WorldWideScience

Sample records for achieving cooperative security

  1. Cooperative Wireless Communications and Physical Layer Security : State of the Art

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    in the mobile equipment is not feasible due to resource constraints. Cooperative wireless communication (CWC) is the upcoming virtual MIMO technique to combat fading and achieve diversity through user cooperation. Physical layer security (PLS) is the imminent security guarantee for the cooperative communication....

  2. Security cooperation with China: Analysis and a proposal. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Wilborn, T.L.

    1994-11-25

    The author examines U.S.-China security cooperation before Tiananmen Square; the strategic context in which it took place; and the strategic environment of U.S.-China relations at the present time. As a member of the U.N. Security Council and one of the five acknowledged nuclear powers, China`s actions can influence a wide range of U.S. global interests. Continued U.S.-China security cooperation will contribute to stability in an important region of the world and help achieve U.S. global objectives. He concludes that, although the reasons which justified the program of security cooperation with China during the cold war are irrelevant today, security cooperation and military-to-military relations are highly desirable in the current strategic environment.

  3. Practices on nuclear security and international cooperation

    International Nuclear Information System (INIS)

    Shen Ning

    2009-01-01

    Full text: Nuclear terrorism has been a great threat against the safety and security of the world. It has been reached the consensus by international community to strengthen the nuclear security regime to protect the nuclear and other radiological materials and related facilities. Protection of the security of nuclear and other radiological materials in use, storage and transport and related facilities is always a important issue faced by each country and it depends on the technologies, funds and human resources can be utilized. As nuclear technology has been widely used in different area, China competent authorities have issued a series of regulations, implementation rules and guidelines on security of nuclear and radioactive materials and related facilities. China supports and has taken an active part in the international efforts to strengthen the international nuclear security regime to combat nuclear terrorism. China has paid great importance on international cooperations on nuclear security with IAEA and other countries. More than 10 various national workshops and training courses on nuclear security and physical protection were delivered per year, which provided a communication platform for Chinese facility operators and managers to know the international technology-development and share the research achievements. In cooperation with the IAEA, China has held a great number of regional and national training courses on physical protection and nuclear security since 1998. Different types of training, such as training on awareness, Design Basis Threat (DBT), physical security system design, equipments operation and vulnerability analysis, benefited the administrators, facility operators, engineers and technical staff in charge of physical security system design, operation and maintenance from China and regional countries. Under the framework of the bilateral agreement on Peaceful Use of Nuclear Technology (PUNT), China and U.S. jointly conducted a Technical Demo

  4. Value of Cooperative Relationships for Security of a Safer World

    International Nuclear Information System (INIS)

    Malollari, Ilirjan; Civici, Nikolla; Hirsch, Kristin; Randolph, John David

    2010-01-01

    Cooperation of countries for improving security of radioactive and nuclear assets is clearly the key to success in establishing a more safe and secure world. Over the past few years the United States Department of Energy s Global Threat Reduction Initiatives (GTRI) program has been actively engaged with many countries of the world to identify, account for, and support enhancements to security and accounting measures for these materials. The Republic of Albania has demonstrated its willingness and desire to work closely with the United States to achieve and implement the GTRI goals for security of their assets. The GTRI program has assisted the International Atomic Energy Agency (IAEA) in development on a variety of subject areas related to security of sources and nuclear materials. Albania, a Member State of the IAEA, received training and information support from the agency. The leadership of the Albanian nuclear program has changed but the commitment of Albania to work closely with GTRI continues. The GTRI/Albania global partnership made significant accomplishments in security and safe storage of Albania's nuclear assets. This paper will describe a brief history of the Albanian program and the achievements resulting from the cooperative program with GTRI, which have resulted in a more secure Albania.

  5. Defense Security Cooperation Agency Vision 2020. Update 1

    Science.gov (United States)

    2015-10-01

    the feasibility and pros/ cons of developing a DoD- wide security cooperation workforce development and management program including training...Synchronizing Security Cooperation Activities ..................................................................................... 7 Meeting...Security Cooperation ............................. 15 6. Remaining a Provider of Choice for Our International Customers

  6. Study on Enhancing nuclear security cooperation in Northeast Asia

    International Nuclear Information System (INIS)

    Lee, Jounghoon; Heo, Chul

    2015-01-01

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening

  7. Study on Enhancing nuclear security cooperation in Northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jounghoon; Heo, Chul [Korea Institute of Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening.

  8. A sequential-move game for enhancing safety and security cooperation within chemical clusters

    International Nuclear Information System (INIS)

    Pavlova, Yulia; Reniers, Genserik

    2011-01-01

    The present paper provides a game theoretic analysis of strategic cooperation on safety and security among chemical companies within a chemical industrial cluster. We suggest a two-stage sequential move game between adjacent chemical plants and the so-called Multi-Plant Council (MPC). The MPC is considered in the game as a leader player who makes the first move, and the individual chemical companies are the followers. The MPC's objective is to achieve full cooperation among players through establishing a subsidy system at minimum expense. The rest of the players rationally react to the subsidies proposed by the MPC and play Nash equilibrium. We show that such a case of conflict between safety and security, and social cooperation, belongs to the 'coordination with assurance' class of games, and we explore the role of cluster governance (fulfilled by the MPC) in achieving a full cooperative outcome in domino effects prevention negotiations. The paper proposes an algorithm that can be used by the MPC to develop the subsidy system. Furthermore, a stepwise plan to improve cross-company safety and security management in a chemical industrial cluster is suggested and an illustrative example is provided.

  9. Concepts and Practices of Cooperative Security

    DEFF Research Database (Denmark)

    Keating, Vincent; Wheeler, Nicholas J

    2013-01-01

    This chapter considers how the security dilemma can be overcome in ways that promote cooperation and even trust, mitigating or transcending the international uncertainty that can otherwise inhibit interstate cooperation. It argues that there are two mechanisms to create the trust necessary...... for the development of a security community, Charles Osgood's GRIT strategy and a unilateral 'leap of trust.' Both of these, however, initially require elites to develop security dilemma sensibility. The long-term stability of security communities is fundamentally linked to the presence of embedded trust among...

  10. The European cooperative approach to securing critical information infrastructure.

    Science.gov (United States)

    Purser, Steve

    2011-10-01

    This paper provides an overview of the EU approach to securing critical information infrastructure, as defined in the Action Plan contained in the Commission Communication of March 2009, entitled 'Protecting Europe from large-scale cyber-attacks and disruptions: enhancing preparedness, security and resilience' and further elaborated by the Communication of May 2011 on critical Information infrastructure protection 'Achievements and next steps: towards global cyber-security'. After explaining the need for pan-European cooperation in this area, the CIIP Action Plan is explained in detail. Finally, the current state of progress is summarised together with the proposed next steps.

  11. Cooperative Security: New Horizons for International Order

    National Research Council Canada - National Science Library

    Cohen, Richard; Mihalka, Michael

    2001-01-01

    .... Both are controversial. Richard Cohen presents a compelling and highly original model of Cooperative Security -- a term that once was applied almost exclusively to the Organization for Security and Co-operation in Europe (OSCE...

  12. INFORMATION SECURITY IN LOGISTICS COOPERATION

    Directory of Open Access Journals (Sweden)

    Tomasz Małkus

    2015-03-01

    Full Text Available Cooperation of suppliers of raw materials, semi-finished products, finished products, wholesalers, retailers in the form of the supply chain, as well as outsourcing of specialized logistics service require ensuring adequate support of information. It concerns the use of appropriate computer tools. The security of information in such conditions of collaboration becomes the important problem for parties of contract. The objective of the paper is to characterize main issues relating to security of information in logistics cooperation.

  13. A sequential-move game for enhancing safety and security cooperation within chemical clusters.

    Science.gov (United States)

    Pavlova, Yulia; Reniers, Genserik

    2011-02-15

    The present paper provides a game theoretic analysis of strategic cooperation on safety and security among chemical companies within a chemical industrial cluster. We suggest a two-stage sequential move game between adjacent chemical plants and the so-called Multi-Plant Council (MPC). The MPC is considered in the game as a leader player who makes the first move, and the individual chemical companies are the followers. The MPC's objective is to achieve full cooperation among players through establishing a subsidy system at minimum expense. The rest of the players rationally react to the subsidies proposed by the MPC and play Nash equilibrium. We show that such a case of conflict between safety and security, and social cooperation, belongs to the 'coordination with assurance' class of games, and we explore the role of cluster governance (fulfilled by the MPC) in achieving a full cooperative outcome in domino effects prevention negotiations. The paper proposes an algorithm that can be used by the MPC to develop the subsidy system. Furthermore, a stepwise plan to improve cross-company safety and security management in a chemical industrial cluster is suggested and an illustrative example is provided. Copyright © 2010 Elsevier B.V. All rights reserved.

  14. The global threat reduction initiative's radiological security cooperation with Russia - 59361

    International Nuclear Information System (INIS)

    Blanchard, Tiffany A.; Abramson, William J.; Russell, James W. Jr.; Roberts, Catherine K.

    2012-01-01

    The United States (U.S.) Department of Energy (DOE) / National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) supports both U.S. and international threat reduction goals by securing vulnerable nuclear and radiological material located at civilian sites throughout the world. GTRI's approach to reducing the threat posed by vulnerable, high-activity radioactive sources includes removing and disposing of orphan or disused radioactive sources; implementing physical security upgrades at civilian sites containing radioactive sources; and establishing a cooperative sustainability program at sites to ensure that upgrades are maintained. For many years GTRI has collaborated successfully with the Russian Federation and international partners to improve radiological security in Russia. This paper provides a synopsis of GTRI's accomplishments and cooperation with Russia in the following areas: 1.) recovering and disposing of orphan and disused radioactive sources, 2.) recovering and disposing of radioisotope thermoelectric generators (RTGs), and 3.) providing physical security upgrades at civilian sites that contain vulnerable radiological material. The success of GTRI's program to secure radiological material in the Russian Federation over the past decade is due largely to the hard work, technical expertise, and tenacity of the U.S. laboratory teams and the Russian partner organizations with whom GTRI has worked. GTRI plans to continue building on this history of cooperation in order to recover and secure additional, vulnerable radioactive sources in locations throughout Russia. GTRI also is committed to sustainability efforts so that facilities in Russia receiving physical protection equipment and training are prepared to eventually assume responsibility for those security upgrades. In the years to come, GTRI will combine financial support with capacity building to enhance Russia's domestic programs to address these challenges. Through

  15. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  16. A Trust-Based Model for Security Cooperating in Vehicular Cloud Computing

    Directory of Open Access Journals (Sweden)

    Zhipeng Tang

    2016-01-01

    Full Text Available VCC is a computing paradigm which consists of vehicles cooperating with each other to realize a lot of practical applications, such as delivering packages. Security cooperation is a fundamental research topic in Vehicular Cloud Computing (VCC. Because of the existence of malicious vehicles, the security cooperation has become a challenging issue in VCC. In this paper, a trust-based model for security cooperating, named DBTEC, is proposed to promote vehicles’ security cooperation in VCC. DBTEC combines the indirect trust estimation in Public board and the direct trust estimation in Private board to compute the trust value of vehicles when choosing cooperative partners; a trustworthy cooperation path generating scheme is proposed to ensure the safety of cooperation and increase the cooperation completion rates in VCC. Extensive experiments show that our scheme improves the overall cooperation completion rates by 6~7%.

  17. Cooperative Security: A New Paradigm For A World Without Nuclear Weapons?

    Directory of Open Access Journals (Sweden)

    Marc Finaud

    2013-11-01

    Full Text Available If there is a loose consensus on aiming at a world free of nuclear weapons in the future, there are clear oppositions as to the timeframe as well as the means for achieving this goal. The approach to nuclear disarmament followed to date has only yielded limited success because it has been conceived in isolation from global and regional security environments and threat perceptions. A new paradigm should thus be sought in order to reconcile nuclear powers’ security doctrines with global aspirations for a safer world, and ensure that nuclear powers derive their security less from others’ insecurity but from mutually beneficial cooperative security. This should not become a pretext for preserving nuclear weapons for ever. It will on the contrary require parallel tracks addressing the initial motivations for acquiring nuclear weapons and other weapons of mass destruction (WMD, in particular in the context of regional conflicts, as well as dealing with the current issues necessarily related to nuclear disarmament (missile defence, weaponization of space, conventional imbalances and future weapon systems. Ultimately, in a globalised nuclear-weapon free world, state security will not require nuclear weapons because it will be inserted into a broader network encompass­ing all aspects of security addressed in cooperative and multilateral approaches.

  18. Cooperative monitoring and its role in regional security

    Energy Technology Data Exchange (ETDEWEB)

    Biringer, K.; Olsen, J.; Lincoln, R.; Wehling, F. [and others

    1997-03-01

    Cooperative monitoring systems can play an important part in promoting the implementation of regional cooperative security agreements. These agreements advance the national security interests of the United States in a post Cold War environment. Regional issues as widely varying as nuclear nonproliferation, trade and environmental pollution can be the source of tensions which may escalate to armed conflict which could have global implications. The Office of National Security Policy Analysis at the US Department of Energy (DOE) has an interest in seeking ways to promote regional cooperation that can reduce the threats posed by regional conflict. DOE technologies and technical expertise can contribute to developing solutions to a wide variety of these international problems. Much of this DOE expertise has been developed in support of the US nuclear weapons and arms control missions. It is now being made available to other agencies and foreign governments in their search for regional security and cooperation. This report presents two examples of interest to DOE in which monitoring technologies could be employed to promote cooperation through experimentation. The two scenarios include nuclear transparency in Northeast Asia and environmental restoration in the Black Sea. Both offer the potential for the use of technology to promote regional cooperation. The issues associated with both of these monitoring applications are presented along with examples of appropriate monitoring technologies, potential experiments and potential DOE contributions to the scenarios.

  19. Cooperative Monitoring Center Occasional Paper/8: Cooperative Border Security for Jordan: Assessment and Options

    Energy Technology Data Exchange (ETDEWEB)

    Qojas, M.

    1999-03-01

    This document is an analysis of options for unilateral and cooperative action to improve the security of Jordan's borders. Sections describe the current political, economic, and social interactions along Jordan's borders. Next, the document discusses border security strategy for cooperation among neighboring countries and the adoption of confidence-building measures. A practical cooperative monitoring system would consist of hardware for early warning, command and control, communications, and transportation. Technical solutions can expand opportunities for the detection and identification of intruders. Sensors (such as seismic, break-wire, pressure-sensing, etc.) can warn border security forces of intrusion and contribute to the identification of the intrusion and help formulate the response. This document describes conceptual options for cooperation, offering three scenarios that relate to three hypothetical levels (low, medium, and high) of cooperation. Potential cooperative efforts under a low cooperation scenario could include information exchanges on military equipment and schedules to prevent misunderstandings and the establishment of protocols for handling emergency situations or unusual circumstances. Measures under a medium cooperation scenario could include establishing joint monitoring groups for better communications, with hot lines and scheduled meetings. The high cooperation scenario describes coordinated responses, joint border patrols, and sharing border intrusion information. Finally, the document lists recommendations for organizational, technical, and operational initiatives that could be applicable to the current situation.

  20. Physical Layer Security for Cooperative NOMA Systems

    KAUST Repository

    Chen, Jianchao

    2018-01-09

    In this correspondence, we investigate the physical layer security for cooperative non-orthogonal multiple access (NOMA) systems, where both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered. More specifically, some analytical expressions are derived for secrecy outage probability (SOP) and strictly positive secrecy capacity (SPSC). Results show that AF and DF almost achieve the same secrecy performance. Moreover, asymptotic results demonstrate that the SOP tends to a constant at high signal-to-noise ratio (SNR). Finally, our results show that the secrecy performance of considered NOMA systems is independent of the channel conditions between the relay and the poor user.

  1. Physical Layer Security for Cooperative NOMA Systems

    KAUST Repository

    Chen, Jianchao; Yang, Liang; Alouini, Mohamed-Slim

    2018-01-01

    In this correspondence, we investigate the physical layer security for cooperative non-orthogonal multiple access (NOMA) systems, where both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered. More specifically, some analytical expressions are derived for secrecy outage probability (SOP) and strictly positive secrecy capacity (SPSC). Results show that AF and DF almost achieve the same secrecy performance. Moreover, asymptotic results demonstrate that the SOP tends to a constant at high signal-to-noise ratio (SNR). Finally, our results show that the secrecy performance of considered NOMA systems is independent of the channel conditions between the relay and the poor user.

  2. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks

    Directory of Open Access Journals (Sweden)

    Zhen Li

    2016-03-01

    Full Text Available The Internet of Things (IoT is a significant branch of the ongoing advances in the Internet and mobile communications. Yet, the use of a large number of IoT devices can severely worsen the spectrum scarcity problem. The usable spectrum resources are almost entirely occupied, and thus, the increasing demands of radio access from IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as cellular telephones. Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric and asymmetric ciphers may not be suitable for CIoT networks since these networks are composed of low-profile devices. In this paper, we address the security issues in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative in nature, we propose to employ cooperative jamming to achieve secure transmission. In our proposed cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the Signal to Interference plus Noise Ratio (SINR at the eavesdropper subject to the Quality of Service (QoS constraints of the primary traffic and the secondary traffic. We formulate the minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper (ECSI. By using Semi-Definite Programming (SDP, the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the

  3. A cooperative model for IS security risk management in distributed environment.

    Science.gov (United States)

    Feng, Nan; Zheng, Chundong

    2014-01-01

    Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively.

  4. Securing cooperation from persons supplying statistical data.

    Science.gov (United States)

    AUBENQUE, M J; BLAIKLEY, R M; HARRIS, F F; LAL, R B; NEURDENBURG, M G; DE SHELLY HERNANDEZ, R

    1954-01-01

    Securing the co-operation of persons supplying information required for medical statistics is essentially a problem in human relations, and an understanding of the motivations, attitudes, and behaviour of the respondents is necessary.Before any new statistical survey is undertaken, it is suggested by Aubenque and Harris that a preliminary review be made so that the maximum use is made of existing information. Care should also be taken not to burden respondents with an overloaded questionnaire. Aubenque and Harris recommend simplified reporting. Complete population coverage is not necessary.Neurdenburg suggests that the co-operation and support of such organizations as medical associations and social security boards are important and that propaganda should be directed specifically to the groups whose co-operation is sought. Informal personal contacts are valuable and desirable, according to Blaikley, but may have adverse effects if the right kind of approach is not made.Financial payments as an incentive in securing co-operation are opposed by Neurdenburg, who proposes that only postage-free envelopes or similar small favours be granted. Blaikley and Harris, on the other hand, express the view that financial incentives may do much to gain the support of those required to furnish data; there are, however, other incentives, and full use should be made of the natural inclinations of respondents. Compulsion may be necessary in certain instances, but administrative rather than statutory measures should be adopted. Penalties, according to Aubenque, should be inflicted only when justified by imperative health requirements.The results of surveys should be made available as soon as possible to those who co-operated, and Aubenque and Harris point out that they should also be of practical value to the suppliers of the information.Greater co-operation can be secured from medical persons who have an understanding of the statistical principles involved; Aubenque and Neurdenburg

  5. Cooperative Monitoring Center Occasional Paper/7: A Generic Model for Cooperative Border Security

    Energy Technology Data Exchange (ETDEWEB)

    Netzer, Colonel Gideon

    1999-03-01

    This paper presents a generic model for dealing with security problems along borders between countries. It presents descriptions and characteristics of various borders and identifies the threats to border security, while emphasizing cooperative monitoring solutions.

  6. Energy Security in Asia: Prospects for Regional Cooperation

    OpenAIRE

    Lucas, Nigel

    2014-01-01

    Three case studies illustrate some of the secondary consequences of the search for energy security and its relationship to regional trade and cooperation: the role of the People’s Republic of China, the emerging market in biofuels in Southeast Asia, and diverse feed-in tariffs for renewable energy. The three main ways regional cooperation can strengthen national policies on energy security are (i) sharing information and knowledge to create a sound evidence base for policies, (ii) agreeing on...

  7. The new strategic balance and cooperative security

    International Nuclear Information System (INIS)

    Simpson, J.

    1995-01-01

    The new strategic balance and cooperative security in the world now is discussed including the following issues: strategic balances and the features of the old strategic environment; the main characteristics of the new political and security environment; the future role of nuclear weapons; the role of arms limitation agreements

  8. U.S.-China Radiological Source Security Project: Continuing And Expanding Bilateral Cooperation

    International Nuclear Information System (INIS)

    Zhu, Zhixuan; Zhou, Qifu; Yang, Yaoyun; Huang, Chaoyun; Lloyd, James; Williams, Adam; Feldman, Alexander; Streeper, Charles; Pope, Noah G.; Hawk, Mark; Rawl, Rick; Howell, Randy A.; Kennedy, Catherine

    2009-01-01

    The successful radiological security cooperation between the U.S. and China to secure at-risk sites near venues of the 2008 Beijing Summer Olympics has led to an expanded bilateral nonproliferation cooperation scope. The U.S. Department of Energy's National Nuclear Security Administration, the Chinese Atomic Energy Authority and the China Ministry of Environmental Protection are continuing joint efforts to secure radiological sources throughout China under the U.S.-China Peaceful Uses of Nuclear Technology (PUNT) Agreement. Joint cooperation activities include physical security upgrades of sites with International Atomic Energy Agency (IAEA) Category 1 radiological sources, packaging, recovery, and storage of high activity transuranic and beta gamma sources, and secure transportation practices for the movement of recovered sources. Expansion of cooperation into numerous provinces within China includes the use of integrated training workshops that will demonstrate methodologies and best practices between U.S. and Chinese radiological source security and recovery experts. The fiscal year 2009 expanded scope of cooperation will be conducted similar to the 2008 Olympic cooperation with the Global Threat Reduction Initiative taking the lead for the U.S., PUNT being the umbrella agreement, and Los Alamos, Sandia, and Oak Ridge National Laboratories operating as technical working groups. This paper outlines the accomplishments of the joint implementation and training efforts to date and discusses the possible impact on future U.S./China cooperation.

  9. U.S.-CHINA RADIOLOGICAL SOURCE SECURITY PROJECT: CONTINUING AND EXPANDING BILATERAL COOPERATION

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, Zhixuan; Zhou, Qifu; Yang, Yaoyun; Huang, Chaoyun; Lloyd, James; Williams, Adam; Feldman, Alexander; Streeper, Charles; Pope, Noah G.; Hawk, Mark; Rawl, Rick; Howell, Randy A.; Kennedy, Catherine

    2009-10-07

    The successful radiological security cooperation between the U.S. and China to secure at-risk sites near venues of the 2008 Beijing Summer Olympics has led to an expanded bilateral nonproliferation cooperation scope. The U.S. Department of Energy’s National Nuclear Security Administration, the Chinese Atomic Energy Authority and the China Ministry of Environmental Protection are continuing joint efforts to secure radiological sources throughout China under the U.S.-China Peaceful Uses of Nuclear Technology (PUNT) Agreement. Joint cooperation activities include physical security upgrades of sites with International Atomic Energy Agency (IAEA) Category 1 radiological sources, packaging, recovery, and storage of high activity transuranic and beta gamma sources, and secure transportation practices for the movement of recovered sources. Expansion of cooperation into numerous provinces within China includes the use of integrated training workshops that will demonstrate methodologies and best practices between U.S. and Chinese radiological source security and recovery experts. The fiscal year 2009 expanded scope of cooperation will be conducted similar to the 2008 Olympic cooperation with the Global Threat Reduction Initiative taking the lead for the U.S., PUNT being the umbrella agreement, and Los Alamos, Sandia, and Oak Ridge National Laboratories operating as technical working groups. This paper outlines the accomplishments of the joint implementation and training efforts to date and discusses the possible impact on future U.S./China cooperation.

  10. Cooperative monitoring of regional security agreements

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L. [Sandia National Labs., Albuquerque, NM (United States). Nonproliferation and Arms Control Analysis Dept.

    1996-11-01

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations. Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  11. Beyond Fashoda: Anglo-French security cooperation in Africa since St-Malo

    OpenAIRE

    Chafer, Tony; Cumming, G.

    2010-01-01

    This article focuses on Anglo-French security and defence collaboration. It begins by setting out the lack of UK-French security cooperation in Africa from the colonial to the early post-Cold War era. It then shows how there has been a degree of institutionalization of Anglo-French relations, alongside greater cooperation in terms of European Security and Defence Policy missions and the training of African peacekeepers. Next, this study explains the recent evolution of UK-French security rela...

  12. 33 CFR 165.709 - Security Zone; Charleston Harbor, Cooper River, South Carolina.

    Science.gov (United States)

    2010-07-01

    ..., Cooper River, South Carolina. 165.709 Section 165.709 Navigation and Navigable Waters COAST GUARD... § 165.709 Security Zone; Charleston Harbor, Cooper River, South Carolina. (a) Regulated area. The Coast Guard is establishing a fixed security zone on all waters of the Cooper River, bank-to-bank and surface...

  13. Securing co-operation from persons supplying statistical data

    Science.gov (United States)

    Aubenque, M. J.; Blaikley, R. M.; Harris, F. Fraser; Lal, R. B.; Neurdenburg, M. G.; Hernández, R. de Shelly

    1954-01-01

    Securing the co-operation of persons supplying information required for medical statistics is essentially a problem in human relations, and an understanding of the motivations, attitudes, and behaviour of the respondents is necessary. Before any new statistical survey is undertaken, it is suggested by Aubenque and Harris that a preliminary review be made so that the maximum use is made of existing information. Care should also be taken not to burden respondents with an overloaded questionnaire. Aubenque and Harris recommend simplified reporting. Complete population coverage is not necessary. Neurdenburg suggests that the co-operation and support of such organizations as medical associations and social security boards are important and that propaganda should be directed specifically to the groups whose co-operation is sought. Informal personal contacts are valuable and desirable, according to Blaikley, but may have adverse effects if the right kind of approach is not made. Financial payments as an incentive in securing co-operation are opposed by Neurdenburg, who proposes that only postage-free envelopes or similar small favours be granted. Blaikley and Harris, on the other hand, express the view that financial incentives may do much to gain the support of those required to furnish data; there are, however, other incentives, and full use should be made of the natural inclinations of respondents. Compulsion may be necessary in certain instances, but administrative rather than statutory measures should be adopted. Penalties, according to Aubenque, should be inflicted only when justified by imperative health requirements. The results of surveys should be made available as soon as possible to those who co-operated, and Aubenque and Harris point out that they should also be of practical value to the suppliers of the information. Greater co-operation can be secured from medical persons who have an understanding of the statistical principles involved; Aubenque and

  14. Influence through Airpower Security Cooperation in Egypt and Pakistan: Lessons for Iraq

    National Research Council Canada - National Science Library

    Thies, Douglas G

    2007-01-01

    .... airpower security cooperation with Pakistan and Egypt. The central argument is that these cases suggest that the key variables affecting the success of airpower security cooperation as a diplomacy instrument are: 1...

  15. Do Coffee Farmers Benefit in Food Security from Participating in Coffee Cooperatives? Evidence from Southwest Ethiopia Coffee Cooperatives.

    Science.gov (United States)

    Shumeta, Zekarias; D'Haese, Marijke

    2018-06-01

    Most coffee in Ethiopia is produced by smallholder farmers who face a daily struggle to get sufficient income but also to feed their families. At the same time, many smallholder coffee producers are members of cooperatives. Yet, literature has paid little attention to the effect of cooperatives on combating food insecurity among cash crop producers including coffee farmers. The objective of the study was to investigate how coffee cooperative membership may affect food security among coffee farm households in Southwest Ethiopia. The study used cross-sectional household data on income, expenditure on food, staple food production (maize and teff), and utilization of improved inputs (fertilizer and improved seed) collected from 256 randomly selected farm households (132 cooperative members and 124 nonmembers) and applied an inverse probability weighting (IPW) estimation to assess the impact of cooperative membership on food security. The result revealed that cooperative membership has a positive and significant effect on staple food production (maize and teff) and facilitated technological transformation via increased utilization of fertilizer and improved seeds. Nonetheless, the effect on food expenditure and income could not be confirmed. Findings suggest a trade-off between coffee marketing and input supply functions of the cooperatives, impairing their true food security impact from the pooled income and production effect.

  16. Cooperative monitoring of regional security agreements

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L.

    1995-08-01

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities: (1) the demilitarization of the Sinai region between Israel and Egypt in the 1970s; (2) the 1991 quadripartite agreement for monitoring nuclear facilities among Brazil, Argentina, The Argentine-Brazilian Agency for Accounting and Control of Nuclear Materials and the International Atomic Energy Agency; and (3) a bilateral Open Skies agreement between Hungary and Romania in 1991. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations.Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  17. Gender, abilities, cognitive style and students' achievement in cooperative learning

    Directory of Open Access Journals (Sweden)

    Cirila Peklaj

    2003-12-01

    Full Text Available The purpose of the study was to investigate the effects of cooperative learning on achievement in mathematics and native language and to analyze students' achievement in cooperative learning according to their gender, abilities and cognitive style. Three hundred and seventy three (170 in the experimental and 203 in the control group fifth grade students from nine different primary schools participated in the study. In experimental group, cooperative learning was introduced in one quarter of the hours dedicated to mathematics and Slovene language during the school year. Control group received the traditional way of teaching in both courses. The results were analyzed with ANOVA. Positive effects of cooperative learning were found in both courses. Results in cooperative learning group were further analyzed according to students' gender, abilities and cognitive style. No significant interaction between students' achievement and their gender or abilities were found. Statistically significant interactions between students' cognitive style and achievement were found in both courses. Field-dependent students benefited most from cooperative learning.

  18. Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network

    Directory of Open Access Journals (Sweden)

    Gianluca Dini

    2012-02-01

    Full Text Available Methodologies and algorithms are presented for the secure cooperation of a team of autonomous mobile underwater sensors, connected through an acoustic communication network, within surveillance and patrolling applications. In particular, the work proposes a cooperative algorithm in which the mobile underwater sensors (installed on Autonomous Underwater Vehicles—AUVs respond to simple local rules based on the available information to perform the mission and maintain the communication link with the network (behavioral approach. The algorithm is intrinsically robust: with loss of communication among the vehicles the coverage performance (i.e., the mission goal is degraded but not lost. The ensuing form of graceful degradation provides also a reactive measure against Denial of Service. The cooperative algorithm relies on the fact that the available information from the other sensors, though not necessarily complete, is trustworthy. To ensure trustworthiness, a security suite has been designed, specifically oriented to the underwater scenario, and in particular with the goal of reducing the communication overhead introduced by security in terms of number and size of messages. The paper gives implementation details on the integration between the security suite and the cooperative algorithm and provides statistics on the performance of the system as collected during the UAN project sea trial held in Trondheim, Norway, in May 2011.

  19. Enhancing regional security agreements through cooperative monitoring

    International Nuclear Information System (INIS)

    Pregenzer, A.L.

    1995-05-01

    This paper proposes that strengthening regional capabilities for formulating and implementing arms control and confidence-building measures is a tangible method of enhancing regional security. It discusses the importance of developing a regional infrastructure for arms control and confidence building and elucidates the role of technology in facilitating regional arms control and confidence-building agreements. In addition, it identifies numerous applications for regional cooperative monitoring in the areas of arms control, resource management, international commerce and disaster response. The Cooperative Monitoring Center at Sandia National Laboratories, whose aim is to help individual countries and regions acquire the tools they need to develop their own solutions to regional problems, is discussed briefly. The paper ends with recommendations for establishing regional cooperative monitoring centers

  20. Cooperative learning and academic achievement: why does groupwork work?

    Directory of Open Access Journals (Sweden)

    Robert E. Slavin

    2014-10-01

    Full Text Available Cooperative learning refers to instructional methods in which students work in small groups to help each other learn. Four major theoretical perspectives on achievement effects of cooperative learning are reviewed: Motivational, social cohesion, developmental, and cognitive elaboration. Evidence from practical classroom research primarily supports the motivational perspective, which emphasizes the use of group goals and individual accountability for group success. However, there are conditions under which methods derived from all four theoretical perspectives contribute to achievement gain. This chapter reconciles these perspectives in a unified theory of cooperative learning effects.

  1. NATO-EU PARTNERSHIP: FOSTERING RESILIENCE FOR A COOPERATIVE SECURITY SPACE

    Directory of Open Access Journals (Sweden)

    Octavia MOISE

    2017-12-01

    Full Text Available Present events indicate an encompassing process of multi-level changes - political, military, economic, and technological that highlights the idea that we are going through a phase of transition at systemic level that is redesigning the structure of power of the 21st century. This paper will try to find out first if the cooperative security concept can be seen as a security theory according to Baldwin’s criteria and second if NATO’s partnership policy in general and the NATO EU partnership in particular can foster resilience. The objectives of this article are to envisage the role of the NATO-EU partnership in the future by: reviewing the theoretical approaches on cooperative security, analysing NATO’s partnership policy, analysing the ability of NATO-EU partnership to foster resilience.

  2. IAEA to Cooperate with Japan on Nuclear Security at 2020 Olympic Games in Tokyo

    International Nuclear Information System (INIS)

    2018-01-01

    The International Atomic Energy Agency (IAEA) and the Government of Japan signed an agreement today aimed at enhancing nuclear security measures for the summer Olympic Games and Paralympic Games in Tokyo in 2020. The agreement follows previous IAEA support to major public events, including the 2016 Olympic Games in Rio de Janeiro and the 2012 European soccer championship in Poland and Ukraine. IAEA Director General Yukiya Amano and Japanese Foreign Minister Taro Kono presided over the signing ceremony at the Agency’s headquarters in Vienna. Practical Arrangements outlining the planned cooperation were signed by IAEA Deputy Director General Juan Carlos Lentijo, head of the Department of Nuclear Safety and Security, and H.E. Mitsuru Kitano, Japan’s Ambassador to the International Organizations in Vienna. “The IAEA has extensive experience in supporting Member States on nuclear security for major public events,” Amano said at the ceremony. “The Agency welcomes the cooperation to support the Olympic and Paralympic Games in Tokyo, and is already cooperating with Japan by sharing the experiences of Member States which previously hosted the Olympics.” The details of the cooperation will be decided in due course, but the possible areas of cooperation include the IAEA offering Japanese authorities training courses, workshops, technical visits and exercises related to nuclear security, hosting preparatory technical meetings and lending supplementary radiation detection equipment. The IAEA and Japan may also exchange information related to nuclear security events as appropriate and through the cooperation, the IAEA will also benefit from Japan’s good practices on nuclear security.

  3. 75 FR 5287 - Federal Advisory Committee; Western Hemisphere Institute for Security Cooperation Board of...

    Science.gov (United States)

    2010-02-02

    ... Institute for Security Cooperation Board of Visitors; Charter Renewal AGENCY: Department of Defense (DoD... charter for the Western Hemisphere Institute for Security Cooperation Board of Visitors (hereafter... special government employees. With the exception of travel and per diem for official travel, Board Members...

  4. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks.

    Science.gov (United States)

    Li, Zhen; Jing, Tao; Ma, Liran; Huo, Yan; Qian, Jin

    2016-03-07

    The Internet of Things (IoT) is a significant branch of the ongoing advances in the Internet and mobile communications. The use of a large number of IoT devices makes the spectrum scarcity problem even more serious. The usable spectrum resources are almost entirely occupied, and thus, the increasing radio access demands of IoT devices cannot be met. To tackle this problem, the Cognitive Internet of Things (CIoT) has been proposed. In a CIoT network, secondary users, i.e., sensors and actuators, can access the licensed spectrum bands provided by licensed primary users (such as telephones). Security is a major concern in CIoT networks. However, the traditional encryption method at upper layers (such as symmetric cryptography and asymmetric cryptography) may be compromised in CIoT networks, since these types of networks are heterogeneous. In this paper, we address the security issue in spectrum-leasing-based CIoT networks using physical layer methods. Considering that the CIoT networks are cooperative networks, we propose to employ cooperative jamming to achieve secrecy transmission. In the cooperative jamming scheme, a certain secondary user is employed as the helper to harvest energy transmitted by the source and then uses the harvested energy to generate an artificial noise that jams the eavesdropper without interfering with the legitimate receivers. The goal is to minimize the signal to interference plus noise ratio (SINR) at the eavesdropper subject to the quality of service (QoS) constraints of the primary traffic and the secondary traffic. We formulate the considered minimization problem into a two-stage robust optimization problem based on the worst-case Channel State Information of the Eavesdropper. By using semi-definite programming (SDP), the optimal solutions of the transmit covariance matrices can be obtained. Moreover, in order to build an incentive mechanism for the secondary users, we propose an auction framework based on the cooperative jamming scheme

  5. Computer Security: SAHARA - Security As High As Reasonably Achievable

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    History has shown us time and again that our computer systems, computing services and control systems have digital security deficiencies. Too often we deploy stop-gap solutions and improvised hacks, or we just accept that it is too late to change things.    In my opinion, this blatantly contradicts the professionalism we show in our daily work. Other priorities and time pressure force us to ignore security or to consider it too late to do anything… but we can do better. Just look at how “safety” is dealt with at CERN! “ALARA” (As Low As Reasonably Achievable) is the objective set by the CERN HSE group when considering our individual radiological exposure. Following this paradigm, and shifting it from CERN safety to CERN computer security, would give us “SAHARA”: “Security As High As Reasonably Achievable”. In other words, all possible computer security measures must be applied, so long as ...

  6. 33 CFR 165.708 - Safety/Security Zone; Charleston Harbor and Cooper River, Charleston, SC.

    Science.gov (United States)

    2010-07-01

    ... Harbor and Cooper River, Charleston, SC. 165.708 Section 165.708 Navigation and Navigable Waters COAST... Guard District § 165.708 Safety/Security Zone; Charleston Harbor and Cooper River, Charleston, SC. (a... Cooper River. All coordinates referenced use datum: NAD 1983. (2) All waters within 100 yards of the...

  7. Asia-Europe cooperation on energy security an overview of options and challenges

    Energy Technology Data Exchange (ETDEWEB)

    Nicolas, F.; Godement, F.; Yakushiji, T

    2005-07-01

    Asian and European economies are major players on the international energy markets. Because of broad similarities in the energy situation in both regions, and also because of some existing major differences, there is definitely scope for joint discussions and cooperation on energy issues between the countries of the two regions, despite possible competing interests. This document aims at examining the conditions for this possible cooperation, as well as the major incentives and obstacles. After a brief reminder on the notion of energy security, a first section provides a synthesis of the energy situation and outlook in the two regions. The next section focuses more specifically on energy security issues and policies, emphasizing the diversity of strategies followed in the two regions. The last section concludes by sketching possible avenues for cooperation on energy issues between countries of the two regions.

  8. Asia-Europe cooperation on energy security an overview of options and challenges

    International Nuclear Information System (INIS)

    Nicolas, F.; Godement, F.; Yakushiji, T.

    2005-01-01

    Asian and European economies are major players on the international energy markets. Because of broad similarities in the energy situation in both regions, and also because of some existing major differences, there is definitely scope for joint discussions and cooperation on energy issues between the countries of the two regions, despite possible competing interests. This document aims at examining the conditions for this possible cooperation, as well as the major incentives and obstacles. After a brief reminder on the notion of energy security, a first section provides a synthesis of the energy situation and outlook in the two regions. The next section focuses more specifically on energy security issues and policies, emphasizing the diversity of strategies followed in the two regions. The last section concludes by sketching possible avenues for cooperation on energy issues between countries of the two regions

  9. Track 7: policy and public interest U.S.-Russian nuclear security cooperation: navigating the present realities. Panel Discussion

    International Nuclear Information System (INIS)

    Hayden, N.K.; Hayden-Prindle, Nancy; McCarthy, Maureen; Rich, John; Graham, Thomas Jr.; Mizin, Victor; Cagan, Debra; Alessi, Vic

    2001-01-01

    Full text of publication follows: In the 10 yr since the beginning of cooperation between the United States and the Russian Federation on nuclear security and nonproliferation issues, the political, economic, and security environment governing the nuclear security cooperation has evolved and, in some cases, undergone dramatic changes. On one hand, the protection of nuclear weapons and materials continues as an urgent national security concern for both the United States and Russia. At the same time, defense infrastructures have been closed or converted to civilian purposes, and there has been increased activity in international cooperation for civilian nuclear technology. This special panel will explore the future of the U.S.-Russia nuclear cooperation with particular attention to the following three themes. Theme 1: Managing the Risks: U.S.-Russian Federation Cooperative Programs for Nuclear Weapons and Materials Security; Theme 2: Creating the Benefits: The Changing Nature of Russia's Domestic Nuclear Industry; Theme 3: Addressing the Impediments: United States and Russia as Nuclear Exporters: Reconciling Nonproliferation Goals, Technology Advancements, and Economic Incentives

  10. Assessing the Effect of Cooperative Learning on Financial Accounting Achievement among Secondary School Students

    Directory of Open Access Journals (Sweden)

    Umar Inuwa

    2017-07-01

    Full Text Available This study examined the effect of cooperative learning approach on financial accounting achievement among secondary school students in Gombe state, Nigeria. A pre-test-post-test-control group design was adopted. 120 students participated in the study were selected randomly from six schools. The students were divided into two equal groups, namely: experimental (i.e., cooperative learning approach and control group (i.e., conventional approach, both at random. A Financial Accounting Achievement Test (FAAT was used as an instrument for data collection. The study found that at the pre-test stage, there was no statistically significant difference between the achievement of cooperative learning students and conventional approach students, the results suggested that the students were initially equal in terms of their achievements. Nevertheless, at the post-test stage, the achievement of students who were exposed to the cooperative learning was found to be significantly better than the achievement of students who were exposed to the conventional approach. The findings further suggested that cooperative learning approach effectively enhanced the financial accounting achievement of the secondary school students. It is, therefore, recommended that government should encourage both curriculum planners and secondary schools’ teachers to adopt cooperative learning approach as an instructional approach for teaching financial accounting in secondary schools to improve students’ achievement in the subject.

  11. Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar

    Science.gov (United States)

    Botel, Gabriel

    This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive

  12. Hydro-hegemony or water security community? Collective action, cooperation and conflict in the SADC transboundary security complex

    CSIR Research Space (South Africa)

    Meissner, Richard

    2017-09-01

    Full Text Available In an anarchical global environment, the conflict potential of shared water resources has made rivers subject to high politics (i.e. security). While researchers and diplomats consider regional treaties as cooperation indicators (Wold 1995), unequal...

  13. Security in the Asia Pacific region

    International Nuclear Information System (INIS)

    1999-01-01

    The Working Group began by discussing the meaning of security in terms of its comprehensive, cooperative and human dimensions. In doing so, the members of the Group focused on major issues which could endanger regional stability and non-proliferation. In order to identify the major problems and sources of tension, it was agreed that the Group would concentrate on two sub-regions, namely, East Asia and South East Asia and then to compare these briefly with South Asia and Latin America, the aim being to identify common security concerns. The discussion was framed in terms of: (i) evaluating the adequacy of the existing institutional framework for security cooperation; (ii) evaluating linkages between economic development and security; and (iii) seeking ways to reduce tension and to increase security in the region. Discussion was focused on the broad subject of security risks and challenges as well as opportunities for effective cooperative security in the Asia Pacific region. Attention was devoted to ways of changing Cold War mentalities, which still hinder the normalization process and the achievement of comprehensive security cooperation among the countries in the region

  14. U.S.-Mexican Security Cooperation: the Merida Initiative and Beyond

    Science.gov (United States)

    2010-08-16

    2010, those funds had yet to be transferred from the State Department to USAID for implementation. 71 “Cárteles Perturban al Sistema Carcelario,” El...Quejas a Web .” Milenio. July 28, 2010. U.S.-Mexican Security Cooperation: the Mérida Initiative and Beyond Congressional Research Service 27

  15. Regional cooperation to reduce the safety and security risks of Orphan radioactive sources

    International Nuclear Information System (INIS)

    Howard, Geoffrey; Hacker, Celia; Murray, Allan; Romallosa, Kristine; Caseria, Estrella; Africa del Castillo, Lorena

    2008-01-01

    ANSTO's Regional Security of Radioactive Sources (RSRS) Project, in cooperation with the Philippine Nuclear Research Institute (PNRI), has initiated a program to reduce the safety and security risks of orphan radioactive sources in the Philippines. Collaborative work commenced in February 2006 during the Regional Orphan Source Search and Methods Workshop, co-hosted by ANSTO and the US National Nuclear Security Administration. Further professional development activities have occurred following requests by PNRI to ANSTO to support improvements in PNRI's capability and training programs to use a range of radiation survey equipment and on the planning and methods for conducting orphan source searches. The activities, methods and outcomes of the PNRI-ANSTO cooperative program are described, including: i.) Delivering a training workshop which incorporates use of source search and nuclide identification equipment and search methodology; and train-the-trainer techniques for effective development and delivery of custom designed training in the Philippines; ii.) Support and peer review of course work on Orphan Source Search Equipment and Methodology developed by PNRI Fellows; iii.) Supporting the delivery of the inaugural National Training Workshop on Orphan Source Search hosted by PNRI in the Philippines; iv.) Partnering in searching for orphan sources in Luzon, Philippines, in May 2007. The methods employed during these international cooperation activities are establishing a new model of regional engagement that emphasises sustainability of outcomes for safety and security of radioactive sources. (author)

  16. European cooperation in the field of security and defence. International Relation theories perspective

    Directory of Open Access Journals (Sweden)

    Jacek Czaputowicz

    2014-06-01

    Full Text Available The paper discusses various theoretical explanations of the European cooperation in the field of security and defence. According to realist explanations this cooperation was a response to external evolutions in the international system, i.e. changes in polarity and distribution of power. Liberals say that it was rather due to internal factors. Constructivists argue that it was a result of elites’ socialisation, while according to Pierre Bourdieu’s field theory, it was caused by civil servants and military staff at the policy implementation level. The paper argues that external factors underlined by realists were decisive, i.e. America’s decreasing involvement in European security.

  17. RUSSIA›S COOPERATION WITH THE COUNTRIES OF POST-SOVIET EURASIA IN THE FIELD OF SECURITY

    Directory of Open Access Journals (Sweden)

    Sergey Valerievich Bespalov

    2016-02-01

    Full Text Available The problem of collective security remains relevant for the majority of post-Soviet Eurasia since the Soviet collapse to date.. In the article on the basis of diachronic analysis of political processes (the study of the successive in real historical time steps analyzed the formation and development of the legal framework of collective security in the post-Soviet Eurasia in relation to the real political processes in the region, the creation and development of the Treaty on Collective Security Organization, and its prospects.As a result of the military-political cooperation within the CIS has not received a significant development, Russia and its allies were forced to make a bet on the development of relations within the Treaty on Collective Security Organization.There are four areas of the Eurasian security cooperation within the Treaty on Collective Security Organization:1. Creation of a common «military umbrella» protecting the Member States of the Organization of the intrusion, including as a result of support for other-strange powers of local radical opposition. The key role played by the army and the military-industrial complex of Russia as the most powerful country in the military unit.2. The fight against international terrorism within the framework of cooperation between national security services and the Ministry of Interior.3. Prevention of large-scale intrusion of extremists from the territory of the north of Afghanistan.4. The fight against drug trafficking.Work on improving the legal framework of the Treaty on Collective Security Organization should be continued. As one of the future goals of the Organization should highlight the creation of a unified arms market, the deepening of cooperation in the development and production of weapons and other military products.

  18. Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming

    Directory of Open Access Journals (Sweden)

    Maoqiang Yang

    2016-11-01

    Full Text Available In this paper, we investigate the secure transmission in wireless sensor networks (WSNs consisting of one multiple-antenna base station (BS, multiple single-antenna legitimate users, one single-antenna eavesdropper and one multiple-antenna cooperative jammer. In an effort to reduce the scheduling complexity and extend the battery lifetime of the sensor nodes, the switch-and-stay combining (SSC scheduling scheme is exploited over the sensor nodes. Meanwhile, transmit antenna selection (TAS is employed at the BS and cooperative jamming (CJ is adopted at the jammer node, aiming at achieving a satisfactory secrecy performance. Moreover, depending on whether the jammer node has the global channel state information (CSI of both the legitimate channel and the eavesdropper’s channel, it explores a zero-forcing beamforming (ZFB scheme or a null-space artificial noise (NAN scheme to confound the eavesdropper while avoiding the interference to the legitimate user. Building on this, we propose two novel hybrid secure transmission schemes, termed TAS-SSC-ZFB and TAS-SSC-NAN, for WSNs. We then derive the exact closed-form expressions for the secrecy outage probability and the effective secrecy throughput of both schemes to characterize the secrecy performance. Using these closed-form expressions, we further determine the optimal switching threshold and obtain the optimal power allocation factor between the BS and jammer node for both schemes to minimize the secrecy outage probability, while the optimal secrecy rate is decided to maximize the effective secrecy throughput for both schemes. Numerical results are provided to verify the theoretical analysis and illustrate the impact of key system parameters on the secrecy performance.

  19. Cooperation Mechanisms To Achieve Eu Renewable Targets

    DEFF Research Database (Denmark)

    Klinge Jacobsen, Henrik; Pade, Lise-Lotte; Schröder, Sascha Thorsten

    2014-01-01

    targets. Furthermore, countries might find themselves competing for investment in a market with limited capital available. In both cases, the cost-efficiency of the renewable support policies is reduced compared to a coordinated solution. Barriers for joint support such as network regulation regarding......There are considerable benefits from cooperating among member states on meeting the 2020 renewable energy sources (RES) targets. Today countries are supporting investments in renewable energy by many different types of support schemes and with different levels of support. The EU has opened...... for cooperation mechanisms such as joint support schemes for promoting renewable energy to meet the 2020 targets. The potential coordination benefits, with more efficient localisation and composition of renewable investment, can be achieved by creating new areas/sub-segments of renewable technologies where...

  20. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks.

    Science.gov (United States)

    Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa

    2017-05-16

    In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks.

  1. Co-operative Learning Approach and Students' Achievement in ...

    African Journals Online (AJOL)

    This study set out to investigate cooperative learning approach and students' achievement in Sociology. One research question and one hypothesis tested at 0.05 level of significance were formulated to guide the study. The study adopted a quasi-experimental design. One hundred and one (101) students of the schools of ...

  2. Cooperation in the maintenance of peace and security, and disarmament

    International Nuclear Information System (INIS)

    1994-01-01

    In the face of recent fundamental changes in the international situation, regional and subregional issues have acquired additional urgency and importance in the field of disarmament and international security. The pursuit of regional solutions to regional problems is thus being encouraged by the international community. Towards this end, the United Nations Centre for Disarmament Affairs is seeking to promote regional approaches to disarmament either through the United Nations Regional Centres for Peace and Disarmament or in cooperation with individual Governments. Regional conferences, meetings and seminars to facilitate an exchange of ideas and information between governmental and non-governmental sectors, and between governmental and other experts, have been organized as a means of finding common ground, fostering the process of confidence-building and delineating areas of possible future negotiation and agreement. This publication is based on material presented at the regional meeting on the Cooperation in the maintenance of peace and security, held at the United Nations Regional Centre for Peace and Disarmament in Asia and the Pacific, in Kathmandu, Nepal, from 31 January to 2 February 1994

  3. Technical cooperation on nuclear security between the United States and China : review of the past and opportunities for the future.

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, Arian Leigh

    2011-12-01

    The United States and China are committed to cooperation to address the challenges of the next century. Technical cooperation, building on a long tradition of technical exchange between the two countries, can play an important role. This paper focuses on technical cooperation between the United States and China in the areas of nonproliferation, arms control and other nuclear security topics. It reviews cooperation during the 1990s on nonproliferation and arms control under the U.S.-China Arms Control Exchange, discusses examples of ongoing activities under the Peaceful Uses of Technology Agreement to enhance security of nuclear and radiological material, and suggests opportunities for expanding technical cooperation between the defense nuclear laboratories of both countries to address a broader range of nuclear security topics.

  4. Security Policy at Road’s End? The Roles of Sweden and Finland in the Nordic-Baltic Defence Cooperation Process

    Directory of Open Access Journals (Sweden)

    Winnerstig Mike

    2014-12-01

    Full Text Available The article addresses a number of questions related to Nordic and to an extent also Nordic-Baltic defence cooperation. First of all, how far has Nordic and Nordic-Baltic defence cooperation come today? Secondly, what are the differences in the approaches of Sweden and Finland when it comes to defence cooperation, especially regarding NATO, in the Nordic-Baltic area? As a first analytical result, it is apparent that the rhetorical standing of the Nordic and Nordic-Baltic defence cooperation process is greater than its real achievements, especially in terms of defence integration. Secondly, it seems also to be clear that the defence and security policy debates of Sweden and Finland are quite different. Some problems identified in the debates within the two countries, respectively, are very similar although the suggested solutions vary very remarkably. Regarding the key issue of NATO membership, the developments of the last few years suggest that the Swedish political establishment, as well as the general public, might be closer to a substantial discussion of NATO membership than their Finnish equivalents.

  5. Internal Security Cooperation under Functional Expectations: Initial Law Enforcement Europeanization - Case of Finland and Estonia

    Directory of Open Access Journals (Sweden)

    Ramon Loik

    2016-03-01

    Full Text Available Law enforcement cooperation as a central part of the EU internal security policy to combat cross-border organised crime and terrorism needs to be more effective by adopting specific provisions and tools. This paper argues that functional expectations require removal of barriers and construction of a common security area, but sometimes better cooperation in practice does not fit, as Europeanization of law enforcement still lacks understanding of objectives, values and principles for improving international trust, consensus, sincere cooperation and effective national coordination. The level of Europeanization of law enforcement could be evaluated as based on the level of implementation of the EU provisions on police cooperation related to practical enforcement, factors promoting or hindering law enforcement and changes in discursive practices due to EU provisions and professional socialisation processes. Some aspects of observed inertia characterizes the slow process of transition or tendencies for absorption in which resilience meets the necessary degree of flexibility allowing for some mutual learning and cooperation, but the result is expectedly a form of accommodation of needful policy requirements in the lack of substantial change perspective.

  6. [Experience of international cooperation among Baltic countries in occupational health and security].

    Science.gov (United States)

    Miloutka, E V; Andronova, E R; Dedkova, L E

    2013-01-01

    The article covers longstanding experience of international cooperation in occupational health and security with Baltic countries. The authors describe history of information network creation, its structure, objectives, importance for occupational health services and safety in the region.

  7. Future regional nuclear fuel cycle cooperation in East Asia: Energy security costs and benefits

    International Nuclear Information System (INIS)

    Hippel, David von; Hayes, Peter; Kang, Jungmin; Katsuta, Tadahiro

    2011-01-01

    Economic growth in East Asia has rapidly increased regional energy, and especially, electricity needs. Many of the countries of East Asia have sought or are seeking to diversify their energy sources and bolster their energy supply and/or environmental security by developing nuclear power. Rapid development of nuclear power in East Asia brings with it concerns regarding nuclear weapons proliferation associated with uranium enrichment and spent nuclear fuel management. This article summarizes the development and analysis of four different scenarios of nuclear fuel cycle management in East Asia, including a scenario where each major nuclear power user develops uranium enrichment and reprocessing of spent fuel individually, scenarios featuring cooperation in the full fuel cycle, and a scenario where reprocessing is avoided in favor of dry cask storage of spent fuel. The material inputs and outputs and costs of key fuel cycle elements under each scenario are summarized. - Highlights: → We evaluate four scenarios of regional nuclear fuel cycle cooperation in East Asia and the Pacific. → The scenarios cover fuel supply, enrichment, transport, reprocessing, and waste management. → We evaluate nuclear material flows, energy use, costs, and qualitative energy security impacts. → Regional cooperation on nuclear fuel cycle issues can help to enhance energy security. → A regional scenario in which reprocessing is rapidly phased out shows security and cost advantages.

  8. Influence through Airpower Security Cooperation in Egypt and Pakistan: Lessons for Iraq

    Science.gov (United States)

    2007-12-01

    was a predictable outcome and casts doubt as to whether or not airpower security cooperation can realistically dissuade states from attempting to...in the Middle East and South Asia, ed. Shelly A. Stahl and Geoffrey Kemp (New York: St. Martin’s Press, 1992) 221-227. 48 airpower security...Policy Toward Arms Transfers to the Middle East,” in Arms Control and Weapons Proliferation in the Middle East and South Asia, ed. Shelly A. Stahl and

  9. Secure Communications over Wireless Networks Even 1-bit Feedback Helps Achieving Security

    KAUST Repository

    Rezki, Zouheir

    2016-01-06

    Recently, there have been a surge toward developing sophisticated security mechanisms based on a cross layer design. While an extensive progress has been realized toward establishing physical layer security as an important design paradigm to enhance security of existing wireless networks, only a little effort has been made toward designing practical coding schemes that achieve or approach the secrecy capacity. Most of existing results are tied to some simplifying assumptions that do not seem always reasonable (passive eavesdropper, perfect channel state information (CSI), etc.). Furthermore, it is still not very clear how to exploit physical layer security paradigms, together with existing cryptosystems, in order to add a supplementary level of protection for information transmission or to achieve key agreement. In this talk, we address the first part of the above problematic, i.e., the effect of channel uncertainty on network security. Particularly, we show that even a coarse estimate of the main channel (channel between the transmitter and the legitimate receiver) can help providing a positive secrecy rate. Specifically, we assume two types of channel uncertainty at the transmitter. The first one is a rate-limited feedback in a block fading channel where the feedback information can be proactive (at the beginning of the coherence block) or of ARQ-type. The second type of uncertainty takes the form of a noisy estimate of the main channel at the transmitter in a fast fading channel. In both cases, we provide upper and lower bounds on the secrecy capacity. We argue how our achievable schemes and upper bounding techniques extend to multi-user setting (broadcasting a single confidential message or multiple confidential messages to multiple legitimate receivers) and to multiple antenna channels.

  10. Secure Communications over Wireless Networks Even 1-bit Feedback Helps Achieving Security

    KAUST Repository

    Rezki, Zouheir

    2016-01-01

    Recently, there have been a surge toward developing sophisticated security mechanisms based on a cross layer design. While an extensive progress has been realized toward establishing physical layer security as an important design paradigm to enhance security of existing wireless networks, only a little effort has been made toward designing practical coding schemes that achieve or approach the secrecy capacity. Most of existing results are tied to some simplifying assumptions that do not seem always reasonable (passive eavesdropper, perfect channel state information (CSI), etc.). Furthermore, it is still not very clear how to exploit physical layer security paradigms, together with existing cryptosystems, in order to add a supplementary level of protection for information transmission or to achieve key agreement. In this talk, we address the first part of the above problematic, i.e., the effect of channel uncertainty on network security. Particularly, we show that even a coarse estimate of the main channel (channel between the transmitter and the legitimate receiver) can help providing a positive secrecy rate. Specifically, we assume two types of channel uncertainty at the transmitter. The first one is a rate-limited feedback in a block fading channel where the feedback information can be proactive (at the beginning of the coherence block) or of ARQ-type. The second type of uncertainty takes the form of a noisy estimate of the main channel at the transmitter in a fast fading channel. In both cases, we provide upper and lower bounds on the secrecy capacity. We argue how our achievable schemes and upper bounding techniques extend to multi-user setting (broadcasting a single confidential message or multiple confidential messages to multiple legitimate receivers) and to multiple antenna channels.

  11. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks

    Science.gov (United States)

    Lee, Jong-Ho; Sohn, Illsoo; Kim, Yong-Hwa

    2017-01-01

    In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF) relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks. PMID:28509841

  12. Simultaneous Wireless Power Transfer and Secure Multicasting in Cooperative Decode-and-Forward Relay Networks

    Directory of Open Access Journals (Sweden)

    Jong-Ho Lee

    2017-05-01

    Full Text Available In this paper, we investigate simultaneous wireless power transfer and secure multicasting via cooperative decode-and-forward (DF relays in the presence of multiple energy receivers and eavesdroppers. Two scenarios are considered under a total power budget: maximizing the minimum harvested energy among the energy receivers under a multicast secrecy rate constraint; and maximizing the multicast secrecy rate under a minimum harvested energy constraint. For both scenarios, we solve the transmit power allocation and relay beamformer design problems by using semidefinite relaxation and bisection technique. We present numerical results to analyze the energy harvesting and secure multicasting performances in cooperative DF relay networks.

  13. Effects of Computer-Assisted Jigsaw II Cooperative Learning Strategy on Physics Achievement and Retention

    Science.gov (United States)

    Gambari, Isiaka Amosa; Yusuf, Mudasiru Olalere

    2016-01-01

    This study investigated the effects of computer-assisted Jigsaw II cooperative strategy on physics achievement and retention. The study also determined how moderating variables of achievement levels as it affects students' performance in physics when Jigsaw II cooperative learning is used as an instructional strategy. Purposive sampling technique…

  14. Power, Profits, and Politics: Energy Security and Cooperation in Eurasia

    Science.gov (United States)

    Svyatets, Ekaterina

    This study explores varying outcomes of energy cooperation, defined as diplomatic relations, bilateral trade, and investment in oil and natural gas. Tests of theories pertinent to energy security - broadly speaking, realism, liberalism, and domestic politics---reveal that they alone can offer only a narrow and one-sided explanation, not embracing the complexity of energy issues. Nevertheless, using them as a starting point, this study outlined a structured framework that incorporates three variables---economic potential, geopolitical rivalry, and domestic interest groups---that are applied to the cases of U.S.-Russia, U.S.-Azerbaijan, and Russia-Germany energy ties. This study concludes that if the economic potential (defined by geographic proximity and resource availability) is very high, such as in the case of Russia-Germany, states can overcome geopolitical rivalries and historical enmities in favor of energy cooperation. However, if the economic potential is relatively low (because of geographic obstacles or easily available alternative suppliers, as in the cases of U.S.-Russia and U.S.-Azerbaijan), then geopolitics prevails---for example, to bypass Russia or to limit American access to contracts in Russia when U.S.-Russian relations are strained. In all the cases explored here, domestic interest groups have mixed influence: if they are united along energy issues, they usually successfully achieve their energy policy goals, although the impact of these groups often becomes intertwined with state interests. In other situations, when powerful interest groups are divided or focused on non-energy-related issues (such as ethnic priorities), their influence over energy deals is much lower.

  15. Some controversy about law on private security

    Directory of Open Access Journals (Sweden)

    Stajić Ljubomir

    2014-01-01

    Full Text Available The Republic of Serbia is one of the last countries that legally regulate the private security sector, which is a new conceptual system of the national security system. Since the law is expected to solve many issues and dilemmas, and bring order to the area, which by some accounts is a very profitable branch of economy. Expectations were that by the end to regulate issues such as: 1 the need for institutionalization of partnership between the public and private sectors for mutual benefit, 2 the need of expressing mutual interest to establish the desired condition of security in the entire society and 3 the need to define the mechanisms and authority to achieve mentioned above. Based on this, legal framework of private security should explicitly provide: 1 a new role of the private sector, 2 communication and data exchange between the public and private sector, 3 mandatory notification about prepared or committed criminal acts on which there is information, 4 cooperation in the tasks of necessarily protected facilities, 4 cooperation in crisis situations including natural disasters, traffic accidents, strikes, sabotage, terrorist attacks, etc., 5 cooperate in the selection and training of staff and 6 cooperation in planning activities and project design of security. This paper presents a critical review of some theoretical and professional controversies in the solutions provided by law, for the purpose of answering whether it is achieving the purpose of passing of such a legal act.

  16. Achieving National Security Strategy: An Effective Process?

    National Research Council Canada - National Science Library

    Mullery, Brian W

    2008-01-01

    The purpose of this research paper is two-fold: 1) to examine whether the U.S. government is properly organized and equipped at the Executive level, to achieve the goals of the President's National Security Strategy and 2...

  17. Cooperative Learning Effects on Achievement and Community of Inquiry in Online Education

    Science.gov (United States)

    Oyarzun, Beth Allred; Morrison, Gary R.

    2013-01-01

    While distance education continues to grow in higher education, students express the concern that they feel isolated. The purpose of this study was to determine if the implementation of a cooperative learning strategy would affect social presence and achievement. Each group completed an individual assignment and a cooperative learning assignment…

  18. OPNET Modeler Simulation Testing of the New Model Used to Cooperation Between QoS and Security Mechanisms

    Directory of Open Access Journals (Sweden)

    Jan Papaj

    2012-01-01

    Full Text Available In this article the performance analysis of the new model, used to integration between QoS and Security, is introduced. OPNET modeler simulation testing of the new model with comparation with the standard model is presented. This new model enables the process of cooperation between QoS and Security in MANET. The introduction how the model is implemented to the simulation OPNET modeler is also showed. Model provides possibilities to integration and cooperation of QoS and security by the cross layer design (CLD with modified security service vector (SSV. An overview of the simulation tested of the new model, comparative study in mobile ad-hoc networks, describe requirements and directions for adapted solutions are presented. Main idea of the testing is to show how QoS and Security related services could be provided simultaneously with using minimal interfering with each service.

  19. A Multilevel Secure Workflow Management System

    National Research Council Canada - National Science Library

    Kang, Myong H; Froscher, Judith N; Sheth, Amit P; Kochut, Krys J; Miller, John A

    1999-01-01

    The Department of Defense (DoD) needs multilevel secure (MLS) workflow management systems to enable globally distributed users and applications to cooperate across classification levels to achieve mission critical goals...

  20. How to form on food and nutritional security for decision makers of communities and cooperative on Cuban

    Directory of Open Access Journals (Sweden)

    Inés Margarita Torres Rivero

    2013-12-01

    Full Text Available The purpose of this work is to support a training strategy for policy decision makers and managers of local projects Integrated in Alimentary and Nutritional Security (SAN in communities and cooperative, sustained on a pedagogical approach, based on the relationship between the components of the SAN, the government official's functions (FG and the administration of local projects integrated as way of performance of this subject. The objective of the strategy is to achieve that decision makers of Pinar del Rio province, can appropriate the knowledge, abilities and values for facilitating their integral preparation related with the SAN, and can negotiate the existent potentialities in communities and cooperative, develop local projects in SAN that supplement the emanated politics from state upper level, then the strategy allows a pertinent acting that impacts in the town that is an inevitable necessity for Cuba and specifically for this province, which is the most vulnerable province to environmental changes that so much influences in SAN.

  1. Using Weblog in Cooperative Learning to Improve the Achievement of History Learning

    Science.gov (United States)

    Leng, Lim Hooi; Leng, Chin Hai; Abedalaziz, Nabeel

    2013-01-01

    This research investigates the use of Weblog in Cooperative Learning to enhance students' learning of History. The main issues of this study were the lack of interest and low achievement scores in History learning. The objectives of this study are to explore the incorporation of Weblog in Cooperative Learning within the teaching and learning…

  2. Learning science in a cooperative setting: Academic achievement and affective outcomes

    Science.gov (United States)

    Lazarowitz, Reuven; Hertz-Lazarowitz, Rachel; Baird, J. Hugh

    A learning unit in earth science was taught to high school students, using a jigsaw-group mastery learning approach. The sample consisted of 73 students in the experimental group and 47 students who learned the topic in an individualized mastery learning approach. The study lasted 5 weeks. Pretests and posttests on academic achievement and affective outcomes were administered. Data were treated with an analysis of covariance. The results show that students of the experimental group achieved significantly higher on academic outcomes, both normative and objective scores. On the creative essay test, the differences in number of ideas and total essay score were not significant between the groups, although the mean scores for number of words were higher for the individualized mastery learning group. On the affective domain, jigsaw-group mastery learning students scored significantly higher on self-esteem, number of friends, and involvement in the classroom. No differences were found in cohesiveness, cooperation, competition, and attitudes toward the subject learned. The results are discussed through the evaluation and comparison of the two methods of instruction used in this study.The cooperative learning movement began in junior high schools as part of the desegregation process, aiming at facilitating positive ethnic relations and increasing academic achievement and social skills among diverse students (Aronson, Stephan, Sikes, Blaney, & Snapp, 1978; Sharan & Hertz-Lazarowitz, 1980; Slavin, 1980). However, elementary teachers quickly recognized the potential of cooperative methods, and such methods were adopted freely in elementary schools before becoming widespread on the junior and senior high level. It has only been during the past few years that application of cooperative learning has been studied extensively with these older students.Cooperative learning methods generally involve heterogeneous groups working together on tasks that are deliberately structured to

  3. To Enable and Sustain: Pacific Air Forces’ Theater Security Cooperation as a Line of Operation

    Science.gov (United States)

    2015-02-01

    security cooperation mechanisms already in place are evolving into a more sequenced and deliberate plan towards a defined cooperative end state. This...alignment of higher guidance and is designed to advise and guide the command’s activities in the region. Joint in its es- sence , it communicates and...face of crises, it is far better to prevent them from occurring in the first place , establish cooperative arrangements ahead of time, and reduce

  4. Global Nuclear Safety and Security Network

    International Nuclear Information System (INIS)

    Guo Lingquan

    2013-01-01

    The objectives of the Regulatory Network are: - to contribute to the effectiveness of nuclear regulatory systems; - to contribute to continuous enhancements, and - to achieve and promote radiation and nuclear safety and security by: • Enhancing the effectiveness and efficiency of international cooperation in the regulation of nuclear and radiation safety of facilities and activities; • Enabling adequate access by regulators to relevant safety and security information; • Promoting dissemination of information on safety and security issues as well as information of good practices for addressing and resolving these issues; • Enabling synergies among different web based networks with a view to strengthening and enhancing the global nuclear safety framework and serving the specific needs of regulators and international organizations; • Providing additional information to the public on international regulatory cooperation in safety and security matters

  5. Secure amplify-and-forward untrusted relaying networks using cooperative jamming and zero-forcing cancelation

    KAUST Repository

    Park, Kihong; Alouini, Mohamed-Slim

    2015-01-01

    In this paper, we investigate secure transmission in untrusted amplify-and-forward half-duplex relaying networks with the help of cooperative jamming at the destination (CJD). Under the assumption of full channel state information (CSI

  6. 78 FR 65300 - Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting

    Science.gov (United States)

    2013-10-31

    ... DEPARTMENT OF DEFENSE Department of the Army Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting AGENCY: Department of the Army, DoD. ACTION: Notice of open meeting. SUMMARY... from the WHINSEC Commandant; Department of State; US Northern Command and US Southern Command; the...

  7. Physical Layer Security for Cooperative Relaying Over Generalized-K Fading Channels

    KAUST Repository

    Wu, Ling; Yang, Liang; Chen, Jianchao; Alouini, Mohamed-Slim

    2018-01-01

    In this letter, we analyze the secrecy performance for a cooperative diversity system with amplify-and-forward (AF) over generalized-K fading channels. More specifically, some lower bounds on the secrecy performance, such as secure outage probability (SOP), average secrecy capacity (ASC), and strictly positive secrecy capacity (SPSC), are derived in closed-form. Finally, we provide simulation results to verify the accuracy of our analytical results.

  8. Physical Layer Security for Cooperative Relaying Over Generalized-K Fading Channels

    KAUST Repository

    Wu, Ling

    2018-02-02

    In this letter, we analyze the secrecy performance for a cooperative diversity system with amplify-and-forward (AF) over generalized-K fading channels. More specifically, some lower bounds on the secrecy performance, such as secure outage probability (SOP), average secrecy capacity (ASC), and strictly positive secrecy capacity (SPSC), are derived in closed-form. Finally, we provide simulation results to verify the accuracy of our analytical results.

  9. 77 FR 20369 - Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting

    Science.gov (United States)

    2012-04-04

    ... Defense (Policy); Department of State; US Northern Command and US Southern Command as well as receive... DEPARTMENT OF DEFENSE Department of the Army Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting AGENCY: Department of the Army, DoD. ACTION: Notice of open meeting. SUMMARY...

  10. 76 FR 39076 - Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting

    Science.gov (United States)

    2011-07-05

    ... Defense (Policy); Department of State; US Northern Command and US Southern Command meeting on December 3rd... DEPARTMENT OF DEFENSE Department of the Army Western Hemisphere Institute for Security Cooperation Board of Visitors; Meeting AGENCY: Department of the Army, DoD. ACTION: Notice of open meeting. SUMMARY...

  11. The impact of size of cooperative group on achievement, social support, and self-esteem.

    Science.gov (United States)

    Bertucci, Andrea; Conte, Stella; Johnson, David W; Johnson, Roger T

    2010-01-01

    The effect of cooperative learning in pairs and groups of 4 and in individualistic learning were compared on achievement, social support, and self-esteem. Sixty-two Italian 7th-grade students with no previous experience with cooperative learning were assigned to conditions on a stratified random basis controlling for ability, gender, and self-esteem. Students participated in 1 instructional unit for 90 min for 6 instructional days during a period of about 6 weeks. The results indicate that cooperative learning in pairs and 4s promoted higher achievement and greater academic support from peers than did individualistic learning. Students working in pairs developed a higher level of social self-esteem than did students learning in the other conditions.

  12. Kazakhstan's Chairmanship of the Organization for Security and Cooperation in Europe: An Assessment

    Directory of Open Access Journals (Sweden)

    - Shirin Akiner

    2011-06-01

    Full Text Available Massive international comment and analysis was devoted to the Kazakhstan's Chairmanship in the Organization for Security and Cooperation in Europe (OSCE. No previous candidate for this office received such treatment. Kazakhstan's agenda of aims and objectives included important issues. During the year several steps were taken towards implementing Kazakhstan's agenda.

  13. ENTNEA: A concept for enhancing regional atomic energy cooperation for securing nuclear transparency in northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Shin, S. T. [Korea Institute for Defence Analyses, Seoul (Korea)

    2000-11-01

    Nuclear energy continues to be a strong and growing component of economic development in Northeast Asia. A broad range of nuclear energy systems already exists across the region and vigorous growth is projected. Associated with these capabilities and plans are various concerns about operational safety, environmental protection, and accumulation of spent fuel and other nuclear materials. We consider cooperative measures that might address these concerns. The confidence building measures suggested here center on the sharing of information to lessen concerns about nuclear activities or to solve technical problems. These activities are encompassed by an Enhanced Nuclear Transparency in Northeast Asia (ENTNEA) concept that would be composed of near-term, information-sharing activities and an eventual regional institution. The near-term activities would address specific concerns and build a tradition of cooperation; examples include radiation measurements for public safety and emergency response, demonstration of safe operations at facilities and in transportation, and material security in the back end of the fuel cycle. Linkages to existing efforts and organizations would be sought to maximize the benefits of cooperation. In the longer term, the new cooperative tradition might evolve into an ENTNEA institution. In institutional form, ENTNEA could combine the near-term activities and new cooperative activities, which might require an institutional basis, for the mutual benefit and security of regional parties. 28 refs., 23 figs., 5 tabs. (Author)

  14. A NEW FORM OF SECURITY COOPERATION AND COLLECTIVECONFLICT MANAGEMENT IN THE POST COLD WARINTERNATIONAL SYSTEM

    Directory of Open Access Journals (Sweden)

    Sinem KOCAMAZ

    2011-01-01

    Full Text Available International security environment changed completely after the Cold War.During the Cold War years security challenges wereshaped by competitive powerrelations between Soviet Union and the United States. On the other hand after theend of the Cold War, global security was redefinedand wide range of securitychallenges and threats occurred. After fragmentation of security threats, newthreats emerged such as terrorist attacks, massacres which are made by humansown governments, chronic politic instabilities, environmental degradations etc.Under these circumstances new forms of security cooperation became more vitalin order to cope with these complex challenges. Inthis respect third partiesbecame an actor to manage conflicts, security challenges and crises. Unliketraditional nation-state intervention, regional organizations, international agenciesand non-governmental organizations became more active in conflict managementprocess. In this framework this study will evaluateperformance and theeffectiveness of the main actors in the collectiveconflict management (CCMprocess.

  15. Department of Defense and Security Cooperation: Improving Prioritization, Authorities, and Evaluations

    Science.gov (United States)

    2016-03-09

    March 9, 2016 Chairman Fischer , Ranking Member Nelson, and distinguished members of the subcommittee, thank you for the opportunity to testify...on the important subject of U.S. security cooperation. It’s a pleasure to appear before you today along with my colleagues, Jeff Eggers and Melissa...based evaluations. Chairman Fischer , Ranking Member Nelson, and members of the subcommittee, I appreciate the opportunity to offer this testimony, and I look forward to assisting the committee in its vital work.

  16. U.S. Security Cooperation with India and Pakistan: A Comparative Study

    Science.gov (United States)

    2013-06-01

    news_and_features/. /07indicipline_force.htm. 284 Richard Van Atta et al ., “Export Controls and the U.S. Defense Industrial Base,” Institute for Defense...Kargil War,” Indian Defense and Strategic Analysis, November 17, 2012. Available at defenceforumindia.com › Opinion › History. Atta, Richard Van et al ...This document was downloaded on August 22, 2013 at 10:36:47 Author(s) Bajwa, Shahid Latif Title U.S. security cooperation with India and Pakistan

  17. Improving the Achievement of Second Year Natural Resource Management Students of Madawalabu University through Cooperative Learning

    Science.gov (United States)

    Abdulahi, Mohammed Mussa; Hashim, Hakim; Kawo, Mohammed

    2017-01-01

    The purpose of this action research is to improve the achievement of students in general and, to examine the perception of students and teachers about cooperative learning, to identify major factors affecting the implementation of cooperative learning and to identify the possible strategies used to improve cooperative learning in Madawalabu…

  18. The impact of security on cooperative awareness in VANET

    NARCIS (Netherlands)

    Feiri, Michael; Petit, Jonathan; Schmidt, R.; Kargl, Frank

    2013-01-01

    Vehicular networking enables new safety applications that aim at improving roads safety. Because of their direct relation to driver's safety, this goal can only be achieved if vehicular networking is based on a technology that is robust against malicious attackers. Therefore, security mechanisms

  19. International cooperation for the development of consistent and stable transportation regulations to promote and enhance safety and security

    International Nuclear Information System (INIS)

    Strosnider, J.

    2004-01-01

    International commerce of radioactive materials crosses national boundaries, linking separate regulatory institutions with a common purpose and making it necessary for these institutions to work together in order to achieve common safety goals in a manner that does not place an undue burden on industry and commerce. Widespread and increasing use of radioactive materials across the world has led to increases in the transport of radioactive materials. The demand for consistency in the oversight of international transport has also increased to prevent unnecessary delays and costs associated with incongruent or redundant regulatory requirements by the various countries through which radioactive material is transported. The International Atomic Energy Agency (IAEA) is the authority for international regulation of transportation of radioactive materials responsible for promulgation of regulations and guidance for the establishment of acceptable methods of transportation for the international community. As such, the IAEA is seen as the focal point for consensus building between its Member States to develop consistency in transportation regulations and reviews and to ensure the safe and secure transport of radioactive material. International cooperation is also needed to ensure stability in our regulatory processes. Changes to transportation regulations should be based on an anticipated safety benefit supported by risk information and insights gained from continuing experience, evaluation, and research studies. If we keep safety as the principle basis for regulatory changes, regulatory stability will be enhanced. Finally, as we endeavour to maintain consistency and stability in our international regulations, we must be mindful of the new security challenges that lay before the international community as a result of a changing terrorist environment. Terrorism is a problem of global concern that also requires international cooperation and support, as we look for ways to

  20. The Effects of Cooperative and Individualistic Learning Structures on Achievement in a College-Level Computer-Aided Drafting Course

    Science.gov (United States)

    Swab, A. Geoffrey

    2012-01-01

    This study of cooperative learning in post-secondary engineering education investigated achievement of engineering students enrolled in two intact sections of a computer-aided drafting (CAD) course. Quasi-experimental and qualitative methods were employed in comparing student achievement resulting from out-of-class cooperative and individualistic…

  1. Achieving food security in times of crisis.

    Science.gov (United States)

    Swaminathan, M S

    2010-11-30

    In spite of several World Food Summits during the past decade, the number of people going to bed hungry is increasing and now exceeds one billion. Food security strategies should therefore be revisited. Food security systems should begin with local communities who can develop and manage community gene, seed, grain and water banks. At the national level, access to balanced diet and clean drinking water should become a basic human right. Implementation of the right to food will involve concurrent attention to production, procurement, preservation and public distribution. Higher production in perpetuity should be achieved through an ever-green revolution based on the principles of conservation and climate-resilient farming. This will call for a blend of traditional ecological prudence with frontier technologies, particularly biotechnology and information communication technologies. Copyright © 2010. Published by Elsevier B.V.

  2. The Role of Vietnam in The ASEAN Regional Security Cooperation: From Mechanism Construction to Dispute Settlement

    Directory of Open Access Journals (Sweden)

    Li Chunxia

    2016-12-01

    Full Text Available In the context of the integration of ASEAN, Vietnam recognized that the strategic role of ASEAN is in its diplomacy. At the same time, to further improve the status in the region and in the international community, Vietnam has actively been participating in ASEAN affairs. Vietnam not only promoted the integration process of ASEAN, but also promoted the political security cooperation of ASEAN, in which Vietnam has advantages and wants to play a leading role. On the one hand, Vietnam promotes the construction of political security cooperation mechanisms, such as ARF, ADMM+, and so on; on the other hand, Vietnam took the South China Sea as a common concern, actively appeals for a common ASEAN position, to maximize its own benefit. Vietnam will further enhance and consolidate its status and role in ASEAN in the future.

  3. Controls-based approach for evaluation of information security standards implementation costs

    OpenAIRE

    OLIFER, Dmitrij; GORANIN, Nikolaj; KACENIAUSKAS, Arnas; CENYS, Antanas

    2017-01-01

    According to the PricewaterhouseCoopers analysis, the average cost of a single information security and data protections breaches has increased twice during 2015 (Pricewaterhouse Coopers 2015). Amount of organizations who reported serious breach has also risen (from 9% in 2015 to 17% in 2016) (PricewaterhouseCoopers 2016). To achieve their goals criminals are using different techniques starting from Social engineering (phishing, whaling) and finishing with malware execution (such as ransomwar...

  4. IAEA and EU Review Progress on Cooperation, Agree on Next Steps at Annual Meeting

    International Nuclear Information System (INIS)

    2018-01-01

    The International Atomic Energy Agency (IAEA) and the European Union (EU) reviewed progress achieved in working together on a range of nuclear activities and agreed to further enhance cooperation during their sixth annual Senior Officials Meeting in Vienna. The talks on 8 February at the IAEA’s headquarters provided a forum for exchanging views on strengthening collaboration on nuclear safety, security, safeguards, sustainable development, nuclear energy research and increasing innovation. The two organizations welcomed the fruitful cooperation and progress achieved over the past years. They agreed to deepen cooperation in several areas, particularly in the promotion of nuclear applications for sustainable development.

  5. Cooperative Learning and Learning Achievement in Social Science Subjects for Sociable Students

    Science.gov (United States)

    Herpratiwi; Darsono; Sasmiati; Pujiyatli

    2018-01-01

    Purpose: The research objective was to compare students' learning achievement for sociable learning motivation students in social science (IPS) using cooperative learning. Research Methods: This research used a quasi-experimental method with a pre-test/post-test design involving 35 fifth-grade students. The learning process was conducted four…

  6. International cooperation for operating safety

    International Nuclear Information System (INIS)

    Dupuis, M.C.

    1989-03-01

    The international-cooperation organization in nuclear safety domain is discussed. The nuclear energy Direction Committee is helped by the Security Committee for Nuclear Power Plants in the cooperation between security organizations of member countries and in the safety and nuclear activity regulations. The importance of the cooperation between experts in human being and engine problems is underlined. The applied methods, exchange activities and activity analysis, and the cooperation of the Nuclear Energy Agency and international organizations is analysed [fr

  7. The problem of Indonesia’s leadership in ASEAN political and security cooperation

    Directory of Open Access Journals (Sweden)

    A. G. Smorzhevska

    2017-07-01

    Full Text Available The study is dedicated to modern approaches and policy of the Republic of Indonesia toward the process of regional integration in Southeast Asia. Key aspects and instruments of Indonesia’s increasing contribution in strengthening of the political and security cooperation between members of ASEAN have been explained by the researcher. The aim of the article is to identify the role of Indonesia in conduction of multilateral diplomacy within the framework of ASEAN political and security sphere, forms of its implementation as well as the specifics of limiting factors for such leadership. It has been argued by the author that Indonesia’s commitments to ASEAN and its desire to promote or inhibit the process of regional integration vary depending on policy areas and level of compliance to its national interests. Consequently, Indonesia’s main interests and priorities concerning the ASEAN integration process lie in security and defense sphere. Indonesia’s key role in building of the ASEAN Political and Security Community is to provide ideas and political concepts as well as to shape the regional agenda. Therefore, the country implements the relevant agreements and puts forward a number of regional initiatives in foreign policy and defense. Moreover, assuming the fact that direct regional mechanisms of conflict resolution has not been fully implemented yet, Jakarta works on its development, acting as a mediator and a reliable regional partner. In addition, it is worth to underline that Jakarta makes substantial contribution to regional efforts in counterterrorism. The benefit of this study is that it takes into consideration the specifics of the factors that reveal the limitations for leadership in the security sphere. The core principles of ASEAN functioning determine the degree and nature of Member States’ leadership in the region. The material power resources and implementation on power through coercion gave way to soft instruments of

  8. International Cooperation for Enhancing Nuclear Safety, Security, Safeguards and Non-proliferation : 60 Years of IAEA and EURATOM

    CERN Document Server

    Abousahl, Said; Plastino, Wolfango

    2018-01-01

    This open access book examines key aspects of international cooperation to enhance nuclear safety, security, safeguards, and non-proliferation, thereby assisting in development and maintenance of the verification regime and fostering progress toward a nuclear weapon-free world. The book opens by addressing important political, institutional, and legal dimensions. Current challenges are discussed and attempts made to identify possible solutions and future improvements. Subsequent sections consider scientific developments that have the potential to increase the effectiveness of implementation of international regimes, particularly in critical areas, technology foresight, and the ongoing evaluation of current capabilities. The closing sections examine scientific and technical challenges and discuss the role of international cooperation and actions of the scientific community in leading the world toward peace and security. The book – which celebrates 60 years of IAEA Atoms for Peace and Development and the EURA...

  9. The Effects of Cooperative Learning on the Academic Achievement and Knowledge Retention

    Science.gov (United States)

    Tran, Van Dat

    2014-01-01

    This experimental study investigated the effects of cooperative learning on the achievement and knowledge retention of 110 first-year primary education students toward the psychology subject over the eight weeks of instruction at An Giang University. These tertiary students were divided into two matched groups of 55 to be taught by the same…

  10. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  11. Effects of gender and role selection in cooperative learning groups on science inquiry achievement

    Science.gov (United States)

    Affhalter, Maria Geralyn

    An action research project using science inquiry labs and cooperative learning groups examined the effects of same-gender and co-educational classrooms on science achievement and teacher-assigned or self-selected group roles on students' role preferences. Fifty-nine seventh grade students from a small rural school district participated in two inquiry labs in co-educational classrooms or in an all-female classroom, as determined by parents at the beginning of the academic year. Students were assigned to the same cooperative groups for the duration of the study. Pretests and posttests were administered for each inquiry-based science lab. Posttest assessments included questions for student reflection on role assignment and role preference. Instruction did not vary and a female science teacher taught all class sections. The same-gender classroom and co-ed classrooms produced similar science achievement scores on posttests. Students' cooperative group roles, whether teacher-assigned or self-selected, produced similar science achievement scores on posttests. Male and female students shared equally in favorable and unfavorable reactions to their group roles during the science inquiry labs. Reflections on the selection of the leader role revealed a need for females in co-ed groups to be "in charge". When reflecting on her favorite role of leader, one female student in a co-ed group stated, "I like to have people actually listen to me".

  12. Resource reliability, accessibility and governance: pillars for managing water resources to achieve water security in Nepal

    Science.gov (United States)

    Biggs, E. M.; Duncan, J.; Atkinson, P.; Dash, J.

    2013-12-01

    As one of the world's most water-abundant countries, Nepal has plenty of water yet resources are both spatially and temporally unevenly distributed. With a population heavily engaged in subsistence farming, whereby livelihoods are entirely dependent on rain-fed agriculture, changes in freshwater resources can substantially impact upon survival. The two main sources of water in Nepal come from monsoon precipitation and glacial runoff. The former is essential for sustaining livelihoods where communities have little or no access to perennial water resources. Much of Nepal's population live in the southern Mid-Hills and Terai regions where dependency on the monsoon system is high and climate-environment interactions are intricate. Any fluctuations in precipitation can severely affect essential potable resources and food security. As the population continues to expand in Nepal, and pressures build on access to adequate and clean water resources, there is a need for institutions to cooperate and increase the effectiveness of water management policies. This research presents a framework detailing three fundamental pillars for managing water resources to achieve sustainable water security in Nepal. These are (i) resource reliability; (ii) adequate accessibility; and (iii) effective governance. Evidence is presented which indicates that water resources are adequate in Nepal to sustain the population. In addition, aspects of climate change are having less impact than previously perceived e.g. results from trend analysis of precipitation time-series indicate a decrease in monsoon extremes and interannual variation over the last half-century. However, accessibility to clean water resources and the potential for water storage is limiting the use of these resources. This issue is particularly prevalent given the heterogeneity in spatial and temporal distributions of water. Water governance is also ineffective due to government instability and a lack of continuity in policy

  13. The Free Trade Area of the Americas: Can Regional Economic Integration Lead to Greater Cooperation on Security?

    National Research Council Canada - National Science Library

    Sandoval, Thomas

    2002-01-01

    ...) and its impact on cooperative security in the Western Hemisphere. Similar to the l990s, when the U.S. government debated the pros and cons of the NAFTA, the United States now faces a debate over passage and implementation of the FTAA...

  14. Sweden's Cooperation with Eastern Europe in Radiation Safety 2010

    International Nuclear Information System (INIS)

    Van Dassen, Lars; Andersson, Sarmite; Bejarano, Gabriela

    2011-09-01

    The Swedish Radiation Safety Authority implemented in 2010 cooperation projects in Russia, Ukraine, Georgia, Armenia, Lithuania and Moldova based on instructions from the Swedish Government and agreements with the European Union and the Swedish International Development Cooperation Agency, SIDA. The projects aim at achieving a net contribution to radiation safety (including nuclear safety, nuclear security and non-proliferation as well as radiation protection and emergency preparedness) for the benefit of the host country as well as Sweden. This report gives an overview of all the projects implemented in 2010

  15. European integration and cooperation, basic vectors of European space of freedom, security and justice

    Directory of Open Access Journals (Sweden)

    Ion Balaceanu

    2013-03-01

    Full Text Available European integration and cooperation, basic vectors of European space of freedom, security and justiceAbstract: The European countries joining to the Schengen area had the effect elimination of internal border controls between Schengen member countries, that use permenent provisions of the Schengen acquis, being a single external border where operational checks are carried out according to a set of clear rules on immigration, visas, the asylum, as well as some decisions concerning police cooperation, judicial or customs. This means that the border crossing can be made at any time through many places, and citizens of member countries who are traveling in the Schengen area must present a valid ID. Overcoming internal border can be equated with a journey through the country.

  16. European Security through EU-Russian Relations: Towards a New Multilateral Order?

    Directory of Open Access Journals (Sweden)

    Sandra Fernandes

    2011-05-01

    Full Text Available Since the end of the Cold War, the EU and Russia have managed to create an original framework for institutionalised cooperation despite asymmetric characteristics. Yet, the way these two main security actors interact has an impact on the (non-resolution of security issues in Europe, ranging from ‘‘frozen conflicts’’ to the discussion of the security architecture. Since the second mandate of President Putin, the relation has been characterised by two paradoxical features. On the one hand, the methodology and the domains of cooperation have reached a high degree of achievement. On the other hand, the political quality of the relationship has deteriorated and it is not able to achieve the desired ‘‘strategic partnership’’ that should be based on a common set of values and principles. This article aims to define multilateralism as a paradigm applicable to EU-Russian relations. It examines their relationship in the security and defence realm and the Union’s reactions to a new security approach by Russia since the 2008 Medvedev proposal. The article questions how the EU-Russian political dialogue impacts on multilateralism in the security field. The conclusion considers EU-Russian relations as a peculiar multilateral playground addressing common security challenges, which still needs to be developed further in order to be instrumental in the search for collective and legitimate solutions.

  17. Theater Security Cooperation Planning with Article 98: How the 2002 Servicemembers' Protection Act Fosters China's Quest for Global Influence

    National Research Council Canada - National Science Library

    Hernandez, Jaime A

    2005-01-01

    The Combatant Commander is hindered in constructing Theater Security Cooperation plans due to the restrictions placed upon foreign military aid dispersal as a result of the 2002 American Servicemembers' Protection Act...

  18. The effect of numbered heads together (NHT) cooperative learning model on the cognitive achievement of students with different academic ability

    Science.gov (United States)

    Leasa, Marleny; Duran Corebima, Aloysius

    2017-01-01

    Learning models and academic ability may affect students’ achievement in science. This study, thus aimed to investigate the effect of numbered heads together (NHT) cooperative learning model on elementary students’ cognitive achievement in natural science. This study employed a quasi-experimental design with pretest-posttest non-equivalent control group with 2 x 2 factorial. There were two learning models compared NHT and the conventional, and two academic ability high and low. The results of ana Cova test confirmed the difference in the students’ cognitive achievement based on learning models and general academic ability. However, the interaction between learning models and academic ability did not affect the students’ cognitive achievement. In conclusion, teachers are strongly recommended to be more creative in designing learning using other types of cooperative learning models. Also, schools are required to create a better learning environment which is more cooperative to avoid unfair competition among students in the classroom and as a result improve the students’ academic ability. Further research needs to be conducted to explore the contribution of other aspects in cooperative learning toward cognitive achievement of students with different academic ability.

  19. The Impact of Cooperative Learning on Developing the Sixth Grade Students Decision-Making Skill and Academic Achievement

    Science.gov (United States)

    Asha, Intisar K.; Al Hawi, Asma M.

    2016-01-01

    This study aimed at investigating the effect of cooperative learning on developing the sixth graders' decision making skill and their academic achievement. The study sample, which was selected randomly, consisted of (46) students and divided into two groups: the experimental group that taught using the cooperative learning strategy and the control…

  20. The effect of cooperative learning on students’ achievement and views on the science and technology course

    Directory of Open Access Journals (Sweden)

    Sertel Altun

    2015-06-01

    Full Text Available The purpose of this study is to investigate the efficiency of learning plan implementation prepared with the cooperative learning method. In particular, the study addresses the effect of cooperative learning on students’ achievement and their views regarding the ‘Systems in Our Body’ unit of the 6th grade Science and Technology lesson. For this purpose, mixed method was used. The study is conducted in the second term of the 2013-2014 academic year, on a study group consisted of 7 girls and 13 boys, a total of 20 students of a private middle school in Istanbul. An achievement scale was utilized for the quantitative data and focus group interviews were hold for the qualitative data. While t-test was used for the quantitative findings, content analysis technique was used for the qualitative data. The result of the study indicated that CL method had a favorable effect on learning. The cooperation based learning-teaching environment provided cooperation, supported permanent learning, provided opportunities to be successful, contributed to the development of social and personal skills, but also caused worry as it requires students to be successful at all stages.

  1. The Effect of Cooperative Learning on Students’ Achievement and Views on the Science and Technology Course

    Directory of Open Access Journals (Sweden)

    Sertel ALTUN

    2015-06-01

    Full Text Available The purpose of this study is to investigate the efficiency of learning plan implementation prepared with the cooperative learning method. In particular, the study addresses the effect of cooperative learning on students’ achievement and their views regarding the ‘Systems in Our Body’ unit of the 6th grade Science and Technology lesson. For this purpose, mixed method was used. The study is conducted in the second term of the 2013-2014 academic year, on a study group consisted of 7 girls and 13 boys, a total of 20 students of a private middle school in Istanbul. An achievement scale was utilized for the quantitative data and focus group interviews were hold for the qualitative data. While t-test was used for the quantitative findings, content analysis technique was used for the qualitative data. The result of the study indicated that CL method had a favorable effect on learning. The cooperation based learning-teaching environment provided cooperation, supported permanent learning, provided opportunities to be successful, contributed to the development of social and personal skills, but also caused worry as it requires students to be successful at all stages.

  2. Science Self-Beliefs and Science Achievement of Adolescents in Gulf Cooperation Council Countries

    Science.gov (United States)

    Areepattamannil, Shaljan

    2012-01-01

    This study explored the predictive effects of science self-beliefs on science achievement for 24,680 13-year-old students from Gulf Cooperation Council member countries--Bahrain, Kuwait, Oman, Qatar, Saudi Arabia and the United Arab Emirates--who participated in the Trends in International Mathematics and Science Study (TIMSS) 2007. The…

  3. Energy strategies for the world. A case for international cooperation

    International Nuclear Information System (INIS)

    Brundtland, G.H.

    1994-01-01

    The conference paper deals with policy aspects on environmental protection. The conclusion of the paper goes on the cooperation between the Government and industry to lay the foundation for a common, cooperative energy future. To achieve security of energy supplies and environmental protection, there is a need of developing stable market and framework conditions. According to the author, a good example is development of gas where long term commercial relations are needed to develop production and markets. This should also be acknowledged by governments in their policy making

  4. An evaluation of China's new rural cooperative medical system: achievements and inadequacies from policy goals.

    Science.gov (United States)

    Li, Chengyue; Hou, Yilin; Sun, Mei; Lu, Jun; Wang, Ying; Li, Xiaohong; Chang, Fengshui; Hao, Mo

    2015-10-23

    Although much public scrutiny and academic attention has focused on the evaluations of system implementation since the beginning of New Rural Cooperative Medical System (NRCMS) in China, few studies have systematically evaluated the achievements of the stated policy goals. The purpose of this study is to examine to what extent the policy goals of NRCMS have been achieved. Using multistage sampling processes, two rounds of cross-sectional household surveys including 9787 and 7921 rural households were conducted in Eastern China in year 2000 and year 2008, respectively. A pre- and post-implementation comparison was used to evaluate the achievement of policy goals in three measures: impoverishment from major health hazards, household financial risk from medical expenses, and rural income inequity. Intention surveys were also applied to find out potential obstacles in the implementation of NRCMS. The rate of re-impoverishment from health hazard was reduced from 2.69 % ex ante to 2.12 % ex post, a decrease of 21.13 %. The severity of impoverishment fell from a previous 4.66 % to 3.02 %, a decline of 35.18 %. Economic risk of medical treatment population relative to the whole population fell from 2.62 ex ante to 2.03 ex post, a 22.52 % reduction. As indication of effect on improving income equity, the Gini coefficient fell from 0.4629 to 0.4541. The effects of NRCMS were significantly better than those of RCMS. Despite the preliminary achievements, our intention survey of key respondents identified that technical difficulties in actuarial funding and more sustainable reimbursement schedules has become the most challenging barriers in achieving the goals of NRCMS, while raising the insurance premium on NRCMS was no longer as big a barrier. With NRCMS, China has established a medical security system to reduce the financial burden of healthcare on rural residents. NRCMS has achieved some positive though limited effects; but technical difficulties in the implementation of

  5. Low ranks make the difference : How achievement goals and ranking information affect cooperation intentions

    NARCIS (Netherlands)

    Poortvliet, P. Marijn; Janssen, Onne; Van Yperen, N.W.; Van de Vliert, E.

    This investigation tested the joint effect of achievement goals and ranking information on information exchange intentions with a commensurate exchange partner. Results showed that individuals with performance goals were less inclined to cooperate with an exchange partner when they had low or high

  6. Strengthening the safety and security of radioactive sources worldwide: a perspective on Philippine contributions

    International Nuclear Information System (INIS)

    Murray, Allan

    2009-01-01

    Radioactive sources have been used for many decades in a wide variety of applications in all countries. The safety of radioactive sources and the associated radiation protection have been implemented by national and international programs during this time with cooperation through the IAEA intended to achieve application of minimum standards and harmonization of approach. The security of radioactive sources is however relatively new consideration. A perspective on the Philippine contributions to the safety and security of radioactive sources will be provided with reference to the following: What is radioactive source security and why it is important?; International cooperation, including the IAEA Code of Conduct; Regulation for radioactive source security; Implementation of radioactive source security measures for licenses, operators and others; Impact of regulatory and operational matters such as professional development and training, emergency preparedness and response, and radiation protection. (author)

  7. IAEA Nuclear Security - Achievements 2002-2011

    International Nuclear Information System (INIS)

    2012-03-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes is real. This calls for a collective commitment to the control of, and accountancy for, material, as well as to adequate levels of protection in order to prevent criminal or unauthorized access to the material or associated facilities. Sharing of knowledge and experience, coordination among States and collaboration with other international organizations, initiatives and industries supports an effective international nuclear security framework. In 2001, the Board of Governors tasked the IAEA with improving nuclear security worldwide. The report that follows provides an overview of accomplishments over the last decade and reflects the importance that States assign to keeping material in the right hands. The IAEA has established a comprehensive nuclear security programme, described first in the Nuclear Security Plan of 2002-2005 and subsequently in the second plan of 2006- 2009. Activities included developing internationally accepted nuclear security guidance, supporting international legal instruments, protecting material and facilities, securing transport and borders, detecting and interdicting illicit nuclear trafficking, strengthening human resource capacity and preparing response plans should a nuclear security event occur. The IAEA has begun the implementation of its third Nuclear Security Plan, to be completed at the end of 2013. This approach to nuclear security recognizes that an effective national nuclear security regime builds on a number of factors: the implementation of relevant international legal instruments; IAEA guidance and standards; information protection; physical protection; material accounting and control; detection of, and response to, trafficking in such material; national response plans and contingency measures. Implemented in a systematic manner, these building blocks make up a sustainable national nuclear security regime and contribute to global

  8. The Effect of Using Cooperative Learning Method on Tenth Grade Students' Learning Achievement and Attitude towards Biology

    Science.gov (United States)

    Rabgay, Tshewang

    2018-01-01

    The study investigated the effect of using cooperative learning method on tenth grade students' learning achievement in biology and their attitude towards the subject in a Higher Secondary School in Bhutan. The study used a mixed method approach. The quantitative component included an experimental design where cooperative learning was the…

  9. Environmental security benefits arising from Russian/Norwegian/US cooperation in the high Arctic

    International Nuclear Information System (INIS)

    Dyer, R.S.

    1997-01-01

    Past practices associated with the civilian and military use of nuclear power in NW Russia present large environmental security risks of international concern. These risks arise from a variety of practices associated with weapons production, testing, power production and waste management. The threats presented by these activities are multimedia in nature, span political boundaries and cannot be simply or inexpensively remediated. Today, cooperative efforts are being undertaken to improve environmental security by remediating existing and potential emission sources. Initial efforts focused on the upgrade and expansion of the Murmansk Low-level Liquid Waste Treatment Facility, Murmansk, Russia. This facility handles wastes generated during the decommissioning of Russian Nuclear Navy submarines and from the operation of the Russian commercial nuclear-powered icebreaker fleet. This upgraded facility is now being constructed and is expected to be completed by March 1998. Completion of this facility will result in the cessation of any future dumping of liquid radioactive wastes into the Barents and Kara Seas. Another large environmental security risk is the LEPSE. The LEPSE is a ship docked in Murmansk, Russia, that contains ∼650 spent fuel elements as well as other solid and liquid wastes from Russian nuclear vessels. International efforts are now being mounted to remove the spent and damaged fuel from this ship, including the safe removal and storage/disposal of the fuel elements. This paper will summarize the environmental security problems presented by these different sources and the likely environmental security benefits associated with their remediation. 5 refs., 1 fig., 1 tab

  10. Cooperative Communications for Wireless Information Assurance: Secure Cooperative Communications and Testbed Development

    National Research Council Canada - National Science Library

    Li, Xiaohua

    2007-01-01

    ..., and have invented a new cooperative OFDM transmission scheme to combat transmission asynchronism. They are helpful to the development of future physical-layer wireless information assurance techniques as well as the cooperative communication techniques...

  11. Socially cooperative choices: An approach to achieving resource sustainability in the coastal zone

    Science.gov (United States)

    Crance, Colin; Draper, Dianne

    1996-03-01

    Achieving resource sustainability, particularly in the coastal zone, is complicated by a variety of interdependencies and trade-offs between economic, social, and ecological variables. Although trade-offs between each of these variables are important, this paper emphasizes the social components of resource management. In this regard a distinction is made between individual and cooperative choices. Individual choices frequently are made from a shortterm, self-interested perspective, whereas cooperative choices are made from a long-term, community and resource-sustainability perspective. Typically, when presented with a spectrum of resource management decisions, individuals have a tendency to act in a self-interested manner. Thus, cooperative benefits, such as reduced conflict and improved resource certainty, are not realized. An overview of selected aspects of social dilemma theory suggests that socially cooperative choice outcomes are attainable in coastal zone management by integrating structural and behavioral solutions in resource use decision making. Three barriers to successful integration of structural and behavioral solutions are identified as self-interest, mistrust, and variable perceptions of resource amenities. Examples from coastal zone management indicate that these barriers may be overcome using approaches such as scopereduction, co-management, community education, and local participation. The paper also provides comment on the potential benefits of integrating structural and behavioral solutions in international coastal zone management efforts.

  12. A Secure Base from which to Cooperate: Security, Child and Parent Willing Stance, and Adaptive and Maladaptive Outcomes in two Longitudinal Studies.

    Science.gov (United States)

    Goffin, Kathryn C; Boldt, Lea J; Kochanska, Grazyna

    2017-10-17

    Early secure attachment plays a key role in socialization by inaugurating a long-term mutual positive, collaborative interpersonal orientation within the parent-child dyad. We report findings from Family Study (community mothers, fathers, and children, from age 2 to 12, N = 102, 51 girls) and Play Study (exclusively low-income mothers and children, from age 3.5 to 7, N = 186, 90 girls). We examined links among observed secure attachment at toddler age, child and parent receptive, willing stance to each other, observed in parent-child contexts at early school age, and developmental outcomes. The developmental outcomes included parent-rated child antisocial behavior problems and observed positive mutuality with regard to conflict issues at age 12 in Family Study, and mother-rated child antisocial behavior problems and observed child regard for rules and moral self at age 7 in Play Study. In mother-child relationships, the child's willing stance mediated indirect effects of child security on positive mutuality in Family Study and on all outcomes in Play Study. In father-child relationships, both the child's and the parent's willing stance mediated indirect effects of child security on both outcomes. Early security initiates an adaptive developmental cascade by enlisting the child and the parent as active, willingly receptive and cooperative agents in the socialization process. Implications for children's parenting interventions are noted.

  13. Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures

    Directory of Open Access Journals (Sweden)

    Elyes Ben Hamida

    2015-07-01

    Full Text Available Due to the growing number of vehicles on the roads worldwide, road traffic accidents are currently recognized as a major public safety problem. In this context, connected vehicles are considered as the key enabling technology to improve road safety and to foster the emergence of next generation cooperative intelligent transport systems (ITS. Through the use of wireless communication technologies, the deployment of ITS will enable vehicles to autonomously communicate with other nearby vehicles and roadside infrastructures and will open the door for a wide range of novel road safety and driver assistive applications. However, connecting wireless-enabled vehicles to external entities can make ITS applications vulnerable to various security threats, thus impacting the safety of drivers. This article reviews the current research challenges and opportunities related to the development of secure and safe ITS applications. It first explores the architecture and main characteristics of ITS systems and surveys the key enabling standards and projects. Then, various ITS security threats are analyzed and classified, along with their corresponding cryptographic countermeasures. Finally, a detailed ITS safety application case study is analyzed and evaluated in light of the European ETSI TC ITS standard. An experimental test-bed is presented, and several elliptic curve digital signature algorithms (ECDSA are benchmarked for signing and verifying ITS safety messages. To conclude, lessons learned, open research challenges and opportunities are discussed.

  14. Effects of the family-school cooperation on student social behavior and academic achievement

    Directory of Open Access Journals (Sweden)

    Milošević Nikoleta M.

    2002-01-01

    Full Text Available Cooperation between a family and school makes provisions for solving problems students face in their interpersonal relations and academic achievement. We are singling out a view of the effects of a micro-system on child's development, which states that immediate interrelations in a micro-system - a family - can effect interrelations in another micro-system -peer groups - or can effect academic achievement. The majority of authors agree that modes and spheres of influences that family exerts are numerous and diverse and that they depend on characteristics of a broader social and cultural community where a child is growing up as well as on parents' abilities and preparations. How successful the family-school cooperation will be is largely determined by teacher's personality and the way he/she is communicating with parents. A joint planning and implementation of decisions reached, identical norms of behavior, commonly adopted goals are a prerequisite for a child's normal development. It is pointed out that school should plan and organize its activities (courses, seminars, forums lectures, discussions, so as to popularize knowledge of pedagogy and psychology among parents as well as teacher training in communication competence.

  15. Assessing the Effect of Cooperative Learning on Financial Accounting Achievement among Secondary School Students

    Science.gov (United States)

    Inuwa, Umar; Abdullah, Zarifah; Hassan, Haslinda

    2017-01-01

    This study examined the effect of cooperative learning approach on financial accounting achievement among secondary school students in Gombe state, Nigeria. A pre-test-post-test-control group design was adopted. 120 students participated in the study were selected randomly from six schools. The students were divided into two equal groups, namely:…

  16. Cooperative learning using simulation to achieve mastery of nasogastric tube insertion.

    Science.gov (United States)

    Cason, Melanie Leigh; Gilbert, Gregory E; Schmoll, Heidi H; Dolinar, Susan M; Anderson, Jane; Nickles, Barbara Marshburn; Pufpaff, Laurie A; Henderson, Ruth; Lee, Frances Wickham; Schaefer, John J

    2015-03-01

    Traditionally, psychomotor skills training for nursing students involves didactic instruction followed by procedural review and practice with a task trainer, manikin, or classmates. This article describes a novel method of teaching psychomotor skills to associate degree and baccalaureate nursing students, Cooperative Learning Simulation Skills Training (CLSST), in the context of nasogastric tube insertion using a deliberate practice-to-mastery learning model. Student dyads served as operator and student learner. Automatic scoring was recorded in the debriefing log. Student pairs alternated roles until they achieved mastery, after which they were assessed individually. Median checklist scores of 100% were achieved by students in both programs after one practice session and through evaluation. Students and faculty provided positive feedback regarding this educational innovation. CLSST in a deliberate practice-to-mastery learning paradigm offers a novel way to teach psychomotor skills in nursing curricula and decreases the instructor-to-student ratio. Copyright 2015, SLACK Incorporated.

  17. Lessons from collaborative governance and sociobiology theories for reinforcing sustained cooperation: a government food security case study.

    Science.gov (United States)

    Montoya, L A; Montoya, I; Sánchez González, O D

    2015-07-01

    This research aimed to understand how cooperation and collaboration work in interagency arrangements using a case study of the public management of food security and nutrition in Bogotá, Colombia. This study explored the available scientific literature on Collaborative Governance within the Public Management body of knowledge and the literature on Cooperation from the Sociobiology field. Then, proposals were developed for testing on the ground through an action-research effort that was documented as a case study. Finally, observations were used to test the proposals and some analytical generalizations were developed. To document the case study, several personal interviews, file reviews and normative reviews were conducted to generate a case study database. Collaboration and cooperation concepts within the framework of interagency public management can be understood as a shared desirable outcome that unites different agencies in committing efforts and resources to the accomplishment of a common goal for society, as seen in obtaining food and nutrition security for a specific territory. Collaboration emerges when the following conditions exist and decreases when they are absent: (1) a strong sponsorship that may come from a central government policy or from a distributed interagency consensus; (2) a clear definition of the participating agencies; (3) stability of the staff assigned to the coordination system; and (4) a fitness function for the staff, some mechanism to reward or punish the collaboration level of each individual in the interagency effort. As this research investigated only one case study, the findings must be taken with care and any generalization made from this study needs to be analytical in nature. Additionally, research must be done to accept these results universally. Food security and nutrition efforts are interagency in nature. For collaboration between agencies to emerge, a minimum set of characteristics that were established during the

  18. East Africa’s Fragmented Security Cooperation

    DEFF Research Database (Denmark)

    Nordby, Johannes Riber; Jacobsen, Katja

    2013-01-01

    Since the 1990s, East Africa has developed what appears to be an impressive security architecture. Katja Lindskov Jacobsen and Johannes Riber Nordby warn, however, that appearances can be deceptive. The region’s security institutions remain too nationalistic and self-interested for their own good....

  19. Assessing Security Cooperation as a Preventive Tool

    Science.gov (United States)

    2014-01-01

    Reports & Bookstore Make a charitable contribution Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by...deductible charitable contribution at www.rand.org/giving/contribute.html R® is a registered trademark © Copyright 2014 RAND Corporation This document...OECD—See Organisation for Economic Co-Operation and Development. Organisation for Economic Co-Operation and Development, Development Assistance

  20. Efficacy of the Cooperative Learning Method on Mathematics Achievement and Attitude: A Meta-Analysis Research

    Science.gov (United States)

    Capar, Gulfer; Tarim, Kamuran

    2015-01-01

    This research compiles experimental studies from 1988 to 2010 that examined the influence of the cooperative learning method, as compared with that of traditional methods, on mathematics achievement and on attitudes towards mathematics. The related field was searched using the following key words in Turkish "matematik ve isbirlikli ögrenme,…

  1. Development of human resource capacity building assistance for nuclear security

    International Nuclear Information System (INIS)

    Nakamura, Yo; Noro, Naoko

    2014-01-01

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency (JAEA) has been providing nuclear security human resource development projects targeting at nuclear emerging countries in Asia in cooperation with the authorities concerned including the Sandia National Laboratory (SNL) and the International Atomic Energy Agency (IAEA). In the aftermath of the attacks of Sept. 11, the threat of terrorism was internationally recognized and thus the human resource capacity building is underway as an urgent task. In order to responding to emerging threats, the human resource capacity building that ISCN has implemented thus far needs to be multilaterally analyzed in order to develop more effective training programs. This paper studies ISCN's future direction by analyzing its achievements, as well as introduces the collaborative relationships with SNL that contributes to the reflection and maintenance of international trends for the contents of nuclear security training, the nuclear security enhancement support with which Japan is to provide nuclear emerging countries in Asia, and the achievements of the nuclear security training program that ISCN implemented. (author)

  2. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Paramasivan

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  3. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    Science.gov (United States)

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  4. Sustainable intensification in agriculture as a factor of achieving food security

    Directory of Open Access Journals (Sweden)

    Đurić Katarina

    2016-01-01

    Full Text Available Ending hunger, achieving food security and promoting sustainable development are at the top of the list of United Nations sustainable global development priorities after 2015. In addition to many positive effects, efforts of mankind regarding the reduction of rural poverty realized through the Green Revolution have had many negative effects, primarily related to natural resources. Irreversible devastation of land, air and water quality deterioration and jeopardizing biodiversity have been recognized as key elements of unsustainability of existing agricultural development concept. Consequently, there is a need for the adoption of a new concept of agricultural development, which will lie between intensive conventional and organic farming. The concept which has already been applied in some regions of the world and whose basic goal is to find a way to increase production with a negligible negative impact on the environment is sustainable agricultural intensification. The aim of this paper is to look at both positive and negative aspects of biotechnology development so far and point out the place and role the sustainable intensification concept should have in relation to conservation of natural resources and achievement of food security.

  5. The Gulf Security Dialogue and Related Arms Sale Proposals

    National Research Council Canada - National Science Library

    Blanchard, Christopher M; Grimmett, Richard F

    2008-01-01

    ...) security cooperation under the auspices of a new Gulf Security Dialogue (GSD). The Dialogue now serves as the principal security coordination mechanism between the United States and the six countries of the Gulf Cooperation Council (GCC...

  6. Achievable Rates of UAV-Relayed Cooperative Cognitive Radio MIMO Systems

    KAUST Repository

    Sboui, Lokman; Ghazzai, Hakim; Rezki, Zouheir; Alouini, Mohamed-Slim

    2017-01-01

    We study the achievable rate of an uplink MIMO cognitive radio system where the primary user (PU) and the secondary user (SU) aim to communicate to the closest primary base station (BS) via a multi-access channel through the same unmanned aerial vehicle (UAV) relay. The SU message is then forwarded from the primary BS to the secondary network with a certain incentive reward as a part of the cooperation protocol between both networks. A special linear precoding scheme is proposed to enable the SU to exploit the PU free eigenmodes. We analyze two scenarios in which the UAV relay gain matrix is either fixed or optimized. We derive the optimal power allocation that maximizes the achievable rate of the SU respecting power budget, interference, and relay power constraints. Numerical results highlight the cognitive rate gain of our proposed scheme with respect to various problem parameters. We also highlight the effect of UAV altitude on the SU and PU rates. Finally, when the relay matrix is optimized, we show that the PU rate is remarkably enhanced and that the SU rate is only improved at high power regime.

  7. Achievable Rates of UAV-Relayed Cooperative Cognitive Radio MIMO Systems

    KAUST Repository

    Sboui, Lokman

    2017-04-19

    We study the achievable rate of an uplink MIMO cognitive radio system where the primary user (PU) and the secondary user (SU) aim to communicate to the closest primary base station (BS) via a multi-access channel through the same unmanned aerial vehicle (UAV) relay. The SU message is then forwarded from the primary BS to the secondary network with a certain incentive reward as a part of the cooperation protocol between both networks. A special linear precoding scheme is proposed to enable the SU to exploit the PU free eigenmodes. We analyze two scenarios in which the UAV relay gain matrix is either fixed or optimized. We derive the optimal power allocation that maximizes the achievable rate of the SU respecting power budget, interference, and relay power constraints. Numerical results highlight the cognitive rate gain of our proposed scheme with respect to various problem parameters. We also highlight the effect of UAV altitude on the SU and PU rates. Finally, when the relay matrix is optimized, we show that the PU rate is remarkably enhanced and that the SU rate is only improved at high power regime.

  8. Measuring energy security. Can the United States achieve oil independence?

    International Nuclear Information System (INIS)

    Greene, David L.

    2010-01-01

    Stochastic simulation of the direct economic costs of oil dependence in an uncertain future is proposed as a useful metric of oil dependence. The market failure from which these costs arise is imperfect competition in the world oil market, chiefly as a consequence of the use of market power by the Organization of the Petroleum Exporting Countries (OPEC) cartel. Oil dependence costs can be substantial. It is estimated that oil dependence costs to the US economy in 2008 will exceed $500 billion. Other costs, such as military expenditures or foreign policy constraints are deemed to be largely derivative of the actual or potential economic costs of oil dependence. The use of quantifiable economic costs as a security metric leads to a measurable definition of oil independence, or oil security, which can be used to test the ability of specific policies to achieve oil independence in an uncertain future. (author)

  9. Scandinavian Cooperative Advantage

    DEFF Research Database (Denmark)

    Strand, Robert; Freeman, R. Edward

    2015-01-01

    . We conclude by endorsing the expression “Scandinavian cooperative advantage” in an effort to draw attention to the Scandinavian context and encourage the field of strategic management to shift its focus from achieving a competitive advantage toward achieving a cooperative advantage....

  10. Effects of Cooperative Learning Method Type Stad, Language Aptitude, and Intelligence on the Achievement English Hotel at Medan Tourism Academy

    Directory of Open Access Journals (Sweden)

    Abdul Kadir Ritonga

    2017-01-01

    Full Text Available STAD cooperative learning method which is considered effective in achieving the goal of learning the English language, especially for students majoring in Tourism Academy who are required to master English for Specific Purposes (ESP in accordance with their needs. This study uses factorial design 2x3x3 version of the non-equivalent control group design with ANOVA 3 Ways. The subjects were students MDK III / 5 A and B courses MDK III.5 Rooms Division department Hospitality Academy Year 2015/2016. The samples are saturated samples. Data were collected through a pretest, posttest, and instrument of Language Aptitude and Intelligence parametric statistics analyzed by parametric statistics with significance level of 0.05%. The results showed that: (1 there are differences between method STAD cooperative learning and expository on Hospitality English achievement, (2 there are differences between the students who have high language aptitude and low language aptitude on English achievement, (3 there are differences between students who have high language aptitude and medium on Hospitality English achievement, (4 there are differences between students who have the medium language aptitude and low language aptitude on Hospitality English achievement, (5 there are differences between students who have high intelligence and low intelligence\\ on Hospitality English achievement, (6 there are no differences between who have high intelligence and medium intelligence on Hospitality English achievement, (7 there are differences between students who have the medium intelligence and low intelligence on Hospitality English achievement, (8 there is no interaction between the learning method and language aptitude on Hospitality English achievement, (9 there is an interaction between the learning method and the intelligence on Hospitality English achievement, (10 there is no interaction between intelligence and language aptitude on Hospitality English achievement. (11

  11. The Korean Peninsula Energy Development Organization : implications for Northeast Asian regional security co-operation?

    International Nuclear Information System (INIS)

    Snyder, S.

    2000-01-01

    This paper identifies opportunities for co-operation on regional development and security in the North Pacific region. The Korean Peninsula Energy Development Organization (KEDO) was created in 1993 during bilateral negotiations between the United States and the Democratic People's Republic of Korea (US-DPRK) over North Korea's alleged nuclear weapons program. The negotiations resulted in an agreement to freeze North Korea's known nuclear weapons program in return for the construction of two proliferation-resistant 100 MWe light water reactors (LWR) in North Korea, and the provision of 500,000 tons of heavy fuel oil per year until the completion of the LWR construction as compensation for lost energy production capacity resulting from the shutting down of North Korea's nuclear reactors. The author described the activities of KEDO and examined its internal dynamics. The unique circumstances that produced the Agreed Framework and KEDO in response to a major international crisis of the nuclear program in the DPRK were also highlighted along with the US-DPRK bilateral agreement and the multilateral institution involving the United States, South Korea, Japan and the European Union. Financial support from Australia and Canada was discussed along with the mechanism for engaging North Korea in regularized interaction and technical cooperation. It was concluded that KEDO's record of successes and failures is mixed. The energy security issue has been identified as an area that could result in conflict among Northeast Asian countries which are increasingly dependent on oil supplies from the Middle East. In response, numerous multilateral financing mechanisms have been developed to promote joint business opportunities that exploit natural gas resources in the Russian Far East to address Japanese, Korean and Chinese energy needs. 35 refs

  12. On the jamming power allocation for secure amplify-and-forward relaying via cooperative jamming

    KAUST Repository

    Park, Kihong

    2013-09-01

    In this paper, we investigate secure communications in two-hop wireless relaying networks with one eavesdropper. To prevent the eavesdropper from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as cooperative jamming. This jamming noise helps protecting the source message from being captured reliably at the eavesdropper, while the destination cancels its self-intended noise. According to the channel information available at the destination, we derive three jamming power allocation strategies to minimize the outage probability of the secrecy rate. In addition, we derive analytic results quantifying the jamming power consumption of the proposed allocation methods. © 1983-2012 IEEE.

  13. Transregional Threats and Maritime Security Cooperation

    Science.gov (United States)

    2017-08-01

    continue to grow. As of 2015, China’s coast guard had 205 ships, more than the combined coast guards of Japan, Vietnam, Indonesia, Malaysia , and the...raised the possibility of China assisting the Philippines in maritime security. • China has maritime security initiatives with Malaysia and...Pakistan. They have also conducted maritime safety drills with their Omani counterparts. In recent years, the IRIN has made efforts to operate well

  14. Report of the international forum on nuclear energy, nuclear non-proliferation and nuclear security. Measures to ensure nuclear non-proliferation and nuclear security for the back end of nuclear fuel cycle and regional cooperation in Asia

    International Nuclear Information System (INIS)

    Tazaki, Makiko; Yamamura, Tsukasa; Suzuki, Mitsutoshi; Kuno, Yusuke; Mochiji, Toshiro

    2013-03-01

    The Japan Atomic Energy Agency (JAEA) held 'International Forum on Nuclear Energy, Nuclear Non-proliferation and Nuclear Security - Measures to ensure nuclear non-proliferation and nuclear security for the back end of nuclear fuel cycle and regional cooperation in Asia-' on 12 and 13 December 2012, co-hosted by the Japan Institute of International Affairs (JIIA) and School of Engineering, The University of Tokyo. In the forum, keynote speakers from Japan, International Atomic Energy Agency (IAEA), the U.S., France and Republic of Korea (ROK), respectively explained their efforts regarding peaceful use of nuclear energy and nuclear non-proliferation. In two panel discussions, entitled 'Measures to ensure nuclear non-proliferation and nuclear security of nuclear fuel cycle back end' and 'Measures to ensure nuclear non-proliferation and nuclear security for nuclear energy use in the Asian region and a multilateral cooperative framework', active discussions were made among panelists from Japan, IAEA, the U.S., France, ROK, Russia and Kazakhstan. This report includes abstracts of keynote speeches, summaries of two panel discussions and materials of the presentations in the forum. The editors take full responsibility for the wording and content of this report except presentation materials. (author)

  15. Report on Symposium on Pacific Energy Cooperation 2001. Energy Security in Asian Region; Taiheiyo energy kyoryoku kaigi 2001 hokokusho. Asia chiiki no energy anzen hosho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-02-20

    The Symposium on Pacific Energy Cooperation (SPEC), which started in 1986 to discuss energy problems and international cooperation on energy in the Pacific region, met for 2001 in Tokyo on February 20 and 21, 2001, to discuss Energy Security in Asian Region. The conference comprised two keynote addresses, four sessions, and a panel discussion. Twenty-four countries and an international organization were represented by a total of 785 participants who actively exchanged views and opinions. With Director Tsutomu Toichi, The Institute of Energy Economics, Japan, acting as chairman, two keynote addresses were delivered. Minister of Oil Bijan Namdar Zanganeh of Iran reported on The Role of I. R. Iran in Meeting the Growing Oil and Gas Demand in the Asia-Pacific Region and Potential Cooperation with the Region's Consumers. Managing Director Phil Watts of the Royal Dutch/Shell Group reported on Security in Trust - Meeting Asian Energy Needs in the 21st Century. (NEDO)

  16. ITDB Cooperation With International Organizations

    International Nuclear Information System (INIS)

    2010-01-01

    IAEA illicit trafficking database cooperates with many international organizations. Among these organizations are Interpol, Universal Postal Union,and World Customs Organization. Other organizations are Organization for Security and Cooperation in Europe, UN Economic Commission for Europe, UN-Department of Disarmament Affairs and UN office for Drug and Crime. The cooperation with Interpol involves consultations on issues of training and technical assistance and other matters of common interest.

  17. Secure amplify-and-forward untrusted relaying networks using cooperative jamming and zero-forcing cancelation

    KAUST Repository

    Park, Kihong

    2015-12-03

    In this paper, we investigate secure transmission in untrusted amplify-and-forward half-duplex relaying networks with the help of cooperative jamming at the destination (CJD). Under the assumption of full channel state information (CSI), conventional CJD using self-interference cancelation at the destination is efficient when the untrusted relay has no capability to suppress the jamming signal. However, if the source and destination are equipped with a single antenna and the only untrusted relay is equipped with N multiple antennas, it can remove the jamming signal from the received signal by linear filters and the full multiplexing gain of relaying cannot be achievable with the conventional CJD due to the saturation of the secrecy rate at the high transmit power regime. We propose in this paper new CJD scheme where neither destination nor relay can acquire CSI of relay-destination link. Our proposed scheme utilizes zero-forcing cancelation based on known jamming signals instead of self-interference subtraction, while the untrusted relay cannot suppress the jamming signals due to the lack of CSI. We show that the secrecy rate of the proposed scheme can enjoy a half of multiplexing gain in half-duplex relaying while that of conventional CJD is saturated at high transmit power for N ???2. The impact of channel estimation error at the destination is also investigated to show the robustness of the proposed scheme against strong estimation errors.

  18. Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks.

    Science.gov (United States)

    Tang, Xuanxuan; Cai, Yueming; Yang, Wendong; Yang, Weiwei; Chen, Dechuan; Hu, Junquan

    2018-01-24

    In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed. The two sensors opportunistically conduct the SWIPT and cooperative ZF jamming, respectively, where the energy required for jamming the eavesdropper is provided by the SWIPT operation so as to keep the energy balance at the sensors in the long run. By deriving the exact closed-form expressions of the secrecy outage probability and the secrecy throughout, we provide an effective approach to precisely assess the impacts of key parameters on the secrecy performance of the system. It has been shown that the secrecy outage probability is a monotonically increasing function of the growth of secrecy rate ( R s ), and a monotonically decreasing function of the increase of the transmit signal-to-noise ratio ( γ S ), and energy conversion efficiency ( η ). Furthermore, the secrecy throughput could be enhanced when η increases, which becomes especially obvious when a large γ S is provided. Moreover, the existence of an optimum R s maximizing the secrecy throughput is depicted, which also grows with the increase of γ S . Simulations are provided for the validation of the analysis.

  19. Modelling of Security Principles Within Car-to-Car Communications in Modern Cooperative Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Jan Durech

    2016-01-01

    Full Text Available Intelligent transportation systems (ITS bring advanced applications that provide innovative services for various transportation modes in the area of traffic control, and enable better awareness for different users. Communication connections between intelligent vehicles with the use of wireless communication standards, so called Vehicular Ad Hoc Networks (VANETs, require ensuring verification of validity of provided services as well as services related to transmission confidentiality and integrity. The goal of this paper is to analyze secure mechanisms utilised in VANET communication within Cooperative Intelligent Transportation Systems (C-ITS with a focus on safety critical applications. The practical part of the contribution is dedicated to modelling of security properties of VANET networks via OPNET Modeler tool extended by the implementation of the OpenSSL library for authentication protocol realisation based on digital signature schemes. The designed models simulate a transmission of authorised alert messages in Car-to-Car communication for several traffic scenarios with recommended Elliptic Curve Integrated Encryption Scheme (ECIES. The obtained results of the throughput and delay in the simulated network are compared for secured and no-secured communications in dependence on the selected digital signature schemes and the number of mobile nodes. The OpenSSL library has also been utilised for the comparison of time demandingness of digital signature schemes based on RSA (Rivest Shamir Adleman, DSA (Digital Signature Algorithm and ECDSA (Elliptic Curve Digital Signature Algorithm for different key-lengths suitable for real time VANET communications for safety-critical applications of C-ITS.

  20. The functional power of the CPLP in the framework ok development cooperation in food security and nutrition (FSN

    Directory of Open Access Journals (Sweden)

    Manuel Lapão

    2016-05-01

    Full Text Available The Community of Portuguese Speaking Countries (CPLP, about to celebrate its twenty year of existence, was born to preserve the language and a common cultural heritage and has been gradually strengthening other policy dimensions which have led to increased visibility. The cooperation in the areas of Health and Food and Nutrition Security (SAN is such an example. In fact, the "Food Security and Nutrition Strategy (ESAN-CPLP", adopted in 2011, is a real and operational tool to improve levels of human development in the member states of the CPLP, and is recognized in international fora as an example of good practice by partners such as the European Union, while also being perfectly aligned with the U.N.'s Goals of Sustainable Development. Despite the unique role of the CPLP and its potential functional power in the framework of international cooperation, some threats have emerged, preventing its further affirmation, namely the assertion of a clear political will by the member states. Despite the gap between the present CPLP and the Agostinho da Silva's dream of creating a true Lusophone community, its contemporary role and potential is quite clear, and outstanding are the efforts to establish in its framework the Human Right to Adequate Food.

  1. Nuclear cooperation: challenges and prospects

    International Nuclear Information System (INIS)

    Ollapally, Deepa; Rajagopal, S.

    1997-01-01

    In this era of globalisation and technology flows, the nuclear field continues to retain strong barriers to international collaboration. From nuclear energy to non-proliferation however, the potential for concerted action exists. The International and Strategic Studies Unit of the National Institute of Advanced Studies (NIAS) held a two day seminar exploring the challenges and prospects for achieving mutual cooperation between states relating to all aspects of nuclear technology. This volume is based on the proceedings of the seminar. The broad themes that the seminar considered included disarmament and the security link; implementation and verification of nonproliferation regimes; transfer of technology and nuclear energy. The seminar culminated with a round table on confidence building

  2. Engineering Principles for Information Technology Security (A Baseline for Achieving Security)

    National Research Council Canada - National Science Library

    Stoneburner, Gary

    2001-01-01

    The purpose of the Engineering Principles for Information Technology (IT) Security (HP-ITS) is to present a list of system-level security principles to he considered in the design, development, and operation of an information system...

  3. Achieving the four dimensions of food security for resettled refugees in Australia: A systematic review.

    Science.gov (United States)

    Lawlis, Tanya; Islam, Wasima; Upton, Penney

    2018-04-01

    Food security is defined by four dimensions: food availability, access, utilisation and stability. Resettled refugees face unique struggles securing these dimensions and, thus, food security when moving to a new country. This systematic review aimed to identify the challenges Australian refugees experience in achieving the four dimensions of food security. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines were followed; the SPIDER tool was used to determine eligibility criteria. Three databases were searched using terms relating to food in/security and refugees from 2000 to 20 May 2017. Seven articles were retained for analysis. Studies were categorised against the four dimensions, with four studies identifying challenges against all dimensions. Challenges contributing to high levels of food insecurity in each dimension included: availability and cost of traditional foods, difficulty in accessing preferred food outlets, limited food knowledge and preparation skills and food stability due to low income and social support. Food insecurity adversely impacts refugee health and integration. Methodical research framed by the four dimensions of food security is imperative to address challenges to securing food security in refugee groups and assisting in the development of sustainable interventions. © 2017 Dietitians Association of Australia.

  4. Reconnection production-consumption: change to achieve food and nutritional security, as well as rural development.

    Directory of Open Access Journals (Sweden)

    Shirley Rodríguez-González

    2015-06-01

    Full Text Available The aim of this study was to analyze the importance of changing the conventional food system to achieve food and nutritional security, as well as rural development. This text was divided into three sections. In the first one, the conventional food system and its consequences were characterized, showing the need for a change that seeks the integration of social, environmental, and health dimensions. The second part addressed the interventions related to the food supply system made by the Government, which are fundamental to achieve food and nutrition security, as well as to promote development processes in rural areas. Finally, the experience of Brazil’s National School Feeding Programme was presented. That program links food produced by small producers with the National School Feeding Program, allowing the reconnection of production and consumers through institutional markets. That link created incentives for food and nutrition security of small farmers and, at the same time, improved the availability of higher- quality food for vulnerable populations and promotedeating patterns that allow the preservation of food culture.

  5. Emerging Trends in Development of International Information Security Regime

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2016-01-01

    Full Text Available The article discusses the key trends shaping the international regime on information security. International cooperation in this area at the global level encounters contradictions of state interest. The main actors of the information security are the United States, Russia, China and the EU countries (Britain, France and Germany. The main contradiction is developing between the US on one side and Russia and China on the other. EU countries occupy the middle position, gravitating to that of US. The article proves that international cooperation on information security will reflect the overall logic of the development of international cooperation, which is characterized by a new model of cooperation, with the participation of state and non-state actors, known as multi-stakeholder partnerships and multi-level cooperation. The logic of the formation of an international regime on information security is closest to the logic of the formation of the international non-proliferation regime. It is in the interest of Russia to support the trend towards regionalization of information security regime. Russia can form a regional information security regime in the former Soviet Union on the basis of the CSTO and SCO and potentially on a wider Eurasian space. Such regional regime would give Russia an opportunity to shape the international regime and closely monitor emerging information security issues in the former Soviet Union, and remove the potential threat of "color revolutions".

  6. PERFORMANCE ANALYSIS OF COOPERATION SCHEMES IN EAVESDROPPER ASSISTED RELAY CHANNEL

    Directory of Open Access Journals (Sweden)

    Vaibhav Kumar Gupta

    2014-06-01

    Full Text Available The prominence of the wireless communication has been urging the monotonically increasing demand of security and privacy. In wireless systems, the notion of perfect secrecy of information with respect to illegitimate nodes can be ensured via physical layer security (PLS techniques. Unfortunately, they can be made less effective if source- eavesdropper wiretap channel is better than the main source-receiver channel. The various node cooperation schemes can be employed to combat this limitation where a relay node assists the communication to improve the performance significantly. In this paper, a four node wireless communication system consisting of a source, a destination, a relay and an eavesdropper as wire-tapper has been considered. The performance of the traditional cooperation schemes in terms of secrecy rate has been investigated with a different scenario where relay node helps the eavesdropper to deteriorate the secrecy rate. In addition, since legitimate receiver can overhear the transmission of relay, it favours the achievable secrecy rate. We formulate an analytical expression of conditional secrecy outage probability for the investigated system. From the obtained simulation results, it has been observed that secrecy rate is monotonically increases with path loss index. Furthermore, the proper selection of the system parameters leads to enhance the secrecy performance of the system even if relay pertains to degrade the performance. Amplify-and-forward, cooperation, decode-and-Forward, secrecy rate, relay.

  7. Economic Evaluation of the Information Security Levels Achieved by Electric Energy Providers in North Arctic Region

    Science.gov (United States)

    Sushko, O. P.; Kaznin, A. A.; Babkin, A. V.; Bogdanov, D. A.

    2017-10-01

    The study we are conducting involves the analysis of information security levels achieved by energy providers operating in the North Arctic Region. We look into whether the energy providers’ current information security levels meet reliability standards and determine what further actions may be needed for upgrading information security in the context of the digital transformation that the world community is undergoing. When developing the information security systems for electric energy providers or selecting the protection means for them, we are governed by the fact that the assets to be protected are process technologies. While information security risk can be assessed using different methods, the evaluation of the economic damage from these risks appears to be a difficult task. The most probable and harmful risks we have identified when evaluating the electric energy providers’ information security will be used by us as variables. To provide the evaluation, it is necessary to calculate the costs relating to elimination of the risks identified. The final stage of the study will involve the development of an operation algorithm for the North Arctic Region’s energy provider’s business information protection security system - a set of information security services, and security software and hardware.

  8. The financing of cooperative businesses

    Directory of Open Access Journals (Sweden)

    Alfredo Ispizua

    2005-12-01

    Full Text Available Concern for adequate funding, both at birth and consolidation of the cooperative enterprise, has been, is and will be a constant concern in the cooperative world. So, have emerged in the legal field, a number of financial instruments of various kinds: as equity securities or special interests that seek to cover traditional financing gaps.

  9. External dimension of Ukraine’s security policy

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2015-07-01

    Full Text Available Investigation of the external dimension of security policy of Ukraine is stipulated for the need to analyse the current state of relations with organizations such as the Organization for Security and Co-operation in Europe and The Collective Security Treaty Organization, and relations within the Common European Security and Defence Policy. Ukraine’s European Integration means inclusion in the global space security with countries that it shares common values and principles. It does not exclude the collaboration with the countries that belong to other systems of collective security in the scope that is appropriate to basic national interests of Ukraine. It is proved that the activities of the OSCE Special Monitoring Mission is an important contribution to the process of peaceful conflict resolution, and helps to develop democratic principles and foundations of foreign policy. It is determined that the further development of the constructive cooperation between the EU advisory mission under CSDP will provide an opportunity to improve and increase the security of national borders from external threats and challenges, and help to accelerate the process of integration into the European security space. The attention is paid to the fact that, taken into consideration the state of relations with Russia, the further cooperation with the Collective Security Treaty Organization (CSTO may adversely affect the overall security situation in Ukraine and lead to further tension with Russia today.

  10. Status of National Nuclear Infrastructure Development (NG-T-3.2). Basis for Evaluation - Legal, safety, security, safeguards issues

    International Nuclear Information System (INIS)

    Yllera, Javier

    2010-01-01

    A framework for achieving high levels of nuclear safety and security worldwide Builds upon: Legal Instruments; Use of IAEA SSs and security guidance; Harmonization of national regulations; Exchange of knowledge, experiences & regulatory practices and Multinational cooperation and safety reviews. The IAEA is the depository of many key international conventions and legal agreements. All countries with operating nuclear power plants are now parties to the Convention. The main objective of Convention on Nuclear Safety is to achieve and maintain a high level of nuclear safety worldwide through the enhancement of national measures and international cooperation including, where appropriate, safety related technical co-operation. All practical efforts must be made to prevent and mitigate nuclear or radiation accidents. The primary means of preventing and mitigating the consequences of accidents is “defence in depth”. Safety assessments are to be carried out and documented by the organization responsible for operating the facility, are to be independently verified and are to be submitted to the regulatory body as part of the licensing or authorization process. Licensing process must be well-defined, clear, transparent and traceable. The public should be given an opportunity to provide their views during certain steps of the licensing process

  11. Securing Chinese nuclear power development: further strengthening nuclear security

    International Nuclear Information System (INIS)

    Zhang Hui

    2014-01-01

    Chinese President Xi Jinping addresses China's new concept of nuclear security with four 'equal emphasis' at the third Nuclear Security Summit, and makes four commitments to strengthen nuclear security in the future. To convert President Xi's political commitments into practical, sustainable reality, China should take further steps to install a complete, reliable, and effective security system to ensure that all its nuclear materials and nuclear facilities are effectively protected against the full spectrum of plausible terrorist and criminal threats. This paper suggests the following measures be taken to improve China's existing nuclear security system, including updating and clarifying the requirements for a national level DBT; updating and enforcing existing regulations; further promoting nuclear security culture; balancing the costs of nuclear security, and further strengthening international cooperation on nuclear security. (author)

  12. Technical Cooperation Report for 2014. Report by the Director General

    International Nuclear Information System (INIS)

    2015-06-01

    enhancements to the Project Progress Assessment Report. Part B of this document presents a summary of financial and non-financial programme delivery indicators. It reviews the resources mobilized for the TC programme through the Technical Cooperation Fund (TCF), and through extrabudgetary and in-kind contributions. Payments to the TCF in 2014 totalled €62.0 million (not including National Participation Costs, assessed programme costs or miscellaneous income), or 89.5% of the TCF target set for the year. New extrabudgetary resources for 2014 came to €18.6 million and in-kind contributions were €0.6 million. Overall, implementation for the TCF reached 78% in 2014. Part C of this document responds to the operative paragraphs of resolution GC(58)/RES/12, and covers assistance to Member States in the peaceful, safe, secure and regulated application of atomic energy and nuclear techniques in specific fields. It highlights regional activities and achievements in technical cooperation in 2014. Globally, health and nutrition accounted for the highest proportion of actuals 1 through the TC programme in 2014, followed by safety and security, and then by food and agriculture. Project examples are presented in Annex 1 according to thematic area, covering health and nutrition, food and agriculture, water and the environment, industrial applications, energy planning and nuclear power, radiation protection, nuclear safety and nuclear security, and nuclear knowledge development and management. The activities of the Programme of Action for Cancer Therapy are covered in Annex 2

  13. 33 CFR 117.925 - Cooper River.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Cooper River. 117.925 Section 117.925 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements South Carolina § 117.925 Cooper River. The draw of the Seaboard...

  14. 33 CFR 117.713 - Cooper River.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Cooper River. 117.713 Section 117.713 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements New Jersey § 117.713 Cooper River. (a) The drawspans for the...

  15. Interdepartmental Cooperation in Defence Issues and Strategic Intelligence

    Directory of Open Access Journals (Sweden)

    Nebojsa Nikolic

    2016-05-01

    Full Text Available The motivation for this paper comes from one successfully conducted empirical research about motivation of potential candidates to serve in the active reserve as a kind of military service which is recently introduced in the Serbian Army. The research team was faced with a set of problems related to the deadlines, resources and mandate issues. A solution was found in agile interdepartmental cooperation. Firstly, we started with identification of missing resources and mandates of our research team. Then, we investigated where we could find the missing issues. After that, we established lines for cooperation with other departments in the MoD. The clarity of interdepartmental communication and concretisation of demands and expectations were crucial for success. In the end we realized the full potential of interdepartmental cooperation and started to think about that phenomenon in the wider context of defence and security issues. We found some other examples of interdepartmental cooperation in earlier efforts of the defence sector reform, as well as some results in other armies. The paper presents strengths and opportunities of interdepartmental cooperation through temporary engaged working groups in the specific defence sector environment, as well as potential obstacles. In a wider aspect, interdepartmental cooperation in defence and security issues becomes more and more important because of new security challenges we are facing today.

  16. Improved achievable secrecy rate of visible light communication with cooperative jamming

    KAUST Repository

    Zaid, Hajar

    2016-02-25

    In this paper we study the problem of securing a visible light communication (VLC) link against passive eavesdropping, with the help of a (friendly) jammer. Differently from radio frequency (RF) communications, VLC imposes a peak amplitude constraint on the input distribution which renders Gaussian inputs not admissible. We provide an achievable secrecy rate that improves upon a recently established one in a concurrent work by Mostafa and Lampe. Our scheme follows from both the secrecy capacity result by Wyner and the artificial noise scheme by Goel and Negi, but using truncated Gaussian input distributions instead of uniform ones. Via numerical results, we show that our secrecy rate outperforms the concurrent rate in different settings. © 2015 IEEE.

  17. International Security in the World Economic Relations

    Directory of Open Access Journals (Sweden)

    Otenko Iryna P

    2016-05-01

    Full Text Available The article discusses the urgent topic of the evolution of international relations, the issue of establishing international security, and the development of international economic cooperation based on the principles of security. In order to analyze the current status of international security in the world and to identify key factors that hinder the way of establishing a positive global community, researches by the international analytical centers together with the institutes for international security and cooperation have been generalized. To this end, both the status of and changes in the Global Peace Index in the recent years has been disclosed, the position of Ukraine in the world according to this index has been examined. It has been proven that the main international security problems are related to the armed conflicts, civil wars, political violence, terrorism impacting the development of humanity as a whole, the status of international relations, the evolution of the world economy as well as national economies. Further researches should be focused on how the status of peace in the countries impacts their economic status and the status of international cooperation in other areas of economic cooperation, excluding the military. It should be answered particularly, how the above indicated status affects strengthening the Ukraine's position in the world.

  18. Two-Hop Secure Communication Using an Untrusted Relay

    Directory of Open Access Journals (Sweden)

    Xiang He

    2009-01-01

    Full Text Available We consider a source-destination pair that can only communicate through an untrusted intermediate relay node. The intermediate node is willing to employ a designated relaying scheme to facilitate reliable communication between the source and the destination. Yet, the information it relays needs to be kept secret from it. In this two-hop communication scenario, where the use of the untrusted relay node is essential, we find that a positive secrecy rate is achievable. The center piece of the achievability scheme is the help provided by either the destination node with transmission capability, or an external “good samaritan” node. In either case, the helper performs cooperative jamming that confuses the eavesdropping relay and disables it from being able to decipher what it is relaying. We next derive an upper bound on the secrecy rate for this system. We observe that the gap between the upper bound and the achievable rate vanishes as the power of the relay node goes to infinity. Overall, the paper presents a case for intentional interference, that is, cooperative jamming, as an enabler for secure communication.

  19. The Effects of Cooperative and Collaborative Strategies on Student Achievement and Satisfaction in Blended and Online Learning Environments

    Science.gov (United States)

    Nickel, Christine E.

    2010-01-01

    The purpose of this study was to examine whether cooperative versus collaborative strategies used for a group project had differential effects on students' achievement, process and solution satisfaction, value and preference for collaboration, and perceptions of community of inquiry in online and blended environments. The study sample consisted of…

  20. The national security dividend of global carbon mitigation

    International Nuclear Information System (INIS)

    Mignone, Bryan K.

    2007-01-01

    Energy and environmental security objectives are often conflated in political circles and in the popular press. Results from a well-established integrated assessment model suggest that policies designed to stabilize atmospheric carbon dioxide concentrations at levels above ∼500 ppm generally do not align with policies to curb global oil dependence, because these atmospheric objectives can be achieved largely through reductions in global coal consumption. Policies designed to stabilize atmospheric carbon dioxide at levels below ∼500 ppm, on the other hand, directly facilitate the alignment of environmental and security objectives because atmospheric targets in this range demand significant reductions in both coal and oil use. Greater recognition that investment in carbon mitigation can yield significant security dividends may alter the political cost-benefit calculus of energy-importing nations and could increase the willingness of some key global actors to seek binding cooperative targets under any post-Kyoto climate treaty regime

  1. Regionalism, Security and Cooperation in Oceania

    Science.gov (United States)

    2015-06-01

    Cooperation in Oceania Introduction Australia, by dint of geography, trade and investment links, tourism , aid, defense assets and sport , has exercised a...storm damage). Potential second-order consequences include economic loss from these events, declining revenues from tourism , and emigration to escape...bridges, dams, schools, hospitals, sports facilities and government buildings. China also funds commercial projects that can deliver immediate

  2. Security of Supply: A Pan-European Approach - The Opportunities and Requirements of Greater Cooperation Across European Electricity Markets

    International Nuclear Information System (INIS)

    Ulreich, S.

    2015-01-01

    In December 2014, Prognos AG (Berlin/Basel) was commissioned by the Weltenergierat - Deutschland e.V to prepare a study on the potential of greater cooperation across European electricity markets. The focus of the analysis was to address the extent to which closer cooperation on ensuring generation adequacy can lead to cost reductions. Fifteen countries were analysed: seven members of the Pentalateral Energy Forum (PLEF, DE, BE, NL, LU, FR, AT and CH) and eight additional bordering countries (PL, IT, UK, ES, DK, CZ, PT and IE). Today, ensuring generation adequacy takes place at a national level and international effects are not taken into account. However, if cross-border effects are considered adequacy considerations at a national level can be relieved, e.g.: load peaks in Europe do not occur simultaneously and the feedin from renewable energy takes place at different times. Potential savings arise, as less capacity needs to be secured by conventional power plants. An indicator for this in the present study is the so-called residual load. The study is based on analyses of all existing data relating to hourly load and feed-in from renewable energy for the period from 2009 to 2014. In addition, two scenarios (based on Visions V1 and V3 of ENTSO-E's System Outlook and Adequacy Forecast) and numerous sensitivities for 2030 were generated. As the variability of the results is highly dependent on weather conditions, 48 simulations of wind power (sensitivities) established a broad corridor of results. For this reason, ranges are used in the presentation of results. The approach makes this study the most comprehensive analysis to date of the potential of closer cooperation with respect to ensuring generation adequacy. With the assumption of no grid congestion, the study reaches the following results: 1) Reduction of residual load: In contrast to a national assessment scheme, under a collective assessment scheme the residual load will reduce by 2 to 15 gigawatts (most

  3. Technical Cooperation Report for 2014. Report by the Director General [Spanish Version

    International Nuclear Information System (INIS)

    2015-06-01

    enhancements to the Project Progress Assessment Report. Part B of this document presents a summary of financial and non-financial programme delivery indicators. It reviews the resources mobilized for the TC programme through the Technical Cooperation Fund (TCF), and through extrabudgetary and in-kind contributions. Payments to the TCF in 2014 totalled €62.0 million (not including National Participation Costs, assessed programme costs or miscellaneous income), or 89.5% of the TCF target set for the year. New extrabudgetary resources for 2014 came to €18.6 million and in-kind contributions were €0.6 million. Overall, implementation for the TCF reached 78% in 2014. Part C of this document responds to the operative paragraphs of resolution GC(58)/RES/12, and covers assistance to Member States in the peaceful, safe, secure and regulated application of atomic energy and nuclear techniques in specific fields. It highlights regional activities and achievements in technical cooperation in 2014. Globally, health and nutrition accounted for the highest proportion of actuals through the TC programme in 2014, followed by safety and security, and then by food and agriculture. Project examples are presented in Annex 1 according to thematic area, covering health and nutrition, food and agriculture, water and the environment, industrial applications, energy planning and nuclear power, radiation protection, nuclear safety and nuclear security, and nuclear knowledge development and management. The activities of the Programme of Action for Cancer Therapy are covered in Annex 2

  4. International Nuclear Security Situation And China’s Approach

    Institute of Scientific and Technical Information of China (English)

    Liu Chong

    2016-01-01

    Since 2010,the three Nuclear Security Summits have made a number of achievements,but the international nuclear security situation is still not relaxed.The rapid development of China’s domestic nuclear facilities and a large amount of nuclear and radioactive materials related to nuclear power,active international nuclear black market in China’s surrounding regions,rather serious domestic and international terrorist threats as well as the emerging technology development bring about new challenges to nuclear security.Facing the complicated and long-term nuclear security situation,China from the perspective of monitoring mechanism,laws and regulations system,technical capability-building and nuclear emergency preparedness,takes a series of effective measures to build the national nuclear security capacity,and strictly fulfills its international obligations,actively participates in upgrading the international nuclear non-proliferation regime and relevant international rules,and actively takes part in the Nuclear Security Summit process,strengthens bilateral cooperation on nuclear security with major countries especially the United States of America,and jointly organizes various training with International Atomic Energy Agency,which has made great contributions to upgrading the global nuclear security level.At the end of the Nuclear Security Summit process,China should continue to strengthen its domestic nuclear security capacity building,and promote the international community to treat the root causes and symptoms,adopt a comprehensive strategy,and work together,effectively prevent and dissolve the nuclear terrorist threats.

  5. Regional cooperation planning. Project planning for JAEA/SNL regional cooperation on remote monitoring

    International Nuclear Information System (INIS)

    Olsen, John

    2006-01-01

    Developing cooperation between the JAEA's NPSTC and the NNCA may take advantage of bilateral activities between those parties and SNL. The merger of JNC and JAERI has affected the schedule for JAEA/SNL cooperation. Also, the evolution of the NNCA as an independent agency has slowed the projected schedule for cooperation between the JAEA and the NNCA. A potential schedule for establishment of a quadrilateral remote monitoring system may include interim activities, securing an agreement of some type, and actual establishment of VPN links. A parallel schedule might exist for informing other regional parties and gaining their interest. (author)

  6. Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism

    Directory of Open Access Journals (Sweden)

    Qin Qin

    2015-01-01

    Full Text Available In order to improve the Internet coverage ratio and provide connectivity guarantee, based on sensor opportunistic coverage mechanism and cooperative cloud service, we proposed the coverage connectivity guarantee protocol for mobile Internet. In this scheme, based on the opportunistic covering rules, the network coverage algorithm of high reliability and real-time security was achieved by using the opportunity of sensor nodes and the Internet mobile node. Then, the cloud service business support platform is created based on the Internet application service management capabilities and wireless sensor network communication service capabilities, which is the architecture of the cloud support layer. The cooperative cloud service aware model was proposed. Finally, we proposed the mobile Internet coverage connectivity guarantee protocol. The results of experiments demonstrate that the proposed algorithm has excellent performance, in terms of the security of the Internet and the stability, as well as coverage connectivity ability.

  7. Secure Degrees of Freedom of the Gaussian Z Channel with Single Antenna

    Directory of Open Access Journals (Sweden)

    Xianzhong XIE

    2014-03-01

    Full Text Available This paper presents the secrecy capacity and the secure degrees of freedom of Gaussian Z channel with single antenna and confidential information. Firstly, we analysis the secrecy capacity and the upper bound of secure degrees of freedom of this channel in theory. Then, we respectively discuss the security pre-coding scheme for real Gaussian channel model and frequency selection channel model. Under the first model, through real interference alignment and cooperative jamming, we obtain the secrecy capacity and secure degrees of freedom, proving that it can reach the upper bound of secure degrees of freedom in theory. While, under the second one, a strong security pre-coding algorithm is proposed, which is based on the fact that sparse matrix has strong hash property. Next, we arrange interference with interference alignment and the receivers process their received signal through zero forcing algorithm. At last, the messages are reconstructed with maximum likelihood decoding, where it shows that the algorithm can asymptotically achieve the optimal secrecy capacity.

  8. Northeast Asian economy cooperation: study on energy resource cooperation in Northeast Asian region

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Woo Jin [Korea Energy Economics Institute, Euiwang (Korea)

    1999-12-01

    In Northeast Asian region, there are East Russia with abundant resources, Japan a large energy consumption country, Korea and China with rapidly increasing energy consumption due to their economic development, but the utilization rate of East Russian resources are very low and the resource trading and investment among Korea, China and Japan are also low. Korea and Japan use most of energy imported from Middle East. It is expected that import of petroleum and gas except coal will be increasing in China and most of imported energy will be imported mainly from the Middle East. For Korea, with not much energy resources and foreign-oriented economic system, if investment on resource development among Northeast Asian countries is active and energy transportation among these countries is liberalized, the enhancement of energy cooperation in Northeast Asia has a high possibility to provide North and South Korean energy cooperation as well as to secure energy security and to develop energy industry. Therefore, Korean government needs to promote Northeast Asian energy cooperation by taking its lead. (author). 28 refs., 8 figs., 44 tabs.

  9. Energy security in ASEAN: A quantitative approach for sustainable energy policy

    International Nuclear Information System (INIS)

    Tongsopit, Sopitsuda; Kittner, Noah; Chang, Youngho; Aksornkij, Apinya; Wangjiraniran, Weerin

    2016-01-01

    We investigate energy security of the Association of Southeast Asian Nations (ASEAN) under the 4-A’s framework. The ASEAN Economic Community (AEC) agreement launched in 2015 renewed a regional focus on energy security and sustainability. We employ an analytic framework to quantitatively assess progress in different categories including availability, acceptability, affordability, and applicability. Key metrics include the documentation of CO_2 emissions, energy access measures, and energy supply reserves from 2005–2010. We identify relevant energy indicators using high quality historical data from the IEA and World Bank. We find that ASEAN made little progress toward establishing energy security in the previous five-year planning period (2005–2010) as it regressed in most categories except applicability. Therefore, we suggest that increased development of renewable energy and energy efficiency technologies would move ASEAN in a positive direction toward achieving energy security and sustainable energy policy goals. - Highlights: • We investigate energy security in ASEAN across four dimensions. • Energy security in ASEAN has mostly regressed from 2005–2010. • Future cooperative agreements will help ASEAN improve energy security.

  10. 10 CFR 710.6 - Cooperation by the individual.

    Science.gov (United States)

    2010-01-01

    ... obligation to cooperate applies when completing security forms, during the course of a personnel security... authorization, including but not limited to, personnel security interviews, DOE-sponsored mental evaluations... individual subject to § 709.3(d) to consent to and take an event-specific polygraph examination. A refusal to...

  11. The Effect of the 5E Instructional Model Enriched With Cooperative Learning and Animations on Seventh-Grade Students’ Academic Achievement and Scientific Attitudes

    Directory of Open Access Journals (Sweden)

    İkramettin DAŞDEMİR

    2016-09-01

    Full Text Available The aim of this research is to determine the effect of the different teaching methods, on seventh-grade students’ academic achievement and scientific attitudes. The research was carried out using quasi-experimental methods. The research sample consisted of 84 seventh grade students studying in three different classes. One of these classes an animation group, the second class was a cooperative group, the third was a control group. The data collection tools used were the Science Achievement Test (SAT and the Scientific Attitude Scale (SAS.When each group’s SAT and SAS pre-test ANOVA scores were compared, no significant differences were found between them. SAT post-test results showed a significant difference in favour of the animation group. In addition, the findings of the study revealed that the cooperative group’s mean post-test were not statistically significant. When SAS post-test scores of the animation and control groups were compared, there was a significant difference in favour of the animation group. When the SAS post-test scores of the cooperative and control groups were compared, there was a significant difference in favour of the cooperative group. When the SAS post-test scores of the cooperative and animation group were compared, there were no statistically significant differences in students’ attitudes.

  12. Food security in a world without borders.

    Science.gov (United States)

    de Haen, Hartwig; Thompson, Brian

    2003-01-01

    The alleviation of poverty and the eradication of hunger and malnutrition are within reach. Considerable progress has been made over the past thirty years in reducing the numbers of the hungry, and projections over the next thirty years suggest that this progress will continue. The majority of developing countries have participated in this progress and have improved nutrition but there are significant regional differences. The current challenge is to build upon and accelerate the progress already made. Everyone is involved in this struggle against hunger and malnutrition, and to achieve these goals, global partnerships to enhance co-operation and co-ordination are being strengthened. Successful country experiences for improving food security and nutrition have demonstrated the importance of peace, political stability, and stable economic growth. There is also the need for increased foreign investment and increased ODA, particularly for African agriculture, debt relief, the better integration of LDCs in the global economy, their more secure access to markets and more equitable terms of trade, enhanced South-South co-operation, training and research and new high-yield and drought-resistant crop varieties. While all these have been commented on and recognised before, we must close the credibility gap in our political will by honouring our existing commitments for providing tangible benefits at the local level. For globalisation, the key issue is how the aggregate benefits of globalisation will be distributed and how to translate this into better nutrition. The LDCs, which are the most vulnerable and disadvantaged members of the international community, should be at the centre of this drive towards food security and take genuine ownership of policies, initiatives and activities to improve development. At the same time we need to succeed in making the developed world more aware of and responsive to the conditions of the LDCs. The most effective way to improve nutrition

  13. Fuel irradiation research of Japan at Halden reactor. Achievement of cooperative researches between JAERI and several organizations in the period from 2000 to 2002 (Joint research)

    International Nuclear Information System (INIS)

    2004-03-01

    JAERI has performed cooperative researches with several Japanese organizations utilizing the Halden Boiling Heavy Water Reactor(HBWR) which is located at Halden in Norway. These researches are carried out based on the contracts of the cooperative researches, which are revised every three years, in accordance with the renewal of the participation of JAERI to the OECD Halden Reactor Project. This report summarizes the objectives, contents and outlines of the achievements of the cooperative researches during the three years from 2000 January to 2002 December. During the period, seven cooperative researches had been carried out. Two of them had been completed and other five researches have been continued to the next three-year period. Most of them are irradiation test researches of advanced fuel and cladding in order to prepare the higher burnup utilization and introduction of LWR fuel and MOX fuel in LWRs of Japan. As the researches of fuel irradiation usually take long time for preparing test and irradiation, three years are usually not enough to obtain some achievements from the irradiation tests. Therefore, five cooperative researches have been continued to the next three-year period. In this report, the achievements of the researches continued to the next period are not final one but a kind of progress report. (author)

  14. "Transatlantic cooperation on terrorism and Islamist radicalisation in Africa: the Franco-American axis"

    DEFF Research Database (Denmark)

    Olsen, Gorm Rye

    2018-01-01

    Transatlantic cooperation on security has a long history. In Africa, transatlantic cooperation on security is basically between France and the United States. This paper asks why the two former competitors in Africa started to cooperate and also why they are so willing to engage militarily....... It suggests that the perception of a serious threat from terrorism and Islamist radicalisation overrules differences in decision-making systems....

  15. Sweden's Co-operation with Eastern Europe in Radiation Safety 2011

    International Nuclear Information System (INIS)

    Dassen, Lars van; Andersson, Sarmite; Bejarano, Gabriela; Chirman, Inessa; Delalic, Zlatan; Ekblad, Christer; Karlberg, Olof; Klasen, Haakan; Olsson, Kjell; Sandberg, Viviana; Stenberg, Tor; Turner, Roland; Wickman, Barbro

    2012-03-01

    In 2011, the Swedish Radiation Safety Authority implemented co-operation projects in Russia, Ukraine, Georgia, Lithuania and Moldova, based on instructions from the Swedish Government and agreements with the European Union and the Swedish International Development Co-operation Agency, SIDA. The projects aim at achieving a net contribution to radiation safety (including nuclear safety, nuclear security, waste management, nonproliferation as well as radiation protection and emergency preparedness) for the benefit of the host countries and the international community as well as Sweden. This report gives an overview of all the projects implemented in 2011. The project managers from SSM are the cornerstones of our successful work, but all the efforts and dedication by staff members of the facilities and authorities in the mentioned countries are indispensable for the long-term positive outcomes. This report is meant to serve as a detailed account regarding SSM's efforts as part of the Swedish international activities, on which Sweden will report to the Nuclear Security Summit in Seoul. The parties to the G-8 Global Partnership have in June 2011 extended the Global Partnership for ten more years, till 2022. Other international frameworks, such as the UNSC Resolution 1540, remain a vibrant instrument by which UN Member States can exchange information on security concerns and request assistance from each other. The projects that SSM implements in Moldova and Georgia have a reference to the aims and purposes of the UNSC Resolution 1540. Much work has been done in the fields of nuclear security and safety, but there are still lots of issues that need to be taken care of. As such, SSM will continue to do its part for nuclear safety and security at the international level, along the lines and priorities set by our Government

  16. Perception of Summer Cooperative Graduates on Employers Generic Skills Preference, Haramaya University, Ethiopia

    Directory of Open Access Journals (Sweden)

    Mohammed Aman

    2014-07-01

    Full Text Available Meeting the needs of employers and equipping graduates with employability skills are considered as among the shared responsibilities of Universities and different organizations. This study intends to assess the perception of summer cooperative graduates on their employers’ preference for generic skills to secure employment, based on their work-performance. A self-administered questionnaire was distributed for 150 summer cooperative students and 110 were received and used for analysis during the 2013 summer academic program. Both descriptive and empirical analyses were used to achieve the objectives. The One-way-ANOVA result showed statistically significant difference among respondents on the higher order thinking skills as first choice among employers. This implies that, employers of cooperative graduates prioritize higher order thinking skills than the basic academic and personal quality skills. Hence, there is a need to focus and imbed higher order thinking skills enhancing contents in the curriculum.

  17. The Evolution of European Security: From Confrontation to Cooperation

    Science.gov (United States)

    2013-03-01

    Vasconcelos , (Paris: The European Union Institute for Security Studies, 2009), 41. 60 Ibid. 61 European Union Home Page, “Common Security and...of ESDP,” in What Ambitions for European Defense in 2020?, 2nd ed., ed. Álvaro de Vasconcelos (Paris: The European Union Institute for Security

  18. Cooperation in Construction:

    DEFF Research Database (Denmark)

    Vogelius, Peter; Storgaard, Kresten

    2016-01-01

    The study presents a building project executed by a major Danish construction company, where cooperation and its staging were essential for achieving high productivity and competitiveness. The form of this cooperation is the main theme for the article. The contractor actively changed the communic......The study presents a building project executed by a major Danish construction company, where cooperation and its staging were essential for achieving high productivity and competitiveness. The form of this cooperation is the main theme for the article. The contractor actively changed...... the companies in the case can be understood as possessing a social capital which is enforced and united by initiatives of the main contractor. The social capital was built up and maintained through the actual constitution of cooperation already in the initial phase of bidding before the building process....... The management logic of the main contractor is interpreted as based on a sociology-inspired understanding focusing on norms and social values rather than on contractual (law) and functional (engineering) logic, which had hitherto been prevalent in Danish construction management....

  19. An implementation of a security infrastructure compliant with the Italian Personal Data Protection Code in a web-based cooperative work system.

    Science.gov (United States)

    Eccher, Claudio; Eccher, Lorenzo; Izzo, Umberto

    2005-01-01

    In this poster we describe the security solutions implemented in a web-based cooperative work frame-work for managing heart failure patients among different health care professionals involved in the care process. The solution, developed in close collaboration with the Law Department of the University of Trento, is compliant with the new Italian Personal Data Protection Code, issued in 2003, that regulates also the storing and processing of health data.

  20. Technical Cooperation report for 2012. Report by the Director General

    International Nuclear Information System (INIS)

    2013-07-01

    This year's Technical Cooperation (TC) Report is set out in three parts: A, Strengthening the Agency's Technical Cooperation Activities; B, TC Programme Resources and Delivery, and C, Programme Activities and Achievements in 2012: Regional Overview. Annex 1 provides examples of project activities and achievements in specific thematic areas. Part A is divided into two sections. The first presents an overview of the Agency's technical cooperation activities in 2012 in the context of global development, reports on how the programme is tailored to the specific needs of Member States in each region (with a focus on human resource development), and highlights TC activities in the field of food production, food protection and food safety, the topics covered by the 2012 Scientific Forum. The Director General's emphasis in 2012 on food security reflects the importance of this topic in each region that the TC programme serves. Throughout 2012, TC projects in the Africa region contributed to agricultural productivity and food security using nuclear technology. Projects built Member State capacity to tackle tsetse and trypanosmosis using the sterile insect technique (SIT), and to improve rice varieties through mutation breeding and biotechnology. Other projects focused on improving the use of agricultural resources, combating soil erosion by optimizing conservation agriculture and supporting innovative practices to combat land degradation and enhance soil productivity for improved food security. Assistance was provided to improve cattle productivity through genetic improvement, including artificial insemination. In Asia and the Pacific, assistance to Member States in this field built competencies in soil-water management and crop nutrition, as well as in mutation breeding, with the aim of enhancing agricultural productivity and developing suitable crop varieties that are adaptable to climate change. Additional projects focused on artificial insemination and control of

  1. International Military Cooperation: From Concepts to Constructs

    Science.gov (United States)

    D'Orazio, Vito

    2013-01-01

    International cooperation on issues of security is a central concept in many theoretical debates in international relations. This dissertation is an attempt to lay the foundation for measuring military cooperation and understanding the forces brought forth through its expansion. The central notion is that the set of policies related to military…

  2. The effect of the 5e ınstructional model enriched with cooperative learning and animations on seventh-grade students’ academic achievement and scientific attitudes

    Directory of Open Access Journals (Sweden)

    İkramettin Daşdemir

    2016-09-01

    Full Text Available The aim of this research is to determine the effect of the different teaching methods, on seventh-grade students’ academic achievement and scientific attitudes. The research was carried out using quasi-experimental methods. The research sample consisted of 84 seventh grade students studying in three different classes. One of these classes an animation group, the second class was a cooperative group, the third was a control group. The data collection tools used were the Science Achievement Test (SAT and the Scientific Attitude Scale (SAS.When each group’s SAT and SAS pre-test ANOVA scores were compared, no significant differences were found between them. SAT post-test results showed a significant difference in favour of the animation group. In addition, the findings of the study revealed that the cooperative group’s mean post-test were not statistically significant. When SAS post-test scores of the animation and control groups were compared, there was a significant difference in favour of the animation group. When the SAS post-test scores of the cooperative and control groups were compared, there was a significant difference in favour of the cooperative group. When the SAS post-test scores of the cooperative and animation group were compared, there were no statistically significant differences in students’ attitudes.

  3. Infrastructure development through civil nuclear cooperation

    International Nuclear Information System (INIS)

    Humphrey, A.M.; Burkart, A.R.

    2010-01-01

    Due to growing concerns over electricity demand, energy security, and climate change, numerous countries are considering the construction of new nuclear power plants. Most of these will be built in nations with existing nuclear power programs, but an increasing number of States have expressed serious interest in developing new nuclear power programs. These countries will be faced with many challenges in establishing the robust infrastructures necessary for the safe, secure, and safeguarded deployment of nuclear power. Fortunately, there is much a State can gain through cooperation with other States with more developed programs. By sharing information on previous experience and established best practices, an emerging nuclear energy State can benefit from the lessons learned by its partners. Through a broad range of civil nuclear cooperation, the United States is helping new entrants develop the sound infrastructure necessary to deploy nuclear power plants with the highest standards of safety, security, and nonproliferation

  4. International co-operation. Key issue paper no. 6

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-06-01

    In accordance with guidance provided by the Steering Group, this report assesses the adequacy and effectiveness of international co-operation relating to the nuclear fuel cycle, with a view toward identifying any needed new forms or arrangements for co-operation. In more specific terms, the Steering Committee`s guidance identified the following questions: Is the existing international framework sufficient for: the safe and secure operation of the fuel cycle; the economic and orderly development of the world`s nuclear energy systems (or their phase-out should this take place); international co-operation in R and D; international co-operation in industrial activities? Are there places where these requirements overlap or interact so as to impede activities which are desirable? Can new forms of co-operation be foreseen which would make it easier to implement any of the fuel cycle options in a safe, secure and responsible way? Are there other new forms of international co-operation which would affect the fuel cycle, e.g. regional institutions; international plutonium management regime and/or storage? Finally: What is the appropriate role of IAEA in any of these?.

  5. Code of conduct on the safety and security of radioactive sources

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-03-01

    The objective of this Code is to achieve and maintain a high level of safety and security of radioactive sources through the development, harmonization and enforcement of national policies, laws and regulations, and through tile fostering of international co-operation. In particular, this Code addresses the establishment of an adequate system of regulatory control from the production of radioactive sources to their final disposal, and a system for the restoration of such control if it has been lost.

  6. Code of conduct on the safety and security of radioactive sources

    International Nuclear Information System (INIS)

    2001-03-01

    The objective of this Code is to achieve and maintain a high level of safety and security of radioactive sources through the development, harmonization and enforcement of national policies, laws and regulations, and through tile fostering of international co-operation. In particular, this Code addresses the establishment of an adequate system of regulatory control from the production of radioactive sources to their final disposal, and a system for the restoration of such control if it has been lost

  7. Co-operatives and Normative Control

    DEFF Research Database (Denmark)

    Bregn, Kirsten; Jagd, Søren

    1992-01-01

    This paper explores the conditions for applying normative control in co-operatives. For normative control to be effective two conditions are found particularly important: Individuals must be morally involved and the organization must have a system of making it possible to link common norms...... and individual action. If these conditions are not fulfilled, as may be the case in many co-operatives, normative control cannot be expected to work. The problems of normative control in co-operatives may then not be caused by the use of normative control as such, but may instead be a problem of securing...

  8. Post-'92 Helsinki. Towards an operational institution for comprehensive security

    International Nuclear Information System (INIS)

    Ghebali, V.Y.

    1992-01-01

    Discussing the concept of comprehensive security the author reviews aims of the Forum for Security Cooperation to be held in Vienna in September 1992. They are: 1. To negotiate specific new conventional disarmament measures, provisions harmonizing the obligations assumed under various international instruments in this area; 2. To provide a framework for consultation, cooperation and ongoing dialogue on security questions; 3. To elaborate on the theme of conflict prevention

  9. Technical Cooperation Report for 2014. Report by the Director General [Chinese Version

    International Nuclear Information System (INIS)

    2015-06-01

    enhancements to the Project Progress Assessment Report. Part B of this document presents a summary of financial and non-financial programme delivery indicators. It reviews the resources mobilized for the TC programme through the Technical Cooperation Fund (TCF), and through extrabudgetary and in-kind contributions. Payments to the TCF in 2014 totalled €62.0 million (not including National Participation Costs, assessed programme costs or miscellaneous income), or 89.5% of the TCF target set for the year. New extrabudgetary resources for 2014 came to €18.6 million and in-kind contributions were €0.6 million. Overall, implementation for the TCF reached 78% in 2014. Part C of this document responds to the operative paragraphs of resolution GC(58)/RES/12, and covers assistance to Member States in the peaceful, safe, secure and regulated application of atomic energy and nuclear techniques in specific fields. It highlights regional activities and achievements in technical cooperation in 2014. Globally, health and nutrition accounted for the highest proportion of actuals 1 through the TC programme in 2014, followed by safety and security, and then by food and agriculture. Project examples are presented in Annex 1 according to thematic area, covering health and nutrition, food and agriculture, water and the environment, industrial applications, energy planning and nuclear power, radiation protection, nuclear safety and nuclear security, and nuclear knowledge development and management. The activities of the Programme of Action for Cancer Therapy are covered in Annex 2

  10. Technical Cooperation Report for 2014. Report by the Director General [Arabic Version

    International Nuclear Information System (INIS)

    2015-06-01

    enhancements to the Project Progress Assessment Report. Part B of this document presents a summary of financial and non-financial programme delivery indicators. It reviews the resources mobilized for the TC programme through the Technical Cooperation Fund (TCF), and through extrabudgetary and in-kind contributions. Payments to the TCF in 2014 totalled €62.0 million (not including National Participation Costs, assessed programme costs or miscellaneous income), or 89.5% of the TCF target set for the year. New extrabudgetary resources for 2014 came to €18.6 million and in-kind contributions were €0.6 million. Overall, implementation for the TCF reached 78% in 2014. Part C of this document responds to the operative paragraphs of resolution GC(58)/RES/12, and covers assistance to Member States in the peaceful, safe, secure and regulated application of atomic energy and nuclear techniques in specific fields. It highlights regional activities and achievements in technical cooperation in 2014. Globally, health and nutrition accounted for the highest proportion of actuals 1 through the TC programme in 2014, followed by safety and security, and then by food and agriculture. Project examples are presented in Annex 1 according to thematic area, covering health and nutrition, food and agriculture, water and the environment, industrial applications, energy planning and nuclear power, radiation protection, nuclear safety and nuclear security, and nuclear knowledge development and management. The activities of the Programme of Action for Cancer Therapy are covered in Annex 2

  11. Evaluation of Data Security Measures in a Network Environment Towards Developing Cooperate Data Security Guidelines

    OpenAIRE

    Ayub Hussein Shirandula; Dr. G. Wanyembi; Mr. Maina karume

    2012-01-01

    Data security in a networked environment is a topic that has become significant in organizations. As companies and organizations rely more on technology to run their businesses, connecting system to each other in different departments for efficiency data security is the concern for administrators. This research assessed the data security measures put in place at Mumias Sugar Company and the effort it was using to protect its data. The researcher also highlighted major security issues that wer...

  12. Oil and gas, strategic regional cooperation between Persian Gulf countries

    Energy Technology Data Exchange (ETDEWEB)

    Zalloi, Mir Mahdi

    2010-09-15

    Almost two-thirds of proven oil and a third of world natural gas resources are in the Persian Gulf countries. Unfortunately strategic region of Persian Gulf in the past three decades faced with many security challenges due to wars and political conflicts. For security in this region, there are several methods such as military treaties between regional countries or Military presence of foreign countries, but historical evidence has shown, none of them could not guarantee the stable security in this region. The regional cooperation between countries can be replaced to mentioned methods. IPI Gas pipeline is an objective sample for this regional cooperation.

  13. IAEA, EU Senior Officials Review Nuclear-Related Cooperation, Chart Way Ahead

    International Nuclear Information System (INIS)

    Amano, Y.

    2014-01-01

    International Atomic Energy Agency (IAEA) and European Union officials met this week for the second annual Senior Officials Meeting to review and further strengthen their nuclear-related cooperation. In the past year, the two institutions have improved collaboration in nuclear safety, security, safeguards and peaceful use of nuclear energy through implementing a number of initiatives. In 2013, new contracts for projects have been signed amounting to approximately 24 million euros. These included an EU Council decision to support IAEA nuclear security and verification activities worth of 8.05 million euros. Furthermore, a Memorandum of Understanding establishing a framework for cooperation to help improve nuclear safety was signed, as well as the Practical Arrangement on technical nuclear security issues. The EU and the IAEA have also worked to explore and identify new areas for cooperation such as using nuclear applications for socio-economic development. The meeting addressed enhanced cooperation in the areas of nuclear safety, nuclear security, nuclear applications, nuclear energy and safeguards. Participants agreed on the following steps, including holding a Senior Officials Meeting planned in early 2015 in the premises of the European Commission in Luxembourg

  14. A REGIONAL PARTNERSHIP ON RADIOLOGICAL SECURITY

    International Nuclear Information System (INIS)

    Morris, Fred A.; Murray, A.; Dickerson, S.; Tynan, Douglas M.; Rawl, Richard R.; Hoo, Mark S.

    2007-01-01

    In 2004, Australia, through the Australian Nuclear Science and Technology Organisation (ANSTO) created the Regional Security of Radioactive Sources (RSRS) project and partnered with the U.S. Department of Energy's National Nuclear Security Administration (NNSA) and the International Atomic Energy Agency (IAEA) to form the Southeast Asian Regional Radiological Security Partnership (RRSP). The intent of the RRSP/RSRS partnership is to cooperate with regional neighbors in Southeast Asia to improve the security of their radioactive sources. This Southeast Asian Partnership supports NNSA and IAEA objectives to improve the security of high risk radioactive sources by raising awareness of the need, and developing national programs, to: protect and control such materials; improve the security of such materials and recover and condition the materials no longer in use. To date, agreed upon joint activities have included assistance with the improvement of regulatory infrastructure for the control of radioactive sources, training on the physical protection of radioactive sources, training and assistance with the search, location, identification and securing of orphan radioactive sources and overall assistance with implementing the IAEA Code of Conduct on the Safety and Security of Radioactive Sources. Since the inception of the partnership, ten Southeast Asian nations have participated in a range of activities from receiving general training on the security of radioactive sources to receiving specialized equipment and training to locate orphan or abandoned radioactive sources. By having a shared vision and objectives for radioactive source security in the Southeast Asian region, ANSTO and NNSA have been able to develop a successful partnership which has effectively utilized the technical, financial and political resources of each contributing partner. An example of how this partnership works is the cooperation with the Nuclear Energy Regulatory Agency, Indonesia (BAPETEN) to

  15. Maritime Security Cooperation in the Strait of Malacca

    National Research Council Canada - National Science Library

    Massey, Anthony S

    2008-01-01

    .... This change can be attributed to the relaxation of historical tensions, the recognition of a common threat in piracy and maritime terrorism, an increase in extra-regional pressure to cooperate...

  16. Reflection on the Judicial Activism or Constructivism: In Perspective of Being an Instrument of Cooperation in Judicial Facing Issues of Social Security and Labor

    Directory of Open Access Journals (Sweden)

    Antonio Gomes de Vasconcelos

    2016-10-01

    Full Text Available The article proposes a present thinking as the possibility of reaching solutions to some social security and labor issues in democratic rule of law using judicial cooperation in the search for effective social law of social security. The current legal constructivism, also called judicial activism in its manifestation of legal instrument to weigh yourself to get and verify the approach of social dialogue for more proactive attitude of the court, in which the actors involved in the conflict are called to have a more active participation on problem situations, requiring them more than mere legal interpretation in philosophical hermeneutics.

  17. Achieving Security Assurance with Assertion-based Application Construction

    Directory of Open Access Journals (Sweden)

    Carlos E. Rubio-Medrano

    2015-12-01

    Full Text Available Modern software applications are commonly built by leveraging pre-fabricated modules, e.g. application programming interfaces (APIs, which are essential to implement the desired functionalities of software applications, helping reduce the overall development costs and time. When APIs deal with security-related functionality, it is critical to ensure they comply with their design requirements since otherwise unexpected flaws and vulnerabilities may consequently occur. Often, such APIs may lack sufficient specification details, or may implement a semantically-different version of a desired security model to enforce, thus possibly complicating the runtime enforcement of security properties and making it harder to minimize the existence of serious vulnerabilities. This paper proposes a novel approach to address such a critical challenge by leveraging the notion of software assertions. We focus on security requirements in role-based access control models and show how proper verification at the source-code level can be performed with our proposed approach as well as with automated state-of-the-art assertion-based techniques.

  18. HOMELAND SECURITY: Responsibility And Accountability For Achieving National Goals

    National Research Council Canada - National Science Library

    2002-01-01

    ... an effective approach and appropriate accountability to Congress and the American people; (2) the Executive Branch s initial efforts to develop a national strategy for homeland security; (3) the impact of an invigorated homeland security program on budgets and resources; and (4) our efforts to obtain information from the Office of Homeland Security (OHS).

  19. Cooperative Learning: Developments in Research

    Science.gov (United States)

    Gillies, Robyn M.

    2014-01-01

    Cooperative learning is widely recognized as a pedagogical practice that promotes socialization and learning among students from kindergarten through to college level and across different subject areas. Cooperative learning involves students working together to achieve common goals or complete group tasks. Interest in cooperative learning has…

  20. Code of conduct on the safety and security of radioactive sources

    International Nuclear Information System (INIS)

    Anon.

    2001-01-01

    The objective of the code of conduct is to achieve and maintain a high level of safety and security of radioactive sources through the development, harmonization and enforcement of national policies, laws and regulations, and through the fostering of international co-operation. In particular, this code addresses the establishment of an adequate system of regulatory control from the production of radioactive sources to their final disposal, and a system for the restoration of such control if it has been lost. (N.C.)

  1. Corporate strategic plan for safeguards and security

    International Nuclear Information System (INIS)

    1997-06-01

    Department of Energy (DOE) safeguards and security (S and S) is a team effort, consisting of Field, National Laboratories, Program Office, and Headquarters units cooperating to support the Department's diverse security needs. As an integral part of the nation's security structure, the DOE S and S Program regularly supports and works in cooperation with other US Government agencies and private industry to improve the national security posture. Thus, inter- and intra-agency partnerships play an invaluable role in the continuing efforts to integrate and implement improved ways of doing business. Their Corporate Strategic Plan provides a road map to guide, track, and provide feedback for the incorporation and implementation of S and S activities within DOE. Part 1 Planning Framework, describes those overarching factors which influence the planning endeavors. Part 2, Strategic Perspective, outlines where the S and S Program has been and how they will move to the future through core competencies, changing cultural thinking, and implementing their strategies. Part 3, Strategic and Operational Integration, details critical focus areas, strategies, and success indicators designed to enhance inter-agency S and S integration and promote cooperation with external agencies. This Plan will be reviewed annually to ensure it remains supportive and fully-engaged with the nation's and international security environments

  2. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  3. Collective Security Treaty Organization: Origins of the Multidimensional Mandate and Modern Means for its Implementation

    Directory of Open Access Journals (Sweden)

    Golub K.

    2018-03-01

    Full Text Available This article examines the historically contradictory development of the Collective Security Treaty Organization (CSTO following its 15th anniversary, and evaluates its political potential from the point of view of its assigned mandate. The evolution of international stability at the beginning of the century forced the contracting parties of the CSTO to formalize their mainly declarative interactions through the creation of a valid regional security organization. This new collective security forum enriched the cooperation mandate by establishing additional areas for mutual coordination including counterterrorism activities, measures to combat illegal migration and drug trafficking, strategies to respond to natural disasters and cybersecurity. The creation of the multitasking Collective Rapid Reaction Forces was the first significant step on the way to the practical realization of the CSTO. The Collective Security Strategy for the period ending in 2025 organizes the CSTO instruments of international cooperation within the CSTO crisis management framework and thus works to reduce the fragmentary nature of the CSTO. Despite the availability of the Collective Rapid Reaction Forces and the Collective Peace-Keeping Forces, the CSTO’s crisis management approach gives priority to political approaches and negotiation. Consequently, the multifunctional mandate of the CSTO predetermines its strategic role in Eurasia and allows it to achieve its political goals related to conservation of the common military and strategic area, the creation of a constraining effect, the facilitation of cooperation among law enforcement and intelligence agencies and the ability to contribute to the settlement of regional and local conflicts.

  4. International Conference on Nuclear Security: Enhancing Global Efforts. Summary of an International Conference

    International Nuclear Information System (INIS)

    2014-01-01

    The International Conference on Nuclear Security: Enhancing Global Efforts was organized by the IAEA and held in Vienna on 1-5 July 2013. The conference was organized in cooperation with the following organizations and initiatives: the European Union; the Global Initiative to Combat Nuclear Terrorism (GICNT); the International Criminal Police Organization (INTERPOL); the Institute of Nuclear Materials Management (INMM); the Nuclear Threat Initiative (NTI); the Organization for Security and Co-operation in Europe (OSCE); the Partnership for Global Security; the Police Community of the Americas (AMERIPOL); the United Nations Interregional Crime and Justice Research Institute (UNICRI); the United Nations Office on Drugs and Crime (UNODC); the World Institute for Nuclear Security (WINS); the World Nuclear Association (WNA); and the World Nuclear Transport Institute (WNTI). A total of 34 ministers participated in the ministerial session of the conference. Altogether, the conference attracted more than 1300 registered participants from 125 IAEA Member States and 21 organizations. The aim of the conference was to review the international community's experience and achievements to date in strengthening nuclear security, to enhance the understanding of current approaches to nuclear security worldwide and identify trends, and to provide a global forum for ministers, policymakers and senior officials to formulate views on future directions and priorities for nuclear security. This book contains the President's Summary of the conference and a summary of the ministerial session, the full text of the ministerial declaration adopted by the conference and summaries of the main conference sessions. The attached CD-ROM contains the full conference programme, the list of conference participants, the national statements from the ministerial session and a selection of papers

  5. Safe Cooperating Cyber-Physical Systems using Wireless Communication

    DEFF Research Database (Denmark)

    Pop, Paul; Scholle, Detlef; Sljivo, Irfan

    2017-01-01

    This paper presents an overview of the ECSEL project entitled ―Safe Cooperating Cyber-Physical Systems using Wireless Communication‖ (SafeCOP), which runs during the period 2016–2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...... detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation...

  6. Cognitive communication and cooperative hetnet coexistence selected advances on spectrum sensing, learning, and security approaches

    CERN Document Server

    Bader, Faouzi

    2014-01-01

    This book, written by experts from universities and major industrial research laboratories, is devoted to the very hot topic of cognitive radio and networking for cooperative coexistence of heterogeneous wireless networks. Selected highly relevant advanced research is presented on spectrum sensing and progress toward the realization of accurate radio environment mapping, biomimetic learning for self-organizing networks, security threats (with a special focus on primary user emulation attack), and cognition as a tool for green next-generation networks. The research activities covered include work undertaken within the framework of the European COST Action IC0902, which is geared towards the definition of a European platform for cognitive radio and networks. Communications engineers, R&D engineers, researchers, and students will all benefit from this complete reference on recent advances in wireless communications and the design and implementation of cognitive radio systems and networks.

  7. Sweden's Co-operation with Eastern Europe in Radiation Safety 2011

    Energy Technology Data Exchange (ETDEWEB)

    Dassen, Lars van; Andersson, Sarmite; Bejarano, Gabriela; Chirman, Inessa; Delalic, Zlatan; Ekblad, Christer; Karlberg, Olof; Klasen, Haakan; Olsson, Kjell; Sandberg, Viviana; Stenberg, Tor; Turner, Roland; Wickman, Barbro

    2012-11-01

    In 2011, the Swedish Radiation Safety Authority implemented co-operation projects in Russia, Ukraine, Georgia, Lithuania and Moldova, based on instructions from the Swedish Government and agreements with the European Union and the Swedish International Development Co-operation Agency, SIDA. The projects aim at achieving a net contribution to radiation safety (including nuclear safety, nuclear security, waste management, nonproliferation as well as radiation protection and emergency preparedness) for the benefit of the host countries and the international community as well as Sweden. This report gives an overview of all the projects implemented in 2011. The project managers from SSM are the cornerstones of our successful work, but all the efforts and dedication by staff members of the facilities and authorities in the mentioned countries are indispensable for the long-term positive outcomes. This report is meant to serve as a detailed account regarding SSM's efforts as part of the Swedish international activities, on which Sweden will report to the Nuclear Security Summit in Seoul. The parties to the G-8 Global Partnership have in June 2011 extended the Global Partnership for ten more years, till 2022. Other international frameworks, such as the UNSC Resolution 1540, remain a vibrant instrument by which UN Member States can exchange information on security concerns and request assistance from each other. The projects that SSM implements in Moldova and Georgia have a reference to the aims and purposes of the UNSC Resolution 1540. Much work has been done in the fields of nuclear security and safety, but there are still lots of issues that need to be taken care of. As such, SSM will continue to do its part for nuclear safety and security at the international level, along the lines and priorities set by our Government.

  8. The Arctic Region: A Requirement for New Security Architecture?

    Science.gov (United States)

    2013-03-01

    cooperation and mutually beneficial partnerships . Denmark’s security policy states that existing international law and established forums of cooperation...increase leadership in multinational forum and, develop comprehensive partnerships without the need to create a new security organization. Figure 3...Arctic region. Endnotes 1 Government of Canada, “Canada’s Arctic foreign policy” (Ottawa, Canada, 2007), 2. 2 WWF Global, “Arctic oil and gas”, http

  9. Effect of Cooperative Learning and Traditional Methods on Students' Achievements and Identifications of Laboratory Equipments in Science-Technology Laboratory Course

    Science.gov (United States)

    Aydin, Suleyman

    2011-01-01

    Science lessons taught via experiments motivate the students, and make them more insistent on learning science. This study aims to examine the effects of cooperative learning on students' academic achievements and their skills in identifying laboratory equipments. The sample for the study consisted of a total of 43 sophomore students in primary…

  10. Security dimension of the Canada-EU relationship

    Directory of Open Access Journals (Sweden)

    O. M. Antokhiv­Skolozdra

    2014-05-01

    In particular, it defines that the Canadian Government accepted the fact of strengthening the security part of the European Union activity in a reserved manner, as it could cause decrease in influence of this North American State in Euro­Atlantic area. It outlines the main directions of cooperation, scrutinizes institutional mechanisms of interaction and emphasizes the key challenges of security dimension of bilateral relations.  It deals with the peculiarities of Canada’s participation in military and civil actions under the auspices of the European Union and stresses that the limited military potential of Ottawa makes its effective participation in bilateral cooperation with the European partners less possible. It stresses the adherence of priority in relations between Canada and the United States in security sphere and underlines the significant role of the North Atlantic Treaty Organization in its interaction on the security and defense issues between Canada and the European Union. It emphasizes that the official Ottawa insists on NATO playing the leading role in providing security in Euro­Atlantic area. It illustrates, however, that due to a number of reasons, in particular, lack of initiative in advancing European security and defense policy, the Canadian Government on current stage don’t present particular interest in activating interaction with their European partners in this sphere. It depicts also that Canada and the European Union have started developing cooperation outside ESDP on domestic security, in particular, on struggle against organized crime and other challenges of current society, which has encouraged institutionalization in relationship of the European Union and the Europol.

  11. Latvian Security and Defense Policy within the Twenty-First Century Security Environment

    Directory of Open Access Journals (Sweden)

    Rublovskis Raimonds

    2014-12-01

    Full Text Available The aim of this paper is to analyze fundamental factors which form and profoundly shape security and defense policy of the Republic of Latvia. One can argue that historical background, geographical location, common institutional history within the former Soviet Union, the Russia factor, the relative smallness of the territory of state and the population, the ethnic composition of the population, the low density of the population and rather limited financial and manpower resources available for the defense of the Republic of Latvia are the key factors of influence on the state security and defense policy. The core principles of the security and defense policy of Latvia are the membership in powerful global military alliance of NATO and bilateral strategic partnership with the United States. However, security and defense cooperation among the three Baltic States as well as enhanced cooperation within the Baltic-Nordic framework is seen as an important supplementary factor for the increased security of the Republic of Latvia. Latvia has developed a sustainable legal and institutional framework in order to contribute to state security and defense; however, security challenges and significant changes within the global security environment of the twenty-first century will further challenge the ability of the Republic of Latvia to sustain its current legal framework, and more importantly, current institutional structure of Latvian security and defense architecture. Significant internal and external challenges will impact the fundamental pillars of Latvian security and defense policy, such as American strategic shift to the Pacific, and lack of political will to increase defense budgets in European part of NATO. It has to be clear that very independence, security and defense of the Republic of Latvia depend on the ability of NATO to remain an effective organization with timely and efficient decision-making, and the ability of the United States to remain

  12. Non-cooperative game theory in biology and cooperative reasoning in humans.

    Science.gov (United States)

    Kabalak, Alihan; Smirnova, Elena; Jost, Jürgen

    2015-06-01

    The readiness for spontaneous cooperation together with the assumptions that others share this cooperativity has been identified as a fundamental feature that distinguishes humans from other animals, including the great apes. At the same time, cooperativity presents an evolutionary puzzle because non-cooperators do better in a group of cooperators. We develop here an analysis of the process leading to cooperation in terms of rationality concepts, game theory and epistemic logic. We are, however, not attempting to reconstruct the actual evolutionary process. We rather want to provide the logical structure underlying cooperation in order to understand why cooperation is possible and what kind of reasoning and beliefs would lead to cooperative decision-making. Game theory depends on an underlying common belief in non-cooperative rationality of the players, and cooperativity similarly can utilize a common belief in cooperative rationality as its basis. We suggest a weaker concept of rational decision-making in games that encompasses both types of decision-making. We build this up in stages, starting from simple optimization, then using anticipation of the reaction of others, to finally arrive at reflexive and cooperative reasoning. While each stage is more difficult than the preceding, importantly, we also identify a reduction of complexity achieved by the consistent application of higher stage reasoning.

  13. ASEAN energy cooperation an increasingly daunting challenge

    Energy Technology Data Exchange (ETDEWEB)

    Nicolas, F.

    2009-07-01

    energy appears to be an ideal area for cooperation: given the characteristics of these economies, and in particular their shared concerns with energy security, it seems logical for them to push for resource sharing and interconnecting so as to enhance security. Energy cooperation has indeed been on ASEAN's agenda for a long time and the recent rise in oil prices has no doubt rekindled interest in cooperative initiatives in the energy sector. However, an oft-heard criticism about ASEAN is that it tends to be often long on good intentions and relatively short on actions. The objective of the present paper is two-fold, first to survey and assess critically ASEAN's achievements in the area of energy cooperation, and secondly to examine the future prospects, as well as the limitations of further cooperation. In this context, the appropriate scope for further cooperation, in particular its extension beyond the borders of ASEAN, needs to be examined. The paper is organized in two parts. The first part provides a brief overview of the energy situation in ASEAN. The second part assesses the various cooperative initiatives undertaken by ASEAN and examines the opportunities and challenges associated with the extension of energy cooperation beyond the borders of ASEAN. (author)

  14. ASEAN energy cooperation an increasingly daunting challenge

    International Nuclear Information System (INIS)

    Nicolas, F.

    2009-01-01

    to be an ideal area for cooperation: given the characteristics of these economies, and in particular their shared concerns with energy security, it seems logical for them to push for resource sharing and interconnecting so as to enhance security. Energy cooperation has indeed been on ASEAN's agenda for a long time and the recent rise in oil prices has no doubt rekindled interest in cooperative initiatives in the energy sector. However, an oft-heard criticism about ASEAN is that it tends to be often long on good intentions and relatively short on actions. The objective of the present paper is two-fold, first to survey and assess critically ASEAN's achievements in the area of energy cooperation, and secondly to examine the future prospects, as well as the limitations of further cooperation. In this context, the appropriate scope for further cooperation, in particular its extension beyond the borders of ASEAN, needs to be examined. The paper is organized in two parts. The first part provides a brief overview of the energy situation in ASEAN. The second part assesses the various cooperative initiatives undertaken by ASEAN and examines the opportunities and challenges associated with the extension of energy cooperation beyond the borders of ASEAN. (author)

  15. Conflict and cooperation in cyberspace the challenge to national security

    CERN Document Server

    Yannakogeorgos, Panayotis A

    2016-01-01

    Facilitated by the exceptional handiwork of the editors, this book significantly advances the effort to achieve common ground in the debates regarding cyberspace. National security and cyber-related professionals will find it equally useful in their work.-Lt. Gen Bob Elder, USAF (Retired)In this wide-ranging anthology that encompasses expert viewpoints from military, civilian, and private sector contributors, the editors seek to provide a broad framework of issues to be considered. Rather than provide definitive answers (all of the contributors readily admit that none exist), the contributors state that in order to attain the right answers, we must first ask the right questions. Over the course of the book, the authors put forth a common set of concerns to frame the issue at hand. ... The authors undertake a study of how to apply cyber law to cyber war, warning that allowing the Intelligence Community and the military to assist in the defense of privately owned networks may lead to legal and political consequ...

  16. Revisiting the soft security debate: From European progress to ...

    African Journals Online (AJOL)

    Given the extended scope of security sectors falling within the ambit of soft security regional co-operation is indispensable – a phenomenon most visible in European security architecture and that of Northern Europe in particular. Not only European decision-makers, however, pursue the soft security option. As Africa entered ...

  17. "Recruitment to the organsization for security and co-operation in Europe`s mission to Bosnia- Herzegovina" : applying organizational theory to effective peacebuilding

    OpenAIRE

    Nørgaard, Benedicte

    2005-01-01

    Research on international peacebuilding has paid very little attention to the possible influence of internal organizational structures within the organizations carrying out the work. This thesis seeks to add to this knowledge, by providing insights into the recruitment and selection process of the Organization for Security and Co-operation in Europe (OSCE) in Bosnia-Herzegovina (BiH). The purpose of this study is to build knowledge about how the OSCE recruit, and use that knowledge to better ...

  18. China boosts support for IAEA development and security initiatives

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: Marking 20 years of cooperation with the International Atomic Energy Agency (IAEA), China announced today that it would donate US$1 million to IAEA's special funds for technical cooperation and enhanced nuclear security. Welcoming the contribution, IAEA Director General Mohamed ElBaradei said, 'The IAEA is grateful for China's continuing generosity in supporting our technical cooperation and security programmes in the nuclear field. The IAEA has forged an excellent partnership with China over the past two decades - one of the most far-reaching partnerships we have with any Member State, extending across the spectrum of IAEA work from safety and security, to safeguards and verification, to technical cooperation in food, energy, water and health. China has been both a major recipient and contributor to IAEA special funds since it joined the IAEA in 1984. China has been an active participant in the IAEA Technical Cooperation (TC) programme, receiving more than US$22 million in assistance through 103 TC projects, in particular in the fields of nuclear safety, engineering and technology. China has also been a major contributor to the TC Fund, with some $11 million in cash and $400,000 of in-kind support. The IAEA's TC Programme disburses more than US$75 million worth of expert services, fellowships, equipment and training workshops per year in approximately 110 countries and territories. The Agency works in partnership with project counterparts in the recipient Member States, typically in the government's atomic energy authority as well as with health, food and agriculture, environment and water authorities. In addition, The Agency collaborates with the World Bank and other UN organizations to plan and execute projects in harmony with Member States' needs. In March 2002, the IAEA launched a 'Plan of Activities to Protect Against Nuclear Terrorism,' which enhanced and integrated the Agency's existing nuclear security-related activities. These activities

  19. Grouped to Achieve: Are There Benefits to Assigning Students to Heterogeneous Cooperative Learning Groups Based on Pre-Test Scores?

    Science.gov (United States)

    Werth, Arman Karl

    Cooperative learning has been one of the most widely used instructional practices around the world since the early 1980's. Small learning groups have been in existence since the beginning of the human race. These groups have grown in their variance and complexity overtime. Classrooms are getting more diverse every year and instructors need a way to take advantage of this diversity to improve learning. The purpose of this study was to see if heterogeneous cooperative learning groups based on student achievement can be used as a differentiated instructional strategy to increase students' ability to demonstrate knowledge of science concepts and ability to do engineering design. This study includes two different groups made up of two different middle school science classrooms of 25-30 students. These students were given an engineering design problem to solve within cooperative learning groups. One class was put into heterogeneous cooperative learning groups based on student's pre-test scores. The other class was grouped based on random assignment. The study measured the difference between each class's pre-post gains, student's responses to a group interaction form and interview questions addressing their perceptions of the makeup of their groups. The findings of the study were that there was no significant difference between learning gains for the treatment and comparison groups. There was a significant difference between the treatment and comparison groups in student perceptions of their group's ability to stay on task and manage their time efficiently. Both the comparison and treatment groups had a positive perception of the composition of their cooperative learning groups.

  20. Contribution of international cooperation in achieving the Romanian nuclear power objectives

    International Nuclear Information System (INIS)

    Diaconu, Daniela

    2002-01-01

    The international cooperation implied by the Romanian nuclear power program has on the short term the goal of supporting the Romanian effort of obtaining new nuclear fuels, improving the radioactive waste management, developing the technology and software transfer, training of Romanian researchers and participations in international projects. On long term the international cooperation is aiming at rising the scientific standards and the degree of global integration of Romanian research and technology. This policy is supported also by the agreements convened with different international organizations as for instance 'The Agreement for Nuclear Safety' or 'Common agreement for safe management of spent fuel and radioactive waste'. The INR at Pitesti and CITON - Bucharest are involved in works for cooperation technical projects supported by IAEA Vienna aiming at the nuclear safe and safeguard and power programs. At present underway are research contracts concerning the CANDU pressure tube, the corrosion in the primary cooling circuit of the CANDU reactors, as well as, the behavior under irradiation and intermediate disposal of oxide fuels. In the frame of IAEA assisted technical programs the TRIGA reactor of INR Pitesti is transferred from HEU to LEU fuels, new technologies for using recovered uranium and slightly enriched uranium fuels are developed, as well as a data acquisition system with advanced on-line characteristics. The cooperation between INR Pitesti and AECL Canada comprised in the frame of the 1998 agreement is oriented towards three fields of common interest: nuclear safety, nuclear fuel and management of in-service life of NPPs. Already transferred were computer codes from AECL devoted to accident analysis (WIMS, CATHENA and ELOCA) which were implemented and reproduced accurately all the test cases provided by AECL. For installing these codes specialists from our institute participated in training courses, on-the-job training, as well as, in validation

  1. Promoting global safeguards cooperation: Argentine-U.S. technical achievements

    International Nuclear Information System (INIS)

    Owens, L.; Smith, C.

    1996-01-01

    The bilateral ENREN (Argentina National Nuclear Regulatory Board)-DOE Safeguards Agreement was signed by Dr. Dan Beninson, ENREN, and Dr. Kenneth Baker, DOE, at the Peaceful Uses Conference in Bariloche in 1994. Two major activities identified for immediate cooperation were: nondestructive assay (NDA) techniques for Pilcaniyeu, and advanced containment and surveillance at Embalse. Both of these are discussed here. While the activities of the past year and a half are significant, many more opportunities remain for valuable cooperative partnering to discover more effective and efficient ways to apply safeguards. Several that have been identified by ENREN and DOE for 1996 are: (1) environmental monitoring as a safeguards technique; (2) Pilcaniyeu measurement studies and joint IAEA support program activities; (3) information management and analysis tools; (4) safeguards analytical laboratory support; (5) study of the safeguards approach for Embalse; (6) expansion of the remote monitoring system at Embalse; (7) use of ground-penetrating radar technology at Embalse; and (8) computerized material control and accounting tools for Pilcaniyeu

  2. Indonesian Maritime Security Cooperation In the Malacca Straits

    Science.gov (United States)

    2015-06-01

    Chokepoints,” July 2, 2005, http://www.wallstreetbear.com/board/view.php?topic=31801&post=103853. 86 Sam Bateman , Joshua Ho, and Jane Chan, Good...Cooperation as Part of the Solution to Piracy—The Importance of ReCAAP in Southeast Asia.” Master’s thesis, Lund University, 2012. Bateman , Sam, Joshua

  3. European Union security policy through strategic culture

    Directory of Open Access Journals (Sweden)

    Beriša Hatidža

    2014-01-01

    Full Text Available In this paper, we shall pay attention to the security policy of the European Union, through the strategic culture, starting from the existing various options for cooperation in the field of security and defense. Our goal is to look at the implementation of the Strategic Culture of the European Union (EU SK, research ways to improve the international position of the Union and its impact on policy cooperation and trust with other collectives. Analysis of flexible cooperation between the European Union, as well as access to special procedures in the field of security and defense policy, we will follow the ambition and capacity in implementing the same. Paper aims to introduce the idea of the European Union, which allows its members to rationally consider and check the box of options available to decision makers. In this regard, the EU seeks to build its own armed forces to protect the association of interests-investment terms. Reviewing and understanding the strategic culture of the EU by countries that are not its members can be seen as reasons for strengthening the capacity of the Union for the realization of the impact of the global security as well as predicting its future steps.

  4. ENHANCING STUDENTS‟ MOTIVATION AND ACHIEVEMENT IN LEARNING GRAMMAR THROUGH CONTEXTUAL TEACHING AND LEARNING THROUGH RELATING, EXPERIENCING, APPLYING, COOPERATING AND TRANSFERRING (REACT STRATEGY

    Directory of Open Access Journals (Sweden)

    Mashlihatul Umami Umami

    2017-04-01

    Full Text Available This research addresses the issue of whether Contextual Teaching and Learning (CTL through REACT (Relating, Experiencing, Applying, Cooperating and Transferring strategy is able to enhance motivation and achievement of English Department students‘ in learning grammar. The researcher uses a classroom action research in which it was held for about two cycles. The instruments of collecting the data are observation, rubric, questionaire and test. The researcher analyzes the data using three steps, i.e. students‘ motivation to learn are analyzed by the sheet of observation, each of individuals is also analyzed by fulfilling the questionnaire of self assessment, the progress of students‘ motivation and achievement are all monitored by rubric assessment tool, seven components of REACT strategy in learning is also recorded by the sheets of observation and the statistical analysis using t-test measures the improvement occurred. In addition, the researcher prepares field note and questionnaire to monitor the process of learning. Based on the results of qualitative-quantitative analysis, it can be found that the use of CTL approach especially using project based and cooperative learning improves the students‘ motivation and achievement in learning grammar.

  5. The IAEA Assistance Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard R [ORNL; Hawk, Mark B [ORNL; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  6. The Impact of a Cooperative Learning Program on the Academic Achievement in Mathematics and Language in Fourth Grade Students and its Relation to Cognitive Style

    Directory of Open Access Journals (Sweden)

    Mery Luz Vega-Vaca

    2015-07-01

    Full Text Available This study is expected to determine the impact of a program based on the cooperative learning methodology. This, in comparison to a traditional learning situation in both mathematics and language achievement. The study was carried out on a group of fourth grade students of primary school. In addition, it tried to find the differential impact according to the cognitive style in the field dependence-independence dimension. This work was carried out with 76 students of the Colegio José Martí I.E.D. (Bogotá-Colombia ranging from 8-12 years of age. The control group received a traditional teaching methodology and the experimental group received the cooperative learning program, composed of 35 sessions (from July to November 2009. All the participants were tested in mathematics and language performance, before and after the intervention. All of them were tested in cognitive style as well. The results suggested that the cooperative learning methodology benefited importantly the academic achievement of the students in mathematics in contrast to the competitive and individualist situations. The results also suggested that the three cognitive style groups were positively affected from the cooperative learning situation. These results were not found in the language area.

  7. Secure Cooperative Data Access in Multi-Cloud Environment

    Science.gov (United States)

    Le, Meixing

    2013-01-01

    In this dissertation, we discuss the problem of enabling cooperative query execution in a multi-cloud environment where the data is owned and managed by multiple enterprises. Each enterprise maintains its own relational database using a private cloud. In order to implement desired business services, parties need to share selected portion of their…

  8. Security for multi-hop wireless networks

    CERN Document Server

    Mahmoud, Mohamed M E A

    2014-01-01

    This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security

  9. Securing personnel in nuclear fuel cycle research and development in Japan

    International Nuclear Information System (INIS)

    Sekino, H.

    1993-01-01

    The PNC, a japanese governmental research and development organization, is concerned with research and development into building and operating advanced power reactors and R and D into the whole cycle of the nuclear fuel. PNC promotes international cooperation with the USA and European countries as well as technical cooperation with the private sectors in uranium enrichment, reprocessing and advanced reactor development. This report discusses the current situation and problems in securing PNC personnel, in securing 'loan' staff for PNC, and in personnel exchanges for technical transfer and international cooperation. 5 figs

  10. Nuclear Security and Nuclear Safeguards; Differences, Commonalities and Synergies

    International Nuclear Information System (INIS)

    Jorant, C.

    2015-01-01

    Reference to the three S's in the nuclear world is recurring and much has been said about the need to build on synergies to reinforce safeguards, safety and security. In practice, the 3S's communities are seldom interconnected even though some interaction can be observed between safety and security and security and safeguards. Ensuring a better understanding between those three sectors about their scope, requirements, implementation methods and tools would stimulate cooperation. The second Nuclear Security Summit and particularly the industry related event stressed the synergies between safety and security. The first IAEAs Security Conference organized in July 2013 did not address specifically nuclear safeguards and security relations. Last Security Summit took place in The Hague in March 2014 and this type of issue was not really raised either. The safeguards Symposium provides a timely opportunity to tackle possible enhanced cooperation between safeguards and security communities and assess the prospect for addressing such issue at the next and allegedly last security summit in 2016. This presentation will analyze the differences and commonalities between those two sectors, in particular with regards to the objectives and actors, the organization and technicalities, or to the conceptual approaches (DBT and APA/SLC, attractiveness/accessibility). It will then assess the possible synergies or cooperation between both communities. It will discuss the merits of a global and comprehensive involvement of the different actors, (State, industry and international bodies including the NGOs) and of exchanges on good practices to contribute to a common understanding and references while allowing for an adaptable and national approach. Indeed the need to reassure the stakeholders, including the general public, that security, as well as safeguards are addressed in a consistent manner worldwide is of utmost importance for building future nuclear energy programmes on a

  11. Disarmament and national security in an interdependent world

    International Nuclear Information System (INIS)

    Petrovsky, V.

    1993-01-01

    The three notions, disarmament, national security and interdependence, which are well known, need a new reading in the today's mission for the United Nations, to facilitate the democratic, evolutionary renewal of the the interdependent world, in which disarmament could play an important role without putting at risk national security, which is of primary concern for the majority of Member States. The recognition of the unity of the wold and its interdependence is the main focal point in the process of transition of the international community to the new world system of peace, cooperation and security based on United Nations Charter. This system was outlined at the Forty-fourth session of the General Assembly, and adopted by Member States as a resolution entitled 'Enhancing international peace, security and international cooperation in all its aspects in accordance with the Charter of United Nations'

  12. A thirsty dragon. Rising Chinese crude oil demand and prospects for multilateral energy security cooperation

    Energy Technology Data Exchange (ETDEWEB)

    Causevic, Amar

    2012-07-01

    The Chinese appetite for energy could potentially result in two scenarios. Each of these will systematically be developed and examined in the course of this paper. The pessimistic scenario foresees energy-driven foreign policy placing China in a dangerous confrontation with the U.S., Japan, the EU and India. American, Indian and Chinese navies are already competing across the Indian Ocean, with participants upgrading their naval forces, building deep-sea ports, constructing military bases and forging alliances across the Indian Ocean. They have not yet entered into conflict, but as their naval presence increases, the possibility of an armed clash grows. This scenario represents a 'nightmare option' that could have grave consequences for the entire globe, as the U.S., China, India and two EU members are all states armed with nuclear weapons. Conversely, an opposite scenario can be envisaged. A liberal integrationist perspective offers huge potential for multilateral energy security cooperation. Despite all tensions, China, the West and India are oil importers, and, as consumers, they could work together in fostering common strategies. What is more, their economies are mutually intertwined, and any conflict would bring about fatal collateral damage to the economic well-being of all parties. In short, China and America and potentially India could synchronize approaches to energy issues and address worries about growing global competition for crude oil. Being that as it may, China's further integration into multilateral energy organizations - notably the Organisation for Economic Co-operation and Development (OECD) International Energy Agency (IEA) - will not be an easy task. Introduction of the new standards and requirements could be a burden for Chinese economic development. Membership in the IEA would reduce freedom in energy policy-making as it requires intelligencesharing, market liberalization and surrendering a certain degree of national

  13. Need for cooperative work in education

    Directory of Open Access Journals (Sweden)

    Rodolfo Acosta Padrón

    2006-12-01

    Full Text Available This paper claims for the use of cooperative work to achieve democratic, communicative and socializing learning; Furthermore, theoretical grounds for cooperative work are presented, from sociological and psychological positions about the development of cooperative work on the basis of Vigotsky, Kart Lewin and Dewey ́s works, among others.

  14. Computer security incident response team effectiveness : A needs assessment

    NARCIS (Netherlands)

    Kleij, R. van der; Kleinhuis, G.; Young, H.J.

    2017-01-01

    Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security. CSIRTs often have to work on an ad-hoc basis, in close cooperation with other teams, and in

  15. United States-Gulf Cooperation Council Security Cooperation in a Multipolar World

    Science.gov (United States)

    2014-10-01

    in U.S.-forged security alliances . Finally, the events of the Arab Spring beginning in 2010, which swept away several governments and have led to...wealthiest countries on a per capita basis. Storming ahead with post-modern skylines, and rapidly growing nonoil sectors such as tourism , culture, real...estate, and finance, many GCC members are now economic political brands in their own right, ranging from Dubai’s metropolism to Qatar’s knowledge

  16. US-French nuclear cooperation: its past, present and future

    International Nuclear Information System (INIS)

    Lewis, Jeffrey; Tertrais, Bruno

    2015-10-01

    It is now a matter of public record that France and the United States conducted in-depth cooperation on ballistic missiles and, later, on nuclear weapons safety and security starting with the Nixon and Pompidou Administrations. The existence of a deep France-US strategic nuclear cooperation exists as a historical counter-narrative to the notion of France as a fully independent nuclear power, but also as a reluctant US strategic partner. Today, both countries conceive of their interests globally, and share similar outlooks regarding strategic challenges from countries such as Russia, China, Pakistan, Iran and North Korea. The United States and France have worked particularly closely in the P5+1 context to reach a diplomatic solution to Iran's growing nuclear capabilities. As permanent members of the United Nations Security Council, they are key partners on crisis management, regarding Libya, Syria, or Ukraine. Cooperation on counter-terrorism has been stepped up since the events of January 2015 in France. The two countries cooperate closely in Sahel and in Iraq. This short briefing provides new information on past nuclear cooperation and seeks to address the following question: given the existence of deep US-UK and UK-French nuclear ties, would enhanced US-French cooperation - the 'third side of the triangle' - be useful either strategically, in terms of enhancing the stability of deterrence, or financially? (authors)

  17. Making Cooperative Learning Groups Work.

    Science.gov (United States)

    Hawley, James; De Jong, Cherie

    1995-01-01

    Discusses the use of cooperative-learning groups with middle school students. Describes cooperative-learning techniques, including group roles, peer evaluation, and observation and monitoring. Considers grouping options, including group size and configuration, dyads, the think-pair-share lecture, student teams achievement divisions, jigsaw groups,…

  18. Novel Concepts of Cooperative Wireless Networking

    DEFF Research Database (Denmark)

    Zhang, Qi

    2008-01-01

    ; secondly, the increasing density of the wireless devices makes cooperation possible; last, the cost of information exchange (i.e. transmission power, transmission time, spectrum, etc.) is very low if information exchange over short-range link is needed. Cooperation changes the way of information delivery......Although wireless networks have achieved great success in the lastest two decades, the current wireless networks have difficulties to fulll users' ever-increasing expectations and needs. It is mainly due to available spectrum resource scarcity, limited battery capacity of wireless device......, unreliable wireless radio link, etc. To tackle these issues, a new telecommunication paradigm has been proposed, referred to as cooperative wireless networking [1]. The basic idea of cooperative wireless networking is that wireless devices work together to achieve their individual goals or one common goal...

  19. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  20. PCI DSS: Security Standard and Security in Fact

    OpenAIRE

    M. V. Kuzin

    2011-01-01

    The article focuses on Payment Card Industry Data Security Standard (PCI DSS) requirements and practices, especially it’s issues and disadvantages to achieve the main goal — security of payment cards infrastructure.

  1. The hard problem of cooperation.

    Directory of Open Access Journals (Sweden)

    Kimmo Eriksson

    Full Text Available Based on individual variation in cooperative inclinations, we define the "hard problem of cooperation" as that of achieving high levels of cooperation in a group of non-cooperative types. Can the hard problem be solved by institutions with monitoring and sanctions? In a laboratory experiment we find that the answer is affirmative if the institution is imposed on the group but negative if development of the institution is left to the group to vote on. In the experiment, participants were divided into groups of either cooperative types or non-cooperative types depending on their behavior in a public goods game. In these homogeneous groups they repeatedly played a public goods game regulated by an institution that incorporated several of the key properties identified by Ostrom: operational rules, monitoring, rewards, punishments, and (in one condition change of rules. When change of rules was not possible and punishments were set to be high, groups of both types generally abided by operational rules demanding high contributions to the common good, and thereby achieved high levels of payoffs. Under less severe rules, both types of groups did worse but non-cooperative types did worst. Thus, non-cooperative groups profited the most from being governed by an institution demanding high contributions and employing high punishments. Nevertheless, in a condition where change of rules through voting was made possible, development of the institution in this direction was more often voted down in groups of non-cooperative types. We discuss the relevance of the hard problem and fit our results into a bigger picture of institutional and individual determinants of cooperative behavior.

  2. The hard problem of cooperation.

    Science.gov (United States)

    Eriksson, Kimmo; Strimling, Pontus

    2012-01-01

    Based on individual variation in cooperative inclinations, we define the "hard problem of cooperation" as that of achieving high levels of cooperation in a group of non-cooperative types. Can the hard problem be solved by institutions with monitoring and sanctions? In a laboratory experiment we find that the answer is affirmative if the institution is imposed on the group but negative if development of the institution is left to the group to vote on. In the experiment, participants were divided into groups of either cooperative types or non-cooperative types depending on their behavior in a public goods game. In these homogeneous groups they repeatedly played a public goods game regulated by an institution that incorporated several of the key properties identified by Ostrom: operational rules, monitoring, rewards, punishments, and (in one condition) change of rules. When change of rules was not possible and punishments were set to be high, groups of both types generally abided by operational rules demanding high contributions to the common good, and thereby achieved high levels of payoffs. Under less severe rules, both types of groups did worse but non-cooperative types did worst. Thus, non-cooperative groups profited the most from being governed by an institution demanding high contributions and employing high punishments. Nevertheless, in a condition where change of rules through voting was made possible, development of the institution in this direction was more often voted down in groups of non-cooperative types. We discuss the relevance of the hard problem and fit our results into a bigger picture of institutional and individual determinants of cooperative behavior.

  3. Energy security and national policy

    International Nuclear Information System (INIS)

    Martin, W.F.

    1987-01-01

    To achieve an energy secure future, energy cannot be viewed as an isolated concern. It is part and parcel of a nation's economic, social, and political context. In the past important implications for the economy and national security have been ignored. Crash programs to deal with oil shortages in the seventies, crashed. In the eighties, oil surplus has been enjoyed. The energy situation could be quite different in the nineties. Statistics on energy supply and consumption of oil, coal, natural gas and electricity from nuclear power show that much progress has been made worldwide. However, about half of the world's oil will come from the Persian Gulf by 1995. Continued low oil prices could raise US imports to 60% of consumption by 1995. Persian Gulf tensions serve as reminders of the link between energy policy and national security policy. Energy policy must be based on market forces and concerns for national security. Strategic oil reserves will expand along with the availability of domestic oil and gas resources. Increased attention to conservation, diversification of energy resources, and use of alternative fuels can help reduce imports. Continued high-risk long term research and development is needed. Improved technology can reduce environmental impacts. Global markets need global cooperation. Energy has emerged as an important aspect of East-West relations. Europeans need to diversify their sources of energy. The soviets have proposed expanded collaboration in magnetic fusion science. A series of initiatives are proposed that together will ensure that economies will not become overly dependent on a single source of energy

  4. Regional disarmament and security issues. Report of working group II

    International Nuclear Information System (INIS)

    Ravenhill, J.

    1994-01-01

    Substantial progress has been made in building cooperation in the Asia-pacific region in remarkably short period of time. Problems of regional disarmament are analysed by linking the economic and security issues. International cooperation regimes, whether in the military sphere, such as the Non-proliferation treaty, or in the trade sphere such as the General Agreement on Tariffs and Trade, inevitably impose restrictions on the autonomy of member States. The integrity of the regime depends on countries' acceptance of the obligations it imposes. The task ahead is to convince all countries in the region that cooperation in the security sphere will be of even greater long-term benefit

  5. Formation, “Gold Rule” for the cooperative development

    Directory of Open Access Journals (Sweden)

    Alcides López Labrada

    2013-06-01

    Full Text Available Before the arising of the cooperative movement in the world, cooperation already existed. So, it is logical to affirm that there can be cooperation without cooperative movement. But there cannot be cooperative movement without cooperation, because cooperation is an indispensable premise for the existence of cooperative movement. Both the precursors of the cooperative movement and the classics of Marxism agreed on the necessity of cooperative formation. Lenin called socialism “the regime of cultured cooperators” and the International Cooperative Alliance (ICA contemplated the following, among the seven universal principles of the cooperative movement: education, formation and training of cooperative members, as one of the most important and strategic principles. They have been recognized as the golden rule of the cooperative movement. The changes occurred in Cuba (the existence and evolution of different types of cooperatives, the updating of the economic model, the dynamics of the agrarian sector and the opening of the cooperative movement towards other sectors of the National Economy fully justify the achievement of a cooperative culture, not only of cooperative members but also the actors that perform around cooperatives, the decision- makers and all society. Among the most significant proposals for the achievement of a cooperative culture in Cuba the following can be found: to integrate the different actors that participate in the cooperative formation by means of a national network for cooperative formation by identifying the training demand and training the people that should really implement the change, while building capacities of all the individuals involved in the cooperative movement in a direct or indirect way.

  6. Example of a single national regulator responsible for both transport safety and security

    International Nuclear Information System (INIS)

    Karhu, P.; Lahkola, A.; Markkanen, M.; Hellstén, S.

    2016-01-01

    Safety and security in the use of nuclear energy and in the use of radiation, including the transport of nuclear and other radioactive material, share a common objective: to protect people, society, environment, and future generations from the harmful effects of ionizing radiation. Some measures for safety contribute to those for security, and vice versa, while some requirements of one conflict with those of the other. The differences in the requirements arise from the difference in the threat against which the measures are designed: accident vs. intent. A coordinated approach endeavours to take advantage of the similarities and to avoid the problems caused by the differences. One way to implement it is to have one competent authority responsible for the regulatory control of safety and security. It is the experience in Finland that this enables an efficient regulatory system. From the operators’ point of view, a one-stop shop regulatory authority ensures that requirements for safety and security are consistent. Both safety and security require the involvement of and cooperation between several authorities—regulatory, rescue, law enforcement—and operators. The approach in Finland is built on cooperation and a clear division of competences and responsibilities. One regulatory authority provides a fixed point of contact within the professional cooperation network as well as for the public. The one regulatory authority is also easily identifiable, as appropriate, as a point of contact in international cooperation in implementing nuclear and radiation safety and security. Whatever the national regulatory framework and the assignment of responsibilities between authorities, cooperation is essential in house, nationally, and internationally. (author)

  7. Structuring Cooperative Nuclear RIsk Reduction Initiatives with China.

    Energy Technology Data Exchange (ETDEWEB)

    Brandt, Larry [Stanford Univ., CA (United States); Reinhardt, Jason Christian [Stanford Univ., CA (United States); Hecker, Siegfried [Stanford Univ., CA (United States)

    2017-03-01

    The Stanford Center for International Security and Cooperation engaged several Chinese nuclear organizations in cooperative research that focused on responses to radiological and nuclear terrorism. The objective was to identify joint research initiatives to reduce the global dangers of such threats and to pursue initial technical collaborations in several high priority areas. Initiatives were identified in three primary research areas: 1) detection and interdiction of smuggled nuclear materials; 2) nuclear forensics; and 3) radiological (“dirty bomb”) threats and countermeasures. Initial work emphasized the application of systems and risk analysis tools, which proved effective in structuring the collaborations. The extensive engagements between national security nuclear experts in China and the U.S. during the research strengthened professional relationships between these important communities.

  8. Promoting Safe, Secure, and Peaceful Growth of Nuclear Energy: Next Steps for Russia and the United States

    OpenAIRE

    Bunn, Matthew G.; Vyacheslav P. Kuznetzov

    2010-01-01

    Russia, the United States and other countries must cooperate to enable large-scale growth of nuclear energy around the world while achieving even higher standards of safety, security, and nonproliferation than are in place today. This will require building a new global framework for nuclear energy, including new or strengthened global institutions. The Belfer Center's Managing the Atom (MTA) Project and the Russian Research Center's Kurchatov Institute developed these and additional recommend...

  9. The IAEA Assistance and Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Hawk, Mark B [ORNL; Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard [Transport Security and Safety, Oak Ridge; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  10. Addressing security, collaboration, and usability with tactical edge mobile devices and strategic cloud-based systems

    Science.gov (United States)

    Graham, Christopher J.

    2012-05-01

    Success in the future battle space is increasingly dependent on rapid access to the right information. Faced with a shrinking budget, the Government has a mandate to improve intelligence productivity, quality, and reliability. To achieve increased ISR effectiveness, leverage of tactical edge mobile devices via integration with strategic cloud-based infrastructure is the single, most likely candidate area for dramatic near-term impact. This paper discusses security, collaboration, and usability components of this evolving space. These three paramount tenets outlined below, embody how mission information is exchanged securely, efficiently, with social media cooperativeness. Tenet 1: Complete security, privacy, and data integrity, must be ensured within the net-centric battle space. This paper discusses data security on a mobile device, data at rest on a cloud-based system, authorization and access control, and securing data transport between entities. Tenet 2: Lack of collaborative information sharing and content reliability jeopardizes mission objectives and limits the end user capability. This paper discusses cooperative pairing of mobile devices and cloud systems, enabling social media style interaction via tagging, meta-data refinement, and sharing of pertinent data. Tenet 3: Fielded mobile solutions must address usability and complexity. Simplicity is a powerful paradigm on mobile platforms, where complex applications are not utilized, and simple, yet powerful, applications flourish. This paper discusses strategies for ensuring mobile applications are streamlined and usable at the tactical edge through focused features sets, leveraging the power of the back-end cloud, minimization of differing HMI concepts, and directed end-user feedback.teInput=

  11. Development of Secure and Sustainable Nuclear Infrastructure in Emerging Nuclear Nations Such as Vietnam

    International Nuclear Information System (INIS)

    Shipwash, Jacqueline L; Kovacic, Donald N

    2008-01-01

    The global expansion of nuclear energy will require international cooperation to ensure that nuclear materials, facilities, and sensitive technologies are not diverted to non-peaceful uses. Developing countries will require assistance to ensure the effective regulation, management, and operation of their nuclear programs to achieve best practices in nuclear nonproliferation. A developing nation has many hurdles to pass before it can give assurances to the international community that it is capable of implementing a sustainable nuclear energy program. In August of this year, the U.S. Department of Energy and the Ministry of Science and Technology of the Socialist Republic of Vietnam signed an arrangement for Information Exchange and Cooperation on the Peaceful Uses of Nuclear Energy. This event signals an era of cooperation between the U.S. and Vietnam in the area of nuclear nonproliferation. This paper will address how DOE is supporting the development of secure and sustainable infrastructures in emerging nuclear nations such as Vietnam

  12. Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes

    Directory of Open Access Journals (Sweden)

    Ji-Jian Chin

    2014-01-01

    Full Text Available Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user’s secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

  13. Efficient and provable secure pairing-free security-mediated identity-based identification schemes.

    Science.gov (United States)

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C-W

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

  14. Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices.

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, Laurence R.; Tejani, Bankim; Margulies, Jonathan; Hills, Jason L.; Richardson, Bryan T.; Baca, Micheal J.; Weiland, Laura

    2005-12-01

    Flexible Alternating Current Transmission Systems (FACTS) devices are installed on electric power transmission lines to stabilize and regulate power flow. Power lines protected by FACTS devices can increase power flow and better respond to contingencies. The University of Missouri Rolla (UMR) is currently working on a multi-year project to examine the potential use of multiple FACTS devices distributed over a large power system region in a cooperative arrangement in which the FACTS devices work together to optimize and stabilize the regional power system. The report describes operational and security challenges that need to be addressed to employ FACTS devices in this way and recommends references, processes, technologies, and policies to address these challenges.

  15. Generation Z, Meet Cooperative Learning

    Science.gov (United States)

    Igel, Charles; Urquhart, Vicki

    2012-01-01

    Today's Generation Z teens need to develop teamwork and social learning skills to be successful in the 21st century workplace. Teachers can help students develop these skills and enhance academic achievement by implementing cooperative learning strategies. Three key principles for successful cooperative learning are discussed. (Contains 1 figure.)

  16. PCI DSS: Security Standard and Security in Fact

    Directory of Open Access Journals (Sweden)

    M. V. Kuzin

    2011-12-01

    Full Text Available The article focuses on Payment Card Industry Data Security Standard (PCI DSS requirements and practices, especially it’s issues and disadvantages to achieve the main goal — security of payment cards infrastructure.

  17. Cooperative Mobile Web Browsing

    DEFF Research Database (Denmark)

    Perrucci, GP; Fitzek, FHP; Zhang, Qi

    2009-01-01

    This paper advocates a novel approach for mobile web browsing based on cooperation among wireless devices within close proximity operating in a cellular environment. In the actual state of the art, mobile phones can access the web using different cellular technologies. However, the supported data......-range links can then be used for cooperative mobile web browsing. By implementing the cooperative web browsing on commercial mobile phones, it will be shown that better performance is achieved in terms of increased data rate and therefore reduced access times, resulting in a significantly enhanced web...

  18. Brainjacking: Implant Security Issues in Invasive Neuromodulation.

    Science.gov (United States)

    Pycroft, Laurie; Boccard, Sandra G; Owen, Sarah L F; Stein, John F; Fitzgerald, James J; Green, Alexander L; Aziz, Tipu Z

    2016-08-01

    The security of medical devices is critical to good patient care, especially when the devices are implanted. In light of recent developments in information security, there is reason to be concerned that medical implants are vulnerable to attack. The ability of attackers to exert malicious control over brain implants ("brainjacking") has unique challenges that we address in this review, with particular focus on deep brain stimulation implants. To illustrate the potential severity of this risk, we identify several mechanisms through which attackers could manipulate patients if unauthorized access to an implant can be achieved. These include blind attacks in which the attacker requires no patient-specific knowledge and targeted attacks that require patient-specific information. Blind attacks include cessation of stimulation, draining implant batteries, inducing tissue damage, and information theft. Targeted attacks include impairment of motor function, alteration of impulse control, modification of emotions or affect, induction of pain, and modulation of the reward system. We also discuss the limitations inherent in designing implants and the trade-offs that must be made to balance device security with battery life and practicality. We conclude that researchers, clinicians, manufacturers, and regulatory bodies should cooperate to minimize the risk posed by brainjacking. Copyright © 2016 Elsevier Inc. All rights reserved.

  19. Technical cooperation report for 2003. Report by the Director General

    International Nuclear Information System (INIS)

    2004-08-01

    all parts of the Secretariat. Nuclear medicine projects increased the availability of cancer diagnosis and treatment and improved the radiation protection of patients and technicians. Local consumption and export of crops from developing countries have been increased with support from the Agency through the use of the sterile insect technique as well as improved varieties of fruits and legumes resistant to disease and drought. Achievements in identifying water resources and mapping aquifer flows were also made using isotope hydrology methods. In the Europe region, the Agency contributed to returning high enriched uranium fuel to the country of origin and converting research reactor fuel to low-enriched uranium. In addition, upgrading radiation protection infrastructures in all regions has had continued success. The year had many accomplishments, as well as challenges. Early in 2003, the severe acute respiratory syndrome (SARS) erupted in the East Asia and the Pacific region, halting workshops and training sessions for a period of time. Security-related issues also hampered programme implementation in several regions. In addition, the unpredictability of payments to the Technical Cooperation Fund put into question the implementation of the full programme planned for 2003-2004. As a result of a shortfall in resources to the Technical Cooperation Fund at the end of 2003, the 2004 technical cooperation programme had to be reduced and the Board was asked to authorize an increase in over programming to 20% through June 2004.Thanks to significant efforts by a number of Member States during the first quarter of 2004, additional payments to the Technical Cooperation Fund for 2003 were made, resulting in a rate of attainment of 86.8% as of 31 March 2004. In addition, Member States made efforts to pay their target shares for 2004 earlier than has been the practice in the past. This permitted the Secretariat to restore many of the activities that had been postponed or cancelled

  20. Technical cooperation report for 2003. Report by the Director General

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-08-01

    all parts of the Secretariat. Nuclear medicine projects increased the availability of cancer diagnosis and treatment and improved the radiation protection of patients and technicians. Local consumption and export of crops from developing countries have been increased with support from the Agency through the use of the sterile insect technique as well as improved varieties of fruits and legumes resistant to disease and drought. Achievements in identifying water resources and mapping aquifer flows were also made using isotope hydrology methods. In the Europe region, the Agency contributed to returning high enriched uranium fuel to the country of origin and converting research reactor fuel to low-enriched uranium. In addition, upgrading radiation protection infrastructures in all regions has had continued success. The year had many accomplishments, as well as challenges. Early in 2003, the severe acute respiratory syndrome (SARS) erupted in the East Asia and the Pacific region, halting workshops and training sessions for a period of time. Security-related issues also hampered programme implementation in several regions. In addition, the unpredictability of payments to the Technical Cooperation Fund put into question the implementation of the full programme planned for 2003-2004. As a result of a shortfall in resources to the Technical Cooperation Fund at the end of 2003, the 2004 technical cooperation programme had to be reduced and the Board was asked to authorize an increase in over programming to 20% through June 2004.Thanks to significant efforts by a number of Member States during the first quarter of 2004, additional payments to the Technical Cooperation Fund for 2003 were made, resulting in a rate of attainment of 86.8% as of 31 March 2004. In addition, Member States made efforts to pay their target shares for 2004 earlier than has been the practice in the past. This permitted the Secretariat to restore many of the activities that had been postponed or cancelled

  1. Energy policy alliances and cooperative games: a survey of issues and solution concepts

    Energy Technology Data Exchange (ETDEWEB)

    Toman, M.A.

    1982-11-01

    This paper reviews obstacles to international agreement and of analytical approaches to describing foreign alliance formation and conflict resolution relative to energy security policies and preparedness. While these models provide useful intuitive insight on the nature of interactions among oil importing countries they have limited practical applicability in formulating testable hypotheses about international behavior. Thus to more fully understand international institutions created by sovereign nations to achieve greater energy security, different strands of the theory must be combined with factual knowledge and preceptions of different countries' incentives and objectives. The paper also reviews the public good nature of international agreements and the resulting obstacles to creating viable alliances. Subsequent sections provide a critical survey of various theoretical approaches to describing cooperative agreements. The concluding section summarizes deficiencies in existing theory and discusses the practical information required to better understand international institutions and behavior.

  2. Data Acquisition Based on Stable Matching of Bipartite Graph in Cooperative Vehicle-Infrastructure Systems.

    Science.gov (United States)

    Tang, Xiaolan; Hong, Donghui; Chen, Wenlong

    2017-06-08

    Existing studies on data acquisition in vehicular networks often take the mobile vehicular nodes as data carriers. However, their autonomous movements, limited resources and security risks impact the quality of services. In this article, we propose a data acquisition model using stable matching of bipartite graph in cooperative vehicle-infrastructure systems, namely, DAS. Contents are distributed to roadside units, while vehicular nodes support supplementary storage. The original distribution problem is formulated as a stable matching problem of bipartite graph, where the data and the storage cells compose two sides of vertices. Regarding the factors relevant with the access ratio and delay, the preference rankings for contents and roadside units are calculated, respectively. With a multi-replica preprocessing algorithm to handle the potential one-to-many mapping, the matching problem is addressed in polynomial time. In addition, vehicular nodes carry and forward assistant contents to deliver the failed packets because of bandwidth competition. Furthermore, an incentive strategy is put forward to boost the vehicle cooperation and to achieve a fair bandwidth allocation at roadside units. Experiments show that DAS achieves a high access ratio and a small storage cost with an acceptable delay.

  3. Trust Model to Enhance Security and Interoperability of Cloud Environment

    Science.gov (United States)

    Li, Wenjuan; Ping, Lingdi

    Trust is one of the most important means to improve security and enable interoperability of current heterogeneous independent cloud platforms. This paper first analyzed several trust models used in large and distributed environment and then introduced a novel cloud trust model to solve security issues in cross-clouds environment in which cloud customer can choose different providers' services and resources in heterogeneous domains can cooperate. The model is domain-based. It divides one cloud provider's resource nodes into the same domain and sets trust agent. It distinguishes two different roles cloud customer and cloud server and designs different strategies for them. In our model, trust recommendation is treated as one type of cloud services just like computation or storage. The model achieves both identity authentication and behavior authentication. The results of emulation experiments show that the proposed model can efficiently and safely construct trust relationship in cross-clouds environment.

  4. Internal and external dynamics of regional cooperation in Central Asia

    Directory of Open Access Journals (Sweden)

    Mirzokhid Rakhimov

    2010-07-01

    Challenges of the 21-century require a broader partnership and cooperation. Future prospects of multilateral regional and international cooperation in Central Asia will depend on correlations of national, regional and global interests. It is necessary first of all strong dialogs between Central Asian republics itself. Central Asian geopolitical, economic and security challenges are connected and solution could come jointly. Future regional cooperation, strong international partnership would promote more stability, economic reforms and democratization to region and beyond.

  5. Cooperative learning in industrial-sized biology classes.

    Science.gov (United States)

    Armstrong, Norris; Chang, Shu-Mei; Brickman, Marguerite

    2007-01-01

    This study examined the impact of cooperative learning activities on student achievement and attitudes in large-enrollment (>250) introductory biology classes. We found that students taught using a cooperative learning approach showed greater improvement in their knowledge of course material compared with students taught using a traditional lecture format. In addition, students viewed cooperative learning activities highly favorably. These findings suggest that encouraging students to work in small groups and improving feedback between the instructor and the students can help to improve student outcomes even in very large classes. These results should be viewed cautiously, however, until this experiment can be replicated with additional faculty. Strategies for potentially improving the impact of cooperative learning on student achievement in large courses are discussed.

  6. Encouraging Interaction by Applying Cooperative Learning

    Directory of Open Access Journals (Sweden)

    González Sonia Helena

    2001-08-01

    Full Text Available A project was conducted in order to improve oral interaction in English by applying cooperative learning to students of seventh grade. These students have lower levels of oral production and attend Marco Fidel Suárez public school. So, I decided to choose topics related to real life and to plan a series of activities of sensitization to create stable work groups and to increase oral interaction. According to the analysis and results, I can say that cooperative work and the oral activities help the students increase oral production, express better and use a foreign language with more security. In spite of the results, I consider that cooperative learning needs more time so that it can be successful. Students must have the will to cooperate. Only when students have that good will and can work together is the potential of acquisition of knowledge maximized.

  7. [Social Security Needs Social Medicine: Self-image of Physicians Practicing Social Medicine in Statutory Health Insurances and Social Security Systems].

    Science.gov (United States)

    Nüchtern, E; Bahemann, A; Egdmann, W; van Essen, J; Gostomzyk, J; Hemmrich, K; Manegold, B; Müller, B; Robra, B P; Röder, M; Schmidt, L; Zobel, A; von Mittelstaedt, G

    2015-09-01

    In January, 2014, the division "Social Medicine in Practice and Rehabilitation" of the German Society for Social Medicine and Prevention established a working group on the self-image of the physicians active in the field of social medicine (medical expertise and counseling). The result of this work is the contribution presented here after consensus was achieved by specialists of social medicine from different fields and institutions (social security etc.) and in good cooperation with Prof. Dr. Gostomzyk and Prof. Dr. Robra. Based on the importance of an up to date social medicine for claimants and recipients of benefits on the one hand and the social security system on the other, and also on a description of the subjects, objectives and methods the following aspects are presented: · The perspective of social medicine. · Qualification in social medicine, concerning specialist training and continuing medical education. · The fields of duty of experts in social medicine. · The proceedings in social medicine. The working group identified challenges for the specialists in social medicine by a narrowed perception of social medicine by physicians in hospitals and practice, accompanied by an enlarged importance of expertise in social medicine, by the demand for more "patient orientation" and gain of transparency, and concerning the scientific foundation of social medicine. The working group postulates: · The perspective of social medicine should be spread more widely.. · Confidence in experts of social medicine and their independency should be strengthened.. · The not case-related consulting of the staff and executives should be expanded.. · Social medicine in practice needs support by politics and society, and especially by research and teaching.. · Good cooperation and transfer of experiences of the different branches of social security are essential for the impact of social medicine.. © Georg Thieme Verlag KG Stuttgart · New York.

  8. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  9. A Novel Approach to Achieve the Perfect Security through AVK over Insecure Communication Channel

    Science.gov (United States)

    Banerjee, Subhasish; Dutta, Manash Pratim; Bhunia, Chandan Tilak

    2017-04-01

    To enhance the security level of the cryptosystem in shared encrypted data over the insecure channel; Automatic variable key (AVK) is a perfect mechanism as being experimented by many researchers. In AVK, after establishment of the secret key (through some IKE protocols, like IKEv2 or 2 PAKA or 3 PAKA, etc), the successive keys are generated that are variable in nature from session to session by using time variant key technique. In this work, it is shown that how AVK can provide higher security than fixed key from well-known plaintext attack (for example, brute force attack) and ciphertext only attack (for example, frequency attack etc) due to randomness of keys. In order to improve the level of randomness among the key set, a new method is proposed to generate keys where the randomness are achieved not only in terms of change in bits sequence but also flexible in size as well. Randomness of the key set is also compared with other related time variant key mechanisms to prove superiority.

  10. Addressing China's grand challenge of achieving food security while ensuring environmental sustainability.

    Science.gov (United States)

    Lu, Yonglong; Jenkins, Alan; Ferrier, Robert C; Bailey, Mark; Gordon, Iain J; Song, Shuai; Huang, Jikun; Jia, Shaofeng; Zhang, Fusuo; Liu, Xuejun; Feng, Zhaozhong; Zhang, Zhibin

    2015-02-01

    China's increasingly urbanized and wealthy population is driving a growing and changing demand for food, which might not be met without significant increase in agricultural productivity and sustainable use of natural resources. Given the past relationship between lack of access to affordable food and political instability, food security has to be given a high priority on national political agendas in the context of globalization. The drive for increased food production has had a significant impact on the environment, and the deterioration in ecosystem quality due to historic and current levels of pollution will potentially compromise the food production system in China. We discuss the grand challenges of not only producing more food but also producing it sustainably and without environmental degradation. In addressing these challenges, food production should be considered as part of an environmental system (soil, air, water, and biodiversity) and not independent from it. It is imperative that new ways of meeting the demand for food are developed while safeguarding the natural resources upon which food production is based. We present a holistic approach to both science and policy to ensure future food security while embracing the ambition of achieving environmental sustainability in China. It is a unique opportunity for China to be a role model as a new global player, especially for other emerging economies.

  11. Inducing Peer Pressure to Promote Cooperation

    Science.gov (United States)

    Mani, Ankur; Rahwan, Iyad; Pentland, Alex

    2013-04-01

    Cooperation in a large society of self-interested individuals is notoriously difficult to achieve when the externality of one individual's action is spread thin and wide on the whole society. This leads to the `tragedy of the commons' in which rational action will ultimately make everyone worse-off. Traditional policies to promote cooperation involve Pigouvian taxation or subsidies that make individuals internalize the externality they incur. We introduce a new approach to achieving global cooperation by localizing externalities to one's peers in a social network, thus leveraging the power of peer-pressure to regulate behavior. The mechanism relies on a joint model of externalities and peer-pressure. Surprisingly, this mechanism can require a lower budget to operate than the Pigouvian mechanism, even when accounting for the social cost of peer pressure. Even when the available budget is very low, the social mechanisms achieve greater improvement in the outcome.

  12. Inducing peer pressure to promote cooperation.

    Science.gov (United States)

    Mani, Ankur; Rahwan, Iyad; Pentland, Alex

    2013-01-01

    Cooperation in a large society of self-interested individuals is notoriously difficult to achieve when the externality of one individual's action is spread thin and wide on the whole society. This leads to the 'tragedy of the commons' in which rational action will ultimately make everyone worse-off. Traditional policies to promote cooperation involve Pigouvian taxation or subsidies that make individuals internalize the externality they incur. We introduce a new approach to achieving global cooperation by localizing externalities to one's peers in a social network, thus leveraging the power of peer-pressure to regulate behavior. The mechanism relies on a joint model of externalities and peer-pressure. Surprisingly, this mechanism can require a lower budget to operate than the Pigouvian mechanism, even when accounting for the social cost of peer pressure. Even when the available budget is very low, the social mechanisms achieve greater improvement in the outcome.

  13. Cooperation or confrontation? The Middle East after the nuclear deal. Conference report

    Energy Technology Data Exchange (ETDEWEB)

    Mueller-Haerlin, Bernhard (ed.)

    2015-07-15

    In the West, views differ to which extent the agreement on the nuclear issue would open up opportunities for future cooperation between Iran and the E3+3. The US continues to play an essential role in diplomacy and security policy in the Middle East. However, it is only partly fulfilling the demands and expectations that come with this role. Even confronted with a massive deterioration in the region's security situation, Iran's and Saudi Arabia's willingness to cooperate would still be very limited.

  14. Cooperative robots and sensor networks 2015

    CERN Document Server

    Dios, JRamiro

    2015-01-01

    This book compiles some of the latest research in cooperation between robots and sensor networks. Structured in twelve chapters, this book addresses fundamental, theoretical, implementation and experimentation issues. The chapters are organized into four parts namely multi-robots systems, data fusion and localization, security and dependability, and mobility.

  15. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  16. security co-operation in the southern african development

    African Journals Online (AJOL)

    Arianne

    security and stability) are driven by national interest rather than regional interest – as realists argue ... For a long time, institutions were at the heart of political science and ..... insecurity and political instability” (Ndlovu, 2006:7). The thrust of his ...

  17. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  18. Climate protection in Germany`s bilateral development co-operation with the People`s Republic of China

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, A.

    1996-12-31

    For globally sustainable development to be achieved, three concerns are central: productive economic growth, social justice and ecological sustainability. Development co-operation supports the realisation of these three goals in partner countries by helping to alleviate poverty, promote economic growth through private-sector development and protect vital natural resources. The aim of globally sustainable development can only be achieved if industrial countries too implement necessary reforms and structural adjustments at every level. Co-operation efforts with partners must therefore be complemented by coherent policies at home. This is a matter of credibility, but also of developmental far-sightedness. Internal reforms in the industrial countries secure financial leeway for their providing foreign assistance in the longer term. Environmental and resource protection as a focal point of Germany`s development co-operation with the PRC aims to preserve vital natural resources, shape economic development in their partner countries in an ecologically sound manner and put China in a position to participate in global endeavours to protect the environment. Climate protection measures figure prominently in this area. This is justified given China`s share of global CO{sub 2} emissions and the potential for energy-saving measures and measures to increase power intensity. This potential is derived primarily from the possibility of using energy-efficient technologies, increasing the relatively low energy prices and making use of renewable sources of energy.

  19. Public perspectives on nuclear security. US national security surveys, 1993--1997

    Energy Technology Data Exchange (ETDEWEB)

    Herron, K.G.; Jenkins-Smith, H.C. [Univ. of New Mexico, Albuquerque, NM (United States). UNM Inst. for Public Policy

    1998-08-01

    This is the third report in a series of studies to examine how US attitudes about nuclear security are evolving in the post-Cold War era and to identify trends in public perceptions and preferences relevant to the evolution of US nuclear security policy. It presents findings from three surveys: a nationwide telephone survey of randomly selected members of the US general public; a written survey of randomly selected members of American Men and Women of Science; and a written survey of randomly selected state legislators from all fifty US states. Key areas of investigation included nuclear security, cooperation between US and Russian scientists about nuclear issues, vulnerabilities of critical US infrastructures and responsibilities for their protection, and broad areas of US national science policy. While international and US national security were seen to be slowly improving, the primary nuclear threat to the US was perceived to have shifted from Russia to China. Support was found for nuclear arms control measures, including mutual reductions in stockpiles. However, respondents were pessimistic about eliminating nuclear armaments, and nuclear deterrence continued to be highly values. Participants favored decreasing funding f/or developing and testing new nuclear weapons, but supported increased investments in nuclear weapons infrastructure. Strong concerns were expressed about nuclear proliferation and the potential for nuclear terrorism. Support was evident for US scientific cooperation with Russia to strengthen security of Russian nuclear assets. Elite and general public perceptions of external and domestic nuclear weapons risks and external and domestic nuclear weapons benefits were statistically significantly related to nuclear weapons policy options and investment preferences. Demographic variables and individual belief systems were systematically related both to risk and benefit perceptions and to policy and spending preferences.

  20. Secure Multiparty Computation for Cooperative Cyber Risk Assessment

    Science.gov (United States)

    2016-11-01

    that the organizations can compute relevant statistics and analyses on the global infrastructure while still keeping the details of their local...mitigation. In Australasian Conference on Information Security and Privacy, pages 391–401. Springer Berlin Heidelberg, 2004. [5] Fabrizio Smeraldi and Pasquale

  1. Study on the Evaluation of the European Union Agency for Network and Information Security

    DEFF Research Database (Denmark)

    Attström, Karin; Ludden, Vanessa; Lessmann, Franziska

    The European Union Agency for Network and Information Security (ENISA) was established in 2004. The Agency provides advice and recommendations, data analysis, and supports awareness raising and cooperation by the EU bodies and Member States in the field of cybersecurity. ENISA uses its expertise...... and assesses their financial implications. The findings of the evaluation study show that ENISA has made some important achievements towards increasing NIS in the EU. However, a fragmented approach to cybersecurity across the EU and issues internal to the Agency, including limited financial resources, hinder...

  2. International co-operation on decommissioning - Achievements of the NEA Co-operative programme 1985-1990

    International Nuclear Information System (INIS)

    1992-01-01

    Decommissioning of nuclear facilities is attracting a growing interest in all countries where an increasing number of plants are reaching the end of their operational life and will have to be decommissioned in the next few years. In response to this interest, the NEA set up in 1985 an international programme of technical co-operation between decommissioning projects in eight OECD countries. This report describes the programme and the participating projects, reviews the experiences accumulated during the first five-year term of this international undertaking, and discusses what remains to be done

  3. Security challenges for cooperative and interconnected mobility systems

    NARCIS (Netherlands)

    Bijlsma, T.; Kievit, S. de; Sluis, H.J.D. van de; Nunen, E. van; Passchier, I.; Luiijf, H.A.M.

    2013-01-01

    Software is becoming an important part of the innovation for vehicles. In addition, the systems in vehicles become interconnected and also get external connections, to the internet and Vehicular Ad hoc NETworks (VANETs). These trends form a combined security and safety threat, because recent

  4. A security mechanism based on evolutionary game in fog computing

    Directory of Open Access Journals (Sweden)

    Yan Sun

    2018-02-01

    Full Text Available Fog computing is a distributed computing paradigm at the edge of the network and requires cooperation of users and sharing of resources. When users in fog computing open their resources, their devices are easily intercepted and attacked because they are accessed through wireless network and present an extensive geographical distribution. In this study, a credible third party was introduced to supervise the behavior of users and protect the security of user cooperation. A fog computing security mechanism based on human nervous system is proposed, and the strategy for a stable system evolution is calculated. The MATLAB simulation results show that the proposed mechanism can reduce the number of attack behaviors effectively and stimulate users to cooperate in application tasks positively.

  5. A security mechanism based on evolutionary game in fog computing.

    Science.gov (United States)

    Sun, Yan; Lin, Fuhong; Zhang, Nan

    2018-02-01

    Fog computing is a distributed computing paradigm at the edge of the network and requires cooperation of users and sharing of resources. When users in fog computing open their resources, their devices are easily intercepted and attacked because they are accessed through wireless network and present an extensive geographical distribution. In this study, a credible third party was introduced to supervise the behavior of users and protect the security of user cooperation. A fog computing security mechanism based on human nervous system is proposed, and the strategy for a stable system evolution is calculated. The MATLAB simulation results show that the proposed mechanism can reduce the number of attack behaviors effectively and stimulate users to cooperate in application tasks positively.

  6. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.

    Science.gov (United States)

    Yang, Bin; Zhang, Jianfeng

    2017-06-28

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

  7. Integrating Multiple Intelligences and Learning Styles on Solving Problems, Achievement in, and Attitudes towards Math in Six Graders with Learning Disabilities in Cooperative Groups

    Science.gov (United States)

    Eissa, Mourad Ali; Mostafa, Amaal Ahmed

    2013-01-01

    This study investigated the effect of using differentiated instruction by integrating multiple intelligences and learning styles on solving problems, achievement in, and attitudes towards math in six graders with learning disabilities in cooperative groups. A total of 60 students identified with LD were invited to participate. The sample was…

  8. 7 CFR 1962.8 - Liens on real estate for additional security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 14 2010-01-01 2009-01-01 true Liens on real estate for additional security. 1962.8..., RURAL BUSINESS-COOPERATIVE SERVICE, RURAL UTILITIES SERVICE, AND FARM SERVICE AGENCY, DEPARTMENT OF... Security § 1962.8 Liens on real estate for additional security. The County Supervisor may take the best...

  9. Information security and business continuity in Tecnatom

    International Nuclear Information System (INIS)

    Fernandez de Miguel, C.

    2013-01-01

    Information security is a key issue for companies that manage and process nuclear business related data. Availability of information systems as well as new data exchange facilities through simple and broad communication networks are the pillars of cooperation between different organizations, generating significant savings in costs and expanding the capacity to minimeze them. In this regard, information security is one of the major challenges for IT departments. This articles presents Tecnatoms experience in the Information Security Management Implementation project. Over several years, since 2004, the information security management has been developed and consolidated as an ongoing and horizontal process. (Author)

  10. Global security and the impacts in nuclear matter control: Nuclear Security Summit 2016

    International Nuclear Information System (INIS)

    Lima, Martonio Mont’Alverne Barreto; Barreto, Midred Cavalcante

    2017-01-01

    Due to the current international security instability, especially resulting from traffic and nuclear terrorism threat proliferation, the Nuclear Security Summits were conceived with the objective of increasing the cooperation between States, institutions and international organisms, as well as conducting a global community in following the guidelines and action plans which have produced curious results such as the reduction and the removal of enriched uranium in some countries, the reinforcement of safeguard installations that store radioactive materials and the establishment of Excellence Centers, qualification, training and technological development in the fight against nuclear weaponry traffic. (author)

  11. Global security and the impacts in nuclear matter control: Nuclear Security Summit 2016

    Energy Technology Data Exchange (ETDEWEB)

    Lima, Martonio Mont’Alverne Barreto; Barreto, Midred Cavalcante, E-mail: barreto@unifor.br, E-mail: midredcb@hotmail.com [Universidade de Fortaleza (UNIFOR), CE (Brazil)

    2017-07-01

    Due to the current international security instability, especially resulting from traffic and nuclear terrorism threat proliferation, the Nuclear Security Summits were conceived with the objective of increasing the cooperation between States, institutions and international organisms, as well as conducting a global community in following the guidelines and action plans which have produced curious results such as the reduction and the removal of enriched uranium in some countries, the reinforcement of safeguard installations that store radioactive materials and the establishment of Excellence Centers, qualification, training and technological development in the fight against nuclear weaponry traffic. (author)

  12. Introduction: cooperative learning

    Directory of Open Access Journals (Sweden)

    José-Manuel Serrano

    2014-10-01

    Full Text Available The principal objective of this revision is the recognition of cooperative learning as a highly effective strategy for the accomplishment of the general goals in learning. The different investigations assessed validate the potential that a cooperative organization of the classroom could entail for academic achievement, self-esteem, interpersonal attraction or social support. The solidity of the existing research contributes to its external and internal validity and, thus, to conclude that the results are consistent and can be extrapolated to different cultures, ethnic groups or countries.

  13. Exploring Relay Cooperation for Secure and Reliable Transmission in Two-HopWireless Networks

    Directory of Open Access Journals (Sweden)

    Yulong Shen

    2014-03-01

    Full Text Available This work considers the problem of secure and reliable information transmission via relay cooperation in two-hop relay wireless networks without the information of both eavesdropper channels and locations. While previous work on this problem mainly studied infinite networks and their asymptotic behavior and scaling law results, this papers focuses on a more practical network with finite number of system nodes and explores the corresponding exact result on the number of eavesdroppers one network can tolerate to ensure desired secrecy and reliability. We first study the scenario where path-loss is equal between all pairs of nodes and consider two transmission protocols there, one adopts an optimal but complex relay selection process with less load balance capacity while the other adopts a random but simple relay selection process with good load balance capacity. Theoretical analysis and numerical results are then provided to determine the maximum number of eavesdroppers one network can tolerate to ensure a desired performance in terms of the secrecy outage probability and transmission outage probability. We further extend our study to the more general scenario where path-loss between each pair of nodes also depends on the distance between them, for which a new transmission protocol with both preferable relay selection and good load balance as well as the corresponding theoretical analysis and numerical results are presented.

  14. Cooperation among strangers: an experiment with indefinite interaction

    OpenAIRE

    Gabriele Camera; Marco Casari

    2007-01-01

    We study the emergence of norms of cooperation in experimental economies populated by strangers interacting indefinitely and lacking formal enforcement institutions. In all treatments the efficient outcome is sustainable as an equilibrium. We address the following questions: can these economies achieve full efficiency? Which institutions for monitoring and enforcement promote cooperation? Finally, what classes of strategies are employed to achieve high efficiency? We find that, first, coopera...

  15. The Grand Ethiopian Renaissance Dam: Source of cooperation or contention?

    Science.gov (United States)

    Teferi Taye, Meron; Tadesse, Tsegaye; Senay, Gabriel; Block, Paul

    2016-01-01

    This paper discusses the challenges and benefits of the Grand Ethiopian Renaissance Dam (GERD), which is under construction and expected to be operational on the Blue Nile River in Ethiopia in a few years. Like many large-scale projects on transboundary rivers, the GERD has been criticized for potentially jeopardizing downstream water security and livelihoods through upstream unilateral decision making. In spite of the contentious nature of the project, the authors argue that this project can provide substantial benefits for regional development. The GERD, like any major river infrastructure project, will undeniably bring about social, environmental, and economic change, and in this unique case has, on balance, the potential to achieve success on all fronts. It must be stressed, however, that strong partnerships between riparian countries are essential. National success is contingent on regional cooperation.

  16. Security-Based Mechanism for Proactive Routing Schema Using Game Theory Model

    Directory of Open Access Journals (Sweden)

    Hicham Amraoui

    2016-01-01

    Full Text Available Game theory may offer a useful mechanism to address many problems in mobile ad hoc networks (MANETs. One of the key concepts in the research field of such networks with Optimized Link State Routing Protocol (OLSR is the security problem. Relying on applying game theory to study this problem, we consider two strategies during this suggested model: cooperate and not-cooperate. However, in such networks, it is not easy to identify different actions of players. In this paper, we have essentially been inspired from recent advances provided in game theory to propose a new model for security in MANETs. Our proposal presents a powerful tool with a large number of players where interactions are played multiple times. Moreover, each node keeps a cooperation rate (CR record of other nodes to cope with the behaviors and mitigate aggregate effect of other malicious devices. Additionally, our suggested security mechanism does not only take into consideration security requirements, but also take into account system resources and network performances. The simulation results using Network Simulator 3 are presented to illustrate the effectiveness of the proposal.

  17. Integrated Support Center for Nuclear Nonproliferation and Security

    International Nuclear Information System (INIS)

    Kimura, Naohito; Naoi, Yosuke

    2010-01-01

    In April 2010, at the Nuclear Security Summit, Japan demonstrated its commitment to the strengthening of nuclear non-proliferation and nuclear security and announced the establishment of the Integrated Comprehensive Support Center for Nuclear Non-proliferation and Nuclear Security in the Japan Atomic Energy Agency (JAEA), under the guidance and authority of the Ministry of Education, Culture, Sports and Science and Technology (MEXT), and in cooperation with other ministries. The goal of the Center is to strengthen nuclear non-proliferation and security in emerging nuclear power countries by sharing Japan's accumulated experiences in its peaceful use of nuclear energy. To achieve its goal, the Center serves three functions: (1) human resource and capacity building, (2) infrastructure development and technical assistance and (3) international coordination and cooperation. The Center will offer three types of training courses to strengthen human resources and capacity building in emerging nuclear power countries. In the Training Course on Nuclear Security, the participants will learn the design and evaluation process for physical protection and detection of and response to illegal or unauthorized acts related to nuclear materials. They will learn these issues not only through lectures and training but also using mockup facilities and virtual reality systems. Second, in the Training Course on Safeguards and State System of Accounting for and Control of Nuclear Material (SSAC), the Center will teach the experience of advanced safeguards activities in Japan for its full-scale nuclear fuel cycle facilities as a non-nuclear weapon state. The participants will learn the IAEA and national safeguards systems, the material accounting system and inspector activities. Third, in the Training on the International Nuclear Nonproliferation Framework, the participants will learn the international framework of nuclear non-proliferation including the IAEA safeguards system and

  18. Remote monitoring in safeguards: Security of information and enhanced cooperation

    International Nuclear Information System (INIS)

    Galdoz, Erwin; Calzetta, Osvaldo; Fernández Moreno, Sonia; Llacer, Carlos; Díaz, Gustavo; Vigile, Sebastián; Brunhuber, Christoph

    2011-01-01

    Unattended systems with remote transmission capabilities (RM) have the potential to improve safeguards efficiency. Moreover, the evolution of technology and the steady growing of nuclear materials subject to control, lead modern safeguards increasingly utilizing unattended equipment with the capability to store relevant data for long periods of time coupled with the option of being remotely accessed and checked. Remote inspection is still a concept under development, but it may end to be a powerful more efficient verification modality in medium term future. An important part of drawing meaningful safeguards conclusions rests on authenticity and reliability of the information on nuclear material and facilities acquired through the various verification activities and measures applied by IAEA and regional safeguards organizations, like ABACC. The increasing utilization of such technology to further optimize safeguards responds to a multifaceted environment where security of information for all relevant parties is of utmost importance. From the point of view of the IAEA and ABACC, the use of any technology for safeguards application, and specially the use of RM, requires to ensure the security of data collected to guarantee the validity and veracity of such information throughout the whole process (e.g., from collecting to reviewing). This is also valid to the SSAC involved in the process. Information security is also relevant for States and Operators. Assurance should be given that the information could not be withdrawn by non-authorized entities and that facility data is also fully secured. Another important aspect related to RM that may also fall in the security aspect of safeguards relevant information that merits further consideration, is the sharing of information between organizations like ABACC and the IAEA as well as the possibility to make this data available for States authorities purposes. This paper discusses three main themes related to RM: (i) the extent

  19. Agrodiversity in the Cayon-Phillips Cooperative

    Directory of Open Access Journals (Sweden)

    Eric Philbert Browne

    2016-06-01

    Full Text Available The community of Cayon-Phillips on the island of San Kitts faces the challenges of food security and environmental stability and local, regional and global socio-economic transformations. The main crops are fruits, vegetables and ground provisions. Livestock also plays an important role in the local economy. The presence of farms maintains the nutrition security for the families of low resources and they contribute to the protection of the rural landscape .For the development of the investigation a census was carried out in the area corresponding to the cooperative of Cayon - Phillips on the island of San Kitts, the frequency was calculated and the methodology of Leyva and Pohlan (2005 was applied to determine the agrodiversity. The results showed that in the area of the cooperative, 337 trees are present occupying an area of 0.27 hectares that provide a covering of 0.29 percent of the productive area. 20 species were inventoried distributed in 14 families, mostly represented by myrtaceae, mimosaceae, fabaceae and bignonaceae. The species were grouped according to their function in the agrosystem.

  20. Power allocation and cooperative jamming for enhancing physical layer security in opportunistic relay networks in the presence of interference

    KAUST Repository

    Abd El-Malek, Ahmed H.; Salhab, Anas M.; Zummo, Salam A.; Alouini, Mohamed-Slim

    2017-01-01

    In this paper, the impact of cochannel interference on the secrecy performance of dual-hop decode-and-forward relaying is investigated. In particular, the outage and intercept probabilities are obtained for the opportunistic relay selection (ORS) model in the presence of nonidentical interfering signals under a single/multiple passive eavesdropper(s) attack. Moreover, the proposed work enhances physical layer security performance of ORS model using cooperative jamming (CJ) techniques. Therefore, new closed-form expressions are derived for the intercept and outage probabilities of the CJ-ORS model in the presence of interference over Rayleigh fading channels. Moreover, the analyses are generalized to the case of multiple eavesdroppers where closed-form expressions are derived for the intercept probability. To reveal more insights on the proposed work secrecy performance, asymptotic closed-form expressions for the intercept and outage probabilities are obtained. Using these asymptotic expressions, a power allocation optimization problem is formulated and solved for enhancing the system security. The derived analytical formulas herein are supported by numerical and simulation results to clarify the main contributions of the paper. The results show that, although the cochannel interference increases the system outage probability, it might improve the system secrecy performance. Moreover, the proposed CJ-ORS model is shown to enhance the system secrecy performance compared to ORS model.

  1. Power allocation and cooperative jamming for enhancing physical layer security in opportunistic relay networks in the presence of interference

    KAUST Repository

    Abd El-Malek, Ahmed H.

    2017-04-18

    In this paper, the impact of cochannel interference on the secrecy performance of dual-hop decode-and-forward relaying is investigated. In particular, the outage and intercept probabilities are obtained for the opportunistic relay selection (ORS) model in the presence of nonidentical interfering signals under a single/multiple passive eavesdropper(s) attack. Moreover, the proposed work enhances physical layer security performance of ORS model using cooperative jamming (CJ) techniques. Therefore, new closed-form expressions are derived for the intercept and outage probabilities of the CJ-ORS model in the presence of interference over Rayleigh fading channels. Moreover, the analyses are generalized to the case of multiple eavesdroppers where closed-form expressions are derived for the intercept probability. To reveal more insights on the proposed work secrecy performance, asymptotic closed-form expressions for the intercept and outage probabilities are obtained. Using these asymptotic expressions, a power allocation optimization problem is formulated and solved for enhancing the system security. The derived analytical formulas herein are supported by numerical and simulation results to clarify the main contributions of the paper. The results show that, although the cochannel interference increases the system outage probability, it might improve the system secrecy performance. Moreover, the proposed CJ-ORS model is shown to enhance the system secrecy performance compared to ORS model.

  2. Communication security in open health care networks.

    Science.gov (United States)

    Blobel, B; Pharow, P; Engel, K; Spiegel, V; Krohn, R

    1999-01-01

    Fulfilling the shared care paradigm, health care networks providing open systems' interoperability in health care are needed. Such communicating and co-operating health information systems, dealing with sensitive personal medical information across organisational, regional, national or even international boundaries, require appropriate security solutions. Based on the generic security model, within the European MEDSEC project an open approach for secure EDI like HL7, EDIFACT, XDT or XML has been developed. The consideration includes both securing the message in an unsecure network and the transport of the unprotected information via secure channels (SSL, TLS etc.). Regarding EDI, an open and widely usable security solution has been specified and practically implemented for the examples of secure mailing and secure file transfer (FTP) via wrapping the sensitive information expressed by the corresponding protocols. The results are currently prepared for standardisation.

  3. Brazilian Hybrid Security in South America

    Directory of Open Access Journals (Sweden)

    Rafael Duarte Villa

    2017-10-01

    Full Text Available Abstract Existing research on security governance in South America functions on dichotomous lines. Analysis of Brazil’s security practices is a case in point. On the one hand, scholars point out the balance of power and hegemonic institutions as the main discourse in the security practices between Brazil and its South American neighbors. On the other hand, some other emphasize the importance of democracy, cooperation on defense and security, and peaceful conflict resolution between states in the region as indicators for the emergence of a security community between Brazil and its neighbors in the South American region. The way in which multiple orders coexist is not given adequate attention in empirical research. This article seeks to overcome this dichotomy. By foregrounding Brazil’s regional security practices, particularly during the Lula and Rousseff administration, I show the hybrid and sometimes ambivalent security governance system in Brazil, where mechanisms of balance of power and security community overlap in important ways.

  4. Cooperative Jamming for Physical Layer Security in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This work proposes a novel cooperative jamming mechanism for scalable networks like Wireless Sensor Networks (WSNs) which makes use of friendly interference to confuse the eavesdropper...

  5. Perspectives of Security Ensuring within the Framework of Barcelona Process

    Directory of Open Access Journals (Sweden)

    T N Kirabaev

    2009-06-01

    Full Text Available Barcelona process was aimed to become an important mechanism in the realization of ideas of peace, stability and security ensuring in the Mediterranean Sea region. Cooperation in the sphere of security ensuring means openness of the regional states, social and economic reforms, human rights protection. The article deals with the problem of security ensuring by nonmilitary means.

  6. KENYA’S CONSTITUTION AND CHILD TRAFFICKING AS A SECURITY THREAT

    OpenAIRE

    E.O.S. ODHIAMBO; J. KASSILLY; L.T. MAITO; K. ONKWARE; W. A. OBOKA

    2012-01-01

    Human trafficking also referred to as modern-day slavery is seen as a security threat. Traditional security approaches to human trafficking call for analysis of trafficking as a threat to the Kenyan state and to Kenya’s control of its borders. Traditional security analyses of trafficking emphasize border security, migration controls, and international law enforcement cooperation. This article discusses three forms of child trafficking: sexual exploitation, forced labor and child soldiers and ...

  7. Cooperative Secret Sharing Using QR Codes and Symmetric Keys

    Directory of Open Access Journals (Sweden)

    Yang-Wai Chow

    2018-04-01

    Full Text Available Secret sharing is an information security technique where a dealer divides a secret into a collection of shares and distributes these to members of a group. The secret will only be revealed when a predefined number of group members cooperate to recover the secret. The purpose of this study is to investigate a method of distributing shares by embedding them into cover Quick Response (QR codes in a secure manner using cryptographic keys. The advantage of this approach is that the shares can be disseminated over public channels, as anyone who scans the QR codes will only obtain public information. Only authorized individuals who are in possession of the required keys will be able to recover the shares. This also means that when group members cooperate to recover a secret, the group can determine the presence of an illegitimate participant if the person does not produce a valid share. This study proposes a protocol for accomplishing this and discusses the underlying security of the protocol.

  8. The Current State of the International Security System

    OpenAIRE

    Ивашов, Леонид Григорьевич

    2013-01-01

    The author examines the modern geopolitical world and assesses the threats to Russia’s security. These threats are demonstrated to be hitched to the goals of the US National Strategy and, in particular, to the US plans on deployment of anti-ballistic missile system. The author argues that in this situation the mainstay of Russia’s foreign policy should become “security through cooperation.”Key words: international security, anti-ballistic missile, preemptive war, geopolitical centers, UN Secu...

  9. FINANCIAL SECURITY OF FOOD INDUSTRY ENTERPRISES IN POLAND

    Directory of Open Access Journals (Sweden)

    Anna Bieniasz

    2016-06-01

    Full Text Available The aim of the study was to evaluate the fi nancial security of food industry enterprises in Poland in 2009–2013, with particular emphasis on the processing industry of milk and cheese production, including those operating in the form of dairy cooperatives. The analysis was conducted using unpublished data of GUS, as well as individual fi nancial data on dairy cooperatives. The study indicates that the manufacturing sector of food and beverage production, as well as milk processing and cheese making, according to the established measures of fi nancial security, can be considered safe. This assessment, however, is varied and results from the specifi c industries, especially in relation to capital management.

  10. Nuclear safety cooperation in Southeast Asia. Lessons from Asia's regional networks

    International Nuclear Information System (INIS)

    Trajano, Julius Cesar I.

    2017-01-01

    Debate has been ongoing among key stakeholders on whether South-east Asia should use or reject nuclear power. However, there are still significant regional concerns over nuclear safety and security in South-east Asia. As some ASEAN countries plan to pursue nuclear power, they need to create and maintain a pool of local nuclear professionals with actual relevant experience in the nuclear industry. While the IAEA does not influence a country's decision on introducing nuclear power, it supports Member States' efforts to evaluate all options towards making a knowledgeable decision. Nuclear safety is the responsibility of every nation that utilizes nuclear technology. National governments are responsible for regulations that govern how safety at nuclear facilities is maintained, as well as to reduce radiation risks, including emergency response and recovery actions. But nuclear energy has transboundary/ regional implications if nuclear safety in each member state is not strengthened. ASEAN countries share a common goal in achieving high level of public safety and confidence in nuclear and radiation related issues. Can regional cooperation help ASEAN Member-States strengthen nuclear safety? The paper examines the importance of regional cooperation on nuclear energy governance and the role of regional organisations in Asia in strengthening nuclear safety cooperation and emergency preparedness and response in Southeast Asia. (author)

  11. Nordic Model of Subregional Co-Operation

    Directory of Open Access Journals (Sweden)

    Grzela Joanna

    2017-12-01

    Full Text Available Nordic co-operation is renowned throughout the world and perceived as the collaboration of a group of countries which are similar in their views and activities. The main pillars of the Nordic model of co-operation are the tradition of constitutional principles, activity of public movements and organisations, freedom of speech, equality, solidarity, and respect for the natural environment. In connection with labour and entrepreneurship, these elements are the features of a society which favours efficiency, a sense of security and balance between an individual and a group. Currently, the collaboration is a complex process, including many national, governmental and institutional connections which form the “Nordic family”.

  12. Cooperative Bacterial Foraging Optimization

    Directory of Open Access Journals (Sweden)

    Hanning Chen

    2009-01-01

    Full Text Available Bacterial Foraging Optimization (BFO is a novel optimization algorithm based on the social foraging behavior of E. coli bacteria. This paper presents a variation on the original BFO algorithm, namely, the Cooperative Bacterial Foraging Optimization (CBFO, which significantly improve the original BFO in solving complex optimization problems. This significant improvement is achieved by applying two cooperative approaches to the original BFO, namely, the serial heterogeneous cooperation on the implicit space decomposition level and the serial heterogeneous cooperation on the hybrid space decomposition level. The experiments compare the performance of two CBFO variants with the original BFO, the standard PSO and a real-coded GA on four widely used benchmark functions. The new method shows a marked improvement in performance over the original BFO and appears to be comparable with the PSO and GA.

  13. Towards the cyber security paradigm of ehealth: Resilience and design aspects

    Science.gov (United States)

    Rajamäki, Jyri; Pirinen, Rauno

    2017-06-01

    Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain, it is clear that anticipation and prevention of all possible types of attack and malfunction are not achievable for current or future cyber infrastructures. This study focuses on the investigation of a cyber security paradigm, adaptive systems and sense of resilience in a healthcare critical information infrastructure.

  14. A Cyber Federal Deposit Insurance Corporation Achieving Enhanced National Security

    Science.gov (United States)

    2017-12-21

    machine is being bridged by wearables, augmented reality (AR), and artificial intelligence (AI). In this near-future the uncanny valley no longer...and security represent key pol- icy, security, and business tradeoffs, connectivity and national cybersecurity are similarly dialectical choices. On...Consumer Electronics Show (CES), is at once the digital sycophant’s dream and the cybersecurity hermit’s nightmare, as each connected gewgaw and

  15. Strategy of Increasing Food Security based on Macro and Micro Aspects

    Directory of Open Access Journals (Sweden)

    Neni Widayaningsih

    2016-06-01

    Full Text Available The preliminary studies that have been conducted show that the food availability in 27 districts in Banyumas Regency on average is still low. The purpose of this research is to formulate of a strategy to improve the food security by synergizing the macro and micro aspects. The method used is the tabulation analysis, IFE and EFE Matrix, and also IE Matrix. The IE matrix shows the food security based on the macro and micro aspects that are in the first cell, which means that the food security conditions are experiencing the growing and buliding. The strategies of improving the food security from the micro and macro aspects are first, to develop the food production in accordance with the potential and comodities of the excellent food in accordance with the specializations of regions (districts. Second, it requires a partnership and a cooperation of distributing the excellent food production. Third, the investment is required to improve the diversification of food. Fourth, it requires the cooperation between the farmers and the government agencies concerned with the development, supply and service of excellent means of agricultural production with supervision and increased credit services. Fifth, the off-farm activities should be developed by forming the cooperatives or the small and household businesses on the basis of farming activities. Besides, in order to meet the consumption of food that is safe, qualified, and nutritious, it is necessary to increase the knowledge and awareness about the food security at the household level by empowering the cooperatives or small and household businesses by utilizing Dasa Wisma group, PKK, Majelis Ta'lim, and other non-governmental groups.

  16. Analysis of Oil and Gas Cooperation between China and Russia in the Belt and Road

    Directory of Open Access Journals (Sweden)

    Zhang Xuefeng

    2017-01-01

    Full Text Available With the deepening of economic globalization and regional economic integration and the “One Belt and One Road” strategic layout, China and Russia in the field of regional energy cooperation has been expanded to deepen. This paper analyzed the present situation of energy cooperation between China and Russia from the field of oil, coal and natural gas, and concludes that Sino-Russian energy cooperation is the following factors: strong cooperation and strong energy complementarities, and then analyzed the way to the Sino-Russian oil and gas cooperation. However, there are some problems in the energy cooperation between the two countries: the energy infrastructure in China and Russia is not perfect, the difference between Russia and Northeast China is poor, and there are some hidden dangers of energy security. The cultural dilemma hinders the exchange between the two countries. Finally, from the “One Belt and One Road” strategy for the Sino-Russian energy cooperation provides an opportunity to put forward the establishment and strengthening of energy infrastructure, relying on “One Belt and One Road” Orientation to ensure energy security, strengthen cultural cooperation and adhere to the “One Belt and One Road” uphold the principle of mutual benefit and other countermeasures.

  17. Shared Electronic Health Record Systems: Key Legal and Security Challenges.

    Science.gov (United States)

    Christiansen, Ellen K; Skipenes, Eva; Hausken, Marie F; Skeie, Svein; Østbye, Truls; Iversen, Marjolein M

    2017-11-01

    Use of shared electronic health records opens a whole range of new possibilities for flexible and fruitful cooperation among health personnel in different health institutions, to the benefit of the patients. There are, however, unsolved legal and security challenges. The overall aim of this article is to highlight legal and security challenges that should be considered before using shared electronic cooperation platforms and health record systems to avoid legal and security "surprises" subsequent to the implementation. Practical lessons learned from the use of a web-based ulcer record system involving patients, community nurses, GPs, and hospital nurses and doctors in specialist health care are used to illustrate challenges we faced. Discussion of possible legal and security challenges is critical for successful implementation of shared electronic collaboration systems. Key challenges include (1) allocation of responsibility, (2) documentation routines, (3) and integrated or federated access control. We discuss and suggest how challenges of legal and security aspects can be handled. This discussion may be useful for both current and future users, as well as policy makers.

  18. International cooperation in the field of radiation application

    International Nuclear Information System (INIS)

    Sato, Shoichi

    1993-01-01

    Bilateral and multilateral research cooperations have been implemented at TRCRE, JAERI, producing favourable results in the field of radiation application. Frameworks and some achievements are described and the significance of the international cooperation is discussed. (Author)

  19. Parochial trust and cooperation across 17 societies

    Science.gov (United States)

    Romano, Angelo; Balliet, Daniel; Liu, James H.

    2017-01-01

    International challenges such as climate change, poverty, and intergroup conflict require countries to cooperate to solve these complex problems. However, the political tide in many countries has shifted inward, with skepticism and reluctance to cooperate with other countries. Thus, cross-societal investigations are needed to test theory about trust and cooperation within and between groups. We conducted an experimental study in 17 countries designed to test several theories that explain why, who, and where people trust and cooperate more with ingroup members, compared with outgroup members. The experiment involved several interactions in the trust game, either as a trustor or trustee. We manipulated partner group membership in the trust game (ingroup, outgroup, or unknown) and if their reputation was at stake during the interaction. In addition to the standard finding that participants trust and cooperate more with ingroup than outgroup members, we obtained findings that reputational concerns play a decisive role for promoting trust and cooperation universally across societies. Furthermore, men discriminated more in favor of their ingroup than women. Individual differences in cooperative preferences, as measured by social value orientation, predicted cooperation with both ingroup and outgroup members. Finally, we did not find support for three theories about the cross-societal conditions that influence the degree of ingroup favoritism observed across societies (e.g., material security, religiosity, and pathogen stress). We discuss the implications for promoting cooperation within and between countries. PMID:29133403

  20. Potential risks and threats to international security

    Directory of Open Access Journals (Sweden)

    Iurie RICHICINSCHI

    2016-12-01

    Full Text Available Today we can ascertain with certainty that in the early part of the 21st century, the challenges addressed to the current security environment tend to become increasingly diffuse, less predictable and multidimensional, being both a feature of external security, as well as an internal one and, of course, becoming an indispensable part of security policies and strategies. Therefore, the need for international cooperation as a foundation for the stability of the security environment has increased. It should provide a sense of trust and peace by ensuring the absence of danger both for the individual and for the community to which he belongs.

  1. Cooperating with a palliative home-care team

    DEFF Research Database (Denmark)

    Goldschmidt, Dorthe; Groenvold, Mogens; Johnsen, Anna Thit

    2005-01-01

    BACKGROUND: Palliative home-care teams often cooperate with general practitioners (GPs) and district nurses. Our aim was to evaluate a palliative home-care team from the viewpoint of GPs and district nurses. METHODS: GPs and district nurses received questionnaires at the start of home-care and one...... month later. Questions focussed on benefits to patients, training issues for professionals and cooperation between the home-care team and the GP/ district nurse. A combination of closed- and open-ended questions was used. RESULTS: Response rate was 84% (467/553). Benefits to patients were experienced...... by 91 %, mainly due to improvement in symptom management, 'security', and accessibility of specialists in palliative care. After one month, 57% of the participants reported to have learnt aspects of palliative care, primarily symptom control, and 89% of them found cooperation satisfactory...

  2. Inter-Agency Cooperation in Combating Terrorism in Nigeria ...

    African Journals Online (AJOL)

    ... phenomenon through the analysis of its various definitions, its nature and consequences. Based on the analysis, the paper proffers a ten-point policy recommendation for enhancing the existing instruments and frameworks in the security services that would foster interagency cooperation in combating terrorism in Nigeria.

  3. Strengthening political co-operation through multilateral disarmament

    International Nuclear Information System (INIS)

    Ekeus, R.

    1991-01-01

    In this paper, the Ministry for Foreign Affairs of Sweden discussed how the multilateral disarmament concept has contributed and still can contribute to strengthen political co-operation. This approach is the opposite to the usual question on how to achieve multilateral disarmament through political co-operation

  4. 78 FR 42532 - Cooperative Research and Development Agreement (CRADA) Opportunity With the Department of...

    Science.gov (United States)

    2013-07-16

    ... DEPARTMENT OF HOMELAND SECURITY Cooperative Research and Development Agreement (CRADA) Opportunity With the Department of Homeland Security for the Development of a Foot-and-Mouth Disease 3ABC ELISA Diagnostic Kit; Correction AGENCY: Science and Technology Directorate, Plum Island Animal Disease Center...

  5. The SafeCOP ECSEL Project: Safe Cooperating Cyber-Physical Systems Using Wireless Communication

    DEFF Research Database (Denmark)

    Pop, Paul; Scholle, Detlef; Hansson, Hans

    2016-01-01

    This paper presents an overview of the ECSEL project entitled "Safe Cooperating Cyber-Physical Systems using Wireless Communication" (SafeCOP), which runs during the period 2016 -- 2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...... detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation...

  6. Evaluating and projecting the European security system

    International Nuclear Information System (INIS)

    Dean, J.

    1991-01-01

    Components of the new European security system are described taking into account the new policy making and possibilities to resolve conflicts. Programmes for political and economic integration and co-operation managed by the European Community will provide main positive content of the new European security system. An insight of the future of nuclear armaments in Europe is included together with confidence building measure and the role of NATO

  7. Challenges of the International Criminal Court in the cooperation with the States

    Directory of Open Access Journals (Sweden)

    Carolina Anello

    2014-03-01

    Full Text Available International cooperation is one of the main pillars on which the performance of the International Criminal Court is based. The experience, in particular, in the situ- ations referred by the Security Council of the United Nations, allows seeing the dif- ficulties derivates from the denial of States to cooperate with the Court. This paper analyzes the causes for which this breach occurs and what measures are proposed to strengthen cooperation with the Court as a precondition for effective action.

  8. Cooperative Prototyping Experiments

    DEFF Research Database (Denmark)

    Bødker, Susanne; Grønbæk, Kaj

    1989-01-01

    This paper describes experiments with a design technique that we denote cooperative prototyping. The experiments consider design of a patient case record system for municipal dental clinics in which we used HyperCard, an off the shelf programming environment for the Macintosh. In the ecperiments we...... tried to achieve a fluent work-like evaluation of prototypes where users envisioned future work with a computer tool, at the same time as we made on-line modifications of prototypes in cooperation with the users when breakdown occur in their work-like evaluation. The experiments showed...... that it was possible to make a number of direct manipulation changes of prototypes in cooperation with the users, in interplay with their fluent work-like evaluation of these. However, breakdown occurred in the prototyping process when we reached the limits of the direct manipulation support for modification. From...

  9. The Impact of the Depth of Cooperation in Establishing Regional Economic Cooperatives in Szekelyland

    Directory of Open Access Journals (Sweden)

    Ferenc Ilyés

    2015-10-01

    Full Text Available The thesis of the research: The apparition and operation of regional economic partnerships is a precondition of regional cooperation. In the society of our age it is of major importance to strengthen the communities’ values, which represent belonging, standing and last but not least financial security. This supposition can be taken as a general statement, but it is essential from the point of view of Szekely people’s picture about future, and has its part in finding ourselves. Building a community does not only mean sharing the same values and thoughts, but can also mean a common resource management in case the participants would like a joint utilization of values. A condition for this is cooperation, depending on the attitude of people with different behavior and value system. The topic has been dealt with by several researchers in the last few years, thus substantially contributing to the development of communities by highlighting those problematic areas, which supposingly influence contribution in each community. To get to know these areas I have conducted a study in the region of Udvarhely, from the results of this I have stated real conclusions, which are preconditions of the appearance of the cooperation and operation of economical cooperation in Szekelyland.

  10. Alternative vision or utopian fantasy? Cooperation, empowerment and women's cooperative development in India.

    Science.gov (United States)

    Mayoux, L

    1995-01-01

    The discussion addresses the costs and benefits of working in cooperatives in India, imposed participation, methods for increasing incomes, preconceived models, the importance of meeting the actual needs of women, and participatory options. This author evaluated 10 producer cooperatives in West Bengal, Karnataka, and Tamil Nadu during 1984-92. It is argued that more discussion is needed on how ideals of cooperation and empowerment of women can occur simultaneous with the context in which cooperatives must operate. The ten study cooperatives were all officially registered cooperatives. Cooperatives varied in size, organizational structure, and forms of support. Four were determined to be successful in economic and participatory terms. Three were successful because of the efforts of the women themselves. All three cases were based on earning goals that were higher than the women could have achieved on their own. Six failed in terms of participatory decision making and cooperative operations. Lack of sufficient support and/or excessive bureaucratic red tape were involved in the six failures, but to varying degrees. Type of support and means of implementation were important in the six failures. All women used cooperatives as a means of increasing income. Participation rules were imposed by outside agencies. Women were given "cooperative" training. Disputes occurred because women selected to power positions were powerful leaders outside the cooperative. Consensus was difficult to reach. There were conflicts of interest between different departments. Quality control was made difficult by women's inability to provide discipline. Personal conflicts from outside were carried on within the cooperative. Incomes could be improved by training women in local marketing and networking, insuring adequate resources and capital, and providing savings schemes. Gender inequalities were a key factor limiting income for women, but cooperatives did not address this issue. Gains for women

  11. SOME ASPECTS OF THE REGIONAL COOPERATION IN THE BALKANS

    Directory of Open Access Journals (Sweden)

    Mariya Gospodinova Grozeva

    2017-04-01

    Full Text Available Since the beginning of the 21st century, the political role of the state borders in the Balkans has changed. Gradually they began to transform from barriers into zones of bilateral and multilateral cooperation. The common European integration includes the creation and development of Euro-regions. Within the context of reorganization of the new European space, geopolitical importance of South-East Europe has significantly upgraded. This fact reflects on the interests of the international community in security and development of this region. Despite that the Balkans constitute an indispensable part of the European continent, their incorporation into the new European architecture has been particularly difficult and problematic. They emerge as the most volatile and least integrated European region. There are significant variations among the countries concerning their territory, number of population, as well as the rate of the economic changes. The main forms of regional cooperation should be concentrated on the domains of transport, energy and communication infrastructure, trade and economic cooperation, environment and security. From this point of view, the economic growth and increase of living standard are the most important problems for all Balkan countries.

  12. The ASEAN Political-Security Community: Enhancing Defense Cooperation

    Science.gov (United States)

    2015-12-01

    Yoong Lee, ASEAN Matters: Reflecting on the Association of Southeast Asian Nations (Singapore; Hackensack, NJ: World Scientific., 2011), i, http...from becoming overpopulated —by moving Javanese to low-density islands: Kalimantan, Sumatera, Papua, and Sulawesi. 58 Collins, Security and Southeast...In the mid-2000s, the increasing number of piracy and armed robbery activities in the Malacca Straits attracted world attention and attributed to the

  13. The Nuclear Safeguards and Security Activities under Euratom Research and Training Programme

    International Nuclear Information System (INIS)

    Abousahl, S.; Palajova, Z.; Janssens, W.A.M.; Luetzenkirchen, K.; Goncalves, J.G.M.; Aregbe, Y.; )

    2015-01-01

    Nuclear safeguards and security are absolute priorities for the EU. At technical level, the Joint Research Centre (JRC) as the European Commission's in-house science service plays an important role in the field of nuclear research, training and education that include nuclear safety, safeguards and security. The JRC's nuclear research activities are defined in a Council Regulation on the research and training programme of the European Atomic Energy Community. The JRC works closely with EC safeguards authority, whose mission is to ensure that nuclear material within the EU is not diverted from its intended use according to Euratom treaty. Technologies, methodologies and trainings are developed according to the Euratom Safeguards inspectorate's needs. In the area of nuclear security, the JRC contributes to the development of specific expertise in the field of nuclear forensics and border security detection as well as related training efforts for first front-line responders and national experts. The JRC provides its expert support for the implementation of internal EU action plans mainly in the field of radiological and nuclear security. At an international level, the JRC cooperates with the IAEA mainly through the EC support programme on the control of nuclear materials and facilities in order to avoid proliferation or diversion. Close cooperation with IAEA nuclear security is developed through the recent signature of a dedicated practical arrangement. Key partnerships have also been developed in the field of safeguards and security with the US-DoE, Russia, Japan and China. In addition, JRC contributes significantly to the EU nuclear safeguards and security outreach activities implemented under the Instrument for Nuclear Safety Cooperation and Instrument contributing to Stability and Peace. In this paper we will highlight some of the JRC contributions to the enhancement of nuclear safeguards and security at EU and international levels. (author)

  14. Cooperation challenges for the Special Tribunal for Lebanon

    NARCIS (Netherlands)

    Swart, B.

    2007-01-01

    While the Agreement between the United Nations and Lebanon provides a solid framework for cooperation between the Special Tribunal and Lebanon, Security Council Resolution 1757 (2007) is silent on the duty of third states to assist the Tribunal. As a result, the Special Tribunal will be confronted

  15. International energy technology collaboration: benefits and achievements

    International Nuclear Information System (INIS)

    1996-01-01

    The IEA Energy Technology Collaboration Programme facilitates international collaboration on energy technology research, development and deployment. More than 30 countries are involved in Europe, America, Asia, Australasia and Africa. The aim is to accelerate the development and deployment of new energy technologies to meet energy security, environmental and economic development goals. Costs and resources are shared among participating governments, utilities, corporations and universities. By co-operating, they avoid unproductive duplication and maximize the benefits from research budgets. The IEA Programme results every year in hundreds of publications which disseminate information about the latest energy technology developments and their commercial utilisation. The IEA Energy Technology Collaboration Programme operates through a series of agreements among governments. This report details the activities and achievements of all 41 agreements, covering energy technology information centres and Research and Development projects in fossil fuels, renewable energy efficient end-use, and nuclear fusion technologies. (authors). 58 refs., 9 tabs

  16. Using the safety/security interface to the security manager's advantage

    International Nuclear Information System (INIS)

    Stapleton, B.W.

    1993-01-01

    Two aspects of the safety/security interface are discussed: (1) the personal safety of nuclear security officers; and (2) how the security manager can effectively deal with the safety/security interface in solving today's requirements yet supporting the overall mission of the facility. The basis of this presentation is the result of interviews, document analyses, and observations. The conclusion is that proper planning and communication between the players involved in the security/safety interface can benefit the two programs and help achieve overall system integration, ultimately contributing to the bottom line. This is especially important in today's cost conscious environment

  17. Finnish experience on emergency preparedness co-operation work and results

    International Nuclear Information System (INIS)

    Sovijarvi, Jukka

    2014-01-01

    Document available in abstract form only. According to the 'Security Strategy for Society' the responsibilities are shared across society and the normal division of duties shall be maintained unchanged as far as possible in all situations. While the competent authority is always in charge of making decisions other administrative sectors may be cooperation partners. This applies to the representatives of business community and organization as well. The first regional co-operation group for NPP emergency preparedness consisting of the representatives of regional rescue service, NPP licensee and STUK was established in 2008 to develop the external rescue plan, arrange training etc. Today co-operation groups are working for both Finnish emergency planning zones. Examples of the co-operation results are discussed in the presentation. (author)

  18. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  19. Muddling Through: An Analysis of Security Force Assistance in Iraq

    Science.gov (United States)

    2017-05-25

    OSC-I mostly fell back into their comfort zone of managing 60 foreign military sales programs as the nominal advisement programs quickly fell apart...implications of these observations are critical to future SFA efforts, as the US government seeks to continue a long-term strategy of advising and...Iraqi Army, Mosul, ISIS, Advise and Assist, Security Assistance, Security Cooperation, MNSTC-I, OIF 16. SECURITY CLASSIFICATION OF: 17. LIMITATION

  20. (Inefficiency of EU Common Foreign and Security Policy: Ukraine, Brexit, Trump and beyond

    Directory of Open Access Journals (Sweden)

    Filipec Ondřej

    2017-10-01

    Full Text Available The main aim of this article is to explore and analyze key determinants of EU Common Foreign and Security Policy efficiency. For this purpose a 3C analytical approach is used, exploring EU foreign and security policy consistency, capacities and the dimension of cooperation. Article analyzes both horizontal and vertical, consistency of EU Foreign and Security policy especially with connection to Ukraine crises and diverging interests of EU member states. EU capacities are explored with main focus on military spending and challenges related to limited spending. EU military decline is put in contrast with new emerging regional powers. In the area of cooperation article is dedicated mainly to ineffective partnership with Turkey, cold attitude of Trump administration towards Europe and the implications of Brexit for EU foreign and security policy.

  1. Theory of Regression Apple Professional Cooperation Organization Research

    OpenAIRE

    Ouyang Bin

    2013-01-01

    In view of the enterprise ecological apple manor a variety of problems of existence, put forward to the enterprise management transformation, achieve enterprise, collective, individual integrated operation management and the use of regression mathematical model on apple professional cooperation organization analysis. Through the example, Apple professional economic cooperation organization innovation model of the input output ratio than the rural economic cooperation organization is much high...

  2. Development of a security-by-design handbook

    International Nuclear Information System (INIS)

    Olson, David L.; Snell, Mark Kamerer; Iida, Toru; Ochiai, Kazuya; Tanuma, Koji

    2010-01-01

    There is an increasing awareness that efficient and effective nuclear facility design is best achieved when requirements from the 3S disciplines Safety, Safeguards, and Security - are balanced and intrinsic to the facility design. This can be achieved when policy, processes, methods, and technologies are understood and applied in these areas during all phases of the design process. For the purposes of this paper, Security-by-design will be defined as the system level incorporation of the physical protection system (PPS) into a new or retrofitted nuclear power plant (NPP) or nuclear facility (NF) resulting in intrinsic security. Security-by-design can also be viewed as a framework to achieve robust and durable security systems. This paper reports on work performed to date to create a Security-by-Design Handbook, under a bilateral agreement between the United States and Japan, specifically, a review of physical protection principles and best practices, and a decommissioning to better understand where these principles and practices can be applied. This paper describes physical protection principles and best practices to achieve security-by- design that were gathered from International, Japanese, and U.S. sources. Principles are included for achieving security early in the design process where security requirements are typically less costly and easier to incorporate. The paper then describes a generic design process that covers the entire facility lifecycle from scoping and planning of the project to decommissioning and decontamination. Early design process phases, such as conceptual design, offer opportunities to add security features intrinsic to the facility design itself. Later phases, including design engineering and construction, are important for properly integrating security features into a coherent design and for planning for and assuring the proper performance of the security system during the operation and decommissioning of the facility. The paper also

  3. IAEA Activities in Nuclear Security, 18 April 2013, Delft, The Netherlands

    International Nuclear Information System (INIS)

    Amano, Y.

    2013-01-01

    I am pleased to take part in this event marking the launch of the new Masters Programme in Nuclear Security at the Reactor Institute Delft. The Institute has been an IAEA Collaborating Centre for nearly four years. Our two organisations have worked closely together in training and research, as well as in areas such as establishing quality management systems at nuclear analytical laboratories in IAEA Member States. The launch of the new Masters Programme in Nuclear Security by the Delft University of Technology marks a new stage in our cooperation. Four other European universities are also taking part in the programme: the University of Oslo, the Technical University of Vienna, the Brandenburg University of Applied Sciences, and the University of Manchester Dalton Nuclear Institute. I am pleased that the syllabus for the course has been developed from the IAEA's Educational Programme in Nuclear Security. I commend this effort to train a new generation of experts who can help to improve global nuclear security. Strengthening nuclear security throughout the world remains a challenge for all of us. National governments have primary responsibility for nuclear security, but international cooperation is vital.

  4. Hierarchy is Detrimental for Human Cooperation.

    Science.gov (United States)

    Cronin, Katherine A; Acheson, Daniel J; Hernández, Penélope; Sánchez, Angel

    2015-12-22

    Studies of animal behavior consistently demonstrate that the social environment impacts cooperation, yet the effect of social dynamics has been largely excluded from studies of human cooperation. Here, we introduce a novel approach inspired by nonhuman primate research to address how social hierarchies impact human cooperation. Participants competed to earn hierarchy positions and then could cooperate with another individual in the hierarchy by investing in a common effort. Cooperation was achieved if the combined investments exceeded a threshold, and the higher ranked individual distributed the spoils unless control was contested by the partner. Compared to a condition lacking hierarchy, cooperation declined in the presence of a hierarchy due to a decrease in investment by lower ranked individuals. Furthermore, hierarchy was detrimental to cooperation regardless of whether it was earned or arbitrary. These findings mirror results from nonhuman primates and demonstrate that hierarchies are detrimental to cooperation. However, these results deviate from nonhuman primate findings by demonstrating that human behavior is responsive to changing hierarchical structures and suggests partnership dynamics that may improve cooperation. This work introduces a controlled way to investigate the social influences on human behavior, and demonstrates the evolutionary continuity of human behavior with other primate species.

  5. Nuclear security at the summer 2004 Olympic Games

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: The International Atomic Energy Agency (IAEA) today announced an unprecedented joint action plan to help ensure a high level of nuclear security at the 2004 Olympic Games. Cooperation between the IAEA, the Greek Atomic Energy Commission and the Greek Olympics Games Security Division to provide expert advice and technical assistance followed a request for assistance from the two Greek authorities to the IAEA last summer. The action plan is designed to protect facilities and materials, to detect illicit trafficking and malicious use of radioactive materials, and to ensure that emergency response forces are effective and efficient. Much of the work in Greece has been undertaken in co-operation with some IAEA Member States - with substantial support provided by the United States and France in the fields of equipment, training and technical advice. The physical protection of the Demokritos nuclear research reactor, in a suburb of Athens, has been upgraded and the security of radioactive sources used at medical and industrial facilities in six Greek cities has been tightened. Radiation detection equipment has been installed at borders and other entry points into Greece, and mobile detection equipment will be deployed elsewhere. Hand-held radiation monitors are being distributed amongst the thousands of security personnel and customs officials who are involved in the security for the Games. The equipment is being deployed to detect radioactive materials that might be used as a weapon by terrorists in a radiological dispersal device, a so-called 'dirty bomb'. Detailed information on the steps that have been taken cannot be disclosed for reasons of security. 'There has been good cooperation with the Greek Atomic Energy Commission and with the other international partners in developing and implementing this work' said Mohamed ElBaradei, Director General of the IAEA. 'We are collectively striving for a high measure of security and the work being undertaken should

  6. The Impact of a Cooperative Learning Program on the Academic Achievement in Mathematics and Language in Fourth Grade Students and Its Relation to Cognitive Style

    Science.gov (United States)

    Vega, Mery Luz; Hederich M., Christian

    2015-01-01

    This study is expected to determine the impact of a program based on the cooperative learning methodology. This, in comparison to a traditional learning situation in both mathematics and language achievement. The study was carried out on a group of fourth grade students of primary school. In addition, it tried to find the differential impact…

  7. Secure Wireless Sensor Networks: Problems and Solutions

    Directory of Open Access Journals (Sweden)

    Fei Hu

    2003-08-01

    Full Text Available As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. This paper analyzes security challenges in wireless sensor networks and summarizes key issues that should be solved for achieving the ad hoc security. It gives an overview of the current state of solutions on such key issues as secure routing, prevention of denial-of-service and key management service. We also present some secure methods to achieve security in wireless sensor networks. Finally we present our integrated approach to securing sensor networks.

  8. [International cooperation on aging: areas and players].

    Science.gov (United States)

    Sidorenko, A V; Mikhaĭlova, O N

    2014-01-01

    This review article is devoted to the issues of international cooperation on ageing. It aims at describing the basic areas of cooperation and introducing its major players. Within the limited length of a journal article it is hardly possible to offer an exhaustive presentation of all available information; thus the article strives to provide a general orientation within the selected themes. The authors are hopeful that the presented materials will be of interest to the policy oriented researchers, policy makers and professionals working in the field of ageing and related areas such as social security, health and social services etc., as well as to the activists of non-governmental organizations.

  9. The Security Implications of Water: Prospects for Instability or Cooperation in South and Central Asia

    Science.gov (United States)

    2010-03-01

    and import enough fuels for its winter needs.” And,The World Bank, “ Water Energy Nexus in Central Asia: Improving Regional Cooperation in the Syr...94 “ Water Energy Nexus in Central Asia: Improving Regional Cooperation in the Syr Darya Basin,” World Bank Report...10. 95 All statistics are attributed from Water Energy Nexus in Central Asia: Improving Regional Cooperation in the Syr Darya Basin,” World Bank

  10. Collaborative and Cooperative Learning in Malaysian Mathematics Education

    Science.gov (United States)

    Hossain, Md. Anowar; Tarmizi, Rohani Ahmad; Ayud, Ahmad Fauzi Mohd

    2012-01-01

    Collaborative and cooperative learning studies are well recognized in Malaysian mathematics education research. Cooperative learning is used to serve various ability students taking into consideration of their level of understanding, learning styles, sociological backgrounds that develop students' academic achievement and skills, and breeze the…

  11. Nuclear security: A global response to a global threat

    International Nuclear Information System (INIS)

    Amano, Yukiya

    2016-01-01

    The threat of nuclear terrorism is real. The possibility of criminals getting hold of nuclear and other radioactive material cannot be ruled out. Much progress has been made in tackling this threat nationally, regionally and globally, but more needs to be done. International cooperation is vital. As the global platform for cooperation in nuclear security, the IAEA helps countries to establish and maintain robust and sustainable national nuclear security regimes. We help ensure that measures are taken to protect nuclear and other radioactive material, as well as the facilities in which such material is housed, from malicious acts. This has been an important year for nuclear security with the entry into force of the Amendment to the Convention on the Physical Protection of Nuclear Material. This establishes legally binding commitments for countries to protect nuclear facilities as well as nuclear material in domestic use, storage and transport. I encourage all countries that have not yet done so to adhere to this Amendment and thereby contribute to a stronger global nuclear security regime. In this edition of the IAEA Bulletin, you will learn about the different areas of security where our work is making a real difference. We highlight the progress made in a number of countries.

  12. Information Security Service Branding – beyond information security awareness

    Directory of Open Access Journals (Sweden)

    Rahul Rastogi

    2012-12-01

    Full Text Available End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of information security in the organization and exhibit non-compliance. In order to improve compliance levels, it is vital to improve the image of information security in the minds of end-users. This paper borrows the concepts of brands and branding from the domain of marketing to achieve this objective and applies these concepts to information security. The paper also describes a process for creating the information security service brand in the organization.

  13. MOTION PLANNING OF MULTIPLE MOBILE ROBOTS COOPERATIVELY TRANSPORTING A COMMON OBJECT

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    Many applications above the capability of a single robot need the cooperation of multiple mobile robots, but effective cooperation is hard to achieve. In this paper, a master-slave method is proposed to control the motions of multiple mobile robots that cooperatively transport a common object from a start point to a goal point. A noholonomic kinematic model to constrain the motions of multiple mobile robots is built in order to achieve cooperative motions of them, and a "Dynamic Coordinator" strategy is used to deal with the collision-avoidance of the master robot and slave robot individually. Simulation results show the robustness and effectiveness of the method.

  14. Toward a New Trilateral Strategic Security Relationship: United States, Canada, and Mexico

    Directory of Open Access Journals (Sweden)

    Richard J. Kilroy, Jr.

    2010-01-01

    Full Text Available The term "perimeter defense" has come back into vogue recently, with regard to security strategies for North America. The United States' concern primarily with the terrorist threat to its homeland subsequent to September 11, 2001 (9/11 is generating this discussion with its immediate neighbors of Mexico and Canada (and to some extent some Caribbean nations—the "third border". The concept is simply that by pushing defenses out to the "perimeter" nations, then security will be enhanced, since the United States visions itself as more vulnerable to international terrorism than its neighbors. However, Canada and Mexico have not been very happy about the perimeter defined by Washington since 9/11. These nations have sought to define the trilateral relationship beyond just discussions of terrorism to include natural disasters and international organized crime as a component of a broader trilateral agenda. Eight years later these three nations continue to look for some convergence of security interests, although there remains a degree of tension and hesitancy towards achieving a "common security agenda" in the Western Hemisphere.This article examines the concept of "perimeter defense" within the context of the new security challenges that the United States, Mexico, and Canada face today. Questions to be addressed in the article include: Do all these nations share the same "threat" perception? Where exactly is the "perimeter?" What security arrangements have been tried in the past? What are the prospects for the future for increased security cooperation? The main focus of this article is at the sub-regional level in North America and whether a new "trilateral" strategic security relationship between the United States, Canada, and Mexico can emerge in North America.

  15. Cooperative measures to mitigate Asia-Pacific maritime conflicts.

    Energy Technology Data Exchange (ETDEWEB)

    Chai, Wen-Chung (Taiwan Navy)

    2003-05-01

    The economies of East Asia are predominantly export based and, therefore, place special emphasis on the security of the sea lines of communication (SLOCs). Due to economic globalization, the United States shares these concerns. Cooperative measures by the concerned parties could reduce the potential for disruption by maritime conflicts. Primary threats against the SLOCs are disputes over the resources under the seas, disputes over some small island groups, disputes between particular parties (China-Taiwan and North-South Korea), or illegal activities like smuggling, piracy, or terrorism. This paper provides an overview on these threats, issue by issue, to identify common elements and needed cooperation. Cooperation on other topics such as search and rescue, fisheries protection, and oil spill response may help support improved relations to prevent maritime conflicts. Many technologies can help support maritime cooperation, including improved communications links, tracking and emergency beacon devices, and satellite imaging. Appropriate technical and political means are suggested for each threat to the SLOCs.

  16. Peace at last? Appraisal of the Addis Ababa Peace and Security ...

    African Journals Online (AJOL)

    As a result, the Congolese government and other peace stakeholders in the Great Lakes region and beyond signed the Addis Ababa Peace and Security Cooperation (PSC) Framework in February 2013, paving the way to the adoption, a month later, of Resolution 2098 by the United Nations (UN) Security Council.

  17. Petroleum prospects and the need for international cooperation

    International Nuclear Information System (INIS)

    Constantinou, C.

    1991-01-01

    A review of the world energy situation prior to the Persian Gulf War of 1990-91 shows that periods of oil price instability have distorted the decision-making process. During periods of high prices, investments were made in uneconomic energy sources and in periods of low prices few investments were made at all. To create a rational investment climate, international cooperation between consumers and producers of petroleum is essential. Such cooperation in the form of a forum could help to stabilize prices and assure that the economic decisions needed to meet future demand would be made in a secure framework. (author). 3 refs

  18. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  19. The Impact of Cooperative Learning Methods on Elementary Preservice Education Teachers' Mathematics Achievement and Anxiety

    Science.gov (United States)

    Swift, Elijah Raford, Jr.

    2012-01-01

    The purpose of this study was to address the gap in research regarding the use of cooperative learning instructional methods in college mathematics courses to prepare future teachers. Bruner's constructivist theory and social interdependence theory guided this study. The research questions focused on the effects of the use of cooperative learning…

  20. Kuwait: Governance, Security, and U.S. Policy

    Science.gov (United States)

    2016-09-29

    Gulf Cooperation Council (GCC: Saudi Arabia, Kuwait, UAE, Qatar, Bahrain, and Oman). In March 2011, Kuwait joined a GCC military intervention to...before the start of [2013]”—a statement that furthered Iraq’s argument that the U.N. Security Council should remove any remaining “Chapter 7” (of the...with alternative mechanisms, as discussed below. On December 15, 2010, the U.N. Security Council passed three resolutions—1956, 1957, and 1958—that

  1. The homeland security enterprise where do we fit?

    OpenAIRE

    Marlowe, Kirk S.

    2009-01-01

    CHDS State/Local Homeland security is a responsibility to be shared across the nation. Resource demands, differing cultures, and varying motivations result in frustration and confusion that conflict with the nation's need to collaborate and cooperate. As such, the homeland security enterprise appears to be imploding from turf battles, suspicion, poor communication, competitive funding, and mistrust, which cause stakeholders to wonder where they fit in this complex, interdependent env...

  2. Corporate identity as a factor of corporate security

    OpenAIRE

    Perelygina, Elena

    2011-01-01

    Forming-up of the corporate identity is based on cognitive, affective and conative elements of corporate culture. The group as an entity choosing goals and values ensures a certain response to standards and values of corporate culture within the parameters of its social responsibility. Corporate security as security of community and cooperation acts as a form of organizational and ethical approach to developing socially responsible attitude of government and business.

  3. Distributed control of multi-robot teams: Cooperative baton passing task

    Energy Technology Data Exchange (ETDEWEB)

    Parker, L.E.

    1998-11-01

    This research addresses the problem of achieving fault tolerant cooperation within small- to medium-sized teams of heterogeneous mobile robots. The author describes a novel behavior-based, fully distributed architecture, called ALLIANCE, that utilizes adaptive action selection to achieve fault tolerant cooperative control. The robots in this architecture possess a variety of high-level functions that they can perform during a mission, and must at all times select an appropriate action based on the requirements of the mission, the activities of other robots, the current environmental conditions, and their own internal states. Since such cooperative teams often work in dynamic and unpredictable environments, the software architecture allows the team members to respond robustly and reliably to unexpected environmental changes and modifications in the robot team that may occur due to mechanical failure, the learning of new skills, or the addition or removal of robots from the team by human intervention. After presenting ALLIANCE, they describe the implementation of this architecture on a team of physical mobile robots performing a cooperative baton passing task. These experiments illustrate the ability of ALLIANCE to achieve adaptive, fault-tolerant cooperative control amidst dynamic changes during the task.

  4. Cooperative Energy Management for a Cluster of Households Prosumers

    DEFF Research Database (Denmark)

    Hernández, Adriana Carolina Luna; Aldana, Nelson Leonardo Diaz; Graells, Moises

    2016-01-01

    . Therefore, consumers become prosumers in which they internally generate and consume energy looking for an autonomous operation. This paper proposes an energy management system for coordinating the operation of distributed household prosumers. It was found that better performance is achieved when cooperative...... operation with other prosumers in a neighborhood environment is achieved. Simulation and experimental results validate the proposed strategy by comparing the performance of islanded prosumers with the operation in cooperative mode....

  5. The nature of international health security.

    Science.gov (United States)

    Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N

    2009-01-01

    Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.

  6. A Taste of Cooperativeness within an Elementary School.

    Science.gov (United States)

    McElroy, Karen B.

    1989-01-01

    The process of implementing cooperative learning techniques in an elementary school in Montgomery County, Maryland, is described. Discussed are: learning techniques used, such as Student Teams Achievement Divisions, Round Table, Think-Pair-Share, and the Trading Game; student and teacher reactions to cooperative learning; teacher recommendations;…

  7. Agroenergy production from biomass in integrated agroforestry systems: an alternative to achieve food security and environmental protection

    International Nuclear Information System (INIS)

    Suárez, J.; Martín, G. J.

    2010-01-01

    The objective of this paper is to offer considerations about agroenergy production from biomass in integrated agroforestry systems. At present, worldwide, marked by a group of hazards that threaten human existence, there is a challenge mainly in the rural context: how can the coexistence of agroenergy, food security and environmental protection be achieved?, in the presence of climate changes, environmental degradation, food crises and the growing biofuels vs food contradiction, generated by a senseless policy for obtaining first-generation agrofuels from large extensions of food monocrops, which is morally rejectable. Biofuels are also considered an ecological alternative to fossil fuels, because of their reduction capacity in the emission of greenhouse gasses and because they promote the development of rural communities in southern countries; this is enhanced in integrated agroforestry systems, in which biofuels, of first as well as second generation, can be produced, especially with the application of the concept of biorefinery which allows converting biomass into many products, which total added value can be higher than the one generated by fossil fuels. International projects, which promote integrated and sustainable food and energy production in the context of agroforestry integrated systems, at local scale, contribute to this purpose. The authors consider that the execution of projects and experiences about agroenergy has the main objective of achieving energetic sustainability and food security at local scale, in rural areas, taking into account environmental protection. (author)

  8. Engineering Information Security The Application of Systems Engineering Concepts to Achieve Information Assurance

    CERN Document Server

    Jacobs, Stuart

    2011-01-01

    Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with requirements and policy development and progressing through development, deployment, and operations, and concluding with decommissioning. Professionals in the sciences, engineering, and communications fields will turn to this resource to understand the many legal,

  9. Sweden-Lithuania bilateral cooperation in nuclear safety

    International Nuclear Information System (INIS)

    Nistad, J.H.; Vaisnys, P.

    1996-01-01

    This cooperation started in early 1992 shortly after Lithuania became a newly independent republic. The results from the bilateral co-operation in the field of nuclear safety are very fruitful and promising. The work is progressing in a very efficient and cost-effective way. The pace of progress is to a great extent governed by the resources the Lithuanian partners can allocate. The Swedish Government has up to now allocated more than 200 MSEK (>30 MUSD) for this bilateral cooperation in nuclear safety enhancement. This paper gives an overview of the main content and achievements of the Swedish-Lithuanian cooperation. 1 tab, 2 diagrams

  10. Achievements, current status and prospects for Russian-American cooperation in nuclear material physical protection, control and accounting - 1998

    International Nuclear Information System (INIS)

    Nikiforov, N.V.

    1999-01-01

    The process of upgrading the material physical protection, control and accounting systems is an ongoing and long-term process that consists of modernization measuring equipment and methodologies, improving, data exchange and processing technologies, and improving administrative procedures. The positive results that was already achieved form a foundation upon which this collaboration may extend into other new and important areas, such as - the second and third lines of defence, which are directed toward countering illegal trafficking not only in nuclear materials, but in other hazardous substances that constitute a threat to the nuclear sites and national security of the countries [ru

  11. On fairness, full cooperation, and quantum game with incomplete information

    Science.gov (United States)

    Lei, Zhen-Zhou; Liu, Bo-Yang; Yi, Ying; Dai, Hong-Yi; Zhang, Ming

    2018-03-01

    Quantum entanglement has emerged as a new resource to enhance cooperation and remove dilemmas. This paper aims to explore conditions under which full cooperation is achievable even when the information of payoff is incomplete. Based on the quantum version of the extended classical cash in a hat game, we demonstrate that quantum entanglement may be used for achieving full cooperation or avoiding moral hazards with the reasonable profit distribution policies even when the profit is uncertain to a certain degree. This research further suggests that the fairness of profit distribution should play an important role in promoting full cooperation. It is hopeful that quantum entanglement and fairness will promote full cooperation among distant people from various interest groups when quantum networks and quantum entanglement are accessible to the public. Project supported by the National Natural Science Foundation of China (Grant Nos. 61673389, 61273202, and 61134008.

  12. Hierarchy is Detrimental for Human Cooperation

    Science.gov (United States)

    Cronin, Katherine A.; Acheson, Daniel J.; Hernández, Penélope; Sánchez, Angel

    2015-01-01

    Studies of animal behavior consistently demonstrate that the social environment impacts cooperation, yet the effect of social dynamics has been largely excluded from studies of human cooperation. Here, we introduce a novel approach inspired by nonhuman primate research to address how social hierarchies impact human cooperation. Participants competed to earn hierarchy positions and then could cooperate with another individual in the hierarchy by investing in a common effort. Cooperation was achieved if the combined investments exceeded a threshold, and the higher ranked individual distributed the spoils unless control was contested by the partner. Compared to a condition lacking hierarchy, cooperation declined in the presence of a hierarchy due to a decrease in investment by lower ranked individuals. Furthermore, hierarchy was detrimental to cooperation regardless of whether it was earned or arbitrary. These findings mirror results from nonhuman primates and demonstrate that hierarchies are detrimental to cooperation. However, these results deviate from nonhuman primate findings by demonstrating that human behavior is responsive to changing hierarchical structures and suggests partnership dynamics that may improve cooperation. This work introduces a controlled way to investigate the social influences on human behavior, and demonstrates the evolutionary continuity of human behavior with other primate species. PMID:26692287

  13. Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    2006-01-01

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  14. Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    2007-01-01

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  15. Cooperation is a two-way street

    International Nuclear Information System (INIS)

    Krol, J.

    2012-01-01

    The emergency response system in USA is described. The task of emergency management is assigned to the Office of Emergency Operations in the National Nuclear Security Administration of US Department of Energy, dedicated groups of specialists all over the country, US DOE Headquarters emergency center similar to Rosatom's Situation and Crisis Center. Problems worked out by the center, cooperation with national laboratories and Russian Rosatom are considered [ru

  16. Common security and defence policy of the European Union and NATO

    Directory of Open Access Journals (Sweden)

    Beriša Hatidža

    2015-01-01

    Full Text Available The paper presents the structural analysis of cooperation collectivity NATO and the EU, who are the guarantors of foreign security policy in the region and in the world. In this regard, it outlines the hypothetical discourse in the EU's relations with NATO, the United States, that have marked the start of the independence of each individual battle in terms of security. Standalone approach, reflecting the credibility of each individual collectivity, ultimately lead to a reduction of investment potential. It starts by considering a presentation of possible options on the reflection of the relations between the EU and NATO that the 'fine-tuning' proclaims the need for integration and pragmatic and rational manner, accepted by the political and economic realities in achieving interests. In this paper, the intention of the data on CSDP and critical analysis of relations between the EU and NATO and the presentation of the most significant agreements between the two collectives, help bridge the gap in the division of political interest and commitment of its leading members.

  17. The Use of Earth Observation to Address SDG13 Climate Change in Mexico The UK and Mexico Cooperation to Address Environmental Protection: The Bacalar Case Study

    OpenAIRE

    Cabrera Alvarado, S; Guida, Raffaella; Iervolino, Pasquale

    2016-01-01

    One of the main goals of the State is to guarantee the security and welfare of the citizens. States have agreed in making “a better world” for citizens under the United Nations (UN) Sustainable Development Goals (SDG) targets and actions. States have acquired the obligation to address this mandate and seek all possible solutions to address it. International cooperation and the use of space technology are tools to achieve this endeavor. This paper discusses the innovations of international coo...

  18. Corporate Identity as a Factor of Corporate Security

    Directory of Open Access Journals (Sweden)

    Elena B. Perelygina

    2011-01-01

    Full Text Available Forming-upof the corporate identity is based on cognitive, affective and conative elements of corporate culture. The group as an entity choosing goals and values ensures a certain response to standards and values of corporate culture within the parameters of its social responsibility. Corporate security as security of community and cooperation acts as a form of organizational and ethical approach to developing socially responsible attitude of government and business.

  19. Ethical Hacking in Information Security Curricula

    Science.gov (United States)

    Trabelsi, Zouheir; McCoey, Margaret

    2016-01-01

    Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…

  20. A national laboratory/private industry cooperative research and development agreement (CRADA)

    International Nuclear Information System (INIS)

    Pritchard, D.A.

    1996-01-01

    This paper provides an overview of the history and process of establishing a cooperative research and development agreement (CRADA) between Sandia National Laboratories and Magnavox Electronic Systems Company for the design, development, and testing of a 360-degree scanning, imaging, intrusion detection sensor. The subject of the CRADA is the Advanced Exterior Sensor (AES). It is intended for exterior use at ranges from 50 to 1,500 meters and uses a combination of three sensing technologies (infrared, visible, and radar) and a new data processing method to provide low false-alarm intrusion detection and tracking combined with immediate visual assessment. The establishment of this CRADA represents a new paradigm in the cooperation between the Department of Defense, the Department of Energy, the National Laboratories and Private Industry. Although a formal document has now been executed, a CRADA is, nonetheless, primarily an agreement to work with each other to achieve goals that might otherwise be unattainable. For the DoD, a program continues in the face of uncertain funding. For the DOE, a CRADA is in place that meets congressionally mandated guidelines. For Sandia, sponsors are in agreement on requirements and synergistic funding. And for Magnavox, an opportunity is in hand to work with researchers in developing advanced security technology

  1. Technical co-operation report for 2000. Report by the Director General

    International Nuclear Information System (INIS)

    2001-01-01

    This report covers three separate topics. Part one fulfills the Agency's obligation under the General Conference resolution GC(44)/RES/18 to report on the Strengthening of Technical Co-operation. It covers the period from 1 April 2000 to 31 March 2001. The report examines the finalization of the 2001-2002 technical co-operation programme and several key concepts of the Technical Co-operation Strategy such as Partners in Development, Technical Co-operation among Developing Countries, and the continuing evolution of Regional Resource Centres. Reflecting an important trend in the technical co-operation programme, which was mandated by the General Conference, the report describes the results achieved in several programmes in least developed countries. Part two reports on the major achievements of the technical co-operation programme in 2000 in the different regions of the world. Part three presents a summary of the financial and non-financial parameters of the technical co-operation programme. The supplement to the report provides a more detailed review of resources and contributions, disbursements and non-financial indicators

  2. Technical co-operation report for 2000. Report by the Director General

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This report covers three separate topics. Part one fulfills the Agency's obligation under the General Conference resolution GC(44)/RES/18 to report on the Strengthening of Technical Co-operation. It covers the period from 1 April 2000 to 31 March 2001. The report examines the finalization of the 2001-2002 technical co-operation programme and several key concepts of the Technical Co-operation Strategy such as Partners in Development, Technical Co-operation among Developing Countries, and the continuing evolution of Regional Resource Centres. Reflecting an important trend in the technical co-operation programme, which was mandated by the General Conference, the report describes the results achieved in several programmes in least developed countries. Part two reports on the major achievements of the technical co-operation programme in 2000 in the different regions of the world. Part three presents a summary of the financial and non-financial parameters of the technical co-operation programme. The supplement to the report provides a more detailed review of resources and contributions, disbursements and non-financial indicators.

  3. Military Applications of Nanotechnology: Implications for Strategic Cooperation & Conflict

    OpenAIRE

    Center on Contemporary Conflict

    2012-01-01

    FY 2012-2013. Project Leads: Kosal, Margaret E. The report will advance critical thinking on the potential role and impact of nanotechnology on defense policy. It will view nanotechnology through the prism of international cooperation and competition, examining whether emerging nanotechnology will exacerbate or mitigate regional security challenges. NA

  4. COOPERATIVE THREAT REDUCTION: DOD Has Adequate Oversight of Assistance, but Procedural Limitations Remain

    National Research Council Canada - National Science Library

    2001-01-01

    ... more than $3 billion for the Cooperative Threat Reduction (CTR) program to help Russia, Belarus, Ukraine, Kazakhstan, Uzbekistan, Moldova, and Georgia secure and eliminate weapons of mass destruction...

  5. Hydropolitical Complexes and Asymmetrical Power: Conflict, Cooperation, and Governance of International River Systems

    Directory of Open Access Journals (Sweden)

    Jenny R. Kehl

    2015-08-01

    Full Text Available Hydropolitical complexes are emerging to negotiate water-sharing policies that promote politicalstability, regional security, economic prosperity, and environmental sustainability. Yet interstatedisputes are occurring within most hydropolitical complexes, and weak riparians are oftencoerced to agree to water-sharing policies that adversely affect them. This research examines thestrategies weak riparians use to assert leverage in international river basins with asymmetricalpower, and the success of those strategies in achieving cooperation versus conflict. Grounded inthe theoretical framework of hydro hegemony, hard power, and soft power, this study uses crossnational analysis to test the effects of geographic, military, political, economic, technological,and external influence on water governance in eight international river systems. The resultsdemonstrate that weak riparians mobilize the assets and capacities of external actors, such asdonor countries and the World Bank, to increase their leverage within hydropolitical complexes.The study finds that strategies to balance hard power are largely ineffective; they fail to achievecooperative water-sharing arrangements and often exacerbate conflict. In contrast, strategies tobalance economic power and soft power, such as market access and political legitimacy, aremore successful in promoting cooperation and preventing conflict in hydropolitical complexes.

  6. Education and Training, and Knowledge Networks for Capacity-Building in Nuclear Security

    International Nuclear Information System (INIS)

    Mrabit, Khammar

    2014-01-01

    Conclusions: • Capacity Building (CB) is critical for States to establish and maintain effective and sustainable nuclear security regime. • IAEA is a worldwide platform promoting international cooperation for CB in nuclear security involving more than 160 countries and over 20 Organizations and Initiatives. • IAEA Division of Nuclear Security is ready to continue supporting States in developing their CB through: – Comprehensive Training Programme: more than 80 training events annually – International Nuclear Security Training and Support Centre Network (NSSC) – Comprehensive Education Programme – International Nuclear Security Network (INSEN)

  7. A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks

    Science.gov (United States)

    Stelios, Yannis; Papayanoulas, Nikos; Trakadas, Panagiotis; Maniatis, Sotiris; Leligou, Helen C.; Zahariadis, Theodore

    Wireless sensor networks are inherently vulnerable to security attacks, due to their wireless operation. The situation is further aggravated because they operate in an infrastructure-less environment, which mandates the cooperation among nodes for all networking tasks, including routing, i.e. all nodes act as “routers”, forwarding the packets generated by their neighbours in their way to the sink node. This implies that malicious nodes (denying their cooperation) can significantly affect the network operation. Trust management schemes provide a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them either for data forwarding, data aggregation or any other cooperative function. We propose a secure routing solution based on a novel distributed trust management system, which allows for fast detection of a wide set of attacks and also incorporates energy awareness.

  8. Cooperative Learning in the Advanced Algebra and Trigonometry Mathematics High School Classroom

    Science.gov (United States)

    Jozsa, Alison

    2017-01-01

    Over the past three decades, researchers have found cooperative learning to have positive effects on student achievement in various subject areas and levels in education. However, there are limited studies on the impact of cooperative learning on student achievement in the area of high school mathematics. This study examined the impact of…

  9. Teachers' Reflections on Cooperative Learning: Issues of Implementation

    Science.gov (United States)

    Gillies, Robyn M.; Boyle, Michael

    2010-01-01

    Cooperative learning (CL) is a well documented pedagogical practice that promotes academic achievement and socialization, yet many teachers struggle with implementing it in their classes. This study reports on the perceptions of 10, middle-year teachers who implemented cooperative learning in a unit of work across two school terms. Data from the…

  10. Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS)

    Science.gov (United States)

    2012-05-01

    protect, and secure the United States and its interests. • AOF is the United States, Alaska, Canada, Mexico, Bahamas, Puerto Rico , and the U.S. Virgin...Criteria (UFC) for Smart Microgrid Cyber design guides for Industrial Control Systems (ICS) Residual systems Operations and Maintenance Operator...Training Sustainment Commercial Transition Cooperation with NIST for microgrid security standards Working with industry associations and

  11. Group Cooperation without Group Selection: Modest Punishment Can Recruit Much Cooperation.

    Science.gov (United States)

    Krasnow, Max M; Delton, Andrew W; Cosmides, Leda; Tooby, John

    2015-01-01

    Humans everywhere cooperate in groups to achieve benefits not attainable by individuals. Individual effort is often not automatically tied to a proportionate share of group benefits. This decoupling allows for free-riding, a strategy that (absent countermeasures) outcompetes cooperation. Empirically and formally, punishment potentially solves the evolutionary puzzle of group cooperation. Nevertheless, standard analyses appear to show that punishment alone is insufficient, because second-order free riders (those who cooperate but do not punish) can be shown to outcompete punishers. Consequently, many have concluded that other processes, such as cultural or genetic group selection, are required. Here, we present a series of agent-based simulations that show that group cooperation sustained by punishment easily evolves by individual selection when you introduce into standard models more biologically plausible assumptions about the social ecology and psychology of ancestral humans. We relax three unrealistic assumptions of past models. First, past models assume all punishers must punish every act of free riding in their group. We instead allow punishment to be probabilistic, meaning punishers can evolve to only punish some free riders some of the time. This drastically lowers the cost of punishment as group size increases. Second, most models unrealistically do not allow punishment to recruit labor; punishment merely reduces the punished agent's fitness. We instead realistically allow punished free riders to cooperate in the future to avoid punishment. Third, past models usually restrict agents to interact in a single group their entire lives. We instead introduce realistic social ecologies in which agents participate in multiple, partially overlapping groups. Because of this, punitive tendencies are more expressed and therefore more exposed to natural selection. These three moves toward greater model realism reveal that punishment and cooperation easily evolve by

  12. Group Cooperation without Group Selection: Modest Punishment Can Recruit Much Cooperation.

    Directory of Open Access Journals (Sweden)

    Max M Krasnow

    Full Text Available Humans everywhere cooperate in groups to achieve benefits not attainable by individuals. Individual effort is often not automatically tied to a proportionate share of group benefits. This decoupling allows for free-riding, a strategy that (absent countermeasures outcompetes cooperation. Empirically and formally, punishment potentially solves the evolutionary puzzle of group cooperation. Nevertheless, standard analyses appear to show that punishment alone is insufficient, because second-order free riders (those who cooperate but do not punish can be shown to outcompete punishers. Consequently, many have concluded that other processes, such as cultural or genetic group selection, are required. Here, we present a series of agent-based simulations that show that group cooperation sustained by punishment easily evolves by individual selection when you introduce into standard models more biologically plausible assumptions about the social ecology and psychology of ancestral humans. We relax three unrealistic assumptions of past models. First, past models assume all punishers must punish every act of free riding in their group. We instead allow punishment to be probabilistic, meaning punishers can evolve to only punish some free riders some of the time. This drastically lowers the cost of punishment as group size increases. Second, most models unrealistically do not allow punishment to recruit labor; punishment merely reduces the punished agent's fitness. We instead realistically allow punished free riders to cooperate in the future to avoid punishment. Third, past models usually restrict agents to interact in a single group their entire lives. We instead introduce realistic social ecologies in which agents participate in multiple, partially overlapping groups. Because of this, punitive tendencies are more expressed and therefore more exposed to natural selection. These three moves toward greater model realism reveal that punishment and cooperation

  13. The Houston Ship Channel security: a case study

    Science.gov (United States)

    Le, Han Q.; Bellamy, P. A.; Pei, S. S. S.

    2007-04-01

    The Houston Ship Channel (HSC) is a 50-mile long shipping channel that contains many private ports including the Port of Houston Authority. It has a uniquely critical role with respect to the US petroleum energy supply. The HSC security is currently planned for significant enhancement under the auspices of the Harris County and the Houston-based Port Strategic Security Council. The ultimate objective is to comprehensively address the HSC threat matrix. This paper describes the technical effort in support of this program. The HSC security is a complex system of systems that includes the physical control access system, the command, control, communication, and information (C4I) system, and the telecom infrastructure. The strategy is to coordinate the improvements of different components to achieve a high-impact net effectiveness. A key element is a planned high-capacity backbone optical network for integrating the C4I of many different HSC administrative-jurisdictional authorities, which will allow unified situational awareness for a more effective cooperation and coordination. Enhancement of surveillance and intrusion protection is crucial. A feasibility study was conducted for the HSC assuming common surveillance technologies including visible/IR camera, radar, and sonar. The method includes survey and theoretical modeling to detect threats of concern in the HSC natural environment. The result indicates that the HSC unique river-like geography offers both advantages and challenges. The narrow channel allows ease of waterside surveillance, but likely incurs high cost for its great length. In addition, landside security is also important owing to its location amidst urban-industrial zone. Lastly, limitation of the various technologies is discussed by considering the broader challenges of the intrusion problem.

  14. KENYA’S CONSTITUTION AND CHILD TRAFFICKING AS A SECURITY THREAT

    Directory of Open Access Journals (Sweden)

    E.O.S. ODHIAMBO

    2012-01-01

    Full Text Available Human trafficking also referred to as modern-day slavery is seen as a security threat. Traditional security approaches to human trafficking call for analysis of trafficking as a threat to the Kenyan state and to Kenya’s control of its borders. Traditional security analyses of trafficking emphasize border security, migration controls, and international law enforcement cooperation. This article discusses three forms of child trafficking: sexual exploitation, forced labor and child soldiers and argues that the newly promulgated Kenyan constitution in chapter three on citizenship has a provision that can be interpreted as encouraging child trafficking.

  15. Application of cooperative and non-cooperative games in large-scale water quantity and quality management: a case study.

    Science.gov (United States)

    Mahjouri, Najmeh; Ardestani, Mojtaba

    2011-01-01

    In this paper, two cooperative and non-cooperative methodologies are developed for a large-scale water allocation problem in Southern Iran. The water shares of the water users and their net benefits are determined using optimization models having economic objectives with respect to the physical and environmental constraints of the system. The results of the two methodologies are compared based on the total obtained economic benefit, and the role of cooperation in utilizing a shared water resource is demonstrated. In both cases, the water quality in rivers satisfies the standards. Comparing the results of the two mentioned approaches shows the importance of acting cooperatively to achieve maximum revenue in utilizing a surface water resource while the river water quantity and quality issues are addressed.

  16. Kazakh Initiatives on Cooperation with European Union

    Directory of Open Access Journals (Sweden)

    Rustem S. Kurmanguzhin

    2015-01-01

    Full Text Available The author of this article presents initiatives of the Republic of Kazakhstan to develop cooperation with the European Union that was initiated through 2000 - 2009. In 2000 the Republic of Kazakhstan proposed to EU Comment cooperation doctrine in Central Asia. The purpose of the doctrine lied in expanding cooperation in the areas of trade, economy and investment; in granting access to commodities and services from European markets; in developing collaboration in the areas of energy, transport, communication, finance and banking. In 2006 Kazakhstan introduced a new set of prepossess to the new European Union Strategy for Central Asian 2007-2013 that was developed under the chairmanship of Germany of the EU in the first half of 2007. The Strategy covered areas of cooperation such as regional integration, economic development, democratization, energy and security. In 2008 under the instructions of the President of Kazakhstan Ministry of Foreign Affairs in cooperation with other ministries developed a state programme "Path to Europe" for 2009 - 2011, which aided the priorities of cooperation between Kazakhstan and the European Union. "Path to Europe" has become a key initiative of the Kazakh foreign policy that was successfully implemented, as well as the most important document aimed at modernization of the national economy and the Kazakh society. In the beginning of2009 using the accumulated positive experience of cooperation with the EU and experience of a number of countries in Europe and Asia, Kazakhstan devised and submitted a concept of a new treaty which was supposed to replace the Partnership and Cooperation Agreement of 1995. The Republic of Kazakhstan's influence eventually persuaded the European Union to agree on the necessity of devising the Enhanced Partnership and Cooperation Agreement.

  17. Cooperative Monitoring Center Occasional Paper/13: Cooperative monitoring for confidence building: A case study of the Sino-Indian border areas

    Energy Technology Data Exchange (ETDEWEB)

    SIDHU,WAHEGURU PAL SINGH; YUAN,JING-DONG; BIRINGER,KENT L.

    1999-08-01

    This occasional paper identifies applicable cooperative monitoring techniques and develops models for possible application in the context of the border between China and India. The 1993 and 1996 Sino-Indian agreements on maintaining peace and tranquility along the Line of Actual Control (LAC) and establishing certain confidence building measures (CBMs), including force reductions and limitation on military exercises along their common border, are used to examine the application of technically based cooperative monitoring in both strengthening the existing terms of the agreements and also enhancing trust. The paper also aims to further the understanding of how and under what conditions technology-based tools can assist in implementing existing agreements on arms control and confidence building. The authors explore how cooperative monitoring techniques can facilitate effective implementation of arms control agreements and CBMS between states and contribute to greater security and stability in bilateral, regional, and global contexts.

  18. In search of security: Finding an alternative to nuclear deterrence. 4 November 2004, Stanford, California, USA. Stanford University, Center for International Security and Cooperation (CISAC)

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    Treaty on the Non-Proliferation of Nuclear Weapons (NPT) remains the global anchor for humanity's efforts to curb nuclear proliferation and move towards nuclear disarmament. There is no doubt that the implementation of the NPT continues to provide important security benefits, by providing assurance that, in the great majority of non-nuclear-weapon States, nuclear energy is not being misused for weapon purposes. The NPT is also the only binding agreement in which all five of the nuclear-weapon States have committed themselves to move forward towards nuclear disarmament. Still, for all of us who have been intimately associated with the implementation of the Treaty for over three decades, it is clear that recent events have placed the NPT and the regime supporting it under unprecedented stress, exposing some of its inherent limitations and pointing to areas that need to be adjusted. This presentation discusses some of the lessons that can be taken from recent experience, and a number of possible ways for moving forward. Of course, the Iraq experience is the most glaring recent case relevant to nuclear proliferation and security, but unfortunately not the only one. The IAEA's efforts to verify undeclared nuclear programmes in Iran, Libya and the Democratic People's Republic of Korea have also provided considerable insights and a number of lessons. For centuries, perhaps for millennia, security strategies have been based on boundaries: city walls, border patrols, and the use of racial and religious groupings or other categories to separate friend from foe. Those strategies no longer work. This is a mindset we must change. In this century, in this generation, we must develop a new approach to security capable of transcending borders - an inclusive approach that is centred on the value of every human life. The sooner we can make that transition, the sooner we will achieve our goal of a planet with peace and justice as its hallmark

  19. In search of security: Finding an alternative to nuclear deterrence. 4 November 2004, Stanford, California, USA. Stanford University, Center for International Security and Cooperation (CISAC)

    Energy Technology Data Exchange (ETDEWEB)

    ElBaradei, M

    2004-11-04

    Treaty on the Non-Proliferation of Nuclear Weapons (NPT) remains the global anchor for humanity's efforts to curb nuclear proliferation and move towards nuclear disarmament. There is no doubt that the implementation of the NPT continues to provide important security benefits, by providing assurance that, in the great majority of non-nuclear-weapon States, nuclear energy is not being misused for weapon purposes. The NPT is also the only binding agreement in which all five of the nuclear-weapon States have committed themselves to move forward towards nuclear disarmament. Still, for all of us who have been intimately associated with the implementation of the Treaty for over three decades, it is clear that recent events have placed the NPT and the regime supporting it under unprecedented stress, exposing some of its inherent limitations and pointing to areas that need to be adjusted. This presentation discusses some of the lessons that can be taken from recent experience, and a number of possible ways for moving forward. Of course, the Iraq experience is the most glaring recent case relevant to nuclear proliferation and security, but unfortunately not the only one. The IAEA's efforts to verify undeclared nuclear programmes in Iran, Libya and the Democratic People's Republic of Korea have also provided considerable insights and a number of lessons. For centuries, perhaps for millennia, security strategies have been based on boundaries: city walls, border patrols, and the use of racial and religious groupings or other categories to separate friend from foe. Those strategies no longer work. This is a mindset we must change. In this century, in this generation, we must develop a new approach to security capable of transcending borders - an inclusive approach that is centred on the value of every human life. The sooner we can make that transition, the sooner we will achieve our goal of a planet with peace and justice as its hallmark.

  20. Protection promotion and cooperation in the European semiconductor industry

    DEFF Research Database (Denmark)

    Martin, Stephen

    1996-01-01

    in the European market. Using strategies that involve world-wide cooperation, European firms are beginning to carve out secure places for themselves in what is now a world market. Joint ventures have been critical in bringing European firms up to world performance levels, but extra-European as well as intra...

  1. Experience of executing security measures

    International Nuclear Information System (INIS)

    Nakano, Hiromasa

    1995-01-01

    Japan possesses many nuclear power stations and atomic energy research and development facilities, and obtained much experience of security measures such as the inspection by the government and IAEA, the technical development and so on in respective facilities. In this report, the activities of security measures in Japan are introduced, centering around the experience of Power Reactor and Nuclear Fuel Development Corporation. Japan ratified the nuclear nonproliferation treaty (NPT) in 1976, and concluded the agreement with IAEA in 1977. It is called security measures to technically confirm that nuclear substances are not used for nuclear weapons, and to find early and prevent the production of nuclear weapons. The security measures consist of the quantity management by the balance of nuclear substances are the inspection by the government and IAEA. The present state of security measures in centrifugal uranium enrichment plants, the fabrication factories of low enriched uranium fuel, nuclear reactors, fuel reprocessing plants, and plutonium fuel factories is reported. The amount of inspection works of the government was 1861 man-day/year in 1993. As the subjects related to security measures of hereafter, the quantity management by respective facilities, the technology of verifying the measurement by inspectors, the points of beginning and finishing security measures, the security measures of hereafter and the international cooperation are described. (K.I.)

  2. Pedagogic Effects of Cooperative Learning Assessment in the Chemistry I Classroom

    Science.gov (United States)

    Champion, Jennifer

    Over the last 30 years, there has been ongoing research and debate concerning the implementation and effectiveness of cooperative learning in the classroom. The problem is determining the fair assignment of individual grades while using cooperative work. Teachers have limited time to compile, equate, and convert group grades for each student. The purpose of this quasi-experimental study was to examine the impact of cooperative learning assessment on student achievement. This study aimed to determine the relationship between teacher-assigned/group-elected laboratory positions (independent variable) and academic achievement (dependent variable) while using the cards on the table approach of cooperative learning assessment. Participants consisted of 2 classes of Chemistry I students enrolled in a small rural school system. Alternative assessment practices such as the cards on the table approach of cooperative learning assessment were examined and discussed. Results of ANCOVA analyses indicated no significance difference in the adjusted scores between teacher-assigned versus group-elected laboratory positions within structured laboratory groups on the academic achievement of Chemistry I students as measured by a standardized pretest/posttest while using the cooperative learning assessment. Conducting paired samples t tests revealed the group-assigned students improved significantly from pretest to posttest while the teacher-assigned students had no significant improvements. The study may affect positive social change by helping teachers develop guidelines for fair assessment of individual grades from cooperative learning activities and to enrich the academic repertoire of students, increasing their awareness of accountability and collaboration.

  3. Student self-esteem and academic achievement

    Directory of Open Access Journals (Sweden)

    Milošević Nikoleta M.

    2005-01-01

    Full Text Available There is a growing belief that academic achievement is the product of a complex network of teacher-student relations, where the identity of successful and unsuccessful student is developing with high, moderate or low self-esteem level. Self-esteem is most often defined as a conscious cognitive-affective expression of self-evaluation which is one of the most immediate indicators of self-concept integration degree. A number of authors view high self-esteem level as an important prerequisite for high academic achievement. In contrast, academic achievement and other experiences related to teaching and learning are considered to exert significant influence on self-esteem and a student should be successful at school first so as to develop a positive self-image and his academic abilities. The debate on what comes first - self-esteem or academic achievement - is in its character more academic than practical. This claim is supported by an increasing number of studies indicating the dynamism and reciprocity of correlation between academic achievement and self-esteem. The paper gives recommendations for educational practice to promote self-esteem and development of personal and social responsibility, which contributes to better student academic achievement. It is pointed out that teacher education in the field is necessary and that self-esteem and responsibility must become essential segments of curricula. Teacher is expected to become sensitive to the needs of students who are at risk to be unsuccessful and to largely apply cooperative learning methods. Findings demonstrate that cooperative learning either sustain or increase student self-esteem, whereas traditional teaching methods, in general, lead to its decline. Cooperative relations improve student self-image in respect of academic abilities and social interactions. Positive feedback, peer support, more frequent experience of learning achievement leads mainly to general increase in self-esteem and

  4. Information security of remote-reading energy meters

    International Nuclear Information System (INIS)

    Jacobson, J.

    1994-01-01

    This report presents basic concepts within the field of IT security. The ITSEC security and the ITSEM methods given by the European Community are used as a base. The EC INFOSEC research programme has included the project 'PER DOMUM' which focuses on remote reading of energy meters. The project is a co-operation between TACS (U.K.), GPP (Germany), CESI (Italy) and ENEL (Italy). SP has during the spring and summer of 1994 participated in the concluding of the project. Threats, security functions and security mechanisms are given for remote reading of energy meters. All of the listed functions and mechanisms do not origin from the 'PER DOMUM' project, but are the experiences of SP. The security evaluation is explained in two ways. One description of the required by ITSEM is given. Another description is given of which deliverables are required to perform the evaluation

  5. USAF Institute for National Security Studies 1998 Research Results Conference

    National Research Council Canada - National Science Library

    1998-01-01

    The USAF Institute for National Security Studies (INSS), in cooperation with HQ USAF Nuclear and Counterproliferation Directorate, sponsored its 6th annual Research Results Conference on 19 - 20 November 1998...

  6. THE SECURITY AUDIT WITHIN INFORMATION SYSTEMS

    OpenAIRE

    Dan Constantin TOFAN

    2011-01-01

    The information security audit is definitely a tool for determining, achieving, and maintaining a proper level of security in an organization. This article offers a comprehensive review of the world's most popular standards related to information systems security audit.

  7. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs

    Science.gov (United States)

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-01-01

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme. PMID:28338620

  8. A Secure and Privacy-Preserving Navigation Scheme Using Spatial Crowdsourcing in Fog-Based VANETs.

    Science.gov (United States)

    Wang, Lingling; Liu, Guozhu; Sun, Lijun

    2017-03-24

    Fog-based VANETs (Vehicular ad hoc networks) is a new paradigm of vehicular ad hoc networks with the advantages of both vehicular cloud and fog computing. Real-time navigation schemes based on fog-based VANETs can promote the scheme performance efficiently. In this paper, we propose a secure and privacy-preserving navigation scheme by using vehicular spatial crowdsourcing based on fog-based VANETs. Fog nodes are used to generate and release the crowdsourcing tasks, and cooperatively find the optimal route according to the real-time traffic information collected by vehicles in their coverage areas. Meanwhile, the vehicle performing the crowdsourcing task can get a reasonable reward. The querying vehicle can retrieve the navigation results from each fog node successively when entering its coverage area, and follow the optimal route to the next fog node until it reaches the desired destination. Our scheme fulfills the security and privacy requirements of authentication, confidentiality and conditional privacy preservation. Some cryptographic primitives, including the Elgamal encryption algorithm, AES, randomized anonymous credentials and group signatures, are adopted to achieve this goal. Finally, we analyze the security and the efficiency of the proposed scheme.

  9. STRATEGY OF INTERNATIONAL ECONOMIC COOPERATION: METHODOLOGICAL ASPECTS

    Directory of Open Access Journals (Sweden)

    Aliona DANILIUC

    2013-01-01

    Full Text Available In the present article, the authors describe the essence of cooperation and those strategic problems that can be solved internationally only through cooperation efforts. In this context, the authors propose to understand cooperation as the actions of a few companies, corporations from one country or several countries that through their activities contribute to the achievement of goals of economic, ecological and social importance for a region, a country, many countries or for all humanity. Cooperation in such cases, contribute to realization of synergistic results and development of preconditions for each participant to carry out its activities according to its own optimization criteria. Cooperation generates productive systems based on principles and technologies, it can be multispectral, creates preconditions for demand increasing, solves some marketing problems, creates a comfortable space for the activities of all economic subjects.

  10. Strategy of International Economic Cooperation: methodological aspects

    Directory of Open Access Journals (Sweden)

    Maximilian Silvestru

    2013-01-01

    Full Text Available In the present article, the authors describe the essence of cooperation and those strategic problems that can be solved internationally only through cooperation efforts. In this context, the authors propose to understand cooperation as the actions of a few companies, corporations from one country or several countries that through their activities contribute to the achievement of goals of economic, ecological and social importance for a region, a country, many countries or for all humanity. Cooperation in such cases, contribute to realization of synergistic results and development of preconditions for each participant to carry out its activities according to its own optimization criteria. Cooperation generates productive systems based on principles and technologies, it can be multispectral, creates preconditions for demand increasing, solves some marketing problems, creates a comfortable space for the activities of all economic subjects.

  11. What is security of supply in the open market and how to achieve it?

    Energy Technology Data Exchange (ETDEWEB)

    Granic, Goran; Majstrovic, Matisla; Majstrovic, Goran; Zeljko, Mladen; Pesut, Damir; Bosnjak, Robert; Karan, Marko; Jelavic, Branka

    2010-09-15

    In the open market conditions the security of supply is limited. When a large number of players are introduced in to the system, each of them pursuing only partial and limited goals and tasks, the totality of care about security becomes vague. The analysis of the supply security in the responsibility chain, from producers to buyers, shows that open market model carries inherent risks because final security instance is lacking. The proposal is to introduce the State as the final instance that should be responsible for security and clear defining of the responsibilities of all entities included in the responsibility chain.

  12. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t ... in the universal composability (UC) framework (based on a network of secure channels, a broadcast channel, and a common reference string). It achieves the bound on the trade-off between robustness and privacy shown by Ishai et al. [CRYPTO'06] and Katz [STOC'07], the bound on fairness shown by Cleve [STOC'86...

  13. The Impact of Cooperative Learning on CHC Students' Achievements and Its Changes over the Past Decade

    Science.gov (United States)

    Chen, Qiuxian; Liu, Yuan

    2017-01-01

    Informed by emergent learning theories and multiple evidenced benefits, cooperative learning has developed into a widely accepted organization mode of class in the Western context. For the same reason, cooperative learning is transferred, during the past decade, into classrooms of Confucian Heritage Culture (CHC) contexts. Concerns, however, are…

  14. TRANSACTION COSTS WITHIN THE INDIVIDUAL AND COOPERATIVE APPLE PRODUCERS IN PRESPA REGION, THE REPUBLIC OF MACEDONIA

    Directory of Open Access Journals (Sweden)

    Aleksandra ANGELOSKA

    2018-02-01

    Full Text Available Apple production in the Republic of Macedonia is an important sector that highly contributes to theeconomy in terms of employment and income, especially for the small farmers in Prespa Region. Despitecooperatives’ efforts and governmental support to attract members through the provision of inputs,technical advices and other incentives to farmers, membership adherence is low and slow. The TransactionCost Economics Theory (TCE provided the basis for this study where the choice is conditioned by relativecomparative advantage in terms of lower transaction costs. Based on the research, following conclusions are underlined: a. from the perspective of farmers andthe cooperatives there are factors that positively influence the choice of cooperative membership; b. fromthe cooperative’s side, some of the positive influences are its regular flow of price information, constanttechnical advices and secured market; c for farmers who aim at increasing production and improving theirincomes, membership to cooperative signifies security of accessing cheaper inputs especially chemicalfertiliser, security of market for the produced apples and higher frequency of transaction cost. Farmers’choices are not exclusive to one type of structure or the other. Farmers can transact with the cooperative andtrader at the same time, influenced by the differences in the price among the “Idared” and “varieties”. Bothof them, members and non-members are limited connected to the “middlemen” in choice of transactions.

  15. Enhancing implementation security of QKD

    Science.gov (United States)

    Tamaki, Kiyoshi

    2017-10-01

    Quantum key distribution (QKD) can achieve information-theoretic security, which is a provable security against any eavesdropping, given that all the devices the sender and the receiver employ operate exactly as the theory of security requires. Unfortunately, however, it is difficult for practical devices to meet all such requirements, and therefore more works have to be done toward guaranteeing information-theoretic security in practice, i.e., implementation security. In this paper, we review our recent efforts to enhance implementation security. We also have a brief look at a flaw in security proofs and present how to fix it.

  16. Sowing the Seeds of Strategic Success Across West Africa: Propagating the State Partnership Program to Shape the Security Environment

    Science.gov (United States)

    2017-06-09

    region’s continued growth in economics , population, influence, and the correlating 17 increase in risks to stability from radicalization and...environment and stem the tide of regional instability . The National Guard’s State Partnership Program is a security cooperation tool that Geographic... instability . The National Guard’s State Partnership Program is a security cooperation tool that Geographic Combatant Commanders can leverage to enhance the

  17. Promoting Collaborative Classrooms: The Impacts of Interdependent Cooperative Learning on Undergraduate Interactions and Achievement.

    Science.gov (United States)

    Premo, Joshua; Cavagnetto, Andy; Davis, William B; Brickman, Peggy

    2018-06-01

    Collaboration is an important career skill and vital to student understanding of the social aspects of science, but less is known about relationships among collaborative-learning strategies, classroom climate, and student learning. We sought to increase the collaborative character of introductory undergraduate laboratory classrooms by analyzing a 9-week intervention in 10 classrooms ( n = 251) that participated in cooperative-learning modules (promoting interdependence via a modified jigsaw technique). Students in an additional 10 classrooms ( n = 232) completed the same material in an unstructured format representative of common educational practice. Results showed that, when between-class variance was controlled for, intervention students did not score higher on weekly quizzes, but science interest and prior science experience had a reduced relationship to quiz performance in intervention classrooms. Also, intervention classrooms showed increased collaborative engagement at both whole-class and individual levels (24 students at three time points), but the intervention was only one of several factors found to account for late-intervention classroom collaborative engagement (prosocial behavior and discussion practices). Taken together, findings suggest that integrating interdependence-based tasks may foster collaborative engagement at both small-group and whole-classroom levels, but by itself may not be enough to promote increased student achievement.

  18. "Sub-axis" : the Changing Japanese Role in the U.S. Asia-Pacific Security Layout

    Institute of Scientific and Technical Information of China (English)

    Xin; Qiang

    2014-01-01

    In recent years, in order to effectively respond to the rapid rise of China, the Obama Administration has energetically implemented the "Asia-Pacific rebalancing" strategy, and actively encouraged Japan to play a bigger role in the Asia-Pacific geo-security affairs. Under promotion of the Obama Administration and the active operation by several Japanese administrations, over the years the Asia-Pacific security pattern with the United States as the "single axis" shows a more obvious change, i.e. gradually evolving to a pattern with "the United States playing core role and Japan secondary role". Firstly, through continuously strengthening the Japan-U.S. alliance, and using the opportunity to promote development of its military strength, Japan constantly strengthens its "Strategic Autonomy" in the alliance. Secondly, through strengthening bilateral or trilateral security interactions with the United States and other Asia-Pacific allies, making "the U.S. and Japan +1" an important mechanism and platform for the United States and its Asia- Pacific allies to carry out security cooperation. Finally, Japan also takes the initiative to launch strategic security cooperation in various forms with the U.S. "strategic partners", such as India, Indonesia, Vietnam and others in the Asia-Pacific region. These measures not only upgrade Japan’s function and status in the alliance, but also steadily elevate the level of strategic cooperation with a series of important countries in Asia-Pacific and has further played an increasingly important connecting, supplementing and coordinating role in the Asia Pacific traditional "hub-spoke security structure", so its influence in regional security system also grows increasingly, thus, suddenly having become the "sub-axis", next to the United States, in the Asia-Pacific geosecurity pattern.

  19. Strengthening Safety Culture as an Overriding Priority, in Achieving Global Nuclear Security Approach

    International Nuclear Information System (INIS)

    Kolundzija, V.

    2006-01-01

    In the IAEA glossary safety culture is defined as the assembly of characteristics and attitudes in organizations and individuals, which establishes that, as an overriding priority, protection and safety issues receive the attention warranted by their significance. It has been observed that a safety culture, as a part of both security and safety, possesses a few obstacles that should be noticed: safety culture cannot be directly regulated; variation in national cultures means that what constitutes as a good approach to enhancing safety culture in one country may not be the best approach in another. Three stages have been identified in developing and strengthening safety culture: 1 A technical issue (rules and regulations)/ first stage 2 Good safety performance (primarily in terms of safety targets or goals)/ second stage 3 A continuing process of improvement to which everyone can contribute/ third stage There are several key issues in safety culture, such as: a commitment, use of procedures, a conservative decision making (STAR) a reporting culture. Organizations and individuals should have attention on these. Overall common goals are to achieve and maintain a high level of safety and security of radioactive sources as well as facilities. Measures that are concerned on safeguards restrict access to the radioactive sources, conditioning and/or recycling of sources, and systems for detection the passage of the radioactive sources at strategic points, have gained main support. The main partners in implementation these measures are: IAEA, USA, Russian Federation, G8- Global Partnership, and European Union The member states of the IAEA have at their disposal internationally agreed standards. Current differences in applying standards in the IAEA member states are mainly related to state preparedness to cope with demands. Developing and less developed countries with small and medium nuclear programmes have difficulties to accept rules and regulations, to establish

  20. Coping with Security in Programming

    OpenAIRE

    Frank Schindler

    2006-01-01

    This article deals with importance of security issues in computer programming.Secure software can only be designed with security as a primary goal. To achieve that wewould have to redesign our computer systems with security in our mind including entirecomputer environment, e.g. hardware, programming languages and, of course, operatingsystems. In software development process the quality of resulting computer code should bethe most important aspect during the whole program development process. ...

  1. 21 CFR 1301.71 - Security requirements generally.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Security requirements generally. 1301.71 Section 1301.71 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION OF..., cooperative buying, etc.); (2) The type and form of controlled substances handled (e.g., bulk liquids or...

  2. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  3. Cooper's Taxonomy of Literature Reviews Applied to Meta-Analyses in Educational Achievement.

    Science.gov (United States)

    Sipe, Theresa Ann; Stallings, William M.

    H. M. Cooper (1988) has developed a taxonomy that classified literature reviews based on six characteristics: (1) focus of attention; (2) goal of the synthesis; (3) perspective on the literature; (4) coverage of the literature; (5) organization of the perspective; and (6) intended audience. One hundred and three meta-analyses identified from the…

  4. Radioactive source security: the cultural challenges

    International Nuclear Information System (INIS)

    Englefield, Chris

    2015-01-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. (authors)

  5. Resource industries and security issues in northern Alberta

    Energy Technology Data Exchange (ETDEWEB)

    Flanagan, T. [Calgary Univ., AB (Canada). Dept. of Political Science

    2009-06-15

    Public concern over global warming has led to many political attacks on the oil industry, particularly Alberta's tar sand industry. This document focused on security issues in northern Alberta and reviewed past incidences of security threats. The likelihood of sabotage to wells, pipelines, buildings, and other industry facilities was assessed. Five potential sources of opposition were identified, notably individual saboteurs, eco-terrorists, mainstream environmentalists, First Nations, and the Metis people. All except the Metis have at various times used some combination of litigation, blockades, boycotts, sabotage, and violence against economic development projects. This report stated that although such incidents will likely continue in the future, it is unlikely that extra-legal obstruction will become widespread unless these various groups cooperate with each other. Since these groups have different social characteristics and conflicting political interests, it is unlikely that such cooperation will occur. 34 refs.

  6. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  7. Nuclear safety and energy supply security: conflict or goal?

    International Nuclear Information System (INIS)

    Kutas, S.

    2006-01-01

    Energy generation and safety problems at the nuclear power plant have been analysed. Nuclear power plants are operated on the commercial basis in many countries today. Safety and security in energy generation and distribution is a complex problem. Energy supply reliability, security energy price and other issues should be co-ordinated and solved at the same time. Decentralisation and deregulation means new challenges for regulatory bodies and assurance of security. International co-operation in this field is very important. Western European Nuclear Regulators' Association (WENRA) consolidates efforts of regulatory bodies of European countries in order to harmonize approaches of nuclear safety. Nuclear Safety, and security of energy supply is the task and goal at the same time. (author)

  8. PRIVATE SECURITY IN SPORT

    Directory of Open Access Journals (Sweden)

    Dragan Vukasović

    2011-09-01

    Full Text Available Given the importance of sport for international integration, affirmation, a sense of belonging and other values of general interest, in order to maintain and open new prospects of development, it is necessary to form the private security system along with state security system, with a view to creating conditions for development sports athletes to achieve better results both in domestic and international competitions. Private security is only one element of an integrated security system which, with its efficient organization with the use of adequate means and measures should provide answers to new challenges, risks and threats. Private security in line with the new understanding of the concept of security has an important role in providing athletes.

  9. An Overview of Computer security

    OpenAIRE

    Annam, Shireesh Reddy

    2001-01-01

    As more business activities are being automated and an increasing number of computers are being used to store vital and sensitive information the need for secure computer systems becomes more apparent. These systems can be achieved only through systematic design; they cannot be achieved through haphazard seat-of-the-pants methods.This paper introduces some known threats to the computer security, categorizes the threats, and analyses protection mechanisms and techniques for countering the thre...

  10. Fifty years of Technical Cooperation

    International Nuclear Information System (INIS)

    2007-01-01

    The International Atomic Energy Agency (IAEA) was established in Vienna in 1957. The Statute of the IAEA, approved by 81 nations, founded the organization on three pillars: nuclear verification; safety and security; and the transfer of technology. Today, these three pillars still remain at the heart of the organization's work. However, the way in which the IAEA carries out this work, particularly with regard to technology transfer, has changed greatly over the years. When the IAEA opened for business, nuclear science and technology were in their infancy. Many Member States had no nuclear capacity at all. The IAEA's 'technical assistance' programme, as it was then known, was modest. Early projects were small in scale and short lived, focusing mainly on building human capacities and creating institutions and facilities that would support the introduction of nuclear technology in a safe and effective manner. Today, the picture is more complex. Instead of merely offering assistance, the IAEA focuses on cooperation for sustainable socioeconomic development, building on the skills and infrastructure that Member States have acquired over the past five decades. Member States are full partners in the process, guiding the IAEA's technical cooperation activities, setting national and regional priorities, and offering training opportunities and technical support to the IAEA and to other Member States. Technical cooperation between developing countries is facilitated and supported through regional cooperative agreements. Regional centres of expertise play an important role in sharing the benefits of nuclear science and technology among Member States

  11. A TALE OF TWO CULTURES: BREXIT AND THE FUTURE OF UK-EUROPEAN SECURITY COOPERATION

    Science.gov (United States)

    2017-06-01

    states were particularly sensitive to this issue given the lack of clear UN Security Council authorization and the fact that the purpose of intervention ...Finnemore, The Purpose of Intervention : Changing Beliefs About the Use of Force (Cornell Studies in Security Affairs) (Cornell University Press, 2004...position in all other international organizations, including within the UN Security Council as appropriate. Furthermore, Title V establishes a

  12. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  13. Impact of Cooperative Learning Approaches on Students’ Academic Achievement and Laboratory Proficiency in Biology Subject in Selected Rural Schools, Ethiopia

    Directory of Open Access Journals (Sweden)

    Eyayu Molla

    2018-01-01

    Full Text Available The main objective of this study was to evaluate the impact of cooperative learning methods on students’ academic achievement and laboratory proficiency in biology subject. Quasi-experimental control group interrupted time series design was employed. Data pertaining to these variables were collected from 369 students and 18 biology teachers in three schools. A series of biological tests and semistructured questionnaire were used to collect data. Multivariate analysis (two-way ANOVA was used to analyze the test scores exposed by teaching methods, and semistructured questionnaire was administered to comprehend factors that hamper the successive execution of CL. Hence, multivariate analysis revealed that there was no significant (P>0.05 difference in the pretest score of the learner academic performance; however, there were significant differences (P<0.01 in the posttest results by teaching methods, but not by schools. Correspondingly, there were significant differences in the pretest P<0.05 and posttest (P<0.01 results of the students’ laboratory proficiency by teaching methods. The results exemplify that there was significant learning gain obtained via CLAD followed by cooperative discussion group (CDG. The result from the questionnaire survey showed that the number of students, lack of laboratory equipment, and so on hamper consecutive execution of CL.

  14. Planning Security Services for IT Systems

    OpenAIRE

    Henderson, Marie; Page, Howard Philip

    2014-01-01

    Often the hardest job is to get business representatives to look at security as something that makes managing their risks and achieving their objectives easier, with security compliance as just part of that journey. This paper addresses that by making planning for security services a 'business tool'.

  15. Achieving the physical limits of the bounded-storage model

    International Nuclear Information System (INIS)

    Mandayam, Prabha; Wehner, Stephanie

    2011-01-01

    Secure two-party cryptography is possible if the adversary's quantum storage device suffers imperfections. For example, security can be achieved if the adversary can store strictly less then half of the qubits transmitted during the protocol. This special case is known as the bounded-storage model, and it has long been an open question whether security can still be achieved if the adversary's storage were any larger. Here, we answer this question positively and demonstrate a two-party protocol which is secure as long as the adversary cannot store even a small fraction of the transmitted pulses. We also show that security can be extended to a larger class of noisy quantum memories.

  16. Radioactive source security: the cultural challenges.

    Science.gov (United States)

    Englefield, Chris

    2015-04-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  17. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  18. Russia and the Shanghai Cooperation Organization: Some Elements of Strategy

    Directory of Open Access Journals (Sweden)

    Mikhail Konarovsky

    2016-12-01

    Full Text Available The new geopolitical reality that resulted from the dissolution of the USSR created the conditions for the establishment of the Shanghai Cooperation Organisation (SCO in 2001. The successful settlement of border issues between Russia and Kazakhstan, Kirgizstan and Tajikistan as well as with China also facilitated the process. With Uzbekistan joining the “Shanghai Five,” a new regional organization emerged. The SCO’s priorities were in the security sphere and the fight against the proliferation of drugs, illegal migration and organized crime, given the requirements of the times and the specific regional situation (including that in Afghanistan. As one of the active founders, Russia has always taken a leading role in the SCO’s organizational, political and legal formation, including setting specific trends and forms of cooperation, taking common measures, and holding events. During its presidency in 2008–2009 and 2014–2015, Moscow made additional efforts to strengthen cooperation among the SCO members in meeting new regional security challenges and to agree on coordinated positions on the key issues on the international and regional agenda. To increase the SCO’s credibility and political significance, Moscow emphasized its expansion, particularly with regard to the Eurasian Economic Union and the Silk Road Economic Belt. With global political and economic development growing more complicated, in order to revitalize Russia’s role in the SCO it is necessary to strengthen cooperation with China. The strategic character of bilateral relations reaffirmed at the Russian-Chinese summit in the summer of 2016 set a solid foundation.

  19. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  20. Some aspects of international cooperation

    International Nuclear Information System (INIS)

    Aguilera A, V.E.

    1984-01-01

    The present work deals with some aspects of International cooperation which are directly related with Science and Technology in general, but which have total validity in Nuclear Science and Technology. It is meant particularly for Latin-American countries as a whole. Some ideas meant to review the factors that act on the development of Science and Technology are briefly developed; the number of positive achievements reached in Sc. and T.; is recounted; the problems to be overcome in Sc. and T. are numbered and, finally, some propositions for increasing international cooperation in Science and Technology are exposed. (Author)

  1. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  2. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2006-01-01

    ... of the report, "Stability and Security in Iraq," describes trends and progress towards meeting goals for political stability, strengthening economic activity, and achieving a stable security environment in Iraq...

  3. The external dimensions of the EU area of freedom, security and justice : a constitutional perspective

    NARCIS (Netherlands)

    Matera, Claudio

    2016-01-01

    During the past decade in particular the external relations of the EU have not just concerned the classic areas of international cooperation (‘external action’) of the EU such as trade (Article 205 TFEU), development cooperation (Article 208 TFEU) and foreign security and defence policy (Title V

  4. Optimal Monetary Policy Cooperation through State-Independent Contracts with Targets

    DEFF Research Database (Denmark)

    Jensen, Henrik

    2000-01-01

    Simple state-independent monetary institutions are shown to secure optimal cooperative policies in a stochastic, linear-quadratic two-country world with international policy spill-overs and national credibility problems. Institutions characterize delegation to independent central bankers facing...... quadratic performance related contracts punishing or rewarding deviations from primary and intermediate policy targets...

  5. Cooperative relationships and competitiveness in supermarket sector

    Directory of Open Access Journals (Sweden)

    Andressa Centenaro

    2017-02-01

    Full Text Available Purpose – This article aims to investigate the influence of cooperative relations in the performance of companies in the supermarket sector, comparing the companies associated networks with companies not associated. Design/methodology/approach – The research method employed was a survey research with 31 companies. Findings – The results indicate that the cooperative relationships with suppliers have a positive impact on companies of performance, while the cooperative relationships with competitors and local institutions do not influence the performance. Moreover, it appears that there is no relationship between participation in a network of cooperation and achieving superior performance. However, companies linked to the network present better cooperative relationships with suppliers, which positively impacts the performance and therefore have competitive advantages over companies not associated to networks. Originality/value – The cooperative relationships with suppliers can provide benefits such as reducing logistics costs, improved product portfolio, better negotiating prices and terms, partnership for conducting marketing strategies among others, thus increasing the competitiveness of companies in the supermarket sector.

  6. Confidence building on the Korean Peninsula: A conceptual development for the cooperative monitoring of limited-force deployment zones

    Energy Technology Data Exchange (ETDEWEB)

    Vannoni, M.; Duggan, R. [Sandia National Labs., Albuquerque, NM (United States). Cooperative Monitoring Center; Nam, M.K.; Moon, K.K.; Kim, M.J. [Korea Inst. for Defense Analyses, Seoul (Korea, Republic of). Arms Control Research Center

    1997-04-01

    Confidence building measures (CBMs), particularly military ones, that address the security needs of North and South Korea could decrease the risk of conflict on the Korean Peninsula and help create an environment in which to negotiate a peace regime. The Korea Institute for Defense Analyses (KIDA) and the Cooperative Monitoring Center (CMC) of Sandia National Laboratories collaborated to identify potential CBMs and define associated monitoring. The project is a conceptual analysis of political and technical options for confidence building that might be feasible in Korea at some future time. KIDA first analyzed current security conditions and options for CBMs. Their conclusions are presented as a hypothetical agreement to strengthen the Armistice Agreement by establishing Limited Force Deployment Zones along the Military Demarcation Line. The goal of the hypothetical agreement is to increase mutual security and build confidence. The CMC then used KIDA`s scenario to develop a strategy for cooperative monitoring the agreement. Cooperative monitoring is the collecting, analyzing and sharing of agreed information among parties to an agreement and typically relies on the use of commercially available technology. A cooperative monitoring regime must be consistent with the agreement`s terms; the geographic, logistic, military, and political factors in the Korean setting; and the capabilities of monitoring technologies. This report describes the security situation on the Korean peninsula, relevant precedents from other regions, the hypothetical agreement for reducing military tensions, a monitoring strategy for the hypothetical Korean agreement, examples of implementation, and a description of applicable monitoring technologies and procedures.

  7. A Survey on Secure Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Shihong Zou

    2017-01-01

    Full Text Available Combining tiny sensors and wireless communication technology, wireless body area network (WBAN is one of the most promising fields. Wearable and implantable sensors are utilized for collecting the physiological data to achieve continuously monitoring of people’s physical conditions. However, due to the openness of wireless environment and the significance and privacy of people’s physiological data, WBAN is vulnerable to various attacks; thus, strict security mechanisms are required to enable a secure WBAN. In this article, we mainly focus on a survey on the security issues in WBAN, including securing internal communication in WBAN and securing communication between WBAN and external users. For each part, we discuss and identify the security goals to be achieved. Meanwhile, relevant security solutions in existing research on WBAN are presented and their applicability is analyzed.

  8. Main results of ten years co-operation with Nis in the field of physical protection of nuclear materials and nuclear facilities

    International Nuclear Information System (INIS)

    Salewski, P.; Gutschmidt, W.

    2001-01-01

    The Federal Republic of Germany (FRG), the Russian Federation (RF) and the New Independent States (NIS) have been working closely together since 1992 in the field of physical protection. The success of this co-operative work is based on mutually beneficial agreements between corresponding FRG and RF ministries. The main working points of these agreements were a) a mutual exchange of information and experience, and b) assistance in developing licensing and regulatory procedures and guidelines, and c) physical upgrades to Russian nuclear facilities. The first two points have been established by holding seminars, workshops and by on-site instruction. Upgrades of RF nuclear installations, financed by the FRG were performed at: the Bochvar Institute in Moscow, the Kurchatov Institute in Moscow and the Mayak reactor plant in Chelyabinsk. This paper will outline the progress made to date and the GRS procedure for achieving successful co-operation with its RF and NIS counterparts. The major results of ten years cooperation will be shown. The following document describes the experiences gained during the evaluation of security reports by GRS as an external expert organisation in contract with the Supervisory Authorities. (authors)

  9. [Potential of cooperative learning in project development : Relevance of cooperative participation procedure for the further development of generation-appropriate accomodation in structurally weak rural areas].

    Science.gov (United States)

    Kaufmann, Gerd; Frankenberg, Olga; Sommer, Ralf-Rüdiger; Jost, Annemarie

    2017-04-01

    A joint initiative of existing senior care organizations, the municipality of Meyenburg and the state of Brandenburg was further developed by affiliation of an institute of the Brandenburg University of Technology Cottbus-Senftenberg (ABV) in cooperation with members of the architecture and social work departments in 2014. A cooperative process between different players was central to create an appropriate structure of services for this region. Cooperative projects are necessary to establish new forms of generation-appropriate living and care concepts in rural areas. Cooperative learning methods are needed to develop new forms of generation-appropriate living and care concepts in rural areas, which take the diversity of elderly people, the rural context, intergenerational residential arrangements and affordable accommodation that meets the requirements of the social security system into account. Furthermore, the project had to reflect the recent developments of the German care insurance. The article describes the participatory methods, the coordination process and the resulting concept.

  10. Enhancing the Safety and Security of Radioactive Sources

    International Nuclear Information System (INIS)

    Hickey, J.

    2004-01-01

    The NRC initiatives to improve safety and security of sources began before 091101 and include both international and domestic activities. They supported the development and implementation of the IAEA Code of Conduct, which provides categorization of sources of concern, based on risk, improvement of regulatory programs of all member countries and improvement of safety and security of sources. International activities include the IAEA International Conference on Security of Sources (Vienna, Austria, March, 2003), the trilateral cooperation with Canada and Mexico, the assistance to individual countries to improve security and the proposed rule on export and import of radioactive material. The domestic initiatives are to issue the security orders and advisories to licensees, issue the panoramic irradiator orders (June 2003), issue the manufacturer orders (January 2004), complete the interim national source inventory, develop the national source tracking system, maintain the orphan source registration and retrieval program and upgrade the emergency preparedness

  11. A Comparing and Contrasting Analysis of Cooperation and Politeness

    Institute of Scientific and Technical Information of China (English)

    杨菁; 黄大鹏

    2014-01-01

    <正>Language is the basic tool of communication between human beings and the society.In communication or social interaction,people should follow some principles such as Cooperation and Politeness,in order to achieve the goal of successful communication.As two of the communicative principles,Cooperation and Politeness have been widely accepted by people,especially

  12. MODERN PROBLEMS AND WAYS OF DEVELOPMENT OF COOPERATION

    Directory of Open Access Journals (Sweden)

    Mishchenko Tatyana Leonidovna

    2013-01-01

    Full Text Available The article discusses the importance of cooperation on the current economic stage as one of the forms of cooperation in the arena of the market of small, medium and large businesses. The aim of this work is the study of contemporary problems of agricultural co-operation and development of effective ways of functioning of the cooperative sector, which is a sustainable development factor of socio-economic systems, contributes to the protection of the interests of its participants, increasing of competitiveness at the industry and national markets. In compliance of the objectives outlined the following objectives of its decision: - to justify the relevance of research in modern Economics; - to analyze the economic interdependence of market subjects and their effectiveness in key financial indicators; - identify the causes, constraining the effective development of the cooperative forms of management. The scientific novelty of the results of the study consists of the following: - it is proved that the basic idea of the cooperative movement is a transition from small businesses to large-scale activity, which today has a real embodiment in life; - it is proved that co-operation is a key element of sustainable development of rural areas and market institutions and is based on a solid social base of farms, individual farms; - as a result of the carried out estimation of parameters of functioning of the agrarian market subjects, proposed an alternative way of economic interaction of participants of the cooperative company. As a conclusion it should be noted that the development of the cooperative sector in economic realities increases significantly in the conditions of Russia's accession to the WTO, ensuring competitiveness of the domestic products and first of all the country's food security.

  13. MODERN PROBLEMS AND WAYS OF DEVELOPMENT OF COOPERATION

    Directory of Open Access Journals (Sweden)

    Татьяна Леонидовна Мищенко

    2013-04-01

    Full Text Available The article discusses the importance of cooperation on the current economic stage as one of the forms of cooperation in the arena of the market of small, medium and large businesses. The aim of this work is the study of contemporary problems of agricultural co-operation and development of effective ways of functioning of the cooperative sector, which is a sustainable development factor of socio-economic systems, contributes to the protection of the interests of its participants, increasing of competitiveness at the industry and national markets. In compliance of the objectives outlined the following objectives of its decision:- to justify the relevance of research in modern Economics;- to analyze the economic interdependence of market subjects and their effectiveness in key financial indicators;- identify the causes, constraining the effective development of the cooperative forms of management.The scientific novelty of the results of the study consists of the following:- it is proved that the basic idea of the cooperative movement is a transition from small businesses to large-scale activity, which today has a real embodiment in life;- it is proved that co-operation is a key element of sustainable development of rural areas and market institutions and is based on a solid social base of farms, individual farms;- as a result of the carried out estimation of parameters of functioning of the agrarian market subjects, proposed an alternative way of economic interaction of participants of the cooperative company. As a conclusion it should be noted that the development of the cooperative sector in economic realities increases significantly in the conditions of Russia's accession to the WTO, ensuring competitiveness of the domestic products and first of all the country's food security.DOI: http://dx.doi.org/10.12731/2218-7405-2013-1-28

  14. Education secured? The school performance of adolescents in secure residential youth care

    NARCIS (Netherlands)

    Harder, Annemiek T.; Huyghen, Anne-Marie N.; Knot-Dickscheit, Jana; Kalverboer, Margrite E.; Köngeter, Stefan; Zeller, Maren; Knorth, Erik J.

    Despite poor school performance by adolescents in secure residential care and the potential importance of education during care, little is known about how to achieve academic success with these adolescents. Therefore, the aim of the present study is to assess adolescents' academic achievement during

  15. Achievement in research on ion beam application under the scientific cooperation program with the Gesellschaft fuer schwerionenforschung mbH

    Energy Technology Data Exchange (ETDEWEB)

    Yoshida, Masaru; Maekawa, Yasunari (eds.) [Japan Atomic Energy Research Inst., Takasaki, Gunma (Japan). Takasaki Radiation Chemistry Research Establishment

    2003-03-01

    The Japan Atomic Energy Research Institute (JAERI) and the Gasellshaft fuer Schwerionenforshung mbH (GSI) signed a memorandum of 'Research and Development in the Field of Ion Beam Application' in January, 1991 and started the cooperative research program. The cooperation has been implemented by means of joint research between JAERI and GSI, exchange of scientific and technical experts, and providing mutual exchange of research materials as well as technical information. This report summarizes the cooperative research activities under the cooperative research program in the last 12 years. The list of publications and several articles relating to this cooperative research program are attached as an appendix. All the attached articles are reprinted with permission from the publishers. (author)

  16. Cooperative resources lead to sustainable competitive advantage

    Directory of Open Access Journals (Sweden)

    Fernando Vieira

    2016-11-01

    Full Text Available The objective of this research is to analyze how organizational resources contribute to cooperatives achieving a sustainable competitive advantage. The theoretical approach of this study is the Resource Based View and VRIO model advocated by Barney and Hesterly (2007. The research was characterized as descriptive and quantitative, through data collection from secondary sources and a survey. The data collection tool was a questionnaire devised by Peacock, Sehnem and Hoffmann (2011. Data collection took place between the months of September 2014 and March 2015. The study sample was composed of a total of 215 cooperatives from across the country, divided into 13 segments. Secondary data was subjected to content analysis. The primary data was analyzed using statistical inference, namely: descriptive statistics, mean, Pearson correlation, Varimax rotation and the Kruskal-Wallis test. The main results showed that human resources are seen as important to achieving a sustainable competitive advantage. This research contributed to and enables new studies concerning the growth of cooperatives taking into account the use of internal resources.

  17. The oil industry experience. Technology cooperation and capacity building

    International Nuclear Information System (INIS)

    1995-01-01

    Technology cooperation is defined as a process of constructive interaction with local, national and international partners to select and apply appropriate technology systems to achieve environmentally sound forms of economic development. Capacity building is the process of constructive interaction between countries and the private sector designed to develop the capability and skills to achieve environmentally sound forms of economic development through the use of modern technologies and management systems, a competent workforce and appropriate laws and regulations. Twelve case histories are presented which demonstrate the efforts of the oil industry to work in partnership with governments, contractors, suppliers and communities in technology cooperation and capacity building to achieve the goals of Agenda 21 which emerged as an action plan from the Rio Earth Summit in 1992. (UK)

  18. Measuring Stability and Security in Iraq

    National Research Council Canada - National Science Library

    2005-01-01

    .... The initial section of the report, "Stability and Security in Iraq," describes trends and progress towards meeting goals for political stability, economic progress, and achieving a stable security environment in Iraq...

  19. The Security Aspect of Turkey-United States Relations: In Search For a New Model

    Directory of Open Access Journals (Sweden)

    Irina A. Svistunova

    2016-01-01

    Full Text Available Security cooperation has always been an important aspect of the relations between Turkey and the USA. In Cold War era Turkish-American interaction within NATO played a crucial role in this cooperation. After that period the two countries began to search for a new model of their relations. Both Turkey and the USA started to use cooperation within NATO for the purpose of strengthening their global positions. At the same time the USA aspiration to use military bases in Turkey beyond NATO obligations frequently becomes a source of disagreement and crises in the relations of the two countries as it happened during the American intervention to Iraq in 2003. At present new challenges for regional security, especially in the Middle East, demands new forms of interaction between Turkey and the USA. The beginning of "the Arab spring" was met in Ankara and Washington with overlapping interest in changing conservative regimes and promoting "Turkish model". At the same time such questions as participation of Turkey in the fight against ISIL and the USA military cooperation with the Syrian Kurds, whom Ankara considers to be connected with the PKK terrorist organization, has brought serious contradictions between the two countries. The cause of these contradiction is the difference in the perception of threats in Turkey and in the Western countries. While the search for new forms of security cooperation meets with difficulties, NATO remains important for the relations between Turkey and the USA, despite traditionally high level of anti-NATO moods in the Turkish society.

  20. Nuclear Security Education in Morocco

    International Nuclear Information System (INIS)

    Hakam, O.K.

    2015-01-01

    Morocco has made significant progress in the field of nuclear security by supporting the efforts and activities of the International Atomic Energy Agency (IAEA), promoting nuclear security under international initiatives and continues to undertake actions aiming at strengthening capacity building in nuclear security. As well, Morocco has developed a new law on radiological and nuclear safety and security which was promulgated in 2014. Some Moroccan universities in cooperation with the IAEA-International Nuclear Security Education Network (INSEN) and the US-DoS Partnership for Nuclear Security (PNS) are working to develop their nuclear security educational programmes. In this regard, faculties who have been involved in INSEN Professional Development Courses (PDCs) have acquired a high-quality of knowledge and teaching tools in nuclear security topics that led them to be able to develop and teach their nuclear security curriculum as is the case at the University of Ibn Tofail. Furthermore, University of Ibn Tofail has developed in 2014 with collaboration with CRDFGlobal the first Institute of Nuclear Material Management (INMM) Student Chapter in Africa. This Chapter has organized many events to promote best practices among the young generation. Moreover, University of Ibn Tofail and Brandenburg University in Germany are working to develop a PDC on Nuclear IT/Cyber Security to be held in Kenitra, Morocco. This PDC aims at building capacity among the academic communities from Africa and MENA Region in order to further raise awareness, develop and disseminate best practices, increase professional standards and therefore enhance nuclear security culture. So, this paper will present some nuclear security education activities in Morocco and more specifically at the University of Ibn Tofail. These activities involve women as leaders but also contribute in education and training of young generation of women in nuclear field. (author)

  1. How to improve nuclear security worldwide: Three young women win IAEA essay contest

    International Nuclear Information System (INIS)

    Li, Jeremy

    2016-01-01

    Three essays that provided actionable and innovative recommendations to strengthen nuclear security through stronger border controls, closer international cooperation and public education won the IAEA’s first ever nuclear security essay contest. In preparation for the International Conference on Nuclear Security: Commitments and Actions, the IAEA invited students and young professionals to submit essays focusing on challenges and recommendations to strengthen nuclear security. A panel of experts from the IAEA and the International Nuclear Security Education Network selected three winners from among the 353 submissions received. The winners will present their papers at the conference, taking place in Vienna in December 2016

  2. How to improve nuclear security worldwide: Three young women win IAEA essay contest

    International Nuclear Information System (INIS)

    Li, Jeremy

    2016-01-01

    Three essays that provided actionable and innovative recommendations to strengthen nuclear security through stronger border controls, closer international cooperation and public education won the IAEA’s first ever nuclear security essay contest. In preparation for the International Conference on Nuclear Security: Commitments and Actions, the IAEA invited students and young professionals to submit essays focusing on challenges and recommendations to strengthen nuclear security. A panel of experts from the IAEA and the International Nuclear Security Education Network selected three winners from among the 353 submissions received. The winners will present their papers at the conference, taking place in Vienna in December 2016.

  3. Interorganizational Knowledge Division Decision Model Based on Cooperative Innovation of Supply Chain System

    Directory of Open Access Journals (Sweden)

    Wei Zhang

    2014-01-01

    Full Text Available Within interorganizational cooperative innovation of construction supply chain system, the achievement of project value-adding could be reflected by several factors, such as project-based organizational effect level, and the relationship between project cooperative innovation objectives. In this paper, based on the assumption of equal cooperation between project-based organizations, we selected the knowledge cooperation between the owner and contractor in construction supply chain system as research object. From the perspective of maximizing project value-adding and the relationship of effort cost between knowledge input and innovation stage in consideration, we established the knowledge collaborative incentive model for interorganizational cooperative innovation of construction supply chain system and proposed the first-order and second-order approaches. Then we conducted the digital simulation and example analysis, its results showed that if the owner has the capability to achieve project value-adding in knowledge cooperation, he would adopt a part commissioned way. Otherwise, a fully commissioned way would be better.

  4. Regulatory Framework for the Safe and Secure Transport of Nuclear Material in Japan

    International Nuclear Information System (INIS)

    Konnai, A.; Shibasaki, N.; Ikoma, Y.; Kato, M.; Yamauchi, T.; Iwasa, T.

    2016-01-01

    Regulations for nuclear material transport in Japan are based on international regulations. Safety and security regulations, however, have sometime different aspects which have caused a conflict of operations. This paper aims to introduce framework of safety and security regulations for nuclear material transport in Japan, and shows some issues in cooperation of these regulations. (author)

  5. Cooperation between partners in logistics outsourcing

    Directory of Open Access Journals (Sweden)

    Andreja KRIŽMAN

    2009-01-01

    Full Text Available The purpose of this article is to present the research results from a study of impact of cooperation between logistics service providers (LSP and their customers on logistics outsourcing performance conducted in the Slovenian market. On the basis of the existing literature and some new argumentations, derived from in-depth interviews with logistics experts of providers and customers, the measurement and structural models were empirically analyzed. Existing measurement scales for the constructs of cooperation, and outsourcing performance were slightly modified for this analysis. Their purification and measurement for validity and reliability were performed. Multivariate statistical methods (EFA, CFA and SEM - Partial Least Squares were utilized and hypotheses were tested. Cooperation between partners has a significant impact on the relationship and reduces problems in logistics performance. Cooperation in the model explain 58.5% of the variance of goal achievement and 36.6% of the variance of goal exceedance logistics of outsourcing performance.

  6. National Security Reform 2010: A Mid-Term Assessment

    Science.gov (United States)

    2011-08-01

    ministration that has not pressed Congress to do the right thing. The poster child for the lack of integrated effort is the challenge of homeland security...26, 2006, available from www.heritage.org/research/lecture/herding-cats-understanding- why-government-agencies- dont -cooperate-and-how-to-fix-the

  7. Supply chain security orientation in the pharmaceutical industry

    African Journals Online (AJOL)

    kirstam

    related partnerships and business process backups are the most neglected aspects of supply chain ..... order to manage possible supply chain security issues. ... of the moral and ethical obligations placed on organisations as a result of such ...... Cooper, D.R. & Schindler, P.S. 2014. Business Research Methods. 12 ed.

  8. South Asia energy security: Challenges and opportunities

    International Nuclear Information System (INIS)

    Kumar Singh, Bhupendra

    2013-01-01

    South Asia has witnessed a growing imbalance between energy demand and its supply from indigenous sources resulting in increased import dependence. Energy endowments differ among the South Asian countries. However, access to the significant energy resources in the neighboring countries is denied, which increases the cost of energy supply and reduces energy security of the individual countries and of the region as a whole. The countries in the region could benefit significantly only by strengthening the mechanism of energy trade through improved connectivity. Therefore, greater cooperation within South Asia could be one of the most effective ways to deal with this Regional Energy deficit and ensure Energy Security of the Region. - Highlights: • No South Asian country is going to be able to meet its energy needs domestically. • Fostering cross border energy trade and promotion of investments opportunities are key solutions. • India’s neighbors have huge potential in hydroelectricity. • Co-operation among nations to tap the energy resource can be a win–win situation for all. • However it faces certain challenges

  9. Cooperative Monitoring Center Occasional Paper/18: Maritime Cooperation Between India and Pakistan: Building Confidence at Sea

    Energy Technology Data Exchange (ETDEWEB)

    SIDDIQA-AGHA,AYESHA

    2000-11-01

    This paper discusses ways in which the navies of both India and Pakistan can cooperate on issues of maritime and naval significance. Although the militaries and navies of the two countries have traditionally seen each other as rivals, international economic developments make cooperation imperative. South Asia requires an approach that can alter the existing hostile images and perceptions. This can be achieved through developing an incremental approach towards confidence building that would allow consistency and help build confidence gradually. The aim is to make confidence building a sustainable activity that would help transform hostile images and build cooperative and nonhostile relationships. This paper proposes a five-step model to suggest what the two navies can do jointly to build confidence, with the ultimate goal of naval arms control. The steps include (1) the Signaling Stage to initiate communication between the two navies, (2) the Warming-Up Stage to build confidence through nonmilitary joint ventures, (3) the Handshake Stage to build confidence between the two navies through military joint ventures, (4) the Problem-Solving Stage to resolve outstanding disputes, and (5) the Final Nod Stage to initiate naval arms control. This model would employ communication, navigation, and remote sensing technologies to achieve success.

  10. International cooperation in supply of nuclear fuel and fuel cycle services

    International Nuclear Information System (INIS)

    Sievering, N.F. Jr.

    1977-01-01

    In the face of costlier, decreasingly available oil and a desire to achieve a higher degree of self-sufficiency, nuclear power has become an increasingly important ingredient in the mix of energy options looked to by a growing number of industrialized and developing states. One of the central concerns of states that are placing greater reliance on nuclear energy is the assurance that adequate nuclear fuels will be available on a timely basis and on economically acceptable terms. Greater emphasis on nuclear energy and on self-sufficiency entails greater potential risks as sensitive facilities and technologies associated with the nuclear fuel cycle threaten to proliferate. This paper explores the juxtaposition of the spread of nuclear technology and facilities in support of legitimate desires to achieve greater energy self-sufficiency and economic and social progress, on the one hand, and the implications of widely disseminated nuclear fuel cycle capacity for the objective of non-proliferation, on the other hand. It examines the recent evolution of nuclear fuel cycle activities including the scope of cooperation both among nuclear supplier states and between supplier and non-supplier states; explores the arenas in which common efforts are, can and should be undertaken (e.g., in terms of the nuclear resource base, the provision of essential services such as enrichment, and the management of nuclear waste), and identifies means by which national aspirations and international security concerns can be effectively accommodated. Particular attention is given to the methods by which the dissemination of sensitive technologies at facilities can be controlled without sacrificing the legitimate interests of any state, as well as to methods by which controls over potentially dangerous materials such as plutonium can be strengthened. The paper concludes that there are significant opportunities to achieve a high degree of international cooperation in the arena of fuel cycle

  11. Cooperate! A paradigm shift for health equity.

    Science.gov (United States)

    Chang, Wei-Ching; Fraser, Joy H

    2017-02-21

    The role of competition and cooperation in relation to the goal of health equity is examined in this paper. The authors explain why the win-lose mentality associated with avoidable competition is ethically questionable and less effective than cooperation in achieving positive outcomes, particularly as it relates to health and health equity. Competition, which differentiates winners from losers, often with the winner-takes-all reward system, inevitably leads to a few winners and many losers, resulting in social inequality, which, in turn, engenders and perpetuates health inequity.Competitive market-driven approaches to healthcare-brought about by capitalism, neo-liberalization, and globalization, based primarily on a competitive framework-are shown to have contributed to growing inequities with respect to the social determinants of health, and have undermined equal opportunity to access health care and achieve health equity. It is possible to redistribute income and wealth to reduce social inequality, but globalization poses increasing challenges to policy makers. John Stuart Mill provided a passionate, philosophical defense of cooperatives, followed by Karl Polanyi who offered an insightful critique of both state socialism and especially the self-regulating market, thereby opening up the cooperative way of shaping the future. We cite Hannah Arendt's "the banality of evil" to characterize the tragic concept of "ethical fading" witnessed in business and everyday life all over the world, often committed (without thinking and reflecting) by ordinary people under competitive pressures.To promote equity in health for all, we recommend the adoption of a radically new cooperation paradigm, applied whenever possible, to everything in our daily lives.

  12. The Transformation of Security Environment at the beginning of XXIst Century

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2009-06-01

    Full Text Available The current security environment is characterized by a high degree of instability andunpredictability, by the manifestation of new risks and threats, by redefining relations between thegreat powers and increased freedom of action of regional factors. The evolution of global security inthe last decade, has confirmed that the success of actions and the stability can only be the result of amultidimensional cooperation of the international community, through emphasizing the dialogue in aninstitutional framework and activating the decisive role that the great international organizations playin defining the state of security of the world.

  13. Sustainable Phosphorus Measures: Strategies and Technologies for Achieving Phosphorus Security

    Directory of Open Access Journals (Sweden)

    Stuart White

    2013-01-01

    Full Text Available Phosphorus underpins the world’s food systems by ensuring soil fertility, maximising crop yields, supporting farmer livelihoods and ultimately food security. Yet increasing concerns around long-term availability and accessibility of the world’s main source of phosphorus—phosphate rock, means there is a need to investigate sustainable measures to buffer the world’s food systems against the long and short-term impacts of global phosphorus scarcity. While the timeline of phosphorus scarcity is contested, there is consensus that more efficient use and recycling of phosphorus is required. While the agricultural sector will be crucial in achieving this, sustainable phosphorus measures in sectors upstream and downstream of agriculture from mine to fork will also need to be addressed. This paper presents a comprehensive classification of all potential phosphorus supply- and demand-side measures to meet long-term phosphorus needs for food production. Examples range from increasing efficiency in the agricultural and mining sector, to technologies for recovering phosphorus from urine and food waste. Such measures are often undertaken in isolation from one another rather than linked in an integrated strategy. This integrated approach will enable scientists and policy-makers to take a systematic approach when identifying potential sustainable phosphorus measures. If a systematic approach is not taken, there is a risk of inappropriate investment in research and implementation of technologies and that will not ultimately ensure sufficient access to phosphorus to produce food in the future. The paper concludes by introducing a framework to assess and compare sustainable phosphorus measures and to determine the least cost options in a given context.

  14. Information security risk management and incompatible parts of organization

    Energy Technology Data Exchange (ETDEWEB)

    Talabeigi, E.; Naeeini, S.G.J.

    2016-07-01

    Purpose: we prepared a questionnaire to evaluate Incompatible parts and also risk management in University of Science and Technology E-Learning Center and studying the Incompatible parts impacts on utility of organization. Design/methodology/approach: By using coalitional game theory we present a new model to recognize the degrees of incompatibility among independent divisions of an organization with dependent security assets. Based on positive and negative interdependencies in the parts, the model provides how the organization can decrease the security risks through non-cooperation rather than cooperation. we implement the proposed model of this paper by analyzing the data which have been provided by questionnaires from different three managers' ideas of Iran University of Science and Technology E-Learning Center located in Iran University of Science and Technology, Tehran, Iran. Findings: In general, by collecting data and analyzing them, the survey showed that Incompatible parts of organizations have negative impacts on utility of organization risk management process. Furthermore, it adds values to other organizations and provides the best practices in planning, developing, implementing and monitoring risk management in organizations. Research limitations/implications: Since Information security and also Risk Management are still areas which need to improve in some Iranian universities, we couldn’t consider them in our analysis. On the other hand, due to questionnaire limitation, the study’s sample size is 1. This size may be considered large for our statistical analysis. Originality/value: The main contribution of this paper is to propose a model for non-cooperation among a number of divisions in a organization and using risk management factors.

  15. Information security risk management and incompatible parts of organization

    International Nuclear Information System (INIS)

    Talabeigi, E.; Naeeini, S.G.J.

    2016-01-01

    Purpose: we prepared a questionnaire to evaluate Incompatible parts and also risk management in University of Science and Technology E-Learning Center and studying the Incompatible parts impacts on utility of organization. Design/methodology/approach: By using coalitional game theory we present a new model to recognize the degrees of incompatibility among independent divisions of an organization with dependent security assets. Based on positive and negative interdependencies in the parts, the model provides how the organization can decrease the security risks through non-cooperation rather than cooperation. we implement the proposed model of this paper by analyzing the data which have been provided by questionnaires from different three managers' ideas of Iran University of Science and Technology E-Learning Center located in Iran University of Science and Technology, Tehran, Iran. Findings: In general, by collecting data and analyzing them, the survey showed that Incompatible parts of organizations have negative impacts on utility of organization risk management process. Furthermore, it adds values to other organizations and provides the best practices in planning, developing, implementing and monitoring risk management in organizations. Research limitations/implications: Since Information security and also Risk Management are still areas which need to improve in some Iranian universities, we couldn’t consider them in our analysis. On the other hand, due to questionnaire limitation, the study’s sample size is 1. This size may be considered large for our statistical analysis. Originality/value: The main contribution of this paper is to propose a model for non-cooperation among a number of divisions in a organization and using risk management factors.

  16. The Psychological Competence of Police Officers in Confidential Cooperation with Citizens

    Science.gov (United States)

    Uspanov, Zholdybai T.; Turabayeva, Dana S.; Ermolovich, Vladimir F.

    2016-01-01

    This research studied the psychological aspects of citizens' assistance to law enforcement agencies on a confidential basis. The comprehensive observance of the psychological norms of cooperation is determined by the professional ethics of police officers, the necessity of nondisclosure of investigation secrets by citizens, and the security of the…

  17. Development of System Regulating and Support for Nuclear Security in Belarus

    International Nuclear Information System (INIS)

    Lobach, D.; Astashka, R.; Lugovskaya, O.

    2015-01-01

    A safeguards strengthening in Belarus is realized as complex for measures of legal authorities building, advance staff education and international cooperation. The main scope of complex coordinated activities is to provide the sustainable development of national regulatory system and support for current and future challenges in a more globalized world to assure relevant safeguards measures and implements, to get the sustainable international and regional cooperation. Collected and implemented information and knowledge, analytical thinking of involved specialists will improve cooperation between IAEA and States to optimize technical support and experience exchange. Some authorities are responsible in regulating and oversighting for nuclear security in Belarus. The main challenge of national system development is realization the conception of effective coordination. The nuclear regulatory authority (the Ministry for Emergency Situations/ Gosatomnadzor) has the responsibility either to build up own technical capabilities for detailed review and assessment of processes and activities of the NPP operator or to make sure that a technical support organization equipped with sufficient knowledge and structural capabilities is involved in assessment and analysis of processes at all phases of the NPP use. There is developed the conception for creation of analytical and technical support laboratory including both stationary and mobile equipment and techniques for nuclear security prevention and control measures and arrangements. It is actually the realization of conception the Joint Center for Nuclear Security Competence in Belarus for national and cooperational purposes. The implementation of strengthening plans and put-up arrangements will lead to integrated regulatory activities in order to allow practical optimization of the resources to get benefits from exchange of experience and issues from safety analysis and oversighting as synergy effect. (author)

  18. The Effect of Cooperative Learning on Middle School Math Students

    Science.gov (United States)

    Remillard, Heather A.

    2015-01-01

    The purpose of this study was to explore cooperative learning and the impact on middle school students overall academic achievement. The study included 47 students from a small private school, ranging from grades sixth through eighth. The researcher examined student perception of cooperative learning, implementation process and the overall impact…

  19. In the name of energy security: the struggle over the exportation of Israeli natural gas

    International Nuclear Information System (INIS)

    Fischhendler, Itay; Nathan, Daniel

    2014-01-01

    The aim of this study is to place the notion of energy security under critical scrutiny by unpacking how different actors manipulate the term through the mobilization of existential language as a prism for creating securitization discourse. Through an examination of an Israeli inter-ministerial committee charged with developing national policy regarding newly-discovered natural gas reserves off the coast of Israel, the study finds that the concept of energy security is open for manipulation and various interpretations. While some actors stress environmental acceptability and independency as pillars of energy security, others prioritized supply reliability and geopolitical benefits associated with gas exportation. Each definition of energy security was also found to be anchored in different ideologies, goals, policies and legitimizing factors. The coupling of energy with securitization rhetoric was ultimately determined as working against cooperative efforts, as committee conflicts intensified and suggested institutional measures became disproportional. - Highlights: • The concept of energy security is open for manipulation and various interpretations. • Each definition of energy security was anchored in different ideologies, goals, policies and legitimizing factors. • Numerous discursive means were used to portray energy as a security matter. • The coupling of energy with securitization rhetoric was working against cooperative efforts

  20. ALLIANCE: An architecture for fault tolerant, cooperative control of heterogeneous mobile robots

    Energy Technology Data Exchange (ETDEWEB)

    Parker, L.E.

    1995-02-01

    This research addresses the problem of achieving fault tolerant cooperation within small- to medium-sized teams of heterogeneous mobile robots. The author describes a novel behavior-based, fully distributed architecture, called ALLIANCE, that utilizes adaptive action selection to achieve fault tolerant cooperative control in robot missions involving loosely coupled, largely independent tasks. The robots in this architecture possess a variety of high-level functions that they can perform during a mission, and must at all times select an appropriate action based on the requirements of the mission, the activities of other robots, the current environmental conditions, and their own internal states. Since such cooperative teams often work in dynamic and unpredictable environments, the software architecture allows the team members to respond robustly and reliably to unexpected environmental changes and modifications in the robot team that may occur due to mechanical failure, the learning of new skills, or the addition or removal of robots from the team by human intervention. After presenting ALLIANCE, the author describes in detail experimental results of an implementation of this architecture on a team of physical mobile robots performing a cooperative box pushing demonstration. These experiments illustrate the ability of ALLIANCE to achieve adaptive, fault-tolerant cooperative control amidst dynamic changes in the capabilities of the robot team.