benzoate, (2E,6E)-farnesol, and benzyl acetate as the main constituents. A detailed olfactory evaluation was also performed.

  8. Information Security Standards

    OpenAIRE

    Dan Constantin Tofan

    2011-01-01

    The use of standards is unanimously accepted and gives the possibility of comparing a personal security system with a given frame of reference adopted at an international level. A good example is the ISO 9000 set of standards regarding the quality management system, which is a common reference regardless of the industry in which a certain company activates. Just like quality control standards for other industrial processes such as manufacturing and customer service, information security stand...

  9. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  10. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  11. Audit Characteristics for Information System Security

    OpenAIRE

    Marius POPA; Mihai DOINEA

    2007-01-01

    The paper presents the main aspects regarding the development of the information security and assurance of their security. The information systems, standards and audit processes definitions are offered. There are presented the most important security standards used in information system security assessment

  12. Absolute Radiometric Calibration of KOMPSAT-3A

    Science.gov (United States)

    Ahn, H. Y.; Shin, D. Y.; Kim, J. S.; Seo, D. C.; Choi, C. U.

    2016-06-01

    This paper presents a vicarious radiometric calibration of the Korea Multi-Purpose Satellite-3A (KOMPSAT-3A) performed by the Korea Aerospace Research Institute (KARI) and the Pukyong National University Remote Sensing Group (PKNU RSG) in 2015.The primary stages of this study are summarized as follows: (1) A field campaign to determine radiometric calibrated target fields was undertaken in Mongolia and South Korea. Surface reflectance data obtained in the campaign were input to a radiative transfer code that predicted at-sensor radiance. Through this process, equations and parameters were derived for the KOMPSAT-3A sensor to enable the conversion of calibrated DN to physical units, such as at-sensor radiance or TOA reflectance. (2) To validate the absolute calibration coefficients for the KOMPSAT-3A sensor, we performed a radiometric validation with a comparison of KOMPSAT-3A and Landsat-8 TOA reflectance using one of the six PICS (Libya 4). Correlations between top-of-atmosphere (TOA) radiances and the spectral band responses of the KOMPSAT-3A sensors at the Zuunmod, Mongolia and Goheung, South Korea sites were significant for multispectral bands. The average difference in TOA reflectance between KOMPSAT-3A and Landsat-8 image over the Libya 4, Libya site in the red-green-blue (RGB) region was under 3%, whereas in the NIR band, the TOA reflectance of KOMPSAT-3A was lower than the that of Landsat-8 due to the difference in the band passes of two sensors. The KOMPSAT-3Aensor includes a band pass near 940 nm that can be strongly absorbed by water vapor and therefore displayed low reflectance. Toovercome this, we need to undertake a detailed analysis using rescale methods, such as the spectral bandwidth adjustment factor.

  13. New opportunities for secure communication networks using shaped femtosecond laser pulses inducing filamentation processes in the atmosphere

    Science.gov (United States)

    Alyami, H. M.; Becerra, V. M.; Hadjiloucas, S.

    2013-11-01

    The current study discusses new opportunities for secure ground to satellite communications using shaped femtosecond pulses that induce spatial hole burning in the atmosphere for efficient communications with data encoded within super-continua generated by femtosecond pulses. Refractive index variation across the different layers in the atmosphere may be modelled using assumptions that the upper strata of the atmosphere and troposphere behaving as layered composite amorphous dielectric networks composed of resistors and capacitors with different time constants across each layer. Input-output expressions of the dynamics of the networks in the frequency domain provide the transmission characteristics of the propagation medium. Femtosecond pulse shaping may be used to optimize the pulse phase-front and spectral composition across the different layers in the atmosphere. A generic procedure based on evolutionary algorithms to perform the pulse shaping is proposed. In contrast to alternative procedures that would require ab initio modelling and calculations of the propagation constant for the pulse through the atmosphere, the proposed approach is adaptive, compensating for refractive index variations along the column of air between the transmitter and receiver.

  14. Quantum theory allows for absolute maximal contextuality

    Science.gov (United States)

    Amaral, Barbara; Cunha, Marcelo Terra; Cabello, Adán

    2015-12-01

    Contextuality is a fundamental feature of quantum theory and a necessary resource for quantum computation and communication. It is therefore important to investigate how large contextuality can be in quantum theory. Linear contextuality witnesses can be expressed as a sum S of n probabilities, and the independence number α and the Tsirelson-like number ϑ of the corresponding exclusivity graph are, respectively, the maximum of S for noncontextual theories and for the theory under consideration. A theory allows for absolute maximal contextuality if it has scenarios in which ϑ /α approaches n . Here we show that quantum theory allows for absolute maximal contextuality despite what is suggested by the examination of the quantum violations of Bell and noncontextuality inequalities considered in the past. Our proof is not constructive and does not single out explicit scenarios. Nevertheless, we identify scenarios in which quantum theory allows for almost-absolute-maximal contextuality.

  15. Absolute photoacoustic thermometry in deep tissue.

    Science.gov (United States)

    Yao, Junjie; Ke, Haixin; Tai, Stephen; Zhou, Yong; Wang, Lihong V

    2013-12-15

    Photoacoustic thermography is a promising tool for temperature measurement in deep tissue. Here we propose an absolute temperature measurement method based on the dual temperature dependences of the Grüneisen parameter and the speed of sound in tissue. By taking ratiometric measurements at two adjacent temperatures, we can eliminate the factors that are temperature irrelevant but difficult to correct for in deep tissue. To validate our method, absolute temperatures of blood-filled tubes embedded ~9 mm deep in chicken tissue were measured in a biologically relevant range from 28°C to 46°C. The temperature measurement accuracy was ~0.6°C. The results suggest that our method can be potentially used for absolute temperature monitoring in deep tissue during thermotherapy.

  16. Secure Objectives for School Security

    Science.gov (United States)

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  17. Security Components of Globalization

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2015-05-01

    Full Text Available The objective of this paper is our intention to present what are the main connections between globalization and international security. In terms of global security we can perceive the globalization as a process by which global state is represented by the UN, with a single world system, represented by major security organizations and with global effects. We will present from the beginning the main theoretical aspects that define the phenomenon of globalization, and then our contribution in assessing the implications of this phenomenon on the regional and global security. The results of our research are materialized in the last part of the paper. They emphasize the personal assessments on how the phenomenon of globalization has direct effect on global security. When talking about government, we think of norms, rules and decisionmaking procedures in the management of international life. The value that we add to the new scientific interpretation of the definition of globalization is represented, primarily, by the valuable bibliographic used resources and the original approach on the concept that refers to the links between globalization and security. This article may be, at any time, a starting point in an interesting research direction in the field of global security.

  18. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  19. Absolute Asymmetric Synthesis Using A Cocrystal Approach

    Institute of Scientific and Technical Information of China (English)

    H.Koshima

    2007-01-01

    1 Results Absolute asymmetric synthesis by means of solid-state reaction of chiral crystals self-assembled from achiral molecules is an attractive and promising methodology for asymmetric synthesis because it is not necessary to employ any external chiral source like a chiral catalyst.In order to design reliably absolute asymmetric syntheses in the solid state,it is inevitable to prepare and predict the formation of chiral crystals from achiral compounds.We have prepared a number of chiral cocrystals co...

  20. Absolute-Magnitude Distributions of Supernovae

    CERN Document Server

    Richardson, Dean; Wright, John; Maddox, Larry

    2014-01-01

    The absolute-magnitude distributions of seven supernova types are presented. The data used here were primarily taken from the Asiago Supernova Catalogue, but were supplemented with additional data. We accounted for both foreground and host-galaxy extinction. A bootstrap method is used to correct the samples for Malmquist bias. Separately, we generate volume-limited samples, restricted to events within 100 Mpc. We find that the superluminous events (M_B -15) make up about 3%. The normal Ia distribution was the brightest with a mean absolute blue magnitude of -19.25. The IIP distribution was the dimmest at -16.75.

  1. Absolute Stability Limit for Relativistic Charged Spheres

    CERN Document Server

    Giuliani, Alessandro

    2007-01-01

    We find an exact solution for the stability limit of relativistic charged spheres for the case of constant gravitational mass density and constant charge density. We argue that this provides an absolute stability limit for any relativistic charged sphere in which the gravitational mass density decreases with radius and the charge density increases with radius. We then provide a cruder absolute stability limit that applies to any charged sphere with a spherically symmetric mass and charge distribution. We give numerical results for all cases. In addition, we discuss the example of a neutral sphere surrounded by a thin, charged shell.

  2. Autonomous Micro-Modular Mobile Data Center Cloud Computing Study for Modeling, Simulation, Information Processing and Cyber-Security Viability Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Cloud computing security penetration testing and anomaly detection defense studies were conducted to assess the adequacy of cloud computing security.  Since...

  3. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  4. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  5. Wireless Security

    CERN Document Server

    Osterhage, Wolfgang

    2011-01-01

    In the wake of the growing use of wireless communications, new types of security risks have evolved. Wireless Security covers the major topic of wireless communications with relevance both to organizations and private users. The technological background of these applications and protocols is laid out and presented in detail. Special emphasis is placed on the IEEE 802.11x-Standards that have been introduced for WLAN technology. Other technologies covered besides WLAN include: mobile phones, bluetooth and infrared. In each chapter a major part is devoted to security risks and provisions includin

  6. Analysis of five theses interpreting structural violence and the exercise of governance in the process of managing public security and violence prevention in the City of Santa Tecla

    Directory of Open Access Journals (Sweden)

    Juan Carlos Morales Peña

    2014-05-01

    Full Text Available The objective of this academic paper is to demonstrate an unconventional proposition for analytical interpretation of the way in which any effort to regenerate social fabric is followed by another process of social deconstruction. This study’s approach is based on the interdependent relationship between security and development, which exposes the collision of two forms of logic; that is, one regarding their interconnected nature, where there is a significant degree of social cohesion and regeneration that is indispensible to strengthen community organization, and is part of the content of the violence prevention strategies, and other citizen security and coexistence policies. Additionally, there is another destructuring logic, with the capacity to amass new social input at present to undertake future deconstruction. In this regard, the proposal is the existence of a phenomenon of legitimate summation that is unconscious of the future risk, and its empowerment of adverse effects on society, and its development in the matrix comprised of cooperation-cooptation-conflict.DOI: http://dx.doi.org/10.5377/rpsp.v1i1.1389

  7. Bio-Inspired Stretchable Absolute Pressure Sensor Network.

    Science.gov (United States)

    Guo, Yue; Li, Yu-Hung; Guo, Zhiqiang; Kim, Kyunglok; Chang, Fu-Kuo; Wang, Shan X

    2016-01-02

    A bio-inspired absolute pressure sensor network has been developed. Absolute pressure sensors, distributed on multiple silicon islands, are connected as a network by stretchable polyimide wires. This sensor network, made on a 4'' wafer, has 77 nodes and can be mounted on various curved surfaces to cover an area up to 0.64 m × 0.64 m, which is 100 times larger than its original size. Due to Micro Electro-Mechanical system (MEMS) surface micromachining technology, ultrathin sensing nodes can be realized with thicknesses of less than 100 µm. Additionally, good linearity and high sensitivity (~14 mV/V/bar) have been achieved. Since the MEMS sensor process has also been well integrated with a flexible polymer substrate process, the entire sensor network can be fabricated in a time-efficient and cost-effective manner. Moreover, an accurate pressure contour can be obtained from the sensor network. Therefore, this absolute pressure sensor network holds significant promise for smart vehicle applications, especially for unmanned aerial vehicles.

  8. SECURITY MECHANISM FOR MANETS

    Directory of Open Access Journals (Sweden)

    YASIR ABDELGADIR MOHAMED

    2009-06-01

    Full Text Available Be short of well-defined networks boundaries, shared medium, collaborative services, and dynamic nature, all are representing some of the key characteristics that distinguish mobile ad hoc networks from the conventional ones. Besides, each node is a possible part of the essential support infrastructure, cooperate with each other to make basic communication services available. Forwarding packets or participating in routing process, either of each can directly affect the network security state. Nevertheless, ad hoc networks are suspectable to the same vulnerabilities and prone to the same types of failures as conventional networks. Even though immune-inspired approaches aren’t essentially new to the research domain, the percentage of applying immune features in solving security problems fluctuates. In this paper, security approach based on both immunity and multi-agent paradigm is presented. Distributability, second response, and self recovery, are the hallmarks of the proposed security model which put a consideration on high nodes mobility.

  9. Intelligent Sensors Security

    Directory of Open Access Journals (Sweden)

    Andrzej Bialas

    2010-01-01

    Full Text Available The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IEC 15408 used for IT products and systems. The paper begins with a primer on the Common Criteria, and then a general security model of the intelligent sensor as an IT product is discussed. The paper presents how the security problem of the intelligent sensor is defined and solved. The contribution of the paper is to provide Common Criteria (CC related security design patterns and to improve the effectiveness of the sensor development process.

  10. Intelligent Sensors Security

    Science.gov (United States)

    Bialas, Andrzej

    2010-01-01

    The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IEC 15408) used for IT products and systems. The paper begins with a primer on the Common Criteria, and then a general security model of the intelligent sensor as an IT product is discussed. The paper presents how the security problem of the intelligent sensor is defined and solved. The contribution of the paper is to provide Common Criteria (CC) related security design patterns and to improve the effectiveness of the sensor development process. PMID:22315571

  11. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  12. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  13. Security Studies

    OpenAIRE

    ,

    2005-01-01

    Security Studies has firmly established itself as a leading journal on international security issues. The journal publishes theoretical, historical and policy-oriented articles on the causes and consequences of war, and the sources and conditions of peace. The journal has published articles on balancing vs. bandwagoning, deterrence in enduring rivalries, the Domino theory, nuclear weapons proliferation, civil-military relations, political reforms in China, strategic culture in Asia and the P...

  14. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  15. Energy Security

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With an increasing number of countries becoming industrialized, energy, the so-called blood of modern economies, is becoming increasingly important Energy security has become an important factor that directly influences world economic stability and international relations. In an article posted on People's Daily Online, Liu Jianfei, professor at the International Strategic Research Center of the Party School of the Central Committee of the Communist Party of China, shares his opinions on energy security.

  16. Citizen Security

    OpenAIRE

    Beatriz Abizanda

    2011-01-01

    This is a presentation for the Caribbean Regional ConSoc Retreat held on June 16, 2011 in Kingston, Jamaica. This document outlines crime and violence as major roadblocks to development in the Caribbean; citing statistics and providing examples of the economic costs to the region. This presentation then goes on to describe the IDB's strategy with regard to citizen security and highlights IDB Funded security programs in the region. The presentation also identifies Civil Society as a potentiall...

  17. Stimulus Probability Effects in Absolute Identification

    Science.gov (United States)

    Kent, Christopher; Lamberts, Koen

    2016-01-01

    This study investigated the effect of stimulus presentation probability on accuracy and response times in an absolute identification task. Three schedules of presentation were used to investigate the interaction between presentation probability and stimulus position within the set. Data from individual participants indicated strong effects of…

  18. Time Function and Absolute Black Hole

    DEFF Research Database (Denmark)

    Javadi, Hossein; Forouzbakhsh, Farshid

    2006-01-01

    Einstein’s theory of gravity is not consistent with quantum mechanics, because general relativity cannot be quantized. [1] But without conversion of force and energy, it is impossible to find a grand unified theory. A very important result of CPH theory is time function that allows we give a new ...... description of absolute black hole and before the big bang....

  19. Teaching Absolute Value Inequalities to Mature Students

    Science.gov (United States)

    Sierpinska, Anna; Bobos, Georgeana; Pruncut, Andreea

    2011-01-01

    This paper gives an account of a teaching experiment on absolute value inequalities, whose aim was to identify characteristics of an approach that would realize the potential of the topic to develop theoretical thinking in students enrolled in prerequisite mathematics courses at a large, urban North American university. The potential is…

  20. Thin-film magnetoresistive absolute position detector

    NARCIS (Netherlands)

    Groenland, Johannes Petrus Jacobus

    1990-01-01

    The subject of this thesis is the investigation of a digital absolute posi- tion-detection system, which is based on a position-information carrier (i.e. a magnetic tape) with one single code track on the one hand, and an array of magnetoresistive sensors for the detection of the informatio

  1. Det demokratiske argument for absolut ytringsfrihed

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2014-01-01

    Artiklen diskuterer den påstand, at absolut ytringsfrihed er en nødvendig forudsætning for demokratisk legitimitet med udgangspunkt i en rekonstruktion af et argument fremsat af Ronald Dworkin. Spørgsmålet er, hvorfor ytringsfrihed skulle være en forudsætning for demokratisk legitimitet, og hvorf...

  2. Magnetoresistive sensor for absolute position detection

    NARCIS (Netherlands)

    Groenland, J.P.J.

    1984-01-01

    A digital measurement principle for absolute position is decscribed. The position data is recorded serially into a single track of a hard-magnetic layer with the help of longitudinal saturation recording. Detection is possible by means of an array of sensor elements which can be made of a substrate.

  3. Generalized Norms Inequalities for Absolute Value Operators

    Directory of Open Access Journals (Sweden)

    Ilyas Ali

    2014-02-01

    Full Text Available In this article, we generalize some norms inequalities for sums, differences, and products of absolute value operators. Our results based on Minkowski type inequalities and generalized forms of the Cauchy-Schwarz inequality. Some other related inequalities are also discussed.

  4. New Techniques for Absolute Gravity Measurements.

    Science.gov (United States)

    1983-01-07

    Hammond, J.A. (1978) Bollettino Di Geofisica Teorica ed Applicata Vol. XX. 8. Hammond, J. A., and Iliff, R. L. (1979) The AFGL absolute gravity system...International Gravimetric Bureau, No. L:I-43. 7. Hammond. J.A. (1978) Bollettino Di Geofisica Teorica ed Applicata Vol. XX. 8. Hammond, J.A., and

  5. Det demokratiske argument for absolut ytringsfrihed

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2014-01-01

    Artiklen diskuterer den påstand, at absolut ytringsfrihed er en nødvendig forudsætning for demokratisk legitimitet med udgangspunkt i en rekonstruktion af et argument fremsat af Ronald Dworkin. Spørgsmålet er, hvorfor ytringsfrihed skulle være en forudsætning for demokratisk legitimitet, og hvorfor...

  6. Stimulus Probability Effects in Absolute Identification

    Science.gov (United States)

    Kent, Christopher; Lamberts, Koen

    2016-01-01

    This study investigated the effect of stimulus presentation probability on accuracy and response times in an absolute identification task. Three schedules of presentation were used to investigate the interaction between presentation probability and stimulus position within the set. Data from individual participants indicated strong effects of…

  7. Experiencing Security in Interaction Design

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg; Bødker, Susanne

    2011-01-01

    Security is experienced differently in different contexts. This paper argues that in everyday situations, users base their security decisions on a mix of prior experiences. When approaching security and interaction design from an experience approach, tools that help bring out such relevant...... experiences for design are needed. This paper reports on how Prompted exploration workshops and Acting out security were developed to target such experiences when iteratively designing a mobile digital signature solution in a participatory design process. We discuss how these tools helped the design process...

  8. Inter and intrastate conflicts nexus: The Colombian Peace process, as a means to prevent interstate conflicts in South America and rethink regional security

    Directory of Open Access Journals (Sweden)

    Sandra Montoya

    2017-05-01

    Full Text Available The Colombian internal conflict case provides useful scenarios, realities and dynamics for nourishing the debate between those who treat internal and interstate conflicts as disconnected or totally independent phenomena and those who argue the frequent links between them. This policy paper is situated in the latter school of thought, and from that angle I shall argue the usefulness of perceiving the nexus between intrastate and interstate conflicts, and its applicability to the Colombian internal conflict. The paper highlights the importance of taking into account the strong nexus in order to prevent international disputes that put regional security at risk; it also suggests that the current Colombian peace process represents an historic opportunity for Colombia –and a great challenge for the Colombian society– while at the same time being an opportunity for thinking about a shared future in the South America region, which challenges the Colombian state and its performance at the international level.

  9. Absolute Radiation Thermometry in the NIR

    Science.gov (United States)

    Bünger, L.; Taubert, R. D.; Gutschwager, B.; Anhalt, K.; Briaudeau, S.; Sadli, M.

    2017-04-01

    A near infrared (NIR) radiation thermometer (RT) for temperature measurements in the range from 773 K up to 1235 K was characterized and calibrated in terms of the "Mise en Pratique for the definition of the Kelvin" (MeP-K) by measuring its absolute spectral radiance responsivity. Using Planck's law of thermal radiation allows the direct measurement of the thermodynamic temperature independently of any ITS-90 fixed-point. To determine the absolute spectral radiance responsivity of the radiation thermometer in the NIR spectral region, an existing PTB monochromator-based calibration setup was upgraded with a supercontinuum laser system (0.45 μm to 2.4 μm) resulting in a significantly improved signal-to-noise ratio. The RT was characterized with respect to its nonlinearity, size-of-source effect, distance effect, and the consistency of its individual temperature measuring ranges. To further improve the calibration setup, a new tool for the aperture alignment and distance measurement was developed. Furthermore, the diffraction correction as well as the impedance correction of the current-to-voltage converter is considered. The calibration scheme and the corresponding uncertainty budget of the absolute spectral responsivity are presented. A relative standard uncertainty of 0.1 % (k=1) for the absolute spectral radiance responsivity was achieved. The absolute radiometric calibration was validated at four temperature values with respect to the ITS-90 via a variable temperature heatpipe blackbody (773 K ...1235 K) and at a gold fixed-point blackbody radiator (1337.33 K).

  10. Croatian bank investments in securities

    Directory of Open Access Journals (Sweden)

    Antun Jurman

    2005-12-01

    Full Text Available In this paper the author presents the basic characteristics of debt securities and shares and analyses the amount, structure and characteristics of the securities portfolio in Croatian banks in period from 1993 to 2004. The analysis shows that in the entire analyzed period Republic of Croatia together with state funds and other public institutions was the main issuer of securities that banks have in their portfolios. The securities issued by banks and companies represent only a marginal part of banks’ portfolios but it is also true that banks have strongly supported the privatization process of state owned companies by providing credit for purchasing of shares and later on swapping their credit claims for shares. In this way banks acquired a significant portfolio of shares that they later sold on the open market. Data about the significant reduction of securities portfolio in the banking assets structure, from 46.1% in 1993 to only 10.6% in 2004, is indicative of a low level of trading in securities. This means that in the following years, central and local government should secure the necessary funds more by issuing securities than by credit, especially not by taking credit from abroad. Furthermore, in order to spread business with securities, banks should also substitute a portion of their credit portfolio with short and long term securities. In this way, the investors would be able to use the benefits of investing in securities instead of investing their funds in bank deposits as they have done until now.

  11. Information risk and security modeling

    Science.gov (United States)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  12. Capturing security requirements for software systems

    Directory of Open Access Journals (Sweden)

    Hassan El-Hadary

    2014-07-01

    Full Text Available Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  13. Capturing security requirements for software systems.

    Science.gov (United States)

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-07-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  14. Secure Java For Web Application Development

    CERN Document Server

    Bhargav, Abhay

    2010-01-01

    As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers are unaware of the importance of a robust application security program. This book aims to educate readers on application security and building secure web applications using the new Java Platform. The text details a secure web application development process from the risk assessment phase to the proof of concept phase. The authors detail such concepts as application risk assessment, secure SDLC, security compliance requirements, web application vulnerabilities and threats, security

  15. ITIL (R) and Information Security

    OpenAIRE

    Jašek, Roman; Králík, Lukáš; Popelka, Miroslav

    2015-01-01

    This paper discusses the context of ITIL framework and management of information security. It is therefore a summary study, where the first part is focused on the safety objectives in connection with the ITIL framework. First of all, there is a focus on ITIL process ISM (Information Security Management), its principle and system management. The conclusion is about link between standards, which are related to security, and ITIL framework.

  16. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  17. Data security.

    Science.gov (United States)

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement.

  18. From Hubble's NGSL to Absolute Fluxes

    Science.gov (United States)

    Heap, Sara R.; Lindler, Don

    2012-01-01

    Hubble's Next Generation Spectral Library (NGSL) consists of R-l000 spectra of 374 stars of assorted temperature, gravity, and metallicity. Each spectrum covers the wavelength range, 0.18-1.00 microns. The library can be viewed and/or downloaded from the website, http://archive.stsci.edu/prepds/stisngsll. Stars in the NGSL are now being used as absolute flux standards at ground-based observatories. However, the uncertainty in the absolute flux is about 2%, which does not meet the requirements of dark-energy surveys. We are therefore developing an observing procedure that should yield fluxes with uncertainties less than 1 % and will take part in an HST proposal to observe up to 15 stars using this new procedure.

  19. Absolute and relative dosimetry for ELIMED

    Science.gov (United States)

    Cirrone, G. A. P.; Cuttone, G.; Candiano, G.; Carpinelli, M.; Leonora, E.; Lo Presti, D.; Musumarra, A.; Pisciotta, P.; Raffaele, L.; Randazzo, N.; Romano, F.; Schillaci, F.; Scuderi, V.; Tramontana, A.; Cirio, R.; Marchetto, F.; Sacchi, R.; Giordanengo, S.; Monaco, V.

    2013-07-01

    The definition of detectors, methods and procedures for the absolute and relative dosimetry of laser-driven proton beams is a crucial step toward the clinical use of this new kind of beams. Hence, one of the ELIMED task, will be the definition of procedures aiming to obtain an absolute dose measure at the end of the transport beamline with an accuracy as close as possible to the one required for clinical applications (i.e. of the order of 5% or less). Relative dosimetry procedures must be established, as well: they are necessary in order to determine and verify the beam dose distributions and to monitor the beam fluence and the energetic spectra during irradiations. Radiochromic films, CR39, Faraday Cup, Secondary Emission Monitor (SEM) and transmission ionization chamber will be considered, designed and studied in order to perform a fully dosimetric characterization of the ELIMED proton beam.

  20. Absolute calibration of TFTR helium proportional counters

    Energy Technology Data Exchange (ETDEWEB)

    Strachan, J.D.; Diesso, M.; Jassby, D.; Johnson, L.; McCauley, S.; Munsat, T.; Roquemore, A.L. [Princeton Univ., NJ (United States). Plasma Physics Lab.; Barnes, C.W. [Princeton Univ., NJ (United States). Plasma Physics Lab.]|[Los Alamos National Lab., NM (United States); Loughlin, M. [Princeton Univ., NJ (United States). Plasma Physics Lab.]|[JET Joint Undertaking, Abingdon (United Kingdom)

    1995-06-01

    The TFTR helium proportional counters are located in the central five (5) channels of the TFTR multichannel neutron collimator. These detectors were absolutely calibrated using a 14 MeV neutron generator positioned at the horizontal midplane of the TFTR vacuum vessel. The neutron generator position was scanned in centimeter steps to determine the collimator aperture width to 14 MeV neutrons and the absolute sensitivity of each channel. Neutron profiles were measured for TFTR plasmas with time resolution between 5 msec and 50 msec depending upon count rates. The He detectors were used to measure the burnup of 1 MeV tritons in deuterium plasmas, the transport of tritium in trace tritium experiments, and the residual tritium levels in plasmas following 50:50 DT experiments.

  1. Asteroid absolute magnitudes and slope parameters

    Science.gov (United States)

    Tedesco, Edward F.

    1991-01-01

    A new listing of absolute magnitudes (H) and slope parameters (G) has been created and published in the Minor Planet Circulars; this same listing will appear in the 1992 Ephemerides of Minor Planets. Unlike previous listings, the values of the current list were derived from fits of data at the V band. All observations were reduced in the same fashion using, where appropriate, a single basis default value of 0.15 for the slope parameter. Distances and phase angles were computed for each observation. The data for 113 asteroids was of sufficiently high quality to permit derivation of their H and G. These improved absolute magnitudes and slope parameters will be used to deduce the most reliable bias-corrected asteroid size-frequency distribution yet made.

  2. Absolute zero and the conquest of cold

    CERN Document Server

    Shachtman, Tom

    2000-01-01

    In a sweeping yet marvelously concise history, Tom Shachtman ushers us into a world in which scientists tease apart the all-important secrets of cold. Readers take an extraordinary trip, starting in the 1600s with an alchemist's air conditioning of Westminster Abbey and scientists' creation of thermometers. Later, while entrepreneurs sold Walden Pond ice to tropical countries -- packed in "high-tech" sawdust -- researchers pursued absolute zero and interpreted their work as romantically as did adventurers to remote regions. Today, playing with ultracold temperatures is one of the hottest frontiers in physics, with scientists creating useful particles Einstein only dreamed of. Tom Shachtman shares a great scientific adventure story and its characters' rich lives in a book that has won a grant from the prestigious Alfred P. Sloan Foundation. Absolute Zero is for everyone who loves history and science history stories, who's eager to explore Nobel Prize-winning physics today, or who has ever sighed with pleasure ...

  3. An absolute measure for a key currency

    Science.gov (United States)

    Oya, Shunsuke; Aihara, Kazuyuki; Hirata, Yoshito

    It is generally considered that the US dollar and the euro are the key currencies in the world and in Europe, respectively. However, there is no absolute general measure for a key currency. Here, we investigate the 24-hour periodicity of foreign exchange markets using a recurrence plot, and define an absolute measure for a key currency based on the strength of the periodicity. Moreover, we analyze the time evolution of this measure. The results show that the credibility of the US dollar has not decreased significantly since the Lehman shock, when the Lehman Brothers bankrupted and influenced the economic markets, and has increased even relatively better than that of the euro and that of the Japanese yen.

  4. Absolute and relative dosimetry for ELIMED

    Energy Technology Data Exchange (ETDEWEB)

    Cirrone, G. A. P.; Schillaci, F.; Scuderi, V. [INFN, Laboratori Nazionali del Sud, Via Santa Sofia 62, Catania, Italy and Institute of Physics Czech Academy of Science, ELI-Beamlines project, Na Slovance 2, Prague (Czech Republic); Cuttone, G.; Candiano, G.; Musumarra, A.; Pisciotta, P.; Romano, F. [INFN, Laboratori Nazionali del Sud, Via Santa Sofia 62, Catania (Italy); Carpinelli, M. [INFN Sezione di Cagliari, c/o Dipartimento di Fisica, Università di Cagliari, Cagliari (Italy); Leonora, E.; Randazzo, N. [INFN-Sezione di Catania, Via Santa Sofia 64, Catania (Italy); Presti, D. Lo [INFN-Sezione di Catania, Via Santa Sofia 64, Catania, Italy and Università di Catania, Dipartimento di Fisica e Astronomia, Via S. Sofia 64, Catania (Italy); Raffaele, L. [INFN, Laboratori Nazionali del Sud, Via Santa Sofia 62, Catania, Italy and INFN-Sezione di Catania, Via Santa Sofia 64, Catania (Italy); Tramontana, A. [INFN, Laboratori Nazionali del Sud, Via Santa Sofia 62, Catania, Italy and Università di Catania, Dipartimento di Fisica e Astronomia, Via S. Sofia 64, Catania (Italy); Cirio, R.; Sacchi, R.; Monaco, V. [INFN, Sezione di Torino, Via P.Giuria, 1 10125 Torino, Italy and Università di Torino, Dipartimento di Fisica, Via P.Giuria, 1 10125 Torino (Italy); Marchetto, F.; Giordanengo, S. [INFN, Sezione di Torino, Via P.Giuria, 1 10125 Torino (Italy)

    2013-07-26

    The definition of detectors, methods and procedures for the absolute and relative dosimetry of laser-driven proton beams is a crucial step toward the clinical use of this new kind of beams. Hence, one of the ELIMED task, will be the definition of procedures aiming to obtain an absolute dose measure at the end of the transport beamline with an accuracy as close as possible to the one required for clinical applications (i.e. of the order of 5% or less). Relative dosimetry procedures must be established, as well: they are necessary in order to determine and verify the beam dose distributions and to monitor the beam fluence and the energetic spectra during irradiations. Radiochromic films, CR39, Faraday Cup, Secondary Emission Monitor (SEM) and transmission ionization chamber will be considered, designed and studied in order to perform a fully dosimetric characterization of the ELIMED proton beam.

  5. Computers, business, and security the new role for security

    CERN Document Server

    Schweitzer, James A

    1987-01-01

    Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs.Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communicat

  6. Requirements of a Better Secure Program Coding

    Directory of Open Access Journals (Sweden)

    Marius POPA

    2012-01-01

    Full Text Available Secure program coding refers to how manage the risks determined by the security breaches because of the program source code. The papers reviews the best practices must be doing during the software development life cycle for secure software assurance, the methods and techniques used for a secure coding assurance, the most known and common vulnerabilities determined by a bad coding process and how the security risks are managed and mitigated. As a tool of the better secure program coding, the code review process is presented, together with objective measures for code review assurance and estimation of the effort for the code improvement.

  7. [SYSTEMATIZATION, ORDER AND SECURITY AS A RESULT OF THE NURSE ASSESSMENT IN PAEDIATRIC EMERGENCY: A METAMORPHOSIS PROCESS].

    Science.gov (United States)

    García-Hernández, M-Noelia; Fraga-Hernández, Ma Elena; Mahtani-Chugani, Vinita

    2014-12-01

    To determine from the health care professionals perspective the impact on clinical practice of incorporating an assessment tool for primary care paediatric emergency. Qualitative study based on the collection of written documents. Twenty-four wide and detailed documents were collected. Thematic analysis was used. Participants were 9 nurses and 7 paediatricians, all with experience in the Paediatric Emergency Department. The results are grouped into three areas: perception of previous situation; benefits perceived; difficulties of the change process related to the triage instrument. The benefits perceived include the achievement of the objectives related to triage as well as collateral benefits for the organization and distribution of structural resources, adequacy of human resources, self-assessment and professional recognition, improvement of team communication and users service perception. The difficulties identified are related to the feasibility of using this instrument when patient flow is high and to the need of specialized training. All participants perceived more benefits than disadvantages, and both nurses and paediatricians experienced the process as a positive experience. The introduction of the assessment tool had a broader impact than expected.

  8. The absolute differential calculus (calculus of tensors)

    CERN Document Server

    Levi-Civita, Tullio

    2013-01-01

    Written by a towering figure of twentieth-century mathematics, this classic examines the mathematical background necessary for a grasp of relativity theory. Tullio Levi-Civita provides a thorough treatment of the introductory theories that form the basis for discussions of fundamental quadratic forms and absolute differential calculus, and he further explores physical applications.Part one opens with considerations of functional determinants and matrices, advancing to systems of total differential equations, linear partial differential equations, algebraic foundations, and a geometrical intro

  9. Absolute vs. Relative Notion of Wealth Changes

    OpenAIRE

    2009-01-01

    This paper discusses solutions derived from lottery experiments using two alternative assumptions: that people perceive wealth changes as absolute amounts of money; and that people consider wealth changes as a proportion of some reference value dependant on the context of the problem under consideration. The former assumption leads to the design of Prospect Theory, the latter - to a solution closely resembling the utility function hypothesized by Markowitz (1952B). This paper presents several...

  10. The absolute gravity measurement by FG5 gravimeter at Great Wall Station, Antarctica

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Gravity measurement is of great importance to the height datum in Antarctica.The absolute gravity measurement was carried out at Great Wall Station, Antarctica, using FG5 absolute gravity instrument.The gravity data was processed with corrections of earth tide, ocean tide, polar motion and the atmospher, and the RMS is within +3 x 10 -s ms-2.The vertical and horizontal gravity gradients were measured using 2 LaCoaste & Romberg (LCR) gravimeters.The absolute gravity measurement provides the fundamental data for the validation and calibration of the satellite gravity projects such as CHAMP, GRACE and GOCE, and for the high accuracy geoid model.

  11. Students versus IoT Security

    CERN Document Server

    CERN. Geneva

    2017-01-01

    What happens when you introduce students to IoT security for the first time? In this talk I will tell you about my first experience with IoT Security and the thought process behind the decisions I made.

  12. M-Banking Security - a futuristic improved security approach

    Directory of Open Access Journals (Sweden)

    Aaradhana A Deshmukh

    2010-01-01

    Full Text Available In last few decades large technology development raised various new needs. Financial sector has also no exception. People are approaching all over the world to fulfill there dreams. Any sector needs to understand changing need of customer. In order to satisfy financial need for customer banks are taking help of new technology such as internet. Only problem remain is of security. The aim of this work is to provide a secure environment in terms of security for transaction by various ways. In order to improve security we are making use of "Steganography" technique in the way never used before. Task of enhancing security include construction of formula for both data encryption and also for hiding pattern. Server should not process any fake request hence concept of custom "Session id" and "Request id" is introduced. Implementation of such a security constraints in banking sector not only help to serve customer in better way but also make customer confident and satisfy.

  13. M-Banking Security - a futuristic improved security approach

    CERN Document Server

    Navale, Geeta S; Deshmukh, Aaradhana A

    2010-01-01

    In last few decades large technology development raised various new needs. Financial sector has also no exception. People are approaching all over the world to fulfill there dreams. Any sector needs to understand changing need of customer. In order to satisfy financial need for customer banks are taking help of new technology such as internet. Only problem remain is of security. The aim of this work is to provide a secure environment in terms of security for transaction by various ways. In order to improve security we are making use of "Steganography" technique in the way never used before. Task of enhancing security include construction of formula for both data encryption and also for hiding pattern. Server should not process any fake request hence concept of custom "Session id" and "Request id" is introduced. Implementation of such a security constraints in banking sector not only help to serve customer in better way but also make customer confident and satisfy.

  14. Information Security Service Branding – beyond information security awareness

    Directory of Open Access Journals (Sweden)

    Rahul Rastogi

    2012-12-01

    Full Text Available End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of information security in the organization and exhibit non-compliance. In order to improve compliance levels, it is vital to improve the image of information security in the minds of end-users. This paper borrows the concepts of brands and branding from the domain of marketing to achieve this objective and applies these concepts to information security. The paper also describes a process for creating the information security service brand in the organization.

  15. Measurement of absolute gravity acceleration in Firenze

    Science.gov (United States)

    de Angelis, M.; Greco, F.; Pistorio, A.; Poli, N.; Prevedelli, M.; Saccorotti, G.; Sorrentino, F.; Tino, G. M.

    2011-01-01

    This paper reports the results from the accurate measurement of the acceleration of gravity g taken at two separate premises in the Polo Scientifico of the University of Firenze (Italy). In these laboratories, two separate experiments aiming at measuring the Newtonian constant and testing the Newtonian law at short distances are in progress. Both experiments require an independent knowledge on the local value of g. The only available datum, pertaining to the italian zero-order gravity network, was taken more than 20 years ago at a distance of more than 60 km from the study site. Gravity measurements were conducted using an FG5 absolute gravimeter, and accompanied by seismic recordings for evaluating the noise condition at the site. The absolute accelerations of gravity at the two laboratories are (980 492 160.6 ± 4.0) μGal and (980 492 048.3 ± 3.0) μGal for the European Laboratory for Non-Linear Spectroscopy (LENS) and Dipartimento di Fisica e Astronomia, respectively. Other than for the two referenced experiments, the data here presented will serve as a benchmark for any future study requiring an accurate knowledge of the absolute value of the acceleration of gravity in the study region.

  16. Measurement of absolute gravity acceleration in Firenze

    Directory of Open Access Journals (Sweden)

    M. de Angelis

    2011-01-01

    Full Text Available This paper reports the results from the accurate measurement of the acceleration of gravity g taken at two separate premises in the Polo Scientifico of the University of Firenze (Italy. In these laboratories, two separate experiments aiming at measuring the Newtonian constant and testing the Newtonian law at short distances are in progress. Both experiments require an independent knowledge on the local value of g. The only available datum, pertaining to the italian zero-order gravity network, was taken more than 20 years ago at a distance of more than 60 km from the study site. Gravity measurements were conducted using an FG5 absolute gravimeter, and accompanied by seismic recordings for evaluating the noise condition at the site. The absolute accelerations of gravity at the two laboratories are (980 492 160.6 ± 4.0 μGal and (980 492 048.3 ± 3.0 μGal for the European Laboratory for Non-Linear Spectroscopy (LENS and Dipartimento di Fisica e Astronomia, respectively. Other than for the two referenced experiments, the data here presented will serve as a benchmark for any future study requiring an accurate knowledge of the absolute value of the acceleration of gravity in the study region.

  17. Global security in the Mediterranean

    Directory of Open Access Journals (Sweden)

    Elvira Sánchez Mateos

    2002-06-01

    Full Text Available In the last decade, the WEU, NATO and specially the European Union (in the framework of the Barcelona process initiated security dialogues with countries East and South of the Mediterranean Basin. Those processes are far to achieve significant progress. Some arguments help to explain the present situation: on the one hand, European countries and organizations lack clear strategic goals and consistent policies. On the other, difficulties to create a security dialogue in the Mediterranean, which is a precondition to generateboth a common language and security culture, are the result of differences between the European and the Arab security cultures. Nevertheless, the geopolitical environment, the Euro-Mediterranean process itself and the development of the European Union demanda strategic revision on how to implement the objectives of the Barcelona Declaration, reformulating the idea of Euro-Mediterranean Partnership towards a new concept of shared security that integrates Southern interests and concerns.

  18. Information technology security system engineering methodology

    Science.gov (United States)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  19. Social Security at the Crossroads.

    Science.gov (United States)

    International Labour Review, 1980

    1980-01-01

    Social security schemes need to be streamlined and the underlying policies made more coherent to obtain the fullest possible return on expenditure. Third World countries need to reflect very seriously on the role of social security in the development process and on the management problems involved. (CT)

  20. Impacts of Irrigation and Climate Change on Water Security: Using Stakeholder Engagement to Inform a Process-based Crop Model

    Science.gov (United States)

    Leonard, A.; Flores, A. N.; Han, B.; Som Castellano, R.; Steimke, A.

    2016-12-01

    Irrigation is an essential component for agricultural production in arid and semi-arid regions, accounting for a majority of global freshwater withdrawals used for human consumption. Since climate change affects both the spatiotemporal demand and availability of water in irrigated areas, agricultural productivity and water efficiency depend critically on how producers adapt and respond to climate change. It is necessary, therefore, to understand the coevolution and feedbacks between humans and agricultural systems. Integration of social and hydrologic processes can be achieved by active engagement with local stakeholders and applying their expertise to models of coupled human-environment systems. Here, we use a process based crop simulation model (EPIC) informed by stakeholder engagement to determine how both farm management and climate change influence regional agricultural water use and production in the Lower Boise River Basin (LBRB) of southwest Idaho. Specifically, we investigate how a shift from flood to sprinkler fed irrigation would impact a watershed's overall agricultural water use under RCP 4.5 and RCP 8.5 climate scenarios. The LBRB comprises about 3500 km2, of which 20% is dedicated to irrigated crops and another 40% to grass/pasture grazing land. Via interviews of stakeholders in the LBRB, we have determined that approximately 70% of irrigated lands in the region are flood irrigated. We model four common crops produced in the LBRB (alfalfa, corn, winter wheat, and sugarbeets) to investigate both hydrologic and agricultural impacts of irrigation and climatic drivers. Factors influencing farmers' decision to switch from flood to sprinkler irrigation include potential economic benefits, external financial incentives, and providing a buffer against future water shortages. These two irrigation practices are associated with significantly different surface water and energy budgets, and large-scale shifts in practice could substantially impact regional

  1. Absolute cross-section normalization of magnetic neutron scattering data

    Science.gov (United States)

    Xu, Guangyong; Xu, Zhijun; Tranquada, J. M.

    2013-08-01

    We discuss various methods to obtain the resolution volume for neutron scattering experiments, in order to perform absolute normalization on inelastic magnetic neutron scattering data. Examples from previous experiments are given. We also try to provide clear definitions of a number of physical quantities which are commonly used to describe neutron magnetic scattering results, including the dynamic spin correlation function and the imaginary part of the dynamic susceptibility. Formulas that can be used for general purposes are provided and the advantages of the different normalization processes are discussed.

  2. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  3. Arctic Security

    DEFF Research Database (Denmark)

    Wang, Nils

    2013-01-01

    of the general security situation and to identify both the explicit and the implicit agendas of the primary state actors. The region contains all the ingredients for confrontation and conflict but the economical potential for all the parties concerned creates a general interest in dialogue and cooperation...

  4. Secure Ties

    NARCIS (Netherlands)

    Joep de Hart; Frans Knol; Cora Maas - de Waal; Theo Roes

    2002-01-01

    Original title: Zekere banden. Discussions about the Netherlands of today often throw up terms such as 'social cohesion', 'social integration', 'liveability' and 'security'. The Netherlands Institute for Social Research/SCP has carried out a study of this phenomenon and presents the results in this

  5. Secured transactions

    NARCIS (Netherlands)

    Beale, H.

    2008-01-01

    In this paper I describe the work that is currently under way, within the Network of Excellence charged with creating a draft Common Frame of Reference, to draft rules on security over moveable assets. After a brief introduction, I deal with two broad questions: (1) the general aims and scope of the

  6. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no state

  7. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  8. Private Security Contractors in Darfur

    DEFF Research Database (Denmark)

    Leander, Anna

    2006-01-01

    This article argues that the role of Private Security Contractors in Darfur reflects and reinforces neo-liberal governmentality in contemporary security governance. It is an argument (in line with other articles in this special issue) which is more interested in discussing how the privatization....... It underlines that governance is increasingly taking place through a set of (quasi-) markets, it is marked by entrepreneurial values, and a hands off approach to governance. We then discuss the way this overall change is reflected in and reinforced by the role of private security contractors in Darfur. Drawing...... at these processes is necessary to understand the role of private security contractors in Darfur. But more than this, practices in Darfur entrench neo-liberal governmentality in security more generally. The managerial and `de-politicizing' approach to security in Darfur displaces alternative views not only...

  9. Active Vibration Isolation Using a Voice Coil Actuator with Absolute Velocity Feedback Control

    OpenAIRE

    Yun-Hui Liu; Wei-Hao Wu

    2013-01-01

    This paper describes the active vibration isolation using a voice coil actuator with absolute velocity feedback control for highly sensitive instruments (e.g., atomic force microscopes) which suffer from building vibration. Compared with traditional isolators, the main advantage of the proposed isolation system is that it produces no isolator resonance. The absolute vibration velocity signal is acquired from an accelerator and processed through an integrator, and is then input to the controll...

  10. Opinions about Component Energetic Security

    OpenAIRE

    Elena GOLUMBEANU (GEORGESCU)

    2012-01-01

    Collective security (international) represent the morphological expression of individual security components. According to the Report presented at the United Nations Development Programme, collective security (international) as well as national security, is the expression of seven synergistic dimensions as follows: economic security, food security, environmental security, personal security, community security, political security and individual security. As part of economic security, energy an...

  11. Roadmap on optical security

    Science.gov (United States)

    Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam

    2016-08-01

    : Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.

  12. Cyber Security Evaluation Tool

    Energy Technology Data Exchange (ETDEWEB)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization’s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied to enhance cybersecurity controls.

  13. Security Analysis of Secure Force Algorithm for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shujaat Khan

    2014-09-01

    Full Text Available — In Wireless Sensor Networks, the sensor nodes are battery powered small devices designed for long battery life. These devices also lack in terms of processing capability and memory. In order to provide high confidentiality to these resource constrained network nodes, a suitable security algorithm is needed to be deployed that can establish a balance between security level and processing overhead. The objective of this research work is to perform a security analysis and performance evaluation of recently proposed Secure Force algorithm. This paper shows the comparison of Secure Force 64, 128, and 192 bit architecture on the basis of avalanche effect (key sensitivity, entropy change analysis, image histogram, and computational time. Moreover, based on the evaluation results,the paper also suggests the possible solutions for the weaknesses of the SF algorithm.

  14. Household food security, Ghana.

    Science.gov (United States)

    Tetebo, R

    1997-12-01

    Two major projects incorporating household food security components have been implemented since the ICN. The first is a UNICEF-funded project that addresses community participation in development. The second is a FAO-funded project: "Promoting Household Food Security and Improving Nutrition through Nutrition Education and Training." This project examines the effects of processing and storage procedures on the nutrient quality of traditional and indigenous fruits and vegetables. It is a young project, but much is being learned from it. Other projects aim to minimize food wastage during processing and storage by developing new processing machinery for use by rural households. Women's issues have become central since the ICN and there is increased support from both government and nongovernment sources to help women with food production and processing.

  15. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  16. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  17. Technology Empowerment: Security Challenges.

    Energy Technology Data Exchange (ETDEWEB)

    Warren, Drake Edward [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backus, George A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Wendell [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nelson, Thomas R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Skocypec, Russell D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-03-01

    “Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment will continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.

  18. Food security vs. nutrition security.

    Science.gov (United States)

    Venugopal, K R

    1999-01-01

    This article presents the status of food security versus nutrition security in India. Food security is defined as the availability and the access of food to all people; whereas nutrition security demands the intake of a wide range of foods which provides the essential needed nutrients. It is estimated that the average dietary intake in India is 2280 calories. In 9 major states, the average was less than 2400 calories, suggesting poverty. In a 1988-90 survey, only 10% of the children, and about 50% of the adults, were considered to have a normal nutritional status. The rest suffered from different levels of Chronic Energy Deficiency. In addition, contradictions have also developed within policies in India that seek to address these issues. Recognizing that agriculture is the key to poverty eradication, India recently drafted the Agriculture Policy. The Policy focuses on rain-fed farming, unemployment, and malnutrition in rural areas, revitalizing the cooperatives, and increasing the involvement of nongovernmental organizations. However, there are certain issues of concern in the Policy with the most damaging aspect seen in the promotion of existing inequalities in the rural sector.

  19. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  20. Security bingo for administrators

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Have you ever thought about the security of your service(s) or system(s)? Show us and win one of three marvellous books on computer security! Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us at Computer.Security@cern.ch or P.O. Box G19710, by November 14th 2011.   Winners[1] must show us that they follow at least five good practices in a continuous horizontal row, vertical column or diagonal. For details on CERN Computer Security, please consult http://cern.ch/security. My service or system…   …is following a software development life-cycle. …is patched in an automatic and timely fashion. …runs a tightened local ingress/egress firewall. …uses CERN Single-Sign-On (SSO). …has physical access protections in place. …runs all processes / services / applications with least privileges. …has ...

  1. Achieving Climate Change Absolute Accuracy in Orbit

    Science.gov (United States)

    Wielicki, Bruce A.; Young, D. F.; Mlynczak, M. G.; Thome, K. J; Leroy, S.; Corliss, J.; Anderson, J. G.; Ao, C. O.; Bantges, R.; Best, F.; Bowman, K.; Brindley, H.; Butler, J. J.; Collins, W.; Dykema, J. A.; Doelling, D. R.; Feldman, D. R.; Fox, N.; Huang, X.; Holz, R.; Huang, Y.; Jennings, D.; Jin, Z.; Johnson, D. G.; Jucks, K.; Kato, S.; Kratz, D. P.; Liu, X.; Lukashin, C.; Mannucci, A. J.; Phojanamongkolkij, N.; Roithmayr, C. M.; Sandford, S.; Taylor, P. C.; Xiong, X.

    2013-01-01

    The Climate Absolute Radiance and Refractivity Observatory (CLARREO) mission will provide a calibration laboratory in orbit for the purpose of accurately measuring and attributing climate change. CLARREO measurements establish new climate change benchmarks with high absolute radiometric accuracy and high statistical confidence across a wide range of essential climate variables. CLARREO's inherently high absolute accuracy will be verified and traceable on orbit to Système Internationale (SI) units. The benchmarks established by CLARREO will be critical for assessing changes in the Earth system and climate model predictive capabilities for decades into the future as society works to meet the challenge of optimizing strategies for mitigating and adapting to climate change. The CLARREO benchmarks are derived from measurements of the Earth's thermal infrared spectrum (5-50 micron), the spectrum of solar radiation reflected by the Earth and its atmosphere (320-2300 nm), and radio occultation refractivity from which accurate temperature profiles are derived. The mission has the ability to provide new spectral fingerprints of climate change, as well as to provide the first orbiting radiometer with accuracy sufficient to serve as the reference transfer standard for other space sensors, in essence serving as a "NIST [National Institute of Standards and Technology] in orbit." CLARREO will greatly improve the accuracy and relevance of a wide range of space-borne instruments for decadal climate change. Finally, CLARREO has developed new metrics and methods for determining the accuracy requirements of climate observations for a wide range of climate variables and uncertainty sources. These methods should be useful for improving our understanding of observing requirements for most climate change observations.

  2. Absolute calibration of the Auger fluorescence detectors

    Energy Technology Data Exchange (ETDEWEB)

    Bauleo, P.; Brack, J.; Garrard, L.; Harton, J.; Knapik, R.; Meyhandan, R.; Rovero, A.C.; /Buenos Aires, IAFE; Tamashiro, A.; Warner, D.

    2005-07-01

    Absolute calibration of the Pierre Auger Observatory fluorescence detectors uses a light source at the telescope aperture. The technique accounts for the combined effects of all detector components in a single measurement. The calibrated 2.5 m diameter light source fills the aperture, providing uniform illumination to each pixel. The known flux from the light source and the response of the acquisition system give the required calibration for each pixel. In the lab, light source uniformity is studied using CCD images and the intensity is measured relative to NIST-calibrated photodiodes. Overall uncertainties are presently 12%, and are dominated by systematics.

  3. Absolute quantification of myocardial blood flow.

    Science.gov (United States)

    Yoshinaga, Keiichiro; Manabe, Osamu; Tamaki, Nagara

    2016-07-21

    With the increasing availability of positron emission tomography (PET) myocardial perfusion imaging, the absolute quantification of myocardial blood flow (MBF) has become popular in clinical settings. Quantitative MBF provides an important additional diagnostic or prognostic information over conventional visual assessment. The success of MBF quantification using PET/computed tomography (CT) has increased the demand for this quantitative diagnostic approach to be more accessible. In this regard, MBF quantification approaches have been developed using several other diagnostic imaging modalities including single-photon emission computed tomography, CT, and cardiac magnetic resonance. This review will address the clinical aspects of PET MBF quantification and the new approaches to MBF quantification.

  4. ABSOLUT LOMO绝对创意

    Institute of Scientific and Technical Information of China (English)

    婷婷(整理)

    2007-01-01

    ABSOLUT与创意素来有着不解之缘。由Andy Warhal的ABSOLUT WARHOL至今,已有超过400位不同领域的创意大师为ABSOLUT的当代艺术宝库贡献了自己的得意之作。ABSOLUT的创意仿佛永远不会枯竭,而一系列的作品也让惊喜从未落空。

  5. Absolute Priority for a Vehicle in VANET

    Science.gov (United States)

    Shirani, Rostam; Hendessi, Faramarz; Montazeri, Mohammad Ali; Sheikh Zefreh, Mohammad

    In today's world, traffic jams waste hundreds of hours of our life. This causes many researchers try to resolve the problem with the idea of Intelligent Transportation System. For some applications like a travelling ambulance, it is important to reduce delay even for a second. In this paper, we propose a completely infrastructure-less approach for finding shortest path and controlling traffic light to provide absolute priority for an emergency vehicle. We use the idea of vehicular ad-hoc networking to reduce the imposed travelling time. Then, we simulate our proposed protocol and compare it with a centrally controlled traffic light system.

  6. Musical Activity Tunes Up Absolute Pitch Ability

    DEFF Research Database (Denmark)

    Dohn, Anders; Garza-Villarreal, Eduardo A.; Ribe, Lars Riisgaard

    2014-01-01

    Absolute pitch (AP) is the ability to identify or produce pitches of musical tones without an external reference. Active AP (i.e., pitch production or pitch adjustment) and passive AP (i.e., pitch identification) are considered to not necessarily coincide, although no study has properly compared...... that APs generally undershoot when adjusting musical pitch, a tendency that decreases when musical activity increases. Finally, APs are less accurate when adjusting the pitch to black key targets than to white key targets. Hence, AP ability may be partly practice-dependent and we speculate that APs may...

  7. Development of an absolute neutron dosimeter

    Energy Technology Data Exchange (ETDEWEB)

    Acevedo, C; Birstein, L; Loyola, H [Section de Desarrollos Innovativos, Comision Chilena de EnergIa Nuclear (CCHEN), Casilla 188-D, Santiago (Chile)], E-mail: lbirstei@cchen.cl

    2008-11-01

    An Absolute Neutron Dosimeter was developed to be used as a calibration standard for the Radiation Metrology Laboratory at CCHEN. The main component of the Dosimeter consists of a Proportional Counter of cylindrical shape, with Polyethylene walls and Ethylene gas in its interior. It includes a cage shaped arrangement of graphite bars that operates like the Proportional Counter cathode and a tungsten wire of 25 {mu}m in diameter {mu}m as the anode. Results of a Montecarlo modeling for the Dosimeter operation and results of tests and measurements performed with a radioactive source are presented.

  8. Musical Activity Tunes Up Absolute Pitch Ability

    DEFF Research Database (Denmark)

    Dohn, Anders; Garza-Villarreal, Eduardo A.; Ribe, Lars Riisgaard

    2014-01-01

    Absolute pitch (AP) is the ability to identify or produce pitches of musical tones without an external reference. Active AP (i.e., pitch production or pitch adjustment) and passive AP (i.e., pitch identification) are considered to not necessarily coincide, although no study has properly compared...... that APs generally undershoot when adjusting musical pitch, a tendency that decreases when musical activity increases. Finally, APs are less accurate when adjusting the pitch to black key targets than to white key targets. Hence, AP ability may be partly practice-dependent and we speculate that APs may...

  9. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    , but while creation of defensive alliances appears unrealistic, new defence laws appearing 1909 show strong resolve to defend Denmark’s status as a neutral power. The Great War proves that these laws provided an adequate tool to be wielded by the politicians actually in office during that conflict. Following....... Moreover, they estimated that armed defence was a priori hopeless and possibly even dangerous as it might attract unnecessary attention by a would-be belligerent. Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During...... the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe, but while creation of defensive alliances appears unrealistic, new defence laws appearing 1909 show strong resolve to defend Denmark’s status as a neutral...

  10. Image Security

    Science.gov (United States)

    2007-11-02

    popularity, contemplates the cru- cial needs for protecting intellectual property rights on multimedia content like images, video, audio , and oth- ers...protection for still images, audio , video, and multimedia products.’ The networking environment of the future will require tools that provide m secure and fast...technique known as steganography ? Steganography , or “covered writing,” George Voyatzis and Ioannis Pitas University of Thessaloniki has a long

  11. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  12. Security Policy at Road’s End? The Roles of Sweden and Finland in the Nordic-Baltic Defence Cooperation Process

    Directory of Open Access Journals (Sweden)

    Winnerstig Mike

    2014-12-01

    Full Text Available The article addresses a number of questions related to Nordic and to an extent also Nordic-Baltic defence cooperation. First of all, how far has Nordic and Nordic-Baltic defence cooperation come today? Secondly, what are the differences in the approaches of Sweden and Finland when it comes to defence cooperation, especially regarding NATO, in the Nordic-Baltic area? As a first analytical result, it is apparent that the rhetorical standing of the Nordic and Nordic-Baltic defence cooperation process is greater than its real achievements, especially in terms of defence integration. Secondly, it seems also to be clear that the defence and security policy debates of Sweden and Finland are quite different. Some problems identified in the debates within the two countries, respectively, are very similar although the suggested solutions vary very remarkably. Regarding the key issue of NATO membership, the developments of the last few years suggest that the Swedish political establishment, as well as the general public, might be closer to a substantial discussion of NATO membership than their Finnish equivalents.

  13. The Informatics Security Cost of Distributed Applications

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2010-01-01

    Full Text Available The objective, necessity, means and estimated efficiency of information security cost modeling are presented. The security requirements of distributed informatics applications are determined. Aspects regarding design, development and implementation are established. Influence factors for informatics security are presented and their correlation is analyzed. The costs associated to security processes are studied. Optimal criteria for informatics security are established. The security cost of the informatics application for validating organizational identifiers is determined using theoretical assumptions made for cost models. The conclusions highlight the validity of research results and offer perspectives for future research.

  14. ABSOLUTE STABILITY OF GENERAL LURIE TYPE INDIRECT CONTROL SYSTEMS

    Institute of Scientific and Technical Information of China (English)

    甘作新; 葛渭高; 赵素霞; 仵永先

    2001-01-01

    In this paper, by introducing a new concept of absolute stability for a certain argument, necessary and sufficient conditions for absolute stability of general Lurie indirect control systems are obtained, and some practical sufficient conditions are also given.

  15. Absolute Orientation Based on Distance Kernel Functions

    Directory of Open Access Journals (Sweden)

    Yanbiao Sun

    2016-03-01

    Full Text Available The classical absolute orientation method is capable of transforming tie points (TPs from a local coordinate system to a global (geodetic coordinate system. The method is based only on a unique set of similarity transformation parameters estimated by minimizing the total difference between all ground control points (GCPs and the fitted points. Nevertheless, it often yields a transformation with poor accuracy, especially in large-scale study cases. To address this problem, this study proposes a novel absolute orientation method based on distance kernel functions, in which various sets of similarity transformation parameters instead of only one set are calculated. When estimating the similarity transformation parameters for TPs using the iterative solution of a non-linear least squares problem, we assigned larger weighting matrices for the GCPs for which the distances from the point are short. The weighting matrices can be evaluated using the distance kernel function as a function of the distances between the GCPs and the TPs. Furthermore, we used the exponential function and the Gaussian function to describe distance kernel functions in this study. To validate and verify the proposed method, six synthetic and two real datasets were tested. The accuracy was significantly improved by the proposed method when compared to the classical method, although a higher computational complexity is experienced.

  16. Absolute stereochemistry of altersolanol A and alterporriols.

    Science.gov (United States)

    Kanamaru, Saki; Honma, Miho; Murakami, Takanori; Tsushima, Taro; Kudo, Shinji; Tanaka, Kazuaki; Nihei, Ken-Ichi; Nehira, Tatsuo; Hashimoto, Masaru

    2012-02-01

    The absolute stereochemistry of altersolanol A (1) was established by observing a positive exciton couplet in the circular dichroism (CD) spectrum of the C3,C4-O-bis(2-naphthoyl) derivative 10 and by chemical correlations with known compound 8. Before the discussion, the relative stereochemistry of 1 was confirmed by X-ray crystallographic analysis. The shielding effect at C7'-OMe group by C1-O-benzoylation established the relative stereochemical relationship between the C8-C8' axial bonding and the C1-C4/C1'-C4' polyol moieties of alterporriols E (3), an atropisomer of the C8-C8' dimer of 1. As 3 could be obtained by dimerization of 1 in vitro, the absolute configuration of its central chirality elements (C1-C4) must be identical to those of 1. Spectral comparison between the experimental and theoretical CD spectra supported the above conclusion. Axial stereochemistry of novel C4-O-deoxy dimeric derivatives, alterporriols F (4) and G (5), were also revealed by comparison of their CD spectra to those of 2 and 3.

  17. Absolute Electron Extraction Efficiency of Liquid Xenon

    Science.gov (United States)

    Kamdin, Katayun; Mizrachi, Eli; Morad, James; Sorensen, Peter

    2016-03-01

    Dual phase liquid/gas xenon time projection chambers (TPCs) currently set the world's most sensitive limits on weakly interacting massive particles (WIMPs), a favored dark matter candidate. These detectors rely on extracting electrons from liquid xenon into gaseous xenon, where they produce proportional scintillation. The proportional scintillation from the extracted electrons serves to internally amplify the WIMP signal; even a single extracted electron is detectable. Credible dark matter searches can proceed with electron extraction efficiency (EEE) lower than 100%. However, electrons systematically left at the liquid/gas boundary are a concern. Possible effects include spontaneous single or multi-electron proportional scintillation signals in the gas, or charging of the liquid/gas interface or detector materials. Understanding EEE is consequently a serious concern for this class of rare event search detectors. Previous EEE measurements have mostly been relative, not absolute, assuming efficiency plateaus at 100%. I will present an absolute EEE measurement with a small liquid/gas xenon TPC test bed located at Lawrence Berkeley National Laboratory.

  18. Security of supply

    OpenAIRE

    2007-01-01

    Paul Isbell revisits the energy security debate; John Gault considers European security and natural gas supplies; William C. Ramsay discusses security of energy supplies in a global market; Hasan M. Qabazard outlines OPEC’s abiding commitment to energy security.

  19. From targets to ripples: tracing the process of developing a community capacity building appraisal tool with remote Australian Indigenous communities to tackle food security.

    Science.gov (United States)

    Brimblecombe, Julie; van den Boogaard, Christel; Ritchie, Jan; Bailie, Ross; Coveney, John; Liberato, Selma

    2014-09-04

    The issue of food security is complex and requires capacity for often-unrelated groups to work together. We sought to assess the relevance and meaning of a commonly used set of community capacity development constructs in the context of remote Indigenous Australia and through this propose a model to support capacity. The assessment was conducted with four communities and took place over five steps that involved: (i) test of clarity of construct meaning; (ii) inductive derivation of community capacity constructs; (iii) application of these constructs to the capacity of community multi-sector food-interest groups; (iv) a cross-check of these constructs and their meanings to literature-derived constructs, and; (v) achieving consensus on tool constructs. Data were collected over a three-year period (2010-2012) that involved two on-site visits to one community, and two urban-based workshops. These data were augmented by food-interest group meeting minutes and reports. Eleven community capacity development constructs were included in the proposed model: community ownership, building on strengths, strong leadership and voice, making decisions together, strong partnerships, opportunities for learning and skill development, way of working, getting together the things you need, good strong communication, sharing the true story, and continuing the process and passing on to the next generation. The constructs derived from the literature and commonly used to appraise community capacity development were well accepted and could be used to identify areas needing strengthening. The specifics of each construct however differed from those derived from the literature yet were similar across the four communities and had particular meaning for those involved. The involvement of elders and communication with the wider community seemed paramount to forming a solid foundation on which capacity could be further developed. This study explored an approach for ascribing context specific

  20. Tree Rings and Volcanic Eruptions: Reviewing the Potential of Dendrochemistry for the Absolute Dating of Past Volcanism

    Science.gov (United States)

    Pearson, C.; Manning, S. W.; Coleman, M.; Jarvis, K.

    2003-12-01

    Investigations of volcanic impact on human society and the environment are presently restrained by a lack of secure absolute dates for eruptions prior to the last few hundred years. The degree of impact and recovery, and the scope of any sociological repercussions, can only be fully explored if working from a precise, known, starting point and against a secure absolute timescale. A potential means to high resolution dating for the majority of the Holocene lies with globally available, absolutely dated tree ring chronologies. Many of these have been shown to record short term climatic alterations in periods following volcanic eruptions of known or approximate date. This argument however, has been based on an apparent correlation between the dates of specific tree ring growth anomalies and the dates of a number of eruptions in the recent historical period. The statistical correlation is less than decisive and the exact volcano-climate-tree growth linkage is by no means universally agreed. It has been suggested that a potential means to solve this problem and to attach absolute dates to volcanic eruptions via tree rings may lie in the chemistry of the annual woody increment. This paper assesses the potential of conventional Inductively Coupled Plasma Mass Spectrometry (ICP-MS) versus laser ablation ICP-MS (LA-ICP-MS) in terms of exploring this research objective. It also reviews the prospects for a dendrochemical resolution to the problem of attributing an absolute date to the volcanic eruptions of prehistory.

  1. A Conceptual Approach to Absolute Value Equations and Inequalities

    Science.gov (United States)

    Ellis, Mark W.; Bryson, Janet L.

    2011-01-01

    The absolute value learning objective in high school mathematics requires students to solve far more complex absolute value equations and inequalities. When absolute value problems become more complex, students often do not have sufficient conceptual understanding to make any sense of what is happening mathematically. The authors suggest that the…

  2. Invariant and Absolute Invariant Means of Double Sequences

    Directory of Open Access Journals (Sweden)

    Abdullah Alotaibi

    2012-01-01

    Full Text Available We examine some properties of the invariant mean, define the concepts of strong σ-convergence and absolute σ-convergence for double sequences, and determine the associated sublinear functionals. We also define the absolute invariant mean through which the space of absolutely σ-convergent double sequences is characterized.

  3. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  4. Securing cloud services a pragmatic approach to security architecture in the cloud

    CERN Document Server

    Newcombe, Lee

    2012-01-01

    This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud.

  5. Unconditional security at a low cost

    CERN Document Server

    Ma, X

    2006-01-01

    By simulating four quantum key distribution (QKD) experiments and analyzing one decoy-state QKD experiment, we compare two data post-processing schemes based on security against individual attack by L\\"{u}tkenhaus, and unconditional security analysis by Gottesman-Lo-L\\"{u}tkenhaus-Preskill. Our results show that these two schemes yield close performances. Since the Holy Grail of QKD is its unconditional security, we conclude that one is better off considering unconditional security, rather than restricting to individual attacks.

  6. Security Management Model in Cloud Computing Environment

    OpenAIRE

    2016-01-01

    In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge. In order to address security issues cloud computing virtualization environment, this paper presents a virtual machine based on efficient and dynamic deployment VM security management model state migration and scheduling, study of which virtual machine security architecture, based on AHP (Analytic Hierarchy Process) virtual machine de...

  7. Absolute stellar photometry on moderate-resolution FPA images

    Science.gov (United States)

    Stone, T.C.

    2009-01-01

    An extensive database of star (and Moon) images has been collected by the ground-based RObotic Lunar Observatory (ROLO) as part of the US Geological Survey program for lunar calibration. The stellar data are used to derive nightly atmospheric corrections for the observations from extinction measurements, and absolute calibration of the ROLO sensors is based on observations of Vega and published reference flux and spectrum data. The ROLO telescopes were designed for imaging the Moon at moderate resolution, thus imposing some limitations for the stellar photometry. Attaining accurate stellar photometry with the ROLO image data has required development of specialized processing techniques. A key consideration is consistency in discriminating the star core signal from the off-axis point spread function. The analysis and processing methods applied to the ROLO stellar image database are described. ?? 2009 BIPM and IOP Publishing Ltd.

  8. Use of Absolute and Comparative Performance Feedback in Absolute and Comparative Judgments and Decisions

    Science.gov (United States)

    Moore, Don A.; Klein, William M. P.

    2008-01-01

    Which matters more--beliefs about absolute ability or ability relative to others? This study set out to compare the effects of such beliefs on satisfaction with performance, self-evaluations, and bets on future performance. In Experiment 1, undergraduate participants were told they had answered 20% correct, 80% correct, or were not given their…

  9. Use of Absolute and Comparative Performance Feedback in Absolute and Comparative Judgments and Decisions

    Science.gov (United States)

    Moore, Don A.; Klein, William M. P.

    2008-01-01

    Which matters more--beliefs about absolute ability or ability relative to others? This study set out to compare the effects of such beliefs on satisfaction with performance, self-evaluations, and bets on future performance. In Experiment 1, undergraduate participants were told they had answered 20% correct, 80% correct, or were not given their…

  10. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  11. Information Security

    OpenAIRE

    Hartel, Pieter; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W. Ph.

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  12. How is an absolute democracy possible?

    Directory of Open Access Journals (Sweden)

    Joanna Bednarek

    2011-01-01

    Full Text Available In the last part of the Empire trilogy, Commonwealth, Negri and Hardt ask about the possibility of the self-governance of the multitude. When answering, they argue that absolute democracy, understood as the political articulation of the multitude that does not entail its unification (construction of the people is possible. As Negri states, this way of thinking about political articulation is rooted in the tradition of democratic materialism and constitutes the alternative to the dominant current of modern political philosophy that identifies political power with sovereignty. The multitude organizes itself politically by means of the constitutive power, identical with the ontological creativity or productivity of the multitude. To state the problem of political organization means to state the problem of class composition: political democracy is at the same time economic democracy.

  13. Absolute geostrophic currents in global tropical oceans

    Science.gov (United States)

    Yang, Lina; Yuan, Dongliang

    2016-11-01

    A set of absolute geostrophic current (AGC) data for the period January 2004 to December 2012 are calculated using the P-vector method based on monthly gridded Argo profiles in the world tropical oceans. The AGCs agree well with altimeter geostrophic currents, Ocean Surface Current Analysis-Real time currents, and moored current-meter measurements at 10-m depth, based on which the classical Sverdrup circulation theory is evaluated. Calculations have shown that errors of wind stress calculation, AGC transport, and depth ranges of vertical integration cannot explain non-Sverdrup transport, which is mainly in the subtropical western ocean basins and equatorial currents near the Equator in each ocean basin (except the North Indian Ocean, where the circulation is dominated by monsoons). The identified non-Sverdrup transport is thereby robust and attributed to the joint effect of baroclinicity and relief of the bottom (JEBAR) and mesoscale eddy nonlinearity.

  14. Variance computations for functional of absolute risk estimates.

    Science.gov (United States)

    Pfeiffer, R M; Petracci, E

    2011-07-01

    We present a simple influence function based approach to compute the variances of estimates of absolute risk and functions of absolute risk. We apply this approach to criteria that assess the impact of changes in the risk factor distribution on absolute risk for an individual and at the population level. As an illustration we use an absolute risk prediction model for breast cancer that includes modifiable risk factors in addition to standard breast cancer risk factors. Influence function based variance estimates for absolute risk and the criteria are compared to bootstrap variance estimates.

  15. WHY DOES LEIBNIZ NEED ABSOLUTE TIME?

    Directory of Open Access Journals (Sweden)

    NICOLÁS VAUGHAN C.

    2007-08-01

    Full Text Available Resumen: En este ensayo pongo en contraposición dos doctrinas conspicuamenteleibnicianas: la doctrina del tiempo relacional e ideal, y la doctrina de la armonía preestablecida. Argumentaré que si todas las substancias están necesariamentecoordinadas, entonces no tiene sentido negar el carácter absoluto y real del tiempo. En la primera sección describiré la concepción newtoniana y clarkeana del tiempo absoluto; en la segunda discutiré la crítica leibniciana a dicha concepción, crítica sobre la que se erige su doctrina relacional e ideal del tiempo; en la tercera sección daré un vistazo a la metafísica monádica madura de Leibniz, haciendo especial énfasis en la doctrina de la armonía preestablecida; finalmente, en la última sección sugeriré la existencia de una tensión irreconciliable entre estas dos doctrinas.Abstract: In this paper I bring together two characteristically Leibnizean doctrines:the doctrine of relational and ideal time, and the doctrine of preestablished harmony. I will argue that, if every substance is necessarily connected with another, then it makes no sense to deny absolute and real time. In the first section, I will describe Newton’s and Clarke’s conception of absolute time; then, in the second section, I will consider Leibniz’s critique of that conception, on which he bases his ideal and relational doctrine of time. In the third section I will look briefly at Leibniz’s mature monadic metaphysics, taking special account of his doctrine of preestablished harmony. In the last section, I will suggest that there is an irreconcilable tension between these two doctrines.

  16. What usable security really means: Trusting and engaging users

    OpenAIRE

    Kirlappos, I.; Sasse, M. A.

    2014-01-01

    Non-compliance with security mechanisms and processes poses a significant risk to organizational security. Current approaches focus on designing systems that restrict user actions to make them 'secure', or providing user interfaces to make security tools 'easy to use'. We argue that an important but often-neglected aspect of compliance is trusting employees to 'do what's right' for security. Previous studies suggest that most employees are intrinsically motivated to behave securely, and that ...

  17. Security Architecture of Cloud Computing

    Directory of Open Access Journals (Sweden)

    V.KRISHNA REDDY

    2011-09-01

    Full Text Available The Cloud Computing offers service over internet with dynamically scalable resources. Cloud Computing services provides benefits to the users in terms of cost and ease of use. Cloud Computing services need to address the security during the transmission of sensitive data and critical applications to shared and public cloud environments. The cloud environments are scaling large for data processing and storage needs. Cloud computing environment have various advantages as well as disadvantages on the data security of service consumers. This paper aims to emphasize the main security issues existing in cloud computing environments. The security issues at various levels of cloud computing environment is identified in this paper and categorized based on cloud computing architecture. This paper focuses on the usage of Cloud services and security issues to build these cross-domain Internet-connected collaborations.

  18. Motorola Secure Software Development Model

    Directory of Open Access Journals (Sweden)

    Francis Mahendran

    2008-08-01

    Full Text Available In today's world, the key to meeting the demand for improved security is to implement repeatable processes that reliably deliver measurably improved security. While many organizations have announced efforts to institutionalize a secure software development process, there is little or no industry acceptance for a common process improvement framework for secure software development. Motorola has taken the initiative to develop such a framework, and plans to share this with the Software Engineering Institute for possible inclusion into its Capability Maturity Model Integration (CMMI®. This paper will go into the details of how Motorola is addressing this issue. The model that is being developed is designed as an extension of the existing CMMI structure. The assumption is that the audience will have a basic understanding of the SEI CMM® / CMMI® process framework. The paper will not describe implementation details of a security process model or improvement framework, but will address WHAT security practices are required for a company with many organizations operating at different maturity levels. It is left to the implementing organization to answer the HOW, WHEN, WHO and WHERE aspects. The paper will discuss how the model is being implemented in the Motorola Software Group.

  19. COMPUTER NETWORK SECURITY ASSESSMENT WITH FUZZY ANALYTIC HIERARCHY PROCESS%基于模糊层次分析法的计算机网络安全评价

    Institute of Scientific and Technical Information of China (English)

    费军; 余丽华

    2011-01-01

    The hierarchy model of computer network security assessment was constructed in light of the characteristics of computer network and the factors influencing the network security. The fuzzy analytic hierarchy process based on triangular fuzzy numbers was applied to assess the network security comprehensively and quantitatively. Computation results of example indicate that the fuzzy analytic hierarchy process is suitable for quantitative integration of qualitative judgement, and it provides an exploratory approach for computer network security assessment.%根据计算机网络的特点及网络安全涉及的因素,建立计算机网络安全评价的层次结构模型,运用基于三角模糊数的模糊层次分析法实现对网络安全的综合量化评价.实例的计算结果表明模糊层次分析法适用于定性判断的量化综合,它为计算机网络安全评价提供了一种探索性方法.

  20. Security Verification of Secure MANET Routing Protocols

    Science.gov (United States)

    2012-03-22

    the destination. The route discovery phase is complete upon receipt of the RREP at the requesting node. The DYMO protocol is a simpler version of AODV ...described in this appendix. The protocols are Secure AODV (SAODV), Secure Efficient Distance Vector (SEAD), and Secure Link State Routing Protocol (SLSP...SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Matthew F. Steele, Captain, USAF AFIT/GCS/ENG/12-03 DEPARTMENT OF THE AIR FORCE AIR

  1. BUSINESS INTELLIGENCE SECURITY

    Directory of Open Access Journals (Sweden)

    Dragoş Ovidiu TOFAN

    2016-11-01

    Full Text Available Excess information characteristic to the current environment leads to the need for a change of the organizations’ perspective and strategy not only through the raw data processing, but also in terms of existing applications generating new information. The overwhelming evolution of digital technologies and web changes led to the adoption of new and adapted internal policies and the emergence of regulations at level of governments or different social organisms. Information security risks arising from the current dynamics demand fast solutions linked to hardware, software and also to education of human resources. Business Intelligence (BI solutions have their specific evolution in order to bring their contribution to ensure the protection of data through specific components (Big Data, cloud, analytics. The current trend of development of BI applications on mobile devices brings with it a number of shortcomings related to information security and require additional protective measure regarding flows, specific processing and data storage.

  2. Securing the Digital Economy

    Directory of Open Access Journals (Sweden)

    Valentin P. MĂZĂREANU

    2010-01-01

    Full Text Available The Digital economy has naturally led to thereconfiguration of communication and information processes.These processes are depending on the computer, starting fromthe personal one and reaching to computer networks, whetherlocal, metropolitan or global. These led to the development ofsuch information systems able to communicate information,systems that must also ensure the security of communicationsbetween computers within the company, but also betweencomputers of different parties, outside the company. As thecommunication between computers in the network has evolvedto electronic funds transfer (EFT, digital money andcommunication of personal data, internet banking, etc., theimportance of security issues of data transmitted over thenetwork also has increased. Even more as the network hasevolved into a “wireless” one.

  3. A process to estimate net infiltration using a site-scale water-budget approach, Rainier Mesa, Nevada National Security Site, Nevada, 2002–05

    Science.gov (United States)

    Smith, David W.; Moreo, Michael T.; Garcia, C. Amanda; Halford, Keith J.; Fenelon, Joseph M.

    2017-08-29

    This report documents a process used to estimate net infiltration from precipitation, evapotranspiration (ET), and soil data acquired at two sites on Rainier Mesa. Rainier Mesa is a groundwater recharge area within the Nevada National Security Site where recharged water flows through bedrock fractures to a deep (450 meters) water table. The U.S. Geological Survey operated two ET stations on Rainier Mesa from 2002 to 2005 at sites characterized by pinyon-juniper and scrub-brush vegetative cover. Precipitation and ET data were corrected to remove measurement biases and gap-filled to develop continuous datasets. Net infiltration (percolation below the root zone) and changes in root-zone water storage were estimated using a monthly water-balance model.Site-scale water-budget results indicate that the heavily-fractured welded-tuff bedrock underlying thin (<40 centimeters) topsoil is a critical water source for vegetation during dry periods. Annual precipitation during the study period ranged from fourth lowest (182 millimeters [mm]) to second highest (708 mm) on record (record = 55 years). Annual ET exceeded precipitation during dry years, indicating that the fractured-bedrock reservoir capacity is sufficient to meet atmospheric-evaporative demands and to sustain vegetation through extended dry periods. Net infiltration (82 mm) was simulated during the wet year after the reservoir was rapidly filled to capacity. These results support previous conclusions that preferential fracture flow was induced, resulting in an episodic recharge pulse that was detected in nearby monitoring wells. The occurrence of net infiltration only during the wet year is consistent with detections of water-level rises in nearby monitoring wells that occur only following wet years.

  4. Software Security Rules: SDLC Perspective

    Directory of Open Access Journals (Sweden)

    S. K. Pandey

    2009-10-01

    Full Text Available Software has become an integral part of everyday life. Everyday, millions of people perform transaction through internet, ATM, mobile phone, they send email & e-greetings, and use word processing and spreadsheet for various purpose. People use software bearing in mind that it is reliable and can be trust upon and the operation they perform is secured. Now, if these software have exploitable security hole then how can they be safe for use. Security brings value to software in terms of people’s trust. The value provided by secure software is of vital importance because many critical functions are entirely dependent on the software. That is why security is a serious topic which should be given proper attention during the entire SDLC, ‘right from the beginning’. For the proper implementation of security in the software, twenty one security rules are proposed in this paper along with validation results. It is found that by applying these rules as per given implementation mechanism, most of the vulnerabilities are eliminated in the software and a more secure software can be built.

  5. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  6. Zen and the art of information security

    CERN Document Server

    Winkler, Ira

    2007-01-01

    While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winkler's experiences making security understandable to the business world. Mr. Winkler is one of the most popular and highly rated speakers in the field of security, and lectures to tens of thousands of people a year. Zen and the Art of Information Security is based on one of his most well received international presentations.

  7. Pengembangan Diversifikasi Produk Pangan Olahan Lokal Bengkulu untuk Menun- jang Ketahanan Pangan Berkelanjutan Development of Bengkulu Local Food Processing Products Diversity to Support Sustainable Food Security

    Directory of Open Access Journals (Sweden)

    Wuri Marsigit

    2012-05-01

    Full Text Available The purpose of this study was to inventory and identify Bengkulu Local Food Processing Products diversity and the prospect to support sustainable food security. The study was conducted for about 9 months, from March to November 2009 in 10 regencies in Bengkulu Province. Respondents included 107 and met the following criteria: the owners of food home industry, restaurant, catering, cafeteria, and housewives who produce and sell food processing products. The respondents were interviewed using a structure questionnaire and randomly selected as a representation of coastal, downhill and uphill area. Collected data were analyzed descriptively. The results indicated that the raw materials of the products in costal area were dominated by fish and seafood (62.86 %, in downhill area were cereals, tubers and beans (61.11 %, and in uphill area were horticulture. Nutrient contents were dominated by carbohydrates (42.06 %. Majority of food producers had lack of knowledge and application of good manufacturing practices (93.46 %. Some of the products could be recommended to support the improvement of nutritional status for the community (39.25 % and the others were promoted as food packaging products (34.76 %. ABSTRAK Penelitian  ini  bertujuan  untuk  menginventarisir  dan  mengidentifikasi  jenis-jenis  pangan  olahan  lokal  Bengkulu, serta potensinya dalam menunjang ketahanan pangan berkelanjutan. Penelitian dilaksanakan selama lebih kurang8 bulan, yakni mulai Bulan Maret hingga Oktober 2009. Lokasi Penelitian meliputi 10 Kabupaten/Kota di Provinsi Bengkulu representasi wilayah pesisir, dataran rendah, dan dataran tinggi. Sebanyak 107 responden yang memenuhi kriteria yang ditentukan dijadikan sampel dalam penelitian ini. Data primer dikumpulkan dengan wawancara meng- gunakan kuesioner yang telah dipersiapkan, observasi dan dokumentasi produk. Pengolahan data dilakukan dengan tabulasi silang dan dianalisis secara deskriptif. Hasil Penelitian

  8. Securely Disposal Whole-Process Technology of PCBs Waste%多氯联苯废弃物安全处置全过程技术应用

    Institute of Scientific and Technical Information of China (English)

    马强

    2013-01-01

    提出多氯联苯(PCBs)现场清理、安全处置全过程的3项技术:①山沟堆沙区域PCBs废物地下封存点的物探技术;②PCBs污染现场清理范围的过程确定技术;③PCBs废物混配焚烧处理技术.由于PCBs废物含氯苯浓度高,且难分解,PCBs废物混配焚烧处理技术的关键的PCBs废物与其它危险废物经预处理混配后高温焚烧,焚烧系统焚烧PCBs废物产生的烟气在1 250℃高温下二次焚烧而完全分解;而焚烧系统的尾气处理技术则经过高效脱酸及重金属、二恶英吸附后,完全满足PCBs废物安全处理技术要求.%Three techniques of PCBs waste site clearance and securely disposal whole-process were proposed,i.e.,geophysical prospecting technology of PCBs waste underground storage site on the valley sand stack area,clearance scope process confirming technology of PCBs waste contaminated site and incineration disposal technology of PCBs waste compounding and mixing.Because PCBs waste contains high concentration of chlorine and benzene,and is difficult to decompose,key PCBs wastes were pretreated by mixing other hazard wastes and then incinerated at a high temperature.The flue gas will enter the secondary combustion chamber for further combustion at the temperature of 1 250 ℃,where organic compounds and dioxin will be fully decomposed.The high efficiency of deacidification and de-heavy mental is guaranteed,exhaust gas treatment technology will completely meet the demand of PCBs waste safe disposal.

  9. A recycling index for food and health security: urban Taipei.

    Science.gov (United States)

    Huang, Susana Tzy-Ying

    2010-01-01

    The modern food system has evolved into one with highly inefficient activities, producing waste at each step of the food pathway from growing to consumption and disposal. The present challenge is to improve recyclability in the food system as a fundamental need for food and health security. This paper develops a methodological approach for a Food Recycling Index (FRI) as a tool to assess recyclability in the food system, to identify opportunities to reduce waste production and environmental contamination, and to provide a self-assessment tool for participants in the food system. The urban Taipei framework was used to evaluate resource and nutrient flow within the food consumption and waste management processes of the food system. A stepwise approach for a FRI is described: (1) identification of the major inputs and outputs in the food chain; (2) classification of inputs and outputs into modules (energy, water, nutrients, and contaminants); (3) assignment of semi-quantitative scores for each module and food system process using a matrix; (4) assessment for recycling status and recyclability potential; (5) conversion of scores into sub-indices; (6) derivation of an aggregate FRI. A FRI of 1.24 was obtained on the basis of data for kitchen waste management in Taipei, a score which encompasses absolute and relative values for a comprehensive interpretation. It is apparent that a FRI could evolve into a broader ecosystem concept with health relevance. Community end-users and policy planners can adopt this approach to improve food and health security.

  10. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  11. Absolute and specific measures of research group excellence

    CERN Document Server

    Mryglod, O; Holovatch, Yu; Berche, B

    2012-01-01

    A desirable goal of scientific management is to introduce, if it exists, a simple and reliable way to measure the scientific excellence of publicly-funded research institutions and universities to serve as a basis for their ranking and financing. While citation-based indicators and metrics are easily accessible, they are far from being universally accepted as way to automate or inform evaluation processes or to replace evaluations based on peer review. Here we consider absolute measurements of research excellence at an amalgamated, institutional level and specific measures of research excellence as performance per head. Using biology research institutions in the UK as a test case, we examine the correlations between peer-review-based and citation-based measures of research excellence on these two scales. We find that citation-based indicators are very highly correlated with peer-evaluated measures of group strength but are poorly correlated with group quality. Thus, and almost paradoxically, our analysis indi...

  12. An integrated model of choices and response times in absolute identification.

    Science.gov (United States)

    Brown, Scott D; Marley, A A J; Donkin, Christopher; Heathcote, Andrew

    2008-04-01

    Recent theoretical developments in the field of absolute identification have stressed differences between relative and absolute processes, that is, whether stimulus magnitudes are judged relative to a shorter term context provided by recently presented stimuli or a longer term context provided by the entire set of stimuli. The authors developed a model (SAMBA: selective attention, mapping, and ballistic accumulation) that integrates shorter and longer term memory processes and accounts for both the choices made and the associated response time distributions, including sequential effects in each. The model's predictions arise as a consequence of its architecture and require estimation of only a few parameters with values that are consistent across numerous data sets. The authors show that SAMBA provides a quantitative account of benchmark choice phenomena in classical absolute identification experiments and in contemporary data involving both choice and response time.

  13. On the Framing of a “Sustainable Security Strategy”: Philosophical Considerations for Security Strategy in the 21st Century

    Institute of Scientific and Technical Information of China (English)

    LiuJiangyong

    2005-01-01

    Like economic growth, security also has its “limits.” If these invisible limits are exceeded there will be “security alienation,” that is, ideals, measures and investment aimed at seeking unilateral absolute security, which lead to new insecurities or a worsening of the security situation. Both the PalestinianIsraeli conflict and the Iraq war instigated by the US have yielded a vicious circle of violence for violence. Bloody facts have proved that blindly strengthening or resorting to military might to seek the absolute security of a particular state will provoke more extensive and stronger resistance, making the state more insecure. Even if a state achieves security for the time being through military strength,

  14. Information Systems Security Audit

    Directory of Open Access Journals (Sweden)

    Gheorghe Popescu

    2007-12-01

    Full Text Available The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  15. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  16. Gyrokinetic Statistical Absolute Equilibrium and Turbulence

    Energy Technology Data Exchange (ETDEWEB)

    Jian-Zhou Zhu and Gregory W. Hammett

    2011-01-10

    A paradigm based on the absolute equilibrium of Galerkin-truncated inviscid systems to aid in understanding turbulence [T.-D. Lee, "On some statistical properties of hydrodynamical and magnetohydrodynamical fields," Q. Appl. Math. 10, 69 (1952)] is taken to study gyrokinetic plasma turbulence: A finite set of Fourier modes of the collisionless gyrokinetic equations are kept and the statistical equilibria are calculated; possible implications for plasma turbulence in various situations are discussed. For the case of two spatial and one velocity dimension, in the calculation with discretization also of velocity v with N grid points (where N + 1 quantities are conserved, corresponding to an energy invariant and N entropy-related invariants), the negative temperature states, corresponding to the condensation of the generalized energy into the lowest modes, are found. This indicates a generic feature of inverse energy cascade. Comparisons are made with some classical results, such as those of Charney-Hasegawa-Mima in the cold-ion limit. There is a universal shape for statistical equilibrium of gyrokinetics in three spatial and two velocity dimensions with just one conserved quantity. Possible physical relevance to turbulence, such as ITG zonal flows, and to a critical balance hypothesis are also discussed.

  17. Color assimilation and contrast near absolute threshold

    Science.gov (United States)

    McCann, John

    2012-01-01

    Simultaneous Contrast and Assimilation test targets are almost always viewed at high light levels. We measured the appearances of Simultaneous Contrast, Assimilation and other spatial surrounds near absolute rod threshold. Given the very different spatial organizations of receptive fields in rod and cone vision at detection threshold, it is not obvious that these familiar cone-vision spatial effects would be observed at rod light levels. Nevertheless, the spatial experiments showed that these targets have the same changes in appearance as those observed in bright light. Our experiments used very dim candle light that was above threshold for rods and L cones, and below threshold for M and S cones. Although detection threshold experiments show very different spatial organizations for rod and cone vision, we found that spatial contrast experiments gave the same changes of appearance. Neural contrast mechanisms at the lowest end of our visual HDR range are very similar to those at the top of the range in sunlight. This is true for both chromatic and achromatic targets.

  18. Security and privacy in biometrics

    CERN Document Server

    Campisi, Patrizio

    2013-01-01

    This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardizati

  19. Resizing the Euro-Mediterranean Dialogue in the Area of Security: The Challenge of Human Security

    Directory of Open Access Journals (Sweden)

    Eduard Soler i Lecha

    2007-02-01

    Full Text Available Although in the countries of the south the concept of human security is not very well-rooted and the security of states or regimes continues to take precedence, this article analyses the extent to which regional co-operation strategies, especially the BarcelonaProcess, have directly or indirectly promoted a new conception of security based on the protection of the citizen. For this, it analyses what had been done in the framework of the political and security basket of the Euro-Mediterranean Partnership up until the Euro-Mediterranean Summit in Barcelona, but it also emphasises some of the important deficiencies, such as inaction in the field of reformation of the security sector. This analysis is framed within a broader discussion about whether or not the Mediterranean is a security complex and whether or not it can become a security community that would make human security one of the foundations of a culture of shared security.

  20. 计算机网络教学过程中的网络安全问题分析%Analysis of Network Security Problems of Computer Network in the Teaching Process

    Institute of Scientific and Technical Information of China (English)

    李振

    2014-01-01

    In view of the existing remote computer network in the teaching process of the main typical network security threats, starting from the main types of network security, respectively discusses the related strategy of computer network information, op-erating system, laboratory safety, to avoid the security threat is corresponding to the computer network teaching, plays an impor-tant role in raising the level of information security.%针对计算机远程网络教学过程中存在的主要典型网络安全威胁,从网络安全的主要类型出发,分别探讨了计算机网络信息、操作系统、实验室安全的相关策略,对避免计算机网络教学中出现对应的安全威胁,提高信息安全程度具有重要作用。

  1. Glacistore: Understanding Late Cenozoic Glaciation and Basin Processes for the Development of Secure Large Scale Offshore CO2 Storage (North Sea).

    Science.gov (United States)

    Stewart, H. A.; Barrio, M.; Akhurst, M.; Aagaard, P.; Alcalde, J.; Bauer, A.; Bradwell, T.; Cavanagh, A.; Faleide, J. I.; Furre, A. K.; Haszeldine, S.; Hjelstuen, B. O.; Holloway, S.; Johansen, H.; Johnson, G.; Kuerschner, W.; Mondol, N. H.; Querendez, E.; Ringrose, P. S.; Sejrup, H. P.; Stewart, M.; Stoddart, D.; Wilkinson, M.; Zalmstra, H.

    2014-12-01

    The sedimentary strata of the North Sea Basin (NSB) record the glacial and interglacial history of environmental change in the Northern Hemisphere, and are a proposed location for the engineered storage of carbon dioxide (CO2) captured from power plant and industrial sources to reduce greenhouse gas emissions. These aspects interact in the geomechanical and fluid flow domain, as ice sheet dynamics change the properties of potential seal and reservoir rocks that are the prospective geological storage strata for much of Europe's captured CO2. The intensification of the global glacial-interglacial cycle at the onset of the Pleistocene (2.5-2.7 Ma) was a critical tipping-point in Earth's recent climate history. The increased severity of glaciations at the Plio-Pleistocene boundary triggered the first development of large-scale continental ice sheets in the Northern Hemisphere. The central part of the NSB preserves a unique history of the depositional record spanning at least the last 3 Ma, which also forms the overburden and seal to the underlying CO2 reservoirs. There is good evidence that these ice sheets created strong feedback loops that subsequently affected the evolution of the Quaternary climate system through complex ocean-atmosphere-cryosphere linkages. Understanding NSB dynamics, including the role of fluids in controlling compaction, cementation, and diagenetic processes in shale-dominated basins, is essential for CO2 storage site characterisation to increase understanding and confidence in secure storage. An increased understanding of the overlying sequence will inform quantitative predictions of the performance of prospective CO2 storage sites in glaciated areas in Europe and worldwide; to include improved resolution of glacial cycles (depositional and chronological framework), characterise pore fluids, flow properties of glacial landforms within the sequence (e.g. tunnel valleys) and the geomechanical effects (quantify compaction, rock stiffness, strength

  2. Problems and solutions of information security management in Latvia

    Directory of Open Access Journals (Sweden)

    Deruma S.

    2014-01-01

    Security cannot exist as a standalone function, it should be integrated in the associated processes continuously supervising and improving the security management programme based on predefined criteria. Adopting a holistic approach with regard to security has proven to be a critical contributing factor to effective security in organizations.

  3. Towards Agile Security Risk Management in RE and Beyond

    NARCIS (Netherlands)

    Franqueira, Virginia N.L.; Racheva, Zornitza; Tun, Thein Tan; Daneva, Maya

    2011-01-01

    Little attention has been given so far to the process of security risk management at the early stages of system development. Security has been addressed by isolated security assurance practices, some of which consider risks and mitigations but they do not provide an overview of the overall security

  4. Nanotechnology in the Security

    CERN Document Server

    Kruchinin, Sergei

    2015-01-01

    The topics discussed at the NATO Advanced Research Workshop "Nanotechnology in the Security Systems" included nanophysics,   nanotechnology,  nanomaterials, sensors, biosensors security systems, explosive  detection . There have been many significant advances in the past two years and some entirely new directions of research are just opening up. Recent advances in nanoscience have demonstrated that fundamentally new physical phenomena  are found when systems are reduced in size with  dimensions, comparable to the fundamental microscopic  length scales of the investigated material. Recent developments in nanotechnology and measurement techniques now allow experimental investigation of transport properties of nanodevices. This work will be of interest to researchers working in spintronics, molecular electronics and quantum information processing.

  5. Positioning, alignment and absolute pointing of the ANTARES neutrino telescope

    Energy Technology Data Exchange (ETDEWEB)

    Fehr, F [Erlangen Centre for Astroparticle Physics, Erwin-Rommel-Str. 1 (Germany); Distefano, C, E-mail: fehr@physik.uni-erlangen.d [INFN Laboratori Nazional del Sud, Via S. Sofia 62, 95123 Catania (Italy)

    2010-01-01

    A precise detector alignment and absolute pointing is crucial for point-source searches. The ANTARES neutrino telescope utilises an array of hydrophones, tiltmeters and compasses for the relative positioning of the optical sensors. The absolute calibration is accomplished by long-baseline low-frequency triangulation of the acoustic reference devices in the deep-sea with a differential GPS system at the sea surface. The absolute pointing can be independently verified by detecting the shadow of the Moon in cosmic rays.

  6. Absolute quantification of somatic DNA alterations in human cancer

    OpenAIRE

    Carter, Scott L.; Cibulskis, Kristian; Helman, Elena; McKenna, Aaron; Shen, Hui; Zack, Travis; Laird, Peter W.; Onofrio, Robert C.; Winckler, Wendy; Weir, Barbara A; Beroukhim, Rameen; Pellman, David; Levine, Douglas A.; Lander, Eric S.; Meyerson, Matthew

    2012-01-01

    We developed a computational method (ABSOLUTE) that infers tumor purity and malignant cell ploidy directly from analysis of somatic DNA alterations. ABSOLUTE can detect subclonal heterogeneity, somatic homozygosity, and calculate statistical sensitivity to detect specific aberrations. We used ABSOLUTE to analyze ovarian cancer data and identified pervasive subclonal somatic point mutations. In contrast, mutations occurring in key tumor suppressor genes, TP53 and NF1 were predominantly clonal ...

  7. Absolute quantification of somatic DNA alterations in human cancer

    OpenAIRE

    Carter, Scott L.; Cibulskis, Kristian; Helman, Elena; McKenna, Aaron; Shen, Hui; Zack, Travis; Laird, Peter W.; Onofrio, Robert C.; Winckler, Wendy; Weir, Barbara A; Beroukhim, Rameen; Pellman, David; Levine, Douglas A.; Lander, Eric S.; Meyerson, Matthew

    2015-01-01

    We developed a computational method (ABSOLUTE) that infers tumor purity and malignant cell ploidy directly from analysis of somatic DNA alterations. ABSOLUTE can detect subclonal heterogeneity, somatic homozygosity, and calculate statistical sensitivity to detect specific aberrations. We used ABSOLUTE to analyze ovarian cancer data and identified pervasive subclonal somatic point mutations. In contrast, mutations occurring in key tumor suppressor genes, TP53 and NF1 were predominantly clonal ...

  8. Martime Security: Ferry Security Measures Have Been Implemented, but Evaluating Existing Studies Could Further Enhance Security

    Science.gov (United States)

    2010-12-01

    vessels—vessels capable of carrying 500 or more passengers. The first report focused on cruise ship and cruise ship facility security and was issued in...April 2010.4 The report found that while governmental agencies, cruise ship operators, and other maritime security stakeholders have taken...border security—should consider obtaining additional information about cruise ship passengers to enhance its screening process. This report focuses

  9. Transforming Homeland Security [video

    OpenAIRE

    McIntyre, David; Center for Homeland Defense and Security Naval Postgraduate School

    2011-01-01

    A pioneer in homeland security, and homeland security education, David McIntyre discusses the complexities in transforming homeland security from a national program in its inception, to also include state and local agencies and other public and private parties.

  10. Social Security Administration

    Science.gov (United States)

    ... Languages Sign in / up The United States Social Security Administration Cost-Of-Living Adjustment (COLA) Information about ... replacement Medicare card Change of Address my Social Security Check out your Social Security Statement , change your ...

  11. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index What Can I Bring? ... form Search the Site Main menu Administrator Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  12. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  13. High-precision Absolute Coordinate Measurement using Frequency Scanned Interferometry

    CERN Document Server

    Chen, Tianxiang; Riles, Keith; Li, Cheng

    2013-01-01

    In this paper, we report high-precision absolute position measurement performed with frequency scanned interferometry (FSI). We reported previously on measurement of absolute distance with FSI [1]. Absolute position is determined by several related absolute distances measured simultaneously. The achieved precision of 2-dimensional measurements is better than 1 micron, and in 3-dimensional measurements, the precision on X and Y is confirmed to be below 1 micron, while the confirmed precision on Z is about 2 microns, where the confirmation is limited by the lower precision of the moving stage in Z direction.

  14. The absolute disparity anomaly and the mechanism of relative disparities.

    Science.gov (United States)

    Chopin, Adrien; Levi, Dennis; Knill, David; Bavelier, Daphne

    2016-06-01

    There has been a long-standing debate about the mechanisms underlying the perception of stereoscopic depth and the computation of the relative disparities that it relies on. Relative disparities between visual objects could be computed in two ways: (a) using the difference in the object's absolute disparities (Hypothesis 1) or (b) using relative disparities based on the differences in the monocular separations between objects (Hypothesis 2). To differentiate between these hypotheses, we measured stereoscopic discrimination thresholds for lines with different absolute and relative disparities. Participants were asked to judge the depth of two lines presented at the same distance from the fixation plane (absolute disparity) or the depth between two lines presented at different distances (relative disparity). We used a single stimulus method involving a unique memory component for both conditions, and no extraneous references were available. We also measured vergence noise using Nonius lines. Stereo thresholds were substantially worse for absolute disparities than for relative disparities, and the difference could not be explained by vergence noise. We attribute this difference to an absence of conscious readout of absolute disparities, termed the absolute disparity anomaly. We further show that the pattern of correlations between vergence noise and absolute and relative disparity acuities can be explained jointly by the existence of the absolute disparity anomaly and by the assumption that relative disparity information is computed from absolute disparities (Hypothesis 1).

  15. Evaluation of the absolute regional temperature potential

    Directory of Open Access Journals (Sweden)

    D. T. Shindell

    2012-09-01

    Full Text Available The Absolute Regional Temperature Potential (ARTP is one of the few climate metrics that provides estimates of impacts at a sub-global scale. The ARTP presented here gives the time-dependent temperature response in four latitude bands (90–28° S, 28° S–28° N, 28–60° N and 60–90° N as a function of emissions based on the forcing in those bands caused by the emissions. It is based on a large set of simulations performed with a single atmosphere-ocean climate model to derive regional forcing/response relationships. Here I evaluate the robustness of those relationships using the forcing/response portion of the ARTP to estimate regional temperature responses to the historic aerosol forcing in three independent climate models. These ARTP results are in good accord with the actual responses in those models. Nearly all ARTP estimates fall within ±20% of the actual responses, though there are some exceptions for 90–28° S and the Arctic, and in the latter the ARTP may vary with forcing agent. However, for the tropics and the Northern Hemisphere mid-latitudes in particular, the ±20% range appears to be roughly consistent with the 95% confidence interval. Land areas within these two bands respond 39–45% and 9–39% more than the latitude band as a whole. The ARTP, presented here in a slightly revised form, thus appears to provide a relatively robust estimate for the responses of large-scale latitude bands and land areas within those bands to inhomogeneous radiative forcing and thus potentially to emissions as well. Hence this metric could allow rapid evaluation of the effects of emissions policies at a finer scale than global metrics without requiring use of a full climate model.

  16. Absolute parameters of young stars: QZ Carinae

    Science.gov (United States)

    Walker, W. S. G.; Blackford, M.; Butland, R.; Budding, E.

    2017-09-01

    New high-resolution spectroscopy and BVR photometry together with literature data on the complex massive quaternary star QZ Car are collected and analysed. Absolute parameters are found as follows. System A: M1 = 43 (±3), M2 = 19 (+3 -7), R1 = 28 (±2), R2 = 6 (±2), (⊙); T1 ∼ 28 000, T2 ∼ 33 000 K; System B: M1 = 30 (±3), M2 = 20 (±3), R1 = 10 (±0.5), R2 = 20 (±1), (⊙); T1 ∼ 36 000, T2 ∼ 30 000 K (model dependent temperatures). The wide system AB: Period = 49.5 (±1) yr, Epochs, conjunction = 1984.8 (±1), periastron = 2005.3 (±3) yr, mean separation = 65 (±3), (au); orbital inclination = 85 (+5 -15) deg, photometric distance ∼2700 (±300) pc, age = 4 (±1) Myr. Other new contributions concern: (a) analysis of the timing of minima differences (O - C)s for the eclipsing binary (System B); (b) the width of the eclipses, pointing to relatively large effects of radiation pressure; (c) inferences from the rotational widths of lines for both Systems A and B; and (d) implications for theoretical models of early-type stars. While feeling greater confidence on the quaternary's general parametrization, observational complications arising from strong wind interactions or other, unclear, causes still inhibit precision and call for continued multiwavelength observations. Our high-inclination value for the AB system helps to explain failures to resolve the wide binary in the previous years. The derived young age independently confirms membership of QZ Car to the open cluster Collinder 228.

  17. Landsat-7 ETM+ radiometric stability and absolute calibration

    Science.gov (United States)

    Markham, B.L.; Barker, J.L.; Barsi, J.A.; Kaita, E.; Thome, K.J.; Helder, D.L.; Palluconi, Frank Don; Schott, J.R.; Scaramuzza, P.; ,

    2002-01-01

    Launched in April 1999, the Landsat-7 ETM+ instrument is in its fourth year of operation. The quality of the acquired calibrated imagery continues to be high, especially with respect to its three most important radiometric performance parameters: reflective band instrument stability to better than ??1%, reflective band absolute calibration to better than ??5%, and thermal band absolute calibration to better than ??0.6 K. The ETM+ instrument has been the most stable of any of the Landsat instruments, in both the reflective and thermal channels. To date, the best on-board calibration source for the reflective bands has been the Full Aperture Solar Calibrator, which has indicated changes of at most -1.8% to -2.0% (95% C.I.) change per year in the ETM+ gain (band 4). However, this change is believed to be caused by changes in the solar diffuser panel, as opposed to a change in the instrument's gain. This belief is based partially on ground observations, which bound the changes in gain in band 4 at -0.7% to +1.5%. Also, ETM+ stability is indicated by the monitoring of desert targets. These image-based results for four Saharan and Arabian sites, for a collection of 35 scenes over the three years since launch, bound the gain change at -0.7% to +0.5% in band 4. Thermal calibration from ground observations revealed an offset error of +0.31 W/m 2 sr um soon after launch. This offset was corrected within the U. S. ground processing system at EROS Data Center on 21-Dec-00, and since then, the band 6 on-board calibration has indicated changes of at most +0.02% to +0.04% (95% C.I.) per year. The latest ground observations have detected no remaining offset error with an RMS error of ??0.6 K. The stability and absolute calibration of the Landsat-7 ETM+ sensor make it an ideal candidate to be used as a reference source for radiometric cross-calibrating to other land remote sensing satellite systems.

  18. Security and Security Complex: Operational Concepts

    OpenAIRE

    Luis Tomé

    2010-01-01

    Security is one of the most ambiguous, contested, and debated ideas in the conceptual framework of international relations. The "traditional" perspective has been severely contested as new approaches develop, and the concept of security has been reworked in all its fundamental components and dimensions, from object and reference to range and security instruments. Likewise, the discussion over the definition and characterization of international security systems, namely regarding competitive s...

  19. Tactical Automated Security System Air Force expeditionary security

    Science.gov (United States)

    Butler, Ken

    2002-08-01

    The US Air Force's TASS (Tactical Automated Security System) program has been in existence since 1996. The TASS program meets the growing need to supplement security personnel with modern technology, when these forces are deployed around the world. TASS combines five equipment elements into an integrated security solution, providing both a detection and an assessment capability. TASS does this in a way which maximizes the mobility and user friendliness objectives of the system. In this paper, we will take a closer look at TASS. We will examine the concepts that drive the TASS development process. We will provide an overview of the TASS technical elements, and provide a roadmap for further development of those elements. Finally, we will provide recommendations to security providers who aim to have their products included in the TASS baseline of equipment.

  20. Specifying Information Security Needs for the Delivery of High Quality Security Services

    OpenAIRE

    Su, Xiaomeng; Bolzoni, Damiano; Eck, van, H.J.

    2007-01-01

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. We propose to explicitly link security requirements with the organizations' business vision, i.e. to provide business rationale for security requirements. The rationale is then used as a basis for comparing the importance of different security requirements. Furthermore we discuss how to integrate the aforementioned solution concepts into a service level management process f...

  1. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  2. Institutionalizing information security.

    OpenAIRE

    2008-01-01

    Information security has become a much discussed subject all over the world in the last few years. This is because information security is no longer a luxury, but a necessity in all organisations. The securing of information is not an easy task because information security is flexible and always seems to be in a state of development. This means that information security has undergone different development changes due to new technologies in the past few years. Information security became promi...

  3. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  4. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  5. Quantum Secure Direct Communication with Quantum Memory

    Science.gov (United States)

    Zhang, Wei; Ding, Dong-Sheng; Sheng, Yu-Bo; Zhou, Lan; Shi, Bao-Sen; Guo, Guang-Can

    2017-06-01

    Quantum communication provides an absolute security advantage, and it has been widely developed over the past 30 years. As an important branch of quantum communication, quantum secure direct communication (QSDC) promotes high security and instantaneousness in communication through directly transmitting messages over a quantum channel. The full implementation of a quantum protocol always requires the ability to control the transfer of a message effectively in the time domain; thus, it is essential to combine QSDC with quantum memory to accomplish the communication task. In this Letter, we report the experimental demonstration of QSDC with state-of-the-art atomic quantum memory for the first time in principle. We use the polarization degrees of freedom of photons as the information carrier, and the fidelity of entanglement decoding is verified as approximately 90%. Our work completes a fundamental step toward practical QSDC and demonstrates a potential application for long-distance quantum communication in a quantum network.

  6. Quantum Secure Direct Communication with Quantum Memory.

    Science.gov (United States)

    Zhang, Wei; Ding, Dong-Sheng; Sheng, Yu-Bo; Zhou, Lan; Shi, Bao-Sen; Guo, Guang-Can

    2017-06-02

    Quantum communication provides an absolute security advantage, and it has been widely developed over the past 30 years. As an important branch of quantum communication, quantum secure direct communication (QSDC) promotes high security and instantaneousness in communication through directly transmitting messages over a quantum channel. The full implementation of a quantum protocol always requires the ability to control the transfer of a message effectively in the time domain; thus, it is essential to combine QSDC with quantum memory to accomplish the communication task. In this Letter, we report the experimental demonstration of QSDC with state-of-the-art atomic quantum memory for the first time in principle. We use the polarization degrees of freedom of photons as the information carrier, and the fidelity of entanglement decoding is verified as approximately 90%. Our work completes a fundamental step toward practical QSDC and demonstrates a potential application for long-distance quantum communication in a quantum network.

  7. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  8. A Novel Approach for Video-Based Absolute Navigation in Space Exploration Missions

    Science.gov (United States)

    Tadewos, Tadewos Getahun; Prinetto, Paolo; Rolfo, Daniele; Trotta, Pascal; Lanza, Piergiorgio; Martelli, Andrea; Tramutola, Antonio

    2014-08-01

    In the last years, Video-based Navigation is becoming an hot topic since camera sensors will be more and more included in future space exploration missions, to allow a visual comprehension of the surrounding unknown environment. This paper proposes a novel approach for Video-based Absolute Navigation focusing on the Entry, Descent and Landing phase of spacecrafts on planets. Moreover the paper shows how a Video-based Absolute Navigation processing chain can exploit Field Programmable Gate Array (FPGA) devices to achieve high throughput, in terms of frames-per-seconds. Experimental results highlight the robustness and limited memory requirements of the proposed approach.

  9. Research on a novel orientation algorithm of single-ring absolute photoelectric shaft encoder

    Institute of Scientific and Technical Information of China (English)

    CHEN Yun

    2007-01-01

    A novel single-ring absolute optical shaft encoder is designed by studying the encoding principle of traditional absolute optical shaft encoder in this paper. The description of the orientation algorithm of the encoder is specified,and an example for explaining the orientation arithmetic is given,which indicates that the theory of the encoder works. The visual interface to acquire signals of CCD is shown with VB,which provides reliable foundation to process data. The effective factors of measurement precision of the encoder are analyzed.

  10. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  11. Antiausterity activity of arctigenin enantiomers: importance of (2R,3R)-absolute configuration.

    Science.gov (United States)

    Awale, Suresh; Kato, Mamoru; Dibwe, Dya Fita; Li, Feng; Miyoshi, Chika; Esumi, Hiroyasu; Kadota, Shigetoshi; Tezuka, Yasuhiro

    2014-01-01

    From a MeOH extract of powdered roots of Wikstroemia indica, six dibenzyl-gamma-butyrolactone-type lignans with (2S,3S)-absolute configuration [(+)-arctigenin (1), (+)-matairesinol (2), (+)-trachelogenin (3), (+)-nortrachelogenin (4), (+)-hinokinin (5), and (+)-kusunokinin (6)] were isolated, whereas three dibenzyl-gamma-butyrolactone-type lignans with (2R,3R)-absolute configuration [(-)-arctigenin (1*), (-)-matairesinol (2*), (-)-trachelogenin (3*)] were isolated from Trachelospermum asiaticum. The in vitro preferential cytotoxic activity of the nine compounds was evaluated against human pancreatic PANC-1 cancer cells in nutrient-deprived medium (NDM), but none of the six lignans (1-6) with (2S,3S)-absolute configuration showed preferential cytotoxicity. On the other hand, three lignans (1*-3*) with (2R,3R)-absolute configuration exhibited preferential cytotoxicity in a concentration-dependent manner with PC50 values of 0.54, 6.82, and 5.85 microM, respectively. Furthermore, the effect of (-)- and (+)-arctigenin was evaluated against the activation of Akt, which is a key process in the tolerance to nutrition starvation. Interestingly, only (-)-arctigenin (1*) strongly suppressed the activation of Akt. These results indicate that the (2R,3R)-absolute configuration of (-)-enantiomers should be required for the preferential cytotoxicity through the inhibition of Akt activation.

  12. Calibrating the absolute amplitude scale for air showers measured at LOFAR

    CERN Document Server

    Nelles, A; Karskens, T; Krause, M; Buitink, S; Corstanje, A; Enriquez, J E; Erdmann, M; Falcke, H; Haungs, A; Hiller, R; Huege, T; Krause, R; Link, K; Norden, M J; Rachen, J P; Rossetto, L; Schellart, P; Scholten, O; Schröder, F G; ter Veen, S; Thoudam, S; Trinh, T N G; Weidenhaupt, K; Wijnholds, S J; Anderson, J; Bähren, L; Bell, M E; Bentum, M J; Best, P; Bonafede, A; Bregman, J; Brouw, W N; Bruüggen, M; Butcher, H R; Carbone, D; Ciardi, B; de Gasperin, F; Duscha, S; Eislöffel, J; Fallows, R A; Frieswijk, W; Garrett, M A; van Haarlem, M P; Heald, G; Hoeft, M; Horneffer, A; Iacobelli, M; Juette, E; Karastergiou, A; Kohler, J; Kondratiev, V I; Kuniyoshi, M; Kuper, G; van Leeuwen, J; Maat, P; McFadden, R; McKay-Bukowski, D; Orru, E; Paas, H; Pandey-Pommier, M; Pandey, V N; Pizzo, R; Polatidis, A G; Reich, W; Röttgering, H; Schwarz, D; Serylak, M; Sluman, J; Smirnov, O; Tasse, C; Toribio, M C; Vermeulen, R; van Weeren, R J; Wijers, R A M J; Wucknitz, O; Zarka, P

    2015-01-01

    Air showers induced by cosmic rays create nanosecond pulses detectable at radio frequencies. These pulses have been measured successfully in the past few years at the LOw- Frequency ARray (LOFAR) and are used to study the properties of cosmic rays. For a complete understanding of this phenomenon and the underlying physical processes, an absolute calibration of the detecting antenna system is needed. We present three approaches that were used to check and improve the antenna model of LOFAR and to provide an absolute calibration for air shower measurements. Two methods are based on calibrated reference sources and one on a calibration approach using the diffuse radio emission of the Galaxy, optimized for short data-sets. An accuracy of 35% in amplitude is reached. The absolute calibration is also compared to predictions from air shower simulations. These results are used to set an absolute energy scale for air shower measurements and can be used as a basis for an absolute scale for the measurement of astronomic...

  13. Extremely secure identification documents

    Energy Technology Data Exchange (ETDEWEB)

    Tolk, K.M. [Sandia National Labs., Albuquerque, NM (United States); Bell, M. [Sandia National Labs., Livermore, CA (United States)

    1997-09-01

    The technology developed in this project uses biometric information printed on the document and public key cryptography to ensure that an adversary cannot issue identification documents to unauthorized individuals or alter existing documents to allow their use by unauthorized individuals. This process can be used to produce many types of identification documents with much higher security than any currently in use. The system is demonstrated using a security badge as an example. This project focused on the technologies requiring development in order to make the approach viable with existing badge printing and laminating technologies. By far the most difficult was the image processing required to verify that the picture on the badge had not been altered. Another area that required considerable work was the high density printed data storage required to get sufficient data on the badge for verification of the picture. The image processing process was successfully tested, and recommendations are included to refine the badge system to ensure high reliability. A two dimensional data array suitable for printing the required data on the badge was proposed, but testing of the readability of the array had to be abandoned due to reallocation of the budgeted funds by the LDRD office.

  14. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  15. Protein security and food security in China

    Directory of Open Access Journals (Sweden)

    Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

    2015-06-01

    Full Text Available Food security, the need to meet nutritional requirements, and four main problems for food protein security in China are analyzed. From the perspective of residentsrsquo; nutritional requirements and balanced dietary patterns, the conclusion is that food security in China is in essence dependent on protein production and security of supply and that fat and carbohydrates supply in China can reach self-sufficiency. Considering the situation of food protein production and consumption in China, policy suggestions are made, which could ensure a balanced supply and demand for food protein and food security in China.

  16. Absolute chronology and stratigraphy of Lepenski Vir

    Directory of Open Access Journals (Sweden)

    Borić Dušan

    2007-01-01

    Full Text Available In the last decade, a number of specialist analyses were made on the material from old excavations of Mesolithic-Neolithic sites in the Danube Gorges. These new results altered significantly our understanding of the Lepenski Vir culture. The question of chronology of this regional phenomenon has been acute since the discovery of Lepenski Vir in the 1960s, and it remains of key importance for understanding the character of Mesolithic-Neolithic transformations in this and the neighbouring regions. The most heated debate was fuelled by the initial stratigraphic and chronological attribution of the type-site itself. There remained the question about the adequate dating of the most prominent phase at this site characterized by buildings with trapezoidal bases covered with limestone floors and with rectangular stone-lined hearths placed in the centre of these features. There have been suggestions that these features also contain Early Neolithic Starčevo type pottery and other similar items of material culture and should thus be dated to the Early Neolithic historical context. Moreover, the first series of conventional radiocarbon determinations (21 dates also suggested that the absolute chronology of these features should be confined to the period from around 6400-5500 cal BC (Fig. 1. Due to the importance of defining more precisely the chronology for the start of construction of these particular features at Lepenski Vir and for establishing the life-span of these buildings and their associated material culture, we have AMS (Accelerator Mass Spectrometry dated a number of contexts from this site. The results are presented in this paper. The project was made possible through the Oxford Radiocarbon Accelerate Dating Service (ORADS programme funded by the Arts and Humanities Research Council (AHRC and the Natural Environment Research Council (NERC of the Great Britain. Apart from those dates presented in this paper, there are 29 previously published

  17. Absolute instability in viscoelastic mixing layers

    Science.gov (United States)

    Ray, Prasun K.; Zaki, Tamer A.

    2014-01-01

    The spatiotemporal linear stability of viscoelastic planar mixing layers is investigated. A one-parameter family of velocity profiles is used as the base state with the parameter, S, controlling the amount of shear and backflow. The influence of viscoelasticity in dilute polymer solutions is modeled with the Oldroyd-B and FENE-P constitutive equations. Both models require the specification of the ratio of the polymer-relaxation and convective time scales (the Weissenberg number, We) and the ratio of solvent and solution viscosities (β). The maximum polymer extensibility, L, must also be specified for the FENE-P model. We examine how the variation of these parameters along with the Reynolds number, Re, affects the minimum value of S at which the flow becomes locally absolutely unstable. With the Oldroyd-B model, the influence of viscoelasticity is shown to be almost fully captured by the elasticity, E^* equiv (1-β ) We/Re, and Scrit decreases as elasticity is increased, i.e., elasticity is destabilizing. A simple approximate dispersion relation obtained via long-wave asymptotic analysis is shown to accurately capture this destabilizing influence. Results obtained with the FENE-P model exhibit a rich variety of behavior. At large values of the extensibility, L, results are similar to those for the Oldroyd-B fluid as expected. However, when the extensibility is reduced to more realistic values (L ≈ 100), one must consider the scaled shear rate, η _c equiv We S/2L, in addition to the elasticity. When ηc is large, the base-state polymer stress obtained by the FENE-P model is reduced, and there is a corresponding reduction in the overall influence of viscoelasticity on stability. Additionally, elasticity exhibits a stabilizing effect which is driven by the streamwise-normal perturbation polymer stress. As ηc is reduced, the base-state and perturbation normal polymer stresses predicted by the FENE-P model move towards the Oldroyd-B values, and the destabilizing

  18. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  19. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  20. Test Range System of Post-flight Data Processing Based on Information Security System%基于信息安全体系实现靶场事后数据处理系统*

    Institute of Scientific and Technical Information of China (English)

    张东

    2014-01-01

    Information security is becoming the problem which test range needs to face and resolve today .Adopting ad‐vanced methods ,a effective and steady information security system is constructed in this paper based on network and data‐base technology ,which will provide more powerful safeguard for post‐flight data processing system of test range .%信息安全日益成为靶场试验需要面临和解决的现实问题。论文基于网络和数据库技术,采用先进的信息安全手段,构建一个高效稳定的信息安全体系,从而为靶场事后数据处理和管理提供强有力的安全保障。

  1. "Absolute" quantification in magnetic resonance spectroscopy: validation of a clinical protocol in multiple sclerosis.

    Science.gov (United States)

    Bagory, Matthieu; Durand-Dubief, Françoise; Ibarrola, Danielle; Confavreux, Christian; Sappey-Marinier, Dominique

    2007-01-01

    MRS allows to measure cerebral metabolites, thus helping to characterize brain disease diagnosis and followup. Metabolite concentration quantification is usually based on metabolite ratio referring to creatine. If this metabolite concentration is supposed to be constant, it may vary in pathological processes. Therefore, "absolute" concentration methodology is needed. The aim of this study is to validate a clinical "absolute" quantification protocol through the development of an external metabolic phantom, calibration and correction, and the investigation of reproducibility issues. When phantom stability was investigated by a short-term and a long-term reproducibility study, both Standard Deviations (SD) were in agreement with literature values. This "absolute" quantification method was applied to patients with Multiple Sclerosis (MS). The results show a significant decrease in both N-Acetyl Aspartate (NAA) and choline concentrations.

  2. Fuzzy logic based anaesthesia monitoring systems for the detection of absolute hypovolaemia.

    Science.gov (United States)

    Mansoor Baig, Mirza; Gholamhosseini, Hamid; Harrison, Michael J

    2013-07-01

    Anaesthesia monitoring involves critical diagnostic tasks carried out amongst lots of distractions. Computers are capable of handling large amounts of data at high speed and therefore decision support systems and expert systems are now capable of processing many signals simultaneously in real time. We have developed two fuzzy logic based anaesthesia monitoring systems; a real time smart anaesthesia alarm system (RT-SAAM) and fuzzy logic monitoring system-2 (FLMS-2), an updated version of FLMS for the detection of absolute hypovolaemia. This paper presents the design aspects of these two systems which employ fuzzy logic techniques to detect absolute hypovolaemia, and compares their performances in terms of usability and acceptability. The interpretation of these two systems of absolute hypovolaemia was compared with clinicians' assessments using Kappa analysis, RT-SAAM K=0.62, FLMS-2 K=0.75; an improvement in performance by FLMS-2.

  3. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  4. Automation Security

    OpenAIRE

    Mirzoev, Dr. Timur

    2014-01-01

    Web-based Automated Process Control systems are a new type of applications that use the Internet to control industrial processes with the access to the real-time data. Supervisory control and data acquisition (SCADA) networks contain computers and applications that perform key functions in providing essential services and commodities (e.g., electricity, natural gas, gasoline, water, waste treatment, transportation) to all Americans. As such, they are part of the nation s critical infrastructu...

  5. Perimeter security for Minnesota correctional facilities

    Energy Technology Data Exchange (ETDEWEB)

    Crist, D. [Minnesota Department of Corrections, St. Paul, MN (United States); Spencer, D.D. [Sandia National Labs., Albuquerque, NM (United States)

    1996-12-31

    For the past few years, the Minnesota Department of Corrections, assisted by Sandia National Laboratories, has developed a set of standards for perimeter security at medium, close, and maximum custody correctional facilities in the state. During this process, the threat to perimeter security was examined and concepts about correctional perimeter security were developed. This presentation and paper will review the outcomes of this effort, some of the lessons learned, and the concepts developed during this process and in the course of working with architects, engineers and construction firms as the state upgraded perimeter security at some facilities and planned new construction at other facilities.

  6. BWS Open System Architecture Security Assessment

    Directory of Open Access Journals (Sweden)

    Cristian Ionita

    2011-12-01

    Full Text Available Business process management systems play a central role in supporting the business operations of medium and large organizations. Because of this the security characteristics of these systems are becoming very important. The present paper describes the BWS architecture used to implement the open process aware information system DocuMentor. Using the proposed platform, the article identifies the security characteristics of such systems, shows the correlation between these characteristics and the security features implemented by the platform and presents examples of how the security of such systems can be enhanced using the extension mechanism.

  7. Absolute Humidity and the Seasonality of Influenza (Invited)

    Science.gov (United States)

    Shaman, J. L.; Pitzer, V.; Viboud, C.; Grenfell, B.; Goldstein, E.; Lipsitch, M.

    2010-12-01

    Much of the observed wintertime increase of mortality in temperate regions is attributed to seasonal influenza. A recent re-analysis of laboratory experiments indicates that absolute humidity strongly modulates the airborne survival and transmission of the influenza virus. Here we show that the onset of increased wintertime influenza-related mortality in the United States is associated with anomalously low absolute humidity levels during the prior weeks. We then use an epidemiological model, in which observed absolute humidity conditions temper influenza transmission rates, to successfully simulate the seasonal cycle of observed influenza-related mortality. The model results indicate that direct modulation of influenza transmissibility by absolute humidity alone is sufficient to produce this observed seasonality. These findings provide epidemiological support for the hypothesis that absolute humidity drives seasonal variations of influenza transmission in temperate regions. In addition, we show that variations of the basic and effective reproductive numbers for influenza, caused by seasonal changes in absolute humidity, are consistent with the general timing of pandemic influenza outbreaks observed for 2009 A/H1N1 in temperate regions. Indeed, absolute humidity conditions correctly identify the region of the United States vulnerable to a third, wintertime wave of pandemic influenza. These findings suggest that the timing of pandemic influenza outbreaks is controlled by a combination of absolute humidity conditions, levels of susceptibility and changes in population mixing and contact rates.

  8. Novalis' Poetic Uncertainty: A "Bildung" with the Absolute

    Science.gov (United States)

    Mika, Carl

    2016-01-01

    Novalis, the Early German Romantic poet and philosopher, had at the core of his work a mysterious depiction of the "absolute." The absolute is Novalis' name for a substance that defies precise knowledge yet calls for a tentative and sensitive speculation. How one asserts a truth, represents an object, and sets about encountering things…

  9. A Global Forecast of Absolute Poverty and Employment.

    Science.gov (United States)

    Hopkins, M. J. D.

    1980-01-01

    Estimates are made of absolute poverty and employment under the hypothesis that existing trends continue. Concludes that while the number of people in absolute poverty is not likely to decline by 2000, the proportion will fall. Jobs will have to grow 3.9% per year in developing countries to achieve full employment. (JOW)

  10. Determination of Absolute Zero Using a Computer-Based Laboratory

    Science.gov (United States)

    Amrani, D.

    2007-01-01

    We present a simple computer-based laboratory experiment for evaluating absolute zero in degrees Celsius, which can be performed in college and undergraduate physical sciences laboratory courses. With a computer, absolute zero apparatus can help demonstrators or students to observe the relationship between temperature and pressure and use…

  11. Absolute instruments and perfect imaging in geometrical optics

    CERN Document Server

    Tyc, Tomas; Sarbort, Martin; Bering, Klaus

    2011-01-01

    We investigate imaging by spherically symmetric absolute instruments that provide perfect imaging in the sense of geometrical optics. We derive a number of properties of such devices, present a general method for designing them and use this method to propose several new absolute instruments, in particular a lens providing a stigmatic image of an optically homogeneous region and having a moderate refractive index range.

  12. ABSOLUTE STABILITY OF GENERAL LURIE DISCRETE NONLINEAR CONTROL SYSTEMS

    Institute of Scientific and Technical Information of China (English)

    GAN Zuoxin; HAN Jingqing; ZHAO Suxia; WU Yongxian

    2002-01-01

    In the present paper, the absolute stability of general Lurie discrete nonlinear control systems has been discussed by Lyapunov function approach. A sufficient condition of absolute stability for the general Lurie discrete nonlinear control systems is derived, and some necessary and sufficient conditions are obtained in special cases. Meanwhile, we give a simple example to illustrate the effectiveness of the results.

  13. On the Mean Absolute Error in Inverse Binomial Sampling

    OpenAIRE

    Mendo, Luis

    2009-01-01

    A closed-form expression and an upper bound are obtained for the mean absolute error of the unbiased estimator of a probability in inverse binomial sampling. The results given permit the estimation of an arbitrary probability with a prescribed level of the normalized mean absolute error.

  14. 经济全球化进程中中国粮食安全问题研究%Food Security of China in the Process of Economic Globalization

    Institute of Scientific and Technical Information of China (English)

    王运博; 许高峰

    2014-01-01

    Based on the definition of food security,we analyze the Chinese material and economic access to food in the process of economic globalization,in the background of quotas,high tariffs and high food prices of the domestic markets .Combined with the potential risks of China′s future food security,we sug-gest that China should be based on high self-sufficiency in food rations,appropriate imports of corn and other feed grain,make effective use of economic globalization in order to enhance the ability to ensure food security,then we put forward countermeasures and suggestions of China′s food security safeguards in the process of economic globalization .%依据粮食安全的定义,分析了经济全球化进程中,在配额制、高关税和国内市场高粮价的背景下,中国在物质上和经济上获取粮食的能力。结合未来中国粮食安全的潜在风险,认为中国应立足于口粮高度自给、玉米等饲料粮适当进口,有效利用经济全球化以增强保障粮食安全的能力,并提出了经济全球化进程中保障中国粮食安全的对策和建议。

  15. Virtual World Security Inspection

    Directory of Open Access Journals (Sweden)

    Nicholas Charles Patterson

    2012-06-01

    Full Text Available Virtual property theft is a serious problem that exists in virtual worlds. Legitimate users of these worlds invest considerable amounts of time, effort and real-world money into obtaining virtual property, but unfortunately, are becoming victims of theft in high numbers. It is reported that there are over 1 billion registered users of virtual worlds containing virtual property items worth an estimated US$50 billion dollars. The problem of virtual property theft is complex, involving many legal, social and technological issues. The software used to access virtual worlds is of great importance as they form the primary interface to these worlds and as such the primary interface to conduct virtual property theft. The security vulnerabilities of virtual world applications have not, to date, been examined. This study aims to use the process of software inspection to discover security vulnerabilities that may exist within virtual world software – vulnerabilities that enable virtual property theft to occur. Analyzing three well know virtual world applications World of Warcraft, Guild Wars and Entropia Universe, this research utilized security analysis tools and scenario testing with focus on authentication, trading, intruder detection and virtual property recovery. It was discovered that all three examples were susceptible to keylogging, mail and direct trade methods were the most likely method for transferring stolen items, intrusion detection is of critical concern to all VWEs tested, stolen items were unable to be recovered in all cases and lastly occurrences of theft were undetectable in all cases. The results gained in this study present the key problem areas which need to be addressed to improve security and reduce the occurrence of virtual property theft.

  16. A developmental study of latent absolute pitch memory.

    Science.gov (United States)

    Jakubowski, Kelly; Müllensiefen, Daniel; Stewart, Lauren

    2017-03-01

    The ability to recall the absolute pitch level of familiar music (latent absolute pitch memory) is widespread in adults, in contrast to the rare ability to label single pitches without a reference tone (overt absolute pitch memory). The present research investigated the developmental profile of latent absolute pitch (AP) memory and explored individual differences related to this ability. In two experiments, 288 children from 4 to12 years of age performed significantly above chance at recognizing the absolute pitch level of familiar melodies. No age-related improvement or decline, nor effects of musical training, gender, or familiarity with the stimuli were found in regard to latent AP task performance. These findings suggest that latent AP memory is a stable ability that is developed from as early as age 4 and persists into adulthood.

  17. Chapter 3: Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  18. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  19. Security in Logistics

    Science.gov (United States)

    Cempírek, Václav; Nachtigall, Petr; Široký, Jaromír

    2016-12-01

    This paper deals with security of logistic chains according to incorrect declaration of transported goods, fraudulent transport and forwarding companies and possible threats caused by political influences. The main goal of this paper is to highlight possible logistic costs increase due to these fraudulent threats. An analysis of technological processes will beis provided, and an increase of these transport times considering the possible threatswhich will beis evaluated economic costs-wise. In the conclusion, possible threat of companies'` efficiency in logistics due to the costs`, means of transport and increase in human resources` increase will beare pointed out.

  20. Information security protecting the global enterprise

    CERN Document Server

    Pipkin, Donald L

    2000-01-01

    In this book, IT security expert Donald Pipkin addresses every aspect of information security: the business issues, the technical process issues, and the legal issues. Pipkin starts by reviewing the key business issues: estimating the value of information assets, evaluating the cost to the organization if they are lost or disclosed, and determining the appropriate levels of protection and response to security incidents. Next, he walks through the technical processes required to build a consistent, reasonable information security system, with appropriate intrusion detection and reporting features. Finally, Pipkin reviews the legal issues associated with information security, including corporate officers' personal liability for taking care that information is protected. The book's coverage is applicable to businesses of any size, from 50 employees to 50,000 or more, and ideal for everyone who needs at least a basic understanding of information security: network/system administrators, managers, planners, archite...