WorldWideScience

Sample records for analytical resources securely

  1. Automated Big Traffic Analytics for Cyber Security

    OpenAIRE

    Miao, Yuantian; Ruan, Zichan; Pan, Lei; Wang, Yu; Zhang, Jun; Xiang, Yang

    2018-01-01

    Network traffic analytics technology is a cornerstone for cyber security systems. We demonstrate its use through three popular and contemporary cyber security applications in intrusion detection, malware analysis and botnet detection. However, automated traffic analytics faces the challenges raised by big traffic data. In terms of big data's three characteristics --- volume, variety and velocity, we review three state of the art techniques to mitigate the key challenges including real-time tr...

  2. Information fusion for cyber-security analytics

    CERN Document Server

    Karabatis, George; Aleroud, Ahmed

    2017-01-01

    This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers. .

  3. Google Analytics – Index of Resources

    Science.gov (United States)

    Find how-to and best practice resources and training for accessing and understanding EPA's Google Analytics (GA) tools, including how to create reports that will help you improve and maintain the web areas you manage.

  4. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  5. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  6. The Connotation and Extension of Agricultural Water Resources Security

    Institute of Scientific and Technical Information of China (English)

    LIU Bu-chun; MEI Xu-rong; LI Yu-zhong; YANG You-lu

    2007-01-01

    The objective of this study is to define agricultural water resources security and its connotation and extension. The definitions of water security, water resources security, and water environment security were summarized, and their relationship was differentiated and analyzed. Based on these, the elements of the conception of agricultural water resources security were hashed and the conception was defined. Agricultural water resources security is the provision of water resource that ensures protection of agriculture against threat, hazards, destruction, and loss. Moreover, the connotation and extension of agricultural water resources security were ascertained. In detail, the connotation of the definition has natural attributes, socioeconomic attributes, and cultural attributes. The extensions of agricultural water resources security include both broad and narrow ones, as well as, food security, agroenvironmental security, agroeconomic security, rural society security, etc. The definition will serve as the frame of reference for developing the researches, limiting the frame of the theory, and founding a appraising system for agricultural water resources security.

  7. Analytical Chemistry for Homeland Defense and National Security

    Energy Technology Data Exchange (ETDEWEB)

    S.Randolph Long; Dan rock; Gary Eiceman; Chris Rowe Taitt; Robert J.Cotter; Dean D.Fetterolf; David R.Walt; Basil I. Swanson; Scott A McLuckey; Robin L.Garrell; Scott D. Cunningham

    2002-08-18

    The budget was requested to support speaker expenses to attend and speak in the day long symposium at the ACS meeting. The purpose of the symposium was to encourage analytical chemists to contribute to national security.

  8. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  9. Natural Resources Management for Sustainable Food Security in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Natural Resources Management for Sustainable Food Security in the Sahel ... as well as strategies for managing the resource base with a view to improving food security. ... InnoVet-AMR grants to support development of innovative veterinary ...

  10. Arctic Energy Resources: Security and Environmental Implications

    Directory of Open Access Journals (Sweden)

    Peter Johnston

    2012-08-01

    Full Text Available n recent years, there has been considerable interest in the Arctic as a source for resources, as a potential zone for commercial shipping, and as a region that might experience conflict due to its strategic importance. With regards to energy resources, some studies suggest that the region contains upwards of 13 percent of global undiscovered oil, 30 percent of undiscovered gas, and multiples more of gas hydrates. The decreasing amount and duration of Arctic ice cover suggests that extraction of these resources will be increasingly commercially viable. Arctic and non-arctic states wish to benefit from the region's resources and the potential circum-polar navigation possibilities. This has led to concerns about the environmental risks of these operations as well as the fear that competition between states for resources might result in conflict. Unresolved offshore boundaries between the Arctic states exacerbate these fears. Yet, the risk of conflict seems overstated considering the bilateral and multilateral steps undertaken by the Arctic states to resolve contentious issues. This article will examine the potential impact of Arctic energy resources on global security as well as the regional environment and examine the actions of concerned states to promote their interests in the region.

  11. Measuring the energy security implications of fossil fuel resource concentration

    International Nuclear Information System (INIS)

    Lefevre, Nicolas

    2010-01-01

    Economic assessments of the welfare effects of energy insecurity are typically uncertain and fail to provide clear guidance to policy makers. As a result, governments have had little analytical support to complement expert judgment in the assessment of energy security. This is likely to be inadequate when considering multiple policy goals, and in particular the intersections between energy security and climate change mitigation policies. This paper presents an alternative approach which focuses on gauging the causes of energy insecurity as a way to assist policy making. The paper focuses on the energy security implications of fossil fuel resource concentration and distinguishes between the price and physical availability components of energy insecurity. It defines two separate indexes: the energy security price index (ESPI), based on the measure of market concentration in competitive fossil fuel markets, and the energy security physical availability index (ESPAI), based on the measure of supply flexibility in regulated markets. The paper illustrates the application of ESPI and ESPAI with two case studies-France and the United Kingdom-looking at the evolution of both indexes to 2030.

  12. Measuring the energy security implications of fossil fuel resource concentration

    Energy Technology Data Exchange (ETDEWEB)

    Lefevre, Nicolas [Woodrow Wilson School of Public and International Affairs, Princeton University, New Jersey (United States)

    2010-04-15

    Economic assessments of the welfare effects of energy insecurity are typically uncertain and fail to provide clear guidance to policy makers. As a result, governments have had little analytical support to complement expert judgment in the assessment of energy security. This is likely to be inadequate when considering multiple policy goals, and in particular the intersections between energy security and climate change mitigation policies. This paper presents an alternative approach which focuses on gauging the causes of energy insecurity as a way to assist policy making. The paper focuses on the energy security implications of fossil fuel resource concentration and distinguishes between the price and physical availability components of energy insecurity. It defines two separate indexes: the energy security price index (ESPI), based on the measure of market concentration in competitive fossil fuel markets, and the energy security physical availability index (ESPAI), based on the measure of supply flexibility in regulated markets. The paper illustrates the application of ESPI and ESPAI with two case studies - France and the United Kingdom - looking at the evolution of both indexes to 2030. (author)

  13. Food security and sustainable resource management

    Science.gov (United States)

    McLaughlin, Dennis; Kinzelbach, Wolfgang

    2015-07-01

    The projected growth in global food demand until mid-century will challenge our ability to continue recent increases in crop yield and will have a significant impact on natural resources. The water and land requirements of current agriculture are significantly less than global reserves but local shortages are common and have serious impacts on food security. Recent increases in global trade have mitigated some of the effects of spatial and temporal variability. However, trade has a limited impact on low-income populations who remain dependent on subsistence agriculture and local resources. Potential adverse environmental impacts of increased agricultural production include unsustainable depletion of water and soil resources, major changes in the global nitrogen and phosphorous cycles, human health problems related to excessive nutrient and pesticide use, and loss of habitats that contribute to agricultural productivity. Some typical case studies from China illustrate the connections between the need for increased food production and environmental stress. Sustainable options for decreasing food demand and for increasing production include reduction of food losses on both the producer and consumer ends, elimination of unsustainable practices such as prolonged groundwater overdraft, closing of yield gaps with controlled expansions of fertilizer application, increases in crop yield and pest resistance through advances in biotechnology, and moderate expansion of rain fed and irrigated cropland. Calculations based on reasonable assumptions suggest that such measures could meet the food needs of an increasing global population while protecting the environment.

  14. China's mineral resources security under economic globalization

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Y. [China University of Mining and Technology, Xuzhou (China). College of Environment and Spatial Informatics

    2002-10-01

    The concept and intention of mineral resources security are introduced. From the insurance and leverage that mineral resources has on China's socio-economic development, the strength of support, the opportunity and challenge imposed by globalised economy, the effect of mineral resource development on the safety of the eco-environment, the author analyses the basic situation and existing problem of the mineral resources security in China; summarizes the current research situation of mineral resources security and the main tactics which are used to ensure mineral resources security in the developed countries; presents the essence of mineral resources security, the basic principles of research and the problems focused; and points out the research areas and goals that should be strengthened urgently. 15 refs.

  15. FASP, an analytic resource appraisal program for petroleum play analysis

    Science.gov (United States)

    Crovelli, R.A.; Balay, R.H.

    1986-01-01

    An analytic probabilistic methodology for resource appraisal of undiscovered oil and gas resources in play analysis is presented in a FORTRAN program termed FASP. This play-analysis methodology is a geostochastic system for petroleum resource appraisal in explored as well as frontier areas. An established geologic model considers both the uncertainty of the presence of the assessed hydrocarbon and its amount if present. The program FASP produces resource estimates of crude oil, nonassociated gas, dissolved gas, and gas for a geologic play in terms of probability distributions. The analytic method is based upon conditional probability theory and many laws of expectation and variance. ?? 1986.

  16. Economics and Security: Resourcing National Priorities

    Science.gov (United States)

    2010-05-21

    Papers Number 5 N um ber 5 Econom ics and Security: R esourcing N ational Priorities http://www.usnwc.edu Report Documentation Page Form ApprovedOMB No...2010 William B. Ruger Chair of National Security Economics Papers Number 5 N um ber 5 Econom ics and Security: R esourcing N ational Priorities http://www.usnwc.edu

  17. MANAGEMENT OF RESOURCES IN DYNAMICALLY CHANGING SECURITY ENVRIONMENT

    Directory of Open Access Journals (Sweden)

    Sevdalina Dimitrova

    2014-09-01

    Full Text Available The monograph recommends integration between science and practice, experts from national bodies and scientific research potential of academic community of military universities in the field of management of resources of security and defence in accordance to the challenges in security environment caused by its dynamic and often unpredictable changes.

  18. Human Resource Predictive Analytics HRPA For HR Management In Organizations

    Directory of Open Access Journals (Sweden)

    Sujeet N. Mishra

    2015-08-01

    Full Text Available Human resource predictive analytics is an evolving application field of analytics for HRM purposes. The purpose of HRM is measuring employee performance and engagement studying workforce collaboration patterns analyzing employee churn and turnover and modelling employee lifetime value. The motive of applying HRPA is to optimize performances and produce better return on investment for organizations through decision making based on data collection HR metrics and predictive models. The paper is divided into three sections to understand the emergence of HR predictive analytics for HRM. Firstly the paper introduces the concept of HRPA. Secondly the paper discusses three aspects of HRPA a Need b Approach amp Application c Impact. Lastly the paper leads to the conclusion on HRPA.

  19. Security-Constrained Resource Planning in Electricity Market

    International Nuclear Information System (INIS)

    Roh, Jae Hyung; Shahidehpour, Mohammad; Yong Fu

    2007-06-01

    We propose a market-based competitive generation resource planning model in electricity markets. The objective of the model is to introduce the impact of transmission security in a multi-GENCO generation resource planning. The proposed approach is based on effective decomposition and coordination strategies. Lagrangian relaxation and Benders decomposition like structure are applied to the model. Locational price signal and capacity signal are defined for the simulation of competition among GENCOs and the coordination of security between GENCOs and the regulatory body (ISO). The numerical examples exhibit the effectiveness of the proposed generation planning model in electricity markets.

  20. Supporting the Construction of Workflows for Biodiversity Problem-Solving Accessing Secure, Distributed Resources

    Directory of Open Access Journals (Sweden)

    J.S. Pahwa

    2006-01-01

    Full Text Available In the Biodiversity World (BDW project we have created a flexible and extensible Web Services-based Grid environment for biodiversity researchers to solve problems in biodiversity and analyse biodiversity patterns. In this environment, heterogeneous and globally distributed biodiversity-related resources such as data sets and analytical tools are made available to be accessed and assembled by users into workflows to perform complex scientific experiments. One such experiment is bioclimatic modelling of the geographical distribution of individual species using climate variables in order to explain past and future climate-related changes in species distribution. Data sources and analytical tools required for such analysis of species distribution are widely dispersed, available on heterogeneous platforms, present data in different formats and lack inherent interoperability. The present BDW system brings all these disparate units together so that the user can combine tools with little thought as to their original availability, data formats and interoperability. The new prototype BDW system architecture not only brings together heterogeneous resources but also enables utilisation of computational resources and provides a secure access to BDW resources via a federated security model. We describe features of the new BDW system and its security model which enable user authentication from a workflow application as part of workflow execution.

  1. Optimal Allocation of Water Resources Based on Water Supply Security

    Directory of Open Access Journals (Sweden)

    Jianhua Wang

    2016-06-01

    Full Text Available Under the combined impacts of climate change and human activities, a series of water issues, such as water shortages, have arisen all over the world. According to current studies in Science and Nature, water security has become a frontier critical topic. Water supply security (WSS, which is the state of water resources and their capacity and their capacity to meet the demand of water users by water supply systems, is an important part of water security. Currently, WSS is affected by the amount of water resources, water supply projects, water quality and water management. Water shortages have also led to water supply insecurity. WSS is now evaluated based on the balance of the supply and demand under a single water resources condition without considering the dynamics of the varying conditions of water resources each year. This paper developed an optimal allocation model for water resources that can realize the optimal allocation of regional water resources and comprehensively evaluate WSS. The objective of this model is to minimize the duration of water shortages in the long term, as characterized by the Water Supply Security Index (WSSI, which is the assessment value of WSS, a larger WSSI value indicates better results. In addition, the simulation results of the model can determine the change process and dynamic evolution of the WSS. Quanzhou, a city in China with serious water shortage problems, was selected as a case study. The allocation results of the current year and target year of planning demonstrated that the level of regional comprehensive WSS was significantly influenced by the capacity of water supply projects and the conditions of the natural water resources. The varying conditions of the water resources allocation results in the same year demonstrated that the allocation results and WSSI were significantly affected by reductions in precipitation, decreases in the water yield coefficient, and changes in the underlying surface.

  2. Development of human resource capacity building assistance for nuclear security

    International Nuclear Information System (INIS)

    Nakamura, Yo; Noro, Naoko

    2014-01-01

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency (JAEA) has been providing nuclear security human resource development projects targeting at nuclear emerging countries in Asia in cooperation with the authorities concerned including the Sandia National Laboratory (SNL) and the International Atomic Energy Agency (IAEA). In the aftermath of the attacks of Sept. 11, the threat of terrorism was internationally recognized and thus the human resource capacity building is underway as an urgent task. In order to responding to emerging threats, the human resource capacity building that ISCN has implemented thus far needs to be multilaterally analyzed in order to develop more effective training programs. This paper studies ISCN's future direction by analyzing its achievements, as well as introduces the collaborative relationships with SNL that contributes to the reflection and maintenance of international trends for the contents of nuclear security training, the nuclear security enhancement support with which Japan is to provide nuclear emerging countries in Asia, and the achievements of the nuclear security training program that ISCN implemented. (author)

  3. Security analysis - from analytical methods to intelligent systems

    Energy Technology Data Exchange (ETDEWEB)

    Lambert-Torres, G; Silva, A.P. Alves da; Ferreira, C [Escola Federal de Engenharia de Itajuba, MG (Brazil); Mattos dos Reis, L O [Taubate Univ., SP (Brazil)

    1994-12-31

    This paper presents an alternative approach to Security Analysis based on Artificial Neural Network (ANN) techniques. This new technique tries to imitate the human brain and is based on neurons and synopses. A critical review of the ANN used in Power System Operation problem solving is made, while structures to solve the Security Analysis problems are proposed. (author) 7 refs., 4 figs.

  4. The effects of environmental resource and security on aggressive behavior.

    Science.gov (United States)

    Ng, Henry Kin Shing; Chow, Tak Sang

    2017-05-01

    Exposure to different environments has been reported to change aggressive behavior, but previous research did not consider the underlying elements that caused such an effect. Based on previous work on environmental perception, we examined the role of environmental resource and security in altering aggression level. In three experiments, participants were exposed to environments that varied in resource (High vs. Low) and security (High vs. Low) levels, after which aggression was measured. The environments were presented through visual priming (Experiments 1-2) and a first-person gameplay (Experiment 3). We observed a consistent resource-security interaction effect on aggression, operationalized as the level of noise blast (Experiment 1) and number of unpleasant pictures (Experiments 2-3) delivered to strangers by the participants. High resource levels associated with higher aggression in insecure conditions, but lower aggression in secure conditions. The findings suggest that the adaptive value of aggression varies under different environmental constraints. Implications are discussed in terms of the effects of adverse environments on aggression, and the nature's effects on social behavior. Aggr. Behav. 43:304-314, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  5. Analytical group decision making in natural resources: Methodology and application

    Science.gov (United States)

    Schmoldt, D.L.; Peterson, D.L.

    2000-01-01

    Group decision making is becoming increasingly important in natural resource management and associated scientific applications, because multiple values are treated coincidentally in time and space, multiple resource specialists are needed, and multiple stakeholders must be included in the decision process. Decades of social science research on decision making in groups have provided insights into the impediments to effective group processes and on techniques that can be applied in a group context. Nevertheless, little integration and few applications of these results have occurred in resource management decision processes, where formal groups are integral, either directly or indirectly. A group decision-making methodology is introduced as an effective approach for temporary, formal groups (e.g., workshops). It combines the following three components: (1) brainstorming to generate ideas; (2) the analytic hierarchy process to produce judgments, manage conflict, enable consensus, and plan for implementation; and (3) a discussion template (straw document). Resulting numerical assessments of alternative decision priorities can be analyzed statistically to indicate where group member agreement occurs and where priority values are significantly different. An application of this group process to fire research program development in a workshop setting indicates that the process helps focus group deliberations; mitigates groupthink, nondecision, and social loafing pitfalls; encourages individual interaction; identifies irrational judgments; and provides a large amount of useful quantitative information about group preferences. This approach can help facilitate scientific assessments and other decision-making processes in resource management.

  6. Future Oceans: Meeting the Challenges of Securing Aquatic Food Resources

    OpenAIRE

    Dieckmann, U.

    2012-01-01

    Seafood is the primary source of animal protein for more than one billion people. Many economies and communities, in particular those in developing nations and coastal regions, depend on fisheries. Whereas the dire effects of overfishing on open-access ocean fisheries are already recognized, impacts of catches on freshwater systems are still underestimated. IIASA’s fisheries research elucidates how to secure and expand aquatic food resources, emphasizing three topical challenges. First, impro...

  7. Enabling Analytics on Sensitive Medical Data with Secure Multi-Party Computation.

    Science.gov (United States)

    Veeningen, Meilof; Chatterjea, Supriyo; Horváth, Anna Zsófia; Spindler, Gerald; Boersma, Eric; van der Spek, Peter; van der Galiën, Onno; Gutteling, Job; Kraaij, Wessel; Veugen, Thijs

    2018-01-01

    While there is a clear need to apply data analytics in the healthcare sector, this is often difficult because it requires combining sensitive data from multiple data sources. In this paper, we show how the cryptographic technique of secure multi-party computation can enable such data analytics by performing analytics without the need to share the underlying data. We discuss the issue of compliance to European privacy legislation; report on three pilots bringing these techniques closer to practice; and discuss the main challenges ahead to make fully privacy-preserving data analytics in the medical sector commonplace.

  8. Efficient Aviation Security: Strengthening the Analytic Foundation for Making Air Transportation Security Decisions

    Science.gov (United States)

    2012-01-01

    tenfold to account for uninsured and other costs unaccounted for, the result would be in the low billions of dollars rather than tens of billions...Aviation Security GAO—See U.S. Government Accountability Office or, prior to 2004, U.S. General Accounting Office. Ghylin, K. M., C. G . Drury , and A...outweigh their costs . This document seeks to contribute to the national debate on avia- tion security by examining a set of issues that are either

  9. The role of food-security solutions in the protection of natural resources and environment of developing countries.

    Science.gov (United States)

    Lashgarara, Farhad; Mirdamadi, Seyyed Mehdi; Hosseini, Seyyed Jamal Farajollah; Chizari, Mohammad

    2008-10-01

    The majority of the countries of the world, especially developing countries, face environmental problems. Limitations of basic resources (water and soil) and population growth have been the cause of these environmental problems that countries are confronted with. Developing countries have numerous problems, including destruction of forests, vegetable and animal species, and pollution of the environment. Damage to natural resources and the environment can influence the food-security situation. One of the main millennium development goals (MDGs) is protection of the environment and people's health. This cannot obtained unless there is ensured food security. Food security has been defined as a situation when all people, at all times, have physical and economic access to sufficient, safe, and nutritious food needed to maintain a healthy and active life. At the same time, with ensured food security, we can hope to protect the natural resources and environment. The methodology used is descriptive-analytical, and its main purpose is determining the importance and role of food-security solutions in the reduction of environmental hazards and improvement of natural resources and the environmental situation in developing countries. Therefore, some of the most important food-security solutions that can play an important role in this relation were discussed, including conventional research-based technology, biotechnology, information and communication technologies (ICTs), alternative energy sources, and food irradiation.

  10. Enabling analytics on sensitive medical data with secure multi-party computation

    NARCIS (Netherlands)

    M. Veeningen (Meilof); S. Chatterjea (Supriyo); A.Z. Horváth (Anna Zsófia); G. Spindler (Gerald); E. Boersma (Eric); P. van der Spek (Peter); O. van der Galiën (Onno); J. Gutteling (Job); W. Kraaij (Wessel); P.J.M. Veugen (Thijs)

    2018-01-01

    textabstractWhile there is a clear need to apply data analytics in the healthcare sector, this is often difficult because it requires combining sensitive data from multiple data sources. In this paper, we show how the cryptographic technique of secure multiparty computation can enable such data

  11. Resource reliability, accessibility and governance: pillars for managing water resources to achieve water security in Nepal

    Science.gov (United States)

    Biggs, E. M.; Duncan, J.; Atkinson, P.; Dash, J.

    2013-12-01

    As one of the world's most water-abundant countries, Nepal has plenty of water yet resources are both spatially and temporally unevenly distributed. With a population heavily engaged in subsistence farming, whereby livelihoods are entirely dependent on rain-fed agriculture, changes in freshwater resources can substantially impact upon survival. The two main sources of water in Nepal come from monsoon precipitation and glacial runoff. The former is essential for sustaining livelihoods where communities have little or no access to perennial water resources. Much of Nepal's population live in the southern Mid-Hills and Terai regions where dependency on the monsoon system is high and climate-environment interactions are intricate. Any fluctuations in precipitation can severely affect essential potable resources and food security. As the population continues to expand in Nepal, and pressures build on access to adequate and clean water resources, there is a need for institutions to cooperate and increase the effectiveness of water management policies. This research presents a framework detailing three fundamental pillars for managing water resources to achieve sustainable water security in Nepal. These are (i) resource reliability; (ii) adequate accessibility; and (iii) effective governance. Evidence is presented which indicates that water resources are adequate in Nepal to sustain the population. In addition, aspects of climate change are having less impact than previously perceived e.g. results from trend analysis of precipitation time-series indicate a decrease in monsoon extremes and interannual variation over the last half-century. However, accessibility to clean water resources and the potential for water storage is limiting the use of these resources. This issue is particularly prevalent given the heterogeneity in spatial and temporal distributions of water. Water governance is also ineffective due to government instability and a lack of continuity in policy

  12. Micro generation from renewable resources - secure and sustainable

    International Nuclear Information System (INIS)

    Khan, S.A.

    2011-01-01

    Pakistan's power demand is mainly satisfied by fossil fuel, which is not abundant and major source of global warming/climate change. A sustainable and secure alternative for Pakistan would be to exploit its indigenous and renewable energy (RE) resources like hydro, solar and wind with public participation. Pakistan receives year-round solar irradiance, which can become a major power producer in urban and non-arable areas. Secondly, locally managed run-of-river micro hydro projects can be an important source of power generation in Northern Pakistan. Thirdly, small wind turbines installed in coastal and windy areas of Southern Pakistan can serve as significant electricity producers. The limiting factors in the case of power from RE are: space, cost, storage, vested interests and reluctance to change. Regardless of production technique, the power shortfall can be controlled to some extent by energy conservation, managing heat loss, transmission and distribution losses and by having energy-efficient buildings and appliances. (author)

  13. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  14. Analytical group decision making in natural resources: methodology and application

    Science.gov (United States)

    Daniel L. Schmoldt; David L. Peterson

    2000-01-01

    Group decision making is becoming increasingly important in natural resource management and associated scientific applications, because multiple values are treated coincidentally in time and space, multiple resource specialists are needed, and multiple stakeholders must be included in the decision process. Decades of social science research on decision making in groups...

  15. Resource conflict, collective action, and resilience: an analytical framework

    Directory of Open Access Journals (Sweden)

    Blake D. Ratner

    2013-02-01

    Full Text Available Where access to renewable natural resources essential to rural livelihoods is highly contested, improving cooperation in resource management is an important element in strategies for peacebuilding and conflict prevention. While researchers have made advances in assessing the role of environmental resources as a causal factor in civil conflict, analysis of the positive potential of collective natural resource management efforts to reduce broader conflict is less developed. Addressing this need, we present a framework on collective action, conflict prevention, and social-ecological resilience, linking local stakeholder dynamics to the broader institutional and governance context. Accounting for both formal and informal relationships of power and influence, as well as values and stakeholder perceptions alongside material interests, the framework aims to provide insight into the problem of (rebuilding legitimacy of common-pool resource management institutions in conflict-sensitive environments. We outline its application in stakeholder-based problem assessment and planning, participatory monitoring and evaluation, and multi-case comparative analysis.

  16. INITIAL RESOURCE PROVISIONINGIN IAAS CLOUDS BASED ON THE ANALYTIC HIERARCHY PROCESS

    Directory of Open Access Journals (Sweden)

    Andrey A. Mikryukov

    2015-01-01

    Full Text Available The aim of this paper is to describe one possible solution of a problem of efficient initial resource provisioning in the Infrastructure-as-a-Service cloud environments using the Analytic Hierarchy Process.

  17. Science and Technology Resources on the Internet: Computer Security.

    Science.gov (United States)

    Kinkus, Jane F.

    2002-01-01

    Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…

  18. ANALYTICAL REVIEW OF ELECTRONIC RESOURCES FOR THE STUDY OF LATIN

    Directory of Open Access Journals (Sweden)

    Olena Yu. Balalaieva

    2014-04-01

    Full Text Available The article investigates the current state of development of e-learning content in the Latin language. It is noted that the introduction of ICT in the educational space has expanded the possibility of studying Latin, opened access to digital libraries resources, made it possible to use scientific and educational potential and teaching Latin best practices of world's leading universities. A review of foreign and Ukrainian information resources and electronic editions for the study of Latin is given. Much attention was paid to the didactic potential of local and online multimedia courses of Latin, electronic textbooks, workbooks of interactive tests and exercises, various dictionaries and software translators, databases and digital libraries. Based on analysis of the world market of educational services and products the main trends in the development of information resources and electronic books are examined. It was found that multimedia courses with interactive exercises or workbooks with interactive tests, online dictionaries and translators are the most widely represented and demanded. The noticeable lagging of Ukrainian education and computer linguistics in quantitative and qualitative measures in this industry is established. The obvious drawback of existing Ukrainian resources and electronic editions for the study of Latin is their noninteractive nature. The prospects of e-learning content in Latin in Ukraine are outlined.

  19. Physical and Cross-Layer Security Enhancement and Resource Allocation for Wireless Networks

    Science.gov (United States)

    Bashar, Muhammad Shafi Al

    2011-01-01

    In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…

  20. Evaluation of Water Resource Security Based on an MIV-BP Model in a Karst Area

    Directory of Open Access Journals (Sweden)

    Liying Liu

    2018-06-01

    Full Text Available Evaluation of water resource security deserves particular attention in water resource planning and management. A typical karst area in Guizhou Province, China, was used as the research area in this paper. First, based on data from Guizhou Province for the past 10 years, the mean impact value–back propagation (MIV-BP model was used to analyze the factors influencing water resource security in the karst area. Second, 18 indices involving five aspects, water environment subsystem, social subsystem, economic subsystem, ecological subsystem, and human subsystem, were selected to establish an evaluation index of water resource security. Finally, a BP artificial neural network model was constructed to evaluate the water resource security of Guizhou Province from 2005 to 2014. The results show that water resource security in Guizhou, which was at a moderate warning level from 2005 to 2009 and a critical safety level from 2010 to 2014, has generally improved. Groundwater supply ratio, industrial water utilization rate, water use efficiency, per capita grain production, and water yield modulus were the obstacles to water resource security. Driving factors were comprehensive utilization rate of industrial solid waste, qualifying rate of industrial wastewater, above moderate rocky desertification area ratio, water requirement per unit gross domestic product (GDP, and degree of development and utilization of groundwater. Our results provide useful suggestions on the management of water resource security in Guizhou Province and a valuable reference for water resource research.

  1. Securing Resources in Collaborative Environments: A Peer-to-peerApproach

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo; Essiari, Abdelilah; Thompson, Mary R.

    2005-09-19

    We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model and describes an architecture that implements this model to provide security in pure peer-to-peer environments.

  2. Resources available for applying metrics in security and safety programming.

    Science.gov (United States)

    Luizzo, Anthony

    2016-01-01

    Incorporating metrics into security surveys has been championed as a better way of substantiating program-related effectiveness and expenditures. Although security surveys have been aroundfor well over 40 years, rarely, if ever, have metric-related strategies been part of the equation, the author says. In this article, he cites several published articles and research findings available to security professionals and their surveyors that may give them the expertise and confidence they need to make use of this valuable tool.

  3. Firm-level Resource Allocation to Information Security in the Presence of Financial Distress

    OpenAIRE

    Bin Srinidhi; Jia Yan; Giri Kumar Tayi

    2008-01-01

    In this paper, we adopt an organizational perspective to the management of information security and analyze in a multi-period context how an organization should allocate its internal cash flows and available external funds to revenuegenerating (productive) and security assuring (protective) processes in the presence of security breach, borrowing and financial distress costs. We show analytically and illustrate numerically that the capital stock accumulation is lower and allocations to securit...

  4. Analytical Approach for Analyzing Trusted Security System for Data Sharing in Cloud Environment

    OpenAIRE

    Anand Srivastava; Surendra Mishra; Pankaj Kawadkar

    2011-01-01

    Cheap, seemingly unlimited computing resources that can be allocated almost instantaneously and pay-as-you-go pricing schemes are some of the reasons for the success of Cloud computing .In this paper we discuss few aspects of cloud computing and also there area. Cloud computing has been acknowledged as one of the prevailing models for providing IT capacities. The computing paradigm that comes with cloud computing has incurred great concerns on the security of data, especially the integrity an...

  5. Integrated homeland security system with passive thermal imaging and advanced video analytics

    Science.gov (United States)

    Francisco, Glen; Tillman, Jennifer; Hanna, Keith; Heubusch, Jeff; Ayers, Robert

    2007-04-01

    A complete detection, management, and control security system is absolutely essential to preempting criminal and terrorist assaults on key assets and critical infrastructure. According to Tom Ridge, former Secretary of the US Department of Homeland Security, "Voluntary efforts alone are not sufficient to provide the level of assurance Americans deserve and they must take steps to improve security." Further, it is expected that Congress will mandate private sector investment of over $20 billion in infrastructure protection between 2007 and 2015, which is incremental to funds currently being allocated to key sites by the department of Homeland Security. Nearly 500,000 individual sites have been identified by the US Department of Homeland Security as critical infrastructure sites that would suffer severe and extensive damage if a security breach should occur. In fact, one major breach in any of 7,000 critical infrastructure facilities threatens more than 10,000 people. And one major breach in any of 123 facilities-identified as "most critical" among the 500,000-threatens more than 1,000,000 people. Current visible, nightvision or near infrared imaging technology alone has limited foul-weather viewing capability, poor nighttime performance, and limited nighttime range. And many systems today yield excessive false alarms, are managed by fatigued operators, are unable to manage the voluminous data captured, or lack the ability to pinpoint where an intrusion occurred. In our 2006 paper, "Critical Infrastructure Security Confidence Through Automated Thermal Imaging", we showed how a highly effective security solution can be developed by integrating what are now available "next-generation technologies" which include: Thermal imaging for the highly effective detection of intruders in the dark of night and in challenging weather conditions at the sensor imaging level - we refer to this as the passive thermal sensor level detection building block Automated software detection

  6. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  7. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  8. 76 FR 54196 - Public Meeting, Cherokee National Forest Secure Rural Schools Resource Advisory Committee

    Science.gov (United States)

    2011-08-31

    ... DEPARTMENT OF AGRICULTURE Forest Service Public Meeting, Cherokee National Forest Secure Rural Schools Resource Advisory Committee AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: In accordance with the Secure Rural Schools and Community Self Determination Act of 2000 (Pub. L. 106-393), [as...

  9. Using the Technology of the Confessional as an Analytical Resource: Four Analytical Stances Towards Research Interviews in Discourse Analysis

    Directory of Open Access Journals (Sweden)

    Brendan K. O'Rourke

    2007-05-01

    Full Text Available Among the various approaches that have developed from FOUCAULT's work is an Anglophone discourse analysis that has attempted to combine FOUCAULTian insights with the techniques of Conversation Analysis. An important current methodological issue in this discourse analytical approach is its theoretical preference for "naturally occurring" rather than research interview data. A FOUCAULTian perspective on the interview as a research instrument, questions the idea of "naturally-occurring discourse". The "technology of the confessional" operates, not only within research interviews, but permeates other interactions as well. Drawing on FOUCAULT does not dismiss the problems of the interview as research instrument rather it shows they cannot be escaped by simply switching to more "natural" interactions. Combining these insights with recent developments within discourse analysis can provide analytical resources for, rather than barriers to, the discourse analysis of research interviews. To aid such an approach, we develop a four-way categorisation of analytical stances towards the research interview in discourse analysis. A demonstration of how a research interview might be subjected to a discourse analysis using elements of this approach is then provided. URN: urn:nbn:de:0114-fqs070238

  10. Food Security: Selected Global and U.S. Resources

    Science.gov (United States)

    Kocher, Megan

    2015-01-01

    Food security is researched and dealt with on local, regional, national, and global levels with solutions ranging from local farmers' market initiatives to increasing crop yields through genetically modified plants to streamlining global supply chains. Because of its broad, interdisciplinary nature, it is necessary to narrow the focus of this…

  11. Analytical resource assessment method for continuous (unconventional) oil and gas accumulations - The "ACCESS" Method

    Science.gov (United States)

    Crovelli, Robert A.; revised by Charpentier, Ronald R.

    2012-01-01

    The U.S. Geological Survey (USGS) periodically assesses petroleum resources of areas within the United States and the world. The purpose of this report is to explain the development of an analytic probabilistic method and spreadsheet software system called Analytic Cell-Based Continuous Energy Spreadsheet System (ACCESS). The ACCESS method is based upon mathematical equations derived from probability theory. The ACCESS spreadsheet can be used to calculate estimates of the undeveloped oil, gas, and NGL (natural gas liquids) resources in a continuous-type assessment unit. An assessment unit is a mappable volume of rock in a total petroleum system. In this report, the geologic assessment model is defined first, the analytic probabilistic method is described second, and the spreadsheet ACCESS is described third. In this revised version of Open-File Report 00-044 , the text has been updated to reflect modifications that were made to the ACCESS program. Two versions of the program are added as appendixes.

  12. Resource industries and security issues in northern Alberta

    Energy Technology Data Exchange (ETDEWEB)

    Flanagan, T. [Calgary Univ., AB (Canada). Dept. of Political Science

    2009-06-15

    Public concern over global warming has led to many political attacks on the oil industry, particularly Alberta's tar sand industry. This document focused on security issues in northern Alberta and reviewed past incidences of security threats. The likelihood of sabotage to wells, pipelines, buildings, and other industry facilities was assessed. Five potential sources of opposition were identified, notably individual saboteurs, eco-terrorists, mainstream environmentalists, First Nations, and the Metis people. All except the Metis have at various times used some combination of litigation, blockades, boycotts, sabotage, and violence against economic development projects. This report stated that although such incidents will likely continue in the future, it is unlikely that extra-legal obstruction will become widespread unless these various groups cooperate with each other. Since these groups have different social characteristics and conflicting political interests, it is unlikely that such cooperation will occur. 34 refs.

  13. 48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible for...

  14. 48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 3052.204-70 Section 3052.204-70 Federal Acquisition Regulations... for unclassified information technology resources. As prescribed in (HSAR) 48 CFR 3004.470-3, insert a clause substantially the same as follows: Security Requirements for Unclassified Information Technology...

  15. Balancing water resource conservation and food security in China.

    Science.gov (United States)

    Dalin, Carole; Qiu, Huanguang; Hanasaki, Naota; Mauzerall, Denise L; Rodriguez-Iturbe, Ignacio

    2015-04-14

    China's economic growth is expected to continue into the next decades, accompanied by sustained urbanization and industrialization. The associated increase in demand for land, water resources, and rich foods will deepen the challenge of sustainably feeding the population and balancing agricultural and environmental policies. We combine a hydrologic model with an economic model to project China's future food trade patterns and embedded water resources by 2030 and to analyze the effects of targeted irrigation reductions on this system, notably on national agricultural water consumption and food self-sufficiency. We simulate interprovincial and international food trade with a general equilibrium welfare model and a linear programming optimization, and we obtain province-level estimates of commodities' virtual water content with a hydrologic model. We find that reducing irrigated land in regions highly dependent on scarce river flow and nonrenewable groundwater resources, such as Inner Mongolia and the greater Beijing area, can improve the efficiency of agriculture and trade regarding water resources. It can also avoid significant consumption of irrigation water across China (up to 14.8 km(3)/y, reduction by 14%), while incurring relatively small decreases in national food self-sufficiency (e.g., by 3% for wheat). Other researchers found that a national, rather than local, water policy would have similar effects on food production but would only reduce irrigation water consumption by 5%.

  16. The use of different analytical techniques as a backup to mineral resources assessment

    International Nuclear Information System (INIS)

    Carvalho Tofani, P. de; Ferreira, M.P.; Gomes, H.; Avelar, M.M.

    1982-01-01

    The Empresas Nucleares Brasileiras S.A. (NUCLEBRAS) has implemented and improved, since their foundation in 1974, several laboratories at the Centro de Desenvolvimento da Tecnologia Nuclear (CDTN), in Belo Horizonte (MG, Brazil), in order to develop capabilities in the analytical chemistry field. Skillful personnel, using a large spectrum of equipment and procedures, is already able to determine, fast and accurately, almost any chemical element in any matrix. About 340.000 analytical determinations have been performed during the last seven years, concerning mostly chemical elements of great importance in the mineral technology programs. This considerable amount of results has been used, specially, as a backup to assess Brazilian uranium resources. (Author) [pt

  17. Hawai‘i Distributed Energy Resource Technologies for Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2012-09-30

    HNEI has conducted research to address a number of issues important to move Hawai‘i to greater use of intermittent renewable and distributed energy resource (DER) technologies in order to facilitate greater use of Hawai‘i's indigenous renewable energy resources. Efforts have been concentrated on the Islands of Hawai‘i, Maui, and O‘ahu, focusing in three areas of endeavor: 1) Energy Modeling and Scenario Analysis (previously called Energy Road mapping); 2) Research, Development, and Validation of Renewable DER and Microgrid Technologies; and 3) Analysis and Policy. These efforts focused on analysis of the island energy systems and development of specific candidate technologies for future insertion into an integrated energy system, which would lead to a more robust transmission and distribution system in the state of Hawai‘i and eventually elsewhere in the nation.

  18. Energy security of supply and oil shale resources

    International Nuclear Information System (INIS)

    Elkarmi, F.

    1994-01-01

    Jordan must utilize its huge oil shale deposits in order to increase domestic security of energy supply and benefit financially. Utilization processes will require large scale financial expenditures, beyond Jordan's means. Therefore, the BOT scheme seems to be the perfects solution. Since oil shale retorting technology will produce oil which can be traded to generate valuable foreign exchange revenues, it is more advantageous than direct burning technology which produces electricity limited to local consumption regardless of economics. Under the BOT scheme, the incentive, for the foreign sponsor is to return his investment via quantities of oil; for Jordan the aim is to meet local energy demand and acquire the plant infrastructure in the long term. Recent events in the more traditional oil fields of the region make such a project in Jordan more attractive. (author) 3 tabs. 2 figs

  19. Increasing Awareness of Insider Information Security Threats in Human Resource Department

    OpenAIRE

    Burcin Cetin Karabat; Cagatay Karabat

    2012-01-01

    An insider threat for companies is defined as a threat caused by malicious user who is an employee company. In recent years, there are number of work on insider threats in information security technologies. These works shows that companies should increasingly and seriously should take into account these threats. Human factors in companies constitute one of the weakest links in information security technology and its products used in human resource (HR) management departments. In the literatur...

  20. Resource Allocation of Security-Critical Tasks with Statistically Guaranteed Energy Constraint

    DEFF Research Database (Denmark)

    Jiang, Wei; Jiang, Ke; Ma, Yue

    2012-01-01

    In this paper, we are interested in resource allocation for energy constrained and security-critical embedded systems. Tasks in such systems need to be successfully executed under certain energy budget and be robust against serious security threatens. Different to former energy minimal scheduling...... energy slack ratio. The proposed algorithm is very efficient in both time and space dimensions, and achieves good solutions. Extensive simulations demonstrate the superiority of our algorithm over other approaches....

  1. Education and Training Networks as a Tool for Nuclear Security Human Resource Development and Capacity Building

    International Nuclear Information System (INIS)

    Nikonov, D.

    2014-01-01

    Human Resource Development for Capacity Building for Nuclear Security: • Comprehensive Training Programme Objective: To raise awareness, to fill gaps between the actual performance of personnel and the required competencies and skills and, to build-up qualified instructors/trainers. • Promoting Nuclear Security Education Objective: To support the development of teaching material, faculty expertise and preparedness, and the promotion of nuclear security education in collaboration with the academic and scientific community. Ultimate Goal: To develop capabilities for supporting sustainable implementation of the international legal instruments and IAEA guidelines for nuclear security worldwide, and to foster nuclear security culture. Education priorities for the future: • Incorporate feedback from the first pilot program into future academic activities in nuclear security; • Based on feedback from pilot program: • Revise the NSS12 guidance document; • Update educational materials and textbooks. • Support INSEN members, which consider launching MSc programs at their institutions; • Continue promoting nuclear security education as part of existing degree programs (through certificate or concentration options); • Support the use of new forms of teaching and learning in nuclear security education: • Online e-learning degree programmes and modules; • Learning by experience; • Problem-oriented learning tailored to nuclear security functions

  2. Commercial off the shelf systems security: resource guide - TAFICS/RS/1

    International Nuclear Information System (INIS)

    2017-05-01

    This document is a resource book that catalogues various aspects related to cyber protection of commercial off the shelf (COTS) systems used in I and C systems at nuclear facilities, particularly those relevant to DAE. It covers: (a) important cyber attacks on COTS systems used in various industries across the world; (b) taxonomy of threats and vulnerabilities of COTS systems; (c) COTS security issues specific to NFs; and (d) the standards, guides and technical articles related to security of COTS systems. This resource book is used in preparation of I and C security guides on COTS systems by TAFICS. The resource book is valuable to I and C designers to build effective counter measures against cyber threats to COTS systems. It is also useful to operating plant managers and the regulators for general awareness about this topic. (author)

  3. Reframing resources and public goods: an integrative approach to natural resources security at regional scale

    OpenAIRE

    Negrutiu, Ioan; Fernandez, Edgar F.; Malwé, Claire; Salles, Jean-Michel; Collart Dutilleul, François; Merchez, Luc; Weber, Jean-Louis

    2013-01-01

    Human history can be mirrored in a geo-history of natural resources. Humans, by over-exploiting resources (“forcing”), have produced extensive land use changes and have altered complex food webs, ecosystems, and habitats with as a consequence systematic natural biocapacity erosion, biodiversity loss, energy crises, pollution, climate deregulation. In other terms, a global resources “rush” has led to chronic socio-ecosystemic deficits, thus creating the conditions for local and global state sh...

  4. Teachers’ Relationship Closeness with Students as a Resource for Teacher Wellbeing: A Response Surface Analytical Approach

    Science.gov (United States)

    Milatz, Anne; Lüftenegger, Marko; Schober, Barbara

    2015-01-01

    Teachers’ relationship quality with students has been argued to be an important source of teacher wellbeing. Thus, the current study aimed to investigate to what extent teachers’ relationship closeness toward students, combined with attachment security is a resource protecting against teacher burnout. Eighty-three elementary school teachers reported on their most and least attached student’s relationship closeness, their attachment security and levels of burnout, as measured by emotional exhaustion, depersonalization and personal accomplishment. Response surface analysis (RSA), enabling researchers to investigate the effect of congruence/incongruence of two predictors on an outcome, revealed that teachers’ depersonalization and emotional exhaustion were lowest when they developed homogenous close relationships toward the students within their classroom and when teachers in general made congruent relationship experiences. No RSA model could be specified for personal accomplishment, even though a correlational analysis revealed that increasing closeness with students fostered teachers’ personal accomplishment. Teachers’ secure attachment experiences were not directly related to burnout, but enhanced their capability to establish close relationships toward their students. Findings suggest that teachers’ relationships toward students are a resource for the teacher’s wellbeing, which highlights once again the importance of student–teacher relationships in education. PMID:26779045

  5. Security aspects of "Geoenergeia" and the significance of energy resources management in international politics

    OpenAIRE

    VIDAKIS, Ioannis; BALTOS, Georgios

    2015-01-01

    This paper builds on the tools of geopolitics and geo-economics for analyzing energy resource networks and energy security. To prioritize the role that energy resources play in the interpretation of and decision making in international politics, it proposes the introduction of the Greek language-inspired term "geoenergeia" and a derivative methodology. Unprecedented fluctuations in fuel prices during recent decades and intensifying turmoil in the energy market are all indisputable phenomena t...

  6. Multi-model approach to petroleum resource appraisal using analytic methodologies for probabilistic systems

    Science.gov (United States)

    Crovelli, R.A.

    1988-01-01

    The geologic appraisal model that is selected for a petroleum resource assessment depends upon purpose of the assessment, basic geologic assumptions of the area, type of available data, time available before deadlines, available human and financial resources, available computer facilities, and, most importantly, the available quantitative methodology with corresponding computer software and any new quantitative methodology that would have to be developed. Therefore, different resource assessment projects usually require different geologic models. Also, more than one geologic model might be needed in a single project for assessing different regions of the study or for cross-checking resource estimates of the area. Some geologic analyses used in the past for petroleum resource appraisal involved play analysis. The corresponding quantitative methodologies of these analyses usually consisted of Monte Carlo simulation techniques. A probabilistic system of petroleum resource appraisal for play analysis has been designed to meet the following requirements: (1) includes a variety of geologic models, (2) uses an analytic methodology instead of Monte Carlo simulation, (3) possesses the capacity to aggregate estimates from many areas that have been assessed by different geologic models, and (4) runs quickly on a microcomputer. Geologic models consist of four basic types: reservoir engineering, volumetric yield, field size, and direct assessment. Several case histories and present studies by the U.S. Geological Survey are discussed. ?? 1988 International Association for Mathematical Geology.

  7. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes. These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.

  8. Optimizing IEEE 802.11i resource and security essentials for mobile and stationary devices

    CERN Document Server

    Amiri, IS; Saberi, Iman

    2014-01-01

    In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required securi

  9. Present state and problems of the measures for securing stable supply of uranium resources

    International Nuclear Information System (INIS)

    Yoneda, Fumishige

    1982-01-01

    The long-term stable supply of uranium resources must be secured in order to accelerate the development and utilization of nuclear power in Japan. All uranium required in Japan is imported from foreign countries, and depends on small number of suppliers. On the use of uranium, various restrictions have been imposed by bilateral agreements from the viewpoint of nuclear non-proliferation policy. At present, the demand-supply relation in uranium market is not stringent, but in the latter half of 1980s, it is feared that it will be stringent. The prospect of the demand and supply of uranium resources, the state of securing uranium resources, the present policy on uranium resources, the necessity of establishing the new policy, and the active promotion of uranium resource measures are described. The measures to be taken are the promotion of exploration and development of mines, the participation in the management of such foreign projects, the promotion of diversifying the supply sources, the establishment of the structure to accept uranium resources, the promotion of the storage of uranium, and the rearrangement of general coordination and promotion functions for uranium resource procurement. (Kako, I.)

  10. Natural Resources Management and Food Security in the Context of Sustainable Development

    International Nuclear Information System (INIS)

    John, H.

    2011-01-01

    This paper elaborates on the inseparable link between sustain ability of natural resources and food security. A strategic framework that envisages conservation, improvement and sustainable uses of natural resources is proposed which meets the essential requirements for food security. Sustainability has traditionally been accepted as encompassing three dimensions, namely environment, economics and society but it is necessary to widen this approach for a more complete understanding of this term. Environmental degradation curtails ecosystem services, leading to impoverishment of vulnerable communities and insecurity. Food, whether derived from land or sea, is a product of complex environmental linkages, and biodiversity has a pivotal role to play in producing it. Technology, production methods and management requirements are different for food derived from land and sea, but essentially all foodstuffs utilize environmental resources whose sustain ability is crucial for food security. This analysis necessitates consideration of the basic concepts of sustainable development and food security, the strength of the link between these and differences in the patterns of sustainable management of agriculture, fisheries and aquaculture. The growing role of genetically engineered organisms has been included because of the immense possibilities these offer for maximizing food production despite the environmental and ethical concerns raised. (author)

  11. Evaluating energy security of resource-poor economies: A modified principle component analysis approach

    International Nuclear Information System (INIS)

    Li, Yingzhu; Shi, Xunpeng; Yao, Lixia

    2016-01-01

    This study proposes to aggregately measure energy security performance with the principal component analysis. In its application of the methodology to four resource-poor yet economically advanced island economies in East Asia—Singapore, South Korea, Japan, and Taiwan, this study establishes a novel framework to conceptualize energy security. The framework incorporates three dimensions: vulnerability, efficiency, and sustainability, three indicators being allocated to each dimension. The study finds that all the three dimensions are critical for the resource-poor economies but have different weights in each of them. An urgent task for these four economies is to implement energy efficiency and conservation measures. Liberalization of electricity sector can be a helpful tool to reduce energy consumption and increase efficiency. All of them have been committed to promoting renewable energy development, which shall be further expanded in these economies. - Highlights: • Proposes to assess energy security within a three-level framework using PCA. • Applies the method to four resource-poor island economies in East Asia. • Establishes a novel framework to conceptualize energy security. • Dimensions within the framework are vulnerability, efficiency, and sustainability. • Three dimensions are all important but have different weights in different economies.

  12. Advanced Data Analytics and Visualisation for the Management of Human Perception of Safety and Security in Urban Spaces

    OpenAIRE

    Melas , Panos; Correndo , Gianluca; Middleton , Lee; Sabeur , Zoheir ,

    2015-01-01

    Part 7: Analytics and Visualization; International audience; The genesis of this work began during the DESURBS project. The scope of the project was to help build a collaborative decision-support system portal where spatial planning professionals could learn about designing much more secure and safer spaces in urban areas. The portal achieved this via integrating a number of tools under a common, simple to use, interface. However, the deficiencies in the project became apparent with subsequen...

  13. Analytical methods manual for the Mineral Resource Surveys Program, U.S. Geological Survey

    Science.gov (United States)

    Arbogast, Belinda F.

    1996-01-01

    The analytical methods validated by the Mineral Resource Surveys Program, Geologic Division, is the subject of this manual. This edition replaces the methods portion of Open-File Report 90-668 published in 1990. Newer methods may be used which have been approved by the quality assurance (QA) project and are on file with the QA coordinator.This manual is intended primarily for use by laboratory scientists; this manual can also assist laboratory users to evaluate the data they receive. The analytical methods are written in a step by step approach so that they may be used as a training tool and provide detailed documentation of the procedures for quality assurance. A "Catalog of Services" is available for customer (submitter) use with brief listings of:the element(s)/species determined,method of determination,reference to cite,contact person,summary of the technique,and analyte concentration range.For a copy please contact the Branch office at (303) 236-1800 or fax (303) 236-3200.

  14. Proactive Spatiotemporal Resource Allocation and Predictive Visual Analytics for Community Policing and Law Enforcement.

    Science.gov (United States)

    Malik, Abish; Maciejewski, Ross; Towers, Sherry; McCullough, Sean; Ebert, David S

    2014-12-01

    In this paper, we present a visual analytics approach that provides decision makers with a proactive and predictive environment in order to assist them in making effective resource allocation and deployment decisions. The challenges involved with such predictive analytics processes include end-users' understanding, and the application of the underlying statistical algorithms at the right spatiotemporal granularity levels so that good prediction estimates can be established. In our approach, we provide analysts with a suite of natural scale templates and methods that enable them to focus and drill down to appropriate geospatial and temporal resolution levels. Our forecasting technique is based on the Seasonal Trend decomposition based on Loess (STL) method, which we apply in a spatiotemporal visual analytics context to provide analysts with predicted levels of future activity. We also present a novel kernel density estimation technique we have developed, in which the prediction process is influenced by the spatial correlation of recent incidents at nearby locations. We demonstrate our techniques by applying our methodology to Criminal, Traffic and Civil (CTC) incident datasets.

  15. Food Security and Women's Access to Natural Resources workshop; a brief report.

    Science.gov (United States)

    1997-01-01

    This article describes the workshop on Food Security and Women's Access to Natural Resources, held in January 1997 in Mumbai, India. The workshop was organized jointly by the Tata Institute of Social Sciences and the Indian Association of Women's Studies. The aim was to examine the food security situation in Maharashtra and Gujarat states in the west, the initiative to build alternative institutions, legal changes augmenting industrialization, and how traditional rights to common property resources can be legalized and how the poor can have access to new resources. The workshop organizers were unable to obtain experts on some topics. Core discussion centered on changes in industrialization, natural resources, gender and food security; access to natural resources and poverty alleviation programs; initiatives to create food security; and laws related to access to land and water. Discussions revealed the alienation of small and marginal farmers, landless laborers, and artisans from their livelihoods and survival strategies for these disenfranchised groups. The design of drought eradication and water conservation programs did not permit women and men working at construction sites to have access to the program assets. Case studies revealed situations in which women won the right of access to community water and then negotiated for land in lease. The women used landowners to negotiate credit and access development program assets, but normal channels of the National Bank of Agricultural Research and Development could have provided these benefits. Participants discussed how governments can be held accountable and how public funds could be used to revamp poverty alleviation and asset creation programs. All agreed that macrolevel development should give priority to agricultural development and legal constraints or problems. Five follow-up activities are identified.

  16. Resource power and resource security: the politics of nonfuel minerals trade

    International Nuclear Information System (INIS)

    Kahn, O.E.

    1985-01-01

    The developed producers, Canada, Australia, and South Africa, and not the developing producers, are the power wielders and major tracers in nonfuel minerals. Specific circumstances allow producers to obtain compliant behavior from consumers. These include: exporter's market share, importer's degree of dependence, the material's being critical to importer's economy, and the trading system's condoning nonmarket goals. These (and other) criteria comprise an analytical device, the strategic trading relationship, which is used to demonstrate developed producer commodity power and developed consumer vulnerability. Consuming country governments rely on the private sector to deal with national enmeshment in strategic trading relationships. Japan excepted, OECD members fail either to address their continued access to nonfuel minerals, or their ability to survive supply disruption with minimum dislocation. Producer power is exemplified by Canada's threat and use of embargo to make her uranium customers tighten their nonproliferation policies. Structural power deters South Africa's ability to head off wholehearted economic pressure is the classic case

  17. [Food and nutrition security policy in Brazil: an analysis of resource allocation].

    Science.gov (United States)

    Custódio, Marta Battaglia; Yuba, Tânia Yuka; Cyrillo, Denise Cavallini

    2013-02-01

    To describe the progression and distribution of federal funds for programs and activities that fall within the scope of the guidelines of the Brazilian National Policy on Food and Nutrition Security (PNSAN) in the period from 2004 to 2010. This descriptive study used data from the Transparency Website maintained by the Brazilian Public Sector Internal Control Office. Search results were exported to Excel spreadsheets. To determine the resources allocated to food security initiatives, a database was set up containing all actions developed by the federal government between 2004 and 2010. This database was reviewed and the actions that were not related to PNSAN were discarded. The annual amounts obtained were corrected by the Consumer Price Index and updated for the year 2010. Since actions are part of specific programs, the sum of the resources allocated for all the actions of a program amounted to the resources invested in the program as a whole. The programs were then prioritized according to the amount of resources received in 2010. Of the 5 014 actions receiving federal funds in the study period, 814 were related to PNSAN (229 programs). There was growth in resources allocated for PNSAN programs, reaching US$ 15 billion in 2010 (an 82% increase over the previous year). The largest amount was invested in Bolsa Família, a cash transfer program. Ten programs received 90% of the funds, of which five were linked to food production processes. The amount of resources invested in the PNSAN and in actions and programs that promote food and nutrition security is increasing in Brazil.

  18. Policy for securing human resources in the nuclear industry of Japan

    International Nuclear Information System (INIS)

    Takeuchi, S.

    1993-01-01

    The shortage of human resources in the field of nuclear industry in Japan is due to: structural difficulty resulting from the prevailing labor shortage in Japan, difficulties from the ever-intensifying adverse wind against nuclear power, and difficulties specific to R and D organizations. A practical plan is proposed for securing qualified personnel: approach to be directly made on campuses; effective/advanced management of human resources; better treatment and fringe benefit; promoting the nuclear industry attractiveness; expanding the scope of basic and fundamental researches; regaining the public confidence; closer cooperation between the government and the nuclear power groups. 6 figs

  19. Resource Optimization Techniques and Security Levels for Wireless Sensor Networks Based on the ARSy Framework

    Science.gov (United States)

    Kitagawa, Akio

    2018-01-01

    Wireless Sensor Networks (WSNs) with limited battery, central processing units (CPUs), and memory resources are a widely implemented technology for early warning detection systems. The main advantage of WSNs is their ability to be deployed in areas that are difficult to access by humans. In such areas, regular maintenance may be impossible; therefore, WSN devices must utilize their limited resources to operate for as long as possible, but longer operations require maintenance. One method of maintenance is to apply a resource adaptation policy when a system reaches a critical threshold. This study discusses the application of a security level adaptation model, such as an ARSy Framework, for using resources more efficiently. A single node comprising a Raspberry Pi 3 Model B and a DS18B20 temperature sensor were tested in a laboratory under normal and stressful conditions. The result shows that under normal conditions, the system operates approximately three times longer than under stressful conditions. Maintaining the stability of the resources also enables the security level of a network’s data output to stay at a high or medium level. PMID:29772773

  20. Towards Secure and Trustworthy Cyberspace: Social Media Analytics on Hacker Communities

    Science.gov (United States)

    Li, Weifeng

    2017-01-01

    Social media analytics is a critical research area spawned by the increasing availability of rich and abundant online user-generated content. So far, social media analytics has had a profound impact on organizational decision making in many aspects, including product and service design, market segmentation, customer relationship management, and…

  1. SECOND1. Security concept for DER (Distributed Energy Resources). Final report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    Secure communication is becoming increasingly more relevant in a power system where there is a high impact of distributed energy resources (DER). The purpose of this project has been to analyse and develop a proof of concept implementation for a security concept that can be used in a power system with a high degree of decentralized production and with many actors (BRP, DSO, TSO, utilities, retailers) in an unbundled market. One way to maintain flexibility in the communication system for the power grid is to assign access roles to specific operations and not just to a network or server. Security then becomes a matter of verification, namely that an applicant holds a role with privileges to perform the action applied for. The SECOND1 project has investigated various forms of role based access control (RBAC) as well as the underlying security mechanism identification and verification of the actor identity. The project analysed the needs for communication between energy operators and match these needs with a design for secure role based access control. (LN)

  2. saltPAD: A New Analytical Tool for Monitoring Salt Iodization in Low Resource Settings

    Directory of Open Access Journals (Sweden)

    Nicholas M. Myers

    2016-03-01

    Full Text Available We created a paper test card that measures a common iodizing agent, iodate, in salt. To test the analytical metrics, usability, and robustness of the paper test card when it is used in low resource settings, the South African Medical Research Council and GroundWork performed independ‐ ent validation studies of the device. The accuracy and precision metrics from both studies were comparable. In the SAMRC study, more than 90% of the test results (n=1704 were correctly classified as corresponding to adequately or inadequately iodized salt. The cards are suitable for market and household surveys to determine whether salt is adequately iodized. Further development of the cards will improve their utility for monitoring salt iodization during production.

  3. Stochastic Actuarial Modelling of a Defined-Benefit Social Security Pension Scheme: An Analytical Approach

    OpenAIRE

    Iyer, Subramaniam

    2017-01-01

    Among the systems in place in different countries for the protection of the population against the long-term contingencies of old-age (or retirement), disability and death (or survivorship), defined-benefit social security pension schemes, i.e. social insurance pension schemes, by far predominate, despite the recent trend towards defined-contribution arrangements in social security reforms. Actuarial valuations of these schemes, unlike other branches of insurance, continue to be carried out a...

  4. Deficit irrigation and sustainable water-resource strategies in agriculture for China's food security.

    Science.gov (United States)

    Du, Taisheng; Kang, Shaozhong; Zhang, Jianhua; Davies, William J

    2015-04-01

    More than 70% of fresh water is used in agriculture in many parts of the world, but competition for domestic and industrial water use is intense. For future global food security, water use in agriculture must become sustainable. Agricultural water-use efficiency and water productivity can be improved at different points from the stomatal to the regional scale. A promising approach is the use of deficit irrigation, which can both save water and induce plant physiological regulations such as stomatal opening and reproductive and vegetative growth. At the scales of the irrigation district, the catchment, and the region, there can be many other components to a sustainable water-resources strategy. There is much interest in whether crop water use can be regulated as a function of understanding of physiological responses. If this is the case, then agricultural water resources can be reallocated to the benefit of the broader community. We summarize the extent of use and impact of deficit irrigation within China. A sustainable strategy for allocation of agricultural water resources for food security is proposed. Our intention is to build an integrative system to control crop water use during different cropping stages and actively regulate the plant's growth, productivity, and development based on physiological responses. This is done with a view to improving the allocation of limited agricultural water resources. © The Author 2015. Published by Oxford University Press on behalf of the Society for Experimental Biology. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  5. Deficit irrigation and sustainable water-resource strategies in agriculture for China’s food security

    Science.gov (United States)

    Du, Taisheng; Kang, Shaozhong; Zhang, Jianhua; Davies, William J.

    2015-01-01

    More than 70% of fresh water is used in agriculture in many parts of the world, but competition for domestic and industrial water use is intense. For future global food security, water use in agriculture must become sustainable. Agricultural water-use efficiency and water productivity can be improved at different points from the stomatal to the regional scale. A promising approach is the use of deficit irrigation, which can both save water and induce plant physiological regulations such as stomatal opening and reproductive and vegetative growth. At the scales of the irrigation district, the catchment, and the region, there can be many other components to a sustainable water-resources strategy. There is much interest in whether crop water use can be regulated as a function of understanding of physiological responses. If this is the case, then agricultural water resources can be reallocated to the benefit of the broader community. We summarize the extent of use and impact of deficit irrigation within China. A sustainable strategy for allocation of agricultural water resources for food security is proposed. Our intention is to build an integrative system to control crop water use during different cropping stages and actively regulate the plant’s growth, productivity, and development based on physiological responses. This is done with a view to improving the allocation of limited agricultural water resources. PMID:25873664

  6. Impacts of HIV/AIDS mortality on food security and natural resource utilisation in rural South Africa

    CSIR Research Space (South Africa)

    Mambo, J

    2012-03-01

    Full Text Available AIDS mortality, its linkages as a determinant and consequence of food security and its impact on natural resource utilisation by mainly rural populations, has not been well researched, especially their effects on rural livelihoods. Determining...

  7. BelleII@home: Integrate volunteer computing resources into DIRAC in a secure way

    Science.gov (United States)

    Wu, Wenjing; Hara, Takanori; Miyake, Hideki; Ueda, Ikuo; Kan, Wenxiao; Urquijo, Phillip

    2017-10-01

    The exploitation of volunteer computing resources has become a popular practice in the HEP computing community as the huge amount of potential computing power it provides. In the recent HEP experiments, the grid middleware has been used to organize the services and the resources, however it relies heavily on the X.509 authentication, which is contradictory to the untrusted feature of volunteer computing resources, therefore one big challenge to utilize the volunteer computing resources is how to integrate them into the grid middleware in a secure way. The DIRAC interware which is commonly used as the major component of the grid computing infrastructure for several HEP experiments proposes an even bigger challenge to this paradox as its pilot is more closely coupled with operations requiring the X.509 authentication compared to the implementations of pilot in its peer grid interware. The Belle II experiment is a B-factory experiment at KEK, and it uses DIRAC for its distributed computing. In the project of BelleII@home, in order to integrate the volunteer computing resources into the Belle II distributed computing platform in a secure way, we adopted a new approach which detaches the payload running from the Belle II DIRAC pilot which is a customized pilot pulling and processing jobs from the Belle II distributed computing platform, so that the payload can run on volunteer computers without requiring any X.509 authentication. In this approach we developed a gateway service running on a trusted server which handles all the operations requiring the X.509 authentication. So far, we have developed and deployed the prototype of BelleII@home, and tested its full workflow which proves the feasibility of this approach. This approach can also be applied on HPC systems whose work nodes do not have outbound connectivity to interact with the DIRAC system in general.

  8. Supporting food security in the 21st century through resource-conserving increases in agricultural production

    Directory of Open Access Journals (Sweden)

    Uphoff Norman

    2012-12-01

    Full Text Available Abstract The Green Revolution was accomplished under a set of demographic, economic, climatic and other conditions in the 20th century that have been changing and will surely be different and more difficult in the decades ahead. The suitability and sustainability of any given agricultural technology depends on factors like resource availability and productivity, energy costs, and environmental constraints. The achievements of Green Revolution technologies in the 1960s and 1970s came at a critical time of impending food shortages, and the world’s people would be worse off without them. However, the rate of yield improvement for cereal production has been slowing since the mid-1980s. Looking ahead at the foreseeable circumstances under which 21st century agricultural producers must try to assure food security, there will be need for technologies that are less dependent on resources that are becoming relatively scarcer, like arable land and water, or becoming relatively more costly, like energy and petrochemical-based inputs. This paper considers agroecologically-based innovations that reduce farmers’ dependence on external inputs, relying more on endogenous processes and existing potentials in plants and soil systems. Such resource-conserving production represents a different approach to meeting food security goals. While these innovations are not yet fully understood and are still being researched, there are good agronomic reasons to account for their effectiveness, and scientific validations are accumulating. Enough successes have been recorded from making changes in the management of plants, soil, water and nutrients that more attention from researchers, policy-makers and practitioners is warranted, especially given the need to adapt to, and to mitigate the effects of, climate change. The same agroecological concepts and management methods that are enhancing factor productivity in rice production are giving similar results with other crops

  9. Analyzing Security Breaches in the U.S.: A Business Analytics Case-Study

    Science.gov (United States)

    Parks, Rachida F.; Adams, Lascelles

    2016-01-01

    This is a real-world applicable case-study and includes background information, functional organization requirements, and real data. Business analytics has been defined as the technologies, skills, and practices needed to iteratively investigate historical performance to gain insight or spot trends. You are asked to utilize/apply critical thinking…

  10. A short overview of measures for securing water resources for irrigated crop production

    DEFF Research Database (Denmark)

    Jensen, Christian Richardt; Ørum, Jens Erik; Pedersen, Søren Marcus

    2014-01-01

    Agriculture is the main user of limited fresh water resources in the world. Optimisation of agricultural water resources and their use can be obtained by both agronomical and political incentives. Important options are: reduction of the loss of irrigation water in conveyance before it reaches...... of the 'virtual water' principles so that water-rich regions secure food supply to dry regions; reduction in waste of food, feed and biofuel from post-harvest to the end consumer; changing of food composition to less water-consuming products; regulating amount of irrigation water by rationing, subsidies or water...... pricing to support water-saving measures such as use of drip, irrigation scheduling and DI. The potential for water saving for different measures is discussed and estimated. Reduction in waste of food and loss of irrigation water from conveyance source to farm both has a great potential for water saving...

  11. Securing Energy and Mineral Resources for China: Debating the role of markets

    International Nuclear Information System (INIS)

    Seaman, John

    2015-10-01

    This paper examines how China seeks to secure access to an ever growing level of natural resources from overseas. In its quest for resources necessary to fuel its economy, does China seek to bolster the development of international markets, or rather to procure resources in a more mercantilist fashion? China's varied behavior in a broad range of resource markets suggest that there is no guiding principle that pre-ordains a common approach today. Three cases - oil, iron ore and rare earths - show three different Chinese approaches to issues of resource procurement and allocation. In the case of oil, China has shown an increasing acceptance of market principles over the course of the last decade. In iron ore, meanwhile, China's strategy to gain a strong negotiating position within a pre-existing, closed system was ultimately upended by its inability to control its own market actors. The result was the opening-up of a more fluid market. Finally, the rare earth case provides an example of China's approach when it controls global production (albeit production within its own borders). China has been willing to contravene market principles in the rare earth trade either for diplomatic gains or to incite transfers of foreign technology to China. Nevertheless, it has also shown that it is not willing to sacrifice its participation in the broader system of international trade rules as laid out in the World Trade Organization (WTO). Ultimately, while China's growing need for imported raw materials certainly poses a number of challenges, many of the concerns about China are exaggerated, or overlook emerging trends in the way Chinese companies do business overseas. In particular, fears of Chinese 'mercantilism' are tempered by the fact that Chinese companies have in practice served to reinforce and even improve, rather than contravene international market mechanisms for trade in resources. Skepticism of international market principles in China has seemingly waned over time, and

  12. FuGeF: A Resource Bound Secure Forwarding Protocol for Wireless Sensor Networks.

    Science.gov (United States)

    Umar, Idris Abubakar; Mohd Hanapi, Zurina; Sali, A; Zulkarnain, Zuriati A

    2016-06-22

    Resource bound security solutions have facilitated the mitigation of spatio-temporal attacks by altering protocol semantics to provide minimal security while maintaining an acceptable level of performance. The Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing protocol for Wireless Sensor Network (WSN) has been proposed to achieve a minimal selection of malicious nodes by introducing a dynamic collection window period to the protocol's semantics. However, its selection scheme suffers substantial packet losses due to the utilization of a single distance based parameter for node selection. In this paper, we propose a Fuzzy-based Geographic Forwarding protocol (FuGeF) to minimize packet loss, while maintaining performance. The FuGeF utilizes a new form of dynamism and introduces three selection parameters: remaining energy, connectivity cost, and progressive distance, as well as a Fuzzy Logic System (FLS) for node selection. These introduced mechanisms ensure the appropriate selection of a non-malicious node. Extensive simulation experiments have been conducted to evaluate the performance of the proposed FuGeF protocol as compared to DWSIGF variants. The simulation results show that the proposed FuGeF outperforms the two DWSIGF variants (DWSIGF-P and DWSIGF-R) in terms of packet delivery.

  13. Human resource development program for nuclear safety and security in Tokyo Institute of Technology

    International Nuclear Information System (INIS)

    Han, Chi Young; Sagara, Hiroshi; Nagasaka, Hideo

    2014-01-01

    The Academy for Global Nuclear Safety and Security Agent was established at Tokyo Institute of Technology in 2011, to develop global nuclear human resources in the field of 3S (Safety, Security, and Safeguards) as a Program for Leading Graduate Schools supported by MEXT (Ministry of Education, Culture, Sports, Science and Technology). New courses of nuclear safety and security were developed in addition to the existing nuclear engineering program; 1) Environmental Dynamics of Radioactive Nuclides; Numerical simulation of the environmental dispersion of radioactive materials released from hypothetical nuclear accidents and evaluation of the public exposure are performed, by using a computer-based emergency response system, to have students predict the environmental dispersion of radionuclides and radiological consequence by nuclear accidents. 2) Measurement of Environmental Radiation; Students acquire hands-on experiences measuring environmental radiation contamination caused by the nuclear accident in Fukushima with multiple types of radiation detectors. Environmental samples are collected and analyzed for isotope identification and its spatial distribution. 3) Simulation of Severe Nuclear Accidents; The evaluation results of Fukushima accident progression are discussed as well as typical sever accidents that threaten the integrity of reactor vessel. Students simulate BWR (Boiling Water Cooled Reactor) transients, design basis accidents, and severe accidents by using simulators. 4) Nuclear Security Training; Design of physical protection systems, its fundamental physics, and regulatory frameworks are covered and students gain the practical experiences by use of intrusion detection systems at JAEA (Japan Atomic Energy Agency), and by numerical simulation of hydro-dynamics of structure material and nuclear material criticality at the university. (author)

  14. Genome resources for climate-resilient cowpea, an essential crop for food security.

    Science.gov (United States)

    Muñoz-Amatriaín, María; Mirebrahim, Hamid; Xu, Pei; Wanamaker, Steve I; Luo, MingCheng; Alhakami, Hind; Alpert, Matthew; Atokple, Ibrahim; Batieno, Benoit J; Boukar, Ousmane; Bozdag, Serdar; Cisse, Ndiaga; Drabo, Issa; Ehlers, Jeffrey D; Farmer, Andrew; Fatokun, Christian; Gu, Yong Q; Guo, Yi-Ning; Huynh, Bao-Lam; Jackson, Scott A; Kusi, Francis; Lawley, Cynthia T; Lucas, Mitchell R; Ma, Yaqin; Timko, Michael P; Wu, Jiajie; You, Frank; Barkley, Noelle A; Roberts, Philip A; Lonardi, Stefano; Close, Timothy J

    2017-03-01

    Cowpea (Vigna unguiculata L. Walp.) is a legume crop that is resilient to hot and drought-prone climates, and a primary source of protein in sub-Saharan Africa and other parts of the developing world. However, genome resources for cowpea have lagged behind most other major crops. Here we describe foundational genome resources and their application to the analysis of germplasm currently in use in West African breeding programs. Resources developed from the African cultivar IT97K-499-35 include a whole-genome shotgun (WGS) assembly, a bacterial artificial chromosome (BAC) physical map, and assembled sequences from 4355 BACs. These resources and WGS sequences of an additional 36 diverse cowpea accessions supported the development of a genotyping assay for 51 128 SNPs, which was then applied to five bi-parental RIL populations to produce a consensus genetic map containing 37 372 SNPs. This genetic map enabled the anchoring of 100 Mb of WGS and 420 Mb of BAC sequences, an exploration of genetic diversity along each linkage group, and clarification of macrosynteny between cowpea and common bean. The SNP assay enabled a diversity analysis of materials from West African breeding programs. Two major subpopulations exist within those materials, one of which has significant parentage from South and East Africa and more diversity. There are genomic regions of high differentiation between subpopulations, one of which coincides with a cluster of nodulin genes. The new resources and knowledge help to define goals and accelerate the breeding of improved varieties to address food security issues related to limited-input small-holder farming and climate stress. © 2016 The Authors. The Plant Journal published by John Wiley & Sons Ltd and Society for Experimental Biology.

  15. The use of urban plant resources for health and food security in Kampala, Uganda

    DEFF Research Database (Denmark)

    Mollee, Eefke Maria

    an understanding of the current and potential contribution of urban plant resources to human wellbeing (with a focus on food security) in Kampala, Uganda. To fulfil this aim, I created 4 objectives: 1) to assess plant species composition and use in Kampala’s homegardens, 2) to explore associations between...... homegardens and socio-economic determinants of dietary diversity and fruit consumption of children aged 2-5 years, 3) to explore the prevalence and determinants of wild plant collectors in Kampala, Uganda, and 4) to assess the extent and importance of alternative food sources of different food groups for low...... species) were collected for food purposes, while the other 25 species were collected for medicinal purposes and were also collected more frequently. The findings indicate that urban homegardens and wild space can play an important role in human wellbeing. It is important to incorporate biodiversity...

  16. The RISE Framework: Using Learning Analytics to Automatically Identify Open Educational Resources for Continuous Improvement

    Science.gov (United States)

    Bodily, Robert; Nyland, Rob; Wiley, David

    2017-01-01

    The RISE (Resource Inspection, Selection, and Enhancement) Framework is a framework supporting the continuous improvement of open educational resources (OER). The framework is an automated process that identifies learning resources that should be evaluated and either eliminated or improved. This is particularly useful in OER contexts where the…

  17. Formulating Human Resources Development Strategies for Nuclear R and D, Safety and Security

    International Nuclear Information System (INIS)

    Min, B. J.; Kim, M. K.; Son, M. Y.

    2010-05-01

    Enforced by the recent launch of the 4th National Power Expansion Plan and the 1st Basic Plan for National Energy Policy with an ambitious goal of achieving 'Low CO2 Emission and Green Growth', a rapid expansion of nuclear technology development has been reemphasized. In addition, the nation, being a potential exporter of nuclear power plants and nuclear technologies strives to explore their exports markets. In response, it is inevitable to set the priority in human resource development (HRD) as nuclear technology development both requires and fosters HRD which in turn, enables to meet the successful implementation of nuclear power expansion. A continuous, consistent and well-managed programme of HRD is crucial to assure continuity over time in the needed capacities, skills and knowledge, and to establish and maintain a cadre of manpower variously trained in different nuclear-related skills and educated in nuclear relevant fields. The objective of the study is to conduct comprehensive quantitative analyses to estimate future human resources requirements, particularly in the field of nuclear R and D, safety and security in order to establish an appropriate long-term nuclear HRD plan

  18. Water resources for urban water and food security: the case of megacity Hong Kong

    Science.gov (United States)

    Vanham, Davy; Gawlik, Bernd; Bidoglio, Giovanni

    2017-04-01

    The extent to which urban dwellers consume resources is key on the path to reaching global SDGs. One of these resources is water, which is consumed in a direct and indirect way by city inhabitants, to achieve water and food security within city borders. In this study, we quantify the water resources required to provide these two essential securities for megacity Hong Kong. During the last years, this city has made large investments to make its urban water supply system more water efficient and sustainable. As such, its municipal water abstraction - often defined as direct water use - has decreased from 355 litres per capita per day (l/cap/d) in 2005 to 326 l/cap/d in 2013. Due to its political history, Hong Kong is unique in the world in data availability on urban food consumption. It is therefore the ideal case study to show typical urban food consumption behaviour and its related indirect water use. The current average diet in Hong Kong is very different to the average Chinese diet. It is characterised by a high intake of water intensive products like animal products and sugar, leading to a food related indirect water use or water footprint (WFcons) of 4727 l/cap/d. According to recommendations from the Chinese Nutrition Society for a healthy diet, the intake of some product groups should be increased (vegetables and fruit) and of other product groups reduced (sugar, crop oils, meat and animal fats). This would result in a reduction of the WFcons of 40% to 2852 l/cap/d. Especially the reduced intake of meat (including offals) from currently 126 kg per capita per year (kg/cap/yr) to the recommended value 27 kg/cap/yr would result in a substantial WFcons reduction. Meat consumption in Hong Kong is extremely high. A pesco-vegetarian diet would result in a reduction of 49% (to 2398 l/cap/d) and a vegetarian diet in a 53% (to 2224 l/cap/d) reduction. Hong Kong citizens can thus save a lot of water by looking at their indirect water use, through a change in their diet

  19. The Security Education Concepts in the Textbooks of the National and Civic Education of the Primary Stage in Jordan--An Analytical Study

    Science.gov (United States)

    Al-Edwan, Zaid Suleiman

    2016-01-01

    The present study aimed at exploring the concepts of the security education in the textbooks of the national and civic education of the higher primary stage in Jordan. It adopted the descriptive analytical method. The study sample consisted of the textbooks of the national and civic education for the basic eighth, ninth and tenth grades. To…

  20. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    Science.gov (United States)

    Bui, Francis Minhthang; Hatzinakos, Dimitrios

    2007-12-01

    As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1) a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2) a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG) signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  1. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    Directory of Open Access Journals (Sweden)

    Dimitrios Hatzinakos

    2008-03-01

    Full Text Available As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN, which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1 a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2 a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  2. Linking job demands and resources to employee engagement and burnout: a theoretical extension and meta-analytic test.

    Science.gov (United States)

    Crawford, Eean R; Lepine, Jeffery A; Rich, Bruce Louis

    2010-09-01

    We refine and extend the job demands-resources model with theory regarding appraisal of stressors to account for inconsistencies in relationships between demands and engagement, and we test the revised theory using meta-analytic structural modeling. Results indicate support for the refined and updated theory. First, demands and burnout were positively associated, whereas resources and burnout were negatively associated. Second, whereas relationships among resources and engagement were consistently positive, relationships among demands and engagement were highly dependent on the nature of the demand. Demands that employees tend to appraise as hindrances were negatively associated with engagement, and demands that employees tend to appraise as challenges were positively associated with engagement. Implications for future research are discussed. Copyright 2010 APA, all rights reserved

  3. Clean and Secure Energy from Domestic Oil Shale and Oil Sands Resources

    Energy Technology Data Exchange (ETDEWEB)

    Spinti, Jennifer [Inst. for Clean and Secure Energy, Salt Lake City, UT (United States); Birgenheier, Lauren [Inst. for Clean and Secure Energy, Salt Lake City, UT (United States); Deo, Milind [Inst. for Clean and Secure Energy, Salt Lake City, UT (United States); Facelli, Julio [Inst. for Clean and Secure Energy, Salt Lake City, UT (United States); Hradisky, Michal [Inst. for Clean and Secure Energy, Salt Lake City, UT (United States); Kelly, Kerry [Inst. for Clean and Secure Energy, Salt Lake City, UT (United States); Miller, Jan [Inst. for Clean and Secure Energy, Salt Lake City, UT (United States); McLennan, John [Inst. for Clean and Secure Energy, Salt Lake City, UT (United States); Ring, Terry [Inst. for Clean and Secure Energy, Salt Lake City, UT (United States); Ruple, John [Inst. for Clean and Secure Energy, Salt Lake City, UT (United States); Uchitel, Kirsten [Inst. for Clean and Secure Energy, Salt Lake City, UT (United States)

    2015-09-30

    This report summarizes the significant findings from the Clean and Secure Energy from Domestic Oil Shale and Oil Sands Resources program sponsored by the Department of Energy through the National Energy Technology Laboratory. There were four principle areas of research; Environmental, legal, and policy issues related to development of oil shale and oil sands resources; Economic and environmental assessment of domestic unconventional fuels industry; Basin-scale assessment of conventional and unconventional fuel development impacts; and Liquid fuel production by in situ thermal processing of oil shale Multiple research projects were conducted in each area and the results have been communicated via sponsored conferences, conference presentations, invited talks, interviews with the media, numerous topical reports, journal publications, and a book that summarizes much of the oil shale research relating to Utah’s Uinta Basin. In addition, a repository of materials related to oil shale and oil sands has been created within the University of Utah’s Institutional Repository, including the materials generated during this research program. Below is a listing of all topical and progress reports generated by this project and submitted to the Office of Science and Technical Information (OSTI). A listing of all peer-reviewed publications generated as a result of this project is included at the end of this report; Geomechanical and Fluid Transport Properties 1 (December, 2015); Validation Results for Core-Scale Oil Shale Pyrolysis (February, 2015); and Rates and Mechanisms of Oil Shale Pyrolysis: A Chemical Structure Approach (November, 2014); Policy Issues Associated With Using Simulation to Assess Environmental Impacts (November, 2014); Policy Analysis of the Canadian Oil Sands Experience (September, 2013); V-UQ of Generation 1 Simulator with AMSO Experimental Data (August, 2013); Lands with Wilderness Characteristics, Resource Management Plan Constraints, and Land Exchanges

  4. Analytical Frameworks for Addressing Physical, Social, and Institutional Changes in Water Resources Planning and Management

    Science.gov (United States)

    2015-06-01

    stability Presence of geologic hazards, e.g. landslides , site stability, distance to faults, and reservoir-induced seismicity BP9 Reservoir surface... Earth and Life Studies, National Research Council; National Academies Press. NRC–Panel on Adaptive Management for Resource Stewardship. 2004...Peer Review for Water Resources Project Planning, Water Science and Technology Board, Ocean Studies Board, Division on Earth and Life Studies

  5. Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.

    Science.gov (United States)

    Scarani, Valerio; Renner, Renato

    2008-05-23

    We derive a bound for the security of quantum key distribution with finite resources under one-way postprocessing, based on a definition of security that is composable and has an operational meaning. While our proof relies on the assumption of collective attacks, unconditional security follows immediately for standard protocols such as Bennett-Brassard 1984 and six-states protocol. For single-qubit implementations of such protocols, we find that the secret key rate becomes positive when at least N approximately 10(5) signals are exchanged and processed. For any other discrete-variable protocol, unconditional security can be obtained using the exponential de Finetti theorem, but the additional overhead leads to very pessimistic estimates.

  6. Cyber security in nuclear industry – Analytic study from the terror incident in nuclear power plants (NPPs)

    International Nuclear Information System (INIS)

    Cho, Hyo Sung; Woo, Tae Ho

    2017-01-01

    Highlights: • The cyber terrorism in NPPs of South Korea shows the study motivations. • Analyses of the cyber terrorism in NPPs are investigated. • Designed solutions for the cyber terrorism in NPPs are discussed. • South Korean case is considered as the cyber terrorism in NPPs. - Abstract: The cyber terrorism for nuclear power plants (NPPs) is investigated for the analytic study following the South Korean case on December 2014. There are several possible cyber terror attacks in which the twelve cases are studied for the nuclear terror cases including the computer hacking and data stealing. The defense-in-depth concept is compared for cyber terrorism, which was imported from the physical terror analysis. The conventional three conditions of the physical protection system (PPS) are modified as prevention, detection, and response. The six cases are introduced for the solutions of the facility against the possible cyber terrorism in NPPs. The computer hacking methods and related solutions are analyzed for the applications in the nuclear industry. The nuclear security in the NPPs could be an extremely serious condition and the remedies are very important in the safe plant operations. In addition, the quantitative modeling study is performed.

  7. Employment Security of Nurses: Baseline for a Strategic Human Resource Direction

    Directory of Open Access Journals (Sweden)

    Dr. Renante A. Egcas

    2017-11-01

    Full Text Available This study is anchored on Herzberg’s Two-Factor Theory which suggests that satisfaction of employees is related to motivation (e.g. achievement, recognition, advancement, growth, and responsibility and dissatisfaction is related to hygiene factors (e.g. company policy and administration, supervision, interpersonal relationships, working conditions, pay, status, and job security. This study aimed to determine the level and predictors of employment security of nurses in both private and government hospitals in Negros Occidental, Philippines. The level of employment security was categorized into economic security, professional security, personal security, and workplace security. Specifically, this study examined the nurserespondents’ profile in terms of types of hospital employed to, sex, civil status, number of dependents, educational attainment, rank, employment status, salary grade, net income, and length of service. This study also determined the significant differences on the level of employment security of nurses when assessed at different categories and when the respondents are grouped according to their profile. This is a descriptive study which surveyed and interviewed nurses (n=318 from 18 government hospitals, 3 infirmaries and 4 private hospitals which signified intention to participate in the study. The study used the stratified random sampling to insure representativeness of the nurse-respondents.Results revealed that the nurse-respondents expressed moderate security in economic aspect, low security in professional aspect, high security in personal aspect and moderate security in workplace aspect. Highly significant differences were noted between professional security and workplace security. Results also revealed that types of hospital, civil status, rank, employment status are predictors of employment security of the nurse-respondents. Hence, the results implied that fast turnover and migration of Philippine nurses are not mainly

  8. Energy security: it's not only oil. Increasing and replacing oil resources

    International Nuclear Information System (INIS)

    Mandil, C.; Appert, O.

    2006-01-01

    The security of energy supplies is once again right at the top of the list of energy policy subjects, following the political tensions in the Middle East, as well as major electricity failures of recent years, the hurricanes of August and September 2005 and the gas dispute between Russia and Ukraine. Even if the system of strategic oil stocks managed by the International Energy Agency has proved to be efficient, today keywords for guarding against the risks are diversification (of energy, of its sources, its suppliers and of its supply lines) and flexibility. Dialogue with the producers is essential. It will be difficult to find substitutes for hydrocarbons (oil and natural gas) in the short and medium terms to meet the needs of transport and for the petrochemical industry; they are likely to represent, in the order of two-thirds of the total demand for the world energy by the year 2030. In order to replace oil resources, taking account of all the risks of climate change, technological innovation will play a major role and should allow us to benefit from today potentially unreliable hydrocarbon supplies for many more years, allowing our society sufficient time to develop other sources of energy, and to do so at a cost that is acceptable to everybody. (authors)

  9. Analysis of Water Resources Supply and Demand and Security of Water Resources Development in Irrigation Regions of the Middle Reaches of the Heihe River Basin, Northwest China

    Institute of Scientific and Technical Information of China (English)

    JI Xi-bin; KANG Er-si; CHEN Ren-sheng; ZHAO Wen-zhi; XIAO Sheng-chun; JIN Bo-wen

    2006-01-01

    Based on the data for meteorology, hydrology, soil, planting, vegetation, and socio-economic development of the irrigation region in the middle reaches of the Heihe River basin, Northwest China, the model of balance of water supply and demand in the region was established, and the security of water resource was assessed, from which the results that the effects of unified management of water resources in the Heihe River basin between Gansu Province and Inner Mongolia on regional hydrology are significant with a decrease in water supply diverted from Heihe River and an increase in groundwater extracted. In addition, it was found that the groundwater level has been steadily decreasing due to over pumping and decrease in recharges. In present year (2003), the volume of potential groundwater in the irrigation districts is far small because of the groundwater overdraft; even in the particular regions, there is no availability of groundwater resources for use. By 2003, water supply is not sufficient to meet the water demand in the different irrigation districts, the sustainable development and utilization of water resources are not secured, and the water supply crisis occurs in Pingchuan irrigation district. Achieving water security for the sustainable development of society, agriculture, economy, industry, and livelihoods while maintaining or improving the abilities of the management and planning of water resources, determining of the reasonable percentage between water supply and groundwater utilization and water saving in agricultural irrigation are taken into account. If this does not occur, it is feared that the present performance of water development and planning may further aggravate the problem of scarcities of water resources and further damage the fragile ecological system.

  10. Analytical Study of Usage of Electronic Information Resources at Pharmacopoeial Libraries in India

    Directory of Open Access Journals (Sweden)

    Sunil Tyagi

    2014-02-01

    Full Text Available The objective of this study is to know the rate and purpose of the use of e-resource by the scientists at pharmacopoeial libraries in India. Among other things, this study examined the preferences of the scientists toward printed books and journals, electronic information resources, and pattern of using e-resources. Non-probability sampling specially accidental and purposive technique was applied in the collection of primary data through administration of user questionnaire. The sample respondents chosen for the study consists of principle scientific officer, senior scientific officer, scientific officer, and scientific assistant of different division of the laboratories, namely, research and development, pharmaceutical chemistry, pharmacovigilance, pharmacology, pharmacogonosy, and microbiology. The findings of the study reveal the personal experiences and perceptions they have had on practice and research activity using e-resource. The major findings indicate that of the total anticipated participants, 78% indicated that they perceived the ability to use computer for electronic information resources. The data analysis shows that all the scientists belonging to the pharmacopoeial libraries used electronic information resources to address issues relating to drug indexes and compendia, monographs, drugs obtained through online databases, e-journals, and the Internet sources—especially polices by regulatory agencies, contacts, drug promotional literature, and standards.

  11. Getting the Most from Distributed Resources With an Analytics Platform for ATLAS Computing Services

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00225336; The ATLAS collaboration; Gardner, Robert; Bryant, Lincoln

    2016-01-01

    To meet a sharply increasing demand for computing resources for LHC Run 2, ATLAS distributed computing systems reach far and wide to gather CPU resources and storage capacity to execute an evolving ecosystem of production and analysis workflow tools. Indeed more than a hundred computing sites from the Worldwide LHC Computing Grid, plus many “opportunistic” facilities at HPC centers, universities, national laboratories, and public clouds, combine to meet these requirements. These resources have characteristics (such as local queuing availability, proximity to data sources and target destinations, network latency and bandwidth capacity, etc.) affecting the overall processing efficiency and throughput. To quantitatively understand and in some instances predict behavior, we have developed a platform to aggregate, index (for user queries), and analyze the more important information streams affecting performance. These data streams come from the ATLAS production system (PanDA), the distributed data management s...

  12. Secure Bootstrapping and Rebootstrapping for Resource-Constrained Thing in Internet of Things

    OpenAIRE

    Jung, Seung Wook; Jung, Souhwan

    2015-01-01

    In Internet of Things, secure key establishment and building trust relationship between the thing and the home gateway (or the controller) in home network or Body Area Network are extremely important. Without the guarantee of establishment of key and trust relationship, the traffic over the Internet of Things network cannot be presumed secure. Also, when the home gateway, which knows the shared secret key, is out of order and the new gateway should be installed, the secure key establishment a...

  13. USING THE ANALYTICAL HIERARCHY PROCESS TO SUPPORT SUSTAINABLE USE OF GEO-RESOURCES IN METROPOLITAN AREAS

    Institute of Scientific and Technical Information of China (English)

    Oswald MARINONI; Andreas HOPPE

    2006-01-01

    Sand and gravel are important raw materials which are needed for many civil engineering projects.Due to economic reasons, sand and gravelpits are frequently located in the periphery of metropolitan areas which are often subject to competing land-use interests. As a contribution to land-use conflict solving, the Analytic Hierarchy Process (AHP) is applied within a Geographic Information System (GIS) environment. Two AHP preference matrix scenario constellations are evaluated and their results are used to create a land-use conflict map.

  14. Strategy of penetration of renewable power resources in the Granma province, through Analytical Hierarchy Process

    International Nuclear Information System (INIS)

    Benítez Leyva, Lázaro Ventura; Rosa Andino, Alain Ariel de la; Jácome Cadena, Jaime Fernando; Paredes Palomeque, Cristian Rene

    2014-01-01

    In selecting new energy sources for a country, region or rural communities, the criteria to be considered conflict and it is difficult to determine the best energetic options as to preference and priority. Therefore, the present work had as objective to define a strategy of penetration of renewable energy sources from consultation of experts and the later application of the mathematical procedure ''Analytic Hierarchy Process''. The obtained results suggest that the energy strategies of better performance for the Granma province are the following: eolian energy for water pumping, solar photovoltaic for water pumping, solar thermal energy for the sector which demands hot water, and solar photovoltaic for the electrical sector, in that order of priority. (author)

  15. Simulation of population response to ionizing radiation in an ecosystem with a limiting resource – Model and analytical solutions

    International Nuclear Information System (INIS)

    Sazykina, Tatiana G.; Kryshev, Alexander I.

    2016-01-01

    A dynamic mathematical model is formulated, predicting the development of radiation effects in a generic animal population, inhabiting an elemental ecosystem ‘population-limiting resource’. Differential equations of the model describe the dynamic responses to radiation damage of the following population characteristics: gross biomass; intrinsic fractions of healthy and reversibly damaged tissues in biomass; intrinsic concentrations of the self-repairing pool and the growth factor; and amount of the limiting resource available in the environment. Analytical formulae are found for the steady states of model variables as non-linear functions of the dose rate of chronic radiation exposure. Analytical solutions make it possible to predict the expected severity of radiation effects in a model ecosystem, including such endpoints as morbidity, mortality, life shortening, biosynthesis, and population biomass. Model parameters are selected from species data on lifespan, physiological growth and mortality rates, and individual radiosensitivity. Thresholds for population extinction can be analytically calculated for different animal species, examples are provided for generic mice and wolf populations. The ecosystem model demonstrates a compensatory effect of the environment on the development of radiation effects in wildlife. The model can be employed to construct a preliminary scale ‘radiation exposure-population effects’ for different animal species; species can be identified, which are vulnerable at a population level to chronic radiation exposure. - Highlights: • Mathematical model is formulated predicting radiation effects in elemental ecosystem. • Analytical formulae are found for steady states of variables as functions of exposure. • Severity of radiation effects are calculated, including population extinction. • Model parameterization is made for generic mice and wolf populations.

  16. Comprehensive assessment of regional selenium resources in soils based on the analytic hierarchy process: Assessment system construction and case demonstration.

    Science.gov (United States)

    Liang, Ruoyu; Song, Shuai; Shi, Yajing; Shi, Yajuan; Lu, Yonglong; Zheng, Xiaoqi; Xu, Xiangbo; Wang, Yurong; Han, Xuesong

    2017-12-15

    The redundancy or deficiency of selenium in soils can cause adverse effects on crops and even threaten human health. It was necessary to assess selenium resources with a rigorous scientific appraisal. Previous studies of selenium resource assessment were usually carried out using a single index evaluation. A multi-index evaluation method (analytic hierarchy process) was used in this study to establish a comprehensive assessment system based on consideration of selenium content, soil nutrients and soil environmental quality. The criteria for the comprehensive assessment system were classified by summing critical values in the standards with weights and a Geographical Information System was used to reflect the regional distribution of the assessment results. Boshan, a representative region for developing selenium-rich agriculture, was taken as a case area and classified into Zone I-V, which suggested priority areas for developing selenium-rich agriculture. Most parts of the North and Midlands of Boshan were relatively suitable for development of selenium-rich agriculture. Soils in south fractions were contaminated by Cd, PAHs, HCHs and DDTs, in which it was forbidden to farm. This study was expected to provide the basis for developing selenium-rich agriculture and an example for comprehensive evaluation of relevant resources in a region. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Science.gov (United States)

    2010-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive Information...

  18. Equilibrium between resources and expenditure of health sector of Social Security Fund: a case study of Iran

    Directory of Open Access Journals (Sweden)

    Azadeh Ahmadi Dashtian

    2017-10-01

    Full Text Available In Iran, Social Security is the most important institution of social insurance fund, currently insuring more than a half of country population, and it has a significant role in fulfilling short-term and long-term commitments. Therefore investigation of the balance of resources and expenditure of health sector of the fund can be a scientific process of the funding the future and can pave the way to provide necessary revisions in this sector. Analyzing equilibrium between resources and expenditure of health sector of Social Security Fund in the past years, the present study offers recommendations for improving it in terms of parametric and structural dimensions. The methodology includes documentary library methods and statistical part is descriptive using Excel. Findings indicated that, regarding the present lack of balance of resources and expenditure of health sector, keeping on with the present conditions can lead to many crises. As a result, to escape from the present conditions of the funds where lack of balance of resources and expenditure exists, carrying out parametric and management-structural revisions seems necessary.

  19. Resource competition and an analytical model of zooplankton feeding on phytoplankton

    Energy Technology Data Exchange (ETDEWEB)

    Smith, O L; Shugart, H H; O' Neill, R V; Booth, R S; McNaught, D C

    1975-01-01

    A new consumer-resource The model was developed with specific reference to zooplankton feeding on phytoplankton. In principle, the model can be extended to any terrestrial or aquatic community in which the consumers graze nearly randomly. It is assumed that the food as relatively little escape capabity. An attempt was made to derive the consumer-resource interaction term from first principles.A general form with clearly defined parameters that represent fundamental system processes such as consumer filtering rate. model parameters describes two known forms of feeding:(1): saturation feeding in which the rate remains constant above a given food density while the filtering rate decreases, and(2) inhibited feeding in which a decline appears at high food density. From an examination of the model's equilibrium equations for strongly similar zooplankton species feeding on similar phytoplankton species, the following conclusions were drawn. The competitive exclusion principle has only limited validity. For a community in which the consumers exhibit no intraspecific competition and have identical assimilation efficiency to death-rate ratios, e/d, any number of consumer species may, in fact, coexist and compete for the same food. The equations for a complex community composed of many consumer and food species can be reduced to a single equation with form identical to that of a single-consumer, single-food system. The standard competition coefficient, ..cap alpha.., of the Volterra equation is a poor measure of competition in nonlinear systems. It exhibits incongruous variations with changes in system parameters. In a community with no intraspecific competition, allcompetition coefficients are unity. In a community with intraspecific competition, the competition coefficients C/sub in/ tend to equalize as the number of food species increases, resulting in equal competitive strength of all consumer species in systems of the type studied.

  20. Measuring the Effectiveness of Visual Analytics and Data Fusion Techniques on Situation Awareness in Cyber-Security

    Science.gov (United States)

    Giacobe, Nicklaus A.

    2013-01-01

    Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…

  1. Securing renewable resource supplies for changing market demands in a bio-based economy

    NARCIS (Netherlands)

    Dam, van J.E.G.; Klerk-Engels, de B.; Struik, P.C.; Rabbinge, R.

    2005-01-01

    Establishment of a bio-based economy has been recognised as one of the key issues for sustainable development For future developments renewable resources will play a key role as CO2 neutral raw material for sustainable industrial production to curb depletion of fossil resources. Options to fully

  2. A new and integrated hydro-economic accounting and analytical framework for water resources: a case study for North China.

    Science.gov (United States)

    Guan, Dabo; Hubacek, Klaus

    2008-09-01

    Water is a critical issue in China for a variety of reasons. China is poor of water resources with 2,300 m(3) of per capita availability, which is less than 13 of the world average. This is exacerbated by regional differences; e.g. North China's water availability is only about 271 m(3) of per capita value, which is only 125 of the world's average. Furthermore, pollution contributes to water scarcity and is a major source for diseases, particularly for the poor. The Ministry of Hydrology [1997. China's Regional Water Bullets. Water Resource and Hydro-power Publishing House, Beijing, China] reports that about 65-80% of rivers in North China no longer support any economic activities. Previous studies have emphasized the amount of water withdrawn but rarely take water quality into consideration. The quality of the return flows usually changes; the water quality being lower than the water flows that entered the production process initially. It is especially important to measure the impacts of wastewater to the hydro-ecosystem. Thus, water consumption should not only account for the amount of water inputs but also the amount of water contaminated in the hydro-ecosystem by the discharged wastewater. In this paper we present a new accounting and analytical approach based on economic input-output modelling combined with a mass balanced hydrological model that links interactions in the economic system with interactions in the hydrological system. We thus follow the tradition of integrated economic-ecologic input-output modelling. Our hydro-economic accounting framework and analysis tool allows tracking water consumption on the input side, water pollution leaving the economic system and water flows passing through the hydrological system thus enabling us to deal with water resources of different qualities. Following this method, the results illustrate that North China requires 96% of its annual available water, including both water inputs for the economy and contaminated

  3. Developing an analytical model to increase urban security from the Secured perspective by Designing (SBD) Approach using fuzzy AHP method (case study: region 17 of Tehran)

    OpenAIRE

    H. Zabihi; T. Larimian; H. Poorani

    2013-01-01

    Extended abstract1-IntroductionSafety and security have been significant issues throughout history, from early prehistoric cave-dwelling societies to medieval and modern cities (P. Cozens, 2008). Crime is a part of our way of living. It is tied to the physical distribution of people and objects, to the routine activity patterns of daily life, and to the ways in which people perceive and use information about the environment (Brantingham & Brantingham, 1993). Statistics show that there is a me...

  4. 48 CFR 1352.239-72 - Security requirements for information technology resources.

    Science.gov (United States)

    2010-10-01

    ... information, the loss, misuse, or unauthorized access to, or modification of which could adversely affect the... inspection, investigation, and audit to safeguard against threats and hazards to the integrity, availability... Official's written accreditation decision from the COR, maintain the approved level of system security as...

  5. 48 CFR 352.239-72 - Security requirements for Federal information technology resources.

    Science.gov (United States)

    2010-10-01

    ..., Security Self-Assessment Guide for Information Technology Systems and FIPS 200, on an annual basis. (C) HHS... basis, the Contractor shall provide to the Contracting Officer verification that the IT-SP remains valid... Contracting Officer verification that the IT-SC&A remains valid. Evidence of a valid system accreditation...

  6. Forecasting Resource as a Method of Increasing the Security of Technical Devices

    Science.gov (United States)

    Cherepanov, Anatoly P.; Lyapustin, Pavel K.

    2017-10-01

    The article shows a method of increasing the safe operation of technical devices at various stages of the life cycle according to the proposed classification parameters of the resource by applying the model of resource prediction. The model takes into account the presence of defects, the rate of corrosion and corrosion resistance of the material, the volume of technical diagnosis, the degree of risk in case of failure or damage of technical devices. The article shows the application of the model resource of the technical device from the manufacture to the end of its service life.

  7. Exploring Resource Security Policy and Green Science and Technology in Asia

    Science.gov (United States)

    2014-04-01

    consumption patterns, diets and resource use of its population that will only increase 1...Indonesia, Vietnam, Thailand and Malaysia - have started to put, if not ramped up existing, green policies in place. 9 In India, the government’s

  8. A Study on Tourism Resource Development and Institutional Guarantees for Ecological Security in the Ethnic Areas of Sichuan

    Institute of Scientific and Technical Information of China (English)

    ZHONG Jie; QIN Jianxiong; CAI Xinliang

    2014-01-01

    Following several years of study , we have found that the economically less-developed region of the ethnic minority areas of western Chi-na, namely Sichuan, Yunnan, and Guizhou, is not only an area where rich eco-cultural tourism re-sources are concentrated , but is also an area where the ecological environment is very fragile .Develo-ping local tourism resources has been regarded as an important path of poverty alleviation for the local people.However, excessive exploitation of these resources will directly threaten the local ecological security.Seen from the perspective of the relation-ship between man and nature , in recent years , the development of tourism has had an increasingly more serious impact on the environment in these western ethnic areas-for instance , the numbers of tourists in Jiuzhaigou scenic spot of Sichuan have exceeded its carrying capacity , and has caused soil erosion and water pollution; Lijiang Old Town in Yunnan is facing the problem of over-crowding;and the water in Erhai lake in Dali has been pollu-ted by cruise boats .Seen from the perspective of the relationship between man and society , we find that the protection of culture and environment in western ethnic areas is being threatened by the predatory nature of the development of tourism re-sources-for example , in the ethnic tourism villa-ges of Guizhou , there is a serious problem with the traditional ethnic culture there being vulgarized , faked, and urbanized . This has affected social harmony and stability in the area .Because Sichuan province is located in the upper Yangtze River , the ecological security in its ethnic minority areas is re-lated to the security of the Yangtze valley and even to the whole country .Hence, this article aims to explore the ecological security issues related to the natural ecological environment and the eco-cultural environment during the process of exploiting tourism resources in ethnic minority areas of Sichuan , and to do so from the perspective

  9. Under Pressure: Job Security, Resource Allocation, and Productivity in Schools under No Child Left Behind

    OpenAIRE

    Randall Reback; Jonah Rockoff; Heather L. Schwartz

    2014-01-01

    We conduct the first nationwide study of incentives under the No Child Left Behind (NCLB) Act, which requires states to punish schools failing to meet target passing rates on students' standardized exams. States' idiosyncratic policies created variation in the risk of failure among very similar schools in different states, which we use to identify effects of accountability pressure. We find NCLB lowers teachers' perceptions of job security, shifts time towards specialist teachers in high-stak...

  10. Impacts of community-based natural resource management on wealth, food security and child health in Tanzania

    DEFF Research Database (Denmark)

    Pailler, Sharon; Naidoo, Robin; Burgess, Neil David

    2015-01-01

    Community-based natural resource management (CBNRM) is a major global strategy for enhancing conservation outcomes while also seeking to improve rural livelihoods; however, little evidence of socioeconomic outcomes exists. We present a national-level analysis that empirically estimates socioecono......Community-based natural resource management (CBNRM) is a major global strategy for enhancing conservation outcomes while also seeking to improve rural livelihoods; however, little evidence of socioeconomic outcomes exists. We present a national-level analysis that empirically estimates...... socioeconomic impacts of CBNRM across Tanzania, while systematically controlling for potential sources of bias. Specifically, we apply a difference-indifferences model to national-scale, cross-sectional data to estimate the impact of three different CBNRM governance regimes on wealth, food security and child...... health, considering differential impacts of CBNRM on wealthy and poor populations. We also explore whether or not longer-standing CBNRM efforts provide more benefits than recently-established CBNRM areas. Our results show significant improvements in household food security in CBNRM areas compared...

  11. Neutron activation and other analytical data for plutonic rocks from North America and Africa. National Uranium Resource Evaluation

    International Nuclear Information System (INIS)

    Price, V.; Fay, W.M.; Cook, J.R.

    1982-09-01

    The objective of this report is to retrieve the elements of an analytical study of granites and associated other plutonic rocks which was begun as a part of the U.S. Department of Energy's National Uranium Resource Evaluation (NURE) program. A discussion of the Savannah River Laboratory (SRL) neutron activation analysis system is given so that a user will understand the linmitations of the data. Enough information is given so that an experienced geochemist can clean up the data set to the extent required by any project. The data are generally good as they are presented. It is intended that the data be read from a magnetic tape written to accompany this report. Microfiche tables of the data follow the text. These tables were prepared from data on the tape, and programs which will read the tape are presented in the section THE DATA TAPE. It is our intent to write a later paper which will include a thoroughly scrubbed data set and a technical discussion of results of the study. 1 figure

  12. Integrated water resources management and infrastructure planning for water security in Southern Africa

    Science.gov (United States)

    Mapani, Benjamin; Magole, Lapologang; Makurira, Hodson; Meck, Maideyi; Mkandawire, Theresa; Mul, Marloes; Ngongondo, Cosmo

    2017-08-01

    This volume has brought together papers that are peer reviewed emanating from the WaterNet/WARFSA/GWP-SA 16th Symposium. The papers cover the following themes: Hydrology, Water and Environment, Water and Land, Water and Society, Water Supply and Sanitation and Water Resources Management.

  13. 75 FR 1271 - Technical Revisions to the Supplemental Security Income (SSI) Regulations on Income and Resources

    Science.gov (United States)

    2010-01-11

    ... extend the home exclusion to beneficiaries who, because of domestic abuse, leave a home that had... Domestic Abuse An SSI applicant's or beneficiary's home and associated land are excluded from resources by... abuse leaves the home and resides elsewhere. Currently, a victim fleeing from domestic abuse may return...

  14. Integrated Resources Management Approach to Ensuring Sustainable Food Security in Nigeria-The Nexus of Rice Production in Niger State

    Science.gov (United States)

    Omotoso, T.

    2015-12-01

    By 2050, the world will need to feed 9 billion people. This will require a 60% increase in agricultural production and subsequently a 6% increase in water use by the agricultural sector alone. By 2030, global water demand is expected to increase by 40%, mostly in developing countries like Nigeria (Addams, Boccaletti, Kerlin, & Stuchtey, 2009) and global energy demand is expected to increase by 33% in 2035, also, mostly in emerging economies (IEA, 2013). These resources have to be managed efficiently in preparation for these future demands. Population growth leads to increased demand for water, energy and food. More food production will lead to more water-for-food and energy-for-food usage; and more demand for energy will lead to more water-for-energy needs. This nexus between water, energy and food is poorly understood and furthermore, complicated by external drivers such as climate change. Niger State Nigeria, which is blessed with abundant water and arable land resources, houses the three hydropower dams in Nigeria and one of the governments' proposed Staple Crops Processing Zones (SCPZ) for rice production. Both of these capital intensive investments depend heavily on water resources and are all highly vulnerable to changes in climate. Thus, it is essential to know how the local climate in this state will likely change and its impacts on water, energy and food security, so that policy makers can make informed mitigation/adaptation plans; operational and investment decisions. The objective of this project is to provide information, using an integrated resources management approach, on the effects of future climate changes on water, energy (hydropower) and food resources in Niger State, Nigeria and improve knowledge on the interlinkages between water, energy and food at a local scale.

  15. An Approach to Secure Resource Sharing Algorithm (SRSA) for Multi Cloud Environment

    OpenAIRE

    Er. Parul Indoria; Prof. Abhishek Didel

    2013-01-01

    Cloud computing is an idea intended to deliver computing and storage resources to a community of users. In a cloud computing environment a user can use applications without installing, and accessing personal files of any other user in the network. The cloud computing technology allows efficient computation by centralizing storage, memory and processing. The practice of computing in two or more data centers separated by the Internet in popularity due to an explosion in scalable ...

  16. Climate Change and Poor Water Resource Management Will Have Serious Security Implications in the Balkan Peninsula

    Science.gov (United States)

    2015-06-12

    climate change on water resources. Many of these areas (e.g., Mediterranean Basin, western United States, southern Africa, northeast Brazil , southern...urbanizing, more affluent populations, and substantial economic growth in India, China, Brazil , and other nations, will devastate homes, land, and...portion (90%) came from Europe and 70% from EU countries. In 2003, the accommodation capacity was approximately 650,000 beds in more than 8,500 hotels

  17. Human resources requirements for diabetic patients healthcare in primary care clinics of the Mexican Institute of Social Security

    Directory of Open Access Journals (Sweden)

    Svetlana V Doubova

    2013-11-01

    Full Text Available Objective. To estimate the requirements of human resources (HR of two models of care for diabetes patients: conventional and specific, also called DiabetIMSS, which are provided in primary care clinics of the Mexican Institute of Social Security (IMSS. Materials and methods. An evaluative research was conducted. An expert group identified the HR activities and time required to provide healthcare consistent with the best clinical practices for diabetic patients. HR were estimated by using the evidence-based adjusted service target approach for health workforce planning; then, comparisons between existing and estimated HRs were made. Results. To provide healthcare in accordance with the patients’ metabolic control, the conventional model required increasing the number of family doctors (1.2 times nutritionists (4.2 times and social workers (4.1 times. The DiabetIMSS model requires greater increase than the conventional model. Conclusions. Increasing HR is required to provide evidence-based healthcare to diabetes patients.

  18. Enhancing Critical Infrastructure and Key Resources (CIKR) Level-0 Physical Process Security Using Field Device Distinct Native Attribute Features

    Energy Technology Data Exchange (ETDEWEB)

    Lopez, Juan [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Liefer, Nathan C. [Wright-Patterson AFB, Dayton, OH (United States); Busho, Colin R. [Wright-Patterson AFB, Dayton, OH (United States); Temple, Michael A. [Wright-Patterson AFB, Dayton, OH (United States)

    2017-12-04

    Here, the need for improved Critical Infrastructure and Key Resource (CIKR) security is unquestioned and there has been minimal emphasis on Level-0 (PHY Process) improvements. Wired Signal Distinct Native Attribute (WS-DNA) Fingerprinting is investigated here as a non-intrusive PHY-based security augmentation to support an envisioned layered security strategy. Results are based on experimental response collections from Highway Addressable Remote Transducer (HART) Differential Pressure Transmitter (DPT) devices from three manufacturers (Yokogawa, Honeywell, Endress+Hauer) installed in an automated process control system. Device discrimination is assessed using Time Domain (TD) and Slope-Based FSK (SB-FSK) fingerprints input to Multiple Discriminant Analysis, Maximum Likelihood (MDA/ML) and Random Forest (RndF) classifiers. For 12 different classes (two devices per manufacturer at two distinct set points), both classifiers performed reliably and achieved an arbitrary performance benchmark of average cross-class percent correct of %C > 90%. The least challenging cross-manufacturer results included near-perfect %C ≈ 100%, while the more challenging like-model (serial number) discrimination results included 90%< %C < 100%, with TD Fingerprinting marginally outperforming SB-FSK Fingerprinting; SB-FSK benefits from having less stringent response alignment and registration requirements. The RndF classifier was most beneficial and enabled reliable selection of dimensionally reduced fingerprint subsets that minimize data storage and computational requirements. The RndF selected feature sets contained 15% of the full-dimensional feature sets and only suffered a worst case %CΔ = 3% to 4% performance degradation.

  19. Impacts of Community-Based Natural Resource Management on Wealth, Food Security and Child Health in Tanzania.

    Science.gov (United States)

    Pailler, Sharon; Naidoo, Robin; Burgess, Neil D; Freeman, Olivia E; Fisher, Brendan

    2015-01-01

    Community-based natural resource management (CBNRM) is a major global strategy for enhancing conservation outcomes while also seeking to improve rural livelihoods; however, little evidence of socioeconomic outcomes exists. We present a national-level analysis that empirically estimates socioeconomic impacts of CBNRM across Tanzania, while systematically controlling for potential sources of bias. Specifically, we apply a difference-in-differences model to national-scale, cross-sectional data to estimate the impact of three different CBNRM governance regimes on wealth, food security and child health, considering differential impacts of CBNRM on wealthy and poor populations. We also explore whether or not longer-standing CBNRM efforts provide more benefits than recently-established CBNRM areas. Our results show significant improvements in household food security in CBNRM areas compared with non-CBNRM areas, but household wealth and health outcomes in children are generally not significantly different. No one CBNRM governance regime demonstrates consistently different welfare outcomes than the others. Wealthy households benefit more from CBNRM than poor households and CBNRM benefits appear to increase with longer periods of implementation. Perhaps evidence of CBNRM benefits is limited because CBNRM hasn't been around long enough to yield demonstrable outcomes. Nonetheless, achieving demonstrable benefits to rural populations will be crucial for CBNRM's future success in Tanzania.

  20. Development of inquiry-based learning activities integrated with the local learning resource to promote learning achievement and analytical thinking ability of Mathayomsuksa 3 student

    Science.gov (United States)

    Sukji, Paweena; Wichaidit, Pacharee Rompayom; Wichaidit, Sittichai

    2018-01-01

    The objectives of this study were to: 1) compare learning achievement and analytical thinking ability of Mathayomsuksa 3 students before and after learning through inquiry-based learning activities integrated with the local learning resource, and 2) compare average post-test score of learning achievement and analytical thinking ability to its cutting score. The target of this study was 23 Mathayomsuksa 3 students who were studying in the second semester of 2016 academic year from Banchatfang School, Chainat Province. Research instruments composed of: 1) 6 lesson plans of Environment and Natural Resources, 2) the learning achievement test, and 3) analytical thinking ability test. The results showed that 1) student' learning achievement and analytical thinking ability after learning were higher than that of before at the level of .05 statistical significance, and 2) average posttest score of student' learning achievement and analytical thinking ability were higher than its cutting score at the level of .05 statistical significance. The implication of this research is for science teachers and curriculum developers to design inquiry activities that relate to student's context.

  1. Assessing future risks to agricultural productivity, water resources and food security: How can remote sensing help?

    Science.gov (United States)

    Thenkabail, Prasad S.; Knox, Jerry W.; Ozdogan, Mutlu; Gumma, Murali Krishna; Congalton, Russell G.; Wu, Zhuoting; Milesi, Cristina; Finkral, Alex; Marshall, Mike; Mariotto, Isabella; You, Songcai; Giri, Chandra; Nagler, Pamela

    2012-01-01

    Although global food production has been rising, the world sti ll faces a major food security challenge. Over one billion people are currently undernourished (Wheeler and Kay, 2010). By the 2050s, the human population is projected to grow to 9.1 billion. Over three-quarters of these people will be living in developing countries, in regions that already lack the capacity to feed their populations . Under current agricultural practices, the increased demand for food would require in excess of one billion hectares of new cropland, nearly equivalent to the land area of the United States, and would lead to significant increases in greenhouse gases (Tillman et al., 2011). Since climate is the primary determinant of agricultural productivity, changes to it will influence not only crop yields, but also hydrologic balances and supplies of inputs to managed farming systems, and may lead to a shift in the geographic location of some crops . Therefore, not only must crop productivity (yield per unit of land; kg/m2) increase, but water productivity (yield per unit of water or "crop per drop"; kg/m3) must increase as well in order to feed a burgeoning population against a backdrop

  2. Food security in the face of climate change, population growth, and resource constraints: implications for Bangladesh.

    Science.gov (United States)

    Faisal, Islam M; Parveen, Saila

    2004-10-01

    Ensuring food security has been one of the major national priorities of Bangladesh since its independence in 1971. Now, this national priority is facing new challenges from the possible impacts of climate change in addition to the already existing threats from rapid population growth, declining availability of cultivable land, and inadequate access to water in the dry season. In this backdrop, this paper has examined the nature and magnitude of these threats for the benchmark years of 2030 and 2050. It has been shown that the overall impact of climate change on the production of food grains in Bangladesh would probably be small in 2030. This is due to the strong positive impact of CO2 fertilization that would compensate for the negative impacts of higher temperature and sea level rise. In 2050, the negative impacts of climate change might become noticeable: production of rice and wheat might drop by 8% and 32%, respectively. However, rice would be less affected by climate change compared to wheat, which is more sensitive to a change in temperature. Based on the population projections and analysis of future agronomic innovations, this study further shows that the availability of cultivable land alone would not be a constraint for achieving food self-sufficiency, provided that the productivity of rice and wheat grows at a rate of 10% or more per decade. However, the situation would be more critical in terms of water availability. If the dry season water availability does not decline from the 1990 level of about 100 Bm3, there would be just enough water in 2030 for meeting both the agricultural and nonagricultural needs. In 2050, the demand for irrigation water to maintain food self-sufficiency would be about 40% to 50% of the dry season water availability. Meeting such a high agricultural water demand might cause significant negative impacts on the domestic and commercial water supply, fisheries, ecosystems, navigation, and salinity management.

  3. Exploring Pacific Climate Variability and Its Impacts on East African Water Resources and Food Security

    Science.gov (United States)

    Funk, C. C.; Hoerling, M. P.; Hoell, A.; Liebmann, B.; Verdin, J. P.; Eilerts, G.

    2014-12-01

    In 8 out the past 15 boreal springs (1999, 2000, 2004, 2008, 2009, 2011, 2012, and 2013), substantial parts of eastern East Africa experienced very low boreal spring rains. These rainfall deficits have triggered widespread food insecurity, and even contributed to the outbreak of famine conditions in Somalia in 2011. At both seasonal and decadal time scales, new science supported by the USAID Famine Early Warning Systems Network seeks to understand the mechanisms producing these droughts. We present research suggesting that the ultimate and proximate causes of these increases in aridity are i) stronger equatorial Pacific SST gradients and ii) associated increases in the strength of the Indo-Pacific Walker circulation. Using observations and new modeling ensembles, we explore the relative contributions of Pacific Decadal Variability (PDV) and global warming under warm and cold east Pacific Ocean states. This question is addressed in two ways: by using atmospheric GCMs forced with full and ENSO-only SSTs, and ii) by decomposing coupled ocean-atmosphere climate simulations into PDV and non-PDV components. These analyses allow us to explore the Walker circulation's sensitivity to climate change under various PDV states, and inform a tentative bracketing of 2030 climate conditions. We conclude by discussing links to East African development. Regions of high rainfall sensitivity are delineated and intersected with recent changes in population and land cover/land use. The interaction of elevation and climate is shown to create climatically secure regions that are likely to remain viable even under drier and warmer conditions; such regions may be logical targets for agricultural intensification. Conversely, arid low elevation regions are likely to experience substantial temperature impacts. Continued expansion into these areas may effectively create more 'drought' even if rainfall increases.

  4. Hanford Analytical Services Management: One of the keys to effectively managing the Hanford Site in an environment of competing resources and priorities

    International Nuclear Information System (INIS)

    Wanek, D.M.; Mooers, G.C.; Schubert, S.A.

    1994-02-01

    The Quality Improvement Team recognized that a true partnership between RL and the Hanford Site contractors had to be established to (1) identify what the analytical needs were for the site, both short and long term, (2) determine how to meet those needs, whether by using onsite capability or contracting offsite services, and (3) ensure that all analytical services meet the high level of quality demanded by the end users of the data. The Hanford Analytical Services Management (HASM) organization was established from this concept. What makes HASM unique and virtually guarantees success is that all the participants within HASM, site contractors and RL, have parity. This ensures that the best interests of the Hanford Site are implemented and minimizes the normal parochialism when multiple contractors are competing for the same work. The HASM concept provides for consistent management to balance the analytical needs with the limited resources identified for analytical services at the Hanford Site. By contracting for analytical services, HASM provides a mechanism to meet site goals of increased commercialization

  5. The role of strong-tie social networks in mediating food security of fish resources by a traditional riverine community in the Brazilian Amazon

    Directory of Open Access Journals (Sweden)

    Frédéric Mertens

    2015-09-01

    Full Text Available Social networks are a significant way through which rural communities that manage resources under common property regimes obtain food resources. Previous research on food security and social network analysis has mostly focused on egocentric network data or proxy variables for social networks to explain how social relations contribute to the different dimensions of food security. Whole-network approaches have the potential to contribute to former studies by revealing how individual social ties aggregate into complex structures that create opportunities or constraints to the sharing and distribution of food resources. We used a whole-network approach to investigate the role of network structure in contributing to the four dimensions of food security: food availability, access, utilization, and stability. For a case study of a riparian community from the Brazilian Amazon that is dependent on fish as a key element of food security, we mapped the community strong-tie network among 97% of the village population over 14 years old (n = 336 by integrating reciprocated friendship and occupational ties, as well as close kinship relationships. We explored how different structural properties of the community network contribute to the understanding of (1 the availability of fish as a community resource, (2 community access to fish as a dietary resource, (3 the utilization of fish for consumption in a way that allows the villagers to maximize nutrition while at the same time minimizing toxic risks associated with mercury exposure, and (4 the stability of the fish resources in local ecosystems as a result of cooperative behaviors and community-based management. The contribution of whole-network approaches to the study of the links between community-based natural resource management and food security were discussed in the context of recent social-ecological changes in the Amazonian region.

  6. Information Communication and Technology for Water Resource Management and Food Security in Kenya: A Case Study of Kericho and Uasin Gishu Districts

    Science.gov (United States)

    Omboto, P. I.; Macharia, J.; Mbagaya, Grace; Standa, F. N.

    2011-01-01

    Recent reports on Kenya have indicated food insecurity and destruction of water catchments as serious problems facing the country. Despite the tremendous strides in Information and Communication Technology (ICT), the country has not taken advantage of the technology to improve food security by effectively managing her water resources. A survey on…

  7. Emotional Exhaustion and Job Satisfaction in Airport Security Officers - Work-Family Conflict as Mediator in the Job Demands-Resources Model.

    Science.gov (United States)

    Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian

    2016-01-01

    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners' job performance. The present study bridges this research gap by applying the job demands-resources (JD-R) model and using work-family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD-R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed.

  8. Twelfth ISAS national symposium on analytical techniques for safety and sufficiency of natural resources/products: technical papers

    International Nuclear Information System (INIS)

    Padmanabhan, P.K.; Page, A.G.

    1997-02-01

    This volume contains the proceedings of the ISAS (Indian Society of Analytical Scientists) national symposium. The main thrust of the symposium was on new fuel cycle technologies relevant to thorium utilisation programmes. The technologies for different separation processes, techniques for measurements of various process parameters and highly sensitive analytical methods for the determination of the chemical constituents were among the other topics covered. Quality upgradation, standardisation of methods and validation of measurements which are integral parts of product evaluation were also discussed. Papers relevant to INIS are indexed separately

  9. Secure Virtual Enclaves

    National Research Council Canada - National Science Library

    Shands, Deborah

    2002-01-01

    The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application resources, while respecting organizational autonomy over local resources...

  10. Safety at work: a meta-analytic investigation of the link between job demands, job resources, burnout, engagement, and safety outcomes.

    Science.gov (United States)

    Nahrgang, Jennifer D; Morgeson, Frederick P; Hofmann, David A

    2011-01-01

    In this article, we develop and meta-analytically test the relationship between job demands and resources and burnout, engagement, and safety outcomes in the workplace. In a meta-analysis of 203 independent samples (N = 186,440), we found support for a health impairment process and for a motivational process as mechanisms through which job demands and resources relate to safety outcomes. In particular, we found that job demands such as risks and hazards and complexity impair employees' health and positively relate to burnout. Likewise, we found support for job resources such as knowledge, autonomy, and a supportive environment motivating employees and positively relating to engagement. Job demands were found to hinder an employee with a negative relationship to engagement, whereas job resources were found to negatively relate to burnout. Finally, we found that burnout was negatively related to working safely but that engagement motivated employees and was positively related to working safely. Across industries, risks and hazards was the most consistent job demand and a supportive environment was the most consistent job resource in terms of explaining variance in burnout, engagement, and safety outcomes. The type of job demand that explained the most variance differed by industry, whereas a supportive environment remained consistent in explaining the most variance in all industries.

  11. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  12. Regional energy resource development and energy security under CO{sub 2} emission constraint in the greater Mekong sub-region countries (GMS)

    Energy Technology Data Exchange (ETDEWEB)

    Watcharejyothin, Mayurachat; Shrestha, Ram M. [School of Environment, Resources and Development, Asian Institute of Technology (Thailand)

    2009-11-15

    The paper evaluates effects of energy resource development within the Greater Mekong Sub-region (GMS) on energy supply mix, energy system cost, energy security and environment during 2000-2035. A MARKAL-based integrated energy system model of the five GMS countries was developed to examine benefits of regional energy resource development for meeting the energy demand of these countries. The study found that an unrestricted energy resource development and trade within the region would reduce the total-regional energy systems cost by 18% and would abate the total CO{sub 2} emission by 5% as compared to the base case. All the five countries except Myanmar would benefit from the expansion of regional energy resource integration in terms of lower energy systems costs and better environmental qualities. An imposition of CO{sub 2} emission reduction constraint by 5% on each of the study countries from that of the corresponding emissions under the unrestricted energy resource development in the GMS is found to improve energy security, reduce energy import and fossil fuels dependences and increase volume of power trade within the region. The total energy system cost under the joint CO{sub 2} emission reduction strategy would be less costly than that under the individual emission targets set for each country. (author)

  13. Regional energy resource development and energy security under CO2 emission constraint in the greater Mekong sub-region countries (GMS)

    International Nuclear Information System (INIS)

    Watcharejyothin, Mayurachat; Shrestha, Ram M.

    2009-01-01

    The paper evaluates effects of energy resource development within the Greater Mekong Sub-region (GMS) on energy supply mix, energy system cost, energy security and environment during 2000-2035. A MARKAL-based integrated energy system model of the five GMS countries was developed to examine benefits of regional energy resource development for meeting the energy demand of these countries. The study found that an unrestricted energy resource development and trade within the region would reduce the total-regional energy systems cost by 18% and would abate the total CO 2 emission by 5% as compared to the base case. All the five countries except Myanmar would benefit from the expansion of regional energy resource integration in terms of lower energy systems costs and better environmental qualities. An imposition of CO 2 emission reduction constraint by 5% on each of the study countries from that of the corresponding emissions under the unrestricted energy resource development in the GMS is found to improve energy security, reduce energy import and fossil fuels dependences and increase volume of power trade within the region. The total energy system cost under the joint CO 2 emission reduction strategy would be less costly than that under the individual emission targets set for each country.

  14. Using analytical tools for decision-making and program planning in natural resources: breaking the fear barrier

    Science.gov (United States)

    David L. Peterson; Daniel L. Schmoldt

    1999-01-01

    The National Park Service and other public agencies are increasing their emphasis on inventory and monitoring (I&M) programs to obtain the information needed to infer changes in resource conditions and trigger management responses.A few individuals on a planning team can develop I&M programs, although a focused workshop is more effective.Workshops are...

  15. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  16. An analytic-geospatial approach for sustainable water resource management: a case study in the province of Perugia

    Directory of Open Access Journals (Sweden)

    Stefano Casadei

    2013-09-01

    Full Text Available Water is a strategic, but also highly vulnerable, natural resource. This because the increasing demand from multiple uses, in many cases competing amongst them, seems to influence the concepts of sustainability of the exploitation. From the operational point of view, the studied system is an integrated decision support system. It is not only a platform to exchange information and assessments, but also a tool for conflict resolution, in the management of water resources, to obtain the consensus among all participants in the decisional processes. So the canonical “top-down” approach has been replaced with a “bottom-up” approach where all stakeholders become decision makers themselves. The application of the aforementioned approach was studied for the Tiber River basin and has been applied to the Province of Perugia area. The study focused to the building of a spatial database of hydrological data and multipurpose water withdrawals, together with the setting of the evaluation model for the surface water resources. This model bases its algorithms on regionalization procedures of flow parameters. For the definition of the river condition, hydrological indices calculated from the hydrological database have been used, while for the existing withdrawals, an analysis procedure has been developed, that from the point of interest directly selected on the map, finds out the upstream basin and, by means of overlay procedures, identifies the upstream water uses and the total flow that could be extracted. The potential of the system and the technologies used are contained in a WEB platform that allows the analysis of the database of water uses/withdrawals on the cartography, and the comparison with the hydrogeological characteristics of the sub-basin examined. The purpose of this study is to provide software tools that can be used as a support in water resource evaluation and management policies at the basin scale.

  17. How much will be economic impact of climate change on water resources? A Meta-Analytic Review of previous literature

    Science.gov (United States)

    Yoshikawa, S.; Iseri, Y.; Kanae, S.

    2016-12-01

    Water resources is vital in social and economic activities. Total global water use is increasing, mainly due to economic and population growth in developing countries. It has one of risk with high agreement and robust evidence that freshwater-related risks of climate change increase significantly with increasing greenhouse gas concentrations. It is difficult to compare the risk with other field risk (e.g. agriculture, forestry, sea level rise) for considering both adaptation and mitigation policy with the level of decision makers and public servants. Economic impacts of climate change on water scarcity has been estimated by economic researchers. We have no certainty at all about integration between hydrological and economical fields on global scale. In this study, we highlight key concerns about conventional estimations of economic impact on water resources through meta-analysis. The economic impact on water resource in same base year using consumer price index is shown with increase in the global mean temperature. We clarified four concerns which are involved in 1) classification of economic mechanism, 2) estimated items of economic impact, 3) difference in estimating equations, and 4) definition of parameters related with economic impact of climate change. This study would be essential to next challenge as transdisciplinary research between hydrologic and economic fields.

  18. An Update of the Analytical Groundwater Modeling to Assess Water Resource Impacts at the Afton Solar Energy Zone

    Energy Technology Data Exchange (ETDEWEB)

    Quinn, John J. [Argonne National Lab. (ANL), Argonne, IL (United States); Greer, Christopher B. [Argonne National Lab. (ANL), Argonne, IL (United States); Carr, Adrianne E. [Argonne National Lab. (ANL), Argonne, IL (United States)

    2014-10-01

    The purpose of this study is to update a one-dimensional analytical groundwater flow model to examine the influence of potential groundwater withdrawal in support of utility-scale solar energy development at the Afton Solar Energy Zone (SEZ) as a part of the Bureau of Land Management’s (BLM’s) Solar Energy Program. This report describes the modeling for assessing the drawdown associated with SEZ groundwater pumping rates for a 20-year duration considering three categories of water demand (high, medium, and low) based on technology-specific considerations. The 2012 modeling effort published in the Final Programmatic Environmental Impact Statement for Solar Energy Development in Six Southwestern States (Solar PEIS; BLM and DOE 2012) has been refined based on additional information described below in an expanded hydrogeologic discussion.

  19. Socioeconomic status, anthropometric status, and psychomotor development of Kenyan children from resource-limited settings: a path-analytic study.

    Science.gov (United States)

    Abubakar, Amina; Van de Vijver, Fons; Van Baar, Anneloes; Mbonani, Leonard; Kalu, Raphael; Newton, Charles; Holding, Penny

    2008-09-01

    Sub-optimal physical growth has been suggested as a key pathway between the effect of environmental risk and developmental outcome. To determine if anthropometric status mediates the relation between socioeconomic status and psychomotor development of young children in resource-limited settings. A cross-sectional study design was used. A total of 204 (105 girls) children from two resource-limited communities in the Coast Province, Kenya. The mean age of these children was 29 months (SD = 3.43; range: 24-35 months). Psychomotor functioning was assessed using a locally developed and validated measure, the Kilifi Developmental Inventory. A significant association was found between anthropometric status (as measured by weight-for-age, height-for-age, mid-upper arm circumference, and head circumference) and psychomotor functioning and also between socioeconomic status and anthropometric status; no direct effects were found between socioeconomic status and developmental outcome. The models showed that weight, height and to a lesser extent mid-upper arm circumference mediate the relation between socioeconomic status and developmental outcome, while head circumference did not show the same effect. Among children under 3 years living in poverty, anthropometric status shows a clear association with psychomotor development while socioeconomic status may only have an indirect association.

  20. Product and market study for Los Alamos National Laboratory. Building resources for technology commercialization: The SciBus Analytical, Inc. paradigm

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-02-01

    The study project was undertaken to investigate how entrepreneurial small businesses with technology licenses can develop product and market strategies sufficiently persuasive to attract resources and exploit commercialization opportunities. The study attempts to answer two primary questions: (1) What key business development strategies are likely to make technology transfers successful, and (2) How should the plan best be presented in order to attract resources (e.g., personnel, funding, channels of distribution)? In the opinion of the investigator, Calidex Corporation, if the business strategies later prove to be successful, then the plan model has relevance for any technology licensee attempting to accumulate resources and bridge from technology resident in government laboratories to the commercial marketplace. The study utilized SciBus Analytical, Inc. (SciBus), a Los Alamos National Laboratory CRADA participant, as the paradigm small business technology licensee. The investigator concluded that the optimum value of the study lay in the preparation of an actual business development plan for SciBus that might then have, hopefully, broader relevance and merit for other private sector technology transfer licensees working with various Government agencies.

  1. Emotional Exhaustion and Job Satisfaction in Airport Security Officers − Work−Family Conflict as Mediator in the Job Demands–Resources Model

    Directory of Open Access Journals (Sweden)

    Sophie eBaeriswyl

    2016-05-01

    Full Text Available The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners. Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners’ job performance. The present study bridges this research gap by applying the job demands–resources (JD−R model and using work–family conflict (WFC as an intervening variable to study relationships between work characteristics (workload and supervisor support, emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a supervisor support as a major job resource predicted job satisfaction among screeners; (b workload as a major job demand predicted their emotional exhaustion; and (c WFC proved to be a promising extension to the JD–R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed.

  2. The role of Latin America's land and water resources for global food security: environmental trade-offs of future food production pathways.

    Science.gov (United States)

    Flachsbarth, Insa; Willaarts, Bárbara; Xie, Hua; Pitois, Gauthier; Mueller, Nathaniel D; Ringler, Claudia; Garrido, Alberto

    2015-01-01

    One of humanity's major challenges of the 21st century will be meeting future food demands on an increasingly resource constrained-planet. Global food production will have to rise by 70 percent between 2000 and 2050 to meet effective demand which poses major challenges to food production systems. Doing so without compromising environmental integrity is an even greater challenge. This study looks at the interdependencies between land and water resources, agricultural production and environmental outcomes in Latin America and the Caribbean (LAC), an area of growing importance in international agricultural markets. Special emphasis is given to the role of LAC's agriculture for (a) global food security and (b) environmental sustainability. We use the International Model for Policy Analysis of Agricultural Commodities and Trade (IMPACT)-a global dynamic partial equilibrium model of the agricultural sector-to run different future production scenarios, and agricultural trade regimes out to 2050, and assess changes in related environmental indicators. Results indicate that further trade liberalization is crucial for improving food security globally, but that it would also lead to more environmental pressures in some regions across Latin America. Contrasting land expansion versus more intensified agriculture shows that productivity improvements are generally superior to agricultural land expansion, from an economic and environmental point of view. Finally, our analysis shows that there are trade-offs between environmental and food security goals for all agricultural development paths.

  3. The Role of Latin America’s Land and Water Resources for Global Food Security: Environmental Trade-Offs of Future Food Production Pathways

    Science.gov (United States)

    Flachsbarth, Insa; Willaarts, Bárbara; Xie, Hua; Pitois, Gauthier; Mueller, Nathaniel D.; Ringler, Claudia; Garrido, Alberto

    2015-01-01

    One of humanity’s major challenges of the 21st century will be meeting future food demands on an increasingly resource constrained-planet. Global food production will have to rise by 70 percent between 2000 and 2050 to meet effective demand which poses major challenges to food production systems. Doing so without compromising environmental integrity is an even greater challenge. This study looks at the interdependencies between land and water resources, agricultural production and environmental outcomes in Latin America and the Caribbean (LAC), an area of growing importance in international agricultural markets. Special emphasis is given to the role of LAC’s agriculture for (a) global food security and (b) environmental sustainability. We use the International Model for Policy Analysis of Agricultural Commodities and Trade (IMPACT)—a global dynamic partial equilibrium model of the agricultural sector—to run different future production scenarios, and agricultural trade regimes out to 2050, and assess changes in related environmental indicators. Results indicate that further trade liberalization is crucial for improving food security globally, but that it would also lead to more environmental pressures in some regions across Latin America. Contrasting land expansion versus more intensified agriculture shows that productivity improvements are generally superior to agricultural land expansion, from an economic and environmental point of view. Finally, our analysis shows that there are trade-offs between environmental and food security goals for all agricultural development paths. PMID:25617621

  4. Emotional Exhaustion and Job Satisfaction in Airport Security Officers – Work–Family Conflict as Mediator in the Job Demands–Resources Model

    Science.gov (United States)

    Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian

    2016-01-01

    The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners’ job performance. The present study bridges this research gap by applying the job demands–resources (JD–R) model and using work–family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD–R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed. PMID:27242581

  5. Functional dependency between the logistics security system and the MySAP ERP in metallurgy

    Directory of Open Access Journals (Sweden)

    P. Ranitović

    2013-10-01

    Full Text Available MySAP ERP - Enterprise Resource Planning (system - solution which provides a whole set of functions for the business analytics, finance, human resources management, logistics and corporate services has developed from SAP R/3. It is one of the main products of the SAP AG German multinational company and as such, it is a very important element of the international industrial and technological security system. By defining the functional dependency between the security systems (logistics security systems and the IT (My SAP ERP systems in metallurgy, a concept for designing MY SAP ERP system in metallurgic industry is defined, based on the security aspects.

  6. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  7. Functional dependency between the logistics security system and the MySAP ERP in metallurgy

    OpenAIRE

    Ranitović, P.; Tepić, G.; Matić, B.; Sremac, S.; Vukadinović, V.

    2013-01-01

    MySAP ERP - Enterprise Resource Planning (system - solution which provides a whole set of functions for the business analytics, finance, human resources management, logistics and corporate services) has developed from SAP R/3. It is one of the main products of the SAP AG German multinational company and as such, it is a very important element of the international industrial and technological security system. By defining the functional dependency between the security systems (logistics securit...

  8. Security Engineering and Educational Initiatives for Critical Information Infrastructures

    Science.gov (United States)

    2013-06-01

    content. The curriculum development efforts are accompanied by exercises that expose students to practical tools and resources for security engineering...with relatively simple analytical features, but high pedagogical value. Information Assurance Courses Curriculum development has occurred for...tool chain and accompanying methodology confronts serious challenges posed by large heterogeneous networks (e.g., SCADA and corporate systems) from

  9. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  10. Calendar Year 2007 Resource Conservation and Recovery Act Annual Monitoring Report for the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee - RCRA Post-Closure Permit Nos. TNHW-113, TNHW-116, and TNHW-128

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental

    2008-02-01

    This report contains groundwater quality monitoring data obtained during calendar year (CY) 2007 at the following hazardous waste treatment, storage, and disposal (TSD) units located at the US Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12) in Oak Ridge, Tennessee; this S-3 Site, Oil Landfarm, Bear Creek Burial Grounds/Walk-In Pits (BCBG/WIP), Eastern S-3 Site Plume, Chestnut Ridge Security Pits (CRSP), Chestnut Ridge Sediment Disposal Baste (CRSDB), few Hollow Quarry (KHQ), and East Chestnut Ridge Waste Pile (ECRWP). Hit monitoring data were obtained in accordance with the applicable Resource Conservation and Recovery Act of 1976 (RCRA) hazardous waste post-closure permit (PCP). The Tennessee Department of Environment and Conservation (TDEC) - Division of Solid Waste Management issued the PCPs to define the requirements for RCRA post-closure inspection, maintenance, and groundwater monitoring at the specified TSD units located within the Bear Creek Hydrogeologic Regime (PCP no. TNHW-116), Upper East Fork Poplar Creek Hydrogeologic Regime (PCP no. TNHW-113), and Chestnut Ridge Hydrogeologic Regime (PCP no. TNHW-128). Each PCP requires the Submittal of an annual RCRA groundwater monitoring report containing the groundwater sampling information and analytical results obtained at each applicable TSD unit during the preceding CY, along with an evaluation of groundwater low rates and directions and the analytical results for specified RCRA groundwater target compounds; this report is the RCRA annual groundwater monitoring report for CY 2007. The RCRA post-closure groundwater monitoring requirements specified in the above-referenced PCP for the Chestnut Ridge Regime replace those defined in the previous PCP (permit no. TNHW-088), which expired on September 18, 2005, but remained effective until the TDEC issued the new PCP in September 2006. The new PCP defines site-specific groundwater sampling and analysis requirements for the

  11. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  12. Analyzing the Feasibility of Using Secure Application Integration Methodology (SAIM) for Integrating DON Enterprise Resource Planning (ERP) Applications

    National Research Council Canada - National Science Library

    Marin, Ramon

    2004-01-01

    ...) would provide useful information about a beneficial methodology. SAIM is analyzed, by accessing its step by step directions, for suitability in the integration of the Enterprise Resource Planning (ERP...

  13. Analytical and Numerical Study of the Projective Synchronization of the Chaotic Complex Nonlinear Systems with Uncertain Parameters and Its Applications in Secure Communication

    Directory of Open Access Journals (Sweden)

    Kholod M. Abualnaja

    2014-01-01

    to demonstrate the effectiveness of the proposed synchronization scheme and verify the theoretical results. The above results will provide theoretical foundation for the secure communication applications based on the proposed scheme.

  14. Global Health Security Demands a Strong International Health Regulations Treaty and Leadership From a Highly Resourced World Health Organization.

    Science.gov (United States)

    Burkle, Frederick M

    2015-10-01

    If the Ebola tragedy of West Africa has taught us anything, it should be that the 2005 International Health Regulations (IHR) Treaty, which gave unprecedented authority to the World Health Organization (WHO) to provide global public health security during public health emergencies of international concern, has fallen severely short of its original goal. After encouraging successes with the 2003 severe acute respiratory syndrome (SARS) pandemic, the intent of the legally binding Treaty to improve the capacity of all countries to detect, assess, notify, and respond to public health threats has shamefully lapsed. Despite the granting of 2-year extensions in 2012 to countries to meet core surveillance and response requirements, less than 20% of countries have complied. Today it is not realistic to expect that these gaps will be solved or narrowed in the foreseeable future by the IHR or the WHO alone under current provisions. The unfortunate failures that culminated in an inadequate response to the Ebola epidemic in West Africa are multifactorial, including funding, staffing, and poor leadership decisions, but all are reversible. A rush by the Global Health Security Agenda partners to fill critical gaps in administrative and operational areas has been crucial in the short term, but questions remain as to the real priorities of the G20 as time elapses and critical gaps in public health protections and infrastructure take precedence over the economic and security needs of the developed world. The response from the Global Outbreak Alert and Response Network and foreign medical teams to Ebola proved indispensable to global health security, but both deserve stronger strategic capacity support and institutional status under the WHO leadership granted by the IHR Treaty. Treaties are the most successful means the world has in preventing, preparing for, and controlling epidemics in an increasingly globalized world. Other options are not sustainable. Given the gravity of ongoing

  15. Stochastic Security and Risk-Constrained Scheduling for an Autonomous Microgrid with Demand Response and Renewable Energy Resources

    DEFF Research Database (Denmark)

    Vahedipour-Dahraie, Mostafa; Rashidizadeh-Kermani, Homa; Najafi, Hamid Reza

    2017-01-01

    is to determine the optimal scheduling with considering risk aversion and system frequency security to maximise the expected profit of operator. To deal with various uncertainties, a riskconstrained two-stage stochastic programming model is proposed where the risk aversion of MG operator is modelled using...... of customers can be effectively applied to balance the demand and supply in electricity networks. This study presents a novel stochastic model from a microgrid (MG) operator perspective for energy and reserve scheduling considering risk management strategy. It is assumed that the MG operator can procure energy...... conditional value at risk method. Extensive numerical results are shown to demonstrate the effectiveness of the proposed framework....

  16. Optimal Scheduling of Distributed Energy Resources and Responsive Loads in Islanded Microgrids Considering Voltage and Frequency Security Constraints

    DEFF Research Database (Denmark)

    Vahedipour-Dahraie, Mostafa; Najafi, Hamid Reza; Anvari-Moghaddam, Amjad

    2018-01-01

    in islanded MGs with regard to voltage and frequency security constraints. Based on the proposed model, scheduling of the controllable units in both supply and demand sides is done in a way not only to maximize the expected profit of MG operator (MGO), but also to minimize the energy payments of customers...... on the system’s performance in terms of voltage and frequency stability. Moreover, optimal coordination of DERs and responsive loads can increase the expected profit of MGO significantly. The effectiveness of the proposed scheduling approach is verified on an islanded MG test system over a 24-h period....

  17. Quantum secure communication models comparison

    Directory of Open Access Journals (Sweden)

    Georgi Petrov Bebrov

    2017-12-01

    Full Text Available The paper concerns the quantum cryptography, more specifically, the quantum secure communication type of schemes. The main focus here is on making a comparison between the distinct secure quantum communication models – quantum secure direct communication and deterministic secure quantum communication, in terms of three parameters: resource efficiency, eavesdropping check efficiency, and security (degree of preserving the confidentiality.

  18. Analytical Methods for Energy Diversity and Security. Portfolio Optimization in the Energy Sector: A Tribute to the work of Dr. Shimon Awerbuch. Chapter 7. The role of wind generation in enhancing Scotland's energy diversity and security

    International Nuclear Information System (INIS)

    Jansen, J.C.; Beurskens, L.W.M.

    2008-11-01

    This volume aims at professionals in academia, industry and government interested in the rapidly evolving area at the nexus between energy and climate change policy. The cutting-edge international contributions allow for a wide coverage of the topic. Energy Diversity and Security focuses on the consideration of financial risk in the energy sector. It describes how tools borrowed from financial economic theory, in particular mean-variance portfolio theory, can provide insights on the costs and benefits of diversity, and thus inform investment decision making in conditions of uncertainty. It gives the reader an in-depth understanding of how to manage risk at a time when the world's focus is on this area. The book provides insights from leading authorities in the area of energy security. It gives readers abundant, rigorous analysis and guidance at a critical time in facing the twin challenges of energy security and climate change. The book also highlights the role of clean energy technology in moving towards future diverse and intelligent electricity systems. In this chapter attention is paid to the role of wind generation in enhancing Scotland's energy diversity and security

  19. Analytical Methods for Energy Diversity and Security. Portfolio Optimization in the Energy Sector: A Tribute to the work of Dr. Shimon Awerbuch. Chapter 7. The role of wind generation in enhancing Scotland's energy diversity and security

    Energy Technology Data Exchange (ETDEWEB)

    Jansen, J.C.; Beurskens, L.W.M.

    2008-11-15

    This volume aims at professionals in academia, industry and government interested in the rapidly evolving area at the nexus between energy and climate change policy. The cutting-edge international contributions allow for a wide coverage of the topic. Energy Diversity and Security focuses on the consideration of financial risk in the energy sector. It describes how tools borrowed from financial economic theory, in particular mean-variance portfolio theory, can provide insights on the costs and benefits of diversity, and thus inform investment decision making in conditions of uncertainty. It gives the reader an in-depth understanding of how to manage risk at a time when the world's focus is on this area. The book provides insights from leading authorities in the area of energy security. It gives readers abundant, rigorous analysis and guidance at a critical time in facing the twin challenges of energy security and climate change. The book also highlights the role of clean energy technology in moving towards future diverse and intelligent electricity systems. In this chapter attention is paid to the role of wind generation in enhancing Scotland's energy diversity and security.

  20. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  1. Optimal allocation of land and water resources to achieve Water, Energy and Food Security in the upper Blue Nile basin

    Science.gov (United States)

    Allam, M.; Eltahir, E. A. B.

    2017-12-01

    Rapid population growth, hunger problems, increasing energy demands, persistent conflicts between the Nile basin riparian countries and the potential impacts of climate change highlight the urgent need for the conscious stewardship of the upper Blue Nile (UBN) basin resources. This study develops a framework for the optimal allocation of land and water resources to agriculture and hydropower production in the UBN basin. The framework consists of three optimization models that aim to: (a) provide accurate estimates of the basin water budget, (b) allocate land and water resources optimally to agriculture, and (c) allocate water to agriculture and hydropower production, and investigate trade-offs between them. First, a data assimilation procedure for data-scarce basins is proposed to deal with data limitations and produce estimates of the hydrologic components that are consistent with the principles of mass and energy conservation. Second, the most representative topography and soil properties datasets are objectively identified and used to delineate the agricultural potential in the basin. The agricultural potential is incorporated into a land-water allocation model that maximizes the net economic benefits from rain-fed agriculture while allowing for enhancing the soils from one suitability class to another to increase agricultural productivity in return for an investment in soil inputs. The optimal agricultural expansion is expected to reduce the basin flow by 7.6 cubic kilometres, impacting downstream countries. The optimization framework is expanded to include hydropower production. This study finds that allocating water to grow rain-fed teff in the basin is more profitable than allocating water for hydropower production. Optimal operation rules for the Grand Ethiopian Renaissance dam (GERD) are identified to maximize annual hydropower generation while achieving a relatively uniform monthly production rate. Trade-offs between agricultural expansion and hydropower

  2. Department of Energy security program needs effective information systems

    International Nuclear Information System (INIS)

    1991-10-01

    Although security is an important, nearly billion-dollar-a-year function in the Department of Energy (DOE), key information systems that hold important data about security weaknesses and incidents have limited analytical capabilities and contain unreliable information. The resultant difficulty in identifying patterns and trends reduces managers' ability to ensure the effectiveness of the security program. Resources are also wasted because DOE has deployed incompatible systems that are unable to electronically share or transfer data, often forcing employees to manually re-enter data that are already stored in computers elsewhere. Finally, continuing data problems with other important security information systems, such as those used to track security clearances and classified documents, indicate that information system deficiencies are extensive. A major reason for these problems is that DOE has not done a comprehensive, strategic assessment of its information and information technology needs of the security program. DOE's efforts are fragmented because it has not assigned to any organization the leadership responsibility to determine security information needs and to plan and manage security information resources Department-wide. This paper reports that a number of changes are needed to correct these problems and take advantage of information technology to help strengthen the security program

  3. Challenges of transfrontier conservation areas: Natural resources nationalism, security and regionalism in the southern African development community region

    Directory of Open Access Journals (Sweden)

    Oswell Rusinga

    2012-12-01

    Full Text Available Transfrontier Conservation Areas (TFCAs initiatives in the Southern African Development Community (SADC region offer hope for providing a mechanism for resolving political tensions and conflicts which are not only related to environmental issues but to security concerns as well. The geopolitical implications of TFCAs in the SADC region cannot be overemphasised with regard to international relations and regional integration. The SADS region is characterised by histories of contested military balance of power and geopolitical rivalries which have a potential to degenerate into military confrontation. Although there is a strong belief in multilateral co-operation among SADC member countries, most of them often engage the international community at the bilateral level. Moreover, there is disharmony in constitutional applications of the rule of law, respect of human rights and good governance. However, TFCAs initiatives in Southern Africa have been seen as offering an opportunity to heal the wounds of pre- and post-independence wars of destabilisation through the encouragement of inter-state collaboration and co-operation by giving governments an opportunity for mutual action on issues of common interest.

  4. Strategic engineering for cloud computing and big data analytics

    CERN Document Server

    Ramachandran, Muthu; Sarwar, Dilshad

    2017-01-01

    This book demonstrates the use of a wide range of strategic engineering concepts, theories and applied case studies to improve the safety, security and sustainability of complex and large-scale engineering and computer systems. It first details the concepts of system design, life cycle, impact assessment and security to show how these ideas can be brought to bear on the modeling, analysis and design of information systems with a focused view on cloud-computing systems and big data analytics. This informative book is a valuable resource for graduate students, researchers and industry-based practitioners working in engineering, information and business systems as well as strategy. .

  5. Workshop on Current Issues in Predictive Approaches to Intelligence and Security Analytics: Fostering the Creation of Decision Advantage through Model Integration and Evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Sanfilippo, Antonio P.

    2010-05-23

    The increasing asymmetric nature of threats to the security, health and sustainable growth of our society requires that anticipatory reasoning become an everyday activity. Currently, the use of anticipatory reasoning is hindered by the lack of systematic methods for combining knowledge- and evidence-based models, integrating modeling algorithms, and assessing model validity, accuracy and utility. The workshop addresses these gaps with the intent of fostering the creation of a community of interest on model integration and evaluation that may serve as an aggregation point for existing efforts and a launch pad for new approaches.

  6. ICT security management

    OpenAIRE

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  7. Web Analytics

    Science.gov (United States)

    EPA’s Web Analytics Program collects, analyzes, and provides reports on traffic, quality assurance, and customer satisfaction metrics for EPA’s website. The program uses a variety of analytics tools, including Google Analytics and CrazyEgg.

  8. The House of Security: Stakeholder Perceptions of Security Assessment and Importance

    OpenAIRE

    Ang, Wee Horng; Deng, Vicki; Lee, Yang; Madnick, Stuart; Mistree, Dinsha; Siegel, Michael; Strong, Diane

    2007-01-01

    In this paper we introduce a methodology for analyzing differences regarding security perceptions within and between stakeholders, and the elements which affect these perceptions. We have designed the €܈ouse of Security€ݬ a security assessment model that provides the basic framework for considering eight different constructs of security: Vulnerability, Accessibility, Confidentiality, Technology Resources for Security, Financial Resources for Security, Business Strategy for Security, Secur...

  9. Safeguards resource management

    International Nuclear Information System (INIS)

    Strait, R.S.

    1986-01-01

    Protecting nuclear materials is a challenging problem for facility managers. To counter the broad spectrum of potential threats, facility managers rely on diverse safeguards measures, including elements of physical protection, material control and accountability, and human reliability programs. Deciding how to upgrade safeguards systems involves difficult tradeoffs between increased protection and the costs and operational impact of protection measures. Effective allocation of safeguards and security resources requires a prioritization of systems upgrades based on a relative measure of upgrade benefits to upgrade costs. Analytical tools are needed to help safeguards managers measure the relative benefits and cost and allocate their limited resources to achieve balanced, cost-effective protection against the full spectrum of threats. This paper presents a conceptual approach and quantitative model that have been developed by Lawrence Livermore National Laboratory to aid safeguards managers

  10. Food Security Strategies for Vanuatu

    OpenAIRE

    Welegtabit, Shadrack R.

    2001-01-01

    This report describes and analyzes food security conditions and policies in Vanuatu. The national food security systems are dualistic in nature, and the rural and urban food security systems are weakly related. Household food security in rural areas is primarily determined by access to arable land and fishery resources, whereas in urban areas household food security is primarily determined by access to employment. Household food security has been a concern in both rural and urban areas. Both ...

  11. Regional scenario building as a tool to support vulnerability assessment of food & water security and livelihood conditions under varying natural resources managements

    Science.gov (United States)

    Reinhardt, Julia; Liersch, Stefan; Dickens, Chris; Kabaseke, Clovis; Mulugeta Lemenih, Kassaye; Sghaier, Mongi; Hattermann, Fred

    2013-04-01

    Participatory regional scenario building was carried out with stakeholders and local researchers in four meso-scale case studies (CS) in Africa. In all CS the improvement of food and / or water security and livelihood conditions was identified as the focal issue. A major concern was to analyze the impacts of different plausible future developments on these issues. The process of scenario development is of special importance as it helps to identify main drivers, critical uncertainties and patterns of change. Opportunities and constraints of actors and actions become clearer and reveal adaptation capacities. Effective strategies must be furthermore reasonable and accepted by local stakeholders to be implemented. Hence, developing scenarios and generating strategies need the integration of local knowledge. The testing of strategies shows how they play out in different scenarios and how robust they are. Reasons and patterns of social and natural vulnerability can so be shown. The scenario building exercise applied in this study is inspired by the approach from Peter Schwartz. It aims at determining critical uncertainties and to identify the most important driving forces for a specific focal issue which are likely to shape future developments of a region. The most important and uncertain drivers were analyzed and systematized with ranking exercises during meetings with local researchers and stakeholders. Cause-effect relationships were drawn in the form of concept maps either during the meetings or by researchers based on available information. Past observations and the scenario building outcomes were used to conduct a trend analysis. Cross-comparisons were made to find similarities and differences between CS in terms of main driving forces, patterns of change, opportunities and constraints. Driving forces and trends which aroused consistently over scenarios and CS were identified. First results indicate that livelihood conditions of people rely often directly on the

  12. Post-Closure Report for Closed Resource Conservation and Recovery Act Corrective Action Units, Nevada National Security Site, Nevada, for Fiscal Year 2014

    Energy Technology Data Exchange (ETDEWEB)

    Silvas, Alissa J. [Nevada Field Office, Las Vegas, NV (United States)

    2015-01-01

    This report serves as the combined annual report for post-closure activities for several Corrective Action Units (CAUs). The locations of the sites are shown in Figure 1. This report covers fiscal year 2014 (October 2013–September 2014). The post-closure requirements for these sites are described in Resource Conservation and Recovery Act Permit Number NEV HW0101 and summarized in each CAU-specific section in Section 1.0 of this report. The results of the inspections, a summary of maintenance activities, and an evaluation of monitoring data are presented in this report. Site inspections are conducted semiannually at CAUs 90 and 91 and quarterly at CAUs 92, 110, 111, and 112. Additional inspections are conducted at CAU 92 if precipitation occurs in excess of 0.50 inches (in.) in a 24-hour period and at CAU 111 if precipitation occurs in excess of 1.0 in. in a 24-hour period. Inspections include an evaluation of the condition of the units, including covers, fences, signs, gates, and locks. In addition to visual inspections, soil moisture monitoring, vegetation evaluations, and subsidence surveys are conducted at CAU 110. At CAU 111, soil moisture monitoring, vegetation evaluations, subsidence surveys, direct radiation monitoring, air monitoring, radon flux monitoring, and groundwater monitoring are conducted. The results of the vegetation surveys and an analysis of the soil moisture monitoring data at CAU 110 are presented in this report. Results of additional monitoring at CAU 111 are documented annually in the Nevada National Security Site Waste Management Monitoring Report Area 3 and Area 5 Radioactive Waste Management Sites and in the Nevada National Security Site Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site, which will be prepared in approximately June 2015. All required inspections, maintenance, and monitoring were conducted in accordance with the post-closure requirements of the permit. It is recommended to continue

  13. A Cultural Resources Inventory and Historical Evaluation of the Smoky Atmospheric Nuclear Test, Areas 8, 9, and 10, Nevada National Security Site, Nye County, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Jones, Robert C. [Desert Research Inst. (DRI), Reno, NV (United States); King, Maureen L. [Desert Research Inst. (DRI), Reno, NV (United States); Beck, Colleen M. [Desert Research Inst. (DRI), Reno, NV (United States); Falvey, Lauren W. [Desert Research Inst. (DRI), Reno, NV (United States); Menocal, Tatianna M. [Desert Research Inst. (DRI), Reno, NV (United States)

    2014-09-01

    This report presents the results of a National Historic Preservation Act Section 106 cultural resources inventory and historical evaluation of the 1957 Smoky atmospheric test location on the Nevada National Security Site (NNSS). The Desert Research Institute (DRI) was tasked to conduct a cultural resources study of the Smoky test area as a result of a proposed undertaking by the Department of Energy Environmental Management. This undertaking involves investigating Corrective Action Unit (CAU) 550 for potential contaminants of concern as delineated in a Corrective Action Investigation Plan. CAU 550 is an area that spatially overlaps portions of the Smoky test location. Smoky, T-2c, was a 44 kt atmospheric nuclear test detonated at 5:30 am on August 31, 1957, on top of a 213.4 m (700 ft) 200 ton tower (T-2c) in Area 8 of the NNSS. Smoky was a weapons related test of the Plumbbob series (number 19) and part of the Department of Defense Exercise Desert Rock VII and VIII. The cultural resources effort involved the development of a historic context based on archival documents and engineering records, the inventory of the cultural resources in the Smoky test area and an associated military trench location in Areas 9 and 10, and an evaluation of the National Register eligibility of the cultural resources. The inventory of the Smoky test area resulted in the identification of structures, features, and artifacts related to the physical development of the test location and the post-test remains. The Smoky test area was designated historic district D104 and coincides with a historic archaeological site recorded as 26NY14794 and the military trenches designed for troop observation, site 26NY14795. Sites 26NY14794 and 26NY14795 are spatially discrete with the trenches located 4.3 km (2.7 mi) southeast of the Smoky ground zero. As a result, historic district D104 is discontiguous and in total it covers 151.4 hectares (374 acres). The Smoky test location, recorded as historic

  14. Social Web mining and exploitation for serious applications: Technosocial Predictive Analytics and related technologies for public health, environmental and national security surveillance.

    Science.gov (United States)

    Kamel Boulos, Maged N; Sanfilippo, Antonio P; Corley, Courtney D; Wheeler, Steve

    2010-10-01

    This paper explores Technosocial Predictive Analytics (TPA) and related methods for Web "data mining" where users' posts and queries are garnered from Social Web ("Web 2.0") tools such as blogs, micro-blogging and social networking sites to form coherent representations of real-time health events. The paper includes a brief introduction to commonly used Social Web tools such as mashups and aggregators, and maps their exponential growth as an open architecture of participation for the masses and an emerging way to gain insight about people's collective health status of whole populations. Several health related tool examples are described and demonstrated as practical means through which health professionals might create clear location specific pictures of epidemiological data such as flu outbreaks. Copyright 2010 Elsevier Ireland Ltd. All rights reserved.

  15. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  16. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  17. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  18. Google analytics integrations

    CERN Document Server

    Waisberg, Daniel

    2015-01-01

    A roadmap for turning Google Analytics into a centralized marketing analysis platform With Google Analytics Integrations, expert author Daniel Waisberg shows you how to gain a more meaningful, complete view of customers that can drive growth opportunities. This in-depth guide shows not only how to use Google Analytics, but also how to turn this powerful data collection and analysis tool into a central marketing analysis platform for your company. Taking a hands-on approach, this resource explores the integration and analysis of a host of common data sources, including Google AdWords, AdSens

  19. Programs and analytical methods for the U.S. Geological Survey acid-rain quality-assurance project. Water Resources Investigation

    International Nuclear Information System (INIS)

    See, R.B.; Willoughby, T.C.; Brooks, M.H.; Gordon, J.D.

    1990-01-01

    The U.S. Geological Survey operates four programs to provide external quality-assurance of wet deposition monitoring by the National Atmospheric Deposition Program and the National Trends Network. An intersite-comparison program assesses the precision and bias of onsite determinations of pH and specific conductance made by site operators. A blind-audit program is used to assess the effect of routine sample-handling procedures and transportation on the precision and bias of wet-deposition data. An interlaboratory-comparison program is used to assess analytical results from three or more laboratories, which routinely analyze wet-deposition samples from the major North American networks, to determine if comparability exists between laboratory analytical results and to provide estimates of the analytical precision of each laboratory. A collocated-sampler program is used to estimate the precision of wet/dry precipitation sampling throughout the National Atmospheric Deposition Program and the National Trends Network, to assess the variability of diverse spatial arrays, and to evaluate the impact of violations of specific site criteria. The report documents the procedures and analytical methods used in these four quality-assurance programs

  20. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  1. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  2. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  3. Los Alamos National Security, LLC Request for Information from industrial entities that desire to commercialize Laboratory-developed Extremely Low Resource Optical Identifier (ELROI) tech

    Energy Technology Data Exchange (ETDEWEB)

    Erickson, Michael Charles [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-11-10

    Los Alamos National Security, LLC (LANS) is the manager and operator of the Los Alamos National Laboratory for the U.S. Department of Energy National Nuclear Security Administration under contract DE-AC52-06NA25396. LANS is a mission-centric Federally Funded Research and Development Center focused on solving the most critical national security challenges through science and engineering for both government and private customers.

  4. Outsourcing information security

    CERN Document Server

    Axelrod, Warren

    2004-01-01

    This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

  5. Information security management principles

    CERN Document Server

    Taylor, Andy; Finch, Amanda; Sutton, David; Taylor, Andy

    2013-01-01

    In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources.

  6. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  7. An approach for investigation of secure access processes at a combined e-learning environment

    Science.gov (United States)

    Romansky, Radi; Noninska, Irina

    2017-12-01

    The article discuses an approach to investigate processes for regulation the security and privacy control at a heterogenous e-learning environment realized as a combination of traditional and cloud means and tools. Authors' proposal for combined architecture of e-learning system is presented and main subsystems and procedures are discussed. A formalization of the processes for using different types resources (public, private internal and private external) is proposed. The apparatus of Markovian chains (MC) is used for modeling and analytical investigation of the secure access to the resources is used and some assessments are presented.

  8. Analytic trigonometry

    CERN Document Server

    Bruce, William J; Maxwell, E A; Sneddon, I N

    1963-01-01

    Analytic Trigonometry details the fundamental concepts and underlying principle of analytic geometry. The title aims to address the shortcomings in the instruction of trigonometry by considering basic theories of learning and pedagogy. The text first covers the essential elements from elementary algebra, plane geometry, and analytic geometry. Next, the selection tackles the trigonometric functions of angles in general, basic identities, and solutions of equations. The text also deals with the trigonometric functions of real numbers. The fifth chapter details the inverse trigonometric functions

  9. Analytical Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Analytical Labspecializes in Oil and Hydraulic Fluid Analysis, Identification of Unknown Materials, Engineering Investigations, Qualification Testing (to support...

  10. Energy security in Yemen

    International Nuclear Information System (INIS)

    Torosyan, Emil

    2009-09-01

    Yemen, situated in the Arab world, has considerable energy resources. However, its history of repeated revolts, civil wars and terrorism and also the presence of the Wahabi movement and al Qaeda in the country constitute security issues for the energy industry and its infrastructure. The aim of this paper is to assess the impact level on the security of the energy sector in Yemen and the effect that the threats to that sector could have on global energy security. Analyses of the political environment, the security threats and the measures taken to respond to these threats have been carried out. Results showed that Yemen's resources are depleting and that the government is having trouble containing the escalation of conflicts; this situation could lead to Yemen's political collapse which could have an important impact on global energy security.

  11. Water security evaluation in Yellow River basin

    Science.gov (United States)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  12. The Analysis of Pricing Power of Preponderant Metal Mineral Resources under the Perspective of Intergenerational Equity and Social Preferences: An Analytical Framework Based on Cournot Equilibrium Model

    Directory of Open Access Journals (Sweden)

    Meirui Zhong

    2014-01-01

    Full Text Available This paper combines intergenerational equity equilibrium and social preferences equilibrium with Cournot equilibrium solving the technological problem of intergenerational equity and strategic value compensation confirmation, achieving the effective combination between sustainable development concept and value evaluation, thinking and expanding the theoretical framework for the lack of pricing power of mineral resources. The conclusion of the theoretical model and the numerical simulation shows that intergenerational equity equilibrium and social preferences equilibrium enhance international trade market power of preponderant metal mineral resources owing to the production of intergenerational equity compensation value and strategic value. However, the impact exerted on Cournot market power by social preferences is inconsistent: that is, changes of altruistic Cournot equilibrium and reciprocal inequity Cournot equilibrium are consistent, while inequity aversion Cournot equilibrium has the characteristic of loss aversion, namely, under the consideration of inequity aversion Cournot competition, Counot-Nash equilibrium transforms monotonically with sympathy and jealousy of inequity aversion.

  13. SecurID

    CERN Multimedia

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  14. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  15. Analytic geometry

    CERN Document Server

    Burdette, A C

    1971-01-01

    Analytic Geometry covers several fundamental aspects of analytic geometry needed for advanced subjects, including calculus.This book is composed of 12 chapters that review the principles, concepts, and analytic proofs of geometric theorems, families of lines, the normal equation of the line, and related matters. Other chapters highlight the application of graphing, foci, directrices, eccentricity, and conic-related topics. The remaining chapters deal with the concept polar and rectangular coordinates, surfaces and curves, and planes.This book will prove useful to undergraduate trigonometric st

  16. Emerging trends in ICT security

    CERN Document Server

    Akhgar, Babak

    2013-01-01

    Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a multidisciplinary approach

  17. Analytical results and sample locality map for rock, stream-sediment, and soil samples, Northern and Eastern Coloado Desert BLM Resource Area, Imperial, Riverside, and San Bernardino Counties, California

    Science.gov (United States)

    King, Harley D.; Chaffee, Maurice A.

    2000-01-01

    INTRODUCTION In 1996-1998 the U.S. Geological Survey (USGS) conducted a geochemical study of the Bureau of Land Management's (BLM) 5.5 million-acre Northern and Eastern Colorado Desert Resource Area (usually referred to as the NECD in this report), Imperial, Riverside, and San Bernardino Counties, southeastern California (figure 1). This study was done in support of the BLM's Coordinated Management Plan for the area. This report presents analytical data from this study. To provide comprehensive coverage of the NECD, we compiled and examined all available geochemical data, in digital form, from previous studies in the area, and made sample-site plots to aid in determining where sample-site coverage and analyses were sufficient, which samples should be re-analyzed, and where additional sampling was needed. Previous investigations conducted in parts of the current study area included the National Uranium Resource Evaluation (NURE) program studies of the Needles and Salton Sea 1? x 2? quadrangles; USGS studies of 12 BLM Wilderness Study Areas (WSAs) (Big Maria Mountains, Chemehuevi Mountains, Chuckwalla Mountains, Coxcomb Mountains, Mecca Hills, Orocopia Mountains, Palen-McCoy, Picacho Peak, Riverside Mountains, Sheephole Valley (also known as Sheep Hole/Cadiz), Turtle Mountains, and Whipple Mountains); and USGS studies in the Needles and El Centro 1? x 2? quadrangles done during the early 1990s as part of a project to identify the regional geochemistry of southern California. Areas where we did new sampling of rocks and stream sediments are mainly in the Chocolate Mountain Aerial Gunnery Range and in Joshua Tree National Park, which extends into the west-central part of the NECD, as shown in figure 1 and figure 2. This report contains analytical data for 132 rock samples and 1,245 stream-sediment samples collected by the USGS, and 362 stream-sediment samples and 189 soil samples collected during the NURE program. All samples are from the Northern and Eastern Colorado

  18. An investigation of the challenges of the strategic human resources management in the safety and security sector education training authority (SASSETA) / Stephina Pulane Molefi

    OpenAIRE

    Molefi, Stephina Pulane

    2011-01-01

    The purpose of th1e study was to investigate the challenges in the implementation of the strategic human resource management functions and practices in SASSETA. The study investigated the impact of organisational structure, the positioning and reporting lines on the ability of the Human Resource Professionals to become strategic business partners. The study further investigated whether the Human Resource Practitioners possess the relevant competencies that contribute towards th...

  19. Analytical chemistry

    Energy Technology Data Exchange (ETDEWEB)

    Chae, Myeong Hu; Lee, Hu Jun; Kim, Ha Seok

    1989-02-15

    This book give explanations on analytical chemistry with ten chapters, which deal with development of analytical chemistry, the theory of error with definition and classification, sample and treatment gravimetry on general process of gravimetry in aqueous solution and non-aqueous solution, precipitation titration about precipitation reaction and types, complexometry with summary and complex compound, oxidation-reduction equilibrium on electrode potential and potentiometric titration, solvent extraction and chromatograph and experiment with basic operation for chemical experiment.

  20. Analytical chemistry

    International Nuclear Information System (INIS)

    Chae, Myeong Hu; Lee, Hu Jun; Kim, Ha Seok

    1989-02-01

    This book give explanations on analytical chemistry with ten chapters, which deal with development of analytical chemistry, the theory of error with definition and classification, sample and treatment gravimetry on general process of gravimetry in aqueous solution and non-aqueous solution, precipitation titration about precipitation reaction and types, complexometry with summary and complex compound, oxidation-reduction equilibrium on electrode potential and potentiometric titration, solvent extraction and chromatograph and experiment with basic operation for chemical experiment.

  1. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    physical protection system is not covered by such studies, since this type of detection gives no information on either the effectiveness or the reliability of the MC and A systems. A critical scenario is defined as one which leads to discrepancies involving substantial amounts of NM or for which the detection delay is long. Special care is taken when analysing these scenarios. For critical scenarios, sensitivity analysis could be made to determine the smallest quantity of NM the disappearance of which could be detected or the criteria leading to the detection of the disappearance in the control system or in the accounting system. The threats taken into account are identified with reference to the design basis threat specified by the competent authority. Both internal and external threats are taken in account. Internal threats are defined as attempts by insiders to steal quantities of nuclear material, either once or on several occasions; accumulating these quantities leads to a significant quantity of NM. External threats are defined as attempts by groups of aggressors to steal significant amounts of nuclear material. Two hypotheses are taken into account to test the ability of the physical protection system to counter threats of this type. The first is based on a small group of aggressors with limited resources and the second involves a larger team with more sophisticated resources. Of course security studies have to be carried out in compliance with the corresponding confidentiality rules. In addition, such studies have to be regularly updated, notably if significant modifications are made in the MC and A or PP systems. It is important that security studies are available in the facilities for competent personnel, as it gives the rationale behind control and protection of NM. In particular, it could be used, in a performance-based approach, to support analysis reports or to illustrate that the required level of security has been reached. (author)

  2. Research review of nongovernmental organizations' security policies for humanitarian programs in war, conflict, and postconflict environments.

    Science.gov (United States)

    Rowley, Elizabeth; Burns, Lauren; Burnham, Gilbert

    2013-06-01

    To identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages. The authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security Standards as the basis for a review framework. The most commonly cited standards include analytical security issues such as threat and risk assessment processes and guidance on acceptance, protection, and deterrence approaches. Among the least commonly cited standards were considering security threats to national staff during staffing decision processes, incorporating security awareness into job descriptions, and ensuring that national staff security issues are addressed in trainings. NGO staff receive security-related messages through multiple document types, but only 12 of the 20 organizations have a distinct security policy document. Points of convergence across organizations in the content of commonly cited standards were found in many areas, but differences in security risk and threat assessment guidance may undermine communication between aid workers about changes in local security environments. Although the humanitarian community has experienced significant progress in the development of practical staff security guidance during the past 10 years, gaps remain that can hinder efforts to garner needed resources, clarify security responsibilities, and ensure that the distinct needs of national staff are recognized and addressed.

  3. Emerging energy security issues: Natural gas in the Gulf Nations, An overview of Middle East resources, export potentials, and markets. Report Series No. 4

    International Nuclear Information System (INIS)

    Ripple, R.D.; Hagen, R.E.

    1995-09-01

    This paper proceeds with a presentation of the natural gas resource base of the Gulf nations of the Middle East. The resource base is put in the context of the world natural gas resource and trade flows. This is followed by a discussion of the existing and planned project to move Gulf natural gas to consuming regions. Then a discussion of the source of demand in the likely target markets for the Gulf resource follows. Next, the nature of LNG pricing is discussed. A brief summary concludes the paper

  4. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  5. Information-analytical maintenance of AIC at regional level

    OpenAIRE

    MOYSEENKO I.P.

    2013-01-01

    Submitted approaches to system information and analytical support regional management. Formulated methodology of information and analytical support regional agribusiness management with regard to models of EHS and security settings. Describe the nature and function of monitoring objects of study.

  6. Forest service access to and use of the Germplasm Information Network (GRIN-Global) database and security backup at the National Laboratory for Genetic Resource Preservation

    Science.gov (United States)

    B. Loth; R.P. Karrfalt

    2017-01-01

    The U.S. Department of Agriculture Forest Service (USDA FS) National Seed Laboratory (NSL) began long term seed storage for genetic conservation, in 2005, for USDA FS units and cooperators. This program requires secure storage of both seeds and the data documenting the identification of the seeds. The Agricultural Research Service (ARS) has provided both of these...

  7. A Security Checklist for ERP Implementations

    Science.gov (United States)

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  8. Security in cloud computing

    OpenAIRE

    Moreno Martín, Oriol

    2016-01-01

    Security in Cloud Computing is becoming a challenge for next generation Data Centers. This project will focus on investigating new security strategies for Cloud Computing systems. Cloud Computingisarecent paradigmto deliver services over Internet. Businesses grow drastically because of it. Researchers focus their work on it. The rapid access to exible and low cost IT resources on an on-demand fashion, allows the users to avoid planning ahead for provisioning, and enterprises to save money ...

  9. Analytical mechanics

    CERN Document Server

    Lemos, Nivaldo A

    2018-01-01

    Analytical mechanics is the foundation of many areas of theoretical physics including quantum theory and statistical mechanics, and has wide-ranging applications in engineering and celestial mechanics. This introduction to the basic principles and methods of analytical mechanics covers Lagrangian and Hamiltonian dynamics, rigid bodies, small oscillations, canonical transformations and Hamilton–Jacobi theory. This fully up-to-date textbook includes detailed mathematical appendices and addresses a number of advanced topics, some of them of a geometric or topological character. These include Bertrand's theorem, proof that action is least, spontaneous symmetry breakdown, constrained Hamiltonian systems, non-integrability criteria, KAM theory, classical field theory, Lyapunov functions, geometric phases and Poisson manifolds. Providing worked examples, end-of-chapter problems, and discussion of ongoing research in the field, it is suitable for advanced undergraduate students and graduate students studying analyt...

  10. Analytical quadrics

    CERN Document Server

    Spain, Barry; Ulam, S; Stark, M

    1960-01-01

    Analytical Quadrics focuses on the analytical geometry of three dimensions. The book first discusses the theory of the plane, sphere, cone, cylinder, straight line, and central quadrics in their standard forms. The idea of the plane at infinity is introduced through the homogenous Cartesian coordinates and applied to the nature of the intersection of three planes and to the circular sections of quadrics. The text also focuses on paraboloid, including polar properties, center of a section, axes of plane section, and generators of hyperbolic paraboloid. The book also touches on homogenous coordi

  11. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  12. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  13. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  14. Semi-analytical MBS Pricing

    DEFF Research Database (Denmark)

    Rom-Poulsen, Niels

    2007-01-01

    This paper presents a multi-factor valuation model for fixed-rate callable mortgage backed securities (MBS). The model yields semi-analytic solutions for the value of MBS in the sense that the MBS value is found by solving a system of ordinary differential equations. Instead of modelling the cond......This paper presents a multi-factor valuation model for fixed-rate callable mortgage backed securities (MBS). The model yields semi-analytic solutions for the value of MBS in the sense that the MBS value is found by solving a system of ordinary differential equations. Instead of modelling...... interest rate model. However, if the pool size is specified in a way that makes the expectations solvable using transform methods, semi-analytic pricing formulas are achieved. The affine and quadratic pricing frameworks are combined to get flexible and sophisticated prepayment functions. We show...

  15. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  16. The cellulose resource matrix

    NARCIS (Netherlands)

    Keijsers, E.R.P.; Yilmaz, G.; Dam, van J.E.G.

    2013-01-01

    The emerging biobased economy is causing shifts from mineral fossil oil based resources towards renewable resources. Because of market mechanisms, current and new industries utilising renewable commodities, will attempt to secure their supply of resources. Cellulose is among these commodities, where

  17. Schedule Analytics

    Science.gov (United States)

    2016-04-30

    Warfare, Naval Sea Systems Command Acquisition Cycle Time : Defining the Problem David Tate, Institute for Defense Analyses Schedule Analytics Jennifer...research was comprised of the following high- level steps :  Identify and review primary data sources 1...research. However, detailed reviews of the OMB IT Dashboard data revealed that schedule data is highly aggregated. Program start date and program end date

  18. Safeguards resource management

    International Nuclear Information System (INIS)

    Strait, R.S.

    1986-01-01

    Protecting nuclear materials is a challenging problem for facility managers. To counter the broad spectrum of potential threats, facility managers rely on diverse safeguards measures, including elements of physical protection, material control and accountability, and human reliability programs. Deciding how to upgrade safeguards systems involves difficult tradeoffs between increased protection and the costs and operational impact of protection measures. Effective allocation of safeguards and security resources requires a prioritization of system upgrades based on a relative measure of upgrade benefits to upgrade costs. Analytical tools are needed to help safeguards managers measure the relative benefits and costs and allocate their limited resources to achieve balanced, cost-effective protection against the full spectrum of threats. This paper presents a conceptual approach and quantitative model that have been developed by Lawrence Livermore National Laboratory to aid safeguards managers. The model is in the preliminary stages of implementation, and an effort is ongoing to make the approach and quantitative model available for general use. The model, which is designed to complement existing nuclear safeguards evaluation tools, incorporates a variety of factors and integrates information on the likelihood of potential threats, safeguards capabilities to defeat threats, and the relative consequences if safeguards fail. The model uses this information to provide an overall measure for comparing safeguards upgrade projects at a facility

  19. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  20. Analytical Chemistry Laboratory (ACL) procedure compendium

    International Nuclear Information System (INIS)

    1992-06-01

    Covered are: analytical laboratory operations (ALO) sample receipt and control, ALO data report/package preparation review and control, single shell tank (PST) project sample tracking system, sample receiving, analytical balances, duties and responsibilities of sample custodian, sample refrigerator temperature monitoring, security, assignment of staff responsibilities, sample storage, data reporting, and general requirements for glassware

  1. Analytical chemistry

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jae Seong

    1993-02-15

    This book is comprised of nineteen chapters, which describes introduction of analytical chemistry, experimental error and statistics, chemistry equilibrium and solubility, gravimetric analysis with mechanism of precipitation, range and calculation of the result, volume analysis on general principle, sedimentation method on types and titration curve, acid base balance, acid base titration curve, complex and firing reaction, introduction of chemical electro analysis, acid-base titration curve, electrode and potentiometry, electrolysis and conductometry, voltammetry and polarographic spectrophotometry, atomic spectrometry, solvent extraction, chromatograph and experiments.

  2. Analytical chemistry

    International Nuclear Information System (INIS)

    Choi, Jae Seong

    1993-02-01

    This book is comprised of nineteen chapters, which describes introduction of analytical chemistry, experimental error and statistics, chemistry equilibrium and solubility, gravimetric analysis with mechanism of precipitation, range and calculation of the result, volume analysis on general principle, sedimentation method on types and titration curve, acid base balance, acid base titration curve, complex and firing reaction, introduction of chemical electro analysis, acid-base titration curve, electrode and potentiometry, electrolysis and conductometry, voltammetry and polarographic spectrophotometry, atomic spectrometry, solvent extraction, chromatograph and experiments.

  3. Analytical chemistry

    International Nuclear Information System (INIS)

    Anon.

    1985-01-01

    The division for Analytical Chemistry continued to try and develope an accurate method for the separation of trace amounts from mixtures which, contain various other elements. Ion exchange chromatography is of special importance in this regard. New separation techniques were tried on certain trace amounts in South African standard rock materials and special ceramics. Methods were also tested for the separation of carrier-free radioisotopes from irradiated cyclotron discs

  4. Assessing the feasibility of integrating ecosystem-based with engineered water resource governance and management for water security in semi-arid landscapes: A case study in the Banas catchment, Rajasthan, India.

    Science.gov (United States)

    Everard, Mark; Sharma, Om Prakash; Vishwakarma, Vinod Kumar; Khandal, Dharmendra; Sahu, Yogesh K; Bhatnagar, Rahul; Singh, Jitendra K; Kumar, Ritesh; Nawab, Asghar; Kumar, Amit; Kumar, Vivek; Kashyap, Anil; Pandey, Deep Narayan; Pinder, Adrian C

    2018-01-15

    Much of the developing world and areas of the developed world suffer water vulnerability. Engineering solutions enable technically efficient extraction and diversion of water towards areas of demand but, without rebalancing resource regeneration, can generate multiple adverse ecological and human consequences. The Banas River, Rajasthan (India), has been extensively developed for water diversion, particularly from the Bisalpur Dam from which water is appropriated by powerful urban constituencies dispossessing local people. Coincidentally, abandonment of traditional management, including groundwater recharge practices, is leading to increasingly receding and contaminated groundwater. This creates linked vulnerabilities for rural communities, irrigation schemes, urban users, dependent ecosystems and the multiple ecosystem services that they provide, compounded by climate change and population growth. This paper addresses vulnerabilities created by fragmented policy measures between rural development, urban and irrigation water supply and downstream consequences for people and wildlife. Perpetuating narrowly technocentric approaches to resource exploitation is likely only to compound emerging problems. Alternatively, restoration or innovation of groundwater recharge practices, particularly in the upper catchment, can represent a proven, ecosystem-based approach to resource regeneration with linked beneficial socio-ecological benefits. Hybridising an ecosystem-based approach with engineered methods can simultaneously increase the security of rural livelihoods, piped urban and irrigation supplies, and the vitality of river ecosystems and their services to beneficiaries. A renewed policy focus on local-scale water recharge practices balancing water extraction technologies is consistent with emerging Rajasthani policies, particularly Jal Swavlamban Abhiyan ('water self-reliance mission'). Policy reform emphasising recharge can contribute to water security and yield socio

  5. Analysis On Security Of Cloud Computing

    Directory of Open Access Journals (Sweden)

    Muhammad Zunnurain Hussain

    2017-01-01

    Full Text Available In this paper Author will be discussing the security issues and challenges faced by the industry in securing the cloud computing and how these problems can be tackled. Cloud computing is modern technique of sharing resources like data sharing file sharing basically sharing of resources without launching own infrastructure and using some third party resources to avoid huge investment . It is very challenging these days to secure the communication between two users although people use different encryption techniques 1.

  6. To Globalise or Not to Globalise? "Inward-Looking Youth" as Scapegoats for Japan's Failure to Secure and Cultivate "Global Human Resources"

    Science.gov (United States)

    Burgess, Chris

    2015-01-01

    In Japan in recent years, there has been much discussion of the need for global human resources alongside criticism of Japanese youth as having an "inward-looking" ("uchimuki") orientation. Drawing out the contradictions apparent in a youth apparently reluctant to leave Japan and companies, universities and government seemingly…

  7. Secure Environments for Collaboration among Ubiquitous Roaming Entities

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2002-01-01

    SECURE is a newly started IST project, which addresses secure collaboration among computational entities in emerging global computing systems. The properties of these systems introduce new security challenges that are not adequately addressed by existing security models and mechanisms. The scale ...... and uncertainty of this global computing environment invalidates existing security models. Instead, new security models have to be developed along with new security mechanisms that control access to protected resources.......SECURE is a newly started IST project, which addresses secure collaboration among computational entities in emerging global computing systems. The properties of these systems introduce new security challenges that are not adequately addressed by existing security models and mechanisms. The scale...

  8. Security Management Model in Cloud Computing Environment

    OpenAIRE

    Ahmadpanah, Seyed Hossein

    2016-01-01

    In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge. In order to address security issues cloud computing virtualization environment, this paper presents a virtual machine based on efficient and dynamic deployment VM security management model state migration and scheduling, study of which virtual machine security architecture, based on AHP (Analytic Hierarchy Process) virtual machine de...

  9. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  10. Web application security: a beginner's guide

    National Research Council Canada - National Science Library

    Sullivan, Bryan; Liu, Vincent

    2012-01-01

    .... This practical resource includes chapters on authentication, authorization, and session management, along with browser, database, and file security--all supported by true stories from industry...

  11. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Creation of Participant... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A... Security Entitlement of a Participant in favor of the United States to secure deposits of public money...

  12. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  13. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  14. An operational utility assessment [electronic resource]: measuring the effectiveness of the Joint Concept Technology Demonstration (JCTD), Joint Forces Protection Advance Security System (JFPASS)

    OpenAIRE

    McGovern, Mark; Mayor, Jeffrey D.; Symmes, Joseph

    2008-01-01

    MBA Professional Report Planning modern military operations requires an accurate intelligence assessment of potential threats, combined with a detailed assessment of the physical theater of operations. This information can then be combined with equipment and manpower resources to set up a logistically supportable operation that mitigates as much of the enemy threat as possible. Given such a daunting challenge, military planners often turn to intelligent software agents to support their...

  15. Analysis of the nexus between population, water resources and Global Food Security highlights significance of governance and research investments and policy priorities.

    Science.gov (United States)

    Yunusa, Isa A M; Zerihun, Ayalsew; Gibberd, Mark R

    2018-05-10

    Analyses of sensitivity of Global Food Security (GFS) score to a key set of supply or demand factors often suggest population and water supply as being the most critical and on which policies tend to focus. To explore other policy options, we characterised the nexus between GFS and a set of supply or demand factors including defining including population, agricultural and industrial water-use, agricultural publications (as a surrogate for investment in agricultural research and development [R&D]), and corruption perception index (CPI), to reveal opportunities for attaining enduring GFS. We found that despite being the primary driver of demand for food, population showed no significant correlation with GFS scores. Similarly agricultural water-use was poorly correlated with GFS scores, except in countries where evaporation exceeds precipitation and irrigation is significant. However, GFS had a strong positive association with industrial water-use as a surrogate for overall industrialisation. Recent expansions in cultivated land area failed to yield concomitant improvements in GFS score since such expansions have been mostly into marginal lands with low productivity and also barely compensated for lands retired from cropping in several developed economies. However, GFS was positively associated with agricultural R&D investments, as it was with the CPI scores. The apparent and relative strengths of these drivers on GFS outcome amongst countries were in the order: industrial water-use ≈ publication rate ≈ corruption perception > agricultural water-use > population. We concluded by suggesting that to enshrine enduring food security, policies should prioritise (1) increased R&D investments that address farmer needs, and (2) governance mechanisms that promote accountability in both research and production value chains. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  16. Railway infrastructure security

    CERN Document Server

    Sforza, Antonio; Vittorini, Valeria; Pragliola, Concetta

    2015-01-01

    This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railway infrastructure security. Based on analyses by academics, technology providers, and railway operators, it explains how to assess terrorist and criminal threats, design countermeasures, and implement effective security strategies. In so doing, it draws upon a range of experiences from different countries in Europe and beyond. The book is the first to be devoted entirely to this subject. It will serve as a timely reminder of the attractiveness of the railway infrastructure system as a target for criminals and terrorists and, more importantly, as a valuable resource for stakeholders and professionals in the railway security field aiming to develop effective security based on a mix of methodological, technological, and organizational tools. Besides researchers and decision makers in the field, the book will appeal to students interested in critical infrastructur...

  17. Assessing and managing security risk in IT systems a structured methodology

    CERN Document Server

    McCumber, John

    2004-01-01

    SECURITY CONCEPTSUsing ModelsIntroduction: Understanding, Selecting, and Applying Models Understanding AssetsLayered Security Using Models in Security Security Models for Information Systems Shortcomings of Models in SecuritySecurity in Context Reference Defining Information SecurityConfidentiality, Integrity, and Availability Information AttributesIntrinsic versus Imputed Value Information as an Asset The Elements of Security Security Is Security Only in Context Information as an Asset Introduction Determining Value Managing Information Resources ReferencesUnderstanding Threat and Its Relatio

  18. Política de segurança alimentar e nutricional no Brasil: uma análise da alocação de recursos Food and nutrition security policy in Brazil: an analysis of resource allocation

    Directory of Open Access Journals (Sweden)

    Marta Battaglia Custódio

    2013-02-01

    maintained by the Brazilian Public Sector Internal Control Office. Search results were exported to Excel spreadsheets. To determine the resources allocated to food security initiatives, a database was set up containing all actions developed by the federal government between 2004 and 2010. This database was reviewed and the actions that were not related to PNSAN were discarded. The annual amounts obtained were corrected by the Consumer Price Index and updated for the year 2010. Since actions are part of specific programs, the sum of the resources allocated for all the actions of a program amounted to the resources invested in the program as a whole. The programs were then prioritized according to the amount of resources received in 2010. RESULTS: Of the 5 014 actions receiving federal funds in the study period, 814 were related to PNSAN (229 programs. There was growth in resources allocated for PNSAN programs, reaching US$ 15 billion in 2010 (an 82% increase over the previous year. The largest amount was invested in Bolsa Família, a cash transfer program. Ten programs received 90% of the funds, of which five were linked to food production processes. CONCLUSIONS: The amount of resources invested in the PNSAN and in actions and programs that promote food and nutrition security is increasing in Brazil.

  19. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  20. Security Components of Globalization

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2015-05-01

    Full Text Available The objective of this paper is our intention to present what are the main connections between globalization and international security. In terms of global security we can perceive the globalization as a process by which global state is represented by the UN, with a single world system, represented by major security organizations and with global effects. We will present from the beginning the main theoretical aspects that define the phenomenon of globalization, and then our contribution in assessing the implications of this phenomenon on the regional and global security. The results of our research are materialized in the last part of the paper. They emphasize the personal assessments on how the phenomenon of globalization has direct effect on global security. When talking about government, we think of norms, rules and decisionmaking procedures in the management of international life. The value that we add to the new scientific interpretation of the definition of globalization is represented, primarily, by the valuable bibliographic used resources and the original approach on the concept that refers to the links between globalization and security. This article may be, at any time, a starting point in an interesting research direction in the field of global security.

  1. Cyber security in digitalized nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Sohn, Kwang Young; Yi, Woo June [KoRTS Co., Ltd., Daejeon (Korea, Republic of)

    2008-10-15

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully.

  2. Cyber security in digitalized nuclear power plants

    International Nuclear Information System (INIS)

    Sohn, Kwang Young; Yi, Woo June

    2008-01-01

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully

  3. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security

    National Research Council Canada - National Science Library

    Ganger, Gregory

    2000-01-01

    This report contains the technical content of a recent funding proposal. In it, we propose a new approach to network security in which each individual device erects its own security perimeter and defends its own critical resources...

  4. Cloud Computing Security: A Survey

    Directory of Open Access Journals (Sweden)

    Issa M. Khalil

    2014-02-01

    Full Text Available Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, create new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for traditional computing systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide a comprehensive study of cloud computing security and privacy concerns. We identify cloud vulnerabilities, classify known security threats and attacks, and present the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks. Additionally, we investigate and identify the limitations of the current solutions and provide insights of the future security perspectives. Finally, we provide a cloud security framework in which we present the various lines of defense and identify the dependency levels among them. We identify 28 cloud security threats which we classify into five categories. We also present nine general cloud attacks along with various attack incidents, and provide effectiveness analysis of the proposed countermeasures.

  5. Climate change, security risks and conflict reduction in Africa. A case study of farmer-herder conflicts over natural resources in Cote d'Ivoire, Ghana and Burkina Faso 1960-2000

    International Nuclear Information System (INIS)

    Cabot, Charlene

    2017-01-01

    Millions of people are already affected by weather-related shocks every year in West Africa and climate change is highly likely to increase these threats. In the wake of climate change, rising temperatures, increasingly irregular rainfall and more frequent natural hazards will endanger the ways of life of vulnerable population groups in this region and destabilize their human security. A surge in violence and conflicts could take place. One of the conflict constellations could be between farmers and herders. These groups are highly vulnerable to climate change due to their dependence on natural resources Millions of people are already affected by weather-related shocks every year in West Africa and climate change is highly likely to increase these threats. In the wake of climate change, rising temperatures, increasingly irregular rainfall and more frequent natural hazards will endanger the ways of life of vulnerable population groups in this region and destabilize their human security. A surge in violence and conflicts could take place. One of the conflict constellations could be between farmers and herders. These groups are highly vulnerable to climate change due to their dependence on natural resources for their subsistence. Furthermore, they are historically prone to enter into conflict over issues of access to natural resources. However, social, economic and political circumstances fundamentally influence environmental conflicts. There might thus be opportunities to face the societal challenges of climate change in a peaceful way and the political and institutional framework could play an important role in reducing conflict and violence. In order to explore such a path, this study analyses the potential of political factors (policies and institutions) for the reduction of climate-change-induced or aggravated conflicts between farmers and herders. After a theoretical demonstration, a case study of agro-pastoral conflicts in Burkina Faso, Cote d'Ivoire, and Ghana

  6. Climate change, security risks and conflict reduction in Africa. A case study of farmer-herder conflicts over natural resources in Cote d'Ivoire, Ghana and Burkina Faso 1960-2000

    Energy Technology Data Exchange (ETDEWEB)

    Cabot, Charlene

    2017-02-01

    Millions of people are already affected by weather-related shocks every year in West Africa and climate change is highly likely to increase these threats. In the wake of climate change, rising temperatures, increasingly irregular rainfall and more frequent natural hazards will endanger the ways of life of vulnerable population groups in this region and destabilize their human security. A surge in violence and conflicts could take place. One of the conflict constellations could be between farmers and herders. These groups are highly vulnerable to climate change due to their dependence on natural resources Millions of people are already affected by weather-related shocks every year in West Africa and climate change is highly likely to increase these threats. In the wake of climate change, rising temperatures, increasingly irregular rainfall and more frequent natural hazards will endanger the ways of life of vulnerable population groups in this region and destabilize their human security. A surge in violence and conflicts could take place. One of the conflict constellations could be between farmers and herders. These groups are highly vulnerable to climate change due to their dependence on natural resources for their subsistence. Furthermore, they are historically prone to enter into conflict over issues of access to natural resources. However, social, economic and political circumstances fundamentally influence environmental conflicts. There might thus be opportunities to face the societal challenges of climate change in a peaceful way and the political and institutional framework could play an important role in reducing conflict and violence. In order to explore such a path, this study analyses the potential of political factors (policies and institutions) for the reduction of climate-change-induced or aggravated conflicts between farmers and herders. After a theoretical demonstration, a case study of agro-pastoral conflicts in Burkina Faso, Cote d'Ivoire, and

  7. Wastewater infrastructure for small cities in an urbanizing world: integrating protection of human health and the environment with resource recovery and food security.

    Science.gov (United States)

    Verbyla, Matthew E; Oakley, Stewart M; Mihelcic, James R

    2013-04-16

    The majority of population growth in developing countries will occur in small cities closely linked to agricultural zones, with poor access to water and sanitation. Wastewater management priorities in these regions will be different from those in larger cities and developed countries. Two wastewater treatment systems in Bolivia, one with an upflow anaerobic sludge blanket (UASB) reactor and polishing ponds, the other with three stabilization ponds, are assessed to determine their resource recovery potential. The UASB reactor produces biogas with 500-650 MJ per day. In six months, both systems discharge wastewater with the same mass of nutrients as fertilizers used to produce crops containing 10-75 days' worth of the recommended food energy intake for each person using the system. Both systems also discharge detectable levels of helminth eggs, Giardia cysts, and Cryptosporidium oocysts, but the UASB reactor system discharges higher concentrations, implying limited reuse potential. From a regional management standpoint, small cities should not expend resources to treat wastewater to levels suitable for discharge into surface waters. Rather, they should focus on removing pathogens to reclaim water and nutrients. Biogas recovery may be a priority that should be subservient to water and nutrient recovery in these settings.

  8. Analytical mechanics

    CERN Document Server

    Helrich, Carl S

    2017-01-01

    This advanced undergraduate textbook begins with the Lagrangian formulation of Analytical Mechanics and then passes directly to the Hamiltonian formulation and the canonical equations, with constraints incorporated through Lagrange multipliers. Hamilton's Principle and the canonical equations remain the basis of the remainder of the text. Topics considered for applications include small oscillations, motion in electric and magnetic fields, and rigid body dynamics. The Hamilton-Jacobi approach is developed with special attention to the canonical transformation in order to provide a smooth and logical transition into the study of complex and chaotic systems. Finally the text has a careful treatment of relativistic mechanics and the requirement of Lorentz invariance. The text is enriched with an outline of the history of mechanics, which particularly outlines the importance of the work of Euler, Lagrange, Hamilton and Jacobi. Numerous exercises with solutions support the exceptionally clear and concise treatment...

  9. Computers, business, and security the new role for security

    CERN Document Server

    Schweitzer, James A

    1987-01-01

    Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs.Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communicat

  10. SAF line analytical chemistry system

    International Nuclear Information System (INIS)

    Gerber, E.W.; Sherrell, D.L.

    1983-10-01

    An analytical chemistry system dedicated to supporting the Secure Automated Fabrication (SAF) line is discussed. Several analyses are required prior to the fuel pellets being loaded into cladding tubes to assure certification requirements will be met. These analyses, which will take less than 15 minutes, are described. The automated sample transport system which will be used to move pellets from the fabriction line to the chemistry area is also described

  11. Indicators for energy security

    International Nuclear Information System (INIS)

    Kruyt, Bert; Van Vuuren, D.P.; De Vries, H.J.M.; Groenenberg, H.

    2009-01-01

    The concept of energy security is widely used, yet there is no consensus on its precise interpretation. In this research, we have provided an overview of available indicators for long-term security of supply (SOS). We distinguished four dimensions of energy security that relate to the availability, accessibility, affordability and acceptability of energy and classified indicators for energy security according to this taxonomy. There is no one ideal indicator, as the notion of energy security is highly context dependent. Rather, applying multiple indicators leads to a broader understanding. Incorporating these indicators in model-based scenario analysis showed accelerated depletion of currently known fossil resources due to increasing global demand. Coupled with increasing spatial discrepancy between consumption and production, international trade in energy carriers is projected to have increased by 142% in 2050 compared to 2008. Oil production is projected to become increasingly concentrated in a few countries up to 2030, after which production from other regions diversifies the market. Under stringent climate policies, this diversification may not occur due to reduced demand for oil. Possible benefits of climate policy include increased fuel diversity and slower depletion of fossil resources. (author)

  12. A collection of books from Bielany in the Jagiellonian Library. Security, maintenance and availability of resources. A notice on the progress of work, June 2011

    Directory of Open Access Journals (Sweden)

    Jacek Partyka

    2011-12-01

    Full Text Available In the autumn of 2009 the Jagiellonian Library became the depositary of a large, valuable and interesting collection of printed books from the library of the Camaldolese Monastery in Bielany (Krakow. The work on processing the collection began almost immediately after all the prints had been taken over by the Jagiellonian Library. Two groups of employees have been involved in the work, both from the Resource Processing Department and the Antique Books Department, in line with the natural division into modern and old prints. The Camaldolese collection from Bielany has been enclosed in the monastery and unavailable to most readers; now the very books which for many years have been the source of knowledge, assistance and cognitive tools to a narrow circle of monks may be accessed by all interested persons. In the next year, after basic processing of the collection, the books will create an extremely interesting research opportunity.

  13. Security Problems in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Rola Motawie

    2016-12-01

    Full Text Available Cloud is a pool of computing resources which are distributed among cloud users. Cloud computing has many benefits like scalability, flexibility, cost savings, reliability, maintenance and mobile accessibility. Since cloud-computing technology is growing day by day, it comes with many security problems. Securing the data in the cloud environment is most critical challenges which act as a barrier when implementing the cloud. There are many new concepts that cloud introduces, such as resource sharing, multi-tenancy, and outsourcing, create new challenges for the security community. In this work, we provide a comparable study of cloud computing privacy and security concerns. We identify and classify known security threats, cloud vulnerabilities, and attacks.

  14. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  15. Guide to Savannah River Laboratory Analytical Services Group

    International Nuclear Information System (INIS)

    1990-04-01

    The mission of the Analytical Services Group (ASG) is to provide analytical support for Savannah River Laboratory Research and Development Programs using onsite and offsite analytical labs as resources. A second mission is to provide Savannah River Site (SRS) operations with analytical support for nonroutine material characterization or special chemical analyses. The ASG provides backup support for the SRS process control labs as necessary

  16. Guide to Savannah River Laboratory Analytical Services Group

    Energy Technology Data Exchange (ETDEWEB)

    1990-04-01

    The mission of the Analytical Services Group (ASG) is to provide analytical support for Savannah River Laboratory Research and Development Programs using onsite and offsite analytical labs as resources. A second mission is to provide Savannah River Site (SRS) operations with analytical support for nonroutine material characterization or special chemical analyses. The ASG provides backup support for the SRS process control labs as necessary.

  17. Security challenges for virtualization in cloud

    International Nuclear Information System (INIS)

    Tayab, A.

    2015-01-01

    Virtualization is a model that is vastly growing in IT industry. Virtualization provides more than one logical resource in one single physical machine. Infrastructure use cloud services and on behalf of virtualization, cloud computing is also a rapidly growing model of IT industry. Cloud provider and cloud user, both remain ignorant of each other's security. Since virtualization and cloud computing are rapidly expanding and becoming more and more complex in infrastructure, more security is required to protect them from potential attacks and security threats. Virtualization provides various benefits in terms of hardware utilization, resources protection, remote access and other resources. This paper intends to discuss the common exploits of security uses in the virtualized environment and focuses on the security threats from the attacker's perspective. This paper discuss the major areas of virtualized model environment and also address the security concerns. And finally presents a solution for secure valorization in IT infrastructure and to protect inter communication of virtual machines. (author)

  18. Plant pathogen culture collections: it takes a village to preserve these resources vital to the advancement of agricultural security and plant pathology.

    Science.gov (United States)

    Kang, Seogchan; Blair, Jaime E; Geiser, David M; Khang, Chang-Hyun; Park, Sook-Young; Gahegan, Mark; O'Donnell, Kerry; Luster, Douglas G; Kim, Seong H; Ivors, Kelly L; Lee, Yong-Hwan; Lee, Yin-Won; Grünwald, Niklaus J; Martin, Frank M; Coffey, Michael D; Veeraraghavan, Narayanan; Makalowska, Izabela

    2006-09-01

    ABSTRACT Plant pathogen culture collections are essential resources in our fight against plant disease and for connecting discoveries of the present with established knowledge of the past. However, available infrastructure in support of culture collections is in serious need of improvement, and we continually face the risk of losing many of these collections. As novel and reemerging plant pathogens threaten agriculture, their timely identification and monitoring depends on rapid access to cultures representing the known diversity of plant pathogens along with genotypic, phenotypic, and epidemiological data associated with them. Archiving such data in a format that can be easily accessed and searched is essential for rapid assessment of potential risk and can help track the change and movement of pathogens. The underexplored pathogen diversity in nature further underscores the importance of cataloguing pathogen cultures. Realizing the potential of pathogen genomics as a foundation for developing effective disease control also hinges on how effectively we use the sequenced isolate as a reference to understand the genetic and phenotypic diversity within a pathogen species. In this letter, we propose a number of measures for improving pathogen culture collections.

  19. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  20. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  1. The Underbelly of Global Security

    DEFF Research Database (Denmark)

    Mynster Christensen, Maya

    2015-01-01

    -militias, facilitated by a British security company and the Sierra Leone government. In doing so, the article contributes to the ongoing scholarly debate on the privatization of security by offering a “local” ethnographically informed perspective on the micro-dynamics of “global” security. It is argued that the supply......In the aftermath of the Sierra Leone civil war, demobilized militia soldiers have become an attractive resource to private security companies. Based on extensive ethnographic fieldwork, this article traces the outsourcing of security at American military bases in Iraq to Sierra Leonean ex...... of global security depends on a form of local immobility: on a population that is “stuck”, yet constantly on the move to seize opportunities for survival and recognition. Structured by a chronological account of the recruitment, deployment, and deportation of Sierra Leonean ex-militias, the article...

  2. Security Risk Assessment in Software Development Projects

    OpenAIRE

    Svendsen, Heidi

    2017-01-01

    Software security is increasing in importance, linearly with vulnerabilities caused by software flaws. It is not possible to spend all the project s resources on software security. To spend the resources given to security in an effective way, one should know what is most important to protect. By performing a risk analysis the project know which vulnerabilities they face. A risk analysis will prioritise the vulnerabilities, and when the vulnerabilities are prioritised the project know where th...

  3. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  4. Developments in analytical instrumentation

    Science.gov (United States)

    Petrie, G.

    The situation regarding photogrammetric instrumentation has changed quite dramatically over the last 2 or 3 years with the withdrawal of most analogue stereo-plotting machines from the market place and their replacement by analytically based instrumentation. While there have been few new developments in the field of comparators, there has been an explosive development in the area of small, relatively inexpensive analytical stereo-plotters based on the use of microcomputers. In particular, a number of new instruments have been introduced by manufacturers who mostly have not been associated previously with photogrammetry. Several innovative concepts have been introduced in these small but capable instruments, many of which are aimed at specialised applications, e.g. in close-range photogrammetry (using small-format cameras); for thematic mapping (by organisations engaged in environmental monitoring or resources exploitation); for map revision, etc. Another innovative and possibly significant development has been the production of conversion kits to convert suitable analogue stereo-plotting machines such as the Topocart, PG-2 and B-8 into fully fledged analytical plotters. The larger and more sophisticated analytical stereo-plotters are mostly being produced by the traditional mainstream photogrammetric systems suppliers with several new instruments and developments being introduced at the top end of the market. These include the use of enlarged photo stages to handle images up to 25 × 50 cm format; the complete integration of graphics workstations into the analytical plotter design; the introduction of graphics superimposition and stereo-superimposition; the addition of correlators for the automatic measurement of height, etc. The software associated with this new analytical instrumentation is now undergoing extensive re-development with the need to supply photogrammetric data as input to the more sophisticated G.I.S. systems now being installed by clients, instead

  5. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  6. Analytical Methods for Energy Diversity and Security. Portfolio Optimization in the Energy Sector: A Tribute to the work of Dr. Shimon Awerbuch. Chapter 6. Portfolio analysis of the future Dutch generating mix

    Energy Technology Data Exchange (ETDEWEB)

    Jansen, J.C.; Beurskens, L.W.M.

    2008-11-15

    This volume aims at professionals in academia, industry and government interested in the rapidly evolving area at the nexus between energy and climate change policy. The cutting-edge international contributions allow for a wide coverage of the topic. Energy Diversity and Security focuses on the consideration of financial risk in the energy sector. It describes how tools borrowed from financial economic theory, in particular mean-variance portfolio theory, can provide insights on the costs and benefits of diversity, and thus inform investment decision making in conditions of uncertainty. It gives the reader an in-depth understanding of how to manage risk at a time when the world's focus is on this area. The book provides insights from leading authorities in the area of energy security. It gives readers abundant, rigorous analysis and guidance at a critical time in facing the twin challenges of energy security and climate change. The book also highlights the role of clean energy technology in moving towards future diverse and intelligent electricity systems. In this chapter the portfolio of the future Dutch generating mix is analyzed.

  7. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  8. FOOD SECURITY IN ROMANIA

    Directory of Open Access Journals (Sweden)

    Silviu STANCIU

    2015-12-01

    Full Text Available The increasing world population, the limitation of the natural availability for food production, the climate issues and the food consumption need for modification imposed a continuous updating of the food security concept. Although Romania has sufficient natural resources, which may ensure, by means of proper exploitation, the population’s food needs, the lack of a unitary approach at the government level, materialized in the dependence on imports and in fluctuations in the agro-food production, leads to a re-evaluation of national food needs. National food security may be affected by a series of risks and threats, which appeared due to an imbalance connected with the availability, the utility and the stability of the agro-food sector, interdependent elements that must be functional. The present article proposes an analysis of food security in Romania, with a short presentation of the concept in an international context.

  9. Comprehensive evaluation of ecological security in mining area based on PSR-ANP-GRAY.

    Science.gov (United States)

    He, Gang; Yu, Baohua; Li, Shuzhou; Zhu, Yanna

    2017-09-06

    With the large exploitation of mineral resources, a series of problems have appeared in the ecological environment of the mining area. Therefore, evaluating the ecological security of mining area is of great significance to promote its healthy development. In this paper, the evaluation index system of ecological security in mining area was constructed from three dimensions of nature, society and economy, combined with Pressure-State-Response framework model. Then network analytic hierarchy process and GRAY relational analysis method were used to evaluate the ecological security of the region, and the weighted correlation degree of ecological security was calculated through the index data of a coal mine from 2012 to 2016 in China. The results show that the ecological security in the coal mine area is on the rise as a whole, though it alternatively rose and dropped from 2012 to 2016. Among them, the ecological security of the study mining area is at the general security level from 2012 to 2015, and at a relatively safe level in 2016. It shows that the ecological environment of the study mining area can basically meet the requirement of the survival and development of the enterprises.

  10. Post-Closure Report for Closed Resource Conservation and Recovery Act Corrective Action Units, Nevada National Security Site, Nevada for Fiscal Year 2011 (October 2010-September 2011)

    International Nuclear Information System (INIS)

    2012-01-01

    This report serves as the combined annual report for post-closure activities for the following closed Corrective Action Units (CAUs): (1) CAU 90, Area 2 Bitcutter Containment; (2) CAU 91, Area 3 U-3fi Injection Well; (3) CAU 92, Area 6 Decon Pond Facility; (4) CAU 110, Area 3 WMD U-3ax/bl Crater; and (5) CAU 112, Area 23 Hazardous Waste Trenches. This report covers fiscal year 2011 (October 2010-September 2011). The post-closure requirements for these sites are described in Resource Conservation and Recovery Act Permit Number NEV HW0101 and summarized in each CAU-specific section in Section 1.0 of this report. Site inspections are conducted semiannually at CAUs 90 and 91 and quarterly at CAUs 92, 110, and 112. Additional inspections are conducted at CAU 92 if precipitation occurs in excess of 0.50 inches in a 24-hour period. Inspections include an evaluation of the condition of the units and identification of any deficiencies that may compromise the integrity of the units. The condition of covers, fencing, signs, gates, and locks is documented. In addition, soil moisture monitoring and subsidence surveys are conducted at CAU 110. The results of the inspections, summary of maintenance activities, results of vegetations surveys, and analysis of monitoring data are presented in this report. Copies of the inspection checklists are included as Appendix A. Field notes completed during each inspection are included in Appendix B. Photographs taken during the inspections are included in Appendix C. It is recommended to continue semiannual inspections at CAUs 90 and 91; quarterly inspections at CAUs 92, 110, and 112; and additional inspections at CAU 92 if precipitation occurs in excess of 0.50 inches in a 24-hour period. At CAU 92, it is recommended to remove the wave barriers, as they have not proven to be necessary to protect the cover. At CAU 110, it is recommended to continue annual vegetation monitoring and soil moisture monitoring, and to reduce the frequency of

  11. Improving Network Security with Watchguard UTM Firewall

    OpenAIRE

    Lehmonen, Harri

    2017-01-01

    After working many years in close contact with end customers, the author has noticed that Finnish small and mid-size businesses are not paying as much attention to network security threats as they should. Even though different kind of security threats are probably present and reported often in news, very basic security practices are discarded and no resources are spent advancing the issue. The topic of this thesis is Improving Network Security with Watchguard’s UTM Firewall. It focuses o...

  12. Selecting Optimal Subset of Security Controls

    OpenAIRE

    Yevseyeva, I.; Basto-Fernandes, V.; Michael, Emmerich, T. M.; Moorsel, van, A.

    2015-01-01

    Open Access journal Choosing an optimal investment in information security is an issue most companies face these days. Which security controls to buy to protect the IT system of a company in the best way? Selecting a subset of security controls among many available ones can be seen as a resource allocation problem that should take into account conflicting objectives and constraints of the problem. In particular, the security of the system should be improved without hindering productivity, ...

  13. Security measures required for HIPAA privacy.

    Science.gov (United States)

    Amatayakul, M

    2000-01-01

    HIPAA security requirements include administrative, physical, and technical services and mechanisms to safeguard confidentiality, availability, and integrity of health information. Security measures, however, must be implemented in the context of an organization's privacy policies. Because HIPAA's proposed privacy rules are flexible and scalable to account for the nature of each organization's business, size, and resources, each organization will be determining its own privacy policies within the context of the HIPAA requirements and its security capabilities. Security measures cannot be implemented in a vacuum.

  14. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  15. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  16. School Library Supplement. Putting Your Library Automation System to Work [and] Using Videodiscs in Research Projects [and] Library Security: What to Look For [and] Expanding Library/Media Services with Media Retrieval [and] How to Network CD-ROMs (and) The School Library Resource Directory.

    Science.gov (United States)

    Karpisek, Marian; And Others

    1995-01-01

    Presents five articles and a company resource directory to help librarians successfully incorporate technology into school libraries. Discusses actual situations, examines student needs, and gives advice to help librarians with library automation systems, videodiscs, library security systems, media retrieval, networking CD-ROMs, and locating…

  17. Moving towards Cloud Security

    OpenAIRE

    Edit Szilvia Rubóczki; Zoltán Rajnai

    2015-01-01

    Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment th...

  18. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  19. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  20. Consumer energy conservation policy. An analytical approach

    Energy Technology Data Exchange (ETDEWEB)

    McDougall, G.H.G.; Ritchie, J.R.B.

    1984-06-01

    To capture the potential energy savings available in the consumer sector an analytical approach to conservation policy is proposed. A policy framework is described and the key constructs including a payoff matrix analysis and a consumer impact analysis are discussed. Implications derived from the considerable amount of prior consumer research are provided to illustrate the effect on the design and implementation of future programmes. The result of this analytical approach to conservation policy - economic stability and economic security - are goals well worth pursuing.

  1. Secure Route Structures for Parallel Mobile Agents Based Systems Using Fast Binary Dispatch

    Directory of Open Access Journals (Sweden)

    Yan Wang

    2005-01-01

    Full Text Available In a distributed environment, where a large number of computers are connected together to enable the large-scale sharing of data and computing resources, agents, especially mobile agents, are the tools for autonomously completing tasks on behalf of their owners. For applications of large-scale mobile agents, security and efficiency are of great concern. In this paper, we present a fast binary dispatch model and corresponding secure route structures for mobile agents dispatched in parallel to protect the dispatch routes of agents while ensuring the dispatch efficiency. The fast binary dispatch model is simple but efficient with a dispatch complexity of O(log2n. The secure route structures adopt the combination of public-key encryption and digital signature schemes and expose minimal route information to hosts. The nested structure can help detect attacks as early as possible. We evaluated the various models both analytically and empirically.

  2. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  3. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  4. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  5. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  6. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  7. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  8. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  9. Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    2006-01-01

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  10. Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    2007-01-01

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  11. Information security architecture an integrated approach to security in the organization

    CERN Document Server

    Killmeyer, Jan

    2006-01-01

    Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources available.

  12. Information Security Management System toolkit

    OpenAIRE

    Καραμανλής, Μάνος; Karamanlis, Manos

    2016-01-01

    Secure management of information is becoming critical for any organization because information is one of the most valuable assets in organization’s business operations. An Information security management system (ISMS) consists of the policies, procedures, guidelines, and associated resources and activities, collectively managed by an organization, in the pursuit of protecting its information assets. An ISMS is a systematic approach for establishing, implementing, operating, mon...

  13. MERRA Analytic Services

    Science.gov (United States)

    Schnase, J. L.; Duffy, D. Q.; McInerney, M. A.; Tamkin, G. S.; Thompson, J. H.; Gill, R.; Grieg, C. M.

    2012-12-01

    MERRA Analytic Services (MERRA/AS) is a cyberinfrastructure resource for developing and evaluating a new generation of climate data analysis capabilities. MERRA/AS supports OBS4MIP activities by reducing the time spent in the preparation of Modern Era Retrospective-Analysis for Research and Applications (MERRA) data used in data-model intercomparison. It also provides a testbed for experimental development of high-performance analytics. MERRA/AS is a cloud-based service built around the Virtual Climate Data Server (vCDS) technology that is currently used by the NASA Center for Climate Simulation (NCCS) to deliver Intergovernmental Panel on Climate Change (IPCC) data to the Earth System Grid Federation (ESGF). Crucial to its effectiveness, MERRA/AS's servers will use a workflow-generated realizable object capability to perform analyses over the MERRA data using the MapReduce approach to parallel storage-based computation. The results produced by these operations will be stored by the vCDS, which will also be able to host code sets for those who wish to explore the use of MapReduce for more advanced analytics. While the work described here will focus on the MERRA collection, these technologies can be used to publish other reanalysis, observational, and ancillary OBS4MIP data to ESGF and, importantly, offer an architectural approach to climate data services that can be generalized to applications and customers beyond the traditional climate research community. In this presentation, we describe our approach, experiences, lessons learned,and plans for the future.; (A) MERRA/AS software stack. (B) Example MERRA/AS interfaces.

  14. Climatic change and security stakes

    International Nuclear Information System (INIS)

    Ambrosi, Ph.; Hallegatte, St.

    2006-01-01

    This paper explores the relationships between climate change and security. Potential threats from climate change, as a unique source of stress or together with other factors, to human security are first examined. Some of the most explicit examples illustrate this section: food security, water availability, vulnerability to extreme events and vulnerability of small islands States and coastal zones. By questioning the basic needs of some populations or at least aggravating their precariousness, such risks to human security could also raise global security concerns, which we examine in turn, along four directions: rural exodus with an impoverishment of displaced populations, local conflicts for the use of natural resources, diplomatic tensions and international conflicts, and propagation to initially-unaffected regions through migratory flows. (authors)

  15. Soil Security Assessment of Tasmania

    Science.gov (United States)

    Field, Damien; Kidd, Darren; McBratney, Alex

    2017-04-01

    The concept of soil security aligns well with the aspirational and marketing policies of the Tasmanian Government, where increased agricultural expansion through new irrigation schemes and multiple-use State managed production forests co-exists beside pristine World Heritage conservation land, a major drawcard of the economically important tourism industry . Regarding the Sustainable Development Gaols (SDG's) this could be seen as a exemplar of the emerging tool for quantification of spatial soil security to effectively protect our soil resource in terms of food (SDG 2.4, 3.9) and water security (SDG 6.4, 6.6), biodiversity maintenance and safeguarding fragile ecosystems (SDG 15.3, 15.9). The recent development and application of Digital Soil Mapping and Assessment capacities in Tasmania to stimulate agricultural production and better target appropriate soil resources has formed the foundational systems that can enable the first efforts in quantifying and mapping Tasmanian Soil Security, in particular the five Soil Security dimensions (Capability, Condition, Capital, Codification and Connectivity). However, to provide a measure of overall soil security, it was necessary to separately assess the State's three major soil uses; Agriculture, Conservation and Forestry. These products will provide an indication of where different activities are sustainable or at risk, where more soil data is needed, and provide a tool to better plan for a State requiring optimal food and fibre production, without depleting its natural soil resources and impacting on the fragile ecosystems supporting environmental benefits and the tourism industry.

  16. Developing Scalable Information Security Systems

    Directory of Open Access Journals (Sweden)

    Valery Konstantinovich Ablekov

    2013-06-01

    Full Text Available Existing physical security systems has wide range of lacks, including: high cost, a large number of vulnerabilities, problems of modification and support system. This paper covers an actual problem of developing systems without this list of drawbacks. The paper presents the architecture of the information security system, which operates through the network protocol TCP/IP, including the ability to connect different types of devices and integration with existing security systems. The main advantage is a significant increase in system reliability, scalability, both vertically and horizontally, with minimal cost of both financial and time resources.

  17. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  18. Resource optimization and security for cloud services

    CERN Document Server

    Xiong , Kaiqi

    2014-01-01

    This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or sites that may be owned by different service providers. The first part of the book contains an analysis of percentile response time, which is one of the most important SLA (service level agreements) metrics. Effective and accurate numerical solutions for the calculation of the percentile response time in single-class and multi-class queueing networks are obtained. Then, the numerical solution is

  19. Information security becoming a priority for utilities

    Energy Technology Data Exchange (ETDEWEB)

    Nicolaides, S. [Numerex, Atlanta, GA (United States)

    2009-10-15

    As part of North America's national critical infrastructure, utilities are finding themselves at the forefront of a security issue. In October 2007, a leading security service provider reported a 90 per cent increase in the number of hackers attempting to attack its utility clients in just one year. Utilities are vulnerable to cyber attacks that could disrupt power production and the transmission system. This article discussed the need for intelligent technologies in securely enabling resource management and operational efficiency of the utilities market. It discussed the unique security challenges that utilities face at a time of greater regulatory activity, heightened environmental concerns, tighter data security requirements and an increasing need for remote monitoring and control. A new tool has emerged for cyber security in the form of an international standard that may offer a strong guideline to work toward 11 security domains. These include security policy; organization of information security; asset management; human resources security; physical and environmental security; communications and operations management; access control; information systems acquisition; development and maintenance; information security incident management; business continuity management; and compliance. 2 figs.

  20. Video Analytics for Business Intelligence

    CERN Document Server

    Porikli, Fatih; Xiang, Tao; Gong, Shaogang

    2012-01-01

    Closed Circuit TeleVision (CCTV) cameras have been increasingly deployed pervasively in public spaces including retail centres and shopping malls. Intelligent video analytics aims to automatically analyze content of massive amount of public space video data and has been one of the most active areas of computer vision research in the last two decades. Current focus of video analytics research has been largely on detecting alarm events and abnormal behaviours for public safety and security applications. However, increasingly CCTV installations have also been exploited for gathering and analyzing business intelligence information, in order to enhance marketing and operational efficiency. For example, in retail environments, surveillance cameras can be utilised to collect statistical information about shopping behaviour and preference for marketing (e.g., how many people entered a shop; how many females/males or which age groups of people showed interests to a particular product; how long did they stay in the sho...

  1. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  2. Towards an automated security awareness system in a virtualized environment

    CSIR Research Space (South Africa)

    Labuschagne, WA

    2012-07-01

    Full Text Available resources. This is an efficient solution to access the Internet. However users might not be aware of the security threats that exist on using shared resources. Many companies provide security solutions to automatically protect resources on the network...

  3. DIRAC distributed secure framework

    International Nuclear Information System (INIS)

    Casajus, A; Graciani, R

    2010-01-01

    DIRAC, the LHCb community Grid solution, provides access to a vast amount of computing and storage resources to a large number of users. In DIRAC users are organized in groups with different needs and permissions. In order to ensure that only allowed users can access the resources and to enforce that there are no abuses, security is mandatory. All DIRAC services and clients use secure connections that are authenticated using certificates and grid proxies. Once a client has been authenticated, authorization rules are applied to the requested action based on the presented credentials. These authorization rules and the list of users and groups are centrally managed in the DIRAC Configuration Service. Users submit jobs to DIRAC using their local credentials. From then on, DIRAC has to interact with different Grid services on behalf of this user. DIRAC has a proxy management service where users upload short-lived proxies to be used when DIRAC needs to act on behalf of them. Long duration proxies are uploaded by users to a MyProxy service, and DIRAC retrieves new short delegated proxies when necessary. This contribution discusses the details of the implementation of this security infrastructure in DIRAC.

  4. The Defense Resource Allocation Process

    National Research Council Canada - National Science Library

    Keller, William

    1997-01-01

    Above all, this book is about DECISION MAKING. In particular, it attempts to describe the formalized process by which we in the United States make and implement decisions about resources for our national security...

  5. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  6. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  7. Online Resources

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Genetics; Online Resources. Journal of Genetics. Online Resources. Volume 97. 2018 | Online resources. Volume 96. 2017 | Online resources. Volume 95. 2016 | Online resources. Volume 94. 2015 | Online resources. Volume 93. 2014 | Online resources. Volume 92. 2013 | Online resources ...

  8. Let's Talk... Analytics

    Science.gov (United States)

    Oblinger, Diana G.

    2012-01-01

    Talk about analytics seems to be everywhere. Everyone is talking about analytics. Yet even with all the talk, many in higher education have questions about--and objections to--using analytics in colleges and universities. In this article, the author explores the use of analytics in, and all around, higher education. (Contains 1 note.)

  9. Analytics for Education

    Science.gov (United States)

    MacNeill, Sheila; Campbell, Lorna M.; Hawksey, Martin

    2014-01-01

    This article presents an overview of the development and use of analytics in the context of education. Using Buckingham Shum's three levels of analytics, the authors present a critical analysis of current developments in the domain of learning analytics, and contrast the potential value of analytics research and development with real world…

  10. Analytical chemistry instrumentation

    International Nuclear Information System (INIS)

    Laing, W.R.

    1986-01-01

    In nine sections, 48 chapters cover 1) analytical chemistry and the environment 2) environmental radiochemistry 3) automated instrumentation 4) advances in analytical mass spectrometry 5) fourier transform spectroscopy 6) analytical chemistry of plutonium 7) nuclear analytical chemistry 8) chemometrics and 9) nuclear fuel technology

  11. Cloud Computing Security: A Survey

    OpenAIRE

    Khalil, Issa; Khreishah, Abdallah; Azeem, Muhammad

    2014-01-01

    Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing a...

  12. Managing the security of nursing data in the electronic health record.

    Science.gov (United States)

    Samadbeik, Mahnaz; Gorzin, Zahra; Khoshkam, Masomeh; Roudbari, Masoud

    2015-02-01

    The Electronic Health Record (EHR) is a patient care information resource for clinicians and nursing documentation is an essential part of comprehensive patient care. Ensuring privacy and the security of health information is a key component to building the trust required to realize the potential benefits of electronic health information exchange. This study was aimed to manage nursing data security in the EHR and also discover the viewpoints of hospital information system vendors (computer companies) and hospital information technology specialists about nursing data security. This research is a cross sectional analytic-descriptive study. The study populations were IT experts at the academic hospitals and computer companies of Tehran city in Iran. Data was collected by a self-developed questionnaire whose validity and reliability were confirmed using the experts' opinions and Cronbach's alpha coefficient respectively. Data was analyzed through Spss Version 18 and by descriptive and analytic statistics. The findings of the study revealed that user name and password were the most important methods to authenticate the nurses, with mean percent of 95% and 80%, respectively, and also the most significant level of information security protection were assigned to administrative and logical controls. There was no significant difference between opinions of both groups studied about the levels of information security protection and security requirements (p>0.05). Moreover the access to servers by authorized people, periodic security update, and the application of authentication and authorization were defined as the most basic security requirements from the viewpoint of more than 88 percent of recently-mentioned participants. Computer companies as system designers and hospitals information technology specialists as systems users and stakeholders present many important views about security requirements for EHR systems and nursing electronic documentation systems. Prioritizing

  13. China's energy security and strategic choices

    International Nuclear Information System (INIS)

    Pellistrandi, J.

    2010-01-01

    Considering the present day international political and economical situation, China's energy security covers five important aspects: energy supplies security, energy prices security, environment security with respect to energy consumption, energy transport security, R and D security in the domain of energy resources exploration, exploitation and utilisation. Considering the above-mentioned aspects, China's strategic choices should include five major goals: counting on its own energy resources and giving priority to energy saving, participating to the international competition and implementing a national strategic reserves system, readjusting the energy consumption structure and promoting environment protection by developing nuclear energy, harmonizing China's relations with some countries and avoiding political and military conflicts, increasing investment in energy R and D, in particular in clean coal, nuclear, automotive, renewable energy and energy saving technologies. (J.S.)

  14. Security model for VM in cloud

    Science.gov (United States)

    Kanaparti, Venkataramana; Naveen K., R.; Rajani, S.; Padmvathamma, M.; Anitha, C.

    2013-03-01

    Cloud computing is a new approach emerged to meet ever-increasing demand for computing resources and to reduce operational costs and Capital Expenditure for IT services. As this new way of computation allows data and applications to be stored away from own corporate server, it brings more issues in security such as virtualization security, distributed computing, application security, identity management, access control and authentication. Even though Virtualization forms the basis for cloud computing it poses many threats in securing cloud. As most of Security threats lies at Virtualization layer in cloud we proposed this new Security Model for Virtual Machine in Cloud (SMVC) in which every process is authenticated by Trusted-Agent (TA) in Hypervisor as well as in VM. Our proposed model is designed to with-stand attacks by unauthorized process that pose threat to applications related to Data Mining, OLAP systems, Image processing which requires huge resources in cloud deployed on one or more VM's.

  15. Analytical Chemistry Laboratory (ACL) procedure compendium. Volume 1, Administrative

    Energy Technology Data Exchange (ETDEWEB)

    1992-06-01

    Covered are: analytical laboratory operations (ALO) sample receipt and control, ALO data report/package preparation review and control, single shell tank (PST) project sample tracking system, sample receiving, analytical balances, duties and responsibilities of sample custodian, sample refrigerator temperature monitoring, security, assignment of staff responsibilities, sample storage, data reporting, and general requirements for glassware.

  16. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  17. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  18. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  19. Child poverty vs Medicare and Social Security.

    Science.gov (United States)

    Waldman, H B

    1997-01-01

    The series of government safety net programs provides economic security primarily to older populations. In this period of competition for limited federal resources, the need to create a public awareness of the continuing and growing poverty of children is emphasized.

  20. Adaptive security protocol selection for mobile computing

    NARCIS (Netherlands)

    Pontes Soares Rocha, B.; Costa, D.N.O.; Moreira, R.A.; Rezende, C.G.; Loureiro, A.A.F.; Boukerche, A.

    2010-01-01

    The mobile computing paradigm has introduced new problems for application developers. Challenges include heterogeneity of hardware, software, and communication protocols, variability of resource limitations and varying wireless channel quality. In this scenario, security becomes a major concern for

  1. Homeland Security: The Department of Defense's Role

    National Research Council Canada - National Science Library

    Bowman, Steve

    2003-01-01

    ...) more closely with federal, state, and local agencies in their homeland security activities. DoD resources are unique in the government, both in their size and capabilities, and can be applied to both deter and respond to terrorist acts...

  2. Evaluating cyber security awareness in South Africa

    CSIR Research Space (South Africa)

    Grobler, M

    2011-07-01

    Full Text Available broadband capability and knowledge transfer within rural communities. To evaluate the current level of cyber security awareness, a series of exploratory surveys have been distributed to less technologically resourced entities in rural and deep rural...

  3. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  4. TCIA Secure Cyber Critical Infrastructure Modernization.

    Energy Technology Data Exchange (ETDEWEB)

    Keliiaa, Curtis M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.

  5. Security Threats on Wireless Sensor Network Protocols

    OpenAIRE

    H. Gorine; M. Ramadan Elmezughi

    2016-01-01

    In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issue...

  6. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  7. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  8. Security in Logistics

    Science.gov (United States)

    Cempírek, Václav; Nachtigall, Petr; Široký, Jaromír

    2016-12-01

    This paper deals with security of logistic chains according to incorrect declaration of transported goods, fraudulent transport and forwarding companies and possible threats caused by political influences. The main goal of this paper is to highlight possible logistic costs increase due to these fraudulent threats. An analysis of technological processes will beis provided, and an increase of these transport times considering the possible threatswhich will beis evaluated economic costs-wise. In the conclusion, possible threat of companies'` efficiency in logistics due to the costs`, means of transport and increase in human resources` increase will beare pointed out.

  9. A Security Audit Framework to Manage Information System Security

    Science.gov (United States)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  10. Data Privacy and Security in Higher Education

    Science.gov (United States)

    Williams, Tracy

    2003-01-01

    As institutions review and strengthen their plans to secure confidential data, what proactive role does the human resource professional play as a strategic partner? Why are employees a critical part of the solution? And how are they educated regarding their responsibilities with data security? Datatel's HR product manager shares some…

  11. Considerations on the selection and prioritization of information security solutions

    Directory of Open Access Journals (Sweden)

    Maria Cristina RĂDULESCU

    2016-05-01

    Full Text Available This paper provides a set of guidelines that can be used for prescribing a methodology or a detailed process for selecting and prioritizing security projects or solutions. It is based on the idea that costs of security solutions should be justified by their contribution to ensuring adequate protection of information resources in the organization which implements them. The article reviews general issues of security risks and costs, arguing the need for explicit consideration of information resources security requirements in order to validate decisions concerning security projects implementation. In such an approach, security requirements of information resources are used as a reference system to quantify the benefits and limitations of security solutions defined as alternative or complementary responses to certain security risks as their implementation faces budget constraints.

  12. Herpes - resources

    Science.gov (United States)

    Genital herpes - resources; Resources - genital herpes ... following organizations are good resources for information on genital herpes : March of Dimes -- www.marchofdimes.org/complications/sexually- ...

  13. Cloud management and security

    CERN Document Server

    Abbadi, Imad M

    2014-01-01

    Written by an expert with over 15 years' experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and diverse understanding of the technologies behind Cloud computing. In this book, the author begins with an introduction to Cloud computing, presenting fundamental concepts such as analyzing Cloud definitions, Cloud evolution, Cloud services, Cloud deployment types and highlighting the main challenges. Following on from the introduction, the book is divided into three parts: Cloud management, Cloud security, and practical examples. Part one presents the main components constituting the Cloud and federated Cloud infrastructure(e.g., interactions and deployment), discusses management platforms (resources and services), identifies and analyzes the main properties of the Cloud infrastructure, and presents Cloud automated management services: virtual and application resource management services. Part two analyzes the problem of establishing trustworthy Cloud, discuss...

  14. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  15. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  16. An Impact Assessment Model for Distributed Adaptive Security Situation Assessment

    National Research Council Canada - National Science Library

    Heckman, Mark; Joshi, Nikhil; Tylutki, Marcus; Levitt, Karl; Just, James; Clough, Lawrence

    2005-01-01

    The goal of any intrusion detection, anti-virus, firewall or other security mechanism is not simply to stop attacks, but to protect a computing resource so that the resource can continue to perform its function...

  17. The economic security of power plants

    Directory of Open Access Journals (Sweden)

    Niedziółka Dorota

    2017-01-01

    Full Text Available Currently, power plants in Poland have to work in a very uncomfortable situation. Unstable market conditions and frequent changes in the law may have serious adverse consequences for their economic security. Power plants play a very important role in the economy. The effectiveness of their performance affects the activity of all other businesses. Therefore, it is very important to provide a definition of economic security for the power plants’ sector and the factors determining its level. Maintaining economic security will allow energy generation companies to grow in a sustainable way as well as limit operational risk. A precise definition can also be used to create analytical tools for economic security measurement and monitoring. Proper usage of such tools can help energy generation companies sustain their economic security and properly plan their capital expenditures. The article focuses on the definition of economic security in the “micro” context of a separate business unit (enterprise. We also present an analytical model that measures economic security of a company engaged in the production of energy - a company of strategic importance for the national economy. The model uses macroeconomic variables, variables describing prices of raw material and legal / political stability in the country, as well as selected financial indicators. The appliance of conclusions resulting from the model’s implementation will help provide economic security for companies generating energy.

  18. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  19. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  20. Analyticity without Differentiability

    Science.gov (United States)

    Kirillova, Evgenia; Spindler, Karlheinz

    2008-01-01

    In this article we derive all salient properties of analytic functions, including the analytic version of the inverse function theorem, using only the most elementary convergence properties of series. Not even the notion of differentiability is required to do so. Instead, analytical arguments are replaced by combinatorial arguments exhibiting…

  1. Understanding Business Analytics

    Science.gov (United States)

    2015-01-05

    analytics have been used in organizations for a variety of reasons for quite some time; ranging from the simple (generating and understanding business analytics...process. understanding business analytics 3 How well these two components are orchestrated will determine the level of success an organization has in

  2. Security leader insights for information protection lessons and strategies from leading security professionals

    CERN Document Server

    Fahy, Bob

    2014-01-01

    How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader Insights for Information Protection, a collection of timeless leadership best practices featuring insights from some of the nation's most successful security practitioners, you can. This book can be used as a quick and effective resource to bring your security staff up to speed on security's role in information protection. I

  3. Critical infrastructure system security and resiliency

    CERN Document Server

    Biringer, Betty; Warren, Drake

    2013-01-01

    Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard. With an emphasis on protecting an infrastructure's ability to perform its mission or function, Critical Infrastructure System Security and Resiliency presents a practical methodology for developing an effective protection system that can either prevent undesired events or mitigate the consequences of such events.Developed at Sandia National Labs, the authors' analytical approach and

  4. Renewable energy resources

    DEFF Research Database (Denmark)

    Ellabban, Omar S.; Abu-Rub, Haitham A.; Blaabjerg, Frede

    2014-01-01

    Electric energy security is essential, yet the high cost and limited sources of fossil fuels, in addition to the need to reduce greenhouse gasses emission, have made renewable resources attractive in world energy-based economies. The potential for renewable energy resources is enormous because...... they can, in principle, exponentially exceed the world's energy demand; therefore, these types of resources will have a significant share in the future global energy portfolio, much of which is now concentrating on advancing their pool of renewable energy resources. Accordingly, this paper presents how...... renewable energy resources are currently being used, scientific developments to improve their use, their future prospects, and their deployment. Additionally, the paper represents the impact of power electronics and smart grid technologies that can enable the proportionate share of renewable energy...

  5. Retail video analytics: an overview and survey

    Science.gov (United States)

    Connell, Jonathan; Fan, Quanfu; Gabbur, Prasad; Haas, Norman; Pankanti, Sharath; Trinh, Hoang

    2013-03-01

    Today retail video analytics has gone beyond the traditional domain of security and loss prevention by providing retailers insightful business intelligence such as store traffic statistics and queue data. Such information allows for enhanced customer experience, optimized store performance, reduced operational costs, and ultimately higher profitability. This paper gives an overview of various camera-based applications in retail as well as the state-ofthe- art computer vision techniques behind them. It also presents some of the promising technical directions for exploration in retail video analytics.

  6. Consumer energy - conservation policy: an analytical approach

    Energy Technology Data Exchange (ETDEWEB)

    McDougall, G.H.G.; Ritchie, J.R.B.

    1984-06-01

    To capture the potential energy savings available in the consumer sector an analytical approach to conservation policy is proposed. A policy framework is described, and the key constructs including a payoff matrix analysis and a consumer impact analysis are discussed. Implications derived from the considerable amount of prior consumer research are provided to illustrate the effect on the design and implementation of future programs. The result of this analytical approach to conservation policy (economic stability and economic security) are goals well worth pursuing. 13 references, 2 tables.

  7. Big Data Analytics in Medicine and Healthcare.

    Science.gov (United States)

    Ristevski, Blagoj; Chen, Ming

    2018-05-10

    This paper surveys big data with highlighting the big data analytics in medicine and healthcare. Big data characteristics: value, volume, velocity, variety, veracity and variability are described. Big data analytics in medicine and healthcare covers integration and analysis of large amount of complex heterogeneous data such as various - omics data (genomics, epigenomics, transcriptomics, proteomics, metabolomics, interactomics, pharmacogenomics, diseasomics), biomedical data and electronic health records data. We underline the challenging issues about big data privacy and security. Regarding big data characteristics, some directions of using suitable and promising open-source distributed data processing software platform are given.

  8. Fuel supply security

    International Nuclear Information System (INIS)

    Wakabayashi, Hiroaki

    1987-01-01

    Stable fuel supply is a prerequisite for any nuclear power program including ISER-PIUS. It encompasses procurement of uranium ore, enriched uranium and fuel elements. Uranium is different from oil in that it can be stockpiled for more than a decade besides the fact that the core residence time is as long as six years, for example in the case of ISER-PIUS. These basic fuel characteristics are favoring nuclear fuel over others in terms of supply security. The central concern will be a gradual increase in prices of uranium and enrichment. Under the present glut situation with the worldwide prevalence of LWRs, fuel supply security seems ensured for the time being till the middle of 21st century. It is estimated that by the turn of the century, the free world will have roughly 450 GWe capacity of nuclear power. If 10 % is supplied for ISER-PIUS, more than 200 modules of 200 MWe ISER-PIUS may be deployed all over the world probably starting around 2000. As part of the fuel supply security consideration, heavy water reactor (HWR) may seem interesting to such a country as Indonesia where there is uranium resources but no enrichment capability. But it needs heavy water instead and the operation is not so easy as of LWR, because of the positive void coefficient as was seen at the Chernobyl-4. Safeguarding of the fuel is also difficult, because it lends itself to on line refueling. The current and future situation of the fuel supply security for LWR seem well founded and established long into the future. (Nogami, K.)

  9. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  10. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  11. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  12. Report of 'the 2014 international forum on peaceful use of nuclear energy, nuclear non-proliferation and nuclear security. Future direction toward promoting non-proliferation and the ideal method of developing human resources using Centers of Excellence (COEs) following the new strategic energy plan'

    International Nuclear Information System (INIS)

    Yamaga, Chikanobu; Tomikawa, Hirofumi; Kobayashi, Naoki; Naoi, Yosuke; Oda, Tetsuzo; Mochiji, Toshiro

    2015-10-01

    The Japan Atomic Energy Agency (JAEA) held 'International Forum on Peaceful Use of Nuclear Energy, Nuclear Non-proliferation and Nuclear Security – Future direction toward promoting non-proliferation and the ideal method of developing human resources using Centers of Excellence (COEs) following the New Strategic Energy Plan -' on 3 December 2014, with the Japan Institute of International Affairs (JIIA) and School of Engineering, The University of Tokyo, and International Nuclear Research Center, Tokyo Institute of Technology as co-hosts. In the Forum, officials and experts from Japan, the United States explained their efforts regarding peaceful use of nuclear energy, nuclear non-proliferation and nuclear security. Discussion was made in two panels, entitled 'Effective and efficient measures to ensure nuclear non-proliferation based on domestic and foreign issues and the direction and role of technology development' and 'Roles of nuclear security COEs and future expectations'. In Panel Discussion 1, as the nuclear non-proliferation regime is facing various problems and challenges under current international circumstances, how to implement effective and efficient safeguards was discussed. In Panel Discussion 2, panelists discussed the following three points: 1. Current status of Nuclear Security Training and Support Centers and COEs, and Good Practice; 2. What these centers can do to enhance nuclear security (New role for COEs); 3. Regional cooperation in the Nuclear Security Training and Support Center (NSSC) and COEs in states, which the IAEA recommends establishing, and international cooperation and partnerships with international initiatives (New Role). Officials and experts from Japan, IAEA, the United States, France, Republic of Korea, and Indonesia participated in the panel and made contributions to active discussion. This report includes abstracts of keynote speeches, summaries of two panel discussions and materials of the

  13. 5 CFR 9701.508 - Homeland Security Labor Relations Board.

    Science.gov (United States)

    2010-01-01

    ... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.508 Homeland Security Labor... impression or a major policy. (2) In cases where the full HSLRB acts, a vote of the majority of the HSLRB (or...

  14. HOMELAND SECURITY: Responsibility And Accountability For Achieving National Goals

    National Research Council Canada - National Science Library

    2002-01-01

    ... an effective approach and appropriate accountability to Congress and the American people; (2) the Executive Branch s initial efforts to develop a national strategy for homeland security; (3) the impact of an invigorated homeland security program on budgets and resources; and (4) our efforts to obtain information from the Office of Homeland Security (OHS).

  15. A Computer Security Course in the Undergraduate Computer Science Curriculum.

    Science.gov (United States)

    Spillman, Richard

    1992-01-01

    Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…

  16. International Nuclear Security Education Network (INSEN) and the Nuclear Security Training and Support Centre (NSSC) Network

    International Nuclear Information System (INIS)

    Nikonov, Dmitriy

    2013-01-01

    International Nuclear Security Education Network established in 2010: A partnership between the IAEA and universities, research institutions and other stakeholders - •Promotion of nuclear security education; • Development of educational materials; • Professional development for faculty members; • Collaborative research and resource sharing. Currently over 90 members from 38 member states. Mission: to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. Nuclear Security Support Centre: Primary objectives are: • Develop human resources through the implementation of a tailored training programme; • Develop a network of experts; • Provide technical support for lifecycle equipment management and scientific support for the detection of and the response to nuclear security events

  17. Collaboration using roles. [in computer network security

    Science.gov (United States)

    Bishop, Matt

    1990-01-01

    Segregation of roles into alternative accounts is a model which provides not only the ability to collaborate but also enables accurate accounting of resources consumed by collaborative projects, protects the resources and objects of such a project, and does not introduce new security vulnerabilities. The implementation presented here does not require users to remember additional passwords and provides a very simple consistent interface.

  18. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  19. Resource Information and Forecasting Group; Electricity, Resources, & Building Systems Integration (ERBSI) (Fact Sheet)

    Energy Technology Data Exchange (ETDEWEB)

    2009-11-01

    Researchers in the Resource Information and Forecasting group at NREL provide scientific, engineering, and analytical expertise to help characterize renewable energy resources and facilitate the integration of these clean energy sources into the electricity grid.

  20. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  1. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Science.gov (United States)

    2010-01-01

    .... 9701.313 Section 9701.313 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... special rate supplements. The Compensation Committee will consider factors such as turnover, recruitment...

  2. Understanding the security management practices of humanitarian organizations.

    Science.gov (United States)

    Bollettino, Vincenzo

    2008-06-01

    Humanitarian organisations operate in increasingly hostile environments. Although authoritative statistics are scarce, anecdotal evidence suggests that aid workers face life-threatening risks that are exacerbated by the growing number of humanitarian organisations operating in the field, the diversity of their mandates, the lack of common professional security standards, and limited success in inter-agency security coordination. Despite broad acceptance of the need for better security management and coordination, many humanitarian organisations remain ambivalent about devoting increased resources to security management and security coordination. A critical lack of basic empirical knowledge of the field security environment hampers efforts to enhance security management practices. The absence of a systematic means of sharing incident data undermines the capacity of the humanitarian community to address proactively security threats. In discussions about humanitarian staff safety and security, the least common denominator remains cumulative anecdotal evidence provided by the many security personnel working for humanitarian organisations in the feld.

  3. Challenges of human resource capacity building assistance

    International Nuclear Information System (INIS)

    Noro, Naoko

    2013-01-01

    At the first Nuclear Security Summit in Washington DC in 2010, Integrated Support Center for Nuclear Nonproliferation and Nuclear Security (ISCN) of the Japan Atomic Energy Agency was established based on Japan's National Statement which expressed Japan's strong commitment to contribute to the strengthening of nuclear security in Asian region. ISCN began its activities from JFY 2011. One of the main activities of ISCN is human resource capacity building support. Since JFY 2011, ISCN has offered various nuclear security training courses, seminars and workshops and total number of the participants to the ISCN's event reached more than 700. For the past three years, ISCN has been facing variety of challenges of nuclear security human resource assistance. This paper will briefly illustrate ISCN's achievement in the past years and introduce challenges and measures of ISCN in nuclear security human resource capacity building assistance. (author)

  4. Security engineering: systems engineering of security through the adaptation and application of risk management

    Science.gov (United States)

    Gilliam, David P.; Feather, Martin S.

    2004-01-01

    Information Technology (IT) Security Risk Management is a critical task in the organization, which must protect its resources and data against the loss of confidentiality, integrity, and availability. As systems become more complex and diverse, and more vulnerabilities are discovered while attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security. This paper describes an approach to address IT security risk through risk management and mitigation in both the institution and in the project life cycle.

  5. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  6. Internet Of Things And Analytics

    Directory of Open Access Journals (Sweden)

    Harshini G

    2017-08-01

    Full Text Available The Internet of Things IoT helps to encompass many aspects of life from connecting homes and cities to connecting cars and roads roads to devices that helps in examining individuals behavior and then the data collected is used.IoT is to make lives better secure and enjoyable. IoT solutions will promote cleaner environment improve peoples health with preventative care mechanisms and the constant supervision of elderly family members. It provides a platform for communication between objects where objects can organize and manage themselves. In this paper an attempt is made to understand how analytics can be applied to IoT data. Various statistical and data mining techniques will help to derive knowledge out of huge data collected by the IoT devices.

  7. Information Security Assessment of SMEs as Coursework -- Learning Information Security Management by Doing

    Science.gov (United States)

    Ilvonen, Ilona

    2013-01-01

    Information security management is an area with a lot of theoretical models. The models are designed to guide practitioners in prioritizing management resources in companies. Information security management education should address the gap between the academic ideals and practice. This paper introduces a teaching method that has been in use as…

  8. Exploring the association of urban or rural county status and environmental, nutrition- and lifestyle-related resources with the efficacy of SNAP-Ed (Supplemental Nutrition Assistance Program-Education) to improve food security.

    Science.gov (United States)

    Rivera, Rebecca L; Dunne, Jennifer; Maulding, Melissa K; Wang, Qi; Savaiano, Dennis A; Nickols-Richardson, Sharon M; Eicher-Miller, Heather A

    2018-04-01

    To investigate the association of policy, systems and environmental factors with improvement in household food security among low-income Indiana households with children after a Supplemental Nutrition Assistance Program-Education (SNAP-Ed) direct nutrition education intervention. Household food security scores measured by the eighteen-item US Household Food Security Survey Module in a longitudinal randomized and controlled SNAP-Ed intervention study conducted from August 2013 to April 2015 were the response variable. Metrics to quantify environmental factors including classification of urban or rural county status; the number of SNAP-authorized stores, food pantries and recreational facilities; average fair market housing rental price; and natural amenity rank were collected from government websites and data sets covering the years 2012-2016 and used as covariates in mixed multiple linear regression modelling. Thirty-seven Indiana counties, USA, 2012-2016. SNAP-Ed eligible adults from households with children (n 328). None of the environmental factors investigated were significantly associated with changes in household food security in this exploratory study. SNAP-Ed improves food security regardless of urban or rural location or the environmental factors investigated. Expansion of SNAP-Ed in rural areas may support food access among the low-income population and reduce the prevalence of food insecurity in rural compared with urban areas. Further investigation into policy, systems and environmental factors of the Social Ecological Model are warranted to better understand their relationship with direct SNAP-Ed and their impact on diet-related behaviours and food security.

  9. Context aware adaptive security service model

    Science.gov (United States)

    Tunia, Marcin A.

    2015-09-01

    Present systems and devices are usually protected against different threats concerning digital data processing. The protection mechanisms consume resources, which are either highly limited or intensively utilized by many entities. The optimization of these resources usage is advantageous. The resources that are saved performing optimization may be utilized by other mechanisms or may be sufficient for longer time. It is usually assumed that protection has to provide specific quality and attack resistance. By interpreting context situation of business services - users and services themselves, it is possible to adapt security services parameters to countermeasure threats associated with current situation. This approach leads to optimization of used resources and maintains sufficient security level. This paper presents architecture of adaptive security service, which is context-aware and exploits quality of context data issue.

  10. Prioritizing low-carbon energy sources to enhance China’s energy security

    International Nuclear Information System (INIS)

    Ren, Jingzheng; Sovacool, Benjamin K.

    2015-01-01

    Highlights: • Four dimensions and ten metrics are used for energy security assessment. • Both qualitative and quantitative metrics are considered for energy security. • AHP has been used to quantify qualitative metrics. • TOPSIS method has been used for prioritize the low-carbon energy sources. • Sensitivity analysis and integrated ranking have been carried out. - Abstract: This paper explores how low-carbon systems compare to each other in terms of their net effect on Chinese energy security, and how they ought to be ranked and strategized into an optimal and integrated resource plan. The paper utilizes Analytic Hierarchy Process (AHP) to first determine the relative performances of hydroelectricity, wind energy, solar energy, biomass energy, and nuclear power with respect to the energy security dimensions of availability, affordability, accessibility, and acceptability. Both qualitative and quantitative metrics are considered. It relies on AHP to calculate the relative weights of the qualitative metrics attached to these dimensions of energy security for each of our five low carbon energy sources. Then, energy security performance is determined by aggregating multiple, weighted metrics into a generic index based on the method of TOPSIS and then tweaked with a sensitivity analysis. Finally, an integrated method has been developed to rank the low-carbon energy systems from most to least important, with major implications for Chinese decision-makers and stakeholders. We conclude that hydroelectricity and wind power are the two low-carbon energy sources with the most potential to enhance China’s energy security. By contrast, nuclear and solar power have the least potential

  11. Security Implications of Typical Grid Computing Usage Scenarios

    International Nuclear Information System (INIS)

    Humphrey, Marty; Thompson, Mary R.

    2001-01-01

    A Computational Grid is a collection of heterogeneous computers and resources spread across multiple administrative domains with the intent of providing users uniform access to these resources. There are many ways to access the resources of a Computational Grid, each with unique security requirements and implications for both the resource user and the resource provider. A comprehensive set of Grid usage scenarios are presented and analyzed with regard to security requirements such as authentication, authorization, integrity, and confidentiality. The main value of these scenarios and the associated security discussions are to provide a library of situations against which an application designer can match, thereby facilitating security-aware application use and development from the initial stages of the application design and invocation. A broader goal of these scenarios are to increase the awareness of security issues in Grid Computing

  12. Security Implications of Typical Grid Computing Usage Scenarios

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.

    2001-06-05

    A Computational Grid is a collection of heterogeneous computers and resources spread across multiple administrative domains with the intent of providing users uniform access to these resources. There are many ways to access the resources of a Computational Grid, each with unique security requirements and implications for both the resource user and the resource provider. A comprehensive set of Grid usage scenarios are presented and analyzed with regard to security requirements such as authentication, authorization, integrity, and confidentiality. The main value of these scenarios and the associated security discussions are to provide a library of situations against which an application designer can match, thereby facilitating security-aware application use and development from the initial stages of the application design and invocation. A broader goal of these scenarios are to increase the awareness of security issues in Grid Computing.

  13. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  14. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  15. Analytic nuclear scattering theories

    International Nuclear Information System (INIS)

    Di Marzio, F.; University of Melbourne, Parkville, VIC

    1999-01-01

    A wide range of nuclear reactions are examined in an analytical version of the usual distorted wave Born approximation. This new approach provides either semi analytic or fully analytic descriptions of the nuclear scattering processes. The resulting computational simplifications, when used within the limits of validity, allow very detailed tests of both nuclear interaction models as well as large basis models of nuclear structure to be performed

  16. The Analytic Hierarchy Process and Participatory Decisionmaking

    Science.gov (United States)

    Daniel L. Schmoldt; Daniel L. Peterson; Robert L. Smith

    1995-01-01

    Managing natural resource lands requires social, as well as biophysical, considerations. Unfortunately, it is extremely difficult to accurately assess and quantify changing social preferences, and to aggregate conflicting opinions held by diverse social groups. The Analytic Hierarchy Process (AHP) provides a systematic, explicit, rigorous, and robust mechanism for...

  17. Analytical Electron Microscope

    Data.gov (United States)

    Federal Laboratory Consortium — The Titan 80-300 is a transmission electron microscope (TEM) equipped with spectroscopic detectors to allow chemical, elemental, and other analytical measurements to...

  18. Securing India's energy future

    International Nuclear Information System (INIS)

    Raghuraman, V.

    2009-01-01

    India's development aspirations are challenged by energy security and climate change considerations. The integrated energy policy clearly deliberates the need to intensify all energy options with emphasis on maximizing indigenous coal production, harnessing hydropower, increasing adoption of renewables, intensifying hydrocarbon exploration and production and anchoring nuclear power development to meet the long-term requirements. The report also emphasizes the need to secure overseas hydrocarbon and coal assets. Subsequently the National Action Plan on climate change has underscored the need to wean away from fossil fuels, the ambitious National Solar Mission is a case in point. Ultimately securing India's energy future lies in clean coal, safe nuclear and innovative solar. Coal is the key energy option in the foreseeable future. Initiatives are needed to take lead role in clean coal technologies, in-situ coal gasification, tapping coal bed methane, coal to liquids and coal to gas technologies. There is need to intensify oil exploration by laying the road-map to open acreage to unlock the hydrocarbon potential. Pursue alternate routes based on shale, methane from marginal fields. Effectively to use oil diplomacy to secure and diversify sources of supply including trans-national pipelines and engage with friendly countries to augment strategic resources. Technologies to be accessed and developed with international co-operation and financial assistance. Public-Private Partnerships, in collaborative R and D projects need to be accelerated. Nuclear share of electricity generation capacity to be increased 6 to 7% of 63000 MW by 2031-32 and further to 25% (300000 MW) capacity by 2050 is to be realized by operationalizing the country's thorium programme. Nuclear renaissance has opened up opportunities for the Indian industry to meet not only India's requirements but also participate in the global nuclear commerce; India has the potential to emerge as a manufacturing hub

  19. Mobile security how to secure, privatize and recover your devices

    CERN Document Server

    Speed, Timothy; Anderson, Joseph; Nampalli, Jaya

    2013-01-01

    Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private.Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.

  20. Password Hardened Biometric: A Complete Solution of Online Security

    OpenAIRE

    Ajay Sharma; Deo Brat Ojha

    2013-01-01

    In present epoch, secure online access to enterprises resources is very important for any organization. To protect valuable data become one of the big challenge for today's business as enterprise customers or clients involved in business-to-customer (B2C) and business-to-business (B2B) e-commerce need to feel that their transactions are secured from system hackers. Biometric technology provides a solution to this problem in enterprise network security. In this article we enhance the security ...

  1. Applicability of Visual Analytics to Defence and Security Operations

    Science.gov (United States)

    2011-06-01

    It shows the events importance in the news over time. Topics are extracted from fused video, audio and closed captions. Since viewing video...Detection of Anomalous Maritime Behavior, In Banissi, E. et al. (Eds.) Proceedings of the 12th IEEE International Conference on Information Visualisation

  2. Business Information Exchange System with Security, Privacy, and Anonymity

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-01-01

    Full Text Available Business Information Exchange is an Internet Secure Portal for secure management, distribution, sharing, and use of business e-mails, documents, and messages. It has three applications supporting three major types of information exchange systems: secure e-mail, secure instant messaging, and secure sharing of business documents. In addition to standard security services for e-mail letters, which are also applied to instant messages and documents, the system provides innovative features of privacy and full anonymity of users and their locations, actions, transactions, and exchanged resources. In this paper we describe design, implementation, and use of the system.

  3. Ideas towards sustainable water security

    Science.gov (United States)

    Dalin, Carole

    2016-04-01

    With growing global demands and a changing climate, ensuring water security - the access to sufficient, quality water resources for health and livelihoods and an acceptable level of water related risk - is increasingly challenging. While a billion people still lack access to water, over-exploitation of this resource increases in many developed and developing parts of the world. While some solutions to water stress have been known for a long time, financial, cultural and political barriers often prevent their implementations. This talk will highlight three crucial areas that need to be addressed to progress towards sustainable water security. The first point is on scale, the second on the agricultural sector and irrigation, and the third on food trade and policy.

  4. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  5. FINANCIAL STABILITY AS A FACTOR ECONOMIC SECURITY

    Directory of Open Access Journals (Sweden)

    A. V. Endovitskaya

    2015-01-01

    Full Text Available Summary. The article examines the linkages between financial stability and the level of its economic security. Considered the content of financial stability, represented by its own definition, we studied the basic conditions to achieve it. The logic diagram showing the location of financial stability and financial security to ensure the economic security of the business entity. A system of internal and external factors affecting the financial stability and endanger financial stability and financial security company. It has been established that it is the internal factors such as the availability of financial resources and financial position, capital structure, the company's ability to generate profits determine the level of economic security and its ability to withstand the negative impact of external and internal threats. The necessity of improving the financial sustainability in order to improve the economic security of the enterprise. On the basis of the research proposed matrix of risks affecting the financial stability and economic security, which allows to determine the probability of their occurrence and impact. It presents the economic, social, human, financial, organizational, economic, innovative and productive tools to increase the stability and financial security of an economic entity. List considered standard measures will make a plan of action to minimize the adverse impacts and enhance financial stability and security. Therefore, a prerequisite for the economic security of the enterprise is the attainment of financial stability.

  6. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  7. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  8. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  9. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  10. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  11. Security For Wireless Sensor Network

    OpenAIRE

    Saurabh Singh,; Dr. Harsh Kumar Verma

    2011-01-01

    Wireless sensor network is highly vulnerable to attacks because it consists of various resourceconstrained devices with their low battery power, less memory, and associated low energy. Sensor nodescommunicate among themselves via wireless links. However, there are still a lot of unresolved issues in wireless sensor networks of which security is one of the hottest research issues. Sensor networks aredeployed in hostile environments. Environmental conditions along with resource-constraints give...

  12. Security Architecture of Cloud Computing

    OpenAIRE

    V.KRISHNA REDDY; Dr. L.S.S.REDDY

    2011-01-01

    The Cloud Computing offers service over internet with dynamically scalable resources. Cloud Computing services provides benefits to the users in terms of cost and ease of use. Cloud Computing services need to address the security during the transmission of sensitive data and critical applications to shared and public cloud environments. The cloud environments are scaling large for data processing and storage needs. Cloud computing environment have various advantages as well as disadvantages o...

  13. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  14. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  15. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  16. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  17. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  18. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  19. The Analytical Hierarchy Process

    DEFF Research Database (Denmark)

    Barfod, Michael Bruhn

    2007-01-01

    The technical note gathers the theory behind the Analytical Hierarchy Process (AHP) and present its advantages and disadvantages in practical use.......The technical note gathers the theory behind the Analytical Hierarchy Process (AHP) and present its advantages and disadvantages in practical use....

  20. Signals: Applying Academic Analytics

    Science.gov (United States)

    Arnold, Kimberly E.

    2010-01-01

    Academic analytics helps address the public's desire for institutional accountability with regard to student success, given the widespread concern over the cost of higher education and the difficult economic and budgetary conditions prevailing worldwide. Purdue University's Signals project applies the principles of analytics widely used in…

  1. Analytic Moufang-transformations

    International Nuclear Information System (INIS)

    Paal, Eh.N.

    1988-01-01

    The paper is aimed to be an introduction to the concept of an analytic birepresentation of an analytic Moufang loop. To describe the deviation of (S,T) from associativity, the associators (S,T) are defined and certain constraints for them, called the minimality conditions of (S,T) are established

  2. Quine's "Strictly Vegetarian" Analyticity

    NARCIS (Netherlands)

    Decock, L.B.

    2017-01-01

    I analyze Quine’s later writings on analyticity from a linguistic point of view. In Word and Object Quine made room for a “strictly vegetarian” notion of analyticity. In later years, he developed this notion into two more precise notions, which I have coined “stimulus analyticity” and “behaviorist

  3. Learning analytics dashboard applications

    NARCIS (Netherlands)

    Verbert, K.; Duval, E.; Klerkx, J.; Govaerts, S.; Santos, J.L.

    2013-01-01

    This article introduces learning analytics dashboards that visualize learning traces for learners and teachers. We present a conceptual framework that helps to analyze learning analytics applications for these kinds of users. We then present our own work in this area and compare with 15 related

  4. Learning Analytics Considered Harmful

    Science.gov (United States)

    Dringus, Laurie P.

    2012-01-01

    This essay is written to present a prospective stance on how learning analytics, as a core evaluative approach, must help instructors uncover the important trends and evidence of quality learner data in the online course. A critique is presented of strategic and tactical issues of learning analytics. The approach to the critique is taken through…

  5. Analytical mass spectrometry

    Energy Technology Data Exchange (ETDEWEB)

    1990-01-01

    This 43rd Annual Summer Symposium on Analytical Chemistry was held July 24--27, 1990 at Oak Ridge, TN and contained sessions on the following topics: Fundamentals of Analytical Mass Spectrometry (MS), MS in the National Laboratories, Lasers and Fourier Transform Methods, Future of MS, New Ionization and LC/MS Methods, and an extra session. (WET)

  6. Analytical mass spectrometry. Abstracts

    Energy Technology Data Exchange (ETDEWEB)

    1990-12-31

    This 43rd Annual Summer Symposium on Analytical Chemistry was held July 24--27, 1990 at Oak Ridge, TN and contained sessions on the following topics: Fundamentals of Analytical Mass Spectrometry (MS), MS in the National Laboratories, Lasers and Fourier Transform Methods, Future of MS, New Ionization and LC/MS Methods, and an extra session. (WET)

  7. CLOUD COMPUTING SECURITY

    Directory of Open Access Journals (Sweden)

    Ştefan IOVAN

    2016-05-01

    Full Text Available Cloud computing reprentes the software applications offered as a service online, but also the software and hardware components from the data center.In the case of wide offerd services for any type of client, we are dealing with a public cloud. In the other case, in wich a cloud is exclusively available for an organization and is not available to the open public, this is consider a private cloud [1]. There is also a third type, called hibrid in which case an user or an organization might use both services available in the public and private cloud. One of the main challenges of cloud computing are to build the trust and ofer information privacy in every aspect of service offerd by cloud computingle. The variety of existing standards, just like the lack of clarity in sustenability certificationis not a real help in building trust. Also appear some questions marks regarding the efficiency of traditionsecurity means that are applied in the cloud domain. Beside the economic and technology advantages offered by cloud, also are some advantages in security area if the information is migrated to cloud. Shared resources available in cloud includes the survey, use of the "best practices" and technology for advance security level, above all the solutions offered by the majority of medium and small businesses, big companies and even some guvermental organizations [2].

  8. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  9. Quo vadis, analytical chemistry?

    Science.gov (United States)

    Valcárcel, Miguel

    2016-01-01

    This paper presents an open, personal, fresh approach to the future of Analytical Chemistry in the context of the deep changes Science and Technology are anticipated to experience. Its main aim is to challenge young analytical chemists because the future of our scientific discipline is in their hands. A description of not completely accurate overall conceptions of our discipline, both past and present, to be avoided is followed by a flexible, integral definition of Analytical Chemistry and its cornerstones (viz., aims and objectives, quality trade-offs, the third basic analytical reference, the information hierarchy, social responsibility, independent research, transfer of knowledge and technology, interfaces to other scientific-technical disciplines, and well-oriented education). Obsolete paradigms, and more accurate general and specific that can be expected to provide the framework for our discipline in the coming years are described. Finally, the three possible responses of analytical chemists to the proposed changes in our discipline are discussed.

  10. Fusion Analytics: A Data Integration System for Public Health and Medical Disaster Response Decision Support

    Science.gov (United States)

    Passman, Dina B.

    2013-01-01

    Objective The objective of this demonstration is to show conference attendees how they can integrate, analyze, and visualize diverse data type data from across a variety of systems by leveraging an off-the-shelf enterprise business intelligence (EBI) solution to support decision-making in disasters. Introduction Fusion Analytics is the data integration system developed by the Fusion Cell at the U.S. Department of Health and Human Services (HHS), Office of the Assistant Secretary for Preparedness and Response (ASPR). Fusion Analytics meaningfully augments traditional public and population health surveillance reporting by providing web-based data analysis and visualization tools. Methods Fusion Analytics serves as a one-stop-shop for the web-based data visualizations of multiple real-time data sources within ASPR. The 24-7 web availability makes it an ideal analytic tool for situational awareness and response allowing stakeholders to access the portal from any internet-enabled device without installing any software. The Fusion Analytics data integration system was built using off-the-shelf EBI software. Fusion Analytics leverages the full power of statistical analysis software and delivers reports to users in a secure web-based environment. Fusion Analytics provides an example of how public health staff can develop and deploy a robust public health informatics solution using an off-the shelf product and with limited development funding. It also provides the unique example of a public health information system that combines patient data for traditional disease surveillance with manpower and resource data to provide overall decision support for federal public health and medical disaster response operations. Conclusions We are currently in a unique position within public health. One the one hand, we have been gaining greater and greater access to electronic data of all kinds over the last few years. On the other, we are working in a time of reduced government spending

  11. Scenario and multiple criteria decision analysis for energy and environmental security of military and industrial installations.

    Science.gov (United States)

    Karvetski, Christopher W; Lambert, James H; Linkov, Igor

    2011-04-01

    Military and industrial facilities need secure and reliable power generation. Grid outages can result in cascading infrastructure failures as well as security breaches and should be avoided. Adding redundancy and increasing reliability can require additional environmental, financial, logistical, and other considerations and resources. Uncertain scenarios consisting of emergent environmental conditions, regulatory changes, growth of regional energy demands, and other concerns result in further complications. Decisions on selecting energy alternatives are made on an ad hoc basis. The present work integrates scenario analysis and multiple criteria decision analysis (MCDA) to identify combinations of impactful emergent conditions and to perform a preliminary benefits analysis of energy and environmental security investments for industrial and military installations. Application of a traditional MCDA approach would require significant stakeholder elicitations under multiple uncertain scenarios. The approach proposed in this study develops and iteratively adjusts a scoring function for investment alternatives to find the scenarios with the most significant impacts on installation security. A robust prioritization of investment alternatives can be achieved by integrating stakeholder preferences and focusing modeling and decision-analytical tools on a few key emergent conditions and scenarios. The approach is described and demonstrated for a campus of several dozen interconnected industrial buildings within a major installation. Copyright © 2010 SETAC.

  12. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  13. Energy security and sustainability in Northeast Asia

    International Nuclear Information System (INIS)

    Hippel, David von; Suzuki, Tatsujiro; Williams, James H.; Savage, Timothy; Hayes, Peter

    2011-01-01

    'Energy Security' has typically, to those involved in making energy policy, meant mostly securing access to oil and other fossil fuels. With increasingly global, diverse energy markets, however, and increasingly transnational problems resulting from energy transformation and use, old energy security rationales are less salient, and other issues, including climate change and other environmental, economic, and international considerations are becoming increasingly important. As a consequence, a more comprehensive operating definition of 'Energy Security' is needed, along with a workable framework for analysis of which future energy paths or scenarios are likely to yield greater Energy Security in a broader, more comprehensive sense. Work done as a part of the Nautilus Institute's 'Pacific Asia Regional Energy Security' (PARES) project developed a broader definition of Energy Security, and described an analytical framework designed to help to compare the energy security characteristics - both positive and negative - of different quantitative energy paths as developed using software tools such as the LEAP (Long-range Energy Alternatives Planning) system.

  14. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  15. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  16. Information security of Smart Factories

    Science.gov (United States)

    Iureva, R. A.; Andreev, Y. S.; Iuvshin, A. M.; Timko, A. S.

    2018-05-01

    In several years, technologies and systems based on the Internet of things (IoT) will be widely used in all smart factories. When processing a huge array of unstructured data, their filtration and adequate interpretation are a priority for enterprises. In this context, the correct representation of information in a user-friendly form acquires special importance, for which the market today presents advanced analytical platforms designed to collect, store and analyze data on technological processes and events in real time. The main idea of the paper is the statement of the information security problem in IoT and integrity of processed information.

  17. Delivering business analytics practical guidelines for best practice

    CERN Document Server

    Stubbs, Evan

    2013-01-01

    AVOID THE MISTAKES THAT OTHERS MAKE - LEARN WHAT LEADS TO BEST PRACTICE AND KICKSTART SUCCESS This groundbreaking resource provides comprehensive coverage across all aspects of business analytics, presenting proven management guidelines to drive sustainable differentiation. Through a rich set of case studies, author Evan Stubbs reviews solutions and examples to over twenty common problems spanning managing analytics assets and information, leveraging technology, nurturing skills, and defining processes. Delivering Business Analytics also outlines the Data Scientist's Code, fifteen principle

  18. Security and confidentiality of health information systems: implications for physicians.

    Science.gov (United States)

    Dorodny, V S

    1998-01-01

    Adopting and developing the new generation of information systems will be essential to remain competitive in a quality conscious health care environment. These systems enable physicians to document patient encounters and aggregate the information from the population they treat, while capturing detailed data on chronic medical conditions, medications, treatment plans, risk factors, severity of conditions, and health care resource utilization and management. Today, the knowledge-based information systems should offer instant, around-the-clock access for the provider, support simple order entry, facilitate data capture and retrieval, and provide eligibility verification, electronic authentication, prescription writing, security, and reporting that benchmarks outcomes management based upon clinical/financial decisions and treatment plans. It is an integral part of any information system to incorporate and integrate transactional (financial/administrative) information, as well as analytical (clinical/medical) data in a user-friendly, readily accessible, and secure form. This article explores the technical, financial, logistical, and behavioral obstacles on the way to the Promised Land.

  19. Modeling of the Global Water Cycle - Analytical Models

    Science.gov (United States)

    Yongqiang Liu; Roni Avissar

    2005-01-01

    Both numerical and analytical models of coupled atmosphere and its underlying ground components (land, ocean, ice) are useful tools for modeling the global and regional water cycle. Unlike complex three-dimensional climate models, which need very large computing resources and involve a large number of complicated interactions often difficult to interpret, analytical...

  20. XIX Mendeleev Congress on general and applied chemistry. Abstract book in 4 volumes. Volume 4. Chemistry aspects of modern energy and alternative energy resources. Chemistry of fossil and renewable hydrocarbon raw materials. Analytical chemistry: novel methods and devices for chemical research and analysis. Chemical education

    International Nuclear Information System (INIS)

    2011-01-01

    The abstracts of the XIX Mendeleev Congress on general and applied chemistry held 25-30 September 2011 in Volgograd are presented. The program includes the Congress plenary and section reports, poster presentations, symposia and round tables on key areas of chemical science and technology, and chemical education. The work of the Congress was held the following sections: 1. Fundamental problems of chemical sciences; 2. Chemistry and technology of materials, including nanomaterials; 3. Physicochemical basis of metallurgical processes; 4. Current issues of chemical production, technical risk assessment; 5. Chemical aspects of modern power and alternative energy sources; 6. Chemistry of fossil and renewable hydrocarbons; 7. Analytical chemistry: new methods and instruments for chemical research and analysis; 8. Chemical education. Volume 4 includes abstracts of oral and poster presentations and presentations of correspondent participants of the sections: Chemistry aspects of modern energy and alternative energy resources; Chemistry of fossil and renewable hydrocarbon raw materials; Analytical chemistry: novel methods and devices for chemical research and analysis; Chemical education, and author index [ru

  1. Campus Area Network Wi-Fi Security

    Directory of Open Access Journals (Sweden)

    Arjun K. Pillay

    2017-07-01

    Full Text Available Wireless connectivity devices such as mobile phones and laptops are being increasingly used by University students to access learning resources on campus networks and the Internet. Each of the mobile devices offers security protocols for connection to a Wi-Fi router. This paper presents an overview of Wi-Fi security and recommendations in relation to free Wi-Fi service at The University of Fiji.

  2. The Land Component Role in Maritime Security

    Science.gov (United States)

    2016-12-31

    nations for resources. They must also confront maritime threats, which include piracy , armed robbery, damage to the marine environment (i.e. pollution...such as an armed attack from a military vessel. Most definitions also usually include security from crimes at sea, such as piracy , armed robbery...security through stability operations, one must accept that any effective government must focus on basic governmental functions – providing for the

  3. Information security value in e-entrepreneurship

    OpenAIRE

    Nunes, Sérgio

    2012-01-01

    This paper researches the information security value in e-entrepreneurship by revising the literature that establishes the entrepreneurial domain and by relating it with the development of technological resources that create value for the customer in an online business. It details multiple paradigms regarding consumer’s values of information security, while relating them with common practices and previous researches in technological entrepreneurship. This research presents and discusses the b...

  4. Cloud Computing Security Latest Issues amp Countermeasures

    Directory of Open Access Journals (Sweden)

    Shelveen Pandey

    2015-08-01

    Full Text Available Abstract Cloud computing describes effective computing services provided by a third-party organization known as cloud service provider for organizations to perform different tasks over the internet for a fee. Cloud service providers computing resources are dynamically reallocated per demand and their infrastructure platform and software and other resources are shared by multiple corporate and private clients. With the steady increase in the number of cloud computing subscribers of these shared resources over the years security on the cloud is a growing concern. In this review paper the current cloud security issues and practices are described and a few innovative solutions are proposed that can help improve cloud computing security in the future.

  5. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  6. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  7. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  8. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  9. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  10. Review your Computer Security Now and Frequently!

    CERN Multimedia

    IT Department

    2009-01-01

    The start-up of LHC is foreseen to take place in the autumn and we will be in the public spotlight again. This increases the necessity to be vigilant with respect to computer security and the defacement of an experiment’s Web page in September last year shows that we should be particularly attentive. Attackers are permanently probing CERN and so we must all do the maximum to reduce future risks. Security is a hierarchical responsibility and requires to balance the allocation of resources between making systems work and making them secure. Thus all of us, whether users, developers, system experts, administrators, or managers are responsible for securing our computing assets. These include computers, software applications, documents, accounts and passwords. There is no "silver bullet" for securing systems, which can only be achieved by a painstaking search for all possible vulnerabilities followed by their mitigation. Additional advice on particular topics can be obtained from the relevant I...

  11. A Cluster- Based Secure Active Network Environment

    Institute of Scientific and Technical Information of China (English)

    CHEN Xiao-lin; ZHOU Jing-yang; DAI Han; LU Sang-lu; CHEN Gui-hai

    2005-01-01

    We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in active routers. In this environment, the active code authorized or trusted by privileged users is executed in the secure execution environment (EE) of the active router, while others are executed in the secure EE of the nodes in the distributed shared memory (DSM) cluster. With the supports of a multi-process Java virtual machine and KeyNote, untrusted active packets are controlled to securely consume resource. The DSM consistency management makes that active packets can be parallelly processed in the DSM cluster as if they were processed one by one in ANTS (Active Network Transport System). We demonstrate that CSANE has good security and scalability, but imposing little changes on traditional routers.

  12. Functional-analytical capabilities of GIS technology in the study of water use risks

    International Nuclear Information System (INIS)

    Nevidimova, O G; Yankovich, E P; Yankovich, K S

    2015-01-01

    Regional security aspects of economic activities are of great importance for legal regulation in environmental management. This has become a critical issue due to climate change, especially in regions where severe climate conditions have a great impact on almost all types of natural resource uses. A detailed analysis of climate and hydrological situation in Tomsk Oblast considering water use risks was carried out. Based on developed author's techniques an informational and analytical database was created using ArcGIS software platform, which combines statistical (quantitative) and spatial characteristics of natural hazards and socio-economic factors. This system was employed to perform areal zoning according to the degree of water use risks involved

  13. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  14. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  15. Radionuclides in analytical chemistry

    International Nuclear Information System (INIS)

    Tousset, J.

    1984-01-01

    Applications of radionuclides in analytical chemistry are reviewed in this article: tracers, radioactive sources and activation analysis. Examples are given in all these fields and it is concluded that these methods should be used more widely [fr

  16. Mobility Data Analytics Center.

    Science.gov (United States)

    2016-01-01

    Mobility Data Analytics Center aims at building a centralized data engine to efficiently manipulate : large-scale data for smart decision making. Integrating and learning the massive data are the key to : the data engine. The ultimate goal of underst...

  17. Analytical strategies for phosphoproteomics

    DEFF Research Database (Denmark)

    Thingholm, Tine E; Jensen, Ole N; Larsen, Martin R

    2009-01-01

    sensitive and specific strategies. Today, most phosphoproteomic studies are conducted by mass spectrometric strategies in combination with phospho-specific enrichment methods. This review presents an overview of different analytical strategies for the characterization of phosphoproteins. Emphasis...

  18. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  19. ZigBee-2007 Security Essentials

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2008-01-01

    ZigBee is a fairly new but promising standard for wireless networks due to its low resource requirements. As in other wireless network standards, security is an important issue and each new version of the ZigBee Specification enhances the level of the ZigBee security. In this paper, we present...... the security essentials of the latest ZigBee Specification, ZigBee-2007. We explain the key concepts, protocols, and computations. In addition, we formulate the protocols using standard protocol narrations. Finally, we identify the key challenges to be considered for consolidating ZigBee....

  20. Africa: Mineral resources, environment, and governance | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-01-25

    Jan 25, 2011 ... Africa: Mineral resources, environment, and governance ... benefits the poor, more effective social and environmental policies, and respect for human ... Who should claim responsibility for local crime prevention and security?

  1. Human Resources Operational Data Store Core Services

    Data.gov (United States)

    Social Security Administration — This database contains only a very small subset of the Human Resources Operational Data Store data. It supports the SSA Employee and Office Data Retrieval (SEODR)...

  2. Encyclopedia of analytical surfaces

    CERN Document Server

    Krivoshapko, S N

    2015-01-01

    This encyclopedia presents an all-embracing collection of analytical surface classes. It provides concise definitions  and description for more than 500 surfaces and categorizes them in 38 classes of analytical surfaces. All classes are cross references to the original literature in an excellent bibliography. The encyclopedia is of particular interest to structural and civil engineers and serves as valuable reference for mathematicians.

  3. Intermediate algebra & analytic geometry

    CERN Document Server

    Gondin, William R

    1967-01-01

    Intermediate Algebra & Analytic Geometry Made Simple focuses on the principles, processes, calculations, and methodologies involved in intermediate algebra and analytic geometry. The publication first offers information on linear equations in two unknowns and variables, functions, and graphs. Discussions focus on graphic interpretations, explicit and implicit functions, first quadrant graphs, variables and functions, determinate and indeterminate systems, independent and dependent equations, and defective and redundant systems. The text then examines quadratic equations in one variable, system

  4. Participatory GIS for resource management in Africa: Taking stock ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-04-25

    Apr 25, 2016 ... From land tenure and gender to food and water security, the articles present the most pressing resource challenges in Africa and the role ... By improving access to information on the location and availability of resources, GIS ...

  5. IAEA Nuclear Security - Achievements 2002-2011

    International Nuclear Information System (INIS)

    2012-03-01

    The possibility that nuclear or other radioactive material could be used for malicious purposes is real. This calls for a collective commitment to the control of, and accountancy for, material, as well as to adequate levels of protection in order to prevent criminal or unauthorized access to the material or associated facilities. Sharing of knowledge and experience, coordination among States and collaboration with other international organizations, initiatives and industries supports an effective international nuclear security framework. In 2001, the Board of Governors tasked the IAEA with improving nuclear security worldwide. The report that follows provides an overview of accomplishments over the last decade and reflects the importance that States assign to keeping material in the right hands. The IAEA has established a comprehensive nuclear security programme, described first in the Nuclear Security Plan of 2002-2005 and subsequently in the second plan of 2006- 2009. Activities included developing internationally accepted nuclear security guidance, supporting international legal instruments, protecting material and facilities, securing transport and borders, detecting and interdicting illicit nuclear trafficking, strengthening human resource capacity and preparing response plans should a nuclear security event occur. The IAEA has begun the implementation of its third Nuclear Security Plan, to be completed at the end of 2013. This approach to nuclear security recognizes that an effective national nuclear security regime builds on a number of factors: the implementation of relevant international legal instruments; IAEA guidance and standards; information protection; physical protection; material accounting and control; detection of, and response to, trafficking in such material; national response plans and contingency measures. Implemented in a systematic manner, these building blocks make up a sustainable national nuclear security regime and contribute to global

  6. Climate-derived tensions in Arctic security.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  7. SRL online Analytical Development

    International Nuclear Information System (INIS)

    Jenkins, C.W.

    1991-01-01

    The Savannah River Site is operated by the Westinghouse Savannah River Co. for the Department of Energy to produce special nuclear materials for defense. R ampersand D support for site programs is provided by the Savannah River Laboratory, which I represent. The site is known primarily for its nuclear reactors, but actually three fourths of the efforts at the site are devoted to fuel/target fabrication, fuel/target reprocessing, and waste management. All of these operations rely heavily on chemical processes. The site is therefore a large chemical plant. There are then many potential applications for process analytical chemistry at SRS. The Savannah River Laboratory (SRL) has an Analytical Development Section of roughly 65 personnel that perform analyses for R ampersand D efforts at the lab, act as backup to the site Analytical Laboratories Department and develop analytical methods and instruments. I manage a subgroup of the Analytical Development Section called the Process Control ampersand Analyzer Development Group. The Prime mission of this group is to develop online/at-line analytical systems for site applications

  8. Establishing a National Nuclear Security Support Centre

    International Nuclear Information System (INIS)

    2014-02-01

    The responsibility for creating and sustaining a nuclear security regime for the protection of nuclear and other radiological material clearly belongs to the State. The nuclear security regime resembles the layers of an onion, with the equipment and personnel securing the borders and ports representing the outer layer, and nuclear power, research reactors and nuclear medicine facilities representing the inner layers, and the actual target material representing the core. Components of any nuclear security regime include not only technological systems, but the human resources needed to manage, operate, administer and maintain equipment, including hardware and software. This publication provides practical guidance on the establishment and maintenance of a national nuclear security support centre (NSSC) as a means to ensure nuclear security sustainability in a State. An NSSC's basic purpose is to provide a national focal point for passing ownership of nuclear security knowledge and associated technical skills to the competent authorities involved in nuclear security. It describes processes and methodologies that can be used by a State to analyse the essential elements of information in a manner that allows several aspects of long term, systemic sustainability of nuclear security to be addressed. Processes such as the systematic approach to training, sometimes referred to as instructional system design, are the cornerstone of the NSSC concept. Proper analysis can provide States with data on the number of personnel requiring training and instructors needed, scale and scope of training, technical and scientific support venues, and details on the type and number of training aids or simulators required so that operational systems are not compromised in any way. Specific regulatory guidance, equipment or technology lists, or specifications/design of protection systems are not included in this publication. For such details, the following IAEA publications should be consulted

  9. Croatian Analytical Terminology

    Directory of Open Access Journals (Sweden)

    Kastelan-Macan; M.

    2008-04-01

    Full Text Available Results of analytical research are necessary in all human activities. They are inevitable in making decisions in the environmental chemistry, agriculture, forestry, veterinary medicine, pharmaceutical industry, and biochemistry. Without analytical measurements the quality of materials and products cannot be assessed, so that analytical chemistry is an essential part of technical sciences and disciplines.The language of Croatian science, and analytical chemistry within it, was one of the goals of our predecessors. Due to the political situation, they did not succeed entirely, but for the scientists in independent Croatia this is a duty, because language is one of the most important features of the Croatian identity. The awareness of the need to introduce Croatian terminology was systematically developed in the second half of the 19th century, along with the founding of scientific societies and the wish of scientists to write their scientific works in Croatian, so that the results of their research may be applied in economy. Many authors of textbooks from the 19th and the first half of the 20th century contributed to Croatian analytical terminology (F. Rački, B. Šulek, P. Žulić, G. Pexidr, J. Domac, G. Janeček , F. Bubanović, V. Njegovan and others. M. DeŢelić published the first systematic chemical terminology in 1940, adjusted to the IUPAC recommendations. In the second half of 20th century textbooks in classic analytical chemistry were written by V. Marjanović-Krajovan, M. Gyiketta-Ogrizek, S. Žilić and others. I. Filipović wrote the General and Inorganic Chemistry textbook and the Laboratory Handbook (in collaboration with P. Sabioncello and contributed greatly to establishing the terminology in instrumental analytical methods.The source of Croatian nomenclature in modern analytical chemistry today are translated textbooks by Skoog, West and Holler, as well as by Günnzler i Gremlich, and original textbooks by S. Turina, Z.

  10. A business analytics capability framework

    Directory of Open Access Journals (Sweden)

    Ranko Cosic

    2015-09-01

    Full Text Available Business analytics (BA capabilities can potentially provide value and lead to better organisational performance. This paper develops a holistic, theoretically-grounded and practically relevant business analytics capability framework (BACF that specifies, defines and ranks the capabilities that constitute an organisational BA initiative. The BACF was developed in two phases. First, an a priori conceptual framework was developed based on the Resource-Based View theory of the firm and a thematic content analysis of the BA literature. Second, the conceptual framework was further developed and refined using a three round Delphi study involving 16 BA experts. Changes from the Delphi study resulted in a refined and confirmed framework including detailed capability definitions, together with a ranking of the capabilities based on importance. The BACF will help academic researchers and industry practitioners to better understand the capabilities that constitute an organisational BA initiative and their relative importance. In future work, the capabilities in the BACF will be operationalised to measure their as-is status, thus enabling organisations to identify key areas of strength and weakness and prioritise future capability improvement efforts.

  11. WRR-Policy Brief 6 : Big data and security policies: serving security, protecting freedom

    NARCIS (Netherlands)

    Broeders, Dennis; Schrijvers, Erik; Hirsch Ballin, Ernst

    2017-01-01

    Big Data analytics in national security, law enforcement and the fight against fraud can reap great benefits for states, citizens and society but require extra safeguards to protect citizens’ fundamental rights. This requires new frameworks: a crucial shift is necessary from regulating the phase of

  12. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  13. Analytic manifolds in uniform algebras

    International Nuclear Information System (INIS)

    Tonev, T.V.

    1988-12-01

    Here we extend Bear-Hile's result concerning the version of famous Bishop's theorem for one-dimensional analytic structures in two directions: for n-dimensional complex analytic manifolds, n>1, and for generalized analytic manifolds. 14 refs

  14. Analysis of Spatial Differences on Ecological Security of Farmland Resources in Anhua County%安化县耕地资源生态安全空间差异分析

    Institute of Scientific and Technical Information of China (English)

    黄勇; 王君; 聂笃聪; 周国华

    2011-01-01

    针对安化县耕地特点及面临的主要生态问题,基于压力—状态—响应(PSR)模型构建了指标体系,运用主成分分析法对安化县耕地资源生态安全进行评价,在此基础上分析了安化县耕地资源生态安全的空间差异,并提出一系列改善耕地生态安全状况的措施。%According to the characteristics and main eco-problems of cultivated land resourse in Anhua County,this article established an indicator system based on P-S-R model then estimated the cultivated land resourse ecological security with principal component analysis(PCS) method and spatial differences were analyzed.Some relevant measures were proposed to improve the cultivated land resourse Ecological security state in Anhua County.

  15. A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation

    Directory of Open Access Journals (Sweden)

    Triana Mugia Rahayu

    2015-06-01

    Full Text Available The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.

  16. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  17. Information theory in analytical chemistry

    National Research Council Canada - National Science Library

    Eckschlager, Karel; Danzer, Klaus

    1994-01-01

    Contents: The aim of analytical chemistry - Basic concepts of information theory - Identification of components - Qualitative analysis - Quantitative analysis - Multicomponent analysis - Optimum analytical...

  18. On Secure Workflow Decentralisation on the Internet

    Directory of Open Access Journals (Sweden)

    Petteri Kaskenpalo

    2010-06-01

    Full Text Available Decentralised workflow management systems are a new research area, where most work to-date has focused on the system's overall architecture. As little attention has been given to the security aspects in such systems, we follow a security driven approach, and consider, from the perspective of available security building blocks, how security can be implemented and what new opportunities are presented when empowering the decentralised environment with modern distributed security protocols. Our research is motivated by a more general question of how to combine the positive enablers that email exchange enjoys, with the general benefits of workflow systems, and more specifically with the benefits that can be introduced in a decentralised environment. This aims to equip email users with a set of tools to manage the semantics of a message exchange, contents, participants and their roles in the exchange in an environment that provides inherent assurances of security and privacy. This work is based on a survey of contemporary distributed security protocols, and considers how these protocols could be used in implementing a distributed workflow management system with decentralised control . We review a set of these protocols, focusing on the required message sequences in reviewing the protocols, and discuss how these security protocols provide the foundations for implementing core control-flow, data, and resource patterns in a distributed workflow environment.

  19. Integrated Approach to Peace & Human Security in the 21st Century

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2016-10-01

    Full Text Available Humanity has made remarkable progress during the past two centuries in advancing peace, democracy, human rights, economic development and social equality. The evolution of human relations has progressed far from the time when physical violence, war and conquest were the predominant form of international relations. Diplomacy has evolved from political negotiations at the conference table to mutually beneficial economic exchange and creative cultural integration. But the ideal of peace and human security for all human beings remains elusive, distant and utopian. Violence and insecurity persist and social harmony is threatened by the competition for political supremacy, markets, jobs and scarce resources. Thousands of nuclear weapons remain armed and on alert. Existential ecological threats increase daily. The roots of war and violence remain intact, even if their most horrendous expressions have receded from view. The permanent abolition of war and achievement of human security for all cannot be attained by narrowly conceived political alliances or collective security agreements. The negative concept of peace as the absence of war needs to be replaced by a positive conception of peace as the essential condition for the fullest development of human potential. The narrow concept of security in military and political terms needs to be replaced by an inclusive conception that views security as an emergent property of effective and harmonious social organization founded on the ultimate value of the human being. Peace and security are fundamental attributes of society as a whole. They can only be achieved by a comprehensive, integrated approach that addresses the roots of violence and disharmony in all forms—political, military, economic, social, cultural and ecological. This will require radical democratization of international institutions, establishment of an effective global legal process, abandonment of outmoded conceptions of national

  20. Analytics Platform for ATLAS Computing Services

    CERN Document Server

    Vukotic, Ilija; The ATLAS collaboration; Bryant, Lincoln

    2016-01-01

    Big Data technologies have proven to be very useful for storage, processing and visualization of derived metrics associated with ATLAS distributed computing (ADC) services. Log file data and database records, and metadata from a diversity of systems have been aggregated and indexed to create an analytics platform for ATLAS ADC operations analysis. Dashboards, wide area data access cost metrics, user analysis patterns, and resource utilization efficiency charts are produced flexibly through queries against a powerful analytics cluster. Here we explore whether these techniques and analytics ecosystem can be applied to add new modes of open, quick, and pervasive access to ATLAS event data so as to simplify access and broaden the reach of ATLAS public data to new communities of users. An ability to efficiently store, filter, search and deliver ATLAS data at the event and/or sub-event level in a widely supported format would enable or significantly simplify usage of machine learning tools like Spark, Jupyter, R, S...

  1. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  2. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  3. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  4. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  5. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  6. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  7. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  8. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  9. Competing on talent analytics.

    Science.gov (United States)

    Davenport, Thomas H; Harris, Jeanne; Shapiro, Jeremy

    2010-10-01

    Do investments in your employees actually affect workforce performance? Who are your top performers? How can you empower and motivate other employees to excel? Leading-edge companies such as Google, Best Buy, Procter & Gamble, and Sysco use sophisticated data-collection technology and analysis to answer these questions, leveraging a range of analytics to improve the way they attract and retain talent, connect their employee data to business performance, differentiate themselves from competitors, and more. The authors present the six key ways in which companies track, analyze, and use data about their people-ranging from a simple baseline of metrics to monitor the organization's overall health to custom modeling for predicting future head count depending on various "what if" scenarios. They go on to show that companies competing on talent analytics manage data and technology at an enterprise level, support what analytical leaders do, choose realistic targets for analysis, and hire analysts with strong interpersonal skills as well as broad expertise.

  10. Advanced business analytics

    CERN Document Server

    Lev, Benjamin

    2015-01-01

    The book describes advanced business analytics and shows how to apply them to many different professional areas of engineering and management. Each chapter of the book is contributed by a different author and covers a different area of business analytics. The book connects the analytic principles with business practice and provides an interface between the main disciplines of engineering/technology and the organizational, administrative and planning abilities of management. It also refers to other disciplines such as economy, finance, marketing, behavioral economics and risk analysis. This book is of special interest to engineers, economists and researchers who are developing new advances in engineering management but also to practitioners working on this subject.

  11. IBM’s Health Analytics and Clinical Decision Support

    Science.gov (United States)

    Sun, J.; Knoop, S.; Shabo, A.; Carmeli, B.; Sow, D.; Syed-Mahmood, T.; Rapp, W.

    2014-01-01

    Summary Objectives This survey explores the role of big data and health analytics developed by IBM in supporting the transformation of healthcare by augmenting evidence-based decision-making. Methods Some problems in healthcare and strategies for change are described. It is argued that change requires better decisions, which, in turn, require better use of the many kinds of healthcare information. Analytic resources that address each of the information challenges are described. Examples of the role of each of the resources are given. Results There are powerful analytic tools that utilize the various kinds of big data in healthcare to help clinicians make more personalized, evidenced-based decisions. Such resources can extract relevant information and provide insights that clinicians can use to make evidence-supported decisions. There are early suggestions that these resources have clinical value. As with all analytic tools, they are limited by the amount and quality of data. Conclusion Big data is an inevitable part of the future of healthcare. There is a compelling need to manage and use big data to make better decisions to support the transformation of healthcare to the personalized, evidence-supported model of the future. Cognitive computing resources are necessary to manage the challenges in employing big data in healthcare. Such tools have been and are being developed. The analytic resources, themselves, do not drive, but support healthcare transformation. PMID:25123736

  12. AGROECOLOGICAL FACTORS OF FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    L. Moldavan

    2014-09-01

    Full Text Available An experience of development of forms of economy in developed countries is analysed. Ways of development of domestic agriculture are proposed. The paper proved that Ukraine needs a new model of agriculture that was based not on the dynamic growth market of export production, and the balanced development of multipurpose field, which meets the needs of the country in food and foreign exchange earnings, warned to the depletion of natural resources. The extent of devastating effects of industrial model of agriculture development, which is oriented on economic growth without social and environmental price of its growth is revealed. Retrospective analysis of entry in international practice like formal institutional status of an alternative model in which an economic function of a branch (production and income is balanced with ecological (conservation potential land and social (food security is realized. Basic principles of ecologically oriented agriculture as a factor in long-term food security are formulated.

  13. Analytic number theory

    CERN Document Server

    Iwaniec, Henryk

    2004-01-01

    Analytic Number Theory distinguishes itself by the variety of tools it uses to establish results, many of which belong to the mainstream of arithmetic. One of the main attractions of analytic number theory is the vast diversity of concepts and methods it includes. The main goal of the book is to show the scope of the theory, both in classical and modern directions, and to exhibit its wealth and prospects, its beautiful theorems and powerful techniques. The book is written with graduate students in mind, and the authors tried to balance between clarity, completeness, and generality. The exercis

  14. An analytic thomism?

    Directory of Open Access Journals (Sweden)

    Daniel Alejandro Pérez Chamorro.

    2012-12-01

    Full Text Available For 50 years the philosophers of the Anglo-Saxon analytic tradition (E. Anscombre, P. Geach, A. Kenny, P. Foot have tried to follow the Thomas Aquinas School which they use as a source to surpass the Cartesian Epistemology and to develop the virtue ethics. Recently, J. Haldane has inaugurated a program of “analytical thomism” which main result until the present has been his “theory of identity mind/world”. Nevertheless, none of Thomás’ admirers has still found the means of assimilating his metaphysics of being.

  15. Social network data analytics

    CERN Document Server

    Aggarwal, Charu C

    2011-01-01

    Social network analysis applications have experienced tremendous advances within the last few years due in part to increasing trends towards users interacting with each other on the internet. Social networks are organized as graphs, and the data on social networks takes on the form of massive streams, which are mined for a variety of purposes. Social Network Data Analytics covers an important niche in the social network analytics field. This edited volume, contributed by prominent researchers in this field, presents a wide selection of topics on social network data mining such as Structural Pr

  16. News for analytical chemists

    DEFF Research Database (Denmark)

    Andersen, Jens Enevold Thaulov; Karlberg, Bo

    2009-01-01

    welfare. In conjunction with the meeting of the steering committee in Tallinn, Estonia, in April, Mihkel Kaljurand and Mihkel Koel of Tallinn University of Technology organised a successful symposium attended by 51 participants. The symposium illustrated the scientific work of the steering committee...... directed to various topics of analytical chemistry. Although affected by the global financial crisis, the Euroanalysis Conference will be held on 6 to 10 September in Innsbruck, Austria. For next year, the programme for the analytical section of the 3rd European Chemistry Congress is in preparation...

  17. Foundations of predictive analytics

    CERN Document Server

    Wu, James

    2012-01-01

    Drawing on the authors' two decades of experience in applied modeling and data mining, Foundations of Predictive Analytics presents the fundamental background required for analyzing data and building models for many practical applications, such as consumer behavior modeling, risk and marketing analytics, and other areas. It also discusses a variety of practical topics that are frequently missing from similar texts. The book begins with the statistical and linear algebra/matrix foundation of modeling methods, from distributions to cumulant and copula functions to Cornish--Fisher expansion and o

  18. Supercritical fluid analytical methods

    International Nuclear Information System (INIS)

    Smith, R.D.; Kalinoski, H.T.; Wright, B.W.; Udseth, H.R.

    1988-01-01

    Supercritical fluids are providing the basis for new and improved methods across a range of analytical technologies. New methods are being developed to allow the detection and measurement of compounds that are incompatible with conventional analytical methodologies. Characterization of process and effluent streams for synfuel plants requires instruments capable of detecting and measuring high-molecular-weight compounds, polar compounds, or other materials that are generally difficult to analyze. The purpose of this program is to develop and apply new supercritical fluid techniques for extraction, separation, and analysis. These new technologies will be applied to previously intractable synfuel process materials and to complex mixtures resulting from their interaction with environmental and biological systems

  19. Energy security and national policy

    International Nuclear Information System (INIS)

    Martin, W.F.

    1987-01-01

    To achieve an energy secure future, energy cannot be viewed as an isolated concern. It is part and parcel of a nation's economic, social, and political context. In the past important implications for the economy and national security have been ignored. Crash programs to deal with oil shortages in the seventies, crashed. In the eighties, oil surplus has been enjoyed. The energy situation could be quite different in the nineties. Statistics on energy supply and consumption of oil, coal, natural gas and electricity from nuclear power show that much progress has been made worldwide. However, about half of the world's oil will come from the Persian Gulf by 1995. Continued low oil prices could raise US imports to 60% of consumption by 1995. Persian Gulf tensions serve as reminders of the link between energy policy and national security policy. Energy policy must be based on market forces and concerns for national security. Strategic oil reserves will expand along with the availability of domestic oil and gas resources. Increased attention to conservation, diversification of energy resources, and use of alternative fuels can help reduce imports. Continued high-risk long term research and development is needed. Improved technology can reduce environmental impacts. Global markets need global cooperation. Energy has emerged as an important aspect of East-West relations. Europeans need to diversify their sources of energy. The soviets have proposed expanded collaboration in magnetic fusion science. A series of initiatives are proposed that together will ensure that economies will not become overly dependent on a single source of energy

  20. Information technology resources assessment

    Energy Technology Data Exchange (ETDEWEB)

    Loken, S.C. [ed.

    1993-01-01

    The emphasis in Information Technology (IT) development has shifted from technology management to information management, and the tools of information management are increasingly at the disposal of end-users, people who deal with information. Moreover, the interactive capabilities of technologies such as hypertext, scientific visualization, virtual reality, video conferencing, and even database management systems have placed in the hands of users a significant amount of discretion over how these resources will be used. The emergence of high-performance networks, as well as network operating systems, improved interoperability, and platform independence of applications will eliminate technical barriers to the use of data, increase the power and range of resources that can be used cooperatively, and open up a wealth of possibilities for new applications. The very scope of these prospects for the immediate future is a problem for the IT planner or administrator. Technology procurement and implementation, integration of new technologies into the existing infrastructure, cost recovery and usage of networks and networked resources, training issues, and security concerns such as data protection and access to experiments are just some of the issues that need to be considered in the emerging IT environment. As managers we must use technology to improve competitiveness. When procuring new systems, we must take advantage of scalable resources. New resources such as distributed file systems can improve access to and efficiency of existing operating systems. In addition, we must assess opportunities to improve information worker productivity and information management through tedmologies such as distributed computational visualization and teleseminar applications.