WorldWideScience

Sample records for baseline multi-level secure

  1. Multi-Level Secure Local Area Network

    OpenAIRE

    Naval Postgraduate School (U.S.); Center for Information Systems Studies Security and Research (CISR)

    2011-01-01

    Multi-Level Secure Local Area Network is a cost effective, multi-level, easy to use office environment leveraging existing high assurance technology. The Department of Defense and U.S. Government have an identified need to securely share information classified at differing security levels. Because there exist no commercial solutions to this problem, NPS is developing a MLS LAN. The MLS LAN extends high assurance capabilities of an evaluated multi-level secure system to commercial personal com...

  2. A Container-based Trusted Multi-level Security Mechanism

    Directory of Open Access Journals (Sweden)

    Li Xiao-Yong

    2017-01-01

    Full Text Available Multi-level security mechanism has been widely applied in the military, government, defense and other domains in which information is required to be divided by security-level. Through this type of security mechanism, users at different security levels are provided with information at corresponding security levels. Traditional multi-level security mechanism which depends on the safety of operating system finally proved to be not practical. We propose a container-based trusted multi-level security mechanism in this paper to improve the applicability of the multi-level mechanism. It guarantees multi-level security of the system through a set of multi-level security policy rules and trusted techniques. The technical feasibility and application scenarios are also discussed. The ease of realization, strong practical significance and low cost of our method will largely expand the application of multi-level security mechanism in real life.

  3. Multi-Level Security Cannot Realise NEC Objectives

    NARCIS (Netherlands)

    Schotanus, H.A.; Hartog, T.; Verkoelen, C.A.A.

    2012-01-01

    Multi-Level Security (MLS) is often viewed as the holy grail of information security, especially in those environments where information of different classifications is being processed. In this paper we argue that MLS cannot facilitate the right balance between need-to-protect and duty-to-share as

  4. Education Organization Baseline Control Protection and Trusted Level Security

    Directory of Open Access Journals (Sweden)

    Wasim A. Al-Hamdani

    2007-12-01

    Full Text Available Many education organizations have adopted for security the enterprise best practices for implementation on their campuses, while others focus on ISO Standard (or/and the National Institution of Standards and Technology.All these adoptions are dependent on IT personal and their experiences or knowledge of the standard. On top of this is the size of the education organizations. The larger the population in an education organization, the more the problem of information and security become very clear. Thus, they have been obliged to comply with information security issues and adopt the national or international standard. The case is quite different when the population size of the education organization is smaller. In such education organizations, they use social security numbers as student ID, and issue administrative rights to faculty and lab managers – or they are not aware of the Family Educational Rights and Privacy Act (FERPA – and release some personal information.The problem of education organization security is widely open and depends on the IT staff and their information security knowledge in addition to the education culture (education, scholarships and services has very special characteristics other than an enterprise or comparative organizationThis paper is part of a research to develop an “Education Organization Baseline Control Protection and Trusted Level Security.” The research has three parts: Adopting (standards, Testing and Modifying (if needed.

  5. Multi-perspective analysis of China's energy supply security

    International Nuclear Information System (INIS)

    Geng, Jiang-Bo; Ji, Qiang

    2014-01-01

    China's energy supply security has faced many challenges such as the drastic change of the international energy environment and the domestic energy situation and so on. This paper constructs a multi-dimensional indicator system for the main risks deriving from four aspects to evaluate the situation of China's energy supply security and analyze its evolution characteristics from 1994 to 2011. The results indicate that the situation of China's energy supply security generally presented a downtrend during 1994–2008, as a result of increasing international energy market monopoly and high volatility of international crude oil prices. After 2008, the overall level of China's energy supply security has improved to the level of 2003, which is attributed to the relatively stable international energy environment as well as the effective implementation of energy policies. - Highlights: • A multi-dimensional index system for energy supply security is constructed. • The dynamic influences of external and internal risks are analyzed. • China's energy supply security presents a downward trend during 1994–2008. • The level of China's energy supply security has improved since 2009

  6. A Formal Model of Trust Chain based on Multi-level Security Policy

    OpenAIRE

    Kong Xiangying

    2013-01-01

    Trust chain is the core technology of trusted computing. A formal model of trust chain based on finite state automata theory is proposed. We use communicating sequential processes to describe the system state transition in trust chain and by combining with multi-level security strategy give the definition of trust system and trust decision theorem of trust chain transfer which is proved meantime. Finally, a prototype system is given to show the efficiency of the model.

  7. [Calculation on ecological security baseline based on the ecosystem services value and the food security].

    Science.gov (United States)

    He, Ling; Jia, Qi-jian; Li, Chao; Xu, Hao

    2016-01-01

    The rapid development of coastal economy in Hebei Province caused rapid transition of coastal land use structure, which has threatened land ecological security. Therefore, calculating ecosystem service value of land use and exploring ecological security baseline can provide the basis for regional ecological protection and rehabilitation. Taking Huanghua, a city in the southeast of Hebei Province, as an example, this study explored the joint point, joint path and joint method between ecological security and food security, and then calculated the ecological security baseline of Huanghua City based on the ecosystem service value and the food safety standard. The results showed that ecosystem service value of per unit area from maximum to minimum were in this order: wetland, water, garden, cultivated land, meadow, other land, salt pans, saline and alkaline land, constructive land. The order of contribution rates of each ecological function value from high to low was nutrient recycling, water conservation, entertainment and culture, material production, biodiversity maintenance, gas regulation, climate regulation and environmental purification. The security baseline of grain production was 0.21 kg · m⁻², the security baseline of grain output value was 0.41 yuan · m⁻², the baseline of ecosystem service value was 21.58 yuan · m⁻², and the total of ecosystem service value in the research area was 4.244 billion yuan. In 2081 the ecological security will reach the bottom line and the ecological system, in which human is the subject, will be on the verge of collapse. According to the ecological security status, Huanghua can be divided into 4 zones, i.e., ecological core protection zone, ecological buffer zone, ecological restoration zone and human activity core zone.

  8. Economic sustainability, water security and multi-level governance of local water schemes in Nepal

    Directory of Open Access Journals (Sweden)

    Emma Hakala

    2017-07-01

    Full Text Available This article explores the role of multi-level governance and power structures in local water security through a case study of the Nawalparasi district in Nepal. It focuses on economic sustainability as a measure to address water security, placing this thematic in the context of a complicated power structure consisting of local, district and national administration as well as external development cooperation actors. The study aims to find out whether efforts to improve the economic sustainability of water schemes have contributed to water security at the local level. In addition, it will consider the interactions between water security, power structures and local equality and justice. The research builds upon survey data from the Nepalese districts of Nawalparasi and Palpa, and a case study based on interviews and observation in Nawalparasi. The survey was performed in water schemes built within a Finnish development cooperation programme spanning from 1990 to 2004, allowing a consideration of the long-term sustainability of water management projects. This adds a crucial external influence into the intra-state power structures shaping water management in Nepal. The article thus provides an alternative perspective to cross-regional water security through a discussion combining transnational involvement with national and local points of view.

  9. Multi-sensors multi-baseline mapping system for mobile robot using stereovision camera and laser-range device

    Directory of Open Access Journals (Sweden)

    Mohammed Faisal

    2016-06-01

    Full Text Available Countless applications today are using mobile robots, including autonomous navigation, security patrolling, housework, search-and-rescue operations, material handling, manufacturing, and automated transportation systems. Regardless of the application, a mobile robot must use a robust autonomous navigation system. Autonomous navigation remains one of the primary challenges in the mobile-robot industry; many control algorithms and techniques have been recently developed that aim to overcome this challenge. Among autonomous navigation methods, vision-based systems have been growing in recent years due to rapid gains in computational power and the reliability of visual sensors. The primary focus of research into vision-based navigation is to allow a mobile robot to navigate in an unstructured environment without collision. In recent years, several researchers have looked at methods for setting up autonomous mobile robots for navigational tasks. Among these methods, stereovision-based navigation is a promising approach for reliable and efficient navigation. In this article, we create and develop a novel mapping system for a robust autonomous navigation system. The main contribution of this article is the fuse of the multi-baseline stereovision (narrow and wide baselines and laser-range reading data to enhance the accuracy of the point cloud, to reduce the ambiguity of correspondence matching, and to extend the field of view of the proposed mapping system to 180°. Another contribution is the pruning the region of interest of the three-dimensional point clouds to reduce the computational burden involved in the stereo process. Therefore, we called the proposed system multi-sensors multi-baseline mapping system. The experimental results illustrate the robustness and accuracy of the proposed system.

  10. Smart Push, Smart Pull, Sensor to Shooter in a Multi-Level Secure/Safe (MLS) Infrastructure

    Science.gov (United States)

    2006-05-04

    Communication Periods Processing Resource Sanitization Minimum Interrupt Servicing Semaphores Multi-Core Synchronization Primitives Timers And nothing else...Communities of Interest Secure Configuration of all Nodes in Enclave Bandwidth provisioning & partitioning Secure Clock Synchronization Suppression of

  11. Multi-Level Data-Security and Data-Protection in a Distributed Search Infrastructure for Digital Medical Samples.

    Science.gov (United States)

    Witt, Michael; Krefting, Dagmar

    2016-01-01

    Human sample data is stored in biobanks with software managing digital derived sample data. When these stand-alone components are connected and a search infrastructure is employed users become able to collect required research data from different data sources. Data protection, patient rights, data heterogeneity and access control are major challenges for such an infrastructure. This dissertation will investigate concepts for a multi-level security architecture to comply with these requirements.

  12. Digital baseline estimation method for multi-channel pulse height analyzing

    International Nuclear Information System (INIS)

    Xiao Wuyun; Wei Yixiang; Ai Xianyun

    2005-01-01

    The basic features of digital baseline estimation for multi-channel pulse height analysis are introduced. The weight-function of minimum-noise baseline filter is deduced with functional variational calculus. The frequency response of this filter is also deduced with Fourier transformation, and the influence of parameters on amplitude frequency response characteristics is discussed. With MATLAB software, the noise voltage signal from the charge sensitive preamplifier is simulated, and the processing effect of minimum-noise digital baseline estimation is verified. According to the results of this research, digital baseline estimation method can estimate baseline optimally, and it is very suitable to be used in digital multi-channel pulse height analysis. (authors)

  13. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret...... sharing (VSS), as well as multi-party computation (MPC) belong to the most appealing and/or useful ones. The former two are basic tools to achieve better robustness of cryptographic schemes against malfunction or misuse by “decentralizing” the security from one single to a whole group of individuals...... (captured by the term threshold cryptography). The latter allows—at least in principle—to execute any collaboration among a group of players in a secure way that guarantees the correctness of the outcome but simultaneously respects the privacy of the participants. In this work, we study three aspects...

  14. The challenges of multi-layered security governance in Ituri

    DEFF Research Database (Denmark)

    Hoffmann, Kasper; Vlassenroot, Koen

    governance is that the inclusion of local non-state actors in security governance will improve security provision to people because they have more legitimacy. But in reality ‘multi-layered’ security governance is often marked by conflict and competition as much as by collaboration and common solutions......There has been a slow, but growing awareness among external actors that some local non-state security actors should be involved in security governance in conflict-affected situations. Already in 2006, the OECD published a report that called for a ‘multi-layered’ approach to reforming actors...... and institutions that provide security and justice services (Scheye and McLean, 2006). Often these actors consist of local authorities, such as customary chiefs, village elders, or business people working in collaboration with different kinds of self-defense groups. The idea behind ‘multi-layered’ security...

  15. Security for multi-hop wireless networks

    CERN Document Server

    Mahmoud, Mohamed M E A

    2014-01-01

    This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in securing networks and presents system models. The authors introduce mechanisms to reduce the overhead and identify malicious nodes that drop packets intentionally. Also included is a new, efficient cooperation incentive scheme to stimulate the selfish nodes to relay information packets and enforce fairness. Many examples are provided, along with predictions for future directions of the field. Security

  16. Engineering Principles for Information Technology Security (A Baseline for Achieving Security)

    National Research Council Canada - National Science Library

    Stoneburner, Gary

    2001-01-01

    The purpose of the Engineering Principles for Information Technology (IT) Security (HP-ITS) is to present a list of system-level security principles to he considered in the design, development, and operation of an information system...

  17. Brief analysis of Jiangsu grid security and stability based on multi-infeed DC index in power system

    Science.gov (United States)

    Zhang, Wenjia; Wang, Quanquan; Ge, Yi; Huang, Junhui; Chen, Zhengfang

    2018-02-01

    The impact of Multi-infeed HVDC has gradually increased to security and stability operating in Jiangsu power grid. In this paper, an appraisal method of Multi-infeed HVDC power grid security and stability is raised with Multi-Infeed Effective Short Circuit Ratio, Multi-Infeed Interaction Factor and Commutation Failure Immunity Index. These indices are adopted in security and stability simulating calculation of Jiangsu Multi-infeed HVDC system. The simulation results indicate that Jiangsu power grid is operating with a strong DC system. It has high level of power grid security and stability, and meet the safety running requirements. Jinpin-Suzhou DC system is located in the receiving end with huge capacity, which is easily leading to commutation failure of the transmission line. In order to resolve this problem, dynamic reactive power compensation can be applied in power grid near Jinpin-Suzhou DC system. Simulation result shows this method is feasible to commutation failure.

  18. Secure communication based on multi-input multi-output chaotic system with large message amplitude

    International Nuclear Information System (INIS)

    Zheng, G.; Boutat, D.; Floquet, T.; Barbot, J.P.

    2009-01-01

    This paper deals with the problem of secure communication based on multi-input multi-output (MIMO) chaotic systems. Single input secure communication based on chaos can be easily extended to multiple ones by some combinations technologies, however all the combined inputs possess the same risk to be broken. In order to reduce this risk, a new secure communication scheme based on chaos with MIMO is discussed in this paper. Moreover, since the amplitude of messages in traditional schemes is limited because it would affect the quality of synchronization, the proposed scheme is also improved into an amplitude-independent one.

  19. A Complex Systems Approach to More Resilient Multi-Layered Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Nathanael J. K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Katherine A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bandlow, Alisa [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nozick, Linda Karen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Waddell, Lucas [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Levin, Drew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Whetzel, Jonathan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-09-01

    In July 2012, protestors cut through security fences and gained access to the Y-12 National Security Complex. This was believed to be a highly reliable, multi-layered security system. This report documents the results of a Laboratory Directed Research and Development (LDRD) project that created a consistent, robust mathematical framework using complex systems analysis algorithms and techniques to better understand the emergent behavior, vulnerabilities and resiliency of multi-layered security systems subject to budget constraints and competing security priorities. Because there are several dimensions to security system performance and a range of attacks that might occur, the framework is multi-objective for a performance frontier to be estimated. This research explicitly uses probability of intruder interruption given detection (PI) as the primary resilience metric. We demonstrate the utility of this framework with both notional as well as real-world examples of Physical Protection Systems (PPSs) and validate using a well-established force-on-force simulation tool, Umbra.

  20. Nigeria's Multi-Agency Security Sector: The Paradox of a House ...

    African Journals Online (AJOL)

    The Nigerian state operates a multi-track security system in order to checkmate internal security threats and repel external aggression. The expected symbiotic inter-agency relationships among security agencies -military, law enforcement and intelligence- has been implied in the composition of the National Security Council ...

  1. Food security among individuals experiencing homelessness and mental illness in the At Home/Chez Soi Trial.

    Science.gov (United States)

    O'Campo, Patricia; Hwang, Stephen W; Gozdzik, Agnes; Schuler, Andrée; Kaufman-Shriqui, Vered; Poremski, Daniel; Lazgare, Luis Ivan Palma; Distasio, Jino; Belbraouet, Slimane; Addorisio, Sindi

    2017-08-01

    Individuals experiencing homelessness are particularly vulnerable to food insecurity. The At Home/Chez Soi study provides a unique opportunity to first examine baseline levels of food security among homeless individuals with mental illness and second to evaluate the effect of a Housing First (HF) intervention on food security in this population. At Home/Chez Soi was a 2-year randomized controlled trial comparing the effectiveness of HF compared with usual care among homeless adults with mental illness, stratified by level of need for mental health services (high or moderate). Logistic regressions tested baseline associations between food security (US Food Security Survey Module), study site, sociodemographic variables, duration of homelessness, alcohol/substance use, physical health and service utilization. Negative binomial regression determined the impact of the HF intervention on achieving levels of high or marginal food security over an 18-month follow-up period (6 to 24 months). Community settings at five Canadian sites (Moncton, Montreal, Toronto, Winnipeg and Vancouver). Homeless adults with mental illness (n 2148). Approximately 41 % of our sample reported high or marginal food security at baseline, but this figure varied with gender, age, mental health issues and substance use problems. High need participants who received HF were more likely to achieve marginal or high food security than those receiving usual care, but only at the Toronto and Moncton sites. Our large multi-site study demonstrated low levels of food security among homeless experiencing mental illness. HF showed promise for improving food security among participants with high levels of need for mental health services, with notable site differences.

  2. Multi-Agent System based Event-Triggered Hybrid Controls for High-Security Hybrid Energy Generation Systems

    DEFF Research Database (Denmark)

    Dou, Chun-Xia; Yue, Dong; Guerrero, Josep M.

    2017-01-01

    This paper proposes multi-agent system based event- triggered hybrid controls for guaranteeing energy supply of a hybrid energy generation system with high security. First, a mul-ti-agent system is constituted by an upper-level central coordi-nated control agent combined with several lower......-level unit agents. Each lower-level unit agent is responsible for dealing with internal switching control and distributed dynamic regula-tion for its unit system. The upper-level agent implements coor-dinated switching control to guarantee the power supply of over-all system with high security. The internal...

  3. Enabling the MLSpOC (Multi-Level Space Operations Center) of the Future

    Science.gov (United States)

    Missal, D.

    2012-09-01

    accredited today at multiple sites both CONUS and OCONUS. It is designed to assist information systems developers achieve DCID 6/3 Protection Level 4 or 5 (PL4 or PL5) or DoD SABI C&A for SECRET-to-UNCLASSIFIED systems (PL3). The product is on the DoD/DNI Unified Cross-domain Management Office's (UCDMO) Baseline of accredited solutions, and is the only solution on the Baseline which the Government considers to be an "All-in-One" approach to the Cross-domain Security challenge. Our solution is also the only PL-4 Cloud in existence and that is deployed and operational in the entire world today (at DIA). The Space marketplace is a very unique cross-domain challenge, as a need exists for Unclassified SSA Data Sharing at a deeper and more fundamental level than anywhere else in the IC or DoD. For instance, certain Agencies and/or Programs have a requirement to share information with Partner Nations that are not considered to be "friendly" (e.g. China). Our Solution is the ONLY solution in the world today that's achieved C&A, and that is uniquely positioned to enable the Multi-level Space Operations Center (MLSpOC) of the Future.

  4. Forest Structure Characterization Using Jpl's UAVSAR Multi-Baseline Polarimetric SAR Interferometry and Tomography

    Science.gov (United States)

    Neumann, Maxim; Hensley, Scott; Lavalle, Marco; Ahmed, Razi

    2013-01-01

    This paper concerns forest remote sensing using JPL's multi-baseline polarimetric interferometric UAVSAR data. It presents exemplary results and analyzes the possibilities and limitations of using SAR Tomography and Polarimetric SAR Interferometry (PolInSAR) techniques for the estimation of forest structure. Performance and error indicators for the applicability and reliability of the used multi-baseline (MB) multi-temporal (MT) PolInSAR random volume over ground (RVoG) model are discussed. Experimental results are presented based on JPL's L-band repeat-pass polarimetric interferometric UAVSAR data over temperate and tropical forest biomes in the Harvard Forest, Massachusetts, and in the La Amistad Park, Panama and Costa Rica. The results are partially compared with ground field measurements and with air-borne LVIS lidar data.

  5. Device-Level Models Using Multi-Valley Effective Mass

    Science.gov (United States)

    Baczewski, Andrew D.; Frees, Adam; Gamble, John King; Gao, Xujiao; Jacobson, N. Tobias; Mitchell, John A.; Montaño, Inès; Muller, Richard P.; Nielsen, Erik

    2015-03-01

    Continued progress in quantum electronics depends critically on the availability of robust device-level modeling tools that capture a wide range of physics and effective mass theory (EMT) is one means of building such models. Recent developments in multi-valley EMT show quantitative agreement with more detailed atomistic tight-binding calculations of phosphorus donors in silicon (Gamble, et. al., arXiv:1408.3159). Leveraging existing PDE solvers, we are developing a framework in which this multi-valley EMT is coupled to an integrated device-level description of several experimentally active qubit technologies. Device-level simulations of quantum operations will be discussed, as well as the extraction of process matrices at this level of theory. The authors gratefully acknowledge support from the Sandia National Laboratories Truman Fellowship Program, which is funded by the Laboratory Directed Research and Development (LDRD) Program. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Security Administration under contract DE-AC04-94AL85000.

  6. Adaptive versus Non-Adaptive Security of Multi-Party Protocols

    DEFF Research Database (Denmark)

    Canetti, Ran; Damgård, Ivan Bjerre; Dziembowski, Stefan

    2004-01-01

    Security analysis of multi-party cryptographic protocols distinguishes between two types of adversarial settings: In the non-adaptive setting the set of corrupted parties is chosen in advance, before the interaction begins. In the adaptive setting the adversary chooses who to corrupt during...... the course of the computation. We study the relations between adaptive security (i.e., security in the adaptive setting) and nonadaptive security, according to two definitions and in several models of computation....

  7. Mercury baseline levels in Flemish soils (Belgium)

    International Nuclear Information System (INIS)

    Tack, Filip M.G.; Vanhaesebroeck, Thomas; Verloo, Marc G.; Van Rompaey, Kurt; Ranst, Eric van

    2005-01-01

    It is important to establish contaminant levels that are normally present in soils to provide baseline data for pollution studies. Mercury is a toxic element of concern. This study was aimed at assessing baseline mercury levels in soils in Flanders. In a previous study, mercury contents in soils in Oost-Vlaanderen were found to be significantly above levels reported elsewhere. For the current study, observations were extended over two more provinces, West-Vlaanderen and Antwerpen. Ranges of soil Hg contents were distinctly higher in the province Oost-Vlaanderen (interquartile range from 0.09 to 0.43 mg/kg) than in the other provinces (interquartile ranges from 0.7 to 0.13 and 0.7 to 0.15 mg/kg for West-Vlaanderen and Antwerpen, respectively). The standard threshold method was applied to separate soils containing baseline levels of Hg from the data. Baseline concentrations for Hg were characterised by a median of 0.10 mg Hg/kg dry soil, an interquartile range from 0.07 to 0.14 mg/kg and a 90% percentile value of 0.30 mg/kg. The influence of soil properties such as clay and organic carbon contents, and pH on baseline Hg concentrations was not important. Maps of the spatial distribution of Hg levels showed that the province Oost-Vlaanderen exhibited zones with systematically higher Hg soil contents. This may be related to the former presence of many small-scale industries employing mercury in that region. - Increased mercury levels may reflect human activity

  8. Employment Security of Nurses: Baseline for a Strategic Human Resource Direction

    Directory of Open Access Journals (Sweden)

    Dr. Renante A. Egcas

    2017-11-01

    Full Text Available This study is anchored on Herzberg’s Two-Factor Theory which suggests that satisfaction of employees is related to motivation (e.g. achievement, recognition, advancement, growth, and responsibility and dissatisfaction is related to hygiene factors (e.g. company policy and administration, supervision, interpersonal relationships, working conditions, pay, status, and job security. This study aimed to determine the level and predictors of employment security of nurses in both private and government hospitals in Negros Occidental, Philippines. The level of employment security was categorized into economic security, professional security, personal security, and workplace security. Specifically, this study examined the nurserespondents’ profile in terms of types of hospital employed to, sex, civil status, number of dependents, educational attainment, rank, employment status, salary grade, net income, and length of service. This study also determined the significant differences on the level of employment security of nurses when assessed at different categories and when the respondents are grouped according to their profile. This is a descriptive study which surveyed and interviewed nurses (n=318 from 18 government hospitals, 3 infirmaries and 4 private hospitals which signified intention to participate in the study. The study used the stratified random sampling to insure representativeness of the nurse-respondents.Results revealed that the nurse-respondents expressed moderate security in economic aspect, low security in professional aspect, high security in personal aspect and moderate security in workplace aspect. Highly significant differences were noted between professional security and workplace security. Results also revealed that types of hospital, civil status, rank, employment status are predictors of employment security of the nurse-respondents. Hence, the results implied that fast turnover and migration of Philippine nurses are not mainly

  9. SecurityCom: A Multi-Player Game for Researching and Teaching Information Security Teams

    Directory of Open Access Journals (Sweden)

    Douglas P. Twitchell

    2007-12-01

    Full Text Available A major portion of government and business organizations’ attempts to counteract information security threats is teams of security personnel.  These teams often consist of personnel of diverse backgrounds in specific specialties such as network administration, application development, and business administration, resulting in possible conflicts between security, functionality, and availability.  This paper discusses the use of games to teach and research information security teams and outlines research to design and build a simple, team-oriented, configurable, information security game. It will be used to study how information security teams work together to defend against attacks using a multi-player game, and to study the use of games in training security teams.  Studying how information security teams work, especially considering the topic of shared-situational awareness, could lead to better ways of forming, managing, and training teams.  Studying the effectiveness of the game as a training tool could lead to better training for security teams. 

  10. Security of nuclear materials using fusion multi sensor wavelett

    International Nuclear Information System (INIS)

    Djoko Hari Nugroho

    2010-01-01

    Security of a nuclear material in an installation is determined by how far the installation is to assure that nuclear material remains at a predetermined location. This paper observed a preliminary design on nuclear material tracking system in the installation for decision making support based on multi sensor fusion that is reliable and accurate to ensure that the nuclear material remains inside the control area. Capability on decision making in the Management Information System is represented by an understanding of perception in the third level of abstraction. The second level will be achieved with the support of image analysis and organizing data. The first level of abstraction is constructed by merger between several CCD camera sensors distributed in a building in a data fusion representation. Data fusion is processed based on Wavelett approach. Simulation utilizing Matlab programming shows that Wavelett fuses multi information from sensors as well. Hope that when the nuclear material out of control regions which have been predetermined before, there will arise a warning alarm and a message in the Management Information System display. Thus the nuclear material movement time event can be obtained and tracked as well. (author)

  11. CryoSat SAR/SARin Level1b products: assessment of BaselineC and improvements towards BaselineD

    Science.gov (United States)

    Scagliola, Michele; Fornari, Marco; Bouffard, Jerome; Parrinello, Tommaso

    2017-04-01

    CryoSat was launched on the 8th April 2010 and is the first European ice mission dedicated to the monitoring of precise changes in the thickness of polar ice sheets and floating sea ice. Cryosat carries an innovative radar altimeter called the Synthetic Aperture Interferometric Altimeter (SIRAL), that transmits pulses at a high pulse repetition frequency thus making the received echoes phase coherent and suitable for azimuth processing. This allows to reach a significantly improved along track resolution with respect to traditional pulse-width limited altimeters. CryoSat is the first altimetry mission operating in SAR mode and continuous improvements in the Level1 Instrument Processing Facility (IPF1) are being identified, tested and validated in order to improve the quality of the Level1b products. The current IPF, Baseline C, was released in operation in April 2015 and the second CryoSat reprocessing campaign was jointly initiated, taking benefit of the upgrade implemented in the IPF1 processing chain but also of some specific configurations for the calibration corrections. In particular, the CryoSat Level1b BaselineC products generated in the framework of the second reprocessing campaign include refined information for what concerns the mispointing angles and the calibration corrections. This poster will thus detail thus the evolutions that are currently planned for the CryoSat BaselineD SAR/SARin Level1b products and the corresponding quality improvements that are expected.

  12. TRUST MODEL FOR INFORMATION SECURITY OF MULTI-AGENT ROBOTIC SYSTEMS WITH A DECENTRALIZED MANAGEMENT

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2014-03-01

    Full Text Available The paper deals with the issues on protection of multi-agent robotic systems against attacks by robots-saboteurs. The operation analysis of such systems with decentralized control is carried out. Concept of harmful information impact (attack from a robot-saboteur to the multi-agent robotic system is given. The class of attacks is considered using interception of messages, formation and transfer of misinformation to group of robots, and also carrying out other actions with vulnerabilities of multiagent algorithms without obviously identified signs of invasion of robots-saboteurs. The model of information security is developed, in which robots-agents work out trust levels to each other analyzing the events occurring in the system. The idea of trust model consists in the analysis of transferred information by each robot and the executed actions of other members in a group, comparison of chosen decision on iteration step k with objective function of the group. Distinctive feature of the trust model in comparison with the closest analogue - Buddy Security Model in which the exchange between the agents security tokens is done — is involvement of the time factor during which agents have to "prove" by their actions the usefulness in achievement of a common goal to members of the group. Variants of this model realization and ways of an assessment of trust levels for agents in view of the security policy accepted in the group are proposed.

  13. Why are models unable to reproduce multi-decadal trends in lower tropospheric baseline ozone levels?

    Science.gov (United States)

    Hu, L.; Liu, J.; Mickley, L. J.; Strahan, S. E.; Steenrod, S.

    2017-12-01

    Assessments of tropospheric ozone radiative forcing rely on accurate model simulations. Parrish et al (2014) found that three chemistry-climate models (CCMs) overestimate present-day O3 mixing ratios and capture only 50% of the observed O3 increase over the last five decades at 12 baseline sites in the northern mid-latitudes, indicating large uncertainties in our understanding of the ozone trends and their implications for radiative forcing. Here we present comparisons of outputs from two chemical transport models (CTMs) - GEOS-Chem and the Global Modeling Initiative model - with O3 observations from the same sites and from the global ozonesonde network. Both CTMs are driven by reanalysis meteorological data (MERRA or MERRA2) and thus are expected to be different in atmospheric transport processes relative to those freely running CCMs. We test whether recent model developments leading to more active ozone chemistry affect the computed ozone sensitivity to perturbations in emissions. Preliminary results suggest these CTMs can reproduce present-day ozone levels but fail to capture the multi-decadal trend since 1980. Both models yield widespread overpredictions of free tropospheric ozone in the 1980s. Sensitivity studies in GEOS-Chem suggest that the model estimate of natural background ozone is too high. We discuss factors that contribute to the variability and trends of tropospheric ozone over the last 30 years, with a focus on intermodel differences in spatial resolution and in the representation of stratospheric chemistry, stratosphere-troposphere exchange, halogen chemistry, and biogenic VOC emissions and chemistry. We also discuss uncertainty in the historical emission inventories used in models, and how these affect the simulated ozone trends.

  14. A SCHEME FOR TEMPLATE SECURITY AT FEATURE FUSION LEVEL IN MULTIMODAL BIOMETRIC SYSTEM

    Directory of Open Access Journals (Sweden)

    Arvind Selwal

    2016-09-01

    Full Text Available Biometric is the science of human recognition based upon using their biological, chemical or behavioural traits. These systems are used in many real life applications simply from biometric based attendance system to providing security at very sophisticated level. A biometric system deals with raw data captured using a sensor and feature template extracted from raw image. One of the challenges being faced by designers of these systems is to secure template data extracted from the biometric modalities of the user and protect the raw images. To minimize spoof attacks on biometric systems by unauthorised users one of the solutions is to use multi-biometric systems. Multi-modal biometric system works by using fusion technique to merge feature templates generated from different modalities of the human. In this work a new scheme is proposed to secure template during feature fusion level. Scheme is based on union operation of fuzzy relations of templates of modalities during fusion process of multimodal biometric systems. This approach serves dual purpose of feature fusion as well as transformation of templates into a single secured non invertible template. The proposed technique is cancelable and experimentally tested on a bimodal biometric system comprising of fingerprint and hand geometry. Developed scheme removes the problem of an attacker learning the original minutia position in fingerprint and various measurements of hand geometry. Given scheme provides improved performance of the system with reduction in false accept rate and improvement in genuine accept rate.

  15. Molecular transport network security using multi-wavelength optical spins.

    Science.gov (United States)

    Tunsiri, Surachai; Thammawongsa, Nopparat; Mitatha, Somsak; Yupapin, Preecha P

    2016-01-01

    Multi-wavelength generation system using an optical spin within the modified add-drop optical filter known as a PANDA ring resonator for molecular transport network security is proposed. By using the dark-bright soliton pair control, the optical capsules can be constructed and applied to securely transport the trapped molecules within the network. The advantage is that the dark and bright soliton pair (components) can securely propagate for long distance without electromagnetic interference. In operation, the optical intensity from PANDA ring resonator is fed into gold nano-antenna, where the surface plasmon oscillation between soliton pair and metallic waveguide is established.

  16. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    Full Text Available With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  17. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Science.gov (United States)

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  18. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    Science.gov (United States)

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  19. Supporting multi-state collaboration on privacy and security to foster health IT and health information exchange.

    Science.gov (United States)

    Banger, Alison K; Alakoye, Amoke O; Rizk, Stephanie C

    2008-11-06

    As part of the HHS funded contract, Health Information Security and Privacy Collaboration, 41 states and territories have proposed collaborative projects to address cross-state privacy and security challenges related to health IT and health information exchange. Multi-state collaboration on privacy and security issues remains complicated, and resources to support collaboration around these topics are essential to the success of such collaboration. The resources outlined here offer an example of how to support multi-stakeholder, multi-state projects.

  20. High-performance secure multi-party computation for data mining applications

    DEFF Research Database (Denmark)

    Bogdanov, Dan; Niitsoo, Margus; Toft, Tomas

    2012-01-01

    Secure multi-party computation (MPC) is a technique well suited for privacy-preserving data mining. Even with the recent progress in two-party computation techniques such as fully homomorphic encryption, general MPC remains relevant as it has shown promising performance metrics in real...... operations such as multiplication and comparison. Secondly, the confidential processing of financial data requires the use of more complex primitives, including a secure division operation. This paper describes new protocols in the Sharemind model for secure multiplication, share conversion, equality, bit...

  1. An Internet of Things Based Multi-Level Privacy-Preserving Access Control for Smart Living

    Directory of Open Access Journals (Sweden)

    Usama Salama

    2018-05-01

    Full Text Available The presence of the Internet of Things (IoT in healthcare through the use of mobile medical applications and wearable devices allows patients to capture their healthcare data and enables healthcare professionals to be up-to-date with a patient’s status. Ambient Assisted Living (AAL, which is considered as one of the major applications of IoT, is a home environment augmented with embedded ambient sensors to help improve an individual’s quality of life. This domain faces major challenges in providing safety and security when accessing sensitive health data. This paper presents an access control framework for AAL which considers multi-level access and privacy preservation. We focus on two major points: (1 how to use the data collected from ambient sensors and biometric sensors to perform the high-level task of activity recognition; and (2 how to secure the collected private healthcare data via effective access control. We achieve multi-level access control by extending Public Key Infrastructure (PKI for secure authentication and utilizing Attribute-Based Access Control (ABAC for authorization. The proposed access control system regulates access to healthcare data by defining policy attributes over healthcare professional groups and data classes classifications. We provide guidelines to classify the data classes and healthcare professional groups and describe security policies to control access to the data classes.

  2. Esophageal acid exposure decreases intraluminal baseline impedance levels

    NARCIS (Netherlands)

    Kessing, Boudewijn F.; Bredenoord, Albert J.; Weijenborg, Pim W.; Hemmink, Gerrit J. M.; Loots, Clara M.; Smout, A. J. P. M.

    2011-01-01

    Intraluminal baseline impedance levels are determined by the conductivity of the esophageal wall and can be decreased in gastroesophageal reflux disease (GERD) patients. The aim of this study was to investigate the baseline impedance in GERD patients, on and off proton pump inhibitor (PPI), and in

  3. Secure multi-party communication with quantum key distribution managed by trusted authority

    Science.gov (United States)

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  4. Secure multi-party communication with quantum key distribution managed by trusted authority

    Science.gov (United States)

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2017-06-14

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  5. Information risk and security modeling

    Science.gov (United States)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  6. Baseline Response Levels Are a Nuisance in Infant Contingency Learning

    Science.gov (United States)

    Millar, W. S.; Weir, Catherine

    2015-01-01

    The impact of differences in level of baseline responding on contingency learning in the first year was examined by considering the response acquisition of infants classified into baseline response quartiles. Whereas the three lower baseline groups showed the predicted increment in responding to a contingency, the highest baseline responders did…

  7. Food security is related to adult type 2 diabetes control over time in a United States safety net primary care clinic population.

    Science.gov (United States)

    Shalowitz, M U; Eng, J S; McKinney, C O; Krohn, J; Lapin, B; Wang, C-H; Nodine, E

    2017-05-15

    Successful Type 2 diabetes management requires adopting a high nutrient-density diet made up of food items that both meet dietary needs and preferences and can be feasibly obtained on a regular basis. However, access to affordable, nutrient-dense foods often is lacking in poorer neighbourhoods. Therefore, low food security should directly impair glucose control, even when patients have full access to and utilize comprehensive medical management. The present study sought to determine whether food security is related longitudinally to glucose control, over-and-above ongoing medication management, among Type 2 diabetes patients receiving comprehensive care at a Midwestern multi-site federally qualified health centre (FQHC). In this longitudinal observational study, we completed a baseline assessment of patients' food security (using the US Household Food Security Module), demographics (via Census items), and diabetes history/management (using a structured clinical encounter form) when patients began receiving diabetes care at the health centre. We then recorded those patients' A1C levels several times during a 24-month follow-up period. Three hundred and ninety-nine patients (56% with low food security) had a baseline A1c measurement; a subsample of 336 (median age=52 years; 56% female; 60% Hispanic, 27% African American, and 9% White) also had at least one follow-up A1c measurement. Patients with lower (vs higher) food security were more likely to be on insulin and have higher A1c levels at baseline. Moreover, the disparity in glucose control by food security status persisted throughout the next 2 years. Although results were based on one multi-site FQHC, potentially limiting their generalizability, they seem to suggest that among Type 2 diabetes patients, low food security directly impairs glucose control-even when patients receive full access to comprehensive medical management-thereby increasing their long-term risks of high morbidity, early mortality, and high

  8. Bandwidth Optimization of Normal Equation Matrix in Bundle Block Adjustment in Multi-baseline Rotational Photography

    Directory of Open Access Journals (Sweden)

    WANG Xiang

    2016-02-01

    Full Text Available A new bandwidth optimization method of normal equation matrix in bundle block adjustment in multi-baseline rotational close range photography by image index re-sorting is proposed. The equivalent exposure station of each image is calculated by its object space coverage and the relationship with other adjacent images. Then, according to the coordinate relations between equivalent exposure stations, new logical indices of all images are computed, based on which, the optimized bandwidth value can be obtained. Experimental results show that the bandwidth determined by our proposed method is significantly better than its original value, thus the operational efficiency, as well as the memory consumption of multi-baseline rotational close range photography in real-data applications, is optimized to a certain extent.

  9. Modeling Multi-Level Systems

    CERN Document Server

    Iordache, Octavian

    2011-01-01

    This book is devoted to modeling of multi-level complex systems, a challenging domain for engineers, researchers and entrepreneurs, confronted with the transition from learning and adaptability to evolvability and autonomy for technologies, devices and problem solving methods. Chapter 1 introduces the multi-scale and multi-level systems and highlights their presence in different domains of science and technology. Methodologies as, random systems, non-Archimedean analysis, category theory and specific techniques as model categorification and integrative closure, are presented in chapter 2. Chapters 3 and 4 describe polystochastic models, PSM, and their developments. Categorical formulation of integrative closure offers the general PSM framework which serves as a flexible guideline for a large variety of multi-level modeling problems. Focusing on chemical engineering, pharmaceutical and environmental case studies, the chapters 5 to 8 analyze mixing, turbulent dispersion and entropy production for multi-scale sy...

  10. Selection of security system design via games of imperfect information and multi-objective genetic algorithm

    International Nuclear Information System (INIS)

    Lins, Isis Didier; Rêgo, Leandro Chaves; Moura, Márcio das Chagas

    2013-01-01

    This work analyzes the strategic interaction between a defender and an intelligent attacker by means of a game and reliability framework involving a multi-objective approach and imperfect information so as to support decision-makers in choosing efficiently designed security systems. A multi-objective genetic algorithm is used to determine the optimal security system's configurations representing the tradeoff between the probability of a successful defense and the acquisition and operational costs. Games with imperfect information are considered, in which the attacker has limited knowledge about the actual security system. The types of security alternatives are readily observable, but the number of redundancies actually implemented in each security subsystem is not known. The proposed methodology is applied to an illustrative example considering power transmission lines in the Northeast of Brazil, which are often targets for attackers who aims at selling the aluminum conductors. The empirical results show that the framework succeeds in handling this sort of strategic interaction. -- Highlights: ► Security components must have feasible costs and must be reliable. ► The optimal design of security systems considers a multi-objective approach. ► Games of imperfect information enable the choice of non-dominated configurations. ► MOGA, reliability and games support the entire defender's decision process. ► The selection of effective security systems may discourage attacker's actions

  11. DiFX: A software correlator for very long baseline interferometry using multi-processor computing environments

    OpenAIRE

    Deller, A. T.; Tingay, S. J.; Bailes, M.; West, C.

    2007-01-01

    We describe the development of an FX style correlator for Very Long Baseline Interferometry (VLBI), implemented in software and intended to run in multi-processor computing environments, such as large clusters of commodity machines (Beowulf clusters) or computers specifically designed for high performance computing, such as multi-processor shared-memory machines. We outline the scientific and practical benefits for VLBI correlation, these chiefly being due to the inherent flexibility of softw...

  12. Multi-Level Anomaly Detection on Time-Varying Graph Data

    Energy Technology Data Exchange (ETDEWEB)

    Bridges, Robert A [ORNL; Collins, John P [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Sullivan, Blair D [ORNL

    2015-01-01

    This work presents a novel modeling and analysis framework for graph sequences which addresses the challenge of detecting and contextualizing anomalies in labelled, streaming graph data. We introduce a generalization of the BTER model of Seshadhri et al. by adding flexibility to community structure, and use this model to perform multi-scale graph anomaly detection. Specifically, probability models describing coarse subgraphs are built by aggregating probabilities at finer levels, and these closely related hierarchical models simultaneously detect deviations from expectation. This technique provides insight into a graph's structure and internal context that may shed light on a detected event. Additionally, this multi-scale analysis facilitates intuitive visualizations by allowing users to narrow focus from an anomalous graph to particular subgraphs or nodes causing the anomaly. For evaluation, two hierarchical anomaly detectors are tested against a baseline Gaussian method on a series of sampled graphs. We demonstrate that our graph statistics-based approach outperforms both a distribution-based detector and the baseline in a labeled setting with community structure, and it accurately detects anomalies in synthetic and real-world datasets at the node, subgraph, and graph levels. To illustrate the accessibility of information made possible via this technique, the anomaly detector and an associated interactive visualization tool are tested on NCAA football data, where teams and conferences that moved within the league are identified with perfect recall, and precision greater than 0.786.

  13. Effect of a Multi-Level Education Intervention Model on Knowledge and Attitudes of Accidental Injuries in Rural Children in Zunyi, Southwest China

    Directory of Open Access Journals (Sweden)

    Bo-Ling Cao

    2015-04-01

    Full Text Available Objective: To explore the effect of a school-family-individual (SFI multi-level education intervention model on knowledge and attitudes about accidental injuries among school-aged children to improve injury prevention strategies and reduce the incidence of pediatric injuries. Methods: The random sample of rural school-aged children were recruited by using a multistage, stratified, cluster sampling method in Zunyi, Southwest China from 2012 to 2014, and 2342 children were randomly divided into intervention and control groups. Then children answered a baseline survey to collect knowledge and attitude scores (KAS of accidental injuries. In the intervention group, children, their parents/guardians and the school received a SFI multi-level education intervention, which included a children’s injury-prevention poster at schools, an open letter about security instruction for parents/guardians and multiple-media health education (Microsoft PowerPoint lectures, videos, handbooks, etc. to children. Children in the control group were given only handbook education. After 16 months, children answered a follow-up survey to collect data on accidental injury types and accidental injury-related KAS for comparing the intervention and control groups and baseline and follow-up data. Results: The distribution of gender was not significantly different while age was different between the baseline and follow-up survey. At baseline, the mean KAS was lower for the intervention than control group (15.37 ± 3.40 and 18.35 ± 5.01; p < 0.001. At follow-up, the mean KAS was higher for the intervention than control group (21.16 ± 3.05 and 20.02 ± 3.40; p < 0.001. The increase in KAS in the intervention and control groups was significant (p < 0.001; KAS: 5.79 vs. 1.67 and suggested that children’s injury-related KAS improved in the intervention group. Moreover, the KAS between the groups differed for most subtypes of incidental injuries (based on International

  14. Multi-party quantum key agreement protocol secure against collusion attacks

    Science.gov (United States)

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  15. Scanning technology with multi-slice helical CT in security inspection domain

    International Nuclear Information System (INIS)

    Wang Jue; Wang Fuquan; Jiang Zenghui

    2008-01-01

    The paper analyzes the technology conditions of security inspection in home and abroad, and expatiates technology of spiral CT and how to define CT value etc, with studying on the key technology of spiral CT scanning way (X-RAY, detector, technology of pulley etc) and mutual relation. By comparing the present products of security inspection, the conclusion was drawn that it is inevitable to develop the tendency of security inspection area with the checking and discerning the substance by using the technology of multi-layer spiral CT. (authors)

  16. Support for Multi-Level Security Policies in DRM Architectures

    NARCIS (Netherlands)

    Tanenbaum, A.S.; Popescu, B.C.; Crispo, B.; Hempelmann, C.F.; Raskin, V.

    2004-01-01

    Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no easy task, given that content needs to be protected while accessed through electronic devices in the hands of

  17. A multi-layered network of the (Colombian) sovereign securities market

    NARCIS (Netherlands)

    Renneboog, Luc; Leon Rincon, Carlos; Pérez, Jhonatan; Alexandrova-Kabadjova, Bilana; Diehl, Martin; Heuver, Richard; Martinez-Jaramillo, Serafín

    2015-01-01

    We study the network of Colombian sovereign securities settlements. With data from the settlement market infrastructure we study financial institutions’ transactions from three different trading and registering individual networks that we combine into a multi-layer network. Examining this network of

  18. Security audits of multi-tier virtual infrastructures in public infrastructure clouds

    DEFF Research Database (Denmark)

    Bleikertz, Sören; Schunter, Matthias; Probst, Christian W.

    2010-01-01

    Cloud computing has gained remarkable popularity in the recent years by a wide spectrum of consumers, ranging from small start-ups to governments. However, its benefits in terms of flexibility, scalability, and low upfront investments, are shadowed by security challenges which inhibit its adoption....... Managed through a web-services interface, users can configure highly flexible but complex cloud computing environments. Furthermore, users misconfiguring such cloud services poses a severe security risk that can lead to security incidents, e.g., erroneous exposure of services due to faulty network...... security configurations. In this article we present a novel approach in the security assessment of the end-user configuration of multi-tier architectures deployed on infrastructure clouds such as Amazon EC2. In order to perform this assessment for the currently deployed configuration, we automated...

  19. Security Awareness in Software-Defined Multi-Domain 5G Networks

    Directory of Open Access Journals (Sweden)

    Jani Suomalainen

    2018-03-01

    Full Text Available Fifth generation (5G technologies will boost the capacity and ease the management of mobile networks. Emerging virtualization and softwarization technologies enable more flexible customization of network services and facilitate cooperation between different actors. However, solutions are needed to enable users, operators, and service providers to gain an up-to-date awareness of the security and trustworthiness of 5G systems. We describe a novel framework and enablers for security monitoring, inferencing, and trust measuring. The framework leverages software-defined networking and big data technologies to customize monitoring for different applications. We present an approach for sharing security measurements across administrative domains. We describe scenarios where the correlation of multi-domain information improves the accuracy of security measures with respect to two threats: end-user location tracking and Internet of things (IoT authentication storms. We explore the security characteristics of data flows in software networks dedicated to different applications with a mobile network testbed.

  20. Multi- factor volatility of security at Charles Schwab Corporation ...

    African Journals Online (AJOL)

    This paper examined the rate of returns required by investors who invested at Charles Schwab (Discount Brokerage firm) from 30th September, 1987 to 29th August, 1997. The methodology adapted involved the use of a multi-factor stochastic model; APT. The study shows a low systematic risk of the security. There was ...

  1. Prospective in-patient cohort study of moves between levels of therapeutic security: the DUNDRUM-1 triage security, DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales and the HCR-20

    Directory of Open Access Journals (Sweden)

    Davoren Mary

    2012-07-01

    Full Text Available Abstract Background We examined whether new structured professional judgment instruments for assessing need for therapeutic security, treatment completion and recovery in forensic settings were related to moves from higher to lower levels of therapeutic security and added anything to assessment of risk. Methods This was a prospective naturalistic twelve month observational study of a cohort of patients in a forensic hospital placed according to their need for therapeutic security along a pathway of moves from high to progressively less secure units in preparation for discharge. Patients were assessed using the DUNDRUM-1 triage security scale, the DUNDRUM-3 programme completion scale and the DUNDRUM-4 recovery scale and assessments of risk of violence, self harm and suicide, symptom severity and global function. Patients were subsequently observed for positive moves to less secure units and negative moves to more secure units. Results There were 86 male patients at baseline with mean follow-up 0.9 years, 11 positive and 9 negative moves. For positive moves, logistic regression indicated that along with location at baseline, the DUNDRUM-1, HCR-20 dynamic and PANSS general symptom scores were associated with subsequent positive moves. The receiver operating characteristic was significant for the DUNDRUM-1 while ANOVA co-varying for both location at baseline and HCR-20 dynamic score was significant for DUNDRUM-1. For negative moves, logistic regression showed DUNDRUM-1 and HCR-20 dynamic scores were associated with subsequent negative moves, along with DUNDRUM-3 and PANSS negative symptoms in some models. The receiver operating characteristic was significant for the DUNDRUM-4 recovery and HCR-20 dynamic scores with DUNDRUM-1, DUNDRUM-3, PANSS general and GAF marginal. ANOVA co-varying for both location at baseline and HCR-20 dynamic scores showed only DUNDRUM-1 and PANSS negative symptoms associated with subsequent negative moves. Conclusions

  2. Prospective in-patient cohort study of moves between levels of therapeutic security: the DUNDRUM-1 triage security, DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales and the HCR-20.

    Science.gov (United States)

    Davoren, Mary; O'Dwyer, Sarah; Abidin, Zareena; Naughton, Leena; Gibbons, Olivia; Doyle, Elaine; McDonnell, Kim; Monks, Stephen; Kennedy, Harry G

    2012-07-13

    We examined whether new structured professional judgment instruments for assessing need for therapeutic security, treatment completion and recovery in forensic settings were related to moves from higher to lower levels of therapeutic security and added anything to assessment of risk. This was a prospective naturalistic twelve month observational study of a cohort of patients in a forensic hospital placed according to their need for therapeutic security along a pathway of moves from high to progressively less secure units in preparation for discharge. Patients were assessed using the DUNDRUM-1 triage security scale, the DUNDRUM-3 programme completion scale and the DUNDRUM-4 recovery scale and assessments of risk of violence, self harm and suicide, symptom severity and global function. Patients were subsequently observed for positive moves to less secure units and negative moves to more secure units. There were 86 male patients at baseline with mean follow-up 0.9 years, 11 positive and 9 negative moves. For positive moves, logistic regression indicated that along with location at baseline, the DUNDRUM-1, HCR-20 dynamic and PANSS general symptom scores were associated with subsequent positive moves. The receiver operating characteristic was significant for the DUNDRUM-1 while ANOVA co-varying for both location at baseline and HCR-20 dynamic score was significant for DUNDRUM-1. For negative moves, logistic regression showed DUNDRUM-1 and HCR-20 dynamic scores were associated with subsequent negative moves, along with DUNDRUM-3 and PANSS negative symptoms in some models. The receiver operating characteristic was significant for the DUNDRUM-4 recovery and HCR-20 dynamic scores with DUNDRUM-1, DUNDRUM-3, PANSS general and GAF marginal. ANOVA co-varying for both location at baseline and HCR-20 dynamic scores showed only DUNDRUM-1 and PANSS negative symptoms associated with subsequent negative moves. Clinicians appear to decide moves based on combinations of current and

  3. Multi-stage decoding of multi-level modulation codes

    Science.gov (United States)

    Lin, Shu; Kasami, Tadao; Costello, Daniel J., Jr.

    1991-01-01

    Various types of multi-stage decoding for multi-level modulation codes are investigated. It is shown that if the component codes of a multi-level modulation code and types of decoding at various stages are chosen properly, high spectral efficiency and large coding gain can be achieved with reduced decoding complexity. Particularly, it is shown that the difference in performance between the suboptimum multi-stage soft-decision maximum likelihood decoding of a modulation code and the single-stage optimum soft-decision decoding of the code is very small, only a fraction of dB loss in signal to noise ratio at a bit error rate (BER) of 10(exp -6).

  4. Tolerance in multi-religious society for national security: the Nigerian ...

    African Journals Online (AJOL)

    The study employed both primary and secondary sources of data. The primary source includes the Bible and the Qur'an while the secondary source includes books, journal articles and the Internet. The data collected were analysed using sociological approach. Keywords: National Security, Multi-Religious, Tolerance, ...

  5. Interconnected Levels of Multi-Stage Marketing

    DEFF Research Database (Denmark)

    Vedel, Mette; Geersbro, Jens; Ritter, Thomas

    2012-01-01

    different levels of multi-stage marketing and illustrates these stages with a case study. In addition, a triadic perspective is introduced as an analytical tool for multi-stage marketing research. The results from the case study indicate that multi-stage marketing exists on different levels. Thus, managers...... must not only decide in general on the merits of multi-stage marketing for their firm, but must also decide on which level they will engage in multi-stage marketing. The triadic perspective enables a rich and multi-dimensional understanding of how different business relationships influence each other...... in a multi-stage marketing context. This understanding assists managers in assessing and balancing different aspects of multi- stage marketing. The triadic perspective also offers avenues for further research....

  6. Multi-level trellis coded modulation and multi-stage decoding

    Science.gov (United States)

    Costello, Daniel J., Jr.; Wu, Jiantian; Lin, Shu

    1990-01-01

    Several constructions for multi-level trellis codes are presented and many codes with better performance than previously known codes are found. These codes provide a flexible trade-off between coding gain, decoding complexity, and decoding delay. New multi-level trellis coded modulation schemes using generalized set partitioning methods are developed for Quadrature Amplitude Modulation (QAM) and Phase Shift Keying (PSK) signal sets. New rotationally invariant multi-level trellis codes which can be combined with differential encoding to resolve phase ambiguity are presented.

  7. Design of shared unit-dose drug distribution network using multi-level particle swarm optimization.

    Science.gov (United States)

    Chen, Linjie; Monteiro, Thibaud; Wang, Tao; Marcon, Eric

    2018-03-01

    Unit-dose drug distribution systems provide optimal choices in terms of medication security and efficiency for organizing the drug-use process in large hospitals. As small hospitals have to share such automatic systems for economic reasons, the structure of their logistic organization becomes a very sensitive issue. In the research reported here, we develop a generalized multi-level optimization method - multi-level particle swarm optimization (MLPSO) - to design a shared unit-dose drug distribution network. Structurally, the problem studied can be considered as a type of capacitated location-routing problem (CLRP) with new constraints related to specific production planning. This kind of problem implies that a multi-level optimization should be performed in order to minimize logistic operating costs. Our results show that with the proposed algorithm, a more suitable modeling framework, as well as computational time savings and better optimization performance are obtained than that reported in the literature on this subject.

  8. Recent Developments in Low-Level Software Security

    OpenAIRE

    Agten , Pieter; Nikiforakis , Nick; Strackx , Raoul; Groef , Willem ,; Piessens , Frank

    2012-01-01

    Part 1: Keynotes; International audience; An important objective for low-level software security research is to develop techniques that make it harder to launch attacks that exploit implementation details of the system under attack. Baltopoulos and Gordon have summarized this as the principle of source-based reasoning for security: security properties of a software system should follow from review of the source code and its source-level semantics, and should not depend on details of the compi...

  9. Securing MDSplus in a multi-organisation environment

    Energy Technology Data Exchange (ETDEWEB)

    Castro, R., E-mail: rodrigo.castro@ciemat.e [Asociacion EURATOM/CIEMAT para Fusion, Avda. Complutense, 22, 28040 Madrid (Spain); Vega, J. [Asociacion EURATOM/CIEMAT para Fusion, Avda. Complutense, 22, 28040 Madrid (Spain); Fredian, T. [MIT Plasma Science and Fusion Center, Massachusetts Institute of Technology, NW17-268, 175 Albany Street, Cambridge, MA 02494 (United States); Purahoo, K. [EURATOM/UKAEA Fusion Association, Culham Science Centre, Abingdon OX14 3DB (United Kingdom); Pereira, A.; Portas, A. [Asociacion EURATOM/CIEMAT para Fusion, Avda. Complutense, 22, 28040 Madrid (Spain)

    2010-07-15

    MDSplus has become the de facto standard data access method in the fusion community. Based on this, it was a priority for EFDA Federation to integrate this technology as a new service for federated users, providing secure access mechanisms to MDSplus compatible applications. To achieve this, it has been necessary to upgrade MDSplus and make it compatible with PAPI technology, which is currently used as security infrastructure in the EFDA Federation. Additionally, the included modifications are useful for future integrations in other federation technologies such as Shibboleth . The integration of MDSplus into a federated structure has several benefits. From the service management point of view, there is a simplification of the installation of new MDSplus services in fusion community and its corresponding security management. From the user point of view, the integration of MDSplus into a federated structure has several advantages. The first one is user mobility, which is the possibility of accessing data independently of his client IP address. The second one is a multi-organisation infrastructure, so the user can access data from different organisations that implement MDSplus interface. Finally, single sign on PAPI feature enables users to access to different MDSplus data sources, and other federated services, with just one authentication.

  10. Increased risk of coronary artery calcification progression in subjects with high baseline Lp(a) levels: The Kangbuk Samsung Health Study.

    Science.gov (United States)

    Cho, Jung Hwan; Lee, Da Young; Lee, Eun Seo; Kim, Jihyun; Park, Se Eun; Park, Cheol-Young; Lee, Won-Young; Oh, Ki-Won; Park, Sung-Woo; Rhee, Eun-Jung

    2016-11-01

    Results from previous studies support the association of lipoprotein(a) [Lp(a)] levels and coronary artery disease risk. In this study, we analyzed the association between baseline Lp(a) levels and future progression of coronary artery calcification (CAC) in apparently healthy Korean adults. A total of 2611 participants (mean age: 41years, 92% mend) who underwent a routine health check-up in 2010 and 2014 were enrolled. Coronary artery calcium score (CACS) were measured by multi-detector computed tomography. Baseline Lp(a) was measured by high-sensitivity immunoturbidimetric assay. Progression of CAC was defined as a change in CACS >0 over four years. Bivariate correlation analyses with baseline Lp(a) and other metabolic parameters revealed age, total cholesterol, HDL-C, LDL-C and CACS to have a significant positive correlation, while body weight, fasting glucose level, blood pressure and triglyceride level were negatively correlated with baseline Lp(a) level. After four years of follow-up, 635 subjects (24.3%) had CAC progression. The participants who had CAC progression were older, composed of more men, more obese, and had higher fasting glucose levels and worse baseline lipid profiles compared to those who did not have CAC progression. The mean serum Lp(a) level was significantly higher in subjects who had CAC progression compared to those who did not (32.5 vs. 28.9mg/dL, p<0.01). When the risk for CAC progression according to baseline Lp(a) was calculated, those with Lp(a) level≥50mg/dL had an odds ratio of 1.333 (95% CI 1.027-1.730) for CAC progression compared to those with Lp(a)<50mg/dL after adjusting for confounding factors. In this study, the subjects who had higher Lp(a) were at significantly higher risk for CAC progression after four years of follow-up, suggesting the role of high Lp(a) in CAC progression. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  11. Smashing the Stovepipe: Leveraging the GMSEC Open Architecture and Advanced IT Automation to Rapidly Prototype, Develop and Deploy Next-Generation Multi-Mission Ground Systems

    Science.gov (United States)

    Swenson, Paul

    2017-01-01

    Satellite/Payload Ground Systems - Typically highly-customized to a specific mission's use cases - Utilize hundreds (or thousands!) of specialized point-to-point interfaces for data flows / file transfers Documentation and tracking of these complex interfaces requires extensive time to develop and extremely high staffing costs Implementation and testing of these interfaces are even more cost-prohibitive, and documentation often lags behind implementation resulting in inconsistencies down the road With expanding threat vectors, IT Security, Information Assurance and Operational Security have become key Ground System architecture drivers New Federal security-related directives are generated on a daily basis, imposing new requirements on current / existing ground systems - These mandated activities and data calls typically carry little or no additional funding for implementation As a result, Ground System Sustaining Engineering groups and Information Technology staff continually struggle to keep up with the rolling tide of security Advancing security concerns and shrinking budgets are pushing these large stove-piped ground systems to begin sharing resources - I.e. Operational / SysAdmin staff, IT security baselines, architecture decisions or even networks / hosting infrastructure Refactoring these existing ground systems into multi-mission assets proves extremely challenging due to what is typically very tight coupling between legacy components As a result, many "Multi-Mission" ops. environments end up simply sharing compute resources and networks due to the difficulty of refactoring into true multi-mission systems Utilizing continuous integration / rapid system deployment technologies in conjunction with an open architecture messaging approach allows System Engineers and Architects to worry less about the low-level details of interfaces between components and configuration of systems GMSEC messaging is inherently designed to support multi-mission requirements, and

  12. Multi-stage decoding for multi-level block modulation codes

    Science.gov (United States)

    Lin, Shu

    1991-01-01

    In this paper, we investigate various types of multi-stage decoding for multi-level block modulation codes, in which the decoding of a component code at each stage can be either soft-decision or hard-decision, maximum likelihood or bounded-distance. Error performance of codes is analyzed for a memoryless additive channel based on various types of multi-stage decoding, and upper bounds on the probability of an incorrect decoding are derived. Based on our study and computation results, we find that, if component codes of a multi-level modulation code and types of decoding at various stages are chosen properly, high spectral efficiency and large coding gain can be achieved with reduced decoding complexity. In particular, we find that the difference in performance between the suboptimum multi-stage soft-decision maximum likelihood decoding of a modulation code and the single-stage optimum decoding of the overall code is very small: only a fraction of dB loss in SNR at the probability of an incorrect decoding for a block of 10(exp -6). Multi-stage decoding of multi-level modulation codes really offers a way to achieve the best of three worlds, bandwidth efficiency, coding gain, and decoding complexity.

  13. Multi level configuration of ETO products

    DEFF Research Database (Denmark)

    Petersen, Thomas Ditlev; Jørgensen, Kaj Asbjørn; Hvolby, Hans-Henrik

    2007-01-01

    The paper introduces and defines central concepts related to multi level configuration and analyzes which challenges an engineer to order company must deal with to be able to realize a multi level configuration system. It is argued that high flexibility can be achieved and focus can be directed...... in certain business processes if a multi level configuration system is realized....

  14. An approach in determining the baseline data on the natural background radioactivity of Batanes province, its implications to national security

    International Nuclear Information System (INIS)

    Reyes, Rolando Y.

    2005-01-01

    whole country, with the eight (8) areas identified as high-risk areas to be given priority attention. With the use of simple ranking analysis, these high-risk areas were prioritized and Metro Manila/NCR ranked 1st for having received the highest possible level of risk exposure. The other areas, according to priority, are Cebu, Davao, Northern Luzon covering regions 1 and 2, Baguio City, General Santos City, Zamboanga, and former US Naval Base in Subic and Air Base in Clark. A survey on the level of awareness of residents of Batan Island on the basics of radiation/radioactivity was also conducted. Results of the survey revealed an average level of awareness of 35.06%, prior to information dissemination, and the figure increased to 58.84% after the information dissemination in the form of a primer, showing an increased of 23.78 percentage points. This shows that education and information dissemination are powerful tools in increasing the awareness of the public on matters related to radiation, its beneficial and harmful effects, and more importantly after this study, the basic responses and courses of action in the event of a radiological or nuclear incident/disaster. Overall, the study showed a sample of a method for obtaining, through measurement, and presentation of baseline data on radioactivity. This was the first time that a syatematic approach to determine the districution and abundance of the radioelement potassium, uranium and thorium for baseline study by ground gamma ray spectrometric technique was conducted in the country. This approach offers a practical alternative to the costly airborne and carborne survey techniques that is within the financial capabilities of developing countries like the Philippines. The scheme for replicating the performance of baseline studies in other areas of the country will follow the methods adopted in the study, with improvements, depending on the environmental and security situation of the survey area. (Author)

  15. Securing MDSplus in a Multi-organization Environment

    Energy Technology Data Exchange (ETDEWEB)

    Castro, R.; Vega, J.; Pereira, A.; Portas, A. [Asociation Euratom/CIEMAT para Fusion, Madrid (Spain); Fredian, T. [MIT Plasma Science and Fusion Center, Littleton, NH (United States); Purahoo, K. [EURATOM/UKAEA Fusion Association, Abingdon (United Kingdom)

    2009-07-01

    MDSplus has become a real standard de facto data access method in the fusion community. Based on this, it was a priority for EFDA-Federation to integrate this technology as a new service for federated users, providing secure access mechanisms to MDSplus compatible applications. To achieve this, it has been necessary to upgrade MDSplus and make it compatible with PAPI technology, which is currently used as security infrastructure in the EFDA-Federation. Additionally, the included modifications are useful for future integrations in other federation technologies such as Shibboleth. The integration of MDSplus into a federated structure has several benefits. From the service management point of view, there is a simplification of the installation of new MDSplus services in fusion community and its corresponding security management. From the user point of view, the integration of MDSplus into a federated structure has several advantages. The first one is user mobility, which is the possibility of accessing data independently of his client IP address. The second one is a multi-organisation infrastructure, so the user can access data from different organisations that implement MDSplus interface. Finally, single sign on PAPI feature enables users to access to different MDSplus data sources, and other federated services, with just one authentication. This document is composed of a poster and its abstract. (authors)

  16. Obfuscatable multi-recipient re-encryption for secure privacy-preserving personal health record services.

    Science.gov (United States)

    Shi, Yang; Fan, Hongfei; Xiong, Guoyue

    2015-01-01

    With the rapid development of cloud computing techniques, it is attractive for personal health record (PHR) service providers to deploy their PHR applications and store the personal health data in the cloud. However, there could be a serious privacy leakage if the cloud-based system is intruded by attackers, which makes it necessary for the PHR service provider to encrypt all patients' health data on cloud servers. Existing techniques are insufficiently secure under circumstances where advanced threats are considered, or being inefficient when many recipients are involved. Therefore, the objectives of our solution are (1) providing a secure implementation of re-encryption in white-box attack contexts and (2) assuring the efficiency of the implementation even in multi-recipient cases. We designed the multi-recipient re-encryption functionality by randomness-reusing and protecting the implementation by obfuscation. The proposed solution is secure even in white-box attack contexts. Furthermore, a comparison with other related work shows that the computational cost of the proposed solution is lower. The proposed technique can serve as a building block for supporting secure, efficient and privacy-preserving personal health record service systems.

  17. Secure and efficient multi-variant execution using hardware-assisted process virtualization

    NARCIS (Netherlands)

    Koning, Koen; Bos, Herbert; Giuffrida, Cristiano

    2016-01-01

    Memory error exploits rank among the most serious security threats. Of the plethora of memory error containment solutions proposed over the years, most have proven to be too weak in practice. Multi-Variant eXecution (MVX) solutions can potentially detect arbitrary memory error exploits via divergent

  18. Organization of the secure distributed computing based on multi-agent system

    Science.gov (United States)

    Khovanskov, Sergey; Rumyantsev, Konstantin; Khovanskova, Vera

    2018-04-01

    Nowadays developing methods for distributed computing is received much attention. One of the methods of distributed computing is using of multi-agent systems. The organization of distributed computing based on the conventional network computers can experience security threats performed by computational processes. Authors have developed the unified agent algorithm of control system of computing network nodes operation. Network PCs is used as computing nodes. The proposed multi-agent control system for the implementation of distributed computing allows in a short time to organize using of the processing power of computers any existing network to solve large-task by creating a distributed computing. Agents based on a computer network can: configure a distributed computing system; to distribute the computational load among computers operated agents; perform optimization distributed computing system according to the computing power of computers on the network. The number of computers connected to the network can be increased by connecting computers to the new computer system, which leads to an increase in overall processing power. Adding multi-agent system in the central agent increases the security of distributed computing. This organization of the distributed computing system reduces the problem solving time and increase fault tolerance (vitality) of computing processes in a changing computing environment (dynamic change of the number of computers on the network). Developed a multi-agent system detects cases of falsification of the results of a distributed system, which may lead to wrong decisions. In addition, the system checks and corrects wrong results.

  19. [Diagnostic value of baseline serum luteinizing hormone level for central precocious puberty in girls].

    Science.gov (United States)

    Ou-Yang, Li-Xue; Yang, Fan

    2017-07-01

    To evaluate the diagnostic value of baseline serum luteinizing hormone (LH) level for central precocious puberty (CPP) in girls. A total of 279 girls with precocious puberty were subjected to assessment of growth and development, bone age determination, baseline LH test, and follicle-stimulating hormone (FSH) test, gonadotropin-releasing hormone stimulation test, and other related examinations. Of the 279 patients, 175 were diagnosed with CPP and 104 with premature thelarche (PT). The receiver operating characteristic (ROC) curve was used to evaluate the diagnostic value of baseline LH and FSH levels and their peak levels for CPP, and the correlation between the baseline LH level and the peak LH level was analyzed. The CPP group had significantly higher bone age, baseline LH and FSH levels, peak LH and FSH levels, and ratio of peak LH level to peak FSH level than the PT group (Pbaseline LH level and peak LH level had good diagnostic values for CPP. Among the three bone age subgroups in the CPP group (7.0-9.0 years, 9.0-11.0 years, and >11.0 years), baseline LH level showed the best diagnostic value in the >11.0 years subgroup, with the largest area under the ROC curve. At a baseline LH level of 0.45 IU/L, the Youden index reached the peak value, and the sensitivity and specificity were 66.7% and 80% respectively, for the diagnosis of CPP. At a peak LH level of 9.935 IU/L, the Youden index reached the peak value, and the sensitivity and specificity were 74.8% and 100% respectively, for the diagnosis of CPP. The baseline LH level was positively correlated with the peak LH level (r=0.440, PBaseline LH level can be used as an primary screening index for the diagnosis of CPP. It has a certain diagnostic value for CPP at different bone ages, and may be used as a monitoring index during the treatment and follow-uP.

  20. Review of the Main Security Problems with Multi-Agent Systems used in E-commerce Applications

    Directory of Open Access Journals (Sweden)

    Alfonso GONZÁLEZ BRIONES

    2016-12-01

    Full Text Available The ability to connect to the Internet from a wide variety of devices such as smart phones, IoT devices and desktops at anytime and anywhere, produces a large number of e-commerce transactions, such as purchases of clothes, ticket entrances for performances, or banking operations. The increasing number of these transactions has also created an increase in the number of threats and attacks by third parties to access user data banks. It is important to control the access procedure to user data so that the number of threats does not continue to grow. To do so, it is necessary to prevent unauthorized access, theft and fraud in electronic commerce, which is required to ensure the safety of these transactions. Many e-commerce platforms are developed through multi-agent-systems because they include certain advantages to control the product, resource management, task distribution, etc. However, there are a number of threats that can jeopardize the safety of the agents that make up the system. These issues must be taken into account in the development of these multi-agent systems. However, existing methods of development do not cover in depth the issue of security. It is necessary to present and classify the potential security flaws of multi-agent systems. Therefore, the present research presents a review of the main vulnerabilities that occur in multi-agent systems responsible for managing e-commerce applications, as well as the proposed solutions to the major security problems on these platform systems. The main conclusions provided by this research is the need to optimize security measures and enhance the different security solutions applied in e-commerce applications in order to prevent identity theft, access to private data, access control, etc. It is therefore essential to continue to develop the security methods employed in applications such as e-commerce as different types of attacks and threats continue to evolve.

  1. Feasibility of a novel participatory multi-sector continuous improvement approach to enhance food security in remote Indigenous Australian communities.

    Science.gov (United States)

    Brimblecombe, J; Bailie, R; van den Boogaard, C; Wood, B; Liberato, S C; Ferguson, M; Coveney, J; Jaenke, R; Ritchie, J

    2017-12-01

    Food insecurity underlies and compounds many of the development issues faced by remote Indigenous communities in Australia. Multi-sector approaches offer promise to improve food security. We assessed the feasibility of a novel multi-sector approach to enhance community food security in remote Indigenous Australia. A longitudinal comparative multi-site case study, the Good Food Systems Good Food for All Project, was conducted (2009-2013) with four Aboriginal communities. Continuous improvement meetings were held in each community. Data from project documents and store sales were used to assess feasibility according to engagement, uptake and sustainability of action, and impact on community diet, as well as identifying conditions facilitating or hindering these. Engagement was established where: the community perceived a need for the approach; where trust was developed between the community and facilitators; where there was community stability; and where flexibility was applied in the timing of meetings. The approach enabled stakeholders in each community to collectively appraise the community food system and plan action. Actions that could be directly implemented within available resources resulted from developing collaborative capacity. Actions requiring advocacy, multi-sectoral involvement, commitment or further resources were less frequently used. Positive shifts in community diet were associated with key areas where actions were implemented. A multi-sector participatory approach seeking continuous improvement engaged committed Aboriginal and non-Aboriginal stakeholders and was shown to have potential to shift community diet. Provision of clear mechanisms to link this approach with higher level policy and decision-making structures, clarity of roles and responsibilities, and processes to prioritise and communicate actions across sectors should further strengthen capacity for food security improvement. Integrating this approach enabling local decision-making into

  2. Firm-level Resource Allocation to Information Security in the Presence of Financial Distress

    OpenAIRE

    Bin Srinidhi; Jia Yan; Giri Kumar Tayi

    2008-01-01

    In this paper, we adopt an organizational perspective to the management of information security and analyze in a multi-period context how an organization should allocate its internal cash flows and available external funds to revenuegenerating (productive) and security assuring (protective) processes in the presence of security breach, borrowing and financial distress costs. We show analytically and illustrate numerically that the capital stock accumulation is lower and allocations to securit...

  3. 33 CFR 105.230 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.230 Maritime Security (MARSEC) Level coordination and implementation. (a) The facility owner...

  4. 33 CFR 106.235 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.235 Maritime Security (MARSEC) Level...

  5. 33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.240 Maritime Security (MARSEC) Level coordination and implementation. (a) The vessel owner or...

  6. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    Science.gov (United States)

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  7. Information Interpretation Code For Providing Secure Data Integrity On Multi-Server Cloud Infrastructure

    OpenAIRE

    Sathiya Moorthy Srinivsan; Chandrasekar Chaillah

    2014-01-01

    Data security is one of the biggest concerns in cloud computing environment. Although the advantages of storing data in cloud computing environment is extremely high, there arises a problem related to data missing. CyberLiveApp (CLA) supports secure application development between multiple users, even though cloud users distinguish their vision privileges during storing of data. But CyberLiveApp failed to integrate the system with certain cloud-based computing environments on multi-server. En...

  8. Multi-Level Model

    Directory of Open Access Journals (Sweden)

    Constanta Nicoleta BODEA

    2008-01-01

    Full Text Available Is an original paper, which contains a hierarchical model with three levels, for determining the linearized non-homogeneous and homogeneous credibility premiums at company level, at sector level and at contract level, founded on the relevant covariance relations between the risk premium, the observations and the weighted averages. We give a rather explicit description of the input data for the multi- level hierarchical model used, only to show that in practical situations, there will always be enough data to apply credibility theory to a real insurance portfolio.

  9. BULGARIA’S MULTI-VECTOR FOREIGN POLICY APPROACH TO SECURITY CHALLENGES IN EASTERN EUROPE

    Science.gov (United States)

    2017-04-06

    tenuous than ever with the new controversial Trump administration and the EU nascent foreign policy efforts already failed in handling the challenges...AIR WAR COLLEGE AIR UNIVERSITY BULGARIA’S MULTI-VECTOR FOREIGN POLICY APPROACH TO SECURITY CHALLENGES IN EASTERN EUROPE by Dimitar Y...the abatement of US interest in Europe, will require wise foreign policy maneuvers to address the changes in the transformed security environment. As

  10. Declining job security level and workers' perfomance in selected ...

    African Journals Online (AJOL)

    Abstract. The study assessed bank workers' level of job security and also investigated the relationship between job security level and job performance among employees of the banks. ... These comprised both permanent and contract workers.

  11. MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries

    International Nuclear Information System (INIS)

    Talarico, Luca; Reniers, Genserik; Sörensen, Kenneth; Springael, Johan

    2015-01-01

    In this paper we present a multi-modal security-transportation model to allocate security resources within a chemical supply chain which is characterized by the use of different transport modes, each having their own security features. We consider security-related risks so as to take measures against terrorist acts which could target critical transportation systems. The idea of addressing security-related issues, by supporting decisions for preventing or mitigating intentional acts on transportation infrastructure, has gained attention in academic research only recently. The decision model presented in this paper is based on game theory and it can be employed to organize intelligence capabilities aimed at securing chemical supply chains. It enables detection and warning against impending attacks on transportation infrastructures and the subsequent adoption of security countermeasures. This is of extreme importance for preventing terrorist attacks and for avoiding (possibly huge) human and economic losses. In our work we also provide data sources and numerical simulations by applying the proposed model to a illustrative multi-modal chemical supply chain. - Highlights: • A model to increase the security in a multimodal chemical supply chain is proposed. • The model considers adaptive opponents having multi-attribute utility functions. • The model is based on game theory using an attacker–defender schema. • The model provides recommendations about where to allocate security measures. • Numerical simulations on a sample multimodal chemical supply chain are shown

  12. Examination of State-Level Nuclear Security Evaluation Methods

    International Nuclear Information System (INIS)

    Kim, Chan Kim; Yim, Man-Sung

    2015-01-01

    An effective global system for nuclear materials security needs to cover all materials, employing international standards and best practices, to reduce risks by reducing weapons-usable nuclear material stocks and the number of locations where they are found. Such a system must also encourage states to accept peer reviews by outside experts in order to demonstrate that effective security is in place. It is thus critically important to perform state-level evaluation of nuclear security based on an integrative framework of risk assessment. Such evaluation provides a basis of measuring the level and progress of international effort to secure and control all nuclear materials. sensitivity test by differentiating weight factors of each of the indicators and categories will be performed in the future as well

  13. Multi-level decision making models, methods and applications

    CERN Document Server

    Zhang, Guangquan; Gao, Ya

    2015-01-01

    This monograph presents new developments in multi-level decision-making theory, technique and method in both modeling and solution issues. It especially presents how a decision support system can support managers in reaching a solution to a multi-level decision problem in practice. This monograph combines decision theories, methods, algorithms and applications effectively. It discusses in detail the models and solution algorithms of each issue of bi-level and tri-level decision-making, such as multi-leaders, multi-followers, multi-objectives, rule-set-based, and fuzzy parameters. Potential readers include organizational managers and practicing professionals, who can use the methods and software provided to solve their real decision problems; PhD students and researchers in the areas of bi-level and multi-level decision-making and decision support systems; students at an advanced undergraduate, master’s level in information systems, business administration, or the application of computer science.  

  14. Energy security issues at household level in India

    International Nuclear Information System (INIS)

    Jain, Garima

    2010-01-01

    Energy security at the household level implies ensuring assured and regular supply of clean energy fuels at an affordable price for various household activities. Threat to physical availability of clean energy fuels for cooking and lighting is determined through various indicators such as dependence on traditional fuels and limited access to clean fuels. Energy insecurity translates into various adverse social impacts. Financial threat to energy security is indicated by expenses incurred on energy fuels and affordability of clean fuels. Households spend a major portion of their income on acquiring energy fuels; however, due to high price of clean fuels, they continue to depend on traditional and inefficient fuels. There is an urgent need to address factors that pose a threat to energy security at the household level. In this regard, measures taken by the government agencies and other institutions are also reviewed. The paper also suggests the regulatory and policy interventions required to address the energy security issues at the household level.

  15. Fusion of space-borne multi-baseline and multi-frequency interferometric results based on extended Kalman filter to generate high quality DEMs

    Science.gov (United States)

    Zhang, Xiaojie; Zeng, Qiming; Jiao, Jian; Zhang, Jingfa

    2016-01-01

    Repeat-pass Interferometric Synthetic Aperture Radar (InSAR) is a technique that can be used to generate DEMs. But the accuracy of InSAR is greatly limited by geometrical distortions, atmospheric effect, and decorrelations, particularly in mountainous areas, such as western China where no high quality DEM has so far been accomplished. Since each of InSAR DEMs generated using data of different frequencies and baselines has their own advantages and disadvantages, it is therefore very potential to overcome some of the limitations of InSAR by fusing Multi-baseline and Multi-frequency Interferometric Results (MMIRs). This paper proposed a fusion method based on Extended Kalman Filter (EKF), which takes the InSAR-derived DEMs as states in prediction step and the flattened interferograms as observations in control step to generate the final fused DEM. Before the fusion, detection of layover and shadow regions, low-coherence regions and regions with large height error is carried out because MMIRs in these regions are believed to be unreliable and thereafter are excluded. The whole processing flow is tested with TerraSAR-X and Envisat ASAR datasets. Finally, the fused DEM is validated with ASTER GDEM and national standard DEM of China. The results demonstrate that the proposed method is effective even in low coherence areas.

  16. Data Mediation with Enterprise Level Security

    Directory of Open Access Journals (Sweden)

    Kevin E. Foltz

    2017-10-01

    Full Text Available Enterprise Level Security (ELS is an architecture for enabling information sharing with strong security guarantees. It is built upon basic tenets and concepts that shape its component technologies and implementation. One challenge in sharing information is that the source and recipient of the information may use different units, protocols, data formats, or tools to process information. As a result, a transformation of the data is needed before the recipient can use the information. These conversions introduce potential security weaknesses into an ELS system, so an approach for enterprise-wide mediation is required. Methods in common use today, such as a man-in-the-middle (MITM translation and an online mediation service, do not preserve the basic ELS tenets and concepts. This paper examines these existing approaches and compares them with two new approaches designed to preserve ELS security. It looks at the complete picture of security, performance, and ease of implementation, offering a framework for choosing the best mediation approach based on the data sharing context.

  17. Multi-level predictive maintenance for multi-component systems

    International Nuclear Information System (INIS)

    Nguyen, Kim-Anh; Do, Phuc; Grall, Antoine

    2015-01-01

    In this paper, a novel predictive maintenance policy with multi-level decision-making is proposed for multi-component system with complex structure. The main idea is to propose a decision-making process considered on two levels: system level and component one. The goal of the decision rules at the system level is to address if preventive maintenance actions are needed regarding the predictive reliability of the system. At component level the decision rules aim at identifying optimally a group of several components to be preventively maintained when preventive maintenance is trigged due to the system level decision. Selecting optimal components is based on a cost-based group improvement factor taking into account the predictive reliability of the components, the economic dependencies as well as the location of the components in the system. Moreover, a cost model is developed to find the optimal maintenance decision variables. A 14-component system is finally introduced to illustrate the use and the performance of the proposed predictive maintenance policy. Different sensitivity analysis are also investigated and discussed. Indeed, the proposed policy provides more flexibility in maintenance decision-making for complex structure systems, hence leading to significant profits in terms of maintenance cost when compared with existing policies. - Highlights: • A predictive maintenance policy for complex structure systems is proposed. • Multi-level decision process based on prognostic results is proposed. • A cost-based group importance measure is introduced for decision-making. • Both positive and negative dependencies between components are investigated. • A cost model and Monte Carlo simulation are developed for optimization process.

  18. Utilising a multi-item questionnaire to assess household food security in Australia.

    Science.gov (United States)

    Butcher, Lucy M; O'Sullivan, Therese A; Ryan, Maria M; Lo, Johnny; Devine, Amanda

    2018-03-15

    Currently, two food sufficiency questions are utilised as a proxy measure of national food security status in Australia. These questions do not capture all dimensions of food security and have been attributed to underreporting of the problem. The purpose of this study was to investigate food security using the short form of the US Household Food Security Survey Module (HFSSM) within an Australian context; and explore the relationship between food security status and multiple socio-demographic variables. Two online surveys were completed by 2334 Australian participants from November 2014 to February 2015. Surveys contained the short form of the HFSSM and twelve socio-demographic questions. Cross-tabulations chi-square tests and a multinomial logistic regression model were employed to analyse the survey data. Food security status of the respondents was classified accordingly: High or Marginal (64%, n = 1495), Low (20%, n = 460) or Very Low (16%, n = 379). Significant independent predictors of food security were age (P important issue across Australia and that certain groups, regardless of income, are particularly vulnerable. Government policy and health promotion interventions that specifically target "at risk" groups may assist to more effectively address the problem. Additionally, the use of a multi-item measure is worth considering as a national indicator of food security in Australia. © 2018 Australian Health Promotion Association.

  19. Secure multi-party quantum summation based on quantum Fourier transform

    Science.gov (United States)

    Yang, Hui-Yi; Ye, Tian-Yu

    2018-06-01

    In this paper, we propose a novel secure multi-party quantum summation protocol based on quantum Fourier transform, where the traveling particles are transmitted in a tree-type mode. The party who prepares the initial quantum states is assumed to be semi-honest, which means that she may misbehave on her own but will not conspire with anyone. The proposed protocol can resist both the outside attacks and the participant attacks. Especially, one party cannot obtain other parties' private integer strings; and it is secure for the colluding attack performed by at most n - 2 parties, where n is the number of parties. In addition, the proposed protocol calculates the addition of modulo d and implements the calculation of addition in a secret-by-secret way rather than a bit-by-bit way.

  20. Scheme for simultaneous generation of three-color ten GW-level X-ray pulses from baseline XFEL undulator and multi-user distribution system for XFEL laboratory

    International Nuclear Information System (INIS)

    Geloni, Gianluca; Kocharyan, Vitali; Saldin, Evgeni

    2010-01-01

    The baseline design of present XFEL projects only considers the production of a single photon beam at fixed wavelength from each baseline undulator. At variance, the scheme described in this paper considers the simultaneous production of high intensity SASE FEL radiation at three different wavelengths. We present a feasibility study of our scheme, and we make exemplifications with parameters of the baseline SASE2 line of the European XFEL operating in simultaneous mode at 0.05 nm, 0.15 nm and 0.4 nm. Our technique for generating the two colors at 0.05 nm and 0.15 nm is based in essence on a ''fresh bunch'' technique. For the generation of radiation at 0.4 nm we propose to use an ''afterburner'' technique. Implementation of these techniques does not perturb the baseline mode of operation of the SASE2 undulator. The present paper also describes an efficient way to obtain a multi-user facility. It is shown that, although the XFEL photon beam from a given undulator is meant for a single user, movable multilayer X-ray mirrors can be used to serve many users simultaneously. The proposed photon beam distribution system would allow to switch the FEL beam quickly between many experiments in order to make an efficient use of the source. Distribution of photons is achieved on the basis of pulse trains and it is possible to distribute the multicolor photon beam among many independent beam lines, thereby enabling many users to work in parallel with different wavelengths. (orig.)

  1. Multi-valley effective mass theory for device-level modeling of open quantum dynamics

    Science.gov (United States)

    Jacobson, N. Tobias; Baczewski, Andrew D.; Frees, Adam; Gamble, John King; Montano, Ines; Moussa, Jonathan E.; Muller, Richard P.; Nielsen, Erik

    2015-03-01

    Simple models for semiconductor-based quantum information processors can provide useful qualitative descriptions of device behavior. However, as experimental implementations have matured, more specific guidance from theory has become necessary, particularly in the form of quantitatively reliable yet computationally efficient modeling. Besides modeling static device properties, improved characterization of noisy gate operations requires a more sophisticated description of device dynamics. Making use of recent developments in multi-valley effective mass theory, we discuss device-level simulations of the open system quantum dynamics of a qubit interacting with phonons and other noise sources. Sandia is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the US Department of Energy National Nuclear Security Administration under Contract No. DE-AC04-94AL85000.

  2. Design and Analysis of a secure multi-party communication protocol

    OpenAIRE

    Herberth, Klaus

    2016-01-01

    In the past years digital communication became an important aspect in every day life. Everything is shared and discussed in groups of friends, family or business part- ners without a proper way to protect that information. This master thesis introduces the first secure robust multi-party communication protocol which mimics a physical conversation with the help of a Diffie-Hellman key tree and social behaviours. Robust- ness against offline group members is reached by taking advantage of trans...

  3. Sensor data security level estimation scheme for wireless sensor networks.

    Science.gov (United States)

    Ramos, Alex; Filho, Raimir Holanda

    2015-01-19

    Due to their increasing dissemination, wireless sensor networks (WSNs) have become the target of more and more sophisticated attacks, even capable of circumventing both attack detection and prevention mechanisms. This may cause WSN users, who totally trust these security mechanisms, to think that a sensor reading is secure, even when an adversary has corrupted it. For that reason, a scheme capable of estimating the security level (SL) that these mechanisms provide to sensor data is needed, so that users can be aware of the actual security state of this data and can make better decisions on its use. However, existing security estimation schemes proposed for WSNs fully ignore detection mechanisms and analyze solely the security provided by prevention mechanisms. In this context, this work presents the sensor data security estimator (SDSE), a new comprehensive security estimation scheme for WSNs. SDSE is designed for estimating the sensor data security level based on security metrics that analyze both attack prevention and detection mechanisms. In order to validate our proposed scheme, we have carried out extensive simulations that show the high accuracy of SDSE estimates.

  4. Governing the energy challenge : Canada and Germany in a multi-level regional and global context

    International Nuclear Information System (INIS)

    Eberlein, B.; Doern, G.B.; Exeter Univ.,

    2009-01-01

    This book features essays by leading energy and public policy specialists from Canada and Germany. It originated in the Transatlantic Energy Conference which was hosted by the Canadian Centre for German and European Studies at Toronto's York University in September 2005. The conference was attended by leading energy scholars and experts from Canadian and European universities, research institutes and governmental and non-governmental organizations. The purpose of this book was to compare the dynamics of multi-level energy regulatory governance in Germany and Canada, notably the energy policy challenges that include energy security, environmental sustainability and a competitive resource economy. Many strategies to produce more efficient and sustainable energy are presented in the book. Part 1 of the book focuses on the energy industry, with particular emphasise on electricity, nuclear energy and natural gas. Part 2 of the book focuses on domestic patterns of multi-level energy governance and regulation in the two countries. As a member of the European Union, Germany is more advanced in dealing with multi-level governmental and sustainability constraints than Canada is as a member of the North American Free Trade Agreement (NAFTA). The book focuses on the influence that the energy sector and multi-level institutional arrangements have on energy governance, with particular attention to the link between environmental study, climate change issues and economic market reforms. The growing differences between NAFTA and European Union member countries were highlighted. refs., tabs., figs.

  5. Interactive Approach for Multi-Level Multi-Objective Fractional Programming Problems with Fuzzy Parameters

    Directory of Open Access Journals (Sweden)

    M.S. Osman

    2018-03-01

    Full Text Available In this paper, an interactive approach for solving multi-level multi-objective fractional programming (ML-MOFP problems with fuzzy parameters is presented. The proposed interactive approach makes an extended work of Shi and Xia (1997. In the first phase, the numerical crisp model of the ML-MOFP problem has been developed at a confidence level without changing the fuzzy gist of the problem. Then, the linear model for the ML-MOFP problem is formulated. In the second phase, the interactive approach simplifies the linear multi-level multi-objective model by converting it into separate multi-objective programming problems. Also, each separate multi-objective programming problem of the linear model is solved by the ∊-constraint method and the concept of satisfactoriness. Finally, illustrative examples and comparisons with the previous approaches are utilized to evince the feasibility of the proposed approach.

  6. Multi-objective optimization for an automated and simultaneous phase and baseline correction of NMR spectral data

    Science.gov (United States)

    Sawall, Mathias; von Harbou, Erik; Moog, Annekathrin; Behrens, Richard; Schröder, Henning; Simoneau, Joël; Steimers, Ellen; Neymeyr, Klaus

    2018-04-01

    Spectral data preprocessing is an integral and sometimes inevitable part of chemometric analyses. For Nuclear Magnetic Resonance (NMR) spectra a possible first preprocessing step is a phase correction which is applied to the Fourier transformed free induction decay (FID) signal. This preprocessing step can be followed by a separate baseline correction step. Especially if series of high-resolution spectra are considered, then automated and computationally fast preprocessing routines are desirable. A new method is suggested that applies the phase and the baseline corrections simultaneously in an automated form without manual input, which distinguishes this work from other approaches. The underlying multi-objective optimization or Pareto optimization provides improved results compared to consecutively applied correction steps. The optimization process uses an objective function which applies strong penalty constraints and weaker regularization conditions. The new method includes an approach for the detection of zero baseline regions. The baseline correction uses a modified Whittaker smoother. The functionality of the new method is demonstrated for experimental NMR spectra. The results are verified against gravimetric data. The method is compared to alternative preprocessing tools. Additionally, the simultaneous correction method is compared to a consecutive application of the two correction steps.

  7. Performance Measurement Baseline Change Request

    Data.gov (United States)

    Social Security Administration — The Performance Measurement Baseline Change Request template is used to document changes to scope, cost, schedule, or operational performance metrics for SSA's Major...

  8. Multi-agent integrated password management (MIPM) application secured with encryption

    Science.gov (United States)

    Awang, Norkhushaini; Zukri, Nurul Hidayah Ahmad; Rashid, Nor Aimuni Md; Zulkifli, Zuhri Arafah; Nazri, Nor Afifah Mohd

    2017-10-01

    Users use weak passwords and reuse them on different websites and applications. Password managers are a solution to store login information for websites and help users log in automatically. This project developed a system that acts as an agent managing passwords. Multi-Agent Integrated Password Management (MIPM) is an application using encryption that provides users with secure storage of their login account information such as their username, emails and passwords. This project was developed on an Android platform with an encryption agent using Java Agent Development Environment (JADE). The purpose of the embedded agents is to act as a third-party software to ease the encryption process, and in the future, the developed encryption agents can form part of the security system. This application can be used by the computer and mobile users. Currently, users log into many applications causing them to use unique passwords to prevent password leaking. The crypto agent handles the encryption process using an Advanced Encryption Standard (AES) 128-bit encryption algorithm. As a whole, MIPM is developed on the Android application to provide a secure platform to store passwords and has high potential to be commercialised for public use.

  9. Security in Service Level Agreements for Cloud Computing

    OpenAIRE

    Bernsmed, Karin; JAATUN, Martin Gilje; Undheim, Astrid

    2011-01-01

    The Cloud computing paradigm promises reliable services, accessible from anywhere in the world, in an on-demand manner. Insufficient security has been identified as a major obstacle to adopting Cloud services. To deal with the risks associated with outsourcing data and applications to the Cloud, new methods for security assurance are urgently needed. This paper presents a framework for security in Service Level Agreements for Cloud computing. The purpose is twofold; to help potential Cloud cu...

  10. Sensor Data Security Level Estimation Scheme for Wireless Sensor Networks

    Science.gov (United States)

    Ramos, Alex; Filho, Raimir Holanda

    2015-01-01

    Due to their increasing dissemination, wireless sensor networks (WSNs) have become the target of more and more sophisticated attacks, even capable of circumventing both attack detection and prevention mechanisms. This may cause WSN users, who totally trust these security mechanisms, to think that a sensor reading is secure, even when an adversary has corrupted it. For that reason, a scheme capable of estimating the security level (SL) that these mechanisms provide to sensor data is needed, so that users can be aware of the actual security state of this data and can make better decisions on its use. However, existing security estimation schemes proposed for WSNs fully ignore detection mechanisms and analyze solely the security provided by prevention mechanisms. In this context, this work presents the sensor data security estimator (SDSE), a new comprehensive security estimation scheme for WSNs. SDSE is designed for estimating the sensor data security level based on security metrics that analyze both attack prevention and detection mechanisms. In order to validate our proposed scheme, we have carried out extensive simulations that show the high accuracy of SDSE estimates. PMID:25608215

  11. Sensor Data Security Level Estimation Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Alex Ramos

    2015-01-01

    Full Text Available Due to their increasing dissemination, wireless sensor networks (WSNs have become the target of more and more sophisticated attacks, even capable of circumventing both attack detection and prevention mechanisms. This may cause WSN users, who totally trust these security mechanisms, to think that a sensor reading is secure, even when an adversary has corrupted it. For that reason, a scheme capable of estimating the security level (SL that these mechanisms provide to sensor data is needed, so that users can be aware of the actual security state of this data and can make better decisions on its use. However, existing security estimation schemes proposed for WSNs fully ignore detection mechanisms and analyze solely the security provided by prevention mechanisms. In this context, this work presents the sensor data security estimator (SDSE, a new comprehensive security estimation scheme for WSNs. SDSE is designed for estimating the sensor data security level based on security metrics that analyze both attack prevention and detection mechanisms. In order to validate our proposed scheme, we have carried out extensive simulations that show the high accuracy of SDSE estimates.

  12. Social climate along the pathway of care in women's secure mental health service: variation with level of security, patient motivation, therapeutic alliance and level of disturbance.

    Science.gov (United States)

    Long, C G; Anagnostakis, K; Fox, E; Silaule, P; Somers, J; West, R; Webster, A

    2011-07-01

    Social climate has been measured in a variety of therapeutic settings, but there is little information about it in secure mental health services, or how it may vary along a gender specific care pathway. To assess social climate in women's secure wards and its variation by level of security and ward type, therapeutic alliance, patient motivation, treatment engagement and disturbed behaviour. Three-quarters (80, 76%) of staff and nearly all (65, 92%) of patients in the two medium-security wards and two low-security wards that comprised the unit completed the Essen Climate Evaluation Schema (EssenCES) and the California Psychotherapy Alliance Scale (CALPAS); patients also completed the Patient Motivation Inventory (PMI). Pre-assessment levels of disturbed behaviour and treatment engagement were recorded. Social climate varied according to ward type and level of security. EssenCES ratings indicative of positive social climate were associated with lower levels of security; such ratings were also associated with lower behavioural disturbance and with higher levels of motivation, treatment engagement and therapeutic alliance. This serial cross-sectional survey indicated that use of the EssenCES alone might be a good practical measure of treatment progress/responsivity. A longitudinal study would be an important next step in establishing the extent to which it would be useful in this regard. Copyright © 2010 John Wiley & Sons, Ltd.

  13. Feasibility of a novel participatory multi-sector continuous improvement approach to enhance food security in remote Indigenous Australian communities

    Directory of Open Access Journals (Sweden)

    J. Brimblecombe

    2017-12-01

    Conclusion: A multi-sector participatory approach seeking continuous improvement engaged committed Aboriginal and non-Aboriginal stakeholders and was shown to have potential to shift community diet. Provision of clear mechanisms to link this approach with higher level policy and decision-making structures, clarity of roles and responsibilities, and processes to prioritise and communicate actions across sectors should further strengthen capacity for food security improvement. Integrating this approach enabling local decision-making into community governance structures with adequate resourcing is an imperative.

  14. Examination of the Current Approaches to State-Level Nuclear Security Evaluation

    International Nuclear Information System (INIS)

    Kim, Chan; Yim, Mansung; Kim, So Young

    2014-01-01

    An effective global nuclear materials security system will cover all materials, employ international standards and best practices, and reduce risks by reducing weapons-usable nuclear material stocks and the number of locations where they are found. Such a system must also encourage states to accept peer reviews by outside experts in order to demonstrate that effective security is in place. It is thus critically important to create an integrative framework of state-level evaluation of nuclear security as a basis for measuring the level and progress of international effort to secure and control all nuclear materials. There have been studies to represent state-level nuclear security with a quantitative metric. A prime example is the Nuclear Materials Security Index (NMSI) by the Nuclear Threat Initiative (NTI). Another comprehensive study is the State Level Risk Metric by Texas A and M University (TAMU). This paper examines the current methods with respect to their strengths and weaknesses and identifies the directions for future research to improve upon the existing approaches

  15. Low baseline levels of NK cells may predict a positive response to ipilimumab in melanoma therapy.

    Science.gov (United States)

    Tietze, Julia K; Angelova, Daniela; Heppt, Markus V; Ruzicka, Thomas; Berking, Carola

    2017-07-01

    The introduction of immune checkpoint blockade (ICB) has been a breakthrough in the therapy of metastatic melanoma. The influence of ICB on T-cell populations has been studied extensively, but little is known about the effect on NK cells. In this study, we analysed the relative and absolute amounts of NK cells and of the subpopulations of CD56 dim and CD56 bright NK cells among the peripheral blood mononuclear cells (PBMCs) of 32 patients with metastatic melanoma before and under treatment with ipilimumab or pembrolizumab by flow cytometry. In 15 (47%) patients, an abnormal low amount of NK cells was found at baseline. Analysis of the subpopulations showed also low or normal baseline levels for CD56 dim NK cells, whereas the baseline levels of CD56 bright NK cells were either normal or abnormally high. The relative and absolute amounts of NK cells and of CD56 dim and CD56 bright NK cell subpopulations in patients with a normal baseline did not change under treatment. However, patients with a low baseline of NK cells and CD56 dim NK cells showed a significant increase in these immune cell subsets, but the amounts remained to be lower than the normal baseline. The amount of CD56 bright NK cells was unaffected by treatment. The baseline levels of NK cells were correlated with the number of metastatic organs. Their proportion increased, whereas the expression of NKG2D decreased significantly when more than one organ was affected by metastases. Low baseline levels of NK cells and CD56 dim NK cells as well as normal baseline levels of CD56 bright NK cells correlated significantly with a positive response to ipilimumab but not to pembrolizumab. Survival curves of patients with low amounts of CD56 dim NK cells treated with ipilimumab showed a trend to longer survival. Normal baseline levels of CD56 bright NK cells were significantly correlated with longer survival as compared to patients with high baseline levels. In conclusion, analysis of the amounts of total NK cells

  16. Identification of the Level of Financial Security of an Insurance Company

    Directory of Open Access Journals (Sweden)

    Kozmenko Serhiy M.

    2014-02-01

    Full Text Available The article is devoted to theoretical and practical aspects of identification of financial security of the insurer. The article justifies urgency of identification of the level of financial security of the insurer and its qualitative assessment. It offers a scientific and methodical approach to identification of the level of financial security of the insurer on the basis of the conducted analysis of advantages and shortcomings of the existing approaches. The basis of the developed methods is a generalised assessment of the level of financial security of the insurer, which is offered to be carried out on the basis of calculation of statistical and dynamic integral indicators of financial security of the insurance company. The obtained integral assessments allow making a conclusion about efficiency of the selected strategy of the insurer and its ability to oppose to negative influence of threats to financial security. Results of calculation of integral indicators of financial security of the insurer allow identification of influence of fraud as the main threat to financial security of domestic insurance companies. The proposed approach was realised in practice of Ukrainian insurers and proved its efficiency.

  17. Automatic Multi-Level Thresholding Segmentation Based on Multi-Objective Optimization

    Directory of Open Access Journals (Sweden)

    L. DJEROU,

    2012-01-01

    Full Text Available In this paper, we present a new multi-level image thresholding technique, called Automatic Threshold based on Multi-objective Optimization "ATMO" that combines the flexibility of multi-objective fitness functions with the power of a Binary Particle Swarm Optimization algorithm "BPSO", for searching the "optimum" number of the thresholds and simultaneously the optimal thresholds of three criteria: the between-class variances criterion, the minimum error criterion and the entropy criterion. Some examples of test images are presented to compare our segmentation method, based on the multi-objective optimization approach with Otsu’s, Kapur’s and Kittler’s methods. Our experimental results show that the thresholding method based on multi-objective optimization is more efficient than the classical Otsu’s, Kapur’s and Kittler’s methods.

  18. Raise your defence: a baseline for security

    CERN Multimedia

    Computer Security Team

    2011-01-01

    It is an unfair imbalance: the (computer) security of a system/service is only as strong as the weakest link in the chain of protection. This provides attackers with an incredible advantage: they can choose when to attack, where and with which means. The defence side is permanently under pressure: they must defend at all times all assets against all eventualities. For computer security, this means that every computer system, every account, every web site and every service must be properly protected --- always.   In particular, at CERN, those services visible to the Internet are permanently probed. Web sites and servers are permanently scanned by adversaries for vulnerabilities; attackers repeatedly try to guess user passwords on our remote access gateways like LXPLUS or CERNTS; computing services, e.g. for Grid computing, are analysed again and again by malicious attackers for weaknesses which can be exploited. Thanks to the vigilance of the corresponding system and service experts, these atta...

  19. Optimizing survivability of multi-state systems with multi-level protection by multi-processor genetic algorithm

    International Nuclear Information System (INIS)

    Levitin, Gregory; Dai Yuanshun; Xie Min; Leng Poh, Kim

    2003-01-01

    In this paper we consider vulnerable systems which can have different states corresponding to different combinations of available elements composing the system. Each state can be characterized by a performance rate, which is the quantitative measure of a system's ability to perform its task. Both the impact of external factors (stress) and internal causes (failures) affect system survivability, which is determined as probability of meeting a given demand. In order to increase the survivability of the system, a multi-level protection is applied to its subsystems. This means that a subsystem and its inner level of protection are in their turn protected by the protection of an outer level. This double-protected subsystem has its outer protection and so forth. In such systems, the protected subsystems can be destroyed only if all of the levels of their protection are destroyed. Each level of protection can be destroyed only if all of the outer levels of protection are destroyed. We formulate the problem of finding the structure of series-parallel multi-state system (including choice of system elements, choice of structure of multi-level protection and choice of protection methods) in order to achieve a desired level of system survivability by the minimal cost. An algorithm based on the universal generating function method is used for determination of the system survivability. A multi-processor version of genetic algorithm is used as optimization tool in order to solve the structure optimization problem. An application example is presented to illustrate the procedure presented in this paper

  20. Theory, Demonstration and Methods: Research on Social Security of Migrant Workers by Domestic Scholar

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Social security of migrant workers has been significant in dissolving social contradictions and achieving the economic and social development in China during the transitional period. The researches of domestic scholar on social security of migrant workers can be classified into three categories. Firstly, theoretical analysis on social security of migrant workers, including researches on the appeal of social security and misunderstanding of recognition, theory-construction of rural worker social security, policy defects and equity construction in social security system of migrant workers. Secondly, real studies on social security of migrant workers, including researches on sequence of demand and influencing factors of social security of migrant workers as well as intrinsic motivation forming the perspective on social security. Lastly, road exploration of establishing social security system, including researches on the multi-level development of rural worker social security system, comparison of "Double-low method", "Guangdong Method" and "Shanghai Method" of the social security of migrant workers in Zhejiang Province and establishing multi-level social security system according to the hierarchy after the internal differentiation.

  1. Baseline levels of benzo(a)pyrene in southern California mussels

    Energy Technology Data Exchange (ETDEWEB)

    Dunn, B P [Univ. of British Columbia, Vancouver; Young, D R

    1976-12-01

    Marine mussels accumulate the carcinogen benzo(a)-pyrene from contaminated environments. Baseline studies in California indicate that levels of the carcinogen in mussels are at or near zero, except in areas of human activity. This finding runs counter to previous suggestions that benzo(a)pyrene is widely distributed in marine organisms.

  2. Barriers to Uptake of Conservation Agriculture in southern Africa: Multi-level Analyses from Malawi

    Science.gov (United States)

    Dougill, Andrew; Stringer, Lindsay; Whitfield, Stephen; Wood, Ben; Chinseu, Edna

    2015-04-01

    Conservation agriculture is a key set of actions within the growing body of climate-smart agriculture activities being advocated and rolled out across much of the developing world. Conservation agriculture has purported benefits for environmental quality, food security and the sustained delivery of ecosystem services. In this paper, new multi-level analyses are presented, assessing the current barriers to adoption of conservation agriculture practices in Malawi. Despite significant donor initiatives that have targeted conservation agriculture projects, uptake rates remain low. This paper synthesises studies from across 3 levels in Malawi: i.) national level- drawing on policy analysis, interviews and a multi-stakeholder workshop; ii.) district level - via assessments of development plans and District Office and extension service support, and; iii) local level - through data gained during community / household level studies in Dedza District that have gained significant donor support for conservation agriculture as a component of climate smart agriculture initiatives. The national level multi-stakeholder Conservation Agriculture workshop identified three areas requiring collaborative research and outlined routes for the empowerment of the National Conservation Agriculture Task Force to advance uptake of conservation agriculture and deliver associated benefits in terms of agricultural development, climate adaptation and mitigation. District level analyses highlight that whilst District Development Plans are now checked against climate change adaptation and mitigation criteria, capacity and knowledge limitations exist at the District level, preventing project interventions from being successfully up-scaled. Community level assessments highlight the need for increased community participation at the project-design phase and identify a pressing requirement for conservation agriculture planning processes (in particular those driven by investments in climate

  3. Multi-energy x-ray detectors to improve air-cargo security

    Science.gov (United States)

    Paulus, Caroline; Moulin, Vincent; Perion, Didier; Radisson, Patrick; Verger, Loïck

    2017-05-01

    X-ray based systems have been used for decades to screen luggage or cargo to detect illicit material. The advent of energy-sensitive photon-counting x-ray detectors mainly based on Cd(Zn)Te semi-conductor technology enables to improve discrimination between materials compared to single or dual energy technology. The presented work is part of the EUROSKY European project to develop a Single European Secure Air-Cargo Space. "Cargo" context implies the presence of relatively heavy objects and with potentially high atomic number. All the study is conducted on simulations with three different detectors: a typical dual energy sandwich detector, a realistic model of the commercial ME100 multi-energy detector marketed by MULTIX, and a ME100 "Cargo": a not yet existing modified multi-energy version of the ME100 more suited to air freight cargo inspection. Firstly, a comparison on simulated measurements shows the performances improvement of the new multi-energy detectors compared to the current dual-energy one. The relative performances are evaluated according to different criteria of separability or contrast-to-noise ratio and the impact of different parameters is studied (influence of channel number, type of materials and tube voltage). Secondly, performances of multi-energy detectors for overlaps processing in a dual-view system is accessed: the case of orthogonal projections has been studied, one giving dimensional values, the other one providing spectral data to assess effective atomic number. A method of overlap correction has been proposed and extended to multi-layer objects case. Therefore, Calibration and processing based on bi-material decomposition have been adapted for this purpose.

  4. Mercury exposure may suppress baseline corticosterone levels in juvenile birds.

    Science.gov (United States)

    Herring, Garth; Ackerman, Joshua T; Herzog, Mark P

    2012-06-05

    Mercury exposure has been associated with a wide variety of negative reproductive responses in birds, however few studies have examined the potential for chick impairment via the hypothalamic-pituitary-adrenal (HPA) axis. The HPA axis regulates corticosterone levels during periods of stress. We examined the relationship between baseline fecal corticosterone metabolite concentrations and mercury concentrations in down feathers of recently hatched (feathers (decreasing by 45% across the range of observed mercury concentrations) while accounting for stronger positive correlations between corticosterone concentrations and colony nest abundance and date. These results indicate that chronic mercury exposure may suppress baseline corticosterone concentrations in tern chicks and suggests that a juvenile bird's ability to respond to stress may be reduced via the downregulation of the HPA axis.

  5. Multi-level converter with auxiliary resonant-commutated pole

    NARCIS (Netherlands)

    Dijkhuizen, F.R.; Duarte, J.L.; Groningen, van W.D.H.

    1998-01-01

    The family of multi-level power converters offers advantages for high-power, high-voltage systems. A multi-level nested-cell structure has the attractive feature of static and dynamic voltage sharing among the switches. This is achieved by using clamping capacitors (floating capacitors) rather than

  6. Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography

    Science.gov (United States)

    Pathak, Rohit; Joshi, Satyadhar

    With the advent into the 20th century whole world has been facing the common dilemma of Terrorism. The suicide attacks on US twin towers 11 Sept. 2001, Train bombings in Madrid Spain 11 Mar. 2004, London bombings 7 Jul. 2005 and Mumbai attack 26 Nov. 2008 were some of the most disturbing, destructive and evil acts by terrorists in the last decade which has clearly shown their evil intent that they can go to any extent to accomplish their goals. Many terrorist organizations such as al Quaida, Harakat ul-Mujahidin, Hezbollah, Jaish-e-Mohammed, Lashkar-e-Toiba, etc. are carrying out training camps and terrorist operations which are accompanied with latest technology and high tech arsenal. To counter such terrorism our military is in need of advanced defense technology. One of the major issues of concern is secure communication. It has to be made sure that communication between different military forces is secure so that critical information is not leaked to the adversary. Military forces need secure communication to shield their confidential data from terrorist forces. Leakage of concerned data can prove hazardous, thus preservation and security is of prime importance. There may be a need to perform computations that require data from many military forces, but in some cases the associated forces would not want to reveal their data to other forces. In such situations Secure Multi-party Computations find their application. In this paper, we propose a new highly scalable Secure Multi-party Computation (SMC) protocol and algorithm for Defense applications which can be used to perform computation on encrypted data. Every party encrypts their data in accordance with a particular scheme. This encrypted data is distributed among some created virtual parties. These Virtual parties send their data to the TTP through an Anonymizer layer. TTP performs computation on encrypted data and announces the result. As the data sent was encrypted its actual value can’t be known by TTP

  7. Multi-State Initiatives---Agriculture Security Preparedness

    National Research Council Canada - National Science Library

    Gordon, Ellen

    2004-01-01

    ... to protect the nation's food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism including the struggle to secure the agriculture industry from potentially devastating attack...

  8. Underlying topography extraction over forest areas from multi-baseline PolInSAR data

    Science.gov (United States)

    Fu, Haiqiang; Zhu, Jianjun; Wang, Changcheng; Li, Zhiwei

    2017-11-01

    In this paper, the digital elevation model (DEM) for a forest area is extracted from multi-baseline (MB) polarimetric interferometric synthetic aperture radar (PolInSAR) data. On the basis of the random-volume-over-ground (RVoG) model, the weighted complex least-squares adjustment (WCLSA) method is proposed for the ground phase estimation, so that the MB PolInSAR observations can be constrained by a generalized observation function and the observation contribution to the solution can be adjusted by a weighting strategy. A baseline length weighting strategy is then adopted to syncretize the DEMs estimated with the ground phases. The results of the simulated experiment undertaken in this study demonstrate that the WCLSA method is sensitive to the number of redundant observations and can adjust the contributions of the different observations. We also applied the WCLSA method to E-SAR L- and P-band MB PolInSAR data from the Krycklan River catchment in Northern Sweden. The results show that the two extracted DEMs are in close agreement with the Light Detection and Ranging (Lidar) DEM, with root-mean-square errors of 3.54 and 3.16 m. The DEM vertical error is correlated with the terrain slope and ground-cover condition, but not with the forest height.

  9. Optimal Multi-Level Lot Sizing for Requirements Planning Systems

    OpenAIRE

    Earle Steinberg; H. Albert Napier

    1980-01-01

    The wide spread use of advanced information systems such as Material Requirements Planning (MRP) has significantly altered the practice of dependent demand inventory management. Recent research has focused on development of multi-level lot sizing heuristics for such systems. In this paper, we develop an optimal procedure for the multi-period, multi-product, multi-level lot sizing problem by modeling the system as a constrained generalized network with fixed charge arcs and side constraints. T...

  10. Evaluation of water security in Jordan using a multi-agent, hydroeconomic model: Initial model results from the Jordan Water Project

    Science.gov (United States)

    Yoon, J.; Klassert, C. J. A.; Lachaut, T.; Selby, P. D.; Knox, S.; Gorelick, S.; Rajsekhar, D.; Tilmant, A.; Avisse, N.; Harou, J. J.; Medellin-Azuara, J.; Gawel, E.; Klauer, B.; Mustafa, D.; Talozi, S.; Sigel, K.; Zhang, H.

    2016-12-01

    Our work focuses on development of a multi-agent, hydroeconomic model for water policy evaluation in Jordan. Jordan ranks among the most water-scarce countries in the world, a situation exacerbated due to a recent influx of refugees escaping the ongoing civil war in neighboring Syria. The modular, multi-agent model is used to evaluate interventions for enhancing Jordan's water security, integrating biophysical modules that simulate natural and engineered phenomena with human modules that represent behavior at multiple levels of decision making. The hydrologic modules are developed using spatially-distributed groundwater and surface water models, which are translated into compact simulators for efficient integration into the multi-agent model. For the multi-agent model, we explicitly account for human agency at multiple levels of decision making, with agents representing riparian, management, supplier, and water user groups. Human agents are implemented as autonomous entities in the model that make decisions in relation to one another and in response to hydrologic and socioeconomic conditions. The integrated model is programmed in Python using Pynsim, a generalizable, open-source object-oriented software framework for modeling network-based water resource systems. The modeling time periods include historical (2006-2014) and future (present-2050) time spans. For the historical runs, the model performance is validated against historical data for several observations that reflect the interacting dynamics of both the hydrologic and human components of the system. A historical counterfactual scenario is also constructed to isolate and identify the impacts of the recent Syrian civil war and refugee crisis on Jordan's water system. For the future period, model runs are conducted to evaluate potential supply, demand, and institutional interventions over a wide range of plausible climate and socioeconomic scenarios. In addition, model sensitivity analysis is conducted

  11. On multi-level thinking and scientific understanding

    Science.gov (United States)

    McIntyre, Michael Edgeworth

    2017-10-01

    Professor Duzheng YE's name has been familiar to me ever since my postdoctoral years at MIT with Professors Jule CHARNEY and Norman PHILLIPS, back in the late 1960s. I had the enormous pleasure of meeting Professor YE personally in 1992 in Beijing. His concern to promote the very best science and to use it well, and his thinking on multi-level orderly human activities, reminds me not only of the communication skills we need as scientists but also of the multi-level nature of science itself. Here I want to say something (a) about what science is; (b) about why multi-level thinking—and taking more than one viewpoint—is so important for scientific as well as for other forms of understanding; and (c) about what is meant, at a deep level, by "scientific understanding" and trying to communicate it, not only with lay persons but also across professional disciplines. I hope that Professor YE would approve.

  12. Interconnected levels of Multi-Stage Marketing – A Triadic approach

    DEFF Research Database (Denmark)

    Vedel, Mette; Geersbro, Jens; Ritter, Thomas

    2012-01-01

    must not only decide in general on the merits of multi-stage marketing for their firm, but must also decide on which level they will engage in multi-stage marketing. The triadic perspective enables a rich and multi-dimensional understanding of how different business relationships influence each other......Multi-stage marketing gains increasing attention as knowledge of and influence on the customer's customer become more critical for the firm's success. Despite this increasing managerial relevance, systematic approaches for analyzing multi-stage marketing are still missing. This paper conceptualizes...... different levels of multi-stage marketing and illustrates these stages with a case study. In addition, a triadic perspective is introduced as an analytical tool for multi-stage marketing research. The results from the case study indicate that multi-stage marketing exists on different levels. Thus, managers...

  13. Experimental increase in baseline corticosterone level reduces oxidative damage and enhances innate immune response.

    Directory of Open Access Journals (Sweden)

    Csongor I Vágási

    Full Text Available Glucocorticoid (GC hormones are significant regulators of homeostasis. The physiological effects of GCs critically depend on the time of exposure (short vs. long as well as on their circulating levels (baseline vs. stress-induced. Previous experiments, in which chronic and high elevation of GC levels was induced, indicate that GCs impair both the activity of the immune system and the oxidative balance. Nonetheless, our knowledge on how mildly elevated GC levels, a situation much more common in nature, might influence homeostasis is limited. Therefore, we studied whether an increase in GC level within the baseline range suppresses or enhances condition (body mass, hematocrit and coccidian infestation and physiological state (humoral innate immune system activity and oxidative balance. We implanted captive house sparrows Passer domesticus with either 60 days release corticosterone (CORT or control pellets. CORT-treated birds had elevated baseline CORT levels one week after the implantation, but following this CORT returned to its pre-treatment level and the experimental groups had similar CORT levels one and two months following the implantation. The mass of tail feathers grown during the initial phase of treatment was smaller in treated than in control birds. CORT implantation had a transient negative effect on body mass and hematocrit, but both of these traits resumed the pre-treatment values by one month post-treatment. CORT treatment lowered oxidative damage to lipids (malondialdehyde and enhanced constitutive innate immunity at one week and one month post-implantation. Our findings suggest that a relatively short-term (i.e. few days elevation of baseline CORT might have a positive and stimulatory effect on animal physiology.

  14. Knowledge of practice: A multi-sited event ethnography of border security fairs in Europe and North America.

    Science.gov (United States)

    Baird, Theodore

    2017-06-01

    This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices.

  15. Thermo-mechanical analysis for multi-level HLW repository concept

    International Nuclear Information System (INIS)

    Kwon, Sang Ki; Choi, Jong Won

    2004-01-01

    This work aims to investigate the influence of design parameters for the underground high-level nuclear waste repository with multi-level concept. B. Necessity o In order to construct an HLW repository in deep underground, it is required to select a site, which is far from major discontinuities. To dispose the whole spent fuels generated from the Korean nuclear power plants in a repository, the underground area of about 4km 2 is required. This would be a constraints for selecting an adequate repository site. It is recommended to dispose the two different spent fuels, PWR and CANDU, in different areas at the operation efficiency point of view. It is necessary to investigate the influence of parameters, which can affect the stability of multi-level repository. It is also needed to consider the influence of heat generated from the HLW and the high in situ stress in deep location. Therefore, thermo-mechanical coupling analysis should be carried out and the results should be compared with the results from single-level repository concept. Three-dimensional analysis is required to model the disposal tunnel and deposition hole. It is recommended to use the Korean geological condition and actually measured rock properties in Korea in order to achieve reliable modeling results. A FISH routine developed for effective modeling of Thermal-Mechanical coupling was implemented in the modeling using FLAC3D, which is a commercial three-dimensional FDM code. The thermal and mechanical properties of rock and rock mass achieved from Yusung drilling site, were used for the computer modeling. Different parameters such as level distance, waste type disposed on different levels, and time interval between the operation on different levels, were considered in the three-dimensional analysis. From the analysis, it was possible to derive adequate multi-level repository concept. Results and recommendations for application From the thermal-mechanical analysis for the multi-level repository

  16. PELAKSANAAN JUAL BELI MELALUI SISTEM MULTI LEVEL MARKETING PERSPEKTIF HUKUM ISLAM

    Directory of Open Access Journals (Sweden)

    Ayu Dewi Utami

    2016-03-01

    Full Text Available Bisnis Multi Level Marketing (MLM cukup berperan dalam menggerakkan roda perekonomian masyarakat. Dalam sejumlah kasus, Multi Level Marketing (MLM kerap dijadikan kedok dari bisnis money game dan mendewakan passive income. Bertolak dari kasus kasus seperti itulah, Majelis Ulama Indonesia (MUI telah menggodok prinsip-prinsip bisnis ini secara syariah termasuk marketing plannya. Tujuannya untuk melindungi pengusaha dan mitra bisnisnya (masyarakat dari praktik bisnis yang haram atau syubhat. Dari prinsip-prinsip yang ditentukan oleh Majelis Ulama Indonesia (MUI, peneliti mengadakan penelitian ini dengan tujuan untuk mengetahui bagaimana mekanisme bisnis Multi Level Marketing (MLM, serta untuk mengetahui bagaimana bisnis Multi Level Marketing (MLM menurut hukum Islam. Metode yang digunakan dalam penelitian ini adalah menggunakan metode pendekatan yuridis normatif, spesifikasi penelitian yang digunakan adalah deskriptif analitis, sedangkan penentuan sampel menggunakan metode Non Random sampling. Alat penelitian meliputi studi kepustakaan dan wawancara. Metode analisis data dilakukan dengan analisis kualitatif. Ada dua aspek untuk menilai apakah bisnis Multi Level Marketing (MLM itu sesuai dengan syariah atau tidak, yaitu aspek produk atau jasa yang dijual dan sistem dari Multi Level Marketing (MLM itu sendiri. Bagaimana sistem pemberian bonus yang terdapat dalam perusahaan Multi Level Marketing (MLM apakah terbebas dari unsus garar maupun maisir. Penelitian ini bertujuan untuk mengkaji lebih dalam tentang Multi Level Marketing (MLM khususnya dalam Hukum Islam. Sisi negatif yang terdapat pada sistem Multi Level Marketing (MLM tidak mewakili keharaman secara keseluruhan terhadap bisnis yang berbasis Multi Level Marketing (MLM lainnya.

  17. Robust site security using smart seismic array technology and multi-sensor data fusion

    Science.gov (United States)

    Hellickson, Dean; Richards, Paul; Reynolds, Zane; Keener, Joshua

    2010-04-01

    Traditional site security systems are susceptible to high individual sensor nuisance alarm rates that reduce the overall system effectiveness. Visual assessment of intrusions can be intensive and manually difficult as cameras are slewed by the system to non intrusion areas or as operators respond to nuisance alarms. Very little system intrusion performance data are available other than discrete sensor alarm indications that provide no real value. This paper discusses the system architecture, integration and display of a multi-sensor data fused system for wide area surveillance, local site intrusion detection and intrusion classification. The incorporation of a novel seismic array of smart sensors using FK Beamforming processing that greatly enhances the overall system detection and classification performance of the system is discussed. Recent test data demonstrates the performance of the seismic array within several different installations and its ability to classify and track moving targets at significant standoff distances with exceptional immunity to background clutter and noise. Multi-sensor data fusion is applied across a suite of complimentary sensors eliminating almost all nuisance alarms while integrating within a geographical information system to feed a visual-fusion display of the area being secured. Real-time sensor detection and intrusion classification data is presented within a visual-fusion display providing greatly enhanced situational awareness, system performance information and real-time assessment of intrusions and situations of interest with limited security operator involvement. This approach scales from a small local perimeter to very large geographical area and can be used across multiple sites controlled at a single command and control station.

  18. The effect of a motivational intervention on weight loss is moderated by level of baseline controlled motivation

    Directory of Open Access Journals (Sweden)

    Tate Deborah F

    2010-01-01

    Full Text Available Abstract Background Clinic-based behavioral weight loss programs are effective in producing significant weight loss. A one-size-fits-all approach is often taken with these programs. It may be beneficial to tailor programs based on participants' baseline characteristics. Type and level of motivation may be an important factor to consider. Previous research has found that, in general, higher levels of controlled motivation are detrimental to behavior change while higher levels of autonomous motivation improve the likelihood of behavior modification. Methods This study assessed the outcomes of two internet behavioral weight loss interventions and assessed the effect of baseline motivation levels on program success. Eighty females (M (SD age 48.7 (10.6 years; BMI 32.0 (3.7 kg/m2; 91% Caucasian were randomized to one of two groups, a standard group or a motivation-enhanced group. Both received a 16-week internet behavioral weight loss program and attended an initial and a four-week group session. Weight and motivation were measured at baseline, four and 16 weeks. Hierarchical regression analysis was conducted to test for moderation. Results There was significant weight loss at 16-weeks in both groups (p p = 0.57 (standard group 3.4 (3.6 kg; motivation-enhanced group 3.9 (3.4 kg. Further analysis was conducted to examine predictors of weight loss. Baseline controlled motivation level was negatively correlated with weight loss in the entire sample (r = -0.30; p = 0.01. Statistical analysis revealed an interaction between study group assignment and baseline level of controlled motivation. Weight loss was not predicted by baseline level of controlled motivation in the motivation-enhanced group, but was significantly predicted by controlled motivation in the standard group. Baseline autonomous motivation did not predict weight change in either group. Conclusions This research found that, in participants with high levels of baseline controlled motivation

  19. CryoSat Level1b SAR/SARin: quality improvements towards BaselineC

    Science.gov (United States)

    Scagliola, Michele; Fornari, Marco; Bouzinac, Catherine; Tagliani, Nicolas; Parrinello, Tommaso

    2014-05-01

    CryoSat was launched on the 8th April 2010 and it is the first European ice mission dedicated to monitoring precise changes in the thickness of polar ice sheets and floating sea ice over a 3-year period. Cryosat carries an innovative radar altimeter called the Synthetic Aperture Interferometric Altimeter (SIRAL), that transmits pulses at a high pulse repetition frequency thus making the received echoes phase coherent and suitable for azimuth processing. This allows to reach a significantly improved along track resolution with respect to traditional pulse-width limited altimeters. CryoSat is the first altimetry mission operating in SAR mode and continuous improvement in the Level1 Instrument Processing Facility (IPF1) are being identified, tested and validated in order to improve the quality of the Level1b products. Towards the release of the BaselineC of the CryoSat Level1b SAR/SARin products, that is expected during 2014, several improvements have been identified: • a datation bias of about -0.5195 ms will be corrected • a range bias of about -0.6730 m will be corrected • the waveform length in the Level1b product will be doubled with respect to BaselineB • improved processing for 1Hz echoes to have sharper waveforms • surface sample stack weighting to filter out the single look echoes acquired at highest look angle, that results in a sharpening of the 20Hz waveforms This poster details the main improvements that are foreseen to be included in the CryoSat Level1b SAR/SARin products in BaselineC.

  20. Technical baseline description for in situ vitrification laboratory test equipment

    International Nuclear Information System (INIS)

    Beard, K.V.; Bonnenberg, R.W.; Watson, L.R.

    1991-09-01

    IN situ vitrification (ISV) has been identified as possible waste treatment technology. ISV was developed by Pacific Northwest Laboratory (PNL), Richland, Washington, as a thermal treatment process to treat contaminated soils in place. The process, which electrically melts and dissolves soils and associated inorganic materials, simultaneously destroys and/or removes organic contaminants while incorporating inorganic contaminants into a stable, glass-like residual product. This Technical Baseline Description has been prepared to provide high level descriptions of the design of the Laboratory Test model, including all design modifications and safety improvements made to data. Furthermore, the Technical Baseline Description provides a basic overview of the interface documents for configuration management, program management interfaces, safety, quality, and security requirements. 8 figs

  1. Emerging Trends in Development of International Information Security Regime

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2016-01-01

    Full Text Available The article discusses the key trends shaping the international regime on information security. International cooperation in this area at the global level encounters contradictions of state interest. The main actors of the information security are the United States, Russia, China and the EU countries (Britain, France and Germany. The main contradiction is developing between the US on one side and Russia and China on the other. EU countries occupy the middle position, gravitating to that of US. The article proves that international cooperation on information security will reflect the overall logic of the development of international cooperation, which is characterized by a new model of cooperation, with the participation of state and non-state actors, known as multi-stakeholder partnerships and multi-level cooperation. The logic of the formation of an international regime on information security is closest to the logic of the formation of the international non-proliferation regime. It is in the interest of Russia to support the trend towards regionalization of information security regime. Russia can form a regional information security regime in the former Soviet Union on the basis of the CSTO and SCO and potentially on a wider Eurasian space. Such regional regime would give Russia an opportunity to shape the international regime and closely monitor emerging information security issues in the former Soviet Union, and remove the potential threat of "color revolutions".

  2. CryoSat Level1b SAR/SARin BaselineC: Product Format and Algorithm Improvements

    Science.gov (United States)

    Scagliola, Michele; Fornari, Marco; Di Giacinto, Andrea; Bouffard, Jerome; Féménias, Pierre; Parrinello, Tommaso

    2015-04-01

    CryoSat was launched on the 8th April 2010 and is the first European ice mission dedicated to the monitoring of precise changes in the thickness of polar ice sheets and floating sea ice. Cryosat carries an innovative radar altimeter called the Synthetic Aperture Interferometric Altimeter (SIRAL), that transmits pulses at a high pulse repetition frequency thus making the received echoes phase coherent and suitable for azimuth processing. This allows to reach a significantly improved along track resolution with respect to traditional pulse-width limited altimeters. CryoSat is the first altimetry mission operating in SAR mode and continuous improvements in the Level1 Instrument Processing Facility (IPF1) are being identified, tested and validated in order to improve the quality of the Level1b products. The current IPF, Baseline B, was released in operation in February 2012. A reprocessing campaign followed, in order to reprocess the data since July 2010. After more than 2 years of development, the release in operations of Baseline C is expected in the first half of 2015. BaselineC Level1b products will be distributed in an updated format, including for example the attitude information (roll, pitch and yaw) and, for SAR/SARIN, the waveform length doubled with respect to Baseline B. Moreveor, various algorithm improvements have been identified: • a datation bias of about -0.5195 ms will be corrected (SAR/SARIn) • a range bias of about 0.6730 m will be corrected (SAR/SARIn) • a roll bias of 0.1062 deg and a pitch bias of 0.0520 deg • Surface sample stack weighting to filter out the single look echoes acquired at highest look angle, that results in a sharpening of the 20Hz waveforms With the operational release of BaselineC, the second CryoSat reprocessing campaign will be initiated, taking benefit of the upgrade implemented in the IPF1 processing chain but also at IPF2 level. The reprocessing campaign will cover the full Cryosat mission starting on 16th July 2010

  3. A long baseline global stereo matching based upon short baseline estimation

    Science.gov (United States)

    Li, Jing; Zhao, Hong; Li, Zigang; Gu, Feifei; Zhao, Zixin; Ma, Yueyang; Fang, Meiqi

    2018-05-01

    In global stereo vision, balancing the matching efficiency and computing accuracy seems to be impossible because they contradict each other. In the case of a long baseline, this contradiction becomes more prominent. In order to solve this difficult problem, this paper proposes a novel idea to improve both the efficiency and accuracy in global stereo matching for a long baseline. In this way, the reference images located between the long baseline image pairs are firstly chosen to form the new image pairs with short baselines. The relationship between the disparities of pixels in the image pairs with different baselines is revealed by considering the quantized error so that the disparity search range under the long baseline can be reduced by guidance of the short baseline to gain matching efficiency. Then, the novel idea is integrated into the graph cuts (GCs) to form a multi-step GC algorithm based on the short baseline estimation, by which the disparity map under the long baseline can be calculated iteratively on the basis of the previous matching. Furthermore, the image information from the pixels that are non-occluded under the short baseline but are occluded for the long baseline can be employed to improve the matching accuracy. Although the time complexity of the proposed method depends on the locations of the chosen reference images, it is usually much lower for a long baseline stereo matching than when using the traditional GC algorithm. Finally, the validity of the proposed method is examined by experiments based on benchmark datasets. The results show that the proposed method is superior to the traditional GC method in terms of efficiency and accuracy, and thus it is suitable for long baseline stereo matching.

  4. A Unified Algorithm for Channel Imbalance and Antenna Phase Center Position Calibration of a Single-Pass Multi-Baseline TomoSAR System

    Directory of Open Access Journals (Sweden)

    Yuncheng Bu

    2018-03-01

    Full Text Available The multi-baseline synthetic aperture radar (SAR tomography (TomoSAR system is employed in such applications as disaster remote sensing, urban 3-D reconstruction, and forest carbon storage estimation. This is because of its 3-D imaging capability in a single-pass platform. However, a high 3-D resolution of TomoSAR is based on the premise that the channel imbalance and antenna phase center (APC position are precisely known. If this is not the case, the 3-D resolution performance will be seriously degraded. In this paper, a unified algorithm for channel imbalance and APC position calibration of a single-pass multi-baseline TomoSAR system is proposed. Based on the maximum likelihood method, as well as the least squares and the damped Newton method, we can calibrate the channel imbalance and APC position. The algorithm is suitable for near-field conditions, and no phase unwrapping operation is required. The effectiveness of the proposed algorithm has been verified by simulation and experimental results.

  5. SAFCM: A Security-Aware Feedback Control Mechanism for Distributed Real-Time Embedded Systems

    DEFF Research Database (Denmark)

    Ma, Yue; Jiang, Wei; Sang, Nan

    2012-01-01

    Distributed Real-time Embedded (DRE) systems are facing great challenges in networked, unpredictable and especially unsecured environments. In such systems, there is a strong need to enforce security on distributed computing nodes in order to guard against potential threats, while satisfying......-time systems, a multi-input multi-output feedback loop is designed and a model predictive controller is deployed based on an equation model that describes the dynamic behavior of the DRE systems. This control loop uses security level scaling to globally control the CPU utilization and security performance...... for the whole system. We propose a "security level" metric based on an evolution of cryptography algorithms used in embedded systems. Experimental results demonstrate that SAFCM not only has the excellent adaptivity compared to open-loop mechanism, but also has a better overall performance than PID control...

  6. Links between early baseline cortisol, attachment classification, and problem behaviors: A test of differential susceptibility versus diathesis-stress.

    Science.gov (United States)

    Fong, Michelle C; Measelle, Jeffrey; Conradt, Elisabeth; Ablow, Jennifer C

    2017-02-01

    The purpose of the current study was to predict concurrent levels of problem behaviors from young children's baseline cortisol and attachment classification, a proxy for the quality of caregiving experienced. In a sample of 58 children living at or below the federal poverty threshold, children's baseline cortisol levels, attachment classification, and problem behaviors were assessed at 17 months of age. We hypothesized that an interaction between baseline cortisol and attachment classification would predict problem behaviors above and beyond any main effects of baseline cortisol and attachment. However, based on limited prior research, we did not predict whether or not this interaction would be more consistent with diathesis-stress or differential susceptibility models. Consistent with diathesis-stress theory, the results indicated no significant differences in problem behavior levels among children with high baseline cortisol. In contrast, children with low baseline cortisol had the highest level of problem behaviors in the context of a disorganized attachment relationship. However, in the context of a secure attachment relationship, children with low baseline cortisol looked no different, with respect to problem behavior levels, then children with high cortisol levels. These findings have substantive implications for the socioemotional development of children reared in poverty. Copyright © 2017 Elsevier Inc. All rights reserved.

  7. Baseline serum CXCL10 and IL-12 levels may predict severe asthmatics' responsiveness to omalizumab.

    Science.gov (United States)

    Suzukawa, Maho; Matsumoto, Hisako; Ohshima, Nobuharu; Tashimo, Hiroyuki; Asari, Isao; Tajiri, Tomoko; Niimi, Akio; Nagase, Hiroyuki; Matsui, Hirotoshi; Kobayashi, Nobuyuki; Shoji, Shunsuke; Ohta, Ken

    2018-01-01

    Omalizumab, a humanized anti-IgE monoclonal antibody, is the first molecularly targeted drug for severe asthmatics. However, responses to omalizumab vary widely among patients. This study aimed to assess the potential of baseline serum cytokine levels as predictors of responsiveness to omalizumab. Thirty-one patients with severe, persistent asthma were enrolled in this study and administered omalizumab for at least 1 year. Response to omalizumab was assessed based on the physician's global evaluation of treatment effectiveness (GETE) at 48 weeks of treatment. Blood samples were collected at baseline and 16 and 32 weeks after starting omalizumab and measured for 30 cytokines by Luminex 200 and ELISA. Exhaled nitric oxide (FeNO) levels, peripheral blood eosinophil counts, pre-bronchodilator pulmonary functions and Asthma Quality of Life Questionnaire scores were determined at baseline and 16, 32 and 48 weeks after starting omalizumab. The numbers of clinically significant asthma exacerbations in the previous year and during 48 weeks of treatment with omalizumab were assessed. GETE assessment showed 19 responders (61.3%) and 12 non-responders (38.7%). Responders showed significantly higher levels of CXCL10 and IL-12 at baseline compared to non-responders (CXCL10: responders, 1530.0 ± 315.2 pg/ml vs. non-responders, 1066.0 ± 396.8 pg/ml, P = 0.001; IL-12: responders, 60.2 ± 39.2 pg/ml vs. non-responders, 32.2 ± 26.3 pg/ml, P = 0.04). ROC curves to distinguish responders from non-responders using the baseline serum CXCL10 level showed a good AUC of 0.83. At 32 weeks of omalizumab therapy, serum CXCL10 tended to be increased (1350 ± 412.3 pg/ml at baseline vs. 1529 ± 637.6 pg/ml at 32 weeks, P = 0.16) and serum IL-12 tended to be decreased (49.4 ± 37.0 pg/ml at baseline vs. 43.9 ± 30.9 pg/ml at 32 weeks, P = 0.05). On the other hand, serum IL-5 and PDGF were significantly decreased (IL-5: 54.2 ± 13.8 pg/ml at baseline vs. 49

  8. 77 FR 31866 - Intent To Request Approval From OMB of One New Public Collection of Information: Baseline...

    Science.gov (United States)

    2012-05-30

    ... From OMB of One New Public Collection of Information: Baseline Assessment for Security Enhancement... across public transportation systems. TSA developed the Baseline Assessment for Security Enhancement... be used as follows: 1. To develop a baseline understanding of a public transportation agency's...

  9. Multilevel classification of security concerns in cloud computing

    Directory of Open Access Journals (Sweden)

    Syed Asad Hussain

    2017-01-01

    Full Text Available Threats jeopardize some basic security requirements in a cloud. These threats generally constitute privacy breach, data leakage and unauthorized data access at different cloud layers. This paper presents a novel multilevel classification model of different security attacks across different cloud services at each layer. It also identifies attack types and risk levels associated with different cloud services at these layers. The risks are ranked as low, medium and high. The intensity of these risk levels depends upon the position of cloud layers. The attacks get more severe for lower layers where infrastructure and platform are involved. The intensity of these risk levels is also associated with security requirements of data encryption, multi-tenancy, data privacy, authentication and authorization for different cloud services. The multilevel classification model leads to the provision of dynamic security contract for each cloud layer that dynamically decides about security requirements for cloud consumer and provider.

  10. Study and Analysis of a Natural Reference Frame Current Controller for a Multi-Level H-Bridge Power Converter

    DEFF Research Database (Denmark)

    Ciobotaru, Mihai; Iov, Florin; Zanchetta, P.

    2008-01-01

    will be needed in order to control the power flow and to ensure proper and secure operation of this future grid with an increased level of renewable power. These power converters must be able to provide intelligent power management as well as ancillary services. This paper presents an analysis of the natural...... reference frame controller, based on proportional-resonant (PR) technique, for a multi-level H-bridge power converter for Universal and Flexible Power Management in Future Electricity Network. The proposed method is tested in terms of harmonic content in the Point of Common Coupling (PCC), voltage...

  11. Enabling Analytics on Sensitive Medical Data with Secure Multi-Party Computation.

    Science.gov (United States)

    Veeningen, Meilof; Chatterjea, Supriyo; Horváth, Anna Zsófia; Spindler, Gerald; Boersma, Eric; van der Spek, Peter; van der Galiën, Onno; Gutteling, Job; Kraaij, Wessel; Veugen, Thijs

    2018-01-01

    While there is a clear need to apply data analytics in the healthcare sector, this is often difficult because it requires combining sensitive data from multiple data sources. In this paper, we show how the cryptographic technique of secure multi-party computation can enable such data analytics by performing analytics without the need to share the underlying data. We discuss the issue of compliance to European privacy legislation; report on three pilots bringing these techniques closer to practice; and discuss the main challenges ahead to make fully privacy-preserving data analytics in the medical sector commonplace.

  12. STFTP: Secure TFTP Protocol for Embedded Multi-Agent Systems Communication

    Directory of Open Access Journals (Sweden)

    ZAGAR, D.

    2013-05-01

    Full Text Available Today's embedded systems have evolved into multipurpose devices moving towards an embedded multi-agent system (MAS infrastructure. With the involvement of MAS in embedded systems, one remaining issues is establishing communication between agents in low computational power and low memory embedded systems without present Embedded Operating System (EOS. One solution is the extension of an outdated Trivial File Transfer Protocol (TFTP. The main advantage of using TFTP in embedded systems is the easy implementation. However, the problem at hand is the overall lack of security mechanisms in TFTP. This paper proposes an extension to the existing TFTP in a form of added security mechanisms: STFTP. The authentication is proposed using Digest Access Authentication process whereas the data encryption can be performed by various cryptographic algorithms. The proposal is experimentally tested using two embedded systems based on micro-controller architecture. Communication is analyzed for authentication, data rate and transfer time versus various data encryption ciphers and files sizes. STFTP results in an expected drop in performance, which is in the range of similar encryption algorithms. The system could be improved by using embedded systems of higher computational power or by the use of hardware encryption modules.

  13. A Single Rod Multi-modality Multi-interface Level Sensor Using an AC Current Source

    Directory of Open Access Journals (Sweden)

    Abdulgader Hwili

    2008-05-01

    Full Text Available Crude oil separation is an important process in the oil industry. To make efficient use of the separators, it is important to know their internal behaviour, and to measure the levels of multi-interfaces between different materials, such as gas-foam, foam-oil, oil-emulsion, emulsion-water and water-solids. A single-rod multi-modality multi-interface level sensor is presented, which has a current source, and electromagnetic modalities. Some key issues have been addressed, including the effect of salt content and temperature i.e. conductivity on the measurement.

  14. Proof of Concept Integration of a Single-Level Service-Oriented Architecture into a Multi-Domain Secure Environment

    National Research Council Canada - National Science Library

    Gilkey, Craig M

    2008-01-01

    .... Such web services operating across multiple security domains would provide additional advantages, including improved intelligence aggregation, and real-time collaboration between users in different security domains...

  15. Multi-level spondylolysis.

    Science.gov (United States)

    Hersh, David S; Kim, Yong H; Razi, Afshin

    2011-01-01

    The incidence of isthmic spondylolysis is approximately 3% to 6% in the general population. Spondylolytic defects involving multiple vertebral levels, on the other hand, are extremely rare. Only a handful of reports have examined the outcomes of surgical treatment of multi-level spondylolysis. Here, we present one case of bilateral pars defects at L3, L4, and L5. The patient, a 46-year-old female, presented with lower back pain radiating into the left lower extremity. Radiographs and CT scans of the lumbar spine revealed bilateral pars defects at L3-L5. The patient underwent lumbar discectomy and interbody fusion of L4-S1 as well as direct repair of the pars defect at L3. There were no postoperative complications, and by seven months the patient had improved clinically. While previous reports describe the use of either direct repair or fusion in the treatment of spondylolysis, we are unaware of reports describing the use of both techniques at adjacent levels.

  16. THE SECURITY OF CRITICAL ENERGY INFRASTRUCTURE IN THE AGE OF MULTIPLE ATTACK VECTORS: NATO’S MULTI-FACETED APPROACH

    Directory of Open Access Journals (Sweden)

    Sorin Dumitru Ducaru

    2017-06-01

    Full Text Available The current NATO threat landscape is characterized by a combination or “hybrid blend” of unconventional emerging challenges (like cyber and terrorist attacks and re-emerging conventional ones (like Russia’s recent military resurgence and assertiveness, that led to the illegal annexation of Crimea and destabilization in Eastern Ukraine. While the resurgence of the Russian military activity pushed the Alliance in the direction of re-discovering its deterrence and collective defence role, the new, not-traditional, trans-national and essentially non-military treats that generate effects below the threshold of an armed attack require a new paradigm shift with a focus on resilience although the protection of critical energy infrastructure is first and foremost a national responsibility, NATO can contribute to meeting the infrastructure protection challenge on many levels. Given the fact that its core deterrence and defence mandate relies in a great measure on the security of Allies’ energy infrastructure NATO’s role and actions in reducing the vulnerabilities and strengthening the resilience of such infrastructure can only increase. A multi-faceted, multi-stakeholder and networked approach is needed to be able to strengthen defences and resilience of critical infrastructure such as energy. Understanding and defending against cyber or terrorist threat vectors, increased situational awareness, education, training, exercises, trusted partnerships as well as increasing strategic security dialogue and cooperation are key for such a comprehensive/network approach to the challenge.

  17. Interactive Effects of Dopamine Baseline Levels and Cycle Phase on Executive Functions: The Role of Progesterone

    Directory of Open Access Journals (Sweden)

    Esmeralda Hidalgo-Lopez

    2017-07-01

    Full Text Available Estradiol and progesterone levels vary along the menstrual cycle and have multiple neuroactive effects, including on the dopaminergic system. Dopamine relates to executive functions in an “inverted U-shaped” manner and its levels are increased by estradiol. Accordingly, dopamine dependent changes in executive functions along the menstrual cycle have been previously studied in the pre-ovulatory phase, when estradiol levels peak. Specifically it has been demonstrated that working memory is enhanced during the pre-ovulatory phase in women with low dopamine baseline levels, but impaired in women with high dopamine baseline levels. However, the role of progesterone, which peaks in the luteal cycle phase, has not been taken into account previously. Therefore, the main goals of the present study were to extend these findings (i to the luteal cycle phase and (ii to other executive functions. Furthermore, the usefulness of the eye blink rate (EBR as an indicator of dopamine baseline levels in menstrual cycle research was explored. 36 naturally cycling women were tested during three cycle phases (menses–low sex hormones; pre-ovulatory–high estradiol; luteal–high progesterone and estradiol. During each session, women performed a verbal N-back task, as measure of working memory, and a single trial version of the Stroop task, as measure of response inhibition and cognitive flexibility. Hormone levels were assessed from saliva samples and spontaneous eye blink rate was recorded during menses. In the N-back task, women were faster during the luteal phase the higher their progesterone levels, irrespective of their dopamine baseline levels. In the Stroop task, we found a dopamine-cycle interaction, which was also driven by the luteal phase and progesterone levels. For women with higher EBR performance decreased during the luteal phase, whereas for women with lower EBR performance improved during the luteal phase. These findings suggest an important

  18. Multi-level Bayesian analyses for single- and multi-vehicle freeway crashes.

    Science.gov (United States)

    Yu, Rongjie; Abdel-Aty, Mohamed

    2013-09-01

    This study presents multi-level analyses for single- and multi-vehicle crashes on a mountainous freeway. Data from a 15-mile mountainous freeway section on I-70 were investigated. Both aggregate and disaggregate models for the two crash conditions were developed. Five years of crash data were used in the aggregate investigation, while the disaggregate models utilized one year of crash data along with real-time traffic and weather data. For the aggregate analyses, safety performance functions were developed for the purpose of revealing the contributing factors for each crash type. Two methodologies, a Bayesian bivariate Poisson-lognormal model and a Bayesian hierarchical Poisson model with correlated random effects, were estimated to simultaneously analyze the two crash conditions with consideration of possible correlations. Except for the factors related to geometric characteristics, two exposure parameters (annual average daily traffic and segment length) were included. Two different sets of significant explanatory and exposure variables were identified for the single-vehicle (SV) and multi-vehicle (MV) crashes. It was found that the Bayesian bivariate Poisson-lognormal model is superior to the Bayesian hierarchical Poisson model, the former with a substantially lower DIC and more significant variables. In addition to the aggregate analyses, microscopic real-time crash risk evaluation models were developed for the two crash conditions. Multi-level Bayesian logistic regression models were estimated with the random parameters accounting for seasonal variations, crash-unit-level diversity and segment-level random effects capturing unobserved heterogeneity caused by the geometric characteristics. The model results indicate that the effects of the selected variables on crash occurrence vary across seasons and crash units; and that geometric characteristic variables contribute to the segment variations: the more unobserved heterogeneity have been accounted, the better

  19. CryoSat Ice Processor: High-Level Overview of Baseline-C Data and Quality-Control

    Science.gov (United States)

    Mannan, R.; Webb, E.; Hall, A.; Bouffard, J.; Femenias, P.; Parrinello, T.; Bouffard, J.; Brockley, D.; Baker, S.; Scagliola, M.; Urien, S.

    2016-08-01

    Since April 2015, the CryoSat ice products have been generated with the new Baseline-C Instrument Processing Facilities (IPFs). This represents a major upgrade to the CryoSat ice IPFs and is the baseline for the second CryoSat Reprocessing Campaign. Baseline- C introduces major evolutions with respect to Baseline- B, most notably the release of freeboard data within the L2 SAR products, following optimisation of the SAR retracker. Additional L2 improvements include a new Arctic Mean Sea Surface (MSS) in SAR; a new tuneable land ice retracker in LRM; and a new Digital Elevation Model (DEM) in SARIn. At L1B new attitude fields have been introduced and existing datation and range biases reduced. This paper provides a high level overview of the changes and evolutions implemented at Baseline-C in order to improve CryoSat L1B and L2 data characteristics and exploitation over polar regions. An overview of the main Quality Control (QC) activities performed on operational Baseline-C products is also presented.

  20. Quantum state preparation using multi-level-atom optics

    International Nuclear Information System (INIS)

    Busch, Th; Deasy, K; Chormaic, S Nic

    2007-01-01

    One of the most important characteristics for controlling processes on the quantum scale is the fidelity or robustness of the techniques being used. In the case of single atoms localized in micro-traps, it was recently shown that the use of time-dependent tunnelling interactions in a multi-trap setup can be viewed as analogous to the area of multi-level optics. The atom's centre-of-mass can then be controlled with a high fidelity, using a STIRAP-type process. Here, we review previous work that led to the development of multi-level atom optics and present two examples of our most recent work on quantum state preparation

  1. Greater-than-Class C Low-Level Radioactive Waste Program 1992 baseline strategy

    International Nuclear Information System (INIS)

    1993-02-01

    This baseline strategy document describes Department of Energy (DOE) goals, objectives, and strategy for fulfilling its responsibility to dispose of greater-than-Class C low-level radioactive waste (GTCC LLW) according to the requirements of Section 3(b) of the Low-Level Radioactive Waste Policy Amendments Act of 1985, Public Law 99-240. This document describes the baseline strategy being employed at the end of FY 1992. The strategy for fulfilling the above responsibility consists of three tasks: interim storage of limited quantities of GTCC LLW at a currently operating DOE facility to eliminate a potential public health and safety threcceptance of GTCC LLW for storage in a DOE dedicated facility on an as-needed basis pending disposal; and disposal in a facility licensed by the Nuclear Regulatory Commission. The objectives, assumptions, and strategies for each of these tasks are presented in this plan

  2. Relation of N-terminal pro B-type natriuretic peptide levels after symptom-limited exercise to baseline and ischemia levels.

    Science.gov (United States)

    van der Zee, P Marc; Verberne, Hein J; van Spijker, Rianne C; van Straalen, Jan P; Fischer, Johan C; Sturk, Augueste; van Eck-Smit, Berthe L F; de Winter, Robbert J

    2009-03-01

    Circulating levels of B-type natriuretic peptide (BNP) and the amino-terminal portion of the prohormone (NT-proBNP) have been reported to increase immediately after myocardial ischemia. The association between extent of exercise-induced myocardial ischemia measured using myocardial perfusion scintigraphy and the magnitude and time course of changes in NT-proBNP was studied. One hundred one patients underwent symptom-limited exercise myocardial perfusion scintigraphy. Myocardial ischemia was assessed semiquantitatively. Serum samples were obtained before the start of exercise (baseline), at maximal exercise, and every hour up to 6 hours after maximal exercise. Myocardial ischemia was present in 37 patients (37%). NT-proBNP rapidly increased during exercise (to 113%, interquartile range 104 to 144, and 118%, interquartile range 106 to 142, of baseline, respectively), with a second peak at 4 (141%, interquartile range 119 to 169) and 5 hours (136%, interquartile range 93 to 188), respectively. Absolute changes between NT-proBNP at baseline and at maximum exercise in patients with versus without ischemia were similar (median, 30 pg/ml, interquartile range 7 to 45 vs 15, interquartile range 4 to 46, respectively, p = 0.230), but absolute change between baseline and the secondary peak was higher in patients with ischemia than in patients without ischemia (median 64 pg/ml, interquartile range 32 to 172 vs 34, interquartile range 19 to 85, respectively, p = 0.024). In multivariate linear stepwise regression analysis of determinants of changes in NT-proBNP after exercise, baseline NT-proBNP was the only independent determinant of absolute changes at maximum exercise, whereas the presence of ischemia was not predictive. Baseline NT-proBNP, cystatin C, and end-systolic volume were independent determinants of the absolute increase to secondary peak levels. In conclusion, myocardial ischemia per se did not lead to additional increases in NT-proBNP within 6 hours after exercise.

  3. Multi-Level Marketing as a business model

    Directory of Open Access Journals (Sweden)

    Bogdan Gregor

    2013-03-01

    Full Text Available Multi Level Marketing is a very popular business model in the Western countries. It is a kind of hybrid of the method of distribution of goods and the method of building a sales network. It is one of the safest (carries a very low risk ways of conducting a business activity. The knowledge about functioning of this business model, both among theoreticians (scanty literature on the subject and practitioners, is still insufficient in Poland. Thus, the presented paper has been prepared as — in the Authors' opinion — it, at least infinitesimally, bridges the gap in the recognition of Multi Level Marketing issues. The aim of the study was, first of all, to describe Multi Level Marketing, to indicate practical benefits of this business model as well as to present basic systems of calculating a commission, which are used in marketing plans of companies. The discussion was based on the study of literature and the knowledge gained in the course of free-form interviews with the leaders of the sector.

  4. Analysis of theoretical security level of PDF Encryption mechanism based on X.509 certificates

    Directory of Open Access Journals (Sweden)

    Joanna Dmitruk

    2017-12-01

    Full Text Available PDF Encryption is a content security mechanism developed and used by Adobe in their products. In this paper, we have checked a theoretical security level of a variant that uses public key infrastructure and X.509 certificates. We have described a basis of this mechanism and we have performed a simple security analysis. Then, we have showed possible tweaks and security improvements. At the end, we have given some recommendations that can improve security of a content secured with PDF Encryption based on X.509 certificates. Keywords: DRM, cryptography, security level, PDF Encryption, Adobe, X.509

  5. The Methodological Approach to Determining the Level of Formation and Provision of Enterprise Personnel Security

    Directory of Open Access Journals (Sweden)

    Gavkalova Nataliia L.

    2016-11-01

    Full Text Available The aim of the article is to substantiate the methodical approach to determining the level of formation and provision of enterprise personnel security. By analyzing, systematizing and generalizing scientific achievements of many scientists, approaches to the evaluation of personnel security at the enterprise were considered, a set of indices for evaluation of personnel security was defined. There justified the urgency of creating a comprehensive approach to evaluation of personnel security that includes implementation of the following stages: defining a list of indices corresponding to the level of formation and provision of personnel security with the help of the expert evaluation method; calculating integral indices of personnel security for each component and the corresponding level by means of the taxonomic analysis; grouping enterprises by the level of formation and provision of personnel security with the use of the cluster and discriminant analysis. It is found that the implementation of this approach will allow not only determining the level of formation and provision of personnel security at the enterprise, but also developing appropriate recommendations on improving its state. Prospects for further research in this direction are evaluation of conditions for formation and provision of personnel security at the enterprise, which will enable revealing negative destabilizing factors that influence personnel security

  6. Biofuels and Food Security. A report by the High Level Panel of Experts on Food Security and Nutrition

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-06-15

    In October 2011, the UN Committee on World Food Security (CFS) recommended a ''review of biofuels policies -- where applicable and if necessary -- according to balanced science-based assessments of the opportunities and challenges that they may represent for food security so that biofuels can be produced where it is socially, economically and environmentally feasible to do so''. In line with this, the CFS requested the HLPE (High Level Panel of Experts) to ''conduct a science-based comparative literature analysis taking into consideration the work produced by the FAO and Global Bioenergy Partnership (GBEP) of the positive and negative effects of biofuels on food security''. Recommendations from the report include the following. Food security policies and biofuel policies cannot be separated because they mutually interact. Food security and the right to food should be priority concerns in the design of any biofuel policy. Governments should adopt the principle: biofuels shall not compromise food security and therefore should be managed so that food access or the resources necessary for the production of food, principally land, biodiversity, water and labour are not put at risk. The CFS should undertake action to ensure that this principle is operable in the very varied contexts in which all countries find themselves. Given the trend to the emergence of a global biofuels market, and a context moving from policy-driven to market-driven biofuels, there is an urgent need for close and pro-active coordination of food security, biofuel/bioenergy policies and energy policies, at national and international levels, as well as rapid response mechanisms in case of crisis. There is also an urgent need to create an enabling, responsible climate for food and non-food investments compatible with food security. The HLPE recommends that governments adopt a coordinated food security and energy security strategy, which would require articulation around the following five axes

  7. Biofuels and Food Security. A report by the High Level Panel of Experts on Food Security and Nutrition

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-06-15

    In October 2011, the UN Committee on World Food Security (CFS) recommended a ''review of biofuels policies -- where applicable and if necessary -- according to balanced science-based assessments of the opportunities and challenges that they may represent for food security so that biofuels can be produced where it is socially, economically and environmentally feasible to do so''. In line with this, the CFS requested the HLPE (High Level Panel of Experts) to ''conduct a science-based comparative literature analysis taking into consideration the work produced by the FAO and Global Bioenergy Partnership (GBEP) of the positive and negative effects of biofuels on food security''. Recommendations from the report include the following. Food security policies and biofuel policies cannot be separated because they mutually interact. Food security and the right to food should be priority concerns in the design of any biofuel policy. Governments should adopt the principle: biofuels shall not compromise food security and therefore should be managed so that food access or the resources necessary for the production of food, principally land, biodiversity, water and labour are not put at risk. The CFS should undertake action to ensure that this principle is operable in the very varied contexts in which all countries find themselves. Given the trend to the emergence of a global biofuels market, and a context moving from policy-driven to market-driven biofuels, there is an urgent need for close and pro-active coordination of food security, biofuel/bioenergy policies and energy policies, at national and international levels, as well as rapid response mechanisms in case of crisis. There is also an urgent need to create an enabling, responsible climate for food and non-food investments compatible with food security. The HLPE recommends that governments adopt a coordinated food security and energy security strategy, which would require articulation

  8. Mathematical model comparing of the multi-level economics systems

    Science.gov (United States)

    Brykalov, S. M.; Kryanev, A. V.

    2017-12-01

    The mathematical model (scheme) of a multi-level comparison of the economic system, characterized by the system of indices, is worked out. In the mathematical model of the multi-level comparison of the economic systems, the indicators of peer review and forecasting of the economic system under consideration can be used. The model can take into account the uncertainty in the estimated values of the parameters or expert estimations. The model uses the multi-criteria approach based on the Pareto solutions.

  9. 77 FR 71430 - New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline...

    Science.gov (United States)

    2012-11-30

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration New Agency Information Collection Activity Under OMB Review: Public Transportation Baseline Assessment for Security Enhancement... voluntary site visits with security and operating officials of public transportation systems. This program...

  10. Program Baseline Change Control Procedure

    International Nuclear Information System (INIS)

    1993-02-01

    This procedure establishes the responsibilities and process for approving initial issues of and changes to the technical, cost, and schedule baselines, and selected management documents developed by the Office of Civilian Radioactive Waste Management (OCRWM) for the Civilian Radioactive Waste Management System. This procedure implements the OCRWM Baseline Management Plan and DOE Order 4700.1, Chg 1. It streamlines the change control process to enhance integration, accountability, and traceability of Level 0 and Level I decisions through standardized Baseline Change Proposal (BCP) forms to be used by the Level 0, 1, 2, and 3 Baseline Change Control Boards (BCCBs) and to be tracked in the OCRWM-wide Configuration Information System (CIS) Database.This procedure applies to all technical, cost, and schedule baselines controlled by the Energy System Acquisition Advisory Board (ESAAB) BCCB (Level 0) and, OCRWM Program Baseline Control Board (PBCCB) (Level 1). All baseline BCPs initiated by Level 2 or lower BCCBs, which require approval from ESAAB or PBCCB, shall be processed in accordance with this procedure. This procedure also applies to all Program-level management documents controlled by the OCRWM PBCCB

  11. A Security Level Classification Method for Power Systems under N-1 Contingency

    Directory of Open Access Journals (Sweden)

    Zhigang Lu

    2017-12-01

    Full Text Available Security assessment is crucial for the reliable and secure operation of power systems. This paper proposes a security level classification (SLC method to analyze the security level of power systems both qualitatively and quantitatively. In this SLC method, security levels are graded according to a comprehensive safety index (CSI, which is defined by integrating the system margin index (SMI and load entropy. The SMI depends on the operating load and the total supply capacity (TSC under N-1 contingency, and the load entropy reflects the heterogeneity of load distribution calculated from entropy theory. In order to calculate the TSC under N-1 contingency considering both of the computational accuracy and speed, the TSC is converted into an extended conic quadratic programming (ECQP model. In addition, the load boundary vector (LBV model is established to obtain the capacity limit of each load bus, and thus detect potential risks of power systems. Finally, two modified practical power systems and the IEEE 118-bus test system are studied to validate the feasibility of the proposed SLC method.

  12. Statin-related aminotransferase elevation according to baseline aminotransferases level in real practice in Korea.

    Science.gov (United States)

    Kim, H-S; Lee, S H; Kim, H; Lee, S-H; Cho, J H; Lee, H; Yim, H W; Kim, S-H; Choi, I-Y; Yoon, K-H; Kim, J H

    2016-06-01

    Higher rate of statin-related hepatotoxicity has been reported for Koreans than for Westerners. Moreover, statin-related aminotransferase elevation for those who show borderline levels of aspartate transaminase (AST) and alanine transaminase (ALT) (≤×3 of UNL) at baseline has not been fully investigated. Post-statin changes AST/ALT levels during the first year for 21 233 Korean outpatients at two large academic teaching hospitals from January 2009 to December 2013 were analysed using electronic health record data. The date of the first statin prescription was set as baseline. We also performed a comparative analysis of statin-related AST/ALT elevations according to the type of statin, followed by an analysis of clinical risk factors. The progression rate to abnormal AST/ALT values [>×3 the upper normal limit (UNL)] was significantly higher (2·4-16% vs. 0·3-1·7%, P ×1, but ≤×3 of UNL) compared with normal AST/ALT values at baseline. Those with normal baseline AST/ALT did not show significantly different progression rate between different statin medications (P = 0·801). However, patients taking pitavastatin (HR = 0·76, P = 0·657) were least likely to develop abnormal AST/ALT, whereas those taking fluvastatin (HR = 2·96, P = 0·029) were the most likely to develop abnormal AST/ALT compared with atorvastatin for patients who were with baseline borderline AST/ALT. However, given the small sample sizes and the observational nature of our study, these need further study. It is advisable to regularly monitor AST/ALT levels even in patients with AST/ALT increases >×1. Future studies should aim to determine the possible risk factors for each specific statin type by analysing various confounding variables. © 2016 The Authors. Journal of Clinical Pharmacy and Therapeutics Published by John Wiley & Sons Ltd.

  13. Security of OS-level virtualization technologies: Technical report

    OpenAIRE

    Reshetova, Elena; Karhunen, Janne; Nyman, Thomas; Asokan, N.

    2014-01-01

    The need for flexible, low-overhead virtualization is evident on many fronts ranging from high-density cloud servers to mobile devices. During the past decade OS-level virtualization has emerged as a new, efficient approach for virtualization, with implementations in multiple different Unix-based systems. Despite its popularity, there has been no systematic study of OS-level virtualization from the point of view of security. In this report, we conduct a comparative study of several OS-level v...

  14. Geochemical baseline level and function and contamination of phosphorus in Liao River Watershed sediments of China.

    Science.gov (United States)

    Liu, Shaoqing; Wang, Jing; Lin, Chunye; He, Mengchang; Liu, Xitao

    2013-10-15

    The quantitative assessment of P contamination in sediments is a challenge due to sediment heterogeneity and the lacking of geochemical background or baseline levels. In this study, a procedure was proposed to determine the average P background level and P geochemical baseline level (GBL) and develop P geochemical baseline functions (GBF) for riverbed sediments of the Liao River Watershed (LRW). The LRW has two river systems - the Liao River System (LRS) and the Daliao River System (DRS). Eighty-eight samples were collected and analyzed for P, Al, Fe, Ca, organic matter, pH, and texture. The results show that Fe can be used as a better particle-size proxy to construct the GBF of P (P (mg/kg) = 39.98 + 166.19 × Fe (%), R(2) = 0.835, n = 66). The GBL of P was 675 mg/kg, while the average background level of P was 355 mg/kg. Noting that many large cities are located in the DRS watershed, most of the contaminated sites were located within the DRS and the riverbed sediments were more contaminated by P in the DRS watershed than in the LRS watershed. The geochemical background and baseline information of P are of great importance in managing P levels within the LRW. Copyright © 2013 Elsevier Ltd. All rights reserved.

  15. Hierarchical energy and frequency security pricing in a smart microgrid: An equilibrium-inspired epsilon constraint based multi-objective decision making approach

    International Nuclear Information System (INIS)

    Rezaei, Navid; Kalantar, Mohsen

    2015-01-01

    Highlights: • Proposing a multi-objective security pricing mechanism for islanded microgrids. • Generating Pareto points using epsilon constraint methodology. • Best compromise solution using a novel decision making approach. • An equilibrium-inspired technique is used as an efficient decision making method. • Stochastic management of hierarchical reserves in a droop controlled microgrid. - Abstract: The present paper formulates a frequency security constrained energy management system for an islanded microgrid. Static and dynamic securities of the microgrids have been modeled in depth based on droop control paradigm. The derived frequency dependent modeling is incorporated into a multi-objective energy management system. Microgrid central controller is in charge to determine optimal prices of energy and frequency security such that technical, economic and environmental targets are satisfied simultaneously. The associated prices are extracted based on calculating related Lagrange multipliers corresponding to providing the microgrid hourly energy and reserve requirements. Besides, to generate optimal Pareto solutions of the proposed multi-objective framework augmented epsilon constraint method is applied. Moreover, a novel methodology on the basis of Nash equilibrium strategy is devised and employed to select the best compromise solution from the generated Pareto front. Comprehensive analysis tool is implemented in a typical test microgrid and executed over a 24 h scheduling time horizon. The energy, primary and secondary frequency control reserves have been scheduled appropriately in three different case-studies which are defined based on the microgrid various operational policies. The optimization results verify that the operational policies adopted by means of the microgrid central controller have direct impacts on determined energy and security prices. The illustrative implementations can give the microgrid central controller an insight view to provide

  16. Multi-Level Formation of Complex Software Systems

    Directory of Open Access Journals (Sweden)

    Hui Li

    2016-05-01

    Full Text Available We present a multi-level formation model for complex software systems. The previous works extract the software systems to software networks for further studies, but usually investigate the software networks at the class level. In contrast to these works, our treatment of software systems as multi-level networks is more realistic. In particular, the software networks are organized by three levels of granularity, which represents the modularity and hierarchy in the formation process of real-world software systems. More importantly, simulations based on this model have generated more realistic structural properties of software networks, such as power-law, clustering and modularization. On the basis of this model, how the structure of software systems effects software design principles is then explored, and it could be helpful for understanding software evolution and software engineering practices.

  17. A method to assess multi-modal hazmat transport security vulnerabilities: Hazmat transport SVA

    NARCIS (Netherlands)

    Reniers, G.L.L.; Dullaert, W.E.H.

    2013-01-01

    The suggested Hazmat transport Security Vulnerability Assessment (SVA) methodology presents a user-friendly approach to determine relative security risk levels of the different modes of hazardous freight transport (i.e., road, railway, inland waterways and pipeline transportation). First, transport

  18. Keabsahan Dan Kekuatan Hukum Layanan Multi Level Marketing Di Kota Manado

    OpenAIRE

    Mandang, Christian Leonardo

    2016-01-01

    Tujuan dilakukannya penelitian ini adalah untuk mengetahui apa landasan hukum yang mendasari keabsahan layanan Multi Level Marketing dan bagaimana sebuah Perusahaan dapat memenuhi syarat untuk menjalankan sistem Multi Level Marketing. Dengan menggunakan metode penelitian yuridis normatif, maka dapat disimpulkan: 1. Kehadiran Perusahaan dan kegiatan USAha Multi Level Marketing baik secara global maupun secara nasional, khususnya kehadirannya di negara Indonesia berperan untuk membantu berbagai...

  19. Association of baseline vitamin D levels with clinical parameters and treatment outcomes in chronic hepatitis B.

    Science.gov (United States)

    Chan, Henry Lik-Yuen; Elkhashab, Magdy; Trinh, Huy; Tak, Won Young; Ma, Xiaoli; Chuang, Wan-Long; Kim, Yoon Jun; Martins, Eduardo B; Lin, Lanjia; Dinh, Phillip; Charuworn, Prista; Foster, Graham R; Marcellin, Patrick

    2015-11-01

    The relationship between vitamin D levels and chronic hepatitis B (CHB) infection and treatment outcomes are poorly elucidated. We measured pre-treatment serum vitamin D (25-hydroxyvitamin D3; 25[OH]D3) levels and determined their association with clinical parameters and treatment outcomes in active CHB patients without advanced liver disease enrolled in a global clinical trial. Patients were randomly assigned to either 48 weeks of tenofovir disoproxil fumarate (TDF) plus peginterferon alfa-2a (PegIFN), TDF plus PegIFN for 16 weeks followed by TDF for 32 weeks, PegIFN for 48 weeks, or TDF for 120 weeks. Univariate and multivariate analyses were conducted to determine associations between vitamin D, baseline factors, and week 48 clinical outcome. Of 737 patients, 35% had insufficient (⩾20 but vitamin D levels. In univariate analysis, lower vitamin D levels were significantly associated with the following baseline parameters: younger age, lower uric acid levels, HBeAg-positive status, lower calcium levels, blood draw in winter or autumn, and HBV genotype D. On multivariate analysis, only HBV genotype, season of blood draw, calcium level, and age retained their association. High baseline level of vitamin D was associated with low HBV DNA, normal ALT and HBsAg at week 48 independent of treatment groups, but the association, with the exception of ALT, became statistically insignificant after adjusting for age, gender, HBeAg and HBV genotype. Abnormally low vitamin D levels are highly prevalent among untreated, active CHB patients. Baseline vitamin D levels are not associated with treatment outcomes, but were associated with normal ALT. Copyright © 2015 European Association for the Study of the Liver. Published by Elsevier B.V. All rights reserved.

  20. Chinese Medical Question Answer Matching Using End-to-End Character-Level Multi-Scale CNNs

    Directory of Open Access Journals (Sweden)

    Sheng Zhang

    2017-07-01

    Full Text Available This paper focuses mainly on the problem of Chinese medical question answer matching, which is arguably more challenging than open-domain question answer matching in English due to the combination of its domain-restricted nature and the language-specific features of Chinese. We present an end-to-end character-level multi-scale convolutional neural framework in which character embeddings instead of word embeddings are used to avoid Chinese word segmentation in text preprocessing, and multi-scale convolutional neural networks (CNNs are then introduced to extract contextual information from either question or answer sentences over different scales. The proposed framework can be trained with minimal human supervision and does not require any handcrafted features, rule-based patterns, or external resources. To validate our framework, we create a new text corpus, named cMedQA, by harvesting questions and answers from an online Chinese health and wellness community. The experimental results on the cMedQA dataset show that our framework significantly outperforms several strong baselines, and achieves an improvement of top-1 accuracy by up to 19%.

  1. Program reference schedule baseline

    International Nuclear Information System (INIS)

    1986-07-01

    This Program Reference Schedule Baseline (PRSB) provides the baseline Program-level milestones and associated schedules for the Civilian Radioactive Waste Management Program. It integrates all Program-level schedule-related activities. This schedule baseline will be used by the Director, Office of Civilian Radioactive Waste Management (OCRWM), and his staff to monitor compliance with Program objectives. Chapter 1 includes brief discussions concerning the relationship of the PRSB to the Program Reference Cost Baseline (PRCB), the Mission Plan, the Project Decision Schedule, the Total System Life Cycle Cost report, the Program Management Information System report, the Program Milestone Review, annual budget preparation, and system element plans. Chapter 2 includes the identification of all Level 0, or Program-level, milestones, while Chapter 3 presents and discusses the critical path schedules that correspond to those Level 0 milestones

  2. Association Between Baseline LDL-C Level and Total and Cardiovascular Mortality After LDL-C Lowering: A Systematic Review and Meta-analysis.

    Science.gov (United States)

    Navarese, Eliano P; Robinson, Jennifer G; Kowalewski, Mariusz; Kolodziejczak, Michalina; Andreotti, Felicita; Bliden, Kevin; Tantry, Udaya; Kubica, Jacek; Raggi, Paolo; Gurbel, Paul A

    2018-04-17

    Effects on specific fatal and nonfatal end points appear to vary for low-density lipoprotein cholesterol (LDL-C)-lowering drug trials. To evaluate whether baseline LDL-C level is associated with total and cardiovascular mortality risk reductions. Electronic databases (Cochrane, MEDLINE, EMBASE, TCTMD, ClinicalTrials.gov, major congress proceedings) were searched through February 2, 2018, to identify randomized clinical trials of statins, ezetimibe, and PCSK9-inhibiting monoclonal antibodies. Two investigators abstracted data and appraised risks of bias. Intervention groups were categorized as "more intensive" (more potent pharmacologic intervention) or "less intensive" (less potent, placebo, or control group). The coprimary end points were total mortality and cardiovascular mortality. Random-effects meta-regression and meta-analyses evaluated associations between baseline LDL-C level and reductions in mortality end points and secondary end points including major adverse cardiac events (MACE). In 34 trials, 136 299 patients received more intensive and 133 989 received less intensive LDL-C lowering. All-cause mortality was lower for more vs less intensive therapy (7.08% vs 7.70%; rate ratio [RR], 0.92 [95% CI, 0.88 to 0.96]), but varied by baseline LDL-C level. Meta-regression showed more intensive LDL-C lowering was associated with greater reductions in all-cause mortality with higher baseline LDL-C levels (change in RRs per 40-mg/dL increase in baseline LDL-C, 0.91 [95% CI, 0.86 to 0.96]; P = .001; absolute risk difference [ARD], -1.05 incident cases per 1000 person-years [95% CI, -1.59 to -0.51]), but only when baseline LDL-C levels were 100 mg/dL or greater (P baseline LDL-C level. Meta-regression showed more intensive LDL-C lowering was associated with a greater reduction in cardiovascular mortality with higher baseline LDL-C levels (change in RRs per 40-mg/dL increase in baseline LDL-C, 0.86 [95% CI, 0.80 to 0.94]; P baseline LDL-C levels were 100

  3. Esophageal baseline impedance levels in patients with pathophysiological characteristics of functional heartburn.

    Science.gov (United States)

    Martinucci, I; de Bortoli, N; Savarino, E; Piaggi, P; Bellini, M; Antonelli, A; Savarino, V; Frazzoni, M; Marchi, S

    2014-04-01

    Recently, it has been suggested that low esophageal basal impedance may reflect impaired mucosal integrity and increased acid sensitivity. We aimed to compare baseline impedance levels in patients with heartburn and pathophysiological characteristics related to functional heartburn (FH) divided into two groups on the basis of symptom relief after proton pump inhibitors (PPIs). Patients with heartburn and negative endoscopy were treated with esomeprazole or pantoprazole 40 mg daily for 8 weeks. According to MII-pH (off therapy) analysis, patients with normal acid exposure time (AET), normal reflux number, and lack of association between symptoms and refluxes were selected; of whom 30 patients with a symptom relief higher than 50% after PPIs composed Group A, and 30 patients, matched for sex and age, without symptom relief composed Group B. A group of 20 healthy volunteers (HVs) was enrolled. For each patient and HV, we evaluated the baseline impedance levels at channel 3, during the overnight rest, at three different times. Group A (vs Group B) showed an increase in the following parameters: mean AET (1.4 ± 0.8% vs 0.5 ± 0.6%), mean reflux number (30.4 ± 8.7 vs 24 ± 6.9), proximal reflux number (11.1 ± 5.2 vs 8.2 ± 3.6), acid reflux number (17.9 ± 6.1 vs 10.7 ± 6.9). Baseline impedance levels were lower in Group A than in Group B and in HVs (p heartburn and normal AET could achieve a better understanding of pathophysiology in reflux disease patients, and could improve the distinction between FH and hypersensitive esophagus. © 2014 John Wiley & Sons Ltd.

  4. Interconnected levels of multi-stage marketing: A triadic approach

    OpenAIRE

    Vedel, Mette; Geersbro, Jens; Ritter, Thomas

    2012-01-01

    Multi-stage marketing gains increasing attention as knowledge of and influence on the customer's customer become more critical for the firm's success. Despite this increasing managerial relevance, systematic approaches for analyzing multi-stage marketing are still missing. This paper conceptualizes different levels of multi-stage marketing and illustrates these stages with a case study. In addition, a triadic perspective is introduced as an analytical tool for multi-stage marketing research. ...

  5. EURISOL-DS Multi-MW Target Comparative Neutronic Performance of the Baseline Configuration vs. the Hg-Jet Option

    CERN Document Server

    Herrera-Martínez, A

    2006-01-01

    This technical report summarises the comparative study between several design options for the Multi-MW target station performed within Task #2 of the European Isotope Separation On-Line Radioactive Ion Beam Facility Design Study (EURISOL DS) [1]. Previous analyses were carried out, using the Monte Carlo code FLUKA [2], to determine optimal values for relevant parameters in the target design [3] and to analyse a preliminary Multi-MW target assembly configuration [4]. The second report showed that the aimed fission rates, i.e. ~1015 fissions/s, could be achieved with such a configuration. Nevertheless, a preliminary study of the target assembly integration [5] suggested reducing some of the dimensions. Moreover, the yields of specific isotopes have yet to be assessed and compared to other target configurations. This note presents a detailed comparison of the baseline configuration and the Hg-jet option, in terms of primary and neutron distribution, power densities and fission product yields. A scaled-down versi...

  6. A Study on the Security Levels of Spread-Spectrum Embedding Schemes in the WOA Framework.

    Science.gov (United States)

    Wang, Yuan-Gen; Zhu, Guopu; Kwong, Sam; Shi, Yun-Qing

    2017-08-23

    Security analysis is a very important issue for digital watermarking. Several years ago, according to Kerckhoffs' principle, the famous four security levels, namely insecurity, key security, subspace security, and stego-security, were defined for spread-spectrum (SS) embedding schemes in the framework of watermarked-only attack. However, up to now there has been little application of the definition of these security levels to the theoretical analysis of the security of SS embedding schemes, due to the difficulty of the theoretical analysis. In this paper, based on the security definition, we present a theoretical analysis to evaluate the security levels of five typical SS embedding schemes, which are the classical SS, the improved SS (ISS), the circular extension of ISS, the nonrobust and robust natural watermarking, respectively. The theoretical analysis of these typical SS schemes are successfully performed by taking advantage of the convolution of probability distributions to derive the probabilistic models of watermarked signals. Moreover, simulations are conducted to illustrate and validate our theoretical analysis. We believe that the theoretical and practical analysis presented in this paper can bridge the gap between the definition of the four security levels and its application to the theoretical analysis of SS embedding schemes.

  7. Advanced I and C system of security level for nuclear power station

    International Nuclear Information System (INIS)

    Liu Yanyang

    2001-01-01

    Advanced I and C system of security level using for PWR developed by Framatome and Schneider collective, SPINLINE3, are introduced. The technology is used to outside reactor nuclear measurement system in Qinshan II period. It's succeed benefits by Framatome and Schneider's more years development experience in nuclear power station digitallization security level I and C system field, which improve security and reliability of PWR, and, easy operation and maintains. SPINLINE3 based on digitallization and modularization technical proposal, and covered entireness reactor protect system and correlative control system. The paper also introduce CLARISSE (computer aided design aid) and SCADE (embedded software aid) for developing SPINLINE3. SPINLINE3 fills correlative IS and rule, based on software and hardware unit which certificate and launch into operation. After brief review of Framatome and Schneider's experience, the paper are introducing design guideline, application technology and how to fill demand of security level I and C system

  8. Pracovní motivace v multi-level marketingu

    OpenAIRE

    Mrázková, Tereza

    2015-01-01

    The purpose of this work is to analyse the motivation in multi-level marketing company. The thesis introduces basic general marketing tools, but also multi-level marketing and the theory of motivation. The research in practical part was done in the form of electronical survey, which was completed by 71 responders. The responders were employees of specific company. The thesis does not only focus on the motivation in work in general, but also on the difference in motivation between male and fem...

  9. A Multi-Attribute Pheromone Ant Secure Routing Algorithm Based on Reputation Value for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Lin Zhang

    2017-03-01

    Full Text Available With the development of wireless sensor networks, certain network problems have become more prominent, such as limited node resources, low data transmission security, and short network life cycles. To solve these problems effectively, it is important to design an efficient and trusted secure routing algorithm for wireless sensor networks. Traditional ant-colony optimization algorithms exhibit only local convergence, without considering the residual energy of the nodes and many other problems. This paper introduces a multi-attribute pheromone ant secure routing algorithm based on reputation value (MPASR. This algorithm can reduce the energy consumption of a network and improve the reliability of the nodes’ reputations by filtering nodes with higher coincidence rates and improving the method used to update the nodes’ communication behaviors. At the same time, the node reputation value, the residual node energy and the transmission delay are combined to formulate a synthetic pheromone that is used in the formula for calculating the random proportion rule in traditional ant-colony optimization to select the optimal data transmission path. Simulation results show that the improved algorithm can increase both the security of data transmission and the quality of routing service.

  10. A Multi-Attribute Pheromone Ant Secure Routing Algorithm Based on Reputation Value for Sensor Networks

    Science.gov (United States)

    Zhang, Lin; Yin, Na; Fu, Xiong; Lin, Qiaomin; Wang, Ruchuan

    2017-01-01

    With the development of wireless sensor networks, certain network problems have become more prominent, such as limited node resources, low data transmission security, and short network life cycles. To solve these problems effectively, it is important to design an efficient and trusted secure routing algorithm for wireless sensor networks. Traditional ant-colony optimization algorithms exhibit only local convergence, without considering the residual energy of the nodes and many other problems. This paper introduces a multi-attribute pheromone ant secure routing algorithm based on reputation value (MPASR). This algorithm can reduce the energy consumption of a network and improve the reliability of the nodes’ reputations by filtering nodes with higher coincidence rates and improving the method used to update the nodes’ communication behaviors. At the same time, the node reputation value, the residual node energy and the transmission delay are combined to formulate a synthetic pheromone that is used in the formula for calculating the random proportion rule in traditional ant-colony optimization to select the optimal data transmission path. Simulation results show that the improved algorithm can increase both the security of data transmission and the quality of routing service. PMID:28282894

  11. Big data privacy protection model based on multi-level trusted system

    Science.gov (United States)

    Zhang, Nan; Liu, Zehua; Han, Hongfeng

    2018-05-01

    This paper introduces and inherit the multi-level trusted system model that solves the Trojan virus by encrypting the privacy of user data, and achieve the principle: "not to read the high priority hierarchy, not to write the hierarchy with low priority". Thus ensuring that the low-priority data privacy leak does not affect the disclosure of high-priority data privacy. This paper inherits the multi-level trustworthy system model of Trojan horse and divides seven different risk levels. The priority level 1˜7 represent the low to high value of user data privacy, and realize seven kinds of encryption with different execution efficiency Algorithm, the higher the priority, the greater the value of user data privacy, at the expense of efficiency under the premise of choosing a more encrypted encryption algorithm to ensure data security. For enterprises, the price point is determined by the unit equipment users to decide the length of time. The higher the risk sub-group algorithm, the longer the encryption time. The model assumes that users prefer the lower priority encryption algorithm to ensure efficiency. This paper proposes a privacy cost model for each of the seven risk subgroups. Among them, the higher the privacy cost, the higher the priority of the risk sub-group, the higher the price the user needs to pay to ensure the privacy of the data. Furthermore, by introducing the existing pricing model of economics and the human traffic model proposed by this paper and fluctuating with the market demand, this paper improves the price of unit products when the market demand is low. On the other hand, when the market demand increases, the profit of the enterprise will be guaranteed under the guidance of the government by reducing the price per unit of product. Then, this paper introduces the dynamic factors of consumers' mood and age to optimize. At the same time, seven algorithms are selected from symmetric and asymmetric encryption algorithms to define the enterprise

  12. Governance and the Commons in a Multi-Level World

    Directory of Open Access Journals (Sweden)

    Derek Armitage

    2007-11-01

    Full Text Available Multi-level governance may facilitate learning and adaptation in complex social-ecological circumstances. Such arrangements should connect community-based management with regional/national government-level management, link scientific management and traditional management systems, encourage the sharing of knowledge and information, and promote collaboration and dialogue around goals and outcomes. Governance innovations of this type can thus build capacity to adapt to change and manage for resilience. However, critical reflection on the emergence of adaptive, multi-level governance for the commons is warranted. Drawing on examples from the North and South, the purpose of this review is to connect three complementary bodies of scholarship with insights for commons governance in a multi-level world: common property theory, resilience thinking and political ecology. From the commons and resilience literature, normative principles of adaptive, multi-level governance are synthesized (e.g., participation, accountability, leadership, knowledge pluralism, learning and trust. Political ecological interpretations, however, help to reveal the challenge of actualizing these principles and the contextual forces that make entrenched, top-down management systems resilient to change. These forces include the role of power, scale and levels of organization, knowledge valuation, the positioning of social actors and social constructions of nature. Also addressed are the policy narratives that shape governance, and the dialectic relationship among ecological systems and social change. tekst

  13. 多基线干涉仪解模糊算法%Solving Ambiguity Algorithm on Multi-Baseline Interferometer

    Institute of Scientific and Technical Information of China (English)

    任鹏; 李建军; 周彬; 王建水

    2015-01-01

    The technology of multi-baseline interferometer is an ordinary direction finding meth-od in passive location of emitter source. When an interferometer system working, its phase cyc-ling would result in some errors on direction finding outcome, viz. , direction finding ambiguity. The problem of phase ambiguity is analyzed on multi-baseline interferometer, several solving ambiguity algorithms is introduced in project, and the de-ambiguity probability of the algorithms is educed by means of computer simulation, and some suggestions are put forward in project.%对辐射源进行无源定位常用的一种测向体制为多基线正交干涉仪体制。该体制设备在测向工作时,由于相位的周期性模糊问题会导致测向结果产生错误,即产生测向模糊。主要针对多基线干涉仪测向模糊问题进行分析,介绍了工程实现过程中常用的几种解模糊算法,通过仿真得出各种算法的在相同条件下的无模糊概率,并且给出了工程实现建议。

  14. Multi-Level Wavelet Shannon Entropy-Based Method for Single-Sensor Fault Location

    Directory of Open Access Journals (Sweden)

    Qiaoning Yang

    2015-10-01

    Full Text Available In actual application, sensors are prone to failure because of harsh environments, battery drain, and sensor aging. Sensor fault location is an important step for follow-up sensor fault detection. In this paper, two new multi-level wavelet Shannon entropies (multi-level wavelet time Shannon entropy and multi-level wavelet time-energy Shannon entropy are defined. They take full advantage of sensor fault frequency distribution and energy distribution across multi-subband in wavelet domain. Based on the multi-level wavelet Shannon entropy, a method is proposed for single sensor fault location. The method firstly uses a criterion of maximum energy-to-Shannon entropy ratio to select the appropriate wavelet base for signal analysis. Then multi-level wavelet time Shannon entropy and multi-level wavelet time-energy Shannon entropy are used to locate the fault. The method is validated using practical chemical gas concentration data from a gas sensor array. Compared with wavelet time Shannon entropy and wavelet energy Shannon entropy, the experimental results demonstrate that the proposed method can achieve accurate location of a single sensor fault and has good anti-noise ability. The proposed method is feasible and effective for single-sensor fault location.

  15. Three essays on multi-level optimization models and applications

    Science.gov (United States)

    Rahdar, Mohammad

    The general form of a multi-level mathematical programming problem is a set of nested optimization problems, in which each level controls a series of decision variables independently. However, the value of decision variables may also impact the objective function of other levels. A two-level model is called a bilevel model and can be considered as a Stackelberg game with a leader and a follower. The leader anticipates the response of the follower and optimizes its objective function, and then the follower reacts to the leader's action. The multi-level decision-making model has many real-world applications such as government decisions, energy policies, market economy, network design, etc. However, there is a lack of capable algorithms to solve medium and large scale these types of problems. The dissertation is devoted to both theoretical research and applications of multi-level mathematical programming models, which consists of three parts, each in a paper format. The first part studies the renewable energy portfolio under two major renewable energy policies. The potential competition for biomass for the growth of the renewable energy portfolio in the United States and other interactions between two policies over the next twenty years are investigated. This problem mainly has two levels of decision makers: the government/policy makers and biofuel producers/electricity generators/farmers. We focus on the lower-level problem to predict the amount of capacity expansions, fuel production, and power generation. In the second part, we address uncertainty over demand and lead time in a multi-stage mathematical programming problem. We propose a two-stage tri-level optimization model in the concept of rolling horizon approach to reducing the dimensionality of the multi-stage problem. In the third part of the dissertation, we introduce a new branch and bound algorithm to solve bilevel linear programming problems. The total time is reduced by solving a smaller relaxation

  16. Optical fibre multi-parameter sensing with secure cloud based signal capture and processing

    Science.gov (United States)

    Newe, Thomas; O'Connell, Eoin; Meere, Damien; Yuan, Hongwei; Leen, Gabriel; O'Keeffe, Sinead; Lewis, Elfed

    2016-05-01

    Recent advancements in cloud computing technologies in the context of optical and optical fibre based systems are reported. The proliferation of real time and multi-channel based sensor systems represents significant growth in data volume. This coupled with a growing need for security presents many challenges and presents a huge opportunity for an evolutionary step in the widespread application of these sensing technologies. A tiered infrastructural system approach is adopted that is designed to facilitate the delivery of Optical Fibre-based "SENsing as a Service- SENaaS". Within this infrastructure, novel optical sensing platforms, deployed within different environments, are interfaced with a Cloud-based backbone infrastructure which facilitates the secure collection, storage and analysis of real-time data. Feedback systems, which harness this data to affect a change within the monitored location/environment/condition, are also discussed. The cloud based system presented here can also be used with chemical and physical sensors that require real-time data analysis, processing and feedback.

  17. Multi-level iteration optimization for diffusive critical calculation

    International Nuclear Information System (INIS)

    Li Yunzhao; Wu Hongchun; Cao Liangzhi; Zheng Youqi

    2013-01-01

    In nuclear reactor core neutron diffusion calculation, there are usually at least three levels of iterations, namely the fission source iteration, the multi-group scattering source iteration and the within-group iteration. Unnecessary calculations occur if the inner iterations are converged extremely tight. But the convergence of the outer iteration may be affected if the inner ones are converged insufficiently tight. Thus, a common scheme suit for most of the problems was proposed in this work to automatically find the optimized settings. The basic idea is to optimize the relative error tolerance of the inner iteration based on the corresponding convergence rate of the outer iteration. Numerical results of a typical thermal neutron reactor core problem and a fast neutron reactor core problem demonstrate the effectiveness of this algorithm in the variational nodal method code NODAL with the Gauss-Seidel left preconditioned multi-group GMRES algorithm. The multi-level iteration optimization scheme reduces the number of multi-group and within-group iterations respectively by a factor of about 1-2 and 5-21. (authors)

  18. A Secured Cognitive Agent based Multi-strategic Intelligent Search System

    Directory of Open Access Journals (Sweden)

    Neha Gulati

    2018-04-01

    Full Text Available Search Engine (SE is the most preferred information retrieval tool ubiquitously used. In spite of vast scale involvement of users in SE’s, their limited capabilities to understand the user/searcher context and emotions places high cognitive, perceptual and learning load on the user to maintain the search momentum. In this regard, the present work discusses a Cognitive Agent (CA based approach to support the user in Web-based search process. The work suggests a framework called Secured Cognitive Agent based Multi-strategic Intelligent Search System (CAbMsISS to assist the user in search process. It helps to reduce the contextual and emotional mismatch between the SE’s and user. After implementation of the proposed framework, performance analysis shows that CAbMsISS framework improves Query Retrieval Time (QRT and effectiveness for retrieving relevant results as compared to Present Search Engine (PSE. Supplementary to this, it also provides search suggestions when user accesses a resource previously tagged with negative emotions. Overall, the goal of the system is to enhance the search experience for keeping the user motivated. The framework provides suggestions through the search log that tracks the queries searched, resources accessed and emotions experienced during the search. The implemented framework also considers user security. Keywords: BDI model, Cognitive Agent, Emotion, Information retrieval, Intelligent search, Search Engine

  19. Tentative job analysis for a high-level, fixed-site, nuclear security officer

    International Nuclear Information System (INIS)

    Adams, K.G.; Trujillo, A.A.

    1977-10-01

    A tentative job analysis for a high-level, fixed-site, nuclear security officer is presented. The primary objective of the report is to provide a framework for evaluating the functions of a security officer in physical protection systems. Several job requirements related to duties, basic skills, personal contacts, supervision, working conditions, and decision making are presented. Individual character traits desirable in security officers are described

  20. Multi-level methods and approximating distribution functions

    International Nuclear Information System (INIS)

    Wilson, D.; Baker, R. E.

    2016-01-01

    Biochemical reaction networks are often modelled using discrete-state, continuous-time Markov chains. System statistics of these Markov chains usually cannot be calculated analytically and therefore estimates must be generated via simulation techniques. There is a well documented class of simulation techniques known as exact stochastic simulation algorithms, an example of which is Gillespie’s direct method. These algorithms often come with high computational costs, therefore approximate stochastic simulation algorithms such as the tau-leap method are used. However, in order to minimise the bias in the estimates generated using them, a relatively small value of tau is needed, rendering the computational costs comparable to Gillespie’s direct method. The multi-level Monte Carlo method (Anderson and Higham, Multiscale Model. Simul. 10:146–179, 2012) provides a reduction in computational costs whilst minimising or even eliminating the bias in the estimates of system statistics. This is achieved by first crudely approximating required statistics with many sample paths of low accuracy. Then correction terms are added until a required level of accuracy is reached. Recent literature has primarily focussed on implementing the multi-level method efficiently to estimate a single system statistic. However, it is clearly also of interest to be able to approximate entire probability distributions of species counts. We present two novel methods that combine known techniques for distribution reconstruction with the multi-level method. We demonstrate the potential of our methods using a number of examples.

  1. Multi-level methods and approximating distribution functions

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, D., E-mail: daniel.wilson@dtc.ox.ac.uk; Baker, R. E. [Mathematical Institute, University of Oxford, Radcliffe Observatory Quarter, Woodstock Road, Oxford, OX2 6GG (United Kingdom)

    2016-07-15

    Biochemical reaction networks are often modelled using discrete-state, continuous-time Markov chains. System statistics of these Markov chains usually cannot be calculated analytically and therefore estimates must be generated via simulation techniques. There is a well documented class of simulation techniques known as exact stochastic simulation algorithms, an example of which is Gillespie’s direct method. These algorithms often come with high computational costs, therefore approximate stochastic simulation algorithms such as the tau-leap method are used. However, in order to minimise the bias in the estimates generated using them, a relatively small value of tau is needed, rendering the computational costs comparable to Gillespie’s direct method. The multi-level Monte Carlo method (Anderson and Higham, Multiscale Model. Simul. 10:146–179, 2012) provides a reduction in computational costs whilst minimising or even eliminating the bias in the estimates of system statistics. This is achieved by first crudely approximating required statistics with many sample paths of low accuracy. Then correction terms are added until a required level of accuracy is reached. Recent literature has primarily focussed on implementing the multi-level method efficiently to estimate a single system statistic. However, it is clearly also of interest to be able to approximate entire probability distributions of species counts. We present two novel methods that combine known techniques for distribution reconstruction with the multi-level method. We demonstrate the potential of our methods using a number of examples.

  2. A single-phase multi-level D-STATCOM inverter using modular multi-level converter (MMC) topology for renewable energy sources

    Science.gov (United States)

    Sotoodeh, Pedram

    This dissertation presents the design of a novel multi-level inverter with FACTS capability for small to mid-size (10-20kW) permanent-magnet wind installations using modular multi-level converter (MMC) topology. The aim of the work is to design a new type of inverter with D-STATCOM option to provide utilities with more control on active and reactive power transfer of distribution lines. The inverter is placed between the renewable energy source, specifically a wind turbine, and the distribution grid in order to fix the power factor of the grid at a target value, regardless of wind speed, by regulating active and reactive power required by the grid. The inverter is capable of controlling active and reactive power by controlling the phase angle and modulation index, respectively. The unique contribution of the proposed work is to combine the two concepts of inverter and D-STATCOM using a novel voltage source converter (VSC) multi-level topology in a single unit without additional cost. Simulations of the proposed inverter, with 5 and 11 levels, have been conducted in MATLAB/Simulink for two systems including 20 kW/kVAR and 250 W/VAR. To validate the simulation results, a scaled version (250 kW/kVAR) of the proposed inverter with 5 and 11 levels has been built and tested in the laboratory. Experimental results show that the reduced-scale 5- and 11-level inverter is able to fix PF of the grid as well as being compatible with IEEE standards. Furthermore, total cost of the prototype models, which is one of the major objectives of this research, is comparable with market prices.

  3. On decoding of multi-level MPSK modulation codes

    Science.gov (United States)

    Lin, Shu; Gupta, Alok Kumar

    1990-01-01

    The decoding problem of multi-level block modulation codes is investigated. The hardware design of soft-decision Viterbi decoder for some short length 8-PSK block modulation codes is presented. An effective way to reduce the hardware complexity of the decoder by reducing the branch metric and path metric, using a non-uniform floating-point to integer mapping scheme, is proposed and discussed. The simulation results of the design are presented. The multi-stage decoding (MSD) of multi-level modulation codes is also investigated. The cases of soft-decision and hard-decision MSD are considered and their performance are evaluated for several codes of different lengths and different minimum squared Euclidean distances. It is shown that the soft-decision MSD reduces the decoding complexity drastically and it is suboptimum. The hard-decision MSD further simplifies the decoding while still maintaining a reasonable coding gain over the uncoded system, if the component codes are chosen properly. Finally, some basic 3-level 8-PSK modulation codes using BCH codes as component codes are constructed and their coding gains are found for hard decision multistage decoding.

  4. Declining Job Security Level and Workers' Perfomance In Selected ...

    African Journals Online (AJOL)

    tween job security level and job performance among employees of the banks. The study ..... My financial income is likely to be unstable and uncertain due ..... when job satisfaction and motivation were sufficiently high, the negative influence of.

  5. Multi-band transmission color filters for multi-color white LEDs based visible light communication

    Science.gov (United States)

    Wang, Qixia; Zhu, Zhendong; Gu, Huarong; Chen, Mengzhu; Tan, Qiaofeng

    2017-11-01

    Light-emitting diodes (LEDs) based visible light communication (VLC) can provide license-free bands, high data rates, and high security levels, which is a promising technique that will be extensively applied in future. Multi-band transmission color filters with enough peak transmittance and suitable bandwidth play a pivotal role for boosting signal-noise-ratio in VLC systems. In this paper, multi-band transmission color filters with bandwidth of dozens nanometers are designed by a simple analytical method. Experiment results of one-dimensional (1D) and two-dimensional (2D) tri-band color filters demonstrate the effectiveness of the multi-band transmission color filters and the corresponding analytical method.

  6. Multi-level governance in EU climate law

    NARCIS (Netherlands)

    Vedder, Hans; Woerdman, Edwin; Roggenkamp, Martha; Holwerda, Marijn

    2015-01-01

    This chapter analyses the multi-level governance in EU climate law; it connects the international arena, with EU and national decision-making and relates climate change considerations to competitiveness concerns.

  7. Coherence modulation at the photon-counting level: A new scheme for secure communication

    International Nuclear Information System (INIS)

    Rhodes, William T; Boughanmi, Abdellatif; Moreno, Yezid Torres

    2016-01-01

    When operated at the photon-counting level, coherence modulation can provide quantifiably secure binary signal transmission between two entities, security being based on the nonclonability of photons. (paper)

  8. The multi-level perspective analysis: Indonesia geothermal energy transition study

    Science.gov (United States)

    Wisaksono, A.; Murphy, J.; Sharp, J. H.; Younger, P. L.

    2018-01-01

    The study adopts a multi-level perspective in technology transition to analyse how the transition process in the development of geothermal energy in Indonesia is able to compete against the incumbent fossil-fuelled energy sources. Three levels of multi-level perspective are socio-technical landscape (ST-landscape), socio-technical regime (ST-regime) and niche innovations in Indonesia geothermal development. The identification, mapping and analysis of the dynamic relationship between each level are the important pillars of the multi-level perspective framework. The analysis considers the set of rules, actors and controversies that may arise in the technological transition process. The identified geothermal resource risks are the basis of the emerging geothermal technological innovations in Indonesian geothermal. The analysis of this study reveals the transition pathway, which yields a forecast for the Indonesian geothermal technology transition in the form of scenarios and probable impacts.

  9. Experimental researches and comparison on aerodynamic parameters and cleaning efficiency of multi-level multi-channel cyclone

    Directory of Open Access Journals (Sweden)

    Aleksandras Chlebnikovas

    2015-10-01

    Full Text Available Multi-level multi-channel cyclone – the lately designed air cleaning device that can remove ultra-fine 20 μm particulatematter (PM from dusted air and reach over 95% of the overall cleaning efficiency. Multi-channel cyclone technology is based on centrifugal forces and has the resulting additional filtering process operation. Multi-level structure of cyclone allows to achieve higher air flow cleaning capacity at the same dimensions of the device, thus saving installation space required for the job, production and operating costs. Studies have examined the air flow parameters change in one–, two– and three–levels multichannel cyclone. These constructions differ according to the productivity of cleaned air under the constant peripheral and transitional (50/50 case air flow relations. Accordance with the results of air flow dynamics – velocity distribution of multi-channel cyclone, aerodynamic resistance and efficiency can be judged on the flow turbulence, the flow channel cross-section and select the most appropriate application. Cleaning efficiency studies were carried out using fine granite and wood ashes PM. The maximum cleaning efficiency was 93.3%, at an average of 4.5 g/m3, the aerodynamic resistance was equal to 1525 Pa.

  10. 7 CFR 3560.610 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Security. 3560.610 Section 3560.610 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS On-Farm Labor Housing § 3560.610 Security. (a) Security... housing will be located on a tract of land that is surveyed such that, for security purposes, it is...

  11. Precise baseline determination for the TanDEM-X mission

    Science.gov (United States)

    Koenig, Rolf; Moon, Yongjin; Neumayer, Hans; Wermuth, Martin; Montenbruck, Oliver; Jäggi, Adrian

    The TanDEM-X mission will strive for generating a global precise Digital Elevation Model (DEM) by way of bi-static SAR in a close formation of the TerraSAR-X satellite, already launched on June 15, 2007, and the TanDEM-X satellite to be launched in May 2010. Both satellites carry the Tracking, Occultation and Ranging (TOR) payload supplied by the GFZ German Research Centre for Geosciences. The TOR consists of a high-precision dual-frequency GPS receiver, called Integrated GPS Occultation Receiver (IGOR), and a Laser retro-reflector (LRR) for precise orbit determination (POD) and atmospheric sounding. The IGOR is of vital importance for the TanDEM-X mission objectives as the millimeter level determination of the baseline or distance between the two spacecrafts is needed to derive meter level accurate DEMs. Within the TanDEM-X ground segment GFZ is responsible for the operational provision of precise baselines. For this GFZ uses two software chains, first its Earth Parameter and Orbit System (EPOS) software and second the BERNESE software, for backup purposes and quality control. In a concerted effort also the German Aerospace Center (DLR) generates precise baselines independently with a dedicated Kalman filter approach realized in its FRNS software. By the example of GRACE the generation of baselines with millimeter accuracy from on-board GPS data can be validated directly by way of comparing them to the intersatellite K-band range measurements. The K-band ranges are accurate down to the micrometer-level and therefore may be considered as truth. Both TanDEM-X baseline providers are able to generate GRACE baselines with sub-millimeter accuracy. By merging the independent baselines by GFZ and DLR, the accuracy can even be increased. The K-band validation however covers solely the along-track component as the K-band data measure just the distance between the two GRACE satellites. In addition they inhibit an un-known bias which must be modelled in the comparison, so the

  12. Morphing Wing Weight Predictors and Their Application in a Template-Based Morphing Aircraft Sizing Environment II. Part 2; Morphing Aircraft Sizing via Multi-level Optimization

    Science.gov (United States)

    Skillen, Michael D.; Crossley, William A.

    2008-01-01

    This report presents an approach for sizing of a morphing aircraft based upon a multi-level design optimization approach. For this effort, a morphing wing is one whose planform can make significant shape changes in flight - increasing wing area by 50% or more from the lowest possible area, changing sweep 30 or more, and/or increasing aspect ratio by as much as 200% from the lowest possible value. The top-level optimization problem seeks to minimize the gross weight of the aircraft by determining a set of "baseline" variables - these are common aircraft sizing variables, along with a set of "morphing limit" variables - these describe the maximum shape change for a particular morphing strategy. The sub-level optimization problems represent each segment in the morphing aircraft's design mission; here, each sub-level optimizer minimizes fuel consumed during each mission segment by changing the wing planform within the bounds set by the baseline and morphing limit variables from the top-level problem.

  13. Stack Characterization in CryoSat Level1b SAR/SARin Baseline C

    Science.gov (United States)

    Scagliola, Michele; Fornari, Marco; Di Giacinto, Andrea; Bouffard, Jerome; Féménias, Pierre; Parrinello, Tommaso

    2015-04-01

    CryoSat was launched on the 8th April 2010 and is the first European ice mission dedicated to the monitoring of precise changes in the thickness of polar ice sheets and floating sea ice. CryoSat is the first altimetry mission operating in SAR mode and it carries an innovative radar altimeter called the Synthetic Aperture Interferometric Altimeter (SIRAL), that transmits pulses at a high pulse repetition frequency thus making the received echoes phase coherent and suitable for azimuth processing. The current CryoSat IPF (Instrument Processing Facility), Baseline B, was released in operation in February 2012. After more than 2 years of development, the release in operations of the Baseline C is expected in the first half of 2015. It is worth recalling here that the CryoSat SAR/SARin IPF1 generates 20Hz waveforms in correspondence of an approximately equally spaced set of ground locations on the Earth surface, i.e. surface samples, and that a surface sample gathers a collection of single-look echoes coming from the processed bursts during the time of visibility. Thus, for a given surface sample, the stack can be defined as the collection of all the single-look echoes pointing to the current surface sample, after applying all the necessary range corrections. The L1B product contains the power average of all the single-look echoes in the stack: the multi-looked L1B waveform. This reduces the data volume, while removing some information contained in the single looks, useful for characterizing the surface and modelling the L1B waveform. To recover such information, a set of parameters has been added to the L1B product: the stack characterization or beam behaviour parameters. The stack characterization, already included in previous Baselines, has been reviewed and expanded in Baseline C. This poster describes all the stack characterization parameters, detailing what they represent and how they have been computed. In details, such parameters can be summarized in: - Stack

  14. Placental baseline conditions modulate the hyperoxic BOLD-MRI response.

    Science.gov (United States)

    Sinding, Marianne; Peters, David A; Poulsen, Sofie S; Frøkjær, Jens B; Christiansen, Ole B; Petersen, Astrid; Uldbjerg, Niels; Sørensen, Anne

    2018-01-01

    Human pregnancies complicated by placental dysfunction may be characterized by a high hyperoxic Blood oxygen level-dependent (BOLD) MRI response. The pathophysiology behind this phenomenon remains to be established. The aim of this study was to evaluate whether it is associated with altered placental baseline conditions, including a lower oxygenation and altered tissue morphology, as estimated by the placental transverse relaxation time (T2*). We included 49 normal pregnancies (controls) and 13 pregnancies complicated by placental dysfunction (cases), defined by a birth weight baseline BOLD)/baseline BOLD) from a dynamic single-echo gradient-recalled echo (GRE) MRI sequence and the absolute ΔT2* (hyperoxic T2*- baseline T2*) from breath-hold multi-echo GRE sequences. In the control group, the relative ΔBOLD response increased during gestation from 5% in gestational week 20 to 20% in week 40. In the case group, the relative ΔBOLD response was significantly higher (mean Z-score 4.94; 95% CI 2.41, 7.47). The absolute ΔT2*, however, did not differ between controls and cases (p = 0.37), whereas the baseline T2* was lower among cases (mean Z-score -3.13; 95% CI -3.94, -2.32). Furthermore, we demonstrated a strong negative linear correlation between the Log 10 ΔBOLD response and the baseline T2* (r = -0.88, p baseline conditions, as the absolute increase in placental oxygenation (ΔT2*) does not differ between groups. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. Deliberation in Multi-Stakeholder Participation: A Heuristic Framework Applied to the Committee on World Food Security

    Directory of Open Access Journals (Sweden)

    Matheus Alves Zanella

    2018-02-01

    Full Text Available Multi-stakeholder participation (MSP has become a central feature in several institutions and processes of global governance. Those who promote them trust that these arrangements can advance the deliberative quality of international institutions, and thereby improve the democratic quality, legitimacy and effectiveness of both the institutional landscape, as well as decisions made within it. This paper employs a heuristic framework to analyze the deliberative quality of MSP. Specifically, it applies Dryzek’s deliberative systems framework to the case of the Committee on World Food Security (CFS. The assessment shows that the CFS improves the deliberative quality of food security governance by including and facilitating the transmission of discourses from the public to the empowered spaces. However, the deliberative quality of CFS could be higher with stronger accountability mechanisms in place, more meta-deliberation and adoption of CFS outcomes at national and local levels. Reflecting on the limitations of using this heuristic framework to assess MSP, we conclude that the analysis would benefit from more explicit consideration of different forms of power that are part of the social relations between actors involved in such settings. By proposing this analytical approach, we expect to advance a heuristic framework for assessing deliberation in an international context of the growing importance of MSP in sustainability and global governance.

  16. Cryosat Level1b SAR/Sarin: Improving the Quality of the Baseline C Products

    Science.gov (United States)

    Scagliola, M.; Fornari, M.; Tagliani, N.; Frommknecht, B.; Bouffard, J.; Parrinello, T.

    2014-12-01

    CryoSat was launched on the 8th April 2010 and it is the first European ice mission dedicated to monitoring precise changes in the thickness of polar ice sheets and floating sea ice over a 3-year period. Cryosat carries an innovative radar altimeter called the Synthetic Aperture Interferometric Altimeter (SIRAL), that transmits pulses at a high pulse repetition frequency thus making the received echoes phase coherent and suitable for azimuth processing. This allows to reach a significantly improved along track resolution with respect to traditional pulse-width limited altimeters. CryoSat is the first altimetry mission operating in SAR mode and continuous improvement in the Level1 Instrument Processing Facility (IPF1) are being identified, tested and validated in order to improve the quality of the Level1b products. Towards the release of the BaselineC of the CryoSat Level1b SAR/SARin products, that is expected at the end of 2014, several improvements have been identified: a datation bias of about -0.5195 ms will be corrected a range bias of about 0.6730 m will be corrected The range window size will be doubled with respect to BaselineB, so that the in Level1b products the waveforms will be doubled too Improved processing for 1Hz echoes to have sharper waveforms Surface sample stack weighting to filter out the single look echoes acquired at highest look angle, that results in a sharpening of the 20Hz waveforms Additional auxiliary information related to the mispointing angles of the instrument as well as to the stacks of single look echoes will be added This poster details the main quality improvements that are foreseen to be included in the CryoSat Level1b SAR/SARin products in BaselineC.

  17. Multi-level Reconfigurable Self-organization in Overlay Services

    NARCIS (Netherlands)

    Pournaras, E.

    2013-01-01

    Large-scale decentralized systems organized in overlay networks are complex to manage. Such systems integrate organizational complexity in the application-level resulting in low abstraction and modularity in their services. This thesis introduces a multi-level conceptual architecture for overlay

  18. Association of baseline level of physical activity and its temporal changes with incident hypertension and diabetes mellitus.

    Science.gov (United States)

    Lee, Jong-Young; Ryu, Seungho; Sung, Ki-Chul

    2018-01-01

    Background The association between baseline and temporal changes in physical activity and incident hypertension or diabetes mellitus in initially non-hypertensive or non-diabetic subjects is rarely known. Methods Among individuals who underwent consecutive comprehensive health screenings, their physical activity level was measured using a self-reported international physical activity questionnaire. First, subjects were classified into four categories: no regular physical activity with a sedentary lifestyle; minimal physical activity (diabetes mellitus and arterial hypertension, respectively. After a multivariate adjustment, sufficient baseline physical activity was associated with significantly lower risk for incident hypertension (hazard ratio 0.89; 95% confidence interval (CI) 0.81 to 0.97), but the difference was not significant, and showed a lower trend in diabetes mellitus incidence (hazard ratio 0.87; 95% CI 0.69 to 1.04) in reference to no regular physical activity group. Regardless of the baseline physical activity level, subjects with a temporal increase in physical activity showed significantly decreased risk for incident hypertension (hazard ratio 0.93; 95% CI 0.87 to 0.99) and diabetes mellitus (hazard ratio 0.83; 95% CI 0.74 to 0.92) compared with those with a temporal decrease in their physical activity level. Conclusion Both sufficient baseline physical activity level and its temporal increase were associated with a lower risk of incident hypertension and diabetes mellitus in a large, relatively healthy, cohort.

  19. PENGEMBANGAN MEDIA LUBANG MULTI LEVEL UNTUK PEMBELAJARAN LEMPAR TANGKAP BOLA KECIL

    Directory of Open Access Journals (Sweden)

    Tri Aryo Trubus Anom

    2017-02-01

    Full Text Available This research aims to develop a media Hole Multi Level to capture the small ball throwing learning grade IV elementary school level that can increase students roll control. The model of the research is the development of research and data analysis in the form of a percentage of data types with a description of the qualitative and quantitative. Procedure development include; 1 Potential problems, 2 Data collection, 3 Early media product design Multi Level Hole, 4 Design Validation by expert penjas and learning experts, 5 Revision products I, 6 Trials I in MI Ma’arif NU Darmakradenan, 7 Product revision II, 8 Trial II at four elementary school in the village of Darmakradenan, 9 Product revision III, 10 And products. The results of expert validation against the media Pit Multi Level was 80%, I Test of 83,23%, and II trials of 85.97%. Those results can be concluded that the development of the media Pit Multi Level can be used to capture the small ball throwing learning grade IV elementary school level.

  20. Providing Criminological Security of Minors at the National Level

    Directory of Open Access Journals (Sweden)

    Andrei I. Savelev

    2017-08-01

    Full Text Available The article discusses issues related to the provision of criminological security of minors at the national level. The Author analyzes the normative legal basis and main directions of activity of subjects of prevention of the violation of child rights in the Russian Federation. The Author believes that the current system of legal guarantees of criminological security of minors not fully meet modern requirements of protection of rights, freedoms and legitimate interests of adolescents. In particular, the legislation of the Russian Federation is largely focused on protecting the interests of disadvantaged segments of the population, including minors, being in socially dangerous position. It is proposed to improve the existing legislation through the adoption of a new federal law “The bases of the system of prevention of offences and security of minors”, which will be an important step towards building a legal state.

  1. Together We STRIDE: A quasi-experimental trial testing the effectiveness of a multi-level obesity intervention for Hispanic children in rural communities.

    Science.gov (United States)

    Ko, Linda K; Rillamas-Sun, Eileen; Bishop, Sonia; Cisneros, Oralia; Holte, Sarah; Thompson, Beti

    2018-04-01

    Hispanic children are disproportionally overweight and obese compared to their non-Hispanic white counterparts in the US. Community-wide, multi-level interventions have been successful to promote healthier nutrition, increased physical activity (PA), and weight loss. Using community-based participatory approach (CBPR) that engages community members in rural Hispanic communities is a promising way to promote behavior change, and ultimately weight loss among Hispanic children. Led by a community-academic partnership, the Together We STRIDE (Strategizing Together Relevant Interventions for Diet and Exercise) aims to test the effectiveness of a community-wide, multi-level intervention to promote healthier diets, increased PA, and weight loss among Hispanic children. The Together We STRIDE is a parallel quasi-experimental trial with a goal of recruiting 900 children aged 8-12 years nested within two communities (one intervention and one comparison). Children will be recruited from their respective elementary schools. Components of the 2-year multi-level intervention include comic books (individual-level), multi-generational nutrition and PA classes (family-level), teacher-led PA breaks and media literacy education (school-level), family nights, a farmer's market and a community PA event (known as ciclovia) at the community-level. Children from the comparison community will receive two newsletters. Height and weight measures will be collected from children in both communities at three time points (baseline, 6-months, and 18-months). The Together We STRIDE study aims to promote healthier diet and increased PA to produce healthy weight among Hispanic children. The use of CBPR approach and the engagement of the community will springboard strategies for intervention' sustainability. Clinical Trials Registration Number: NCT02982759 Retrospectively registered. Copyright © 2018 Elsevier Inc. All rights reserved.

  2. TeraSCREEN: multi-frequency multi-mode Terahertz screening for border checks

    Science.gov (United States)

    Alexander, Naomi E.; Alderman, Byron; Allona, Fernando; Frijlink, Peter; Gonzalo, Ramón; Hägelen, Manfred; Ibáñez, Asier; Krozer, Viktor; Langford, Marian L.; Limiti, Ernesto; Platt, Duncan; Schikora, Marek; Wang, Hui; Weber, Marc Andree

    2014-06-01

    The challenge for any security screening system is to identify potentially harmful objects such as weapons and explosives concealed under clothing. Classical border and security checkpoints are no longer capable of fulfilling the demands of today's ever growing security requirements, especially with respect to the high throughput generally required which entails a high detection rate of threat material and a low false alarm rate. TeraSCREEN proposes to develop an innovative concept of multi-frequency multi-mode Terahertz and millimeter-wave detection with new automatic detection and classification functionalities. The system developed will demonstrate, at a live control point, the safe automatic detection and classification of objects concealed under clothing, whilst respecting privacy and increasing current throughput rates. This innovative screening system will combine multi-frequency, multi-mode images taken by passive and active subsystems which will scan the subjects and obtain complementary spatial and spectral information, thus allowing for automatic threat recognition. The TeraSCREEN project, which will run from 2013 to 2016, has received funding from the European Union's Seventh Framework Programme under the Security Call. This paper will describe the project objectives and approach.

  3. Securing public transportation systems an integrated decision analysis framework for the prevention of terrorist attacks as example

    CERN Document Server

    Brauner, Florian

    2017-01-01

    Florian Brauner addresses the risk reduction effects of security measures (SecMe) as well as economic and social effects using terrorist threats in public transportation as use case. SecMe increase the level of security but cause interferences and restrictions for customers (e.g. privacy). This study identifies the interferences and analyzes the acceptance with an empirical survey of customers. A composite indicator for the acceptance of different SecMe is developed and integrated into a risk management framework for multi-criteria decision analysis achieving the right balance of risk reduction, costs, and social acceptance. Contents Assessment of Security Measures for Risk Management Measurement of Objective Effectiveness of Security Measures Against Terrorist Attacks Determination of Subjective Effects of Security Measures (Customer Acceptance Analysis) Cost Analysis of Security Measures Multi-Criteria Decision Support Systems Target Groups Scientists with Interest in Civil Security Research Providers and S...

  4. 7 CFR 3560.560 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Security. 3560.560 Section 3560.560 Agriculture Regulations of the Department of Agriculture (Continued) RURAL HOUSING SERVICE, DEPARTMENT OF AGRICULTURE DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Off-Farm Labor Housing § 3560.560 Security. The security...

  5. Food preservation and security at household level in rural Nsukka ...

    African Journals Online (AJOL)

    In Nigeria, food insecurity at the household level can partly be attributed to poor preservation of post-harvest surpluses. This study sought to demonstrate a relationship (if any) between preservation of post harvest surpluses and food security at rural household level. Eha-Alumona and Opi-Uno, in Nsukka, Enugu State were ...

  6. Overview of the Long-Baseline Neutrino Facility cryogenic system

    CERN Document Server

    Montanari, David; Bremer, Johan; Delaney, Michael; Aurelien, Diaz; Doubnik, Roza; Haaf, Kevin; Hentschel, Steve; Norris, Barry; Voirin, Erik

    2017-01-01

    The Deep Underground Neutrino Experiment (DUNE) collaboration is developing a multi-kiloton Long-Baseline neutrino experiment that will be located one mile underground at the Sanford Underground Research Facility (SURF) in Lead, SD. In the present design, detectors will be located inside four cryostats filled with a total of 68,400 ton of ultrapure liquid argon, at the level of impurities lower than 100 parts per trillion of oxygen equivalent contamination. The Long-Baseline Neutrino Facility (LBNF) is developing the conventional facilities and cryogenics infrastructure supporting this experiment. The cryogenics system is composed of several sub-systems: External/Infrastructure, Proximity, and Internal cryogenics. It will be engineered, manufactured, commissioned, and qualified by an international engineering team. This contribution highlights the main features of the LBNF cryogenic system. It presents its performance, functional requirements and modes of operations. It also details the status of the design, ...

  7. Mutual Payments in Increase of the Level of Economic Security of Energy Generating Enterprises

    Directory of Open Access Journals (Sweden)

    Ruzhytskyi Andrіy V

    2013-12-01

    Full Text Available The article presents main approaches to the essence of the economic security of an enterprise notion, namely, approach of counter-action to threats, approach of successful market activity and approach of achievement of certain development goals; it identifies the role of economic security of energy generating enterprises in economic security of other subjects and the country in general; it offers definition of the economic security of an enterprise notion as a complex characteristic of the state of the enterprise that reflects the level of the enterprise possibility to ensure functioning and development; it marks out functional components of economic security, which are connected with mutual payments, namely, financial, personnel, technical and technological, political and legal, informational and interface ones; it presents connection of mutual payments with the level of financial component of economic security of enterprises, which envisages financial flow from or to the enterprise for changing the obligation status or its quantitative characteristics.

  8. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy.

    Science.gov (United States)

    Muhammad, Khan; Sajjad, Muhammad; Baik, Sung Wook

    2016-05-01

    In this paper, the problem of secure transmission of sensitive contents over the public network Internet is addressed by proposing a novel data hiding method in encrypted images with dual-level security. The secret information is divided into three blocks using a specific pattern, followed by an encryption mechanism based on the three-level encryption algorithm (TLEA). The input image is scrambled using a secret key, and the encrypted sub-message blocks are then embedded in the scrambled image by cyclic18 least significant bit (LSB) substitution method, utilizing LSBs and intermediate LSB planes. Furthermore, the cover image and its planes are rotated at different angles using a secret key prior to embedding, deceiving the attacker during data extraction. The usage of message blocks division, TLEA, image scrambling, and the cyclic18 LSB method results in an advanced security system, maintaining the visual transparency of resultant images and increasing the security of embedded data. In addition, employing various secret keys for image scrambling, data encryption, and data hiding using the cyclic18 LSB method makes the data recovery comparatively more challenging for attackers. Experimental results not only validate the effectiveness of the proposed framework in terms of visual quality and security compared to other state-of-the-art methods, but also suggest its feasibility for secure transmission of diagnostically important keyframes to healthcare centers and gastroenterologists during wireless capsule endoscopy.

  9. Multi-floor cascading ferroelectric nanostructures: multiple data writing-based multi-level non-volatile memory devices

    Science.gov (United States)

    Hyun, Seung; Kwon, Owoong; Lee, Bom-Yi; Seol, Daehee; Park, Beomjin; Lee, Jae Yong; Lee, Ju Hyun; Kim, Yunseok; Kim, Jin Kon

    2016-01-01

    Multiple data writing-based multi-level non-volatile memory has gained strong attention for next-generation memory devices to quickly accommodate an extremely large number of data bits because it is capable of storing multiple data bits in a single memory cell at once. However, all previously reported devices have failed to store a large number of data bits due to the macroscale cell size and have not allowed fast access to the stored data due to slow single data writing. Here, we introduce a novel three-dimensional multi-floor cascading polymeric ferroelectric nanostructure, successfully operating as an individual cell. In one cell, each floor has its own piezoresponse and the piezoresponse of one floor can be modulated by the bias voltage applied to the other floor, which means simultaneously written data bits in both floors can be identified. This could achieve multi-level memory through a multiple data writing process.Multiple data writing-based multi-level non-volatile memory has gained strong attention for next-generation memory devices to quickly accommodate an extremely large number of data bits because it is capable of storing multiple data bits in a single memory cell at once. However, all previously reported devices have failed to store a large number of data bits due to the macroscale cell size and have not allowed fast access to the stored data due to slow single data writing. Here, we introduce a novel three-dimensional multi-floor cascading polymeric ferroelectric nanostructure, successfully operating as an individual cell. In one cell, each floor has its own piezoresponse and the piezoresponse of one floor can be modulated by the bias voltage applied to the other floor, which means simultaneously written data bits in both floors can be identified. This could achieve multi-level memory through a multiple data writing process. Electronic supplementary information (ESI) available. See DOI: 10.1039/c5nr07377d

  10. A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS.

    Science.gov (United States)

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2015-09-01

    The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way hash function, we show that their scheme has several security pitfalls and design flaws, such as (1) it fails to protect privileged-insider attack, (2) it fails to protect strong replay attack, (3) it fails to protect strong man-in-the-middle attack, (4) it has design flaw in user registration phase, (5) it has design flaw in login phase, (6) it has design flaw in password change phase, (7) it lacks of supporting biometric update phase, and (8) it has flaws in formal security analysis. In order to withstand these security pitfalls and design flaws, we aim to propose a secure and robust user authenticated key agreement scheme for the hierarchical multi-server environment suitable in TMIS using the cryptographic one-way hash function and fuzzy extractor. Through the rigorous security analysis including the formal security analysis using the widely-accepted Burrows-Abadi-Needham (BAN) logic, the formal security analysis under the random oracle model and the informal security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme using the most-widely accepted and used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The simulation results show that our scheme is also secure. Our scheme is more efficient in computation and communication as compared to Amin-Biswas's scheme and other related schemes. In addition, our scheme supports extra functionality features as compared to

  11. Baseline adiponectin levels do not influence the response to pioglitazone in ACT NOW.

    Science.gov (United States)

    Tripathy, Devjit; Clement, Stephen C; Schwenke, Dawn C; Banerji, MaryAnn; Bray, George A; Buchanan, Thomas A; Gastaldelli, Amalia; Henry, Robert R; Kitabchi, Abbas E; Mudaliar, Sunder; Ratner, Robert E; Stentz, Frankie B; Musi, Nicolas; Reaven, Peter D; DeFronzo, Ralph A

    2014-06-01

    Plasma adiponectin levels are reduced in type 2 diabetes mellitus (T2DM) and other insulin-resistant states. We examined whether plasma adiponectin levels at baseline and after pioglitazone treatment in impaired glucose tolerance (IGT) subjects were associated with improved insulin sensitivity (SI) and glucose tolerance status. A total of 602 high-risk IGT subjects in ACT NOW were randomized to receive pioglitazone or placebo with a median follow-up of 2.4 years. Pioglitazone reduced IGT conversion to diabetes by 72% in association with improved β-cell function by 64% (insulin secretion/insulin resistance index) and increased tissue sensitivity by 88% (Matsuda index). In pioglitazone-treated subjects, plasma adiponectin concentration increased threefold from 13 ± 0.5 to 38 ± 2.5 μg/mL (P < 0.001) and was strongly correlated with the improvement in SI (r = 0.436, P < 0.001) and modestly correlated with glucose area under the curve during oral glucose tolerance test (r = 0.238, P < 0.005) and insulin secretion/insulin resistance index (r = 0.306, P < 0.005). The increase in adiponectin was a strong predictor of reversion to normal glucose tolerance and prevention of T2DM. In the placebo group, plasma adiponectin did not change and was not correlated with changes in glucose levels. There was an inverse association between baseline plasma adiponectin concentration and progression to diabetes in the placebo group but not in the pioglitazone group. Baseline adiponectin does not predict the response to pioglitazone. The increase in plasma adiponectin concentration after pioglitazone therapy in IGT subjects is strongly related to improved glucose tolerance status and enhanced tissue sensitivity to insulin. © 2014 by the American Diabetes Association.

  12. A collision dynamics model of a multi-level train

    Science.gov (United States)

    2006-11-05

    In train collisions, multi-level rail passenger vehicles can deform in modes that are different from the behavior of single level cars. The deformation in single level cars usually occurs at the front end during a collision. In one particular inciden...

  13. Substantiating the Target Level of Economic Security of Transport Enterprises and the Instrumentarium for Its Provision

    Directory of Open Access Journals (Sweden)

    Lebedko Sergiy A.

    2017-10-01

    Full Text Available The article is aimed at substantiating the methodology for assessing the economic security of transport enterprises, determining the target level and the instrumentarium for its provision. The proposed methodical approach to the assessment of the level of economic security of transport enterprises includes the determination of the level of counteracting threats and is based on the principles of integral estimation. The formed integrated indicator includes both indicators of counteracting the internal (human, managerial and technological, force majeure, financial and external threats (market, stakeholder, power-based, natural, infrastructural. Each measure of counteracting threats is determined by results of assessment of dynamics of the three indicators. A practical testing of the proposed approach is carried out in the case of transport enterprises. Based on the established equation of the regression relationship between the level of economic security and the financial strength, a target level of economic security of transport enterprises has been substantiated. The instrumentarium to provide a targeted level of economic security according to the threat types, including preventive and reactive measures, has been developed.

  14. Cloud Computing Security: A Survey

    Directory of Open Access Journals (Sweden)

    Issa M. Khalil

    2014-02-01

    Full Text Available Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, create new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for traditional computing systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide a comprehensive study of cloud computing security and privacy concerns. We identify cloud vulnerabilities, classify known security threats and attacks, and present the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks. Additionally, we investigate and identify the limitations of the current solutions and provide insights of the future security perspectives. Finally, we provide a cloud security framework in which we present the various lines of defense and identify the dependency levels among them. We identify 28 cloud security threats which we classify into five categories. We also present nine general cloud attacks along with various attack incidents, and provide effectiveness analysis of the proposed countermeasures.

  15. Dual-Level Material and Psychological Assessment of Urban Water Security in a Water-Stressed Coastal City

    Directory of Open Access Journals (Sweden)

    Yajing Huang

    2015-04-01

    Full Text Available The acceleration of urbanization and industrialization has been gradually aggravating water security issues, such as water shortages, water pollution, and flooding or drought disasters and so on. Water security issues have become a great challenge to urban sustainable development. In this context, we proposed a dual-level material and psychological assessment method to assess urban water security. Psychological security coefficients were introduced in this method to combine material security and residents’ security feelings. A typical water-stressed coastal city in China (Dalian was chosen as a case study. The water security status of Dalian from 2010 to 2012 was analysed dynamically. The results indicated that the Dalian water security statuses from 2010 to 2012 were basically secure, but solutions to improve water security status and solve water resource problems are still required. This dual-level material and psychological assessment for urban water security has improved conventional material assessment through the introduction of psychological security coefficients, which can benefit decision-making for urban water planning, management and protection.

  16. National-Level Multi-Hazard Risk Assessments in Sub-Saharan Africa

    Science.gov (United States)

    Murnane, R. J.; Balog, S.; Fraser, S. A.; Jongman, B.; Van Ledden, M.; Phillips, E.; Simpson, A.

    2017-12-01

    National-level risk assessments can provide important baseline information for decision-making on risk management and risk financing strategies. In this study, multi-hazard risk assessments were undertaken for 9 countries in Sub-Saharan Africa: Cape Verde, Ethiopia, Kenya, Niger, Malawi, Mali, Mozambique, Senegal and Uganda. The assessment was part of the Building Disaster Resilience in Sub-Saharan Africa Program and aimed at supporting the development of multi-risk financing strategies to help African countries make informed decisions to mitigate the socio-economic, fiscal and financial impacts of disasters. The assessments considered hazards and exposures consistent with the years 2010 and 2050. We worked with multiple firms to develop the hazard, exposure and vulnerability data and the risk results. The hazards include: coastal flood, drought, earthquake, landslide, riverine flood, tropical cyclone wind and storm surge, and volcanoes. For hazards expected to vary with climate, the 2050 hazard is based on the IPCC RCP 6.0. Geolocated exposure data for 2010 and 2050 at a 15 arc second ( 0.5 km) resolution includes: structures as a function of seven development patterns; transportation networks including roads, bridges, tunnels and rail; critical facilities such as schools, hospitals, energy facilities and government buildings; crops; population; and, gross domestic product (GDP). The 2050 exposure values for population are based on the IPCC SSP 2. Values for other exposure data are a function of population change. Vulnerability was based on openly available vulnerability functions. Losses were based on replacement values (e.g., cost/m2 or cost/km). Risk results are provided in terms of annual average loss and a variety of return periods at the national and Admin 1 levels. Assessments of recent historical events are used to validate the model results. In the future, it would be useful to use hazard footprints of historical events for validation purposes. The

  17. High-Level software requirements specification for the TWRS controlled baseline database system

    International Nuclear Information System (INIS)

    Spencer, S.G.

    1998-01-01

    This Software Requirements Specification (SRS) is an as-built document that presents the Tank Waste Remediation System (TWRS) Controlled Baseline Database (TCBD) in its current state. It was originally known as the Performance Measurement Control System (PMCS). Conversion to the new system name has not occurred within the current production system. Therefore, for simplicity, all references to TCBD are equivalent to PMCS references. This SRS will reference the PMCS designator from this point forward to capture the as-built SRS. This SRS is written at a high-level and is intended to provide the design basis for the PMCS. The PMCS was first released as the electronic data repository for cost, schedule, and technical administrative baseline information for the TAAS Program. During its initial development, the PMCS was accepted by the customer, TARS Business Management, with no formal documentation to capture the initial requirements

  18. Relationship of Baseline Hemoglobin Level with Serum Ferritin, Postphlebotomy Hemoglobin Changes, and Phlebotomy Requirements among HFE C282Y Homozygotes

    Directory of Open Access Journals (Sweden)

    Seyed Ali Mousavi

    2015-01-01

    Full Text Available Objectives. We aimed to examine whether baseline hemoglobin levels in C282Y-homozygous patients are related to the degree of serum ferritin (SF elevation and whether patients with different baseline hemoglobin have different phlebotomy requirements. Methods. A total of 196 patients (124 males and 72 females who had undergone therapeutic phlebotomy and had SF and both pre- and posttreatment hemoglobin values were included in the study. Results. Bivariate correlation analysis suggested that baseline SF explains approximately 6 to 7% of the variation in baseline hemoglobin. The results also showed that males who had higher (≥150 g/L baseline hemoglobin levels had a significantly greater reduction in their posttreatment hemoglobin despite requiring fewer phlebotomies to achieve iron depletion than those who had lower (<150 g/L baseline hemoglobin, regardless of whether baseline SF was below or above 1000 µg/L. There were no significant differences between hemoglobin subgroups regarding baseline and treatment characteristics, except for transferrin saturation between male subgroups with SF above 1000 µg/L. Similar differences were observed when females with higher (≥138 g/L baseline hemoglobin were compared with those with lower (<138 g/L baseline hemoglobin. Conclusion. Dividing C282Y-homozygous patients into just two subgroups according to the degree of baseline SF elevation may obscure important subgroup variations.

  19. Relationship of Baseline Hemoglobin Level with Serum Ferritin, Postphlebotomy Hemoglobin Changes, and Phlebotomy Requirements among HFE C282Y Homozygotes

    Science.gov (United States)

    Mousavi, Seyed Ali; Mahmood, Faiza; Aandahl, Astrid; Knutsen, Teresa Risopatron; Llohn, Abid Hussain

    2015-01-01

    Objectives. We aimed to examine whether baseline hemoglobin levels in C282Y-homozygous patients are related to the degree of serum ferritin (SF) elevation and whether patients with different baseline hemoglobin have different phlebotomy requirements. Methods. A total of 196 patients (124 males and 72 females) who had undergone therapeutic phlebotomy and had SF and both pre- and posttreatment hemoglobin values were included in the study. Results. Bivariate correlation analysis suggested that baseline SF explains approximately 6 to 7% of the variation in baseline hemoglobin. The results also showed that males who had higher (≥150 g/L) baseline hemoglobin levels had a significantly greater reduction in their posttreatment hemoglobin despite requiring fewer phlebotomies to achieve iron depletion than those who had lower (baseline hemoglobin, regardless of whether baseline SF was below or above 1000 µg/L. There were no significant differences between hemoglobin subgroups regarding baseline and treatment characteristics, except for transferrin saturation between male subgroups with SF above 1000 µg/L. Similar differences were observed when females with higher (≥138 g/L) baseline hemoglobin were compared with those with lower (baseline hemoglobin. Conclusion. Dividing C282Y-homozygous patients into just two subgroups according to the degree of baseline SF elevation may obscure important subgroup variations. PMID:26380265

  20. Enhancing Security by System-Level Virtualization in Cloud Computing Environments

    Science.gov (United States)

    Sun, Dawei; Chang, Guiran; Tan, Chunguang; Wang, Xingwei

    Many trends are opening up the era of cloud computing, which will reshape the IT industry. Virtualization techniques have become an indispensable ingredient for almost all cloud computing system. By the virtual environments, cloud provider is able to run varieties of operating systems as needed by each cloud user. Virtualization can improve reliability, security, and availability of applications by using consolidation, isolation, and fault tolerance. In addition, it is possible to balance the workloads by using live migration techniques. In this paper, the definition of cloud computing is given; and then the service and deployment models are introduced. An analysis of security issues and challenges in implementation of cloud computing is identified. Moreover, a system-level virtualization case is established to enhance the security of cloud computing environments.

  1. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  2. High titers of both rheumatoid factor and anti-CCP antibodies at baseline in patients with rheumatoid arthritis are associated with increased circulating baseline TNF level, low drug levels, and reduced clinical responses: a post hoc analysis of the RISING study.

    Science.gov (United States)

    Takeuchi, Tsutomu; Miyasaka, Nobuyuki; Inui, Takashi; Yano, Toshiro; Yoshinari, Toru; Abe, Tohru; Koike, Takao

    2017-09-02

    Although both rheumatoid factor (RF) and anticyclic citrullinated peptide antibodies (anti-CCP) are useful for diagnosing rheumatoid arthritis (RA), the impact of these autoantibodies on the efficacy of tumor necrosis factor (TNF) inhibitors has been controversial. The aim of this post hoc analysis of a randomized double-blind study (the RISING study) was to investigate the influences of RF and anti-CCP on the clinical response to infliximab in patients with RA. Methotrexate-refractory patients with RA received 3 mg/kg of infliximab from weeks 0 to 6 and then 3, 6, or 10 mg/kg every 8 weeks from weeks 14 to 46. In this post hoc analysis, patients were stratified into three classes on the basis of baseline RF/anti-CCP titers: "low/low-C" (RF < 55 IU/ml, anti-CCP < 42 U/ml), "high/high-C" (RF ≥ 160 IU/ml, anti-CCP ≥ 100 U/ml), and "middle-C" (neither low/low-C nor high/high-C). Baseline plasma TNF level, serum infliximab level, and disease activity were compared between the three classes. Baseline RF and anti-CCP titers showed significant correlations with baseline TNF and infliximab levels in weeks 2-14. Comparison of the three classes showed that baseline TNF level was lowest in the low/low-C group and highest in the high/high-C group (median 0.73 versus 1.15 pg/ml), that infliximab levels at week 14 were highest in the low/low-C group and lowest in the high/high-C group (median 1.0 versus 0.1 μg/ml), and that Disease Activity Score in 28 joints based on C-reactive protein at week 14 was lowest in the low/low-C group and highest in the high/high-C group (median 3.17 versus 3.82). A similar correlation was observed at week 54 in the 3 mg/kg dosing group, but not in the 6 or 10 mg/kg group. Significant decreases in both RF and anti-CCP were observed during infliximab treatment. RF/anti-CCP titers correlated with TNF level. This might explain the association of RF/anti-CCP with infliximab level and clinical response in patients with RA

  3. The impact of aviation checkpoint queues on optimizing security screening effectiveness

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Adrian J., E-mail: ajlee@citeri.or [Central Illinois Technology and Education Research Institute, 2312 Connie Drive, Springfield, IL 62704-8722 (United States); Jacobson, Sheldon H., E-mail: shj@illinois.ed [Department of Computer Science, University of Illinois at Urbana-Champaign, 201 N. Goodwin Ave. M/C 258, Urbana, IL 61801-2302 (United States)

    2011-08-15

    Passenger screening at aviation security checkpoints is a critical component in protecting airports and aircraft from terrorist threats. Recent developments in screening device technology have increased the ability to detect these threats; however, the average amount of time it takes to screen a passenger still remains a concern. This paper models the queueing process for a multi-level airport checkpoint security system, where multiple security classes are formed through subsets of specialized screening devices. An optimal static assignment policy is obtained which minimizes the steady-state expected amount of time a passenger spends in the security system. Then, an optimal dynamic assignment policy is obtained through a transient analysis that balances the expected number of true alarms with the expected amount of time a passenger spends in the security system. Performance of a two-class system is compared to that of a selective security system containing primary and secondary levels of screening. The key contribution is that the resulting optimal assignment policies increase security and passenger throughput by efficiently and effectively utilizing available screening resources.

  4. The impact of aviation checkpoint queues on optimizing security screening effectiveness

    International Nuclear Information System (INIS)

    Lee, Adrian J.; Jacobson, Sheldon H.

    2011-01-01

    Passenger screening at aviation security checkpoints is a critical component in protecting airports and aircraft from terrorist threats. Recent developments in screening device technology have increased the ability to detect these threats; however, the average amount of time it takes to screen a passenger still remains a concern. This paper models the queueing process for a multi-level airport checkpoint security system, where multiple security classes are formed through subsets of specialized screening devices. An optimal static assignment policy is obtained which minimizes the steady-state expected amount of time a passenger spends in the security system. Then, an optimal dynamic assignment policy is obtained through a transient analysis that balances the expected number of true alarms with the expected amount of time a passenger spends in the security system. Performance of a two-class system is compared to that of a selective security system containing primary and secondary levels of screening. The key contribution is that the resulting optimal assignment policies increase security and passenger throughput by efficiently and effectively utilizing available screening resources.

  5. Commercial Building Energy Baseline Modeling Software: Performance Metrics and Method Testing with Open Source Models and Implications for Proprietary Software Testing

    Energy Technology Data Exchange (ETDEWEB)

    Price, Phillip N.; Granderson, Jessica; Sohn, Michael; Addy, Nathan; Jump, David

    2013-09-01

    The overarching goal of this work is to advance the capabilities of technology evaluators in evaluating the building-level baseline modeling capabilities of Energy Management and Information System (EMIS) software. Through their customer engagement platforms and products, EMIS software products have the potential to produce whole-building energy savings through multiple strategies: building system operation improvements, equipment efficiency upgrades and replacements, and inducement of behavioral change among the occupants and operations personnel. Some offerings may also automate the quantification of whole-building energy savings, relative to a baseline period, using empirical models that relate energy consumption to key influencing parameters, such as ambient weather conditions and building operation schedule. These automated baseline models can be used to streamline the whole-building measurement and verification (M&V) process, and therefore are of critical importance in the context of multi-measure whole-building focused utility efficiency programs. This report documents the findings of a study that was conducted to begin answering critical questions regarding quantification of savings at the whole-building level, and the use of automated and commercial software tools. To evaluate the modeling capabilities of EMIS software particular to the use case of whole-building savings estimation, four research questions were addressed: 1. What is a general methodology that can be used to evaluate baseline model performance, both in terms of a) overall robustness, and b) relative to other models? 2. How can that general methodology be applied to evaluate proprietary models that are embedded in commercial EMIS tools? How might one handle practical issues associated with data security, intellectual property, appropriate testing ‘blinds’, and large data sets? 3. How can buildings be pre-screened to identify those that are the most model-predictable, and therefore those

  6. Multi-Level and Multi-Scale Feature Aggregation Using Pretrained Convolutional Neural Networks for Music Auto-Tagging

    Science.gov (United States)

    Lee, Jongpil; Nam, Juhan

    2017-08-01

    Music auto-tagging is often handled in a similar manner to image classification by regarding the 2D audio spectrogram as image data. However, music auto-tagging is distinguished from image classification in that the tags are highly diverse and have different levels of abstractions. Considering this issue, we propose a convolutional neural networks (CNN)-based architecture that embraces multi-level and multi-scaled features. The architecture is trained in three steps. First, we conduct supervised feature learning to capture local audio features using a set of CNNs with different input sizes. Second, we extract audio features from each layer of the pre-trained convolutional networks separately and aggregate them altogether given a long audio clip. Finally, we put them into fully-connected networks and make final predictions of the tags. Our experiments show that using the combination of multi-level and multi-scale features is highly effective in music auto-tagging and the proposed method outperforms previous state-of-the-arts on the MagnaTagATune dataset and the Million Song Dataset. We further show that the proposed architecture is useful in transfer learning.

  7. Collaborative-Hybrid Multi-Layer Network Control for Emerging Cyber-Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Lehman, Tom [USC; Ghani, Nasir [UNM; Boyd, Eric [UCAID

    2010-08-31

    At a high level, there were four basic task areas identified for the Hybrid-MLN project. They are: o Multi-Layer, Multi-Domain, Control Plane Architecture and Implementation, including OSCARS layer2 and InterDomain Adaptation, Integration of LambdaStation and Terapaths with Layer2 dynamic provisioning, Control plane software release, Scheduling, AAA, security architecture, Network Virtualization architecture, Multi-Layer Network Architecture Framework Definition; o Heterogeneous DataPlane Testing; o Simulation; o Project Publications, Reports, and Presentations.

  8. A comparison of baseline methodologies for 'Reducing Emissions from Deforestation and Degradation'

    Directory of Open Access Journals (Sweden)

    Kok Kasper

    2009-07-01

    Full Text Available Abstract Background A mechanism for emission reductions from deforestation and degradation (REDD is very likely to be included in a future climate agreement. The choice of REDD baseline methodologies will crucially influence the environmental and economic effectiveness of the climate regime. We compare three different historical baseline methods and one innovative dynamic model baseline approach to appraise their applicability under a future REDD policy framework using a weighted multi-criteria analysis. Results The results show that each baseline method has its specific strengths and weaknesses. Although the dynamic model allows for the best environmental and for comparatively good economic performance, its high demand for data and technical capacity limit the current applicability in many developing countries. Conclusion The adoption of a multi-tier approach will allow countries to select the baseline method best suiting their specific capabilities and data availability while simultaneously ensuring scientific transparency, environmental effectiveness and broad political support.

  9. Baseline process description for simulating plutonium oxide production for precalc project

    Energy Technology Data Exchange (ETDEWEB)

    Pike, J. A. [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL)

    2017-10-26

    Savannah River National Laboratory (SRNL) started a multi-year project, the PreCalc Project, to develop a computational simulation of a plutonium oxide (PuO2) production facility with the objective to study the fundamental relationships between morphological and physicochemical properties. This report provides a detailed baseline process description to be used by SRNL personnel and collaborators to facilitate the initial design and construction of the simulation. The PreCalc Project team selected the HB-Line Plutonium Finishing Facility as the basis for a nominal baseline process since the facility is operational and significant model validation data can be obtained. The process boundary as well as process and facility design details necessary for multi-scale, multi-physics models are provided.

  10. The Water Security Hydra

    Science.gov (United States)

    Lall, U.

    2017-12-01

    As the editor of a new journal on water security, I have been pondering what it can mean theoretically and practically. At one level, it is pretty aobvious that it refers to the ability to affordably and reliably access water of appropriate quality, and to be protected from the water related ravages of nature, such as floods, droughts and water borne disease. The concept of water security can apply to a family, a company, a state or globally. Of course, since we value the environment, water security embraces the needs of the environment. Where, we consider economic development or energy production, water security also emerges as a critical factor. So, in short it touches almost all things about water that pertain to our lives. New stresses are created by a changing climate, growing populations and an ever changing society, economic activity and environment. Thus, if assuring water security is a goal at any of the scales of interest, many factors need to be considered, and what can really be assured, where and for how long emerges as an interesting question. Local (place, time, individuals, politics) as well as global (climate, economics, hydrology) factors interact to determine outcomes, not all of which are readily mapped in our mathematical or cognitive models to a functional notion of what constitutes security in the face of changing conditions and actors. Further, assurance implies going beyond characterization to developing actions, responses to stressors and risk mitigation strategies. How these perform in the short and long run, and what are the outcomes and strategies for impact mitigation in the event of failure then determines water security. Recognizing that providing assurance of water security has always been the goal of water management, regulation and development, perhaps the challenge is to understand what this means from the perspective of not just the "water managers" but the individuals who are the unwitting beneficiaries, or the instruments for

  11. Video calls from lay bystanders to dispatch centers - risk assessment of information security.

    Science.gov (United States)

    Bolle, Stein R; Hasvold, Per; Henriksen, Eva

    2011-09-30

    Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers.

  12. NATO-EU PARTNERSHIP: FOSTERING RESILIENCE FOR A COOPERATIVE SECURITY SPACE

    Directory of Open Access Journals (Sweden)

    Octavia MOISE

    2017-12-01

    Full Text Available Present events indicate an encompassing process of multi-level changes - political, military, economic, and technological that highlights the idea that we are going through a phase of transition at systemic level that is redesigning the structure of power of the 21st century. This paper will try to find out first if the cooperative security concept can be seen as a security theory according to Baldwin’s criteria and second if NATO’s partnership policy in general and the NATO EU partnership in particular can foster resilience. The objectives of this article are to envisage the role of the NATO-EU partnership in the future by: reviewing the theoretical approaches on cooperative security, analysing NATO’s partnership policy, analysing the ability of NATO-EU partnership to foster resilience.

  13. THz and Security Applications

    CERN Document Server

    Sizov, Fedir; Detectors, Sources and Associated Electronics for THz Applications

    2014-01-01

    These proceedings comprise invited papers from highly experienced researchers in THz technology and security applications. THz detection of explosives represents one of the most appealing technologies to have recently emerged in dealing with terrorist attacks encountered by civil security and military forces throughout the world. Discussed are the most advanced technologies and developments, the various points of operational strength and weaknesses as well as are suggestions and predictions the best technological solutions to  overcome current operational limits.  The current status of various levels of cooling in THz detectors, sources and associated electronics are also addressed. The goal was to provide a clear view on the current technologies available and the required advances needed in order to achieve more efficient systems. This goal was outlined in part by establishing the baseline of current uncertainty estimations in physics-based modelling and the identification of key areas which require additi...

  14. Exercising Synergy of Safeguards Safety and Security at Facility Level of the GA Siwabessy Multi-Purpose Reactor, Indonesia

    International Nuclear Information System (INIS)

    Susilowati, E.

    2015-01-01

    Safeguards, safety and security (3Ss) constitute as essential elements for successful development of nuclear technology in the life time of nuclear installation. All 3Ss need to be coordinated due workers, the public and the environment require protection from plant malfunction, human error, malicious acts and proliferation of nuclear materials and technologies. Then the importance of the 3Ss was deemed valuable, particularly to a country having willingness to expand to nuclear power reactor such as Indonesia that in the near future plans to build small experimental power reactor. This paper is aimed to discuss synergy among safeguards, safety and security which will have opportunity been exercising at the GA Siwabessy Reactor (RSG-GAS), Indonesia. Synergy among safeguards, safety and security offers much opportunity for cost savings and enhance efficiency. Discussion is carried out by first investigating common values and conflicts exist among 3S. Up to now each of them was accomplished separately by different division and using different equipment due lack of coordination among them. The objective of this exercise is to develop more efficient and effective 3Ss infrastructures and also to support skill and knowledge of human resources. Benefitting from synergy between safeguards and security such as management of nuclear material and non proliferation; safeguards and safety such as management of nuclear material and waste management; safety and security such as prevent radiological release and also tension among them if any are discussed. It is expected that outcome of this exercise will able to develop a role model of infrastructures to the up-coming small experimental power reactor in Indonesia. (author)

  15. Multi-level analysis in information systems research: the case of enterprise resource planning system usage in China

    Science.gov (United States)

    Sun, Yuan; Bhattacherjee, Anol

    2011-11-01

    Information technology (IT) usage within organisations is a multi-level phenomenon that is influenced by individual-level and organisational-level variables. Yet, current theories, such as the unified theory of acceptance and use of technology, describe IT usage as solely an individual-level phenomenon. This article postulates a model of organisational IT usage that integrates salient organisational-level variables such as user training, top management support and technical support within an individual-level model to postulate a multi-level model of IT usage. The multi-level model was then empirically validated using multi-level data collected from 128 end users and 26 managers in 26 firms in China regarding their use of enterprise resource planning systems and analysed using the multi-level structural equation modelling (MSEM) technique. We demonstrate the utility of MSEM analysis of multi-level data relative to the more common structural equation modelling analysis of single-level data and show how single-level data can be aggregated to approximate multi-level analysis when multi-level data collection is not possible. We hope that this article will motivate future scholars to employ multi-level data and multi-level analysis for understanding organisational phenomena that are truly multi-level in nature.

  16. MetricForensics: A Multi-Level Approach for Mining Volatile Graphs

    Energy Technology Data Exchange (ETDEWEB)

    Henderson, Keith [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Eliassi-Rad, Tina [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Faloutsos, Christos [Carnegie Mellon Univ., Pittsburgh, PA (United States); Akoglu, Leman [Carnegie Mellon Univ., Pittsburgh, PA (United States); Li, Lei [Carnegie Mellon Univ., Pittsburgh, PA (United States); Maruhashi, Koji [Fujitsu Laboratories Ltd., Kanagawa (Japan); Prakash, B. Aditya [Carnegie Mellon Univ., Pittsburgh, PA (United States); Tong, H [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2010-02-08

    Advances in data collection and storage capacity have made it increasingly possible to collect highly volatile graph data for analysis. Existing graph analysis techniques are not appropriate for such data, especially in cases where streaming or near-real-time results are required. An example that has drawn significant research interest is the cyber-security domain, where internet communication traces are collected and real-time discovery of events, behaviors, patterns and anomalies is desired. We propose MetricForensics, a scalable framework for analysis of volatile graphs. MetricForensics combines a multi-level “drill down" approach, a collection of user-selected graph metrics and a collection of analysis techniques. At each successive level, more sophisticated metrics are computed and the graph is viewed at a finer temporal resolution. In this way, MetricForensics scales to highly volatile graphs by only allocating resources for computationally expensive analysis when an interesting event is discovered at a coarser resolution first. We test MetricForensics on three real-world graphs: an enterprise IP trace, a trace of legitimate and malicious network traffic from a research institution, and the MIT Reality Mining proximity sensor data. Our largest graph has »3M vertices and »32M edges, spanning 4:5 days. The results demonstrate the scalability and capability of MetricForensics in analyzing volatile graphs; and highlight four novel phenomena in such graphs: elbows, broken correlations, prolonged spikes, and strange stars.

  17. Approaches to assign security levels for radioactive substances and radiation sources

    International Nuclear Information System (INIS)

    Ivanov, M.V.; Petrovskij, N.P.; Pinchuk, G.N.; Telkov, S.N.; Kuzin, V.V.

    2011-01-01

    The article contains analyzed provisions on categorization of radioactive substances and radiation sources according to the extent of their potential danger. Above provisions are used in the IAEA documents and in Russian regulatory documents for differentiation of regulatory requirements to physical security. It is demonstrated that with the account of possible threats of violators, rules of physical protection of radiation sources and radioactive substances should be amended as regards the approaches to assign their categories and security levels [ru

  18. Windows Server 2012 vulnerabilities and security

    Directory of Open Access Journals (Sweden)

    Gabriel R. López

    2015-09-01

    Full Text Available This investigation analyses the history of the vulnerabilities of the base system Windows Server 2012 highlighting the most critic vulnerabilities given every 4 months since its creation until the current date of the research. It was organized by the type of vulnerabilities based on the classification of the NIST. Next, given the official vulnerabilities of the system, the authors show how a critical vulnerability is treated by Microsoft in order to countermeasure the security flaw. Then, the authors present the recommended security approaches for Windows Server 2012, which focus on the baseline software given by Microsoft, update, patch and change management, hardening practices and the application of Active Directory Rights Management Services (AD RMS. AD RMS is considered as an important feature since it is able to protect the system even though it is compromised using access lists at a document level. Finally, the investigation of the state of the art related to the security of Windows Server 2012 shows an analysis of solutions given by third parties vendors, which offer security products to secure the base system objective of this study. The recommended solution given by the authors present the security vendor Symantec with its successful features and also characteristics that the authors considered that may have to be improved in future versions of the security solution.

  19. Establishing a store baseline during interim storage of waste packages and a review of potential technologies for base-lining

    Energy Technology Data Exchange (ETDEWEB)

    McTeer, Jennifer; Morris, Jenny; Wickham, Stephen [Galson Sciences Ltd. Oakham, Rutland (United Kingdom); Bolton, Gary [National Nuclear Laboratory Risley, Warrington (United Kingdom); McKinney, James; Morris, Darrell [Nuclear Decommissioning Authority Moor Row, Cumbria (United Kingdom); Angus, Mike [National Nuclear Laboratory Risley, Warrington (United Kingdom); Cann, Gavin; Binks, Tracey [National Nuclear Laboratory Sellafield (United Kingdom)

    2013-07-01

    Interim storage is an essential component of the waste management lifecycle, providing a safe, secure environment for waste packages awaiting final disposal. In order to be able to monitor and detect change or degradation of the waste packages, storage building or equipment, it is necessary to know the original condition of these components (the 'waste storage system'). This paper presents an approach to establishing the baseline for a waste-storage system, and provides guidance on the selection and implementation of potential base-lining technologies. The approach is made up of two sections; assessment of base-lining needs and definition of base-lining approach. During the assessment of base-lining needs a review of available monitoring data and store/package records should be undertaken (if the store is operational). Evolutionary processes (affecting safety functions), and their corresponding indicators, that can be measured to provide a baseline for the waste-storage system should then be identified in order for the most suitable indicators to be selected for base-lining. In defining the approach, identification of opportunities to collect data and constraints is undertaken before selecting the techniques for base-lining and developing a base-lining plan. Base-lining data may be used to establish that the state of the packages is consistent with the waste acceptance criteria for the storage facility and to support the interpretation of monitoring and inspection data collected during store operations. Opportunities and constraints are identified for different store and package types. Technologies that could potentially be used to measure baseline indicators are also reviewed. (authors)

  20. Tile-Level Annotation of Satellite Images Using Multi-Level Max-Margin Discriminative Random Field

    Directory of Open Access Journals (Sweden)

    Hong Sun

    2013-05-01

    Full Text Available This paper proposes a multi-level max-margin discriminative analysis (M3DA framework, which takes both coarse and fine semantics into consideration, for the annotation of high-resolution satellite images. In order to generate more discriminative topic-level features, the M3DA uses the maximum entropy discrimination latent Dirichlet Allocation (MedLDA model. Moreover, for improving the spatial coherence of visual words neglected by M3DA, conditional random field (CRF is employed to optimize the soft label field composed of multiple label posteriors. The framework of M3DA enables one to combine word-level features (generated by support vector machines and topic-level features (generated by MedLDA via the bag-of-words representation. The experimental results on high-resolution satellite images have demonstrated that, using the proposed method can not only obtain suitable semantic interpretation, but also improve the annotation performance by taking into account the multi-level semantics and the contextual information.

  1. Approach to estimation of level of information security at enterprise based on genetic algorithm

    Science.gov (United States)

    V, Stepanov L.; V, Parinov A.; P, Korotkikh L.; S, Koltsov A.

    2018-05-01

    In the article, the way of formalization of different types of threats of information security and vulnerabilities of an information system of the enterprise and establishment is considered. In a type of complexity of ensuring information security of application of any new organized system, the concept and decisions in the sphere of information security are expedient. One of such approaches is the method of a genetic algorithm. For the enterprises of any fields of activity, the question of complex estimation of the level of security of information systems taking into account the quantitative and qualitative factors characterizing components of information security is relevant.

  2. Serum trans-fatty acids level are positively associated with lower food security among american adults.

    Science.gov (United States)

    Mazidi, Mohsen; Vatanparast, Hassan

    2018-03-07

    In the current study we aimed to assess whether the food security is associated with serum trans-fatty acids (TFAs) and dietary fat. Analyses were restricted to participants (from the US National Health and Nutrition Examination Survey) with data available on serum and diet TFAs and food security status from 2009 to 2010. All statistical analyses (analysis of covariance and linear regression) accounted for the survey design and sample weights. We included 3876 participants, overall (48.6%) participants were men, and (51.4%) were women, generally (69.0%) had high food security. Subjects with higher food security had a higher level of education as well (p security (all p security. Further, age, sex, race, education, and energy intake adjusted mean of dietary fatty acids show that total polyunsaturated fatty acids are higher in subjects with higher food security (p = 0.026) while, cholesterol consumption is higher in subjects with lower food security (p = 0.039). Our findings provide more evidence on the association between food insecurity and the higher level of TFAs in serum and different type of fat in the diet.

  3. Security infrastructure for on-demand provisioned Cloud infrastructure services

    NARCIS (Netherlands)

    Demchenko, Y.; Ngo, C.; de Laat, C.; Wlodarczyk, T.W.; Rong, C.; Ziegler, W.

    2011-01-01

    Providing consistent security services in on-demand provisioned Cloud infrastructure services is of primary importance due to multi-tenant and potentially multi-provider nature of Clouds Infrastructure as a Service (IaaS) environment. Cloud security infrastructure should address two aspects of the

  4. Multi-phase flow monitoring with electrical impedance tomography using level set based method

    International Nuclear Information System (INIS)

    Liu, Dong; Khambampati, Anil Kumar; Kim, Sin; Kim, Kyung Youn

    2015-01-01

    Highlights: • LSM has been used for shape reconstruction to monitor multi-phase flow using EIT. • Multi-phase level set model for conductivity is represented by two level set functions. • LSM handles topological merging and breaking naturally during evolution process. • To reduce the computational time, a narrowband technique was applied. • Use of narrowband and optimization approach results in efficient and fast method. - Abstract: In this paper, a level set-based reconstruction scheme is applied to multi-phase flow monitoring using electrical impedance tomography (EIT). The proposed scheme involves applying a narrowband level set method to solve the inverse problem of finding the interface between the regions having different conductivity values. The multi-phase level set model for the conductivity distribution inside the domain is represented by two level set functions. The key principle of the level set-based method is to implicitly represent the shape of interface as the zero level set of higher dimensional function and then solve a set of partial differential equations. The level set-based scheme handles topological merging and breaking naturally during the evolution process. It also offers several advantages compared to traditional pixel-based approach. Level set-based method for multi-phase flow is tested with numerical and experimental data. It is found that level set-based method has better reconstruction performance when compared to pixel-based method

  5. Detecting bots using multi-level traffic analysis

    DEFF Research Database (Denmark)

    Stevanovic, Matija; Pedersen, Jens Myrup

    2016-01-01

    introduces a novel multi-level botnet detection approach that performs network traffic analysis of three protocols widely considered as the main carriers of botnet Command and Control (C&C) and attack traffic, i.e. TCP, UDP and DNS. The proposed method relies on supervised machine learning for identifying...

  6. Multi-level and Multi-component Bitmap Encoding for Efficient Search Operations

    Directory of Open Access Journals (Sweden)

    Madhu BHAN, Department of Computer Applications

    2012-12-01

    Full Text Available The growing interest in data warehousing for decision makers is becoming more and more crucial to make faster and efficient decisions. On-line decision needs short response times. Many indexing techniques have been created to achieve this goal in read only environments. Indexing technique that has attracted attention in multidimensional databases is Bitmap Indexing. The paper discusses the various existing bitmap indexing techniques along with their performance characteristics. The paper proposes two new bitmap indexing techniques in the class of multi-level and multi-component encoding schemes and prove that the two techniques have better space–time performance than some of the existing techniques used for range queries. We provide an analytical model for comparing the performance of our proposed encoding schemes with that of the existing ones.

  7. Secure Multi-Keyword Search with User/Owner-side Efficiency in the Cloud

    Directory of Open Access Journals (Sweden)

    LEE, Y.

    2016-05-01

    Full Text Available As the amount of data in the cloud grows, ranked search system, the similarity of a query to data is ranked, are of significant importance. on the other hand, to protect privacy, searchable encryption system are being actively studied. In this paper, we present a new similarity-based multi-keyword search scheme for encrypted data. This scheme provides high flexibility in the pre- and post-processing of encrypted data, including splitting stem/suffix and computing from the encrypted index-term matrix, demonstrated to support Latent Semantic Indexing(LSI. On the client side, the computation and communication costs are one to two orders of magnitude lower than those of previous methods, as demonstrated in the experimental results. we also provide a security analysis of the proposed scheme.

  8. Multi-level damage identification with response reconstruction

    Science.gov (United States)

    Zhang, Chao-Dong; Xu, You-Lin

    2017-10-01

    Damage identification through finite element (FE) model updating usually forms an inverse problem. Solving the inverse identification problem for complex civil structures is very challenging since the dimension of potential damage parameters in a complex civil structure is often very large. Aside from enormous computation efforts needed in iterative updating, the ill-condition and non-global identifiability features of the inverse problem probably hinder the realization of model updating based damage identification for large civil structures. Following a divide-and-conquer strategy, a multi-level damage identification method is proposed in this paper. The entire structure is decomposed into several manageable substructures and each substructure is further condensed as a macro element using the component mode synthesis (CMS) technique. The damage identification is performed at two levels: the first is at macro element level to locate the potentially damaged region and the second is over the suspicious substructures to further locate as well as quantify the damage severity. In each level's identification, the damage searching space over which model updating is performed is notably narrowed down, not only reducing the computation amount but also increasing the damage identifiability. Besides, the Kalman filter-based response reconstruction is performed at the second level to reconstruct the response of the suspicious substructure for exact damage quantification. Numerical studies and laboratory tests are both conducted on a simply supported overhanging steel beam for conceptual verification. The results demonstrate that the proposed multi-level damage identification via response reconstruction does improve the identification accuracy of damage localization and quantization considerably.

  9. Adjusting to Social Change - A Multi-Level Analysis in Three Cultures

    Science.gov (United States)

    2013-08-01

    example, coping may be more collective in collectivist , compared to individualist , societies (Chang & Sivam, 2004). Some cultures have a greater sense...AFRL-AFOSR-UK-TR-2013-0041 Adjusting to Social Change - A multi-level Analysis in three cultures Prof Robin Goodwin...COVERED (From – To) 23 May 2012 – 22 May 2013 4. TITLE AND SUBTITLE Adjusting to Social Change - A multi-level Analysis in three cultures

  10. Assessment on security system of radioactive sources used in hospitals of Thailand

    Energy Technology Data Exchange (ETDEWEB)

    Jitbanjong, Petchara, E-mail: petcharajit@gmail.com; Wongsawaeng, Doonyapong [Nuclear Engineering Department, Faculty of Engineering, Chulalongkorn University, 254 Phayathai Road, Pathumwan, Bangkok 10330 (Thailand)

    2016-01-22

    Unsecured radioactive sources have caused deaths and serious injuries in many parts of the world. In Thailand, there are 17 hospitals that use teletherapy with cobalt-60 radioactive sources. They need to be secured in order to prevent unauthorized removal, sabotage and terrorists from using such materials in a radiological weapon. The security system of radioactive sources in Thailand is regulated by the Office of Atoms for Peace in compliance with Global Threat Reduction Initiative (GTRI), U.S. DOE, which has started to be implemented since 2010. This study aims to perform an assessment on the security system of radioactive sources used in hospitals in Thailand and the results can be used as a recommended baseline data for development or improvement of hospitals on the security system of a radioactive source at a national regulatory level and policy level. Results from questionnaires reveal that in 11 out of 17 hospitals (64.70%), there were a few differences in conditions of hospitals using radioactive sources with installation of the security system and those without installation of the security system. Also, personals working with radioactive sources did not clearly understand the nuclear security law. Thus, government organizations should be encouraged to arrange trainings on nuclear security to increase the level of understanding. In the future, it is recommended that the responsible government organization issues a minimum requirement of nuclear security for every medical facility using radioactive sources.

  11. Assessment on security system of radioactive sources used in hospitals of Thailand

    Science.gov (United States)

    Jitbanjong, Petchara; Wongsawaeng, Doonyapong

    2016-01-01

    Unsecured radioactive sources have caused deaths and serious injuries in many parts of the world. In Thailand, there are 17 hospitals that use teletherapy with cobalt-60 radioactive sources. They need to be secured in order to prevent unauthorized removal, sabotage and terrorists from using such materials in a radiological weapon. The security system of radioactive sources in Thailand is regulated by the Office of Atoms for Peace in compliance with Global Threat Reduction Initiative (GTRI), U.S. DOE, which has started to be implemented since 2010. This study aims to perform an assessment on the security system of radioactive sources used in hospitals in Thailand and the results can be used as a recommended baseline data for development or improvement of hospitals on the security system of a radioactive source at a national regulatory level and policy level. Results from questionnaires reveal that in 11 out of 17 hospitals (64.70%), there were a few differences in conditions of hospitals using radioactive sources with installation of the security system and those without installation of the security system. Also, personals working with radioactive sources did not clearly understand the nuclear security law. Thus, government organizations should be encouraged to arrange trainings on nuclear security to increase the level of understanding. In the future, it is recommended that the responsible government organization issues a minimum requirement of nuclear security for every medical facility using radioactive sources.

  12. Assessment on security system of radioactive sources used in hospitals of Thailand

    International Nuclear Information System (INIS)

    Jitbanjong, Petchara; Wongsawaeng, Doonyapong

    2016-01-01

    Unsecured radioactive sources have caused deaths and serious injuries in many parts of the world. In Thailand, there are 17 hospitals that use teletherapy with cobalt-60 radioactive sources. They need to be secured in order to prevent unauthorized removal, sabotage and terrorists from using such materials in a radiological weapon. The security system of radioactive sources in Thailand is regulated by the Office of Atoms for Peace in compliance with Global Threat Reduction Initiative (GTRI), U.S. DOE, which has started to be implemented since 2010. This study aims to perform an assessment on the security system of radioactive sources used in hospitals in Thailand and the results can be used as a recommended baseline data for development or improvement of hospitals on the security system of a radioactive source at a national regulatory level and policy level. Results from questionnaires reveal that in 11 out of 17 hospitals (64.70%), there were a few differences in conditions of hospitals using radioactive sources with installation of the security system and those without installation of the security system. Also, personals working with radioactive sources did not clearly understand the nuclear security law. Thus, government organizations should be encouraged to arrange trainings on nuclear security to increase the level of understanding. In the future, it is recommended that the responsible government organization issues a minimum requirement of nuclear security for every medical facility using radioactive sources

  13. Selecting RMF Controls for National Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Witzke, Edward L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-08-01

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process, this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.

  14. Multi-scale transport in the DIII-D ITER baseline scenario with direct electron heating and projection to ITER

    Science.gov (United States)

    Grierson, B. A.; Staebler, G. M.; Solomon, W. M.; McKee, G. R.; Holland, C.; Austin, M.; Marinoni, A.; Schmitz, L.; Pinsker, R. I.; DIII-D Team

    2018-02-01

    Multi-scale fluctuations measured by turbulence diagnostics spanning long and short wavelength spatial scales impact energy confinement and the scale-lengths of plasma kinetic profiles in the DIII-D ITER baseline scenario with direct electron heating. Contrasting discharge phases with ECH + neutral beam injection (NBI) and NBI only at similar rotation reveal higher energy confinement and lower fluctuations when only NBI heating is used. Modeling of the core transport with TGYRO using the TGLF turbulent transport model and NEO neoclassical transport reproduces the experimental profile changes upon application of direct electron heating and indicates that multi-scale transport mechanisms are responsible for changes in the temperature and density profiles. Intermediate and high-k fluctuations appear responsible for the enhanced electron thermal flux, and intermediate-k electron modes produce an inward particle pinch that increases the inverse density scale length. Projection to ITER is performed with TGLF and indicates a density profile that has a finite scale length due to intermediate-k electron modes at low collisionality and increases the fusion gain. For a range of E × B shear, the dominant mechanism that increases fusion performance is suppression of outward low-k particle flux and increased density peaking.

  15. Correlation between hypersensitivity induced by esophageal acid infusion and the baseline impedance level in patients with suspected gastroesophageal reflux.

    Science.gov (United States)

    Seo, A Young; Shin, Cheol Min; Kim, Nayoung; Yoon, Hyuk; Park, Young Soo; Lee, Dong Ho

    2015-07-01

    To evaluate the relevance between the pH parameters and baseline impedance level or esophageal hypomotility in patients with suspected gastroesophageal reflux. The recordings of 51 patients with heartburn, acid regurgitation, globus or noncardiac chest pain were analyzed. Evaluation included a 24-h multichannel intraluminal impedance-pH test while on off-proton pump inhibitor therapy over 1 week, high-resolution manometry and Bernstein test. Mean baseline impedance level at the most distal portion of the impedance channel was assessed manually. Esophageal hypomotility was evaluated using transitional zone defect (TZD) and distal break (DB) length measurement. In the study subjects (n = 51), 6 had a DeMeester score of more than 14.7 and 14 had a positive symptom index. The Bernstein test was positive in ten patients. The baseline impedance level was inversely correlated with the acid exposure time % (r = -0.660, P reflux and weakly acid reflux time % measured by impedance monitoring showed a weak correlation with TZD + DB length (r = 0.327 and 0.324, P = 0.019 and 0.020, respectively). Although a positive Bernstein test has no relevance for the acid exposure time or acid-related symptoms as represented by the DeMeester score or symptom index, the baseline impedance level was significantly lower in patients with a positive Bernstein test than in those with a negative one (2,628.4 ± 862.7 vs. 1,752.2 ± 611.1 Ω, P = 0.004). A lower baseline impedance level is closely related to increased esophageal acid exposure. Hypersensitivity induced by esophageal acid infusion might be attributed to acid-induced mucosal changes of the esophagus.

  16. Economic Evaluation of the Information Security Levels Achieved by Electric Energy Providers in North Arctic Region

    Science.gov (United States)

    Sushko, O. P.; Kaznin, A. A.; Babkin, A. V.; Bogdanov, D. A.

    2017-10-01

    The study we are conducting involves the analysis of information security levels achieved by energy providers operating in the North Arctic Region. We look into whether the energy providers’ current information security levels meet reliability standards and determine what further actions may be needed for upgrading information security in the context of the digital transformation that the world community is undergoing. When developing the information security systems for electric energy providers or selecting the protection means for them, we are governed by the fact that the assets to be protected are process technologies. While information security risk can be assessed using different methods, the evaluation of the economic damage from these risks appears to be a difficult task. The most probable and harmful risks we have identified when evaluating the electric energy providers’ information security will be used by us as variables. To provide the evaluation, it is necessary to calculate the costs relating to elimination of the risks identified. The final stage of the study will involve the development of an operation algorithm for the North Arctic Region’s energy provider’s business information protection security system - a set of information security services, and security software and hardware.

  17. 7 CFR 3560.61 - Loan security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Loan security. 3560.61 Section 3560.61 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Direct Loan and Grant Origination § 3560.61 Loan security... collateral. (2) The amount of the loan against the collateral does not exceed its estimated security value...

  18. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  19. Background differences in baseline and stimulated MMP levels influence abdominal aortic aneurysm susceptibility

    Science.gov (United States)

    Dale, Matthew A.; Ruhlman, Melissa K.; Zhao, Shijia; Meisinger, Trevor; Gu, Linxia; Swier, Vicki J.; Agrawal, Devendra K.; Greiner, Timothy C.; Carson, Jeffrey S.; Baxter, B. Timothy; Xiong, Wanfen

    2015-01-01

    Objective Evidence has demonstrated profound influence of genetic background on cardiovascular phenotypes. Murine models in Marfan syndrome (MFS) have shown that genetic background-related variations affect thoracic aortic aneurysm formation, rupture, and lifespan of mice. MFS mice with C57Bl/6 genetic background are less susceptible to aneurysm formation compared to the 129/SvEv genetic background. In this study, we hypothesize that susceptibility to abdominal aortic aneurysm (AAA) will be increased in 129/SvEv mice versus C57Bl/6 mice. We tested this hypothesis by assessing differences in aneurysm size, tissue properties, immune response, and MMP expression. Methods Mice of C57Bl/6 or 129/SvEv background underwent AAA induction by periaortic application of CaCl2. Baseline aortic diameters, tissue properties and MMP levels were measured. After aneurysm induction, diameters, MMP expression, and immune response (macrophage infiltration and bone marrow transplantation) were measured. Results Aneurysms were larger in 129/SvEv mice than C57Bl/6 mice (83.0% ± 13.6 increase compared to 57.8% ± 6.4). The aorta was stiffer in the 129/SvEv mice compared to C57Bl/6 mice (952.5 kPa ± 93.6 versus 621.4 kPa ± 84.2). Baseline MMP-2 and post-aneurysm MMP-2 and -9 levels were higher in 129/SvEv aortas compared to C57Bl/6 aortas. Elastic lamella disruption/fragmentation and macrophage infiltration were increased in 129/SvEv mice. Myelogenous cell reversal by bone marrow transplantation did not affect aneurysm size. Conclusions These data demonstrate that 129/SvEv mice are more susceptible to AAA compared to C57Bl/6 mice. Intrinsic properties of the aorta between the two strains of mice, including baseline expression of MMP-2, influence susceptibility to AAA. PMID:26546710

  20. Multi-level programming paradigm for extreme computing

    International Nuclear Information System (INIS)

    Petiton, S.; Sato, M.; Emad, N.; Calvin, C.; Tsuji, M.; Dandouna, M.

    2013-01-01

    In order to propose a framework and programming paradigms for post peta-scale computing, on the road to exa-scale computing and beyond, we introduced new languages, associated with a hierarchical multi-level programming paradigm, allowing scientific end-users and developers to program highly hierarchical architectures designed for extreme computing. In this paper, we explain the interest of such hierarchical multi-level programming paradigm for extreme computing and its well adaptation to several large computational science applications, such as for linear algebra solvers used for reactor core physic. We describe the YML language and framework allowing describing graphs of parallel components, which may be developed using PGAS-like language such as XMP, scheduled and computed on supercomputers. Then, we propose experimentations on supercomputers (such as the 'K' and 'Hooper' ones) of the hybrid method MERAM (Multiple Explicitly Restarted Arnoldi Method) as a case study for iterative methods manipulating sparse matrices, and the block Gauss-Jordan method as a case study for direct method manipulating dense matrices. We conclude proposing evolutions for this programming paradigm. (authors)

  1. Interestingness measures and strategies for mining multi-ontology multi-level association rules from gene ontology annotations for the discovery of new GO relationships.

    Science.gov (United States)

    Manda, Prashanti; McCarthy, Fiona; Bridges, Susan M

    2013-10-01

    The Gene Ontology (GO), a set of three sub-ontologies, is one of the most popular bio-ontologies used for describing gene product characteristics. GO annotation data containing terms from multiple sub-ontologies and at different levels in the ontologies is an important source of implicit relationships between terms from the three sub-ontologies. Data mining techniques such as association rule mining that are tailored to mine from multiple ontologies at multiple levels of abstraction are required for effective knowledge discovery from GO annotation data. We present a data mining approach, Multi-ontology data mining at All Levels (MOAL) that uses the structure and relationships of the GO to mine multi-ontology multi-level association rules. We introduce two interestingness measures: Multi-ontology Support (MOSupport) and Multi-ontology Confidence (MOConfidence) customized to evaluate multi-ontology multi-level association rules. We also describe a variety of post-processing strategies for pruning uninteresting rules. We use publicly available GO annotation data to demonstrate our methods with respect to two applications (1) the discovery of co-annotation suggestions and (2) the discovery of new cross-ontology relationships. Copyright © 2013 The Authors. Published by Elsevier Inc. All rights reserved.

  2. FGP Approach for Solving Multi-level Multi-objective Quadratic Fractional Programming Problem with Fuzzy parameters

    Directory of Open Access Journals (Sweden)

    m. s. osman

    2017-09-01

    Full Text Available In this paper, we consider fuzzy goal programming (FGP approach for solving multi-level multi-objective quadratic fractional programming (ML-MOQFP problem with fuzzy parameters in the constraints. Firstly, the concept of the ?-cut approach is applied to transform the set of fuzzy constraints into a common deterministic one. Then, the quadratic fractional objective functions in each level are transformed into quadratic objective functions based on a proposed transformation. Secondly, the FGP approach is utilized to obtain a compromise solution for the ML-MOQFP problem by minimizing the sum of the negative deviational variables. Finally, an illustrative numerical example is given to demonstrate the applicability and performance of the proposed approach.

  3. Multi-level governance of forest resources (Editorial to the special feature

    Directory of Open Access Journals (Sweden)

    Esther Mwangi

    2012-08-01

    Full Text Available A major challenge for many researchers and practitioners relates to how to recognize and address cross-scale dynamics in space and over time in order to design and implement effective governance arrangements. This editorial provides an overview of the concept of multi-level governance (MLG. In particular we highlight definitional issues, why the concept matters as well as more practical concerns related to the processes and structure of multi-level governance. It is increasingly clear that multi-level governance of forest resources involves complex interactions of state, private and civil society actors at various levels, and institutions linking higher levels of social and political organization. Local communities are increasingly connected to global networks and influences. This creates new opportunities to learn and address problems but may also introduce new pressures and risks. We conclude by stressing the need for a much complex approach to the varieties of MLG to better understand how policies work as instruments of governance and to organize communities within systems of power and authority.

  4. Multi-level Control Framework for Enhanced Flexibility of Active Distribution Network

    DEFF Research Database (Denmark)

    Nainar, Karthikeyan; Pokhrel, Basanta Raj; Pillai, Jayakrishnan Radhakrishna

    2017-01-01

    In this paper, the control objectives of future active distribution networks with high penetration of renewables and flexible loads are analyzed and reviewed. From a state of the art review, the important control objectives seen from the perspective of a distribution system operator are identifie......-ordination and management of the network assets at different voltage levels and geographical locations. The paper finally shows the applicability of the multi-level control architecture to some of the key challenges in the distribution system operation by relevant scenarios....... to be hosting capacity improvement, high reliable operation and cost effective network management. Based on this review and a state of the art review concerning future distribution network control methods, a multi-level control architecture is constructed for an active distribution network, which satisfies...... the selected control objectives and provides enhanced flexibility. The control architecture is supported by generation/load forecasting and distribution state estimation techniques to improve the controllability of the network. The multi-level control architecture consists of three levels of hierarchical...

  5. The cloud security ecosystem technical, legal, business and management issues

    CERN Document Server

    Ko, Ryan

    2015-01-01

    Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security - putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key tho

  6. Prediction of short-term changes in symptom severity by baseline plasma homovanillic acid levels in schizophrenic patients receiving clozapine.

    Science.gov (United States)

    Sumiyoshi, T; Hasegawa, M; Jayathilake, K; Meltzer, H Y

    1997-03-24

    The relationship between pretreatment levels of plasma homovanillic acid (pHVA) and the outcome of clozapine treatment was studied in 18 male patients with schizophrenia who were resistant to treatment with conventional neuroleptics. After 6 months of clozapine treatment, 7 patients demonstrated > or = 20% decrease in the Brief Psychiatric Rating Scale (BPRS) (responders), while 11 patients did not (non-responders). Responders and non-responders did not differ with respect to the baseline pHVA level. The BPRS Positive Symptom scores at 6 weeks and 3 months, but not those at baseline and 6 months, following initiation of clozapine treatment negatively correlated with pHVA levels for all patients. The correlations became stronger when only responders were included. No significant correlation between Positive Symptom scores and pHVA levels was observed for non-responders. The BPRS Total and Negative Symptom scores did not correlate with pHVA for all patients, responders or non-responders at any time. The percent decrease in the BPRS Positive Symptom scores from baseline at 6 weeks following clozapine treatment correlated significantly with pHVA levels in responders. These results suggest that pretreatment levels of pHVA can be used to predict relatively short-term changes in the positive symptoms of patients with schizophrenia receiving clozapine treatment, particularly for clozapine responders.

  7. On the Mechanisms of Transcranial Magnetic Stimulation (TMS: How Brain State and Baseline Performance Level Determine Behavioral Effects of TMS

    Directory of Open Access Journals (Sweden)

    Juha Silvanto

    2018-05-01

    Full Text Available The behavioral effects of Transcranial Magnetic Stimulation (TMS can change qualitatively when stimulation is preceded by initial state manipulations such as priming or adaptation. In addition, baseline performance level of the participant has been shown to play a role in modulating the impact of TMS. Here we examined the link between these two factors. This was done using data from a previous study using a TMS-priming paradigm, in which, at group level, TMS selectively facilitated targets incongruent with the prime while having no statistically significant effects on other prime-target congruencies. Correlation and linear mixed-effects analyses indicated that, for all prime-target congruencies, a significant linear relationship between baseline performance and the magnitude of the induced TMS effect was present: low levels of baseline performance were associated with TMS-induced facilitations and high baseline performance with impairments. Thus as performance level increased, TMS effects turned from facilitation to impairment. The key finding was that priming shifted the transition from facilitatory to disruptive effects for targets incongruent with the prime, such that TMS-induced facilitations were obtained until a higher level of performance than for other prime-target congruencies. Given that brain state manipulations such as priming operate via modulations of neural excitability, this result is consistent with the view that neural excitability, coupled with non-linear neural effects, underlie behavioral effects of TMS.

  8. Optimal screening interval for men with low baseline prostate-specific antigen levels (≤1.0 ng/mL) in a prostate cancer screening program.

    Science.gov (United States)

    Urata, Satoko; Kitagawa, Yasuhide; Matsuyama, Satoko; Naito, Renato; Yasuda, Kenji; Mizokami, Atsushi; Namiki, Mikio

    2017-04-01

    To optimize the rescreening schedule for men with low baseline prostate-specific antigen (PSA) levels, we evaluated men with baseline PSA levels of ≤1.0 ng/mL in PSA-based population screening. We enrolled 8086 men aged 55-69 years with baseline PSA levels of ≤1.0 ng/mL, who were screened annually. The relationships of baseline PSA and age with the cumulative risks and clinicopathological features of screening-detected cancer were investigated. Among the 8086 participants, 28 (0.35 %) and 18 (0.22 %) were diagnosed with prostate cancer and cancer with a Gleason score (GS) of ≥7 during the observation period, respectively. The cumulative probabilities of prostate cancer at 12 years were 0.42, 1.0, 3.4, and 4.3 % in men with baseline PSA levels of 0.0-0.4, 0.5-0.6, 0.7-0.8, and 0.9-1.0 ng/mL, respectively. Those with GS of ≥7 had cumulative probabilities of 0.42, 0.73, 2.8, and 1.9 %, respectively. The cumulative probabilities of prostate cancer were significantly lower when baseline PSA levels were 0.0-0.6 ng/mL compared with 0.7-1.0 ng/mL. Prostate cancer with a GS of ≥7 was not detected during the first 10 years of screening when baseline PSA levels were 0.0-0.6 ng/mL and was not detected during the first 2 years when baseline PSA levels were 0.7-1.0 ng/mL. Our study demonstrated that men with baseline PSA levels of 0.0-0.6 ng/mL might benefit from longer screening intervals than those recommended in the guidelines of the Japanese Urological Association. Further investigation is needed to confirm the optimal screening interval for men with low baseline PSA levels.

  9. Site Outcomes Baseline Multi Year Work Plan Volume 1, River Corridor Restoration Baseline

    International Nuclear Information System (INIS)

    Wintczak, T.M.

    2001-01-01

    The River Corridor Restoration volume is a compilation of Hanford Site scope, which excludes the approximately 194 km 2 Central Plateau. The River Corridor scope is currently contractually assigned to Fluor Hanford, Bechtel Hanford, inc., DynCorp, and Pacific Northwest National Laboratory, and others. The purpose of this project specification is to provide an overall scoping document for the River Corridor Restoration volume, and to provide a link with the overall Hanford Site River Corridor scope. Additionally, this specification provides an integrated and consolidated source of information for the various scopes, by current contract, for the River Corridor Restoration Baseline. It identifies the vision, mission, and goals, as well as the operational history of the Hanford Site, along with environmental setting and hazards

  10. Selection of the Best Security Controls for Rapid Development of Enterprise-Level Cyber Security

    Science.gov (United States)

    2017-03-01

    investment (ROI) assessment. This ROI assessment entailed consideration of both the likely/expected security benefits of each candidate security control...the top 10–20 cyber security controls, where ranking was based upon a return on investment (ROI) assessment. This ROI assessment entailed...11  II.  CYBER SECURITY: UNDERLYING PRINCIPLES, FUNDAMENTALS AND BEST PRACTICES .................................................13  A

  11. Cities, Europeanization and Multi-level Governance: Governing Climate Change through Transnational Municipal Networks

    NARCIS (Netherlands)

    Kern, K.; Bulkeley, H.

    2009-01-01

    This article focuses on a variant of multi-level governance and Europeanization, i.e. the transnational networking of local authorities. Focusing on local climate change policy, the article examines how transnational municipal networks (TMNs) govern in the context of multi-level European governance.

  12. Design and Baseline Findings of a Multi-site Non-randomized Evaluation of the Effect of a Health Programme on Microfinance Clients in India

    OpenAIRE

    Saha, Somen

    2013-01-01

    Microfinance is the provision of financial services for the poor. Health program through microfinance has the potential to address several access barriers to health. We report the design and baseline findings of a multi-site non-randomized evaluation of the effect of a health program on the members of two microfinance organizations from Karnataka and Gujarat states of India. Villages identified for roll-out of health services with microfinance were pair-matched with microfinance only villages...

  13. Baseline glucose level is an individual trait that is negatively associated with lifespan and increases due to adverse environmental conditions during development and adulthood.

    Science.gov (United States)

    Montoya, Bibiana; Briga, Michael; Jimeno, Blanca; Moonen, Sander; Verhulst, Simon

    2018-05-01

    High baseline glucose levels are associated with pathologies and shorter lifespan in humans, but little is known about causes and consequences of individual variation in glucose levels in other species. We tested to what extent baseline blood glucose level is a repeatable trait in adult zebra finches, and whether glucose levels were associated with age, manipulated environmental conditions during development (rearing brood size) and adulthood (foraging cost), and lifespan. We found that: (1) repeatability of glucose levels was 30%, both within and between years. (2) Having been reared in a large brood and living with higher foraging costs as adult were independently associated with higher glucose levels. Furthermore, the finding that baseline glucose was low when ambient temperature was high, and foraging costs were low, indicates that glucose is regulated at a lower level when energy turnover is low. (3) Survival probability decreased with increasing baseline glucose. We conclude that baseline glucose is an individual trait negatively associated with survival, and increases due to adverse environmental conditions during development (rearing brood size) and adulthood (foraging cost). Blood glucose may be, therefore, part of the physiological processes linking environmental conditions to lifespan.

  14. Human Development Index and Efficiency level of Social Security Hospitals

    Directory of Open Access Journals (Sweden)

    H. Sepehrdost

    2012-04-01

    Full Text Available Introduction & Objective: Hospitals as one of the main institutions providing health care services play an important role in the health system and allocate a high percentage of health sector's budget to them. This study aimed to answer whether social security hospitals efficiency levels are the same for all provinces in Iran? And whether any relationship exists between the human development indexes (HDI of the provinces and technical efficiency levels of the hospitals?Materials & Methods: Data envelopment analysis model has been used to measure technical efficiency of 65 social security hospitals, including small hospitals (working with lower than one hundred active beds and large hospitals (working with over one hundred active beds during the years 2007 to 2009. Further, the relationship between human development index and technical efficiency of hospitals in the provinces has been analyzed.Results: Results show that the average technical efficiency of small and large hospitals working in low and medium HDI provinces (0.912 and 0.937 are more than the average technical efficiency of hospitals in higher HDI provinces (0.870 and 0.887.Conclusion: It is recommended that social security organization concentrated distribute its hospital services in provinces with lower HDI and higher density of population living under the coverage of organization’s insurance. This will eventually puts its positive effects on per capita income of people, as well as more equitable distribution of income. (Sci J Hamadan Univ Med Sci 2012;19(1:32-38

  15. Analysis of baseline gene expression levels from ...

    Science.gov (United States)

    The use of gene expression profiling to predict chemical mode of action would be enhanced by better characterization of variance due to individual, environmental, and technical factors. Meta-analysis of microarray data from untreated or vehicle-treated animals within the control arm of toxicogenomics studies has yielded useful information on baseline fluctuations in gene expression. A dataset of control animal microarray expression data was assembled by a working group of the Health and Environmental Sciences Institute's Technical Committee on the Application of Genomics in Mechanism Based Risk Assessment in order to provide a public resource for assessments of variability in baseline gene expression. Data from over 500 Affymetrix microarrays from control rat liver and kidney were collected from 16 different institutions. Thirty-five biological and technical factors were obtained for each animal, describing a wide range of study characteristics, and a subset were evaluated in detail for their contribution to total variability using multivariate statistical and graphical techniques. The study factors that emerged as key sources of variability included gender, organ section, strain, and fasting state. These and other study factors were identified as key descriptors that should be included in the minimal information about a toxicogenomics study needed for interpretation of results by an independent source. Genes that are the most and least variable, gender-selectiv

  16. Leveraging multi-channel x-ray detector technology to improve quality metrics for industrial and security applications

    Science.gov (United States)

    Jimenez, Edward S.; Thompson, Kyle R.; Stohn, Adriana; Goodner, Ryan N.

    2017-09-01

    Sandia National Laboratories has recently developed the capability to acquire multi-channel radio- graphs for multiple research and development applications in industry and security. This capability allows for the acquisition of x-ray radiographs or sinogram data to be acquired at up to 300 keV with up to 128 channels per pixel. This work will investigate whether multiple quality metrics for computed tomography can actually benefit from binned projection data compared to traditionally acquired grayscale sinogram data. Features and metrics to be evaluated include the ability to dis- tinguish between two different materials with similar absorption properties, artifact reduction, and signal-to-noise for both raw data and reconstructed volumetric data. The impact of this technology to non-destructive evaluation, national security, and industry is wide-ranging and has to potential to improve upon many inspection methods such as dual-energy methods, material identification, object segmentation, and computer vision on radiographs.

  17. Examining multi-level effects on corporate social responsibility and irresponsibility

    Directory of Open Access Journals (Sweden)

    Mazzei Matthew J.

    2015-10-01

    Full Text Available What influences firms to engage in socially responsible (irresponsible activities? Corporate social responsibility (CSR, the efforts of firms to create a positive and desirable impact on society, and corporate social irresponsibility (CSI, contrary actions of unethical behavior that negatively influence society, have become an important focus of discussion for both corporations and scholars. Despite this interest, our understanding of organizations’ socially responsible (irresponsible actions and their antecedents is still developing. A dearth of knowledge about the multi-level nature of the drivers of CSR and CSI continues to exist. Utilizing a longitudinal sample composed of 899 firms in 66 industries, we follow a prominent model to empirically examine industry-, firm-, and individual-level effects on CSR and CSI. Employing variance decomposition analysis, our results confirm that all three levels of investigation do indeed influence CSR and CSI. More substantively, our analysis estimates the magnitude of the effects attributable to each of the three levels for both CSR and CSI. We also compare multi-level influences on two separate CSR strategies, those targeting primary stakeholders (strategic CSR and those targeting secondary stakeholders (social CSR. We find greater industry- and firmlevel effects on social CSR, and higher individual-level effects on strategic CSR. Our results build on the conceptual work of previous authors by providing empirical analyses to confirm multilevel influences on CSR and extending prior multi-level theory to the concept of CSI. Further, we add to the emerging literature regarding stakeholder demands by examining the various influences on CSR strategies targeting different stakeholder groups.

  18. Security of electricity supply at the generation level: Problem analysis

    International Nuclear Information System (INIS)

    Rodilla, P.; Batlle, C.

    2012-01-01

    Since the very beginning of the restructuring process, back in 1982 in Chile, the ability of an electricity market to provide the system with the required level of security of supply has been put into question. The mistrust on the ability of the market, left to its own devices, to provide sufficient generation availability when needed, is more and more leading to the implementation of additional regulatory mechanisms. This matter is undoubtedly gaining importance and it has taken a key role in the energy regulators’ agendas. In this paper, we revisit this discussion under the light of thirty years of electricity market experience. We analyze the different reasons why, although ideally the market is supposed to provide itself an adequate security of supply at the generation level, this result is still far from being achieved in practice. - Highlights: ► Discussion on the need for capacity mechanisms is revisited. ► Reasons behind adequacy problem are analyzed. ► Regulator’s intervention to guarantee supply is most of the times justified.

  19. Multi-level approach for parametric roll analysis

    Science.gov (United States)

    Kim, Taeyoung; Kim, Yonghwan

    2011-03-01

    The present study considers multi-level approach for the analysis of parametric roll phenomena. Three kinds of computation method, GM variation, impulse response function (IRF), and Rankine panel method, are applied for the multi-level approach. IRF and Rankine panel method are based on the weakly nonlinear formulation which includes nonlinear Froude- Krylov and restoring forces. In the computation result of parametric roll occurrence test in regular waves, IRF and Rankine panel method show similar tendency. Although the GM variation approach predicts the occurrence of parametric roll at twice roll natural frequency, its frequency criteria shows a little difference. Nonlinear roll motion in bichromatic wave is also considered in this study. To prove the unstable roll motion in bichromatic waves, theoretical and numerical approaches are applied. The occurrence of parametric roll is theoretically examined by introducing the quasi-periodic Mathieu equation. Instability criteria are well predicted from stability analysis in theoretical approach. From the Fourier analysis, it has been verified that difference-frequency effects create the unstable roll motion. The occurrence of unstable roll motion in bichromatic wave is also observed in the experiment.

  20. Credible baseline analysis for multi-model public policy studies

    Energy Technology Data Exchange (ETDEWEB)

    Parikh, S.C.; Gass, S.I.

    1981-01-01

    The nature of public decision-making and resource allocation is such that many complex interactions can best be examined and understood by quantitative analysis. Most organizations do not possess the totality of models and needed analytical skills to perform detailed and systematic quantitative analysis. Hence, the need for coordinated, multi-organization studies that support public decision-making has grown in recent years. This trend is expected not only to continue, but to increase. This paper describes the authors' views on the process of multi-model analysis based on their participation in an analytical exercise, the ORNL/MITRE Study. One of the authors was the exercise coordinator. During the study, the authors were concerned with the issue of measuring and conveying credibility of the analysis. This work led them to identify several key determinants, described in this paper, that could be used to develop a rating of credibility.

  1. A Multi-step and Multi-level approach for Computer Aided Molecular Design

    DEFF Research Database (Denmark)

    . The problem formulation step incorporates a knowledge base for the identification and setup of the design criteria. Candidate compounds are identified using a multi-level generate and test CAMD solution algorithm capable of designing molecules having a high level of molecular detail. A post solution step...... using an Integrated Computer Aided System (ICAS) for result analysis and verification is included in the methodology. Keywords: CAMD, separation processes, knowledge base, molecular design, solvent selection, substitution, group contribution, property prediction, ICAS Introduction The use of Computer...... Aided Molecular Design (CAMD) for the identification of compounds having specific physic...

  2. Baseline glucose level is an individual trait that is negatively associated with lifespan and increases due to adverse environmental conditions during development and adulthood

    NARCIS (Netherlands)

    Montoya, Bibiana; Briga, Michael; Jimeno, Blanca; Moonen, Sander; Verhulst, Simon

    High baseline glucose levels are associated with pathologies and shorter lifespan in humans, but little is known about causes and consequences of individual variation in glucose levels in other species. We tested to what extent baseline blood glucose level is a repeatable trait in adult zebra

  3. Establishment of control site baseline data for erosion studies using radionuclides: a case study in East Slovenia

    Energy Technology Data Exchange (ETDEWEB)

    Mabit, Lionel, E-mail: L.Mabit@iaea.or [Soil Science Unit, FAO/IAEA Agriculture and Biotechnology Laboratory, IAEA Laboratories Seibersdorf, PO Box 100, Wagramerstrasse 5, A-1400 Vienna (Austria); Martin, Paul [Physics, Chemistry and Instrumentation Laboratory, IAEA Laboratories Seibersdorf, PO Box 100, Wagramerstrasse 5, A-1400 Vienna (Austria); Jankong, Patcharin; Toloza, Arsenio [Soil Science Unit, FAO/IAEA Agriculture and Biotechnology Laboratory, IAEA Laboratories Seibersdorf, PO Box 100, Wagramerstrasse 5, A-1400 Vienna (Austria); Padilla-Alvarez, Roman [Physics, Chemistry and Instrumentation Laboratory, IAEA Laboratories Seibersdorf, PO Box 100, Wagramerstrasse 5, A-1400 Vienna (Austria); Zupanc, Vesna [Department of Agronomy, Biotechnical Faculty, University of Ljubljana (Slovenia)

    2010-10-15

    The aim of the present study was to establish a reference site and its soil characteristics for use of fallout radionuclides in erosion studies in Slovenia. Prior to this study, no reference site and baseline data existed for Slovenia for this purpose. In the agricultural area of Goricko in East Slovenia, an undisturbed forest situated in Salamenci (46{sup o}44'N, 16{sup o}7'E), was selected to establish the inventory value of fallout {sup 137}Cs and to establish a baseline level of multi-elemental fingerprint (major, minor, trace elements including heavy metals) and naturally occurring radionuclides in soils. A total of 20 soil profiles were collected at four 10 cm depth increments for evaluation of baseline level of {sup 137}Cs inventory. An exponential distribution for {sup 137}Cs was found and the baseline level inventory was established at 7300 {+-} 2500 Bq m{sup -2} with a coefficient of variation of 34%. Of this mean present-day inventory, approximately 45% is due to the Chernobyl contribution. The physical degradation of soils through erosion is linked with biochemical degradation. This study introduces an approach to establishment of the naturally occurring radionuclide and elemental fingerprints baseline levels at a reference site which can provide comparative data to those from neighbouring agricultural fields for assessment of soil redistribution magnitude using fallout radionuclides. In addition, this information will be used to determine the impact of soil erosion processes and agricultural practices on soil quality and redistribution within agricultural landscapes in Slovenia.

  4. Extending the enterprise through multi-level supply control

    NARCIS (Netherlands)

    Vlist, van der P.; Hoppenbrouwers, J.J.E.M.; Hegge, H.M.H.

    1997-01-01

    Demands for flexibility require larger parts of the supply chain to become customer driven. This article describes multi-level supply control (MLSC) as a mechanism to facilitate that; it allows to specify gradually and thus to shift the customer order decoupling point well across the boundary to the

  5. Secrecy Dimming Capacity in Multi-LED PAM-Based Visible Light Communications

    Directory of Open Access Journals (Sweden)

    Byung Wook Kim

    2017-01-01

    Full Text Available Recently, mobile cloud computing (MCC has gained a lot of interest for researchers building the next-generation mobile applications. Because unauthorized access may cause serious problems, security and privacy with MCC have become significant issues. This paper addresses the secrecy dimming capacity of secure transmission in MCC over visible light communication (VLC channels. By obtaining the entropy-maximizing symbol probability of multiple light emitting diode- (LED- based pulse amplitude modulation (PAM, mathematical analysis of the secrecy dimming capacity of VLC was derived. Simulation results show that the secure transmission ability of multi-LED-based VLC is determined according to the number of activated LEDs and target dimming level. This can be a guideline for practical VLC-based mobile network designers intending to secure wireless transmission and to decide on the number of activated LEDs at target dimming level to operate.

  6. Multi-objective hybrid PSO-APO algorithm based security constrained optimal power flow with wind and thermal generators

    Directory of Open Access Journals (Sweden)

    Kiran Teeparthi

    2017-04-01

    Full Text Available In this paper, a new low level with teamwork heterogeneous hybrid particle swarm optimization and artificial physics optimization (HPSO-APO algorithm is proposed to solve the multi-objective security constrained optimal power flow (MO-SCOPF problem. Being engaged with the environmental and total production cost concerns, wind energy is highly penetrating to the main grid. The total production cost, active power losses and security index are considered as the objective functions. These are simultaneously optimized using the proposed algorithm for base case and contingency cases. Though PSO algorithm exhibits good convergence characteristic, fails to give near optimal solution. On the other hand, the APO algorithm shows the capability of improving diversity in search space and also to reach a near global optimum point, whereas, APO is prone to premature convergence. The proposed hybrid HPSO-APO algorithm combines both individual algorithm strengths, to get balance between global and local search capability. The APO algorithm is improving diversity in the search space of the PSO algorithm. The hybrid optimization algorithm is employed to alleviate the line overloads by generator rescheduling during contingencies. The standard IEEE 30-bus and Indian 75-bus practical test systems are considered to evaluate the robustness of the proposed method. The simulation results reveal that the proposed HPSO-APO method is more efficient and robust than the standard PSO and APO methods in terms of getting diverse Pareto optimal solutions. Hence, the proposed hybrid method can be used for the large interconnected power system to solve MO-SCOPF problem with integration of wind and thermal generators.

  7. Economic security of the Russian Federation: current status, level and threats

    Directory of Open Access Journals (Sweden)

    V. V. Grigoryeva

    2017-01-01

    Full Text Available The problems of national and economic security maintenanceis aggravating in modern conditions of globalization and international competition related to controlof market channels, technological, information and natural resources.Today Russia is making all efforts to protect its position on the world stage and improve the lives of its citizens.Despite the worsening of the present economic, political and social differences in the world, the Russian Federation has its own national interests, which can be possible to fulfill only on the basis of sustainable development of the national economic security system.The latter traditionally determines the ability of the state economic system to maintain normal conditions for the national economy functioning and the population activity. The national economic securitystabilitycan be estimated only by the application of elaborate tools of the economic development indicators analysis and the threshold values examinationaimed at the determination of the quality characteristic of actual and the most successful model of the economic activity.The analysis of the current Russian economic situation showed the presence of some serious problems existing in the national economy. The economic security level of Russia, having a tendency to increase in the period of 1998-2013, has been sharply reduced to critical points since 2014. So, it is necessary to take some measures to restructure the system of economic security of the state. Based on the research it was identified the list of the most dangerous threats to the modern Russian economy, which includes: low level of the country industrial production; the economy dependence on goods import and raw materials export; low living standards of the population; the rapid growth of the shadow economy and corruption; the lack of civil science and innovationdevelopment. The main strategic directions for economic security levelincrease in Russia today and in the future are aimed at

  8. Analysis on the University’s Network Security Level System in the Big Data Era

    Science.gov (United States)

    Li, Tianli

    2017-12-01

    The rapid development of science and technology, the continuous expansion of the scope of computer network applications, has gradually improved the social productive forces, has had a positive impact on the increase production efficiency and industrial scale of China's different industries. Combined with the actual application of computer network in the era of large data, we can see the existence of influencing factors such as network virus, hacker and other attack modes, threatening network security and posing a potential threat to the safe use of computer network in colleges and universities. In view of this unfavorable development situation, universities need to pay attention to the analysis of the situation of large data age, combined with the requirements of network security use, to build a reliable network space security system from the equipment, systems, data and other different levels. To avoid the security risks exist in the network. Based on this, this paper will analyze the hierarchical security system of cyberspace security in the era of large data.

  9. Data Hiding and Security for XML Database: A TRBAC- Based Approach

    Institute of Scientific and Technical Information of China (English)

    ZHANG Wan-song; SUN Wei; LIU Da-xin

    2005-01-01

    In order to cope with varying protection granularity levels of XML (eXtensible Markup Language) documents, we propose a TXAC (Two-level XML Access Control) framework, in which an extended TRBAC (Temporal Role-Based Access Control) approach is proposed to deal with the dynamic XML data. With different system components,TXAC algorithm evaluates access requests efficiently by appropriate access control policy in dynamic web environment.The method is a flexible and powerful security system offering a multi-level access control solution.

  10. Effect of water deprivation on baseline and stress-induced corticosterone levels in the Children's python (Antaresia childreni).

    Science.gov (United States)

    Dupoué, Andréaz; Angelier, Frédéric; Lourdais, Olivier; Bonnet, Xavier; Brischoux, François

    2014-02-01

    Corticosterone (CORT) secretion is influenced by endogenous factors (e.g., physiological status) and environmental stressors (e.g., ambient temperature). Heretofore, the impact of water deprivation on CORT plasma levels has not been thoroughly investigated. However, both baseline CORT and stress-induced CORT are expected to respond to water deprivation not only because of hydric stress per se, but also because CORT is an important mineralocorticoid in vertebrates. We assessed the effects of water deprivation on baseline CORT and stress-induced CORT, in Children's pythons (Antaresia childreni), a species that experiences seasonal droughts in natural conditions. We imposed a 52-day water deprivation on a group of unfed Children's pythons (i.e., water-deprived treatment) and provided water ad libitum to another group (i.e., control treatment). We examined body mass variations throughout the experiment, and baseline CORT and stress-induced CORT at the end of the treatments. Relative body mass loss averaged ~10% in pythons without water, a value 2 to 4 times higher compared to control snakes. Following re-exposition to water, pythons from the water-deprived treatment drank readily and abundantly and attained a body mass similar to pythons from the control treatment. Together, these results suggest a substantial dehydration as a consequence of water deprivation. Interestingly, stress-induced but not baseline CORT level was significantly higher in water-deprived snakes, suggesting that baseline CORT might not respond to this degree of dehydration. Therefore, possible mineralocorticoid role of CORT needs to be clarified in snakes. Because dehydration usually induces adjustments (reduced movements, lowered body temperature) to limit water loss, and decreases locomotor performances, elevated stress-induced CORT in water-deprived snakes might therefore compensate for altered locomotor performances. Future studies should test this hypothesis. Copyright © 2013 Elsevier Inc

  11. Android Multi-Level System Permission Management Approach

    OpenAIRE

    Luo, Yang; Zhang, Qixun; Shen, Qingni; Liu, Hongzhi; Wu, Zhonghai

    2017-01-01

    With the expansion of the market share occupied by the Android platform, security issues (especially application security) have become attention focus of researchers. In fact, the existing methods lack the capabilities to manage application permissions without root privilege. This study proposes a dynamic management mechanism of Android application permissions based on security policies. The paper first describes the permissions by security policies, then implementes permission checking code ...

  12. First 3D Cadastral Registration of Multi-level Ownerships Rights in the Netherlands

    NARCIS (Netherlands)

    Ploeger, H.D.; Stoter, J.E.; Roes, R; Van der Riet, E.; Biljecki, F.; Ledoux, H.

    2016-01-01

    This paper reports on the first 3D cadastral registration of multi-level ownerships rights in the Netherlands, which was accomplished in March 2016. It is the result of a study that was undertaken from 2013 to 2015 to determine how insight about multi-level ownership can be provided in 3D by the

  13. Information security architecture an integrated approach to security in the organization

    CERN Document Server

    Killmeyer, Jan

    2000-01-01

    An information security architecture is made up of several components. Each component in the architecture focuses on establishing acceptable levels of control. These controls are then applied to the operating environment of an organization. Functionally, information security architecture combines technical, practical, and cost-effective solutions to provide an adequate and appropriate level of security.Information Security Architecture: An Integrated Approach to Security in the Organization details the five key components of an information security architecture. It provides C-level executives

  14. 6 CFR 27.205 - Determination that a chemical facility “presents a high level of security risk.”

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Determination that a chemical facility âpresents... SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.205 Determination that a chemical facility “presents a high level of security risk.” (a...

  15. The effect of a motivational intervention on weight loss is moderated by level of baseline controlled motivation

    OpenAIRE

    Webber, Kelly H; Gabriele, Jeanne M; Tate, Deborah F; Dignan, Mark B

    2010-01-01

    Abstract Background Clinic-based behavioral weight loss programs are effective in producing significant weight loss. A one-size-fits-all approach is often taken with these programs. It may be beneficial to tailor programs based on participants' baseline characteristics. Type and level of motivation may be an important factor to consider. Previous research has found that, in general, higher levels of controlled motivation are detrimental to behavior change while higher levels of autonomous mot...

  16. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  17. Metaheuristics for bi-level optimization

    CERN Document Server

    2013-01-01

    This book provides a complete background on metaheuristics to solve complex bi-level optimization problems (continuous/discrete, mono-objective/multi-objective) in a diverse range of application domains. Readers learn to solve large scale bi-level optimization problems by efficiently combining metaheuristics with complementary metaheuristics and mathematical programming approaches. Numerous real-world examples of problems demonstrate how metaheuristics are applied in such fields as networks, logistics and transportation, engineering design, finance and security.

  18. Non-linear interactions of multi-level atoms with a near-resonant standing wave

    International Nuclear Information System (INIS)

    O'Kane, T.J.; Scholten, R.E.; Walkiewicz, M.R.; Farrell, P.M.

    1998-01-01

    Using a semiclassical density matrix formalism we have calculated the behavior of multi-level atoms interacting with a standing wave field, and show how complex non-linear phenomena, including multi-photon effects, combine to produce saturation spectra as observed in experiments. We consider both 20-level sodium and 24-level rubidium models, contrasting these with a simple 2-level case. The influence of parameters such as atomic trajectory and the time the atom remains in the beam are shown to have a critical effect on the lineshape of these resonances and the emission/absorption processes. Stable oscillations in the excited state populations for both the two-level and multi-level cases are shown to be limit cycles. These limit cycles undergo period doubling as the system evolves into chaos. Finally, using a Monte Carlo treatment, these processes average to produce saturated absorption spectra complete with power and Doppler broadening effects consistent with experiment. (authors)

  19. New techniques for multi-level cross section calculation and fitting

    International Nuclear Information System (INIS)

    Froehner, F.H.

    1980-09-01

    A number of recent developments in multi-level cross section work are described. A new iteration scheme for the conversion of Reich-Moore resonance parameters to Kapur-Peierls parameters allows application of Turing's method for Gaussian broadening of meromorphic functions directly to multi-level cross section expressions, without recourse to the Voigt profiles psi and chi. This makes calculation of Doppler-broadened Reich-Moore and MLBW cross sections practically as fast as SLBW and Adler-Adler cross section calculations involving the Voigt profiles. A convenient distant-level treatment utilizing average resonance parameters is presented. Apart from effectively dealing with edge effects in resonance fitting work it also leads to a simple prescription for the determination of bound levels which reproduce the thermal cross sections correctly. A brief discussion of improved resonance shape fitting techniques is included, with empahsis on the importance of correlated errors and proper use of prior information by application of Bayes' theorem. (orig.) [de

  20. New techniques for multi-level cross section calculation and fitting

    International Nuclear Information System (INIS)

    Froehner, F.H.

    1981-01-01

    A number of recent developments in multi-level cross section work are described. A new iteration scheme for the conversion of Reich-Moore resonance parameters to Kapur-Peierls parameters allows application of Turing's method for Gaussian broadening of meromorphic functions directly to multi-level cross section expressions, without recourse to the Voigt profiles psi and chi. This makes calculation of Doppler-broadened Reich-Moore and MLBW cross sections practically as fast as SLBW and Adler-Adler cross section calculations involving the Voigt profiles. A convenient distant-level treatment utilizing average resonance parameters is presented. Apart from effectively dealing with edge effects in resonance fitting work it also leads to a simple prescription for the determination of bound levels which reproduce the thermal cross sections correctly. A brief discussion of improved resonance shape fitting techniques is included, with emphasis on the importance of correlated errors and proper use of prior information by application of Bayes' theorem

  1. On the multi-level solution algorithm for Markov chains

    Energy Technology Data Exchange (ETDEWEB)

    Horton, G. [Univ. of Erlangen, Nuernberg (Germany)

    1996-12-31

    We discuss the recently introduced multi-level algorithm for the steady-state solution of Markov chains. The method is based on the aggregation principle, which is well established in the literature. Recursive application of the aggregation yields a multi-level method which has been shown experimentally to give results significantly faster than the methods currently in use. The algorithm can be reformulated as an algebraic multigrid scheme of Galerkin-full approximation type. The uniqueness of the scheme stems from its solution-dependent prolongation operator which permits significant computational savings in the evaluation of certain terms. This paper describes the modeling of computer systems to derive information on performance, measured typically as job throughput or component utilization, and availability, defined as the proportion of time a system is able to perform a certain function in the presence of component failures and possibly also repairs.

  2. Imaging Compact Supermassive Binary Black Holes with Very Long Baseline Interferometry

    National Research Council Canada - National Science Library

    Taylor, G. B; Rodriguez, C; Zavala, R. T; Peck, A. B; Pollack, L. K; Romani, R. W

    2007-01-01

    .... These results are based upon multi-frequency imaging using the Very Long Baseline Array (VLBA) which reveal two compact, variable, at-spectrum, active nuclei within the elliptical host galaxy of 0402...

  3. Progress and challenges in the development and qualification of multi-level multi-physics coupled methodologies for reactor analysis

    International Nuclear Information System (INIS)

    Ivanov, K.; Avramova, M.

    2007-01-01

    Current trends in nuclear power generation and regulation as well as the design of next generation reactor concepts along with the continuing computer technology progress stimulate the development, qualification and application of multi-physics multi-scale coupled code systems. The efforts have been focused on extending the analysis capabilities by coupling models, which simulate different phenomena or system components, as well as on refining the scale and level of detail of the coupling. This paper reviews the progress made in this area and outlines the remaining challenges. The discussion is illustrated with examples based on neutronics/thermohydraulics coupling in the reactor core modeling. In both fields recent advances and developments are towards more physics-based high-fidelity simulations, which require implementation of improved and flexible coupling methodologies. First, the progresses in coupling of different physics codes along with the advances in multi-level techniques for coupled code simulations are discussed. Second, the issues related to the consistent qualification of coupled multi-physics and multi-scale code systems for design and safety evaluation are presented. The increased importance of uncertainty and sensitivity analysis are discussed along with approaches to propagate the uncertainty quantification between the codes. The incoming OECD LWR Uncertainty Analysis in Modeling (UAM) benchmark is the first international activity to address this issue and it is described in the paper. Finally, the remaining challenges with multi-physics coupling are outlined. (authors)

  4. Progress and challenges in the development and qualification of multi-level multi-physics coupled methodologies for reactor analysis

    Energy Technology Data Exchange (ETDEWEB)

    Ivanov, K.; Avramova, M. [Pennsylvania State Univ., University Park, PA (United States)

    2007-07-01

    Current trends in nuclear power generation and regulation as well as the design of next generation reactor concepts along with the continuing computer technology progress stimulate the development, qualification and application of multi-physics multi-scale coupled code systems. The efforts have been focused on extending the analysis capabilities by coupling models, which simulate different phenomena or system components, as well as on refining the scale and level of detail of the coupling. This paper reviews the progress made in this area and outlines the remaining challenges. The discussion is illustrated with examples based on neutronics/thermohydraulics coupling in the reactor core modeling. In both fields recent advances and developments are towards more physics-based high-fidelity simulations, which require implementation of improved and flexible coupling methodologies. First, the progresses in coupling of different physics codes along with the advances in multi-level techniques for coupled code simulations are discussed. Second, the issues related to the consistent qualification of coupled multi-physics and multi-scale code systems for design and safety evaluation are presented. The increased importance of uncertainty and sensitivity analysis are discussed along with approaches to propagate the uncertainty quantification between the codes. The incoming OECD LWR Uncertainty Analysis in Modeling (UAM) benchmark is the first international activity to address this issue and it is described in the paper. Finally, the remaining challenges with multi-physics coupling are outlined. (authors)

  5. On combining multi-normalization and ancillary measures for the optimal score level fusion of fingerprint and voice biometrics

    Science.gov (United States)

    Mohammed Anzar, Sharafudeen Thaha; Sathidevi, Puthumangalathu Savithri

    2014-12-01

    In this paper, we have considered the utility of multi-normalization and ancillary measures, for the optimal score level fusion of fingerprint and voice biometrics. An efficient matching score preprocessing technique based on multi-normalization is employed for improving the performance of the multimodal system, under various noise conditions. Ancillary measures derived from the feature space and the score space are used in addition to the matching score vectors, for weighing the modalities, based on their relative degradation. Reliability (dispersion) and the separability (inter-/intra-class distance and d-prime statistics) measures under various noise conditions are estimated from the individual modalities, during the training/validation stage. The `best integration weights' are then computed by algebraically combining these measures using the weighted sum rule. The computed integration weights are then optimized against the recognition accuracy using techniques such as grid search, genetic algorithm and particle swarm optimization. The experimental results show that, the proposed biometric solution leads to considerable improvement in the recognition performance even under low signal-to-noise ratio (SNR) conditions and reduces the false acceptance rate (FAR) and false rejection rate (FRR), making the system useful for security as well as forensic applications.

  6. Pruning techniques for multi-objective system-level design space exploration

    NARCIS (Netherlands)

    Piscitelli, R.

    2014-01-01

    System-level design space exploration (DSE), which is performed early in the design process, is of eminent importance to the design of complex multi-processor embedded system architectures. During system-level DSE, system parameters like, e.g., the number and type of processors, the type and size of

  7. Multi-level learning: improving the prediction of protein, domain and residue interactions by allowing information flow between levels

    Directory of Open Access Journals (Sweden)

    McDermott Drew

    2009-08-01

    Full Text Available Abstract Background Proteins interact through specific binding interfaces that contain many residues in domains. Protein interactions thus occur on three different levels of a concept hierarchy: whole-proteins, domains, and residues. Each level offers a distinct and complementary set of features for computationally predicting interactions, including functional genomic features of whole proteins, evolutionary features of domain families and physical-chemical features of individual residues. The predictions at each level could benefit from using the features at all three levels. However, it is not trivial as the features are provided at different granularity. Results To link up the predictions at the three levels, we propose a multi-level machine-learning framework that allows for explicit information flow between the levels. We demonstrate, using representative yeast interaction networks, that our algorithm is able to utilize complementary feature sets to make more accurate predictions at the three levels than when the three problems are approached independently. To facilitate application of our multi-level learning framework, we discuss three key aspects of multi-level learning and the corresponding design choices that we have made in the implementation of a concrete learning algorithm. 1 Architecture of information flow: we show the greater flexibility of bidirectional flow over independent levels and unidirectional flow; 2 Coupling mechanism of the different levels: We show how this can be accomplished via augmenting the training sets at each level, and discuss the prevention of error propagation between different levels by means of soft coupling; 3 Sparseness of data: We show that the multi-level framework compounds data sparsity issues, and discuss how this can be dealt with by building local models in information-rich parts of the data. Our proof-of-concept learning algorithm demonstrates the advantage of combining levels, and opens up

  8. Multi-discipline Waste Acceptance Process at the Nevada National Security Site - 13573

    Energy Technology Data Exchange (ETDEWEB)

    Carilli, Jhon T. [US Department Of Energy, Nevada Site Office, P. O. Box 98518, Las Vegas, Nevada 89193-8518 (United States); Krenzien, Susan K. [Navarro-Intera, LLC, P. O. Box 98952, Las Vegas, Nevada 89193-8952 (United States)

    2013-07-01

    The Nevada National Security Site low-level radioactive waste disposal facility acceptance process requires multiple disciplines to ensure the protection of workers, the public, and the environment. These disciplines, which include waste acceptance, nuclear criticality, safety, permitting, operations, and performance assessment, combine into the overall waste acceptance process to assess low-level radioactive waste streams for disposal at the Area 5 Radioactive Waste Management Site. Four waste streams recently highlighted the integration of these disciplines: the Oak Ridge Radioisotope Thermoelectric Generators and Consolidated Edison Uranium Solidification Project material, West Valley Melter, and classified waste. (authors)

  9. A SCHEME FOR TEMPLATE SECURITY AT FEATURE FUSION LEVEL IN MULTIMODAL BIOMETRIC SYSTEM

    OpenAIRE

    Arvind Selwal; Sunil Kumar Gupta; Surender Kumar

    2016-01-01

    Biometric is the science of human recognition based upon using their biological, chemical or behavioural traits. These systems are used in many real life applications simply from biometric based attendance system to providing security at very sophisticated level. A biometric system deals with raw data captured using a sensor and feature template extracted from raw image. One of the challenges being faced by designers of these systems is to secure template data extracted from the biometric mod...

  10. Competitiveness and food security at the regional level

    Directory of Open Access Journals (Sweden)

    Mikhail Vasil'evich Fyodorov

    2012-06-01

    Full Text Available This paper deals with food safety as one of the areas of food security and food sovereignty. A review of concepts, models, acts on the power of international and national levels is made. The authors formulate a conclusion about the need for a measure of «food quality» with the release of the functional components of fitness (the ability to perform specified functions with the purpose and safety (restrictions on the content of harmful substances in the products. The analysis of the competitiveness of local products is made on the quality characteristics based on the proportion of output indicator of inadequate quality or dangerous to health in the total volume of products placed on the market. The paper identifies key areas of federal and regional levels to comply with the quality of food.

  11. Multi-Level Bitmap Indexes for Flash Memory Storage

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Kesheng; Madduri, Kamesh; Canon, Shane

    2010-07-23

    Due to their low access latency, high read speed, and power-efficient operation, flash memory storage devices are rapidly emerging as an attractive alternative to traditional magnetic storage devices. However, tests show that the most efficient indexing methods are not able to take advantage of the flash memory storage devices. In this paper, we present a set of multi-level bitmap indexes that can effectively take advantage of flash storage devices. These indexing methods use coarsely binned indexes to answer queries approximately, and then use finely binned indexes to refine the answers. Our new methods read significantly lower volumes of data at the expense of an increased disk access count, thus taking full advantage of the improved read speed and low access latency of flash devices. To demonstrate the advantage of these new indexes, we measure their performance on a number of storage systems using a standard data warehousing benchmark called the Set Query Benchmark. We observe that multi-level strategies on flash drives are up to 3 times faster than traditional indexing strategies on magnetic disk drives.

  12. Quantification of mold contamination in multi-level buildings using the Environmental Relative Moldiness Index

    Science.gov (United States)

    The goal of this study was to evaluate the possible use of the Environmental Relative Moldiness Index (ERMI) to quantify mold contamination in multi-level, office buildings. Settled-dust samples were collected in multi-level, office buildings and the ERMI value for each sample de...

  13. Baseline and stress-induced levels of corticosterone in male and female Afrotropical and European temperate stonechats during breeding.

    Science.gov (United States)

    Apfelbeck, Beate; Helm, Barbara; Illera, Juan Carlos; Mortega, Kim G; Smiddy, Patrick; Evans, Neil P

    2017-05-22

    Latitudinal variation in avian life histories falls along a slow-fast pace of life continuum: tropical species produce small clutches, but have a high survival probability, while in temperate species the opposite pattern is found. This study investigated whether differential investment into reproduction and survival of tropical and temperate species is paralleled by differences in the secretion of the vertebrate hormone corticosterone (CORT). Depending on circulating concentrations, CORT can both act as a metabolic (low to medium levels) and a stress hormone (high levels) and, thereby, influence reproductive decisions. Baseline and stress-induced CORT was measured across sequential stages of the breeding season in males and females of closely related taxa of stonechats (Saxicola spp) from a wide distribution area. We compared stonechats from 13 sites, representing Canary Islands, European temperate and East African tropical areas. Stonechats are highly seasonal breeders at all these sites, but vary between tropical and temperate regions with regard to reproductive investment and presumably also survival. In accordance with life-history theory, during parental stages, post-capture (baseline) CORT was overall lower in tropical than in temperate stonechats. However, during mating stages, tropical males had elevated post-capture (baseline) CORT concentrations, which did not differ from those of temperate males. Female and male mates of a pair showed correlated levels of post-capture CORT when sampled after simulated territorial intrusions. In contrast to the hypothesis that species with low reproduction and high annual survival should be more risk-sensitive, tropical stonechats had lower stress-induced CORT concentrations than temperate stonechats. We also found relatively high post-capture (baseline) and stress-induced CORT concentrations, in slow-paced Canary Islands stonechats. Our data support and refine the view that baseline CORT facilitates energetically

  14. Multi-level tree analysis of pulmonary artery/vein trees in non-contrast CT images

    Science.gov (United States)

    Gao, Zhiyun; Grout, Randall W.; Hoffman, Eric A.; Saha, Punam K.

    2012-02-01

    Diseases like pulmonary embolism and pulmonary hypertension are associated with vascular dystrophy. Identifying such pulmonary artery/vein (A/V) tree dystrophy in terms of quantitative measures via CT imaging significantly facilitates early detection of disease or a treatment monitoring process. A tree structure, consisting of nodes and connected arcs, linked to the volumetric representation allows multi-level geometric and volumetric analysis of A/V trees. Here, a new theory and method is presented to generate multi-level A/V tree representation of volumetric data and to compute quantitative measures of A/V tree geometry and topology at various tree hierarchies. The new method is primarily designed on arc skeleton computation followed by a tree construction based topologic and geometric analysis of the skeleton. The method starts with a volumetric A/V representation as input and generates its topologic and multi-level volumetric tree representations long with different multi-level morphometric measures. A new recursive merging and pruning algorithms are introduced to detect bad junctions and noisy branches often associated with digital geometric and topologic analysis. Also, a new notion of shortest axial path is introduced to improve the skeletal arc joining two junctions. The accuracy of the multi-level tree analysis algorithm has been evaluated using computer generated phantoms and pulmonary CT images of a pig vessel cast phantom while the reproducibility of method is evaluated using multi-user A/V separation of in vivo contrast-enhanced CT images of a pig lung at different respiratory volumes.

  15. Multi-level restricted maximum likelihood covariance estimation and kriging for large non-gridded spatial datasets

    KAUST Repository

    Castrillon, Julio

    2015-11-10

    We develop a multi-level restricted Gaussian maximum likelihood method for estimating the covariance function parameters and computing the best unbiased predictor. Our approach produces a new set of multi-level contrasts where the deterministic parameters of the model are filtered out thus enabling the estimation of the covariance parameters to be decoupled from the deterministic component. Moreover, the multi-level covariance matrix of the contrasts exhibit fast decay that is dependent on the smoothness of the covariance function. Due to the fast decay of the multi-level covariance matrix coefficients only a small set is computed with a level dependent criterion. We demonstrate our approach on problems of up to 512,000 observations with a Matérn covariance function and highly irregular placements of the observations. In addition, these problems are numerically unstable and hard to solve with traditional methods.

  16. Security Problems in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Rola Motawie

    2016-12-01

    Full Text Available Cloud is a pool of computing resources which are distributed among cloud users. Cloud computing has many benefits like scalability, flexibility, cost savings, reliability, maintenance and mobile accessibility. Since cloud-computing technology is growing day by day, it comes with many security problems. Securing the data in the cloud environment is most critical challenges which act as a barrier when implementing the cloud. There are many new concepts that cloud introduces, such as resource sharing, multi-tenancy, and outsourcing, create new challenges for the security community. In this work, we provide a comparable study of cloud computing privacy and security concerns. We identify and classify known security threats, cloud vulnerabilities, and attacks.

  17. Topological structures of adiabatic phase for multi-level quantum systems

    International Nuclear Information System (INIS)

    Liu Zhengxin; Zhou Xiaoting; Liu Xin; Liu Xiongjun; Chen Jingling

    2007-01-01

    The topological properties of adiabatic gauge fields for multi-level (three-level in particular) quantum systems are studied in detail. Similar to the result that the adiabatic gauge field for SU(2) systems (e.g. two-level quantum system or angular momentum systems, etc) has a monopole structure, the curvature 2-forms of the adiabatic holonomies for SU(3) three-level and SU(3) eight-level quantum systems are shown to have monopole-like (for all levels) or instanton-like (for the degenerate levels) structures

  18. Security economics in the HTTPS value chain

    NARCIS (Netherlands)

    Asghari, H.; van Eeten, M.J.G.; Arnbak, A.M.; van Eijk, N.A.N.M.

    2013-01-01

    Even though we increasingly rely on HTTPS to secure Internet communications, several landmark incidents in recent years have illustrated that its security is deeply flawed. We present an extensive multi-disciplinary analysis that examines how the systemic vulnerabilities of the HTTPS authentication

  19. School Security Measures and Longitudinal Trends in Adolescents' Experiences of Victimization.

    Science.gov (United States)

    Fisher, Benjamin W; Mowen, Thomas J; Boman, John H

    2018-06-01

    Although school security measures have become a common fixture in public schools across the United States, research on the relationship between security and adolescent victimization is mixed, with very few studies examining trends in adolescent victimization across time. Using two waves of data from the Educational Longitudinal Study 2002 (N = 7659; 50.6% female; 56.7% White, 13.3% Black, 13.5% Hispanic, 11.3% Asian American, 5.4% other race), results from a series of multi-level models demonstrate that adolescents in schools with more security measures report higher odds of being threatened with harm, and no difference in odds of being in a physical altercation or having something stolen over time. Although prior research has established racial disparities in using school security measures, results demonstrate inconsistent patterns in the extent to which adolescents' race conditions the relationship between security and victimization. The findings are discussed in light of existing theoretical and empirical work, and implications for both research and practice are offered.

  20. Risk to Water Security on Small Islands

    Science.gov (United States)

    Holding, S. T.; Allen, D. M.

    2013-12-01

    The majority of fresh water available on small islands is shallow groundwater that forms a freshwater lens. Freshwater lenses are generally limited in extent and as such are vulnerable to many stressors that impact water security. These include stressors related to climate change, such as sea level rise, as well as those related to human impacts, such as contamination. Traditionally, water security assessments have focussed on indicators that provide a snapshot of the current condition. However, recent work suggests that in order to effectively manage the water system, it is also important to consider uncertain future impacts to the system by evaluating how different stressors might impact water security. In this study, a framework for assessing risk to water security was developed and tested on Andros Island in The Bahamas. The assessment comprises two main components that characterise the water system: numerical modelling studies and a hazard survey. A baseline numerical model of the freshwater lens throughout Andros Island was developed to simulate the morphology of the freshwater lens and estimate the freshwater resources currently available. The model was prepared using SEAWAT, a density-dependent flow and solute transport code. Various stressors were simulated in the model to evaluate the response of the freshwater lens to predicted future shifts in climate patterns, sea level rise, and changes in water use. A hazard survey was also conducted on the island to collect information related to the storage of contaminants, sanitation infrastructure, waste disposal practices and groundwater abstraction rates. The results of the survey form a geo-spatial database of the location and associated hazards to the freshwater lens. The resulting risk framework provides a ranking of overall risk to water security based on information from the numerical modelling and hazard survey. The risk framework is implemented in a Geographic Information System (GIS) and provides a map

  1. space vector pulse width modulation of a multi-level diode clamped

    African Journals Online (AJOL)

    ES Obe

    step by step development of MATLAB /SIMULINK modeling of the space vector ..... Pulse Width Mod. of Multi-Level Diode Clamped Converter 119 powergui. Discrete, .... Load. Figure 22: Block diagram of the three level DCC design. 3 LEVEL ...

  2. Soy food frequency questionnaire does not correlate with baseline isoflavone levels in patients with bladder cancer.

    Science.gov (United States)

    Kolesar, Jill M; Pomplun, Marcia; Havighurst, Tom; Stublaski, Jeanne; Wollmer, Barbara; Kim, KyungMann; Tangrea, Joseph A; Parnes, Howard L; House, Margaret G; Gee, Jason; Messing, Edward; Bailey, Howard H

    2015-04-01

    The isoflavone genistein, a natural soy product with receptor tyrosine kinase-inhibiting activity, as well as phytoestrogenic and other potential anticarcinogenic effects, is being studied as an anticancer agent. Since isoflavones are commonly consumed in food products containing soy proteins, a method to control for baseline isoflavone consumption is needed. HPLC was used to evaluate baseline plasma and urine concentrations of isoflavone in fifty-four participants with bladder cancer enrolled on a phase II chemoprevention study of G-2535. The soy food frequency questionnaire was used to assess participant's baseline soy intake. The association between baseline isoflavone concentrations and intakes for genistein and daidzein was assessed by the Spearman's rank correlation coefficient. The majority of participants had no detectable genistein or daidzein in plasma at baseline. The median and range of values were 0 (0-1480) nmol/L for genistein, and 0 (0-1260) nmol/L for daidzein. In urine, the median and range of values were 91.0 (0-9030) nmol/L for genistein and 623 (0-100,000) nmol/L for daidzein. The median and range of weekly estimated genistein intake was 0 (0-236) mg/wk; the median and range of weekly estimated daidzein intake was 0 (0-114) mg/wk. There was no relationship to soy intake as measured by the food frequency questionnaire and baseline isoflavone levels in plasma or urine and the Spearman's rank correlation coefficients were not significant. The soy food frequency questionnaire did not correlate with plasma or urine concentrations of either isoflavone. Alternative methods for controlling for soy consumption, including measuring plasma and urine concentrations, in isoflavone chemoprevention trials should be considered. © The Author(s) 2014 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  3. Achieving strategic renewal: the multi-level influences of top and middle managers’ boundary-spanning

    NARCIS (Netherlands)

    Glaser, L.; Fourne, S.P.L.; Elfring, T.

    2015-01-01

    Drawing on corporate entrepreneurship (CE) and social network research, this study focuses on strategic renewal as a form of CE and examines the impact of boundary-spanning at top and middle management levels on business units’ exploratory innovation. Analyses of multi-source and multi-level data,

  4. Intelligent wear mode identification system for marine diesel engines based on multi-level belief rule base methodology

    Science.gov (United States)

    Yan, Xinping; Xu, Xiaojian; Sheng, Chenxing; Yuan, Chengqing; Li, Zhixiong

    2018-01-01

    Wear faults are among the chief causes of main-engine damage, significantly influencing the secure and economical operation of ships. It is difficult for engineers to utilize multi-source information to identify wear modes, so an intelligent wear mode identification model needs to be developed to assist engineers in diagnosing wear faults in diesel engines. For this purpose, a multi-level belief rule base (BBRB) system is proposed in this paper. The BBRB system consists of two-level belief rule bases, and the 2D and 3D characteristics of wear particles are used as antecedent attributes on each level. Quantitative and qualitative wear information with uncertainties can be processed simultaneously by the BBRB system. In order to enhance the efficiency of the BBRB, the silhouette value is adopted to determine referential points and the fuzzy c-means clustering algorithm is used to transform input wear information into belief degrees. In addition, the initial parameters of the BBRB system are constructed on the basis of expert-domain knowledge and then optimized by the genetic algorithm to ensure the robustness of the system. To verify the validity of the BBRB system, experimental data acquired from real-world diesel engines are analyzed. Five-fold cross-validation is conducted on the experimental data and the BBRB is compared with the other four models in the cross-validation. In addition, a verification dataset containing different wear particles is used to highlight the effectiveness of the BBRB system in wear mode identification. The verification results demonstrate that the proposed BBRB is effective and efficient for wear mode identification with better performance and stability than competing systems.

  5. Variation in pre-treatment count lead time and its effect on baseline estimates of cage-level sea lice abundance.

    Science.gov (United States)

    Gautam, R; Boerlage, A S; Vanderstichel, R; Revie, C W; Hammell, K L

    2016-11-01

    Treatment efficacy studies typically use pre-treatment sea lice abundance as the baseline. However, the pre-treatment counting window often varies from the day of treatment to several days before treatment. We assessed the effect of lead time on baseline estimates, using historical data (2010-14) from a sea lice data management programme (Fish-iTrends). Data were aggregated at the cage level for three life stages: (i) chalimus, (ii) pre-adult and adult male and (iii) adult female. Sea lice counts were log-transformed, and mean counts by lead time relative to treatment day were computed and compared separately for each life stage, using linear mixed models. There were 1,658 observations (treatment events) from 56 sites in 5 Bay Management Areas. Our study showed that lead time had a significant effect on the estimated sea lice abundance, which was moderated by season. During the late summer and autumn periods, counting on the day of treatment gave significantly higher values than other days and would be a more appropriate baseline estimate, while during spring and early summer abundance estimates were comparable among counts within 5 days of treatment. A season-based lead time window may be most appropriate when estimating baseline sea lice levels. © 2016 John Wiley & Sons Ltd.

  6. Modeling Multi-Mobile Agents System Based on Coalition Signature Mechanism Using UML

    Institute of Scientific and Technical Information of China (English)

    SUNZhixin; HUANGHaiping; WANGRuchuan

    2004-01-01

    With the development of electronic commerce and agent techniques, multi-mobile agents cooperation can not only improve the efficiency of electronic business trade, but more importantly, it has a comprehensive applicative value in solving the security issues of mobile agent system. This paper firstly describes the mechanism of multi-mobile agents coalition signature aiming at the system security. Subsequently it brings forward a basic architecture of Multi-mobile agents system (MMAS) based on the design pattern of multi-mobile agents. The paper uses the diagrs_rn of UML, such as use case diagram, class diagram and sequence diagram to build the detailed model of the coalition signature and multi-mobile agents cooperation results. Through security analysis, we find that multimobile agents cooperation and interaction can solve some security problems of mobile agents in transfer, and also it can improve the efficiency of business trade. These results indicate that MMAS has a high security performance and can be widely used in E-commerce trade.

  7. Multi-level restricted maximum likelihood covariance estimation and kriging for large non-gridded spatial datasets

    KAUST Repository

    Castrillon, Julio; Genton, Marc G.; Yokota, Rio

    2015-01-01

    We develop a multi-level restricted Gaussian maximum likelihood method for estimating the covariance function parameters and computing the best unbiased predictor. Our approach produces a new set of multi-level contrasts where the deterministic

  8. Data security in Intelligent Transport Systems

    Directory of Open Access Journals (Sweden)

    Tomas Zelinka

    2012-10-01

    Full Text Available Intelligent Transport Services expect availability of the secure seamless communications solutions typically covering widely spread areas. Different ITS solutions require different portfolio of telecommunications service quality. These parameters have to correspond with ITS service performance parameters required by specific service. Even though quite extensive range of public wireless data services with reasonable coverage are provided, most of them are provided with no guaranteed quality and security. ITS requirements can be in most parameters easier reached if multi-path communications systems are applied core solution is combined with both public as well as private ones where and when it is needed. Such solution requires implementation of relevant flexible system architecture supported by the efficient decision processes. This paper is concentrated the telecommunications security issues relevant to the ITS wide area networking. Expected level of security varies in dependence on relevant ITS service requirements. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure (C2I or other vehicles (C2C progressively grow. Such trend upsurges the fatal problems appearance probability in case security of the wide area networks is not relevantly treated. That is reason why relevant communications security treatment becomes crucial part of the ITS solution. Besides of available "off shelf" security tools we present solution based on non-public universal identifier with dynamical extension (time and position dependency as an autonomous variables and data selection according to actor role or category. Presented results were obtained within projects e-Ident1, DOTEK2 and SRATVU3.

  9. Towards Comprehensive Food Security Measures: Comparing Key ...

    African Journals Online (AJOL)

    Food security is a multi-dimensional issue that has been difficult to measure comprehensively, given the one-dimensional focus of existing indicators. Three indicators dominate the food security measurement debate: Household Food Insecurity Access Scale (HFIAS), Dietary Diversity Score (DDS) and Coping Strategies ...

  10. Keystone Business Models for Network Security Processors

    OpenAIRE

    Arthur Low; Steven Muegge

    2013-01-01

    Network security processors are critical components of high-performance systems built for cybersecurity. Development of a network security processor requires multi-domain experience in semiconductors and complex software security applications, and multiple iterations of both software and hardware implementations. Limited by the business models in use today, such an arduous task can be undertaken only by large incumbent companies and government organizations. Neither the “fabless semiconductor...

  11. The design of multi-core DSP parallel model based on message passing and multi-level pipeline

    Science.gov (United States)

    Niu, Jingyu; Hu, Jian; He, Wenjing; Meng, Fanrong; Li, Chuanrong

    2017-10-01

    Currently, the design of embedded signal processing system is often based on a specific application, but this idea is not conducive to the rapid development of signal processing technology. In this paper, a parallel processing model architecture based on multi-core DSP platform is designed, and it is mainly suitable for the complex algorithms which are composed of different modules. This model combines the ideas of multi-level pipeline parallelism and message passing, and summarizes the advantages of the mainstream model of multi-core DSP (the Master-Slave model and the Data Flow model), so that it has better performance. This paper uses three-dimensional image generation algorithm to validate the efficiency of the proposed model by comparing with the effectiveness of the Master-Slave and the Data Flow model.

  12. Predicting multi-level drug response with gene expression profile in multiple myeloma using hierarchical ordinal regression.

    Science.gov (United States)

    Zhang, Xinyan; Li, Bingzong; Han, Huiying; Song, Sha; Xu, Hongxia; Hong, Yating; Yi, Nengjun; Zhuang, Wenzhuo

    2018-05-10

    Multiple myeloma (MM), like other cancers, is caused by the accumulation of genetic abnormalities. Heterogeneity exists in the patients' response to treatments, for example, bortezomib. This urges efforts to identify biomarkers from numerous molecular features and build predictive models for identifying patients that can benefit from a certain treatment scheme. However, previous studies treated the multi-level ordinal drug response as a binary response where only responsive and non-responsive groups are considered. It is desirable to directly analyze the multi-level drug response, rather than combining the response to two groups. In this study, we present a novel method to identify significantly associated biomarkers and then develop ordinal genomic classifier using the hierarchical ordinal logistic model. The proposed hierarchical ordinal logistic model employs the heavy-tailed Cauchy prior on the coefficients and is fitted by an efficient quasi-Newton algorithm. We apply our hierarchical ordinal regression approach to analyze two publicly available datasets for MM with five-level drug response and numerous gene expression measures. Our results show that our method is able to identify genes associated with the multi-level drug response and to generate powerful predictive models for predicting the multi-level response. The proposed method allows us to jointly fit numerous correlated predictors and thus build efficient models for predicting the multi-level drug response. The predictive model for the multi-level drug response can be more informative than the previous approaches. Thus, the proposed approach provides a powerful tool for predicting multi-level drug response and has important impact on cancer studies.

  13. Assessment of local GNSS baselines at co-location sites

    Science.gov (United States)

    Herrera Pinzón, Iván; Rothacher, Markus

    2018-01-01

    As one of the major contributors to the realisation of the International Terrestrial Reference System (ITRS), the Global Navigation Satellite Systems (GNSS) are prone to suffer from irregularities and discontinuities in time series. While often associated with hardware/software changes and the influence of the local environment, these discrepancies constitute a major threat for ITRS realisations. Co-located GNSS at fundamental sites, with two or more available instruments, provide the opportunity to mitigate their influence while improving the accuracy of estimated positions by examining data breaks, local biases, deformations, time-dependent variations and the comparison of GNSS baselines with existing local tie measurements. With the use of co-located GNSS data from a subset sites of the International GNSS Service network, this paper discusses a global multi-year analysis with the aim of delivering homogeneous time series of coordinates to analyse system-specific error sources in the local baselines. Results based on the comparison of different GNSS-based solutions with the local survey ties show discrepancies of up to 10 mm despite GNSS coordinate repeatabilities at the sub-mm level. The discrepancies are especially large for the solutions using the ionosphere-free linear combination and estimating tropospheric zenith delays, thus corresponding to the processing strategy used for global solutions. Snow on the antennas causes further problems and seasonal variations of the station coordinates. These demonstrate the need for a permanent high-quality monitoring of the effects present in the short GNSS baselines at fundamental sites.

  14. Loading Analysis of Modular Multi-level Converter for Offshore High-voltage DC Application under Various Grid Faults

    DEFF Research Database (Denmark)

    Liu, Hui; Ma, Ke; Loh, Poh Chiang

    2016-01-01

    challenges but may also result in overstressed components for the modular multi-level converter. However, the thermal loading of the modular multi-level converter under various grid faults has not yet been clarified. In this article, the power loss and thermal performance of the modular multi-level converter...... low-voltage ride-through strongly depend on the types and severity values of grid voltage dips. The thermal distribution among the three phases of the modular multi-level converter may be quite uneven, and some devices are much more stressed than the normal operating condition, which may...

  15. Extended-release niacin/laropiprant significantly improves lipid levels in type 2 diabetes mellitus irrespective of baseline glycemic control

    Directory of Open Access Journals (Sweden)

    Bays HE

    2015-02-01

    Full Text Available Harold E Bays,1 Eliot A Brinton,2 Joseph Triscari,3 Erluo Chen,3 Darbie Maccubbin,3 Alexandra A MacLean,3 Kendra L Gibson,3 Rae Ann Ruck,3 Amy O Johnson-Levonas,3 Edward A O’Neill,3 Yale B Mitchel3 1Louisville Metabolic & Atherosclerosis Research Center (L-MARC, Louisville, KY, USA; 2Utah Foundation for Biomedical Research, Salt Lake City, UT, USA; 3Merck & Co, Inc., Whitehouse Station, NJ, USA Background: The degree of glycemic control in patients with type 2 diabetes mellitus (T2DM may alter lipid levels and may alter the efficacy of lipid-modifying agents. Objective: Evaluate the lipid-modifying efficacy of extended-release niacin/laropiprant (ERN/LRPT in subgroups of patients with T2DM with better or poorer glycemic control. Methods: Post hoc analysis of clinical trial data from patients with T2DM who were randomized 4:3 to double-blind ERN/LRPT or placebo (n=796, examining the lipid-modifying effects of ERN/LRPT in patients with glycosylated hemoglobin or fasting plasma glucose levels above and below median baseline levels. Results: At Week 12 of treatment, ERN/LRPT significantly improved low-density lipoprotein cholesterol, high-density lipoprotein cholesterol (HDL-C, non-high-density lipoprotein cholesterol, triglycerides, and lipoprotein (a, compared with placebo, with equal efficacy in patients above or below median baseline glycemic control. Compared with placebo, over 36 weeks of treatment more patients treated with ERN/LRPT had worsening of their diabetes and required intensification of antihyperglycemic medication, irrespective of baseline glycemic control. Incidences of other adverse experiences were generally low in all treatment groups. Conclusion: The lipid-modifying effects of ERN/LRPT are independent of the degree of baseline glycemic control in patients with T2DM (NCT00485758. Keywords: lipid-modifying agents, hyperglycemia, LDL, HDL, triglycerides

  16. A fast photo-counter with multi-level buffers

    International Nuclear Information System (INIS)

    Peng Hu; Zhou Peiling; Yao Kun; Guo Guangcan

    1992-01-01

    Digital Photon Correlator (DPC) is composed of a Photo-counter and a data processing unit. The performance of Photo-counter in data acquisition system has a direct influence on data processing. The Photo-counter with fast carry designed here has multi-level buffers. Photon pulses can be correctly and dynamically recorded by the Photo-counter and processed by a single chip computer

  17. A Kalman filter-based short baseline RTK algorithm for single-frequency combination of GPS and BDS.

    Science.gov (United States)

    Zhao, Sihao; Cui, Xiaowei; Guan, Feng; Lu, Mingquan

    2014-08-20

    The emerging Global Navigation Satellite Systems (GNSS) including the BeiDou Navigation Satellite System (BDS) offer more visible satellites for positioning users. To employ those new satellites in a real-time kinematic (RTK) algorithm to enhance positioning precision and availability, a data processing model for the dual constellation of GPS and BDS is proposed and analyzed. A Kalman filter-based algorithm is developed to estimate the float ambiguities for short baseline scenarios. The entire work process of the high-precision algorithm based on the proposed model is deeply investigated in detail. The model is validated with real GPS and BDS data recorded from one zero and two short baseline experiments. Results show that the proposed algorithm can generate fixed baseline output with the same precision level as that of either a single GPS or BDS RTK algorithm. The significantly improved fixed rate and time to first fix of the proposed method demonstrates a better availability and effectiveness on processing multi-GNSSs.

  18. A Kalman Filter-Based Short Baseline RTK Algorithm for Single-Frequency Combination of GPS and BDS

    Directory of Open Access Journals (Sweden)

    Sihao Zhao

    2014-08-01

    Full Text Available The emerging Global Navigation Satellite Systems (GNSS including the BeiDou Navigation Satellite System (BDS offer more visible satellites for positioning users. To employ those new satellites in a real-time kinematic (RTK algorithm to enhance positioning precision and availability, a data processing model for the dual constellation of GPS and BDS is proposed and analyzed. A Kalman filter-based algorithm is developed to estimate the float ambiguities for short baseline scenarios. The entire work process of the high-precision algorithm based on the proposed model is deeply investigated in detail. The model is validated with real GPS and BDS data recorded from one zero and two short baseline experiments. Results show that the proposed algorithm can generate fixed baseline output with the same precision level as that of either a single GPS or BDS RTK algorithm. The significantly improved fixed rate and time to first fix of the proposed method demonstrates a better availability and effectiveness on processing multi-GNSSs.

  19. Customized binary and multi-level HfO2-x-based memristors tuned by oxidation conditions.

    Science.gov (United States)

    He, Weifan; Sun, Huajun; Zhou, Yaxiong; Lu, Ke; Xue, Kanhao; Miao, Xiangshui

    2017-08-30

    The memristor is a promising candidate for the next generation non-volatile memory, especially based on HfO 2-x , given its compatibility with advanced CMOS technologies. Although various resistive transitions were reported independently, customized binary and multi-level memristors in unified HfO 2-x material have not been studied. Here we report Pt/HfO 2-x /Ti memristors with double memristive modes, forming-free and low operation voltage, which were tuned by oxidation conditions of HfO 2-x films. As O/Hf ratios of HfO 2-x films increase, the forming voltages, SET voltages, and R off /R on windows increase regularly while their resistive transitions undergo from gradually to sharply in I/V sweep. Two memristors with typical resistive transitions were studied to customize binary and multi-level memristive modes, respectively. For binary mode, high-speed switching with 10 3 pulses (10 ns) and retention test at 85 °C (>10 4 s) were achieved. For multi-level mode, the 12-levels stable resistance states were confirmed by ongoing multi-window switching (ranging from 10 ns to 1 μs and completing 10 cycles of each pulse). Our customized binary and multi-level HfO 2-x -based memristors show high-speed switching, multi-level storage and excellent stability, which can be separately applied to logic computing and neuromorphic computing, further suitable for in-memory computing chip when deposition atmosphere may be fine-tuned.

  20. Level 3 Baseline Risk Assessment for Building 3515 at Oak Ridge National Lab., Oak Ridge, TN

    Energy Technology Data Exchange (ETDEWEB)

    Wollert, D.A.; Cretella, F.M.; Golden, K.M. [Univ. of Tennessee, Knoxville, TN (United States)] [and others

    1995-08-01

    The baseline risk assessment for the Fission Product Pilot Plant (Building 3515) at the Oak Ridge National laboratory (ORNL) provides the Decontamination and Decommissioning (D&D) Program at ORNL and Building 3515 project managers with information concerning the results of the Level 3 baseline risk assessment performed for this building. The document was prepared under Work Breakdown Structure 1.4.12.6.2.01 (Activity Data Sheet 3701, Facilities D&D) and includes information on the potential long-term impacts to human health and the environment if no action is taken to remediate Building 3515. Information provided in this document forms the basis for the development of remedial alternatives and the no-action risk portion of the Engineering Evaluation/Cost Analysis report.

  1. Level 3 Baseline Risk Assessment for Building 3515 at Oak Ridge National Lab., Oak Ridge, TN

    International Nuclear Information System (INIS)

    Wollert, D.A.; Cretella, F.M.; Golden, K.M.

    1995-08-01

    The baseline risk assessment for the Fission Product Pilot Plant (Building 3515) at the Oak Ridge National laboratory (ORNL) provides the Decontamination and Decommissioning (D ampersand D) Program at ORNL and Building 3515 project managers with information concerning the results of the Level 3 baseline risk assessment performed for this building. The document was prepared under Work Breakdown Structure 1.4.12.6.2.01 (Activity Data Sheet 3701, Facilities D ampersand D) and includes information on the potential long-term impacts to human health and the environment if no action is taken to remediate Building 3515. Information provided in this document forms the basis for the development of remedial alternatives and the no-action risk portion of the Engineering Evaluation/Cost Analysis report

  2. Secure data structures based on multi-party computation

    DEFF Research Database (Denmark)

    Toft, Tomas

    2011-01-01

    to be realized using MPC primitives, however, by focusing on a specific example -- a priority queue -- it is shown that it is possible to achieve much better results than the generic solutions can provide. Moreover, the techniques differ significantly from existing ORAM constructions. Indeed it has recently been...... shown that any information theoretically secure ORAM with n memory locations requires at least log n random bits per read/write to hide the access pattern. In contrast, the present construction achieves security with a completely deterministic access pattern....

  3. 8th International Symposium on Intelligent Distributed Computing & Workshop on Cyber Security and Resilience of Large-Scale Systems & 6th International Workshop on Multi-Agent Systems Technology and Semantics

    CERN Document Server

    Braubach, Lars; Venticinque, Salvatore; Badica, Costin

    2015-01-01

    This book represents the combined peer-reviewed proceedings of the Eight International Symposium on Intelligent Distributed Computing - IDC'2014, of the Workshop on Cyber Security and Resilience of Large-Scale Systems - WSRL-2014, and of the Sixth International Workshop on Multi-Agent Systems Technology and Semantics- MASTS-2014. All the events were held in Madrid, Spain, during September 3-5, 2014. The 47 contributions published in this book address several topics related to theory and applications of the intelligent distributed computing and multi-agent systems, including: agent-based data processing, ambient intelligence, collaborative systems, cryptography and security, distributed algorithms, grid and cloud computing, information extraction, knowledge management, big data and ontologies, social networks, swarm intelligence or videogames amongst others.

  4. A linear bi-level multi-objective program for optimal allocation of water resources.

    Directory of Open Access Journals (Sweden)

    Ijaz Ahmad

    Full Text Available This paper presents a simple bi-level multi-objective linear program (BLMOLP with a hierarchical structure consisting of reservoir managers and several water use sectors under a multi-objective framework for the optimal allocation of limited water resources. Being the upper level decision makers (i.e., leader in the hierarchy, the reservoir managers control the water allocation system and tend to create a balance among the competing water users thereby maximizing the total benefits to the society. On the other hand, the competing water use sectors, being the lower level decision makers (i.e., followers in the hierarchy, aim only to maximize individual sectoral benefits. This multi-objective bi-level optimization problem can be solved using the simultaneous compromise constraint (SICCON technique which creates a compromise between upper and lower level decision makers (DMs, and transforms the multi-objective function into a single decision-making problem. The bi-level model developed in this study has been applied to the Swat River basin in Pakistan for the optimal allocation of water resources among competing water demand sectors and different scenarios have been developed. The application of the model in this study shows that the SICCON is a simple, applicable and feasible approach to solve the BLMOLP problem. Finally, the comparisons of the model results show that the optimization model is practical and efficient when it is applied to different conditions with priorities assigned to various water users.

  5. Multi-focus and multi-level techniques for visualization and analysis of networks with thematic data

    Science.gov (United States)

    Cossalter, Michele; Mengshoel, Ole J.; Selker, Ted

    2013-01-01

    Information-rich data sets bring several challenges in the areas of visualization and analysis, even when associated with node-link network visualizations. This paper presents an integration of multi-focus and multi-level techniques that enable interactive, multi-step comparisons in node-link networks. We describe NetEx, a visualization tool that enables users to simultaneously explore different parts of a network and its thematic data, such as time series or conditional probability tables. NetEx, implemented as a Cytoscape plug-in, has been applied to the analysis of electrical power networks, Bayesian networks, and the Enron e-mail repository. In this paper we briefly discuss visualization and analysis of the Enron social network, but focus on data from an electrical power network. Specifically, we demonstrate how NetEx supports the analytical task of electrical power system fault diagnosis. Results from a user study with 25 subjects suggest that NetEx enables more accurate isolation of complex faults compared to an especially designed software tool.

  6. Multi-level biological responses in Ucides cordatus (Linnaeus, 1763) (Brachyura, Ucididae) as indicators of conservation status in mangrove areas from the western atlantic.

    Science.gov (United States)

    Duarte, Luis Felipe de Almeida; Souza, Caroline Araújo de; Nobre, Caio Rodrigues; Pereira, Camilo Dias Seabra; Pinheiro, Marcelo Antonio Amaro

    2016-11-01

    There is a global lack of knowledge on tropical ecotoxicology, particularly in terms of mangrove areas. These areas often serve as nurseries or homes for several animal species, including Ucides cordatus (the uçá crab). This species is widely distributed, is part of the diet of human coastal communities, and is considered to be a sentinel species due to its sensitivity to toxic xenobiotics in natural environments. Sublethal damages to benthic populations reveal pre-pathological conditions, but discussions of the implications are scarce in the literature. In Brazil, the state of São Paulo offers an interesting scenario for ecotoxicology and population studies: it is easy to distinguish between mangroves that are well preserved and those which are significantly impacted by human activity. The objectives of this study were to provide the normal baseline values for the frequency of Micronucleated cells (MN‰) and for neutral red retention time (NRRT) in U. cordatus at pristine locations, as well to indicate the conservation status of different mangrove areas using a multi-level biological response approach in which these biomarkers and population indicators (condition factor and crab density) are applied in relation to environmental quality indicators (determined via information in the literature and solid waste volume). A mangrove area with no effects of impact (areas of reference or pristine areas) presented a mean value of MN‰120min, values which were assumed as baseline values representing genetic and physiological normality. A significant correlation was found between NRRT and MN, with both showing similar and effective results for distinguishing between different mangrove areas according to conservation status. Furthermore, crab density was lower in more impacted mangrove areas, a finding which also reflects the effects of sublethal damage; this finding was not determined by condition factor measurements. Multi-level biological responses were able to

  7. Baseline prostate-specific antigen levels following treatment with abiraterone acetate as a prognostic factor in castration-resistant prostate cancer.

    Science.gov (United States)

    Hiroshige, Tasuku; Eguchi, Yoshiro; Yoshizumi, Osamu; Chikui, Katsuaki; Kumagai, Hisaji; Kawaguchi, Yoshihiro; Onishi, Rei; Hayashi, Tokumasa; Watanabe, Kouta; Mitani, Tomotaro; Saito, Koujiro; Igawa, Tsukasa

    2018-05-01

    The aim of the present study was to investigate the prognostic factors associated with progression-free survival (PFS) and overall survival (OS) times in patients with castration-resistant prostate cancer (CRPC) who received treatment with abiraterone acetate (AA) in routine clinical settings. A total of 93 patients treated with AA between September 2014 and February 2017 were selected and their medical records were analyzed retrospectively. The median PFS time of docetaxel (DTX)-naïve patients was 171 days, and that of post-DTX patients was 56 days. The OS time of DTX-naïve patients did not reach the median. The median OS time of post-DTX patients was 761 days. Multivariate analyses identified baseline prostate-specific antigen (PSA) level prior to treatment with AA and the PSA response rate as independent prognostic factors for PFS time, and baseline PSA prior to treatment with AA as the only independent prognostic factor for OS time. The results of the present study indicate that the baseline PSA level prior to treatment with AA is a notable prognostic factor in patients with CRPC.

  8. Integration of multi-level marketing management systems geographically industry development

    OpenAIRE

    Aleksandr Lavrov; Lada Polikarpova; Alla Handramai

    2015-01-01

    In the article the authors attempt to develop a multi-level management system territorially industry development in market conditions, built in the widespread use of various types of marketing and their horizontal and vertical integration.

  9. Water Security at Local Government Level: What do People Think?

    CSIR Research Space (South Africa)

    Meissner, Richard

    2016-06-01

    Full Text Available stream_source_info Meissner_2016.pdf.txt stream_content_type text/plain stream_size 2853 Content-Encoding UTF-8 stream_name Meissner_2016.pdf.txt Content-Type text/plain; charset=UTF-8 Water Security at Local... Government Level: What do People Think? By Dr. Richard Meissner Integrated Water Assessment Group Natural Resources and the Environment Council for Scientific and Industrial Research Presented at the Sustainable Water Seminar 2016, CSIR ICC, 2...

  10. SC2: Secure Communication over Smart Cards

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Lostal, Eduardo; Papini, Davide

    2012-01-01

    The Security-by-Contract (S×C) framework has recently been proposed to support software evolution in open multi-application smart cards. The key idea lies in the notion of contract, a specification of the security behavior of an application that must be compliant with the security policy of the c...

  11. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    Directory of Open Access Journals (Sweden)

    Dan Constantin TOFAN

    2012-01-01

    Full Text Available Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, dispersed nationwide, and acting within various economic sectors. The collected data will make us able to determine a national cyber-security alert score that could help policy makers in establishing the best strategies for protecting the national cyber-space.

  12. Potential Effects of a Scenario Earthquake on the Economy of Southern California: Baseline County-Level Migration Characteristics and Trends 1995-2000 and 2001-2010

    Science.gov (United States)

    Sherrouse, Benson C.; Hester, David J.

    2008-01-01

    The Multi-Hazards Demonstration Project (MHDP) is a collaboration between the U.S. Geological Survey (USGS) and various partners from the public and private sectors and academia, meant to improve Southern California's resiliency to natural hazards. In support of the MHDP objectives, the ShakeOut Scenario was developed. It describes a magnitude 7.8 earthquake along the southernmost 300 kilometers (200 miles) of the San Andreas Fault, identified by geoscientists as a plausible event that will cause moderate to strong shaking over much of the eight-county (Imperial, Kern, Los Angeles, Orange, Riverside, San Bernardino, San Diego, and Ventura) Southern California region. This report uses historical, estimated, and projected population data from several Federal and State data sources to estimate baseline characteristics and trends of the region's population migration (that is, changes in a person's place of residence over time). The analysis characterizes migration by various demographic, economic, family, and household variables for the period 1995-2000. It also uses existing estimates (beginning in 2001) of the three components of population change - births, deaths, and migration - to extrapolate near-term projections of county-level migration trends through 2010. The 2010 date was chosen to provide baseline projections corresponding to a two-year recovery period following the November 2008 date that was selected for the occurrence of the ShakeOut Scenario earthquake. The baseline characteristics and projections shall assist with evaluating the effects of inflow and outflow migration trends for alternative futures in which the simulated M7.8 earthquake either does or does not occur and the impact of the event on housing and jobs, as well as community composition and regional economy changes based on dispersion of intellectual, physical, economic, and cultural capital.

  13. Association of market, mission, operational, and financial factors with hospitals' level of cash and security investments.

    Science.gov (United States)

    McCue, M J; Thompson, J M; Dodd-McCue, D

    Using a resource dependency framework and financial theory, this study assessed the market, mission, operational, and financial factors associated with the level of cash and security investments in hospitals. We ranked hospitals in the study sample based on their cash and security investments as a percentage of total assets: hospitals in the high cash/security investment category were in the top 25th percentile of all hospitals; those in the low cash/security investment group were in the bottom 25th percentile. Findings indicate that high cash/security investment hospitals are under either public or private nonprofit ownership and have greater market share. They also serve more complex cases, offer more technology services, generate greater profits, incur a more stable patient revenue base, and maintain less debt.

  14. Dual deep modeling: multi-level modeling with dual potencies and its formalization in F-Logic.

    Science.gov (United States)

    Neumayr, Bernd; Schuetz, Christoph G; Jeusfeld, Manfred A; Schrefl, Michael

    2018-01-01

    An enterprise database contains a global, integrated, and consistent representation of a company's data. Multi-level modeling facilitates the definition and maintenance of such an integrated conceptual data model in a dynamic environment of changing data requirements of diverse applications. Multi-level models transcend the traditional separation of class and object with clabjects as the central modeling primitive, which allows for a more flexible and natural representation of many real-world use cases. In deep instantiation, the number of instantiation levels of a clabject or property is indicated by a single potency. Dual deep modeling (DDM) differentiates between source potency and target potency of a property or association and supports the flexible instantiation and refinement of the property by statements connecting clabjects at different modeling levels. DDM comes with multiple generalization of clabjects, subsetting/specialization of properties, and multi-level cardinality constraints. Examples are presented using a UML-style notation for DDM together with UML class and object diagrams for the representation of two-level user views derived from the multi-level model. Syntax and semantics of DDM are formalized and implemented in F-Logic, supporting the modeler with integrity checks and rich query facilities.

  15. Problems With Deployment of Multi-Domained, Multi-Homed Mobile Networks

    Science.gov (United States)

    Ivancic, William D.

    2008-01-01

    This document describes numerous problems associated with deployment of multi-homed mobile platforms consisting of multiple networks and traversing large geographical areas. The purpose of this document is to provide insight to real-world deployment issues and provide information to groups that are addressing many issues related to multi-homing, policy-base routing, route optimization and mobile security - particularly those groups within the Internet Engineering Task Force.

  16. A multi-level surface rebalancing approach for efficient convergence acceleration of 3D full core multi-group fine grid nodal diffusion iterations

    International Nuclear Information System (INIS)

    Geemert, René van

    2014-01-01

    Highlights: • New type of multi-level rebalancing approach for nodal transport. • Generally improved and more mesh-independent convergence behavior. • Importance for intended regime of 3D pin-by-pin core computations. - Abstract: A new multi-level surface rebalancing (MLSR) approach has been developed, aimed at enabling an improved non-linear acceleration of nodal flux iteration convergence in 3D steady-state and transient reactor simulation. This development is meant specifically for anticipating computational needs for solving envisaged multi-group diffusion-like SP N calculations with enhanced mesh resolution (i.e. 3D multi-box up to 3D pin-by-pin grid). For the latter grid refinement regime, the previously available multi-level coarse mesh rebalancing (MLCMR) strategy has been observed to become increasingly inefficient with increasing 3D mesh resolution. Furthermore, for very fine 3D grids that feature a very fine axial mesh as well, non-convergence phenomena have been observed to emerge. In the verifications pursued up to now, these problems have been resolved by the new approach. The novelty arises from taking the interface current balance equations defined over all Cartesian box edges, instead of the nodal volume-integrated process-rate balance equation, as an appropriate restriction basis for setting up multi-level acceleration of fine grid interface current iterations. The new restriction strategy calls for the use of a newly derived set of adjoint spectral equations that are needed for computing a limited set of spectral response vectors per node. This enables a straightforward determination of group-condensed interface current spectral coupling operators that are of crucial relevance in the new rebalancing setup. Another novelty in the approach is a new variational method for computing the neutronic eigenvalue. Within this context, the latter is treated as a control parameter for driving another, newly defined and numerically more fundamental

  17. Semantic Security: Privacy Definitions Revisited

    OpenAIRE

    Jinfei Liu; Li Xiong; Jun Luo

    2013-01-01

    In this paper we illustrate a privacy framework named Indistinguishabley Privacy. Indistinguishable privacy could be deemed as the formalization of the existing privacy definitions in privacy preserving data publishing as well as secure multi-party computation. We introduce three representative privacy notions in the literature, Bayes-optimal privacy for privacy preserving data publishing, differential privacy for statistical data release, and privacy w.r.t. semi-honest behavior in the secure...

  18. Space Vector Pulse Width Modulation of a Multi-Level Diode ...

    African Journals Online (AJOL)

    Space Vector Pulse Width Modulation of a Multi-Level Diode Clamped ... of MATLAB /SIMULINK modeling of the space vector pulse-width modulation and the ... two adjacent active vectors in determining the switching process of the multilevel ...

  19. ITIL Based Service Level Management if SLAs Cover Security

    Directory of Open Access Journals (Sweden)

    Tomas Feglar

    2005-08-01

    Full Text Available Current level of information technology creates new perspectives for more IT service oriented market. Quality of these services requires slightly different approach then was applied for products including software. No IT services are delivered and supported in risk free environment. Risks would be considered consistently with IT services quality gaps from Service Level Management (SLM perspective. SLM is one of ITIL modules that are widely used within the IT service industry. We identified some weaknesses in how SLM is developed in ITIL environment if service level agreement (SLA has cover Security. We argue that in such cases Architecture modeling and risk assessment approach let us effectively control analytical effort that relates to risks identification and understanding. Risk driven countermeasures designed in a next step (Risk treatment have significant impact to the SLM especially from responsibility perspective. To demonstrate SLM's importance in real practice we analyze SLA synthesize process in CCI (Cyber Critical Infrastructure environment.

  20. Multi-Level Risk Factors for Suicidal Ideation Among at-Risk Adolescent Females: The Role of Hypothalamic-Pituitary-Adrenal Axis Responses to Stress

    Science.gov (United States)

    Calhoun, Casey D.; Hastings, Paul D.; Rudolph, Karen D.; Nock, Matthew K.; Prinstein, Mitchell J.

    2014-01-01

    Adopting a multi-level approach, this study examined risk factors for adolescent suicidal ideation, with specific attention to (a) hypothalamic-pituitary-adrenal (HPA) axis stress responses and (b) the interplay between HPA-axis and other risk factors from multiple domains (i.e., psychological, interpersonal and biological). Participants were 138 adolescent females (Mage=14.13 years, SD=1.40) at risk for suicidal behaviors. At baseline, lifetime suicidal ideation and a number of risk factors were assessed (i.e., depressive symptoms, impulsiveness, pubertal status and peer stress). Participants were exposed to a psychosocial stress task and HPA-axis responses were assessed by measuring cortisol levels pre- and post-stressor. At 3 months post-baseline, suicidal ideation again was assessed. Using group-based trajectory modeling, three groups of cortisol stress-response patterns were identified (i.e., hyporesponsive, normative, and hyperresponsive). As compared to females in the normative and hyporesponsive group, females in the hyperresponsive group were more likely to report a lifetime history of suicidal ideation at baseline, above and beyond the effects of the other predictors. Moreover, as compared to females in the normative group, females in the hyperresponsive group were at increased risk for reporting suicidal ideation 3 months later, after controlling for prior ideation. No interactions between cortisol group and the other risk factors were significant, with the exception of a non-significant trend between impulsiveness and cortisol group on lifetime suicidal ideation. Findings highlight the importance of HPA-axis responses to acute stressors as a risk factor for suicidal ideation among adolescents. PMID:24958308

  1. A comparative approach to nuclear safety and nuclear security

    International Nuclear Information System (INIS)

    2009-01-01

    The operators in charge of nuclear facilities or activities have to deal with nuclear and radiological risks, which implies implementing two complementary approaches - safety and security - each of which entails specific methods. Targeting the same ultimate purpose, these two approaches must interact to mutually reinforce each other, without compromising one another. In this report, IRSN presents its reflections on the subject, drawing on its expertise in assessing risks on behalf of the French safety and security authorities, together with the lessons learned from sharing experience at international level. Contents: 1 - Purpose and context: Definitions, Similar risks but different causes, Transparency and confidentiality, Synergy in dealing with sabotage, A common purpose: protecting Man and the environment; 2 - Organizational principles: A legislative and regulatory framework relative to safety as well as security, The competent nuclear safety and security authorities, A difference in the distribution of responsibilities between the operators and the State (Prime responsibility of operators, A different involvement of the State), Safety culture and security culture; 3 - Principles for the application of safety and security approaches: Similar design principles (The graded approach, Defence-in-depth, Synergy between safety and security), Similar operating principles (The same requirement regarding constant monitoring, The same need to take account of feedback, The same need to update the baseline, Sharing good practices is more restricted in the area of security, The need to deal with the respective requirements of safety and security), Similar emergency management (Developing emergency and contingency plans, Carrying out exercises), Activities subject to quality requirements; 4 - Conclusion

  2. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  3. Multi-Level Risk Assessment of a Power Plant Gas Turbine Applying ...

    African Journals Online (AJOL)

    Multi-Level Risk Assessment of a Power Plant Gas Turbine Applying the Criticality Index Model. ... Journal of the Nigerian Association of Mathematical Physics ... This study has carefully shown and expressed a step by step computation of the severity level of the Turbine component parts, using the Criticality Index model.

  4. A multi-band, multi-level, multi-electron model for efficient FDTD simulations of electromagnetic interactions with semiconductor quantum wells

    Science.gov (United States)

    Ravi, Koustuban; Wang, Qian; Ho, Seng-Tiong

    2015-08-01

    We report a new computational model for simulations of electromagnetic interactions with semiconductor quantum well(s) (SQW) in complex electromagnetic geometries using the finite-difference time-domain method. The presented model is based on an approach of spanning a large number of electron transverse momentum states in each SQW sub-band (multi-band) with a small number of discrete multi-electron states (multi-level, multi-electron). This enables accurate and efficient two-dimensional (2-D) and three-dimensional (3-D) simulations of nanophotonic devices with SQW active media. The model includes the following features: (1) Optically induced interband transitions between various SQW conduction and heavy-hole or light-hole sub-bands are considered. (2) Novel intra sub-band and inter sub-band transition terms are derived to thermalize the electron and hole occupational distributions to the correct Fermi-Dirac distributions. (3) The terms in (2) result in an explicit update scheme which circumvents numerically cumbersome iterative procedures. This significantly augments computational efficiency. (4) Explicit update terms to account for carrier leakage to unconfined states are derived, which thermalize the bulk and SQW populations to a common quasi-equilibrium Fermi-Dirac distribution. (5) Auger recombination and intervalence band absorption are included. The model is validated by comparisons to analytic band-filling calculations, simulations of SQW optical gain spectra, and photonic crystal lasers.

  5. Secure wireless embedded systems via component-based design

    DEFF Research Database (Denmark)

    Hjorth, T.; Torbensen, R.

    2010-01-01

    This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure applications through verified, reusable software. Following this method we propose a security framework with a secure c......, with full support for confidentiality, authentication, and integrity using keypairs. The approach has been demonstrated in a multi-platform home automation prototype that can remotely unlock a door using a PDA over the Internet....

  6. Secure Communications over Wireless Networks Even 1-bit Feedback Helps Achieving Security

    KAUST Repository

    Rezki, Zouheir

    2016-01-06

    Recently, there have been a surge toward developing sophisticated security mechanisms based on a cross layer design. While an extensive progress has been realized toward establishing physical layer security as an important design paradigm to enhance security of existing wireless networks, only a little effort has been made toward designing practical coding schemes that achieve or approach the secrecy capacity. Most of existing results are tied to some simplifying assumptions that do not seem always reasonable (passive eavesdropper, perfect channel state information (CSI), etc.). Furthermore, it is still not very clear how to exploit physical layer security paradigms, together with existing cryptosystems, in order to add a supplementary level of protection for information transmission or to achieve key agreement. In this talk, we address the first part of the above problematic, i.e., the effect of channel uncertainty on network security. Particularly, we show that even a coarse estimate of the main channel (channel between the transmitter and the legitimate receiver) can help providing a positive secrecy rate. Specifically, we assume two types of channel uncertainty at the transmitter. The first one is a rate-limited feedback in a block fading channel where the feedback information can be proactive (at the beginning of the coherence block) or of ARQ-type. The second type of uncertainty takes the form of a noisy estimate of the main channel at the transmitter in a fast fading channel. In both cases, we provide upper and lower bounds on the secrecy capacity. We argue how our achievable schemes and upper bounding techniques extend to multi-user setting (broadcasting a single confidential message or multiple confidential messages to multiple legitimate receivers) and to multiple antenna channels.

  7. Secure Communications over Wireless Networks Even 1-bit Feedback Helps Achieving Security

    KAUST Repository

    Rezki, Zouheir

    2016-01-01

    Recently, there have been a surge toward developing sophisticated security mechanisms based on a cross layer design. While an extensive progress has been realized toward establishing physical layer security as an important design paradigm to enhance security of existing wireless networks, only a little effort has been made toward designing practical coding schemes that achieve or approach the secrecy capacity. Most of existing results are tied to some simplifying assumptions that do not seem always reasonable (passive eavesdropper, perfect channel state information (CSI), etc.). Furthermore, it is still not very clear how to exploit physical layer security paradigms, together with existing cryptosystems, in order to add a supplementary level of protection for information transmission or to achieve key agreement. In this talk, we address the first part of the above problematic, i.e., the effect of channel uncertainty on network security. Particularly, we show that even a coarse estimate of the main channel (channel between the transmitter and the legitimate receiver) can help providing a positive secrecy rate. Specifically, we assume two types of channel uncertainty at the transmitter. The first one is a rate-limited feedback in a block fading channel where the feedback information can be proactive (at the beginning of the coherence block) or of ARQ-type. The second type of uncertainty takes the form of a noisy estimate of the main channel at the transmitter in a fast fading channel. In both cases, we provide upper and lower bounds on the secrecy capacity. We argue how our achievable schemes and upper bounding techniques extend to multi-user setting (broadcasting a single confidential message or multiple confidential messages to multiple legitimate receivers) and to multiple antenna channels.

  8. Secure Nearest Neighbor Query on Crowd-Sensing Data

    Directory of Open Access Journals (Sweden)

    Ke Cheng

    2016-09-01

    Full Text Available Nearest neighbor queries are fundamental in location-based services, and secure nearest neighbor queries mainly focus on how to securely and quickly retrieve the nearest neighbor in the outsourced cloud server. However, the previous big data system structure has changed because of the crowd-sensing data. On the one hand, sensing data terminals as the data owner are numerous and mistrustful, while, on the other hand, in most cases, the terminals find it difficult to finish many safety operation due to computation and storage capability constraints. In light of they Multi Owners and Multi Users (MOMU situation in the crowd-sensing data cloud environment, this paper presents a secure nearest neighbor query scheme based on the proxy server architecture, which is constructed by protocols of secure two-party computation and secure Voronoi diagram algorithm. It not only preserves the data confidentiality and query privacy but also effectively resists the collusion between the cloud server and the data owners or users. Finally, extensive theoretical and experimental evaluations are presented to show that our proposed scheme achieves a superior balance between the security and query performance compared to other schemes.

  9. A novel method for a multi-level hierarchical composite with brick-and-mortar structure.

    Science.gov (United States)

    Brandt, Kristina; Wolff, Michael F H; Salikov, Vitalij; Heinrich, Stefan; Schneider, Gerold A

    2013-01-01

    The fascination for hierarchically structured hard tissues such as enamel or nacre arises from their unique structure-properties-relationship. During the last decades this numerously motivated the synthesis of composites, mimicking the brick-and-mortar structure of nacre. However, there is still a lack in synthetic engineering materials displaying a true hierarchical structure. Here, we present a novel multi-step processing route for anisotropic 2-level hierarchical composites by combining different coating techniques on different length scales. It comprises polymer-encapsulated ceramic particles as building blocks for the first level, followed by spouted bed spray granulation for a second level, and finally directional hot pressing to anisotropically consolidate the composite. The microstructure achieved reveals a brick-and-mortar hierarchical structure with distinct, however not yet optimized mechanical properties on each level. It opens up a completely new processing route for the synthesis of multi-level hierarchically structured composites, giving prospects to multi-functional structure-properties relationships.

  10. A novel method for a multi-level hierarchical composite with brick-and-mortar structure

    Science.gov (United States)

    Brandt, Kristina; Wolff, Michael F. H.; Salikov, Vitalij; Heinrich, Stefan; Schneider, Gerold A.

    2013-07-01

    The fascination for hierarchically structured hard tissues such as enamel or nacre arises from their unique structure-properties-relationship. During the last decades this numerously motivated the synthesis of composites, mimicking the brick-and-mortar structure of nacre. However, there is still a lack in synthetic engineering materials displaying a true hierarchical structure. Here, we present a novel multi-step processing route for anisotropic 2-level hierarchical composites by combining different coating techniques on different length scales. It comprises polymer-encapsulated ceramic particles as building blocks for the first level, followed by spouted bed spray granulation for a second level, and finally directional hot pressing to anisotropically consolidate the composite. The microstructure achieved reveals a brick-and-mortar hierarchical structure with distinct, however not yet optimized mechanical properties on each level. It opens up a completely new processing route for the synthesis of multi-level hierarchically structured composites, giving prospects to multi-functional structure-properties relationships.

  11. Problems of Ensuring Complex Business Security in the Conditions of Modern Globalization

    Directory of Open Access Journals (Sweden)

    Anatoliy Petrovich Sterkhov

    2015-12-01

    Full Text Available From the viewpoint of ensuring complex business security, the relevance of the present work is associated with the rationale of multilevel hierarchical approach to the classification of security threats in the age of globalization. The specificity of the threats specific to one or another level of the economy, helps to better understand and consequently to build an effective system of ensuring complex business security. For each of the nine hierarchical levels of the economy the author identifies the main threats to the business, as well as the objects and subjects of this study. It is noted that the performance of the business in the form of a complex hierarchical system depends on the principle of specification. The author gives examples of the use of the basic principles of specification. It is noted that the decomposition of the economic system from the viewpoint of its hierarchical nature is of great importance not only to the distribution of the goals and objectives of security of business levels of the system, but their subordination corresponding to each level. The result is the development of specific recommendations and elaboration of the main directions to ensure complex business security for mega-, macro-, micro-, mini-, nano - and mesoeconomic levels. Although the priority of action in multi-level hierarchical system is directed from the upper to the lower levels, the success of the system as a whole depends on the behavior of all system components. It is stated that the interaction with the environment in business occurs mainly in the lower levels of the hierarchy. The quality system of ensuring complex business security which deals with hierarchical positions, will depend not so much on top-level elements, but on response to intervention on the part of lower level, more precisely from their total effect. In other words, the quality of the system of integrated safety management business provides organized feedbacks in the system.

  12. Multi sensor national cyber security data fusion

    CSIR Research Space (South Africa)

    Swart, I

    2015-03-01

    Full Text Available in a real world system. The data examined will then be applied to a case study that will show the results of applying available open source security information against the model to relate to the current South African cyber landscape....

  13. Relationship status and relationship instability, but not dominance, predict individual differences in baseline cortisol levels.

    Directory of Open Access Journals (Sweden)

    Dario Maestripieri

    Full Text Available We investigated variation in baseline cortisol levels in relation to relationship status (single or in a relationship, relationship characteristics (length, stability, presence or absence of clear dominance, or individual attributes (dominant or subordinate status, relative physical attractiveness, relationship worries. Study participants were 77 men and 75 women aged between 18 and 38 years. Individuals in romantic relationships had lower cortisol levels than singles. Individuals of African ethnicity, however, showed the opposite pattern. Individuals who perceived their relationship to be highly unstable had higher cortisol levels. Aside from African-Americans, married individuals reported the lowest relationship instability and the lowest cortisol levels, followed by individuals in long-term relationships, and by individuals in short-term relationships. The presence or absence of clear dominance in the relationship, dominance status, or relationship worries did not affect cortisol levels. Therefore relationship status and relationship instability were better predictors of variation in cortisol (presumably through stress-related mechanisms than individual attributes.

  14. Relationship status and relationship instability, but not dominance, predict individual differences in baseline cortisol levels.

    Science.gov (United States)

    Maestripieri, Dario; Klimczuk, Amanda C E; Seneczko, Marianne; Traficonte, Daniel M; Wilson, M Claire

    2013-01-01

    We investigated variation in baseline cortisol levels in relation to relationship status (single or in a relationship), relationship characteristics (length, stability, presence or absence of clear dominance), or individual attributes (dominant or subordinate status, relative physical attractiveness, relationship worries). Study participants were 77 men and 75 women aged between 18 and 38 years. Individuals in romantic relationships had lower cortisol levels than singles. Individuals of African ethnicity, however, showed the opposite pattern. Individuals who perceived their relationship to be highly unstable had higher cortisol levels. Aside from African-Americans, married individuals reported the lowest relationship instability and the lowest cortisol levels, followed by individuals in long-term relationships, and by individuals in short-term relationships. The presence or absence of clear dominance in the relationship, dominance status, or relationship worries did not affect cortisol levels. Therefore relationship status and relationship instability were better predictors of variation in cortisol (presumably through stress-related mechanisms) than individual attributes.

  15. Security Belt for Wireless Implantable Medical Devices.

    Science.gov (United States)

    Kulaç, Selman

    2017-09-19

    In this study, a new protective design compatible with existing non-secure systems was proposed, since it is focused on the secure communication of wireless IMD systems in all transmissions. This new protector is an external wearable device and appears to be a belt fitted around for the patients IMD implanted. However, in order to provide effective full duplex transmissions and physical layer security, some sophisticated transceiver antennas have been placed on the belt. In this approach, beam-focused multi-antennas in optimal positions on the belt are randomly switched when transmissions to the IMD are performed and multi-jammer switching with MRC combining or majority-rule based receiving techniques are applied when transmissions from the IMD are carried out. This approach can also reduce the power consumption of the IMDs and contribute to the prolongation of the IMD's battery life.

  16. Empirically Examining the Performance of Approaches to Multi-Level Matching to Study the Effect of School-Level Interventions

    Science.gov (United States)

    Hallberg, Kelly; Cook, Thomas D.; Figlio, David

    2013-01-01

    The goal of this paper is to provide guidance for applied education researchers in using multi-level data to study the effects of interventions implemented at the school level. Two primary approaches are currently employed in observational studies of the effect of school-level interventions. One approach employs intact school matching: matching…

  17. Water security at local government level in South Africa: a qualitative interview-based analysis

    Directory of Open Access Journals (Sweden)

    Richard Meissner, DPhil

    2018-05-01

    Full Text Available Background: As one of the 40 driest countries in the world with an annual average rainfall of 497 mm, South Africa is a water-scarce country. Additionally, South Africa's rate of economic development is closely linked to its water security. Thus, increasing water stress, supply variability, flooding, and water pollution levels and inadequate access to safe drinking water and sanitation are slowing economic growth. Despite the high premium placed on South Africa's water resources, no commonly shared understanding of water security exists. The aim of this study was to research, using qualitative social scientific methods, how people in two South African localities understand water security. Methods: We used interviews and qualitative analyses to establish and compare how people from different lifestyles perceive water security in the Greater Sekhukhune District and the eThekwini Metropolitan Municipalities of South Africa. The inland Sekhukhune has a drier climate and more rural socioeconomic profile than the coastal, urbanised eThekwini with its complex economy and diverse socioeconomic structure. We did face-to-face structured interviews with a diverse stakeholder group consisting of community members, traditional leaders, municipal officials, researchers, business people, and farmers in each municipality and focus groups in two communities of each municipality: Leeuwfontein and Motetema (Sekhukhune and Inanda and Ntshongweni (eThekwini. Each interview lasted 40–60 min, and focus group discussions lasted 90–120 min. We asked the respondents about their understanding of the concept of water security and whether they believe that, at the local and national level, the authorities had achieved water security for all. Findings: Following a qualitative analysis, we found that water security is a state of mind based on context-specific (ie, localised and individualised perceptions held by an individual of water-related threats and how it influences

  18. Baseline blood levels of manganese, lead, cadmium, copper, and zinc in residents of Beijing suburb

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Long-Lian, E-mail: Longlian57@163.com [Department of Occupational Diseases Control and Prevention, Fengtai Center for Disease Control and Prevention, Beijing 100071 (China); Lu, Ling [Department of Occupational Diseases Control and Prevention, Fengtai Center for Disease Control and Prevention, Beijing 100071 (China); Pan, Ya-Juan; Ding, Chun-Guang [Institute for Occupational Health and Poison Control in China Center for Disease Prevention and Control, Beijing 100050 (China); Xu, Da-Yong [Department of Occupational Diseases Control and Prevention, Fengtai Center for Disease Control and Prevention, Beijing 100071 (China); Huang, Chuan-Feng; Pan, Xing-Fu [Institute for Occupational Health and Poison Control in China Center for Disease Prevention and Control, Beijing 100050 (China); Zheng, Wei, E-mail: wzheng@purdue.edu [School of Health Sciences, Purdue University, West Lafayette, IN 47907 (United States)

    2015-07-15

    Baseline blood concentrations of metals are important references for monitoring metal exposure in environmental and occupational settings. The purpose of this study was to determine the blood levels of manganese (Mn), copper (Cu), zinc (Zn), lead (Pb), and cadmium (Cd) among the residents (aged 12–60 years old) living in the suburb southwest of Beijing in China and to compare the outcomes with reported values in various developed countries. Blood samples were collected from 648 subjects from March 2009 to February 2010. Metal concentrations in the whole blood were determined by ICP-MS. The geometric means of blood levels of Mn, Cu, Zn, Pb and Cd were 11.4, 802.4, 4665, 42.6, and 0.68 µg/L, respectively. Male subjects had higher blood Pb than the females, while the females had higher blood Mn and Cu than the males. There was no gender difference for blood Cd and Zn. Smokers had higher blood Cu, Zn, and Cd than nonsmokers. There were significant age-related differences in blood levels of all metals studied; subjects in the 17–30 age group had higher blood levels of Mn, Pb, Cu, and Zn, while those in the 46–60 age group had higher Cd than the other age groups. A remarkably lower blood level of Cu and Zn in this population as compared with residents of other developed countries was noticed. Based on the current study, the normal reference ranges for the blood Mn were estimated to be 5.80–25.2 μg/L; for blood Cu, 541–1475 μg/L; for blood Zn, 2349–9492 μg/L; for blood Pb, <100 μg/L; and for blood Cd, <5.30 μg/L in the general population living in Beijing suburbs. - Highlights: • Baseline blood levels of metals in residents of Beijing suburb are investigated. • BMn and BPb in this cohort are higher than those in other developed countries. • Remarkably lower blood levels of Cu and Zn in this Chinese cohort are noticed. • The reference values for blood levels of Mn, Cu, Zn, Pb, and Cd are established.

  19. Baseline blood levels of manganese, lead, cadmium, copper, and zinc in residents of Beijing suburb

    International Nuclear Information System (INIS)

    Zhang, Long-Lian; Lu, Ling; Pan, Ya-Juan; Ding, Chun-Guang; Xu, Da-Yong; Huang, Chuan-Feng; Pan, Xing-Fu; Zheng, Wei

    2015-01-01

    Baseline blood concentrations of metals are important references for monitoring metal exposure in environmental and occupational settings. The purpose of this study was to determine the blood levels of manganese (Mn), copper (Cu), zinc (Zn), lead (Pb), and cadmium (Cd) among the residents (aged 12–60 years old) living in the suburb southwest of Beijing in China and to compare the outcomes with reported values in various developed countries. Blood samples were collected from 648 subjects from March 2009 to February 2010. Metal concentrations in the whole blood were determined by ICP-MS. The geometric means of blood levels of Mn, Cu, Zn, Pb and Cd were 11.4, 802.4, 4665, 42.6, and 0.68 µg/L, respectively. Male subjects had higher blood Pb than the females, while the females had higher blood Mn and Cu than the males. There was no gender difference for blood Cd and Zn. Smokers had higher blood Cu, Zn, and Cd than nonsmokers. There were significant age-related differences in blood levels of all metals studied; subjects in the 17–30 age group had higher blood levels of Mn, Pb, Cu, and Zn, while those in the 46–60 age group had higher Cd than the other age groups. A remarkably lower blood level of Cu and Zn in this population as compared with residents of other developed countries was noticed. Based on the current study, the normal reference ranges for the blood Mn were estimated to be 5.80–25.2 μg/L; for blood Cu, 541–1475 μg/L; for blood Zn, 2349–9492 μg/L; for blood Pb, <100 μg/L; and for blood Cd, <5.30 μg/L in the general population living in Beijing suburbs. - Highlights: • Baseline blood levels of metals in residents of Beijing suburb are investigated. • BMn and BPb in this cohort are higher than those in other developed countries. • Remarkably lower blood levels of Cu and Zn in this Chinese cohort are noticed. • The reference values for blood levels of Mn, Cu, Zn, Pb, and Cd are established

  20. m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting.

    Science.gov (United States)

    Miao, Yinbin; Ma, Jianfeng; Liu, Ximeng; Wei, Fushan; Liu, Zhiquan; Wang, Xu An

    2016-11-01

    Online personal health record (PHR) is more inclined to shift data storage and search operations to cloud server so as to enjoy the elastic resources and lessen computational burden in cloud storage. As multiple patients' data is always stored in the cloud server simultaneously, it is a challenge to guarantee the confidentiality of PHR data and allow data users to search encrypted data in an efficient and privacy-preserving way. To this end, we design a secure cryptographic primitive called as attribute-based multi-keyword search over encrypted personal health records in multi-owner setting to support both fine-grained access control and multi-keyword search via Ciphertext-Policy Attribute-Based Encryption. Formal security analysis proves our scheme is selectively secure against chosen-keyword attack. As a further contribution, we conduct empirical experiments over real-world dataset to show its feasibility and practicality in a broad range of actual scenarios without incurring additional computational burden.

  1. Extending multi-tenant architectures: a database model for a multi-target support in SaaS applications

    Science.gov (United States)

    Rico, Antonio; Noguera, Manuel; Garrido, José Luis; Benghazi, Kawtar; Barjis, Joseph

    2016-05-01

    Multi-tenant architectures (MTAs) are considered a cornerstone in the success of Software as a Service as a new application distribution formula. Multi-tenancy allows multiple customers (i.e. tenants) to be consolidated into the same operational system. This way, tenants run and share the same application instance as well as costs, which are significantly reduced. Functional needs vary from one tenant to another; either companies from different sectors run different types of applications or, although deploying the same functionality, they do differ in the extent of their complexity. In any case, MTA leaves one major concern regarding the companies' data, their privacy and security, which requires special attention to the data layer. In this article, we propose an extended data model that enhances traditional MTAs in respect of this concern. This extension - called multi-target - allows MT applications to host, manage and serve multiple functionalities within the same multi-tenant (MT) environment. The practical deployment of this approach will allow SaaS vendors to target multiple markets or address different levels of functional complexity and yet commercialise just one single MT application. The applicability of the approach is demonstrated via a case study of a real multi-tenancy multi-target (MT2) implementation, called Globalgest.

  2. Microcontroller based multi-channel ultrasonic level monitoring system

    International Nuclear Information System (INIS)

    Ambastha, K.P.; Chaudhari, Y.V.; Singh, Inder Jeet; Chadda, V.K.

    2004-01-01

    Microcontroller based Multi-channel Ultrasonic Level Monitoring System developed by Computer Division is based on echo ranging techniques to monitor level. The transmitter directs an ultrasonic burst towards the liquid, which gets reflected from the top of the liquid surface. The time taken for ultrasound to travel from the transmitter to the top of liquid surface is measured and used to calculate the liquid level. The system provides for temperature compensation for accurate measurement as the ultrasound velocity depends on the ambient temperature. It can measure liquid level up to 5 meters. A single monitor can be used to measure level in 6 tanks. PC connectivity has been provided via RS 232 and RS 485 for remote operation and data logging of level. A GUI program developed using LABVIEW package displays level on PC monitor. The program provides for pictorial as well as numerical display for level and temperature in the front panel on the PC monitor. A user can monitor level for any or all tanks from the PC. One unit is installed at CIRUS for measuring level in Acid/ Alkali tanks and one is installed at APSARA for measuring water level in the reactor pool. (author)

  3. Multi-objective congestion management by modified augmented ε-constraint method

    International Nuclear Information System (INIS)

    Esmaili, Masoud; Shayanfar, Heidar Ali; Amjady, Nima

    2011-01-01

    Congestion management is a vital part of power system operations in recent deregulated electricity markets. However, after relieving congestion, power systems may be operated with a reduced voltage or transient stability margin because of hitting security limits or increasing the contribution of risky participants. Therefore, power system stability margins should be considered within the congestion management framework. The multi-objective congestion management provides not only more security but also more flexibility than single-objective methods. In this paper, a multi-objective congestion management framework is presented while simultaneously optimizing the competing objective functions of congestion management cost, voltage security, and dynamic security. The proposed multi-objective framework, called modified augmented ε-constraint method, is based on the augmented ε-constraint technique hybridized by the weighting method. The proposed framework generates candidate solutions for the multi-objective problem including only efficient Pareto surface enhancing the competitiveness and economic effectiveness of the power market. Besides, the relative importance of the objective functions is explicitly modeled in the proposed framework. Results of testing the proposed multi-objective congestion management method on the New-England test system are presented and compared with those of the previous single objective and multi-objective techniques in detail. These comparisons confirm the efficiency of the developed method. (author)

  4. Permission-based Index Clustering for Secure Multi-User Search

    OpenAIRE

    Eirini C. Micheli; Giorgos Margaritis; Stergios V. Anastasiadis

    2015-01-01

    Secure keyword search in shared infrastructures prevents stored documents from leaking sensitive information to unauthorized users. A shared index provides confidentiality if it is exclusively used by users authorized to search all the indexed documents. We introduce the Lethe indexing workflow to improve query and update efficiency in secure keyword search. The Lethe workflow clusters together documents with similar sets of authorized users, and creates shared indices for configurable docume...

  5. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  6. Antecedents of Organisational Creativity: A Multi-Level Approach

    Directory of Open Access Journals (Sweden)

    Ritu Gupta

    2016-06-01

    Full Text Available The purpose of this literature review is to provide a better understanding of the antecedents of organisational creativity with a multi-level approach. Organisational creativity is a sum total of the creativity accounted for by the individual employees of the organisation, the cumulative creativity of a team or group and creativity arising out of different structural components of an organisation. Some of the antecedents identified from the literature include personality, intrinsic motivation, group cohesion, social inhibition, cognitive interference, leader member exchange, organisational culture and climate, amongst others at individual, group and organisational level. Based on the literature review, suggestions for future research and research propositions have been proposed.

  7. Association of low baseline free thyroxin levels with progression of coronary artery calcification over 4 years in euthyroid subjects: the Kangbuk Samsung Health Study.

    Science.gov (United States)

    Park, Hye-Jeong; Kim, Jihyun; Han, Eun Jin; Park, Se Eun; Park, Cheol-Young; Lee, Won-Young; Oh, Ki-Won; Park, Sung-Woo; Rhee, Eun-Jung

    2016-06-01

    Overt and subclinical hypothyroidism are risk factors for atherosclerosis and cardiovascular diseases. It is unclear whether thyroid hormone levels within the normal range are also associated with atherosclerosis measured by coronary artery calcium (CAC). This study aimed to examine the relationship between normal variations in thyroid function and changes in CAC. We conducted a 4-year retrospective study of 2173 apparently healthy men and women with normal thyroid hormone levels. Their free thyroxin (FT4), free triiodothyronin (FT3) and thyroid-stimulating hormone (TSH) levels were measured by electrochemiluminescent immunoassay. The CAC score (CACS) of each subject was measured by multidetector computed tomography in both 2010 and 2014. Progression of CAC was defined as a CACS change over 4 years > 0. The mean CACS changes over 4 years by quartiles of baseline FT4 level (lowest to highest) were 12·9, 8·43, 7·82 and 7·81 (P = 0·028). CAC progression was not significantly associated with either the baseline FT3 or TSH levels. The odds ratios (OR) for CAC progression over 4 years (highest vs lowest quartile for baseline FT4) were 0·647 (95% confidence interval (CI) 0·472-0·886) after adjustment for confounding factor, which were attenuated with further adjustment for lipid profiles, homoeostasis model assessment of insulin resistance, high-sensitivity C-reactive protein and hypertension [0·747 (95% CI 0·537-1·038)]. Quartiles of baseline FT3 or TSH level did not show any increased OR for CAC progression after adjustment for confounding factors. In this cohort of euthyroid men and women, a low baseline FT4 level was associated with a high risk of CACS progression over 4 years. © 2015 John Wiley & Sons Ltd.

  8. Analysis of radiological protection and security in the radioactive diagnosis area in a third level hospital

    International Nuclear Information System (INIS)

    Azorin Vega, J.C.; Aazorin Nieto, J.; Rivera Montalvo, T.

    1998-01-01

    Results from the evaluation made to radiological security and protection conditions prevailing in 13 medical diagnosis rooms with X rays at the National Nutrition Institute Zlavador Zubiran (third level hospital), aiming to give adequate protection and radiological security devices to the staff exposed from that hospital and to comply fully with requirements set by the standards

  9. A Dynamic Multi-Level Factor Model with Long-Range Dependence

    DEFF Research Database (Denmark)

    Ergemen, Yunus Emre; Rodríguez-Caballero, Carlos Vladimir

    A dynamic multi-level factor model with stationary or nonstationary global and regional factors is proposed. In the model, persistence in global and regional common factors as well as innovations allows for the study of fractional cointegrating relationships. Estimation of global and regional...

  10. Effect of different levels of sunflower meal and multi-enzyme ...

    African Journals Online (AJOL)

    Helianthus annus; SFM) levels and a multi-enzyme complex (Natuzyme P50) on performance, biochemical parameters and antioxidant status of laying hens. A total of 288 Hy-Line W-36 laying hens (39-wk-old) were divided into six groups with six ...

  11. Habit, custom, and power: a multi-level theory of population health.

    Science.gov (United States)

    Zimmerman, Frederick J

    2013-03-01

    In multi-level theory, individual behavior flows from cognitive habits, either directly through social referencing, rules of thumb, or automatic behaviors; or indirectly through the shaping of rationality itself by framing or heuristics. Although behavior does not arise from individually rational optimization, it generally appears to be rational, because the cognitive habits that guide behavior evolve toward optimality. However, power imbalances shaped by particular social, political, and economic structures can distort this evolution, leading to individual behavior that fails to maximize individual or social well-being. Replacing the dominant rational-choice paradigm with a multi-level theoretical paradigm involving habit, custom, and power will enable public health to engage in rigorous new areas of research. Copyright © 2013 Elsevier Ltd. All rights reserved.

  12. Microsoft Security Bible A Collection of Practical Security Techniques

    CERN Document Server

    Mullen, Timothy "Thor"

    2011-01-01

    Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. Detailed technical information on security processes for all major Microsoft applications

  13. Probabilistic Teleportation of Multi-particle d-Level Quantum State

    Institute of Scientific and Technical Information of China (English)

    CAO Min; ZHU Shi-Qun

    2005-01-01

    The general scheme for teleportation of a multi-particle d-level quantum state is presented when m pairs of partially entangled particles are utilized as quantum channels. The probabilistic teleportation can be achieved with a successful probability of d-1∏N=0(CN0)2/dM,which is determined by the smallest coefficients of each entangled channels.

  14. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  15. Practical Provably Secure Multi-node Communication

    OpenAIRE

    Ali, Omar; Ayoub, Mahmoud F.; Youssef, Moustafa

    2013-01-01

    We present a practical and provably-secure multimode communication scheme in the presence of a passive eavesdropper. The scheme is based on a random scheduling approach that hides the identity of the transmitter from the eavesdropper. This random scheduling leads to ambiguity at the eavesdropper with regard to the origin of the transmitted frame. We present the details of the technique and analyze it to quantify the secrecy-fairness-overhead trade-off. Implementation of the scheme over Crossb...

  16. Multi-task pose-invariant face recognition.

    Science.gov (United States)

    Ding, Changxing; Xu, Chang; Tao, Dacheng

    2015-03-01

    Face images captured in unconstrained environments usually contain significant pose variation, which dramatically degrades the performance of algorithms designed to recognize frontal faces. This paper proposes a novel face identification framework capable of handling the full range of pose variations within ±90° of yaw. The proposed framework first transforms the original pose-invariant face recognition problem into a partial frontal face recognition problem. A robust patch-based face representation scheme is then developed to represent the synthesized partial frontal faces. For each patch, a transformation dictionary is learnt under the proposed multi-task learning scheme. The transformation dictionary transforms the features of different poses into a discriminative subspace. Finally, face matching is performed at patch level rather than at the holistic level. Extensive and systematic experimentation on FERET, CMU-PIE, and Multi-PIE databases shows that the proposed method consistently outperforms single-task-based baselines as well as state-of-the-art methods for the pose problem. We further extend the proposed algorithm for the unconstrained face verification problem and achieve top-level performance on the challenging LFW data set.

  17. Sediment baseline study of levels and sources of polycyclic aromatic hydrocarbons and heavy metals in Lake Nicaragua

    DEFF Research Database (Denmark)

    Scheibye, Katrine; Weisser, Johan Juhl; Borggaard, Ole K.

    2014-01-01

    Selected metals and polycyclic aromatic hydrocarbons (PAHs) were analyzed in sediment samples from 24 sites in Lake Nicaragua sampled May 2010 to provide a baseline of pollution levels. Cu exceeded the Consensus-Based Sediment Quality Guideline (CBSQG) Threshold Effect Concentrations (TECs) at 21...... showed that the CBSQG TECs were exceeded by naphthalene at five sites. The sum concentrations of the 16 US EPA priority PAHs (∑PAH16) ranged from 0.01mgkg(-1)dw to 0.64mgkg(-1)dw. The highest ∑PAH16 concentration was found upstream in River Mayales and the PAH composition revealed a heavy PAH fraction (e....... This study concluded that areas of Lake Nicaragua represent an important pollution baseline for future studies in this lake and other tropical lakes....

  18. Individual variation in baseline and stress-induced corticosterone and prolactin levels predicts parental effort by nesting mourning doves

    Science.gov (United States)

    Miller, David A.; Vleck, Carol M.; Otis, David L.

    2009-01-01

    Endocrine systems have an important mechanistic role in structuring life-history trade-offs. During breeding, individual variation in prolactin (PRL) and corticosterone (CORT) levels affects behavioral and physiological processes that drive trade-offs between reproduction and self-maintenance. We examined patterns in baseline (BL) and stress induced (SI; level following a standard capture-restraint protocol) levels of PRL and CORT for breeding mourning doves (Zenaida macroura). We determined whether the relationship of adult condition and parental effort to hormone levels in wild birds was consistent with life-history predictions. Both BL PRL and BL CORT level in adults were positively related to nestling weight at early nestling ages, consistent with the prediction of a positive relationship of hormone levels to current parental effort of adults and associated increased energy demand. Results are consistent with the two hormones acting together at baseline levels to limit negative effects of CORT on reproduction while maintaining beneficial effects such as increased foraging for nestling feeding. Our data did not support predictions that SI responses would vary in response to nestling or adult condition. The magnitude of CORT response in the parents to our capture-restraint protocol was negatively correlated with subsequent parental effort. Average nestling weights for adults with the highest SI CORT response were on average 10–15% lighter than expected for their age in follow-up visits after the stress event. Our results demonstrated a relationship between individual hormone levels and within population variation in parental effort and suggested that hormonal control plays an important role in structuring reproductive decisions for mourning doves.

  19. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  20. Enabling multi-level relevance feedback on PubMed by integrating rank learning into DBMS.

    Science.gov (United States)

    Yu, Hwanjo; Kim, Taehoon; Oh, Jinoh; Ko, Ilhwan; Kim, Sungchul; Han, Wook-Shin

    2010-04-16

    Finding relevant articles from PubMed is challenging because it is hard to express the user's specific intention in the given query interface, and a keyword query typically retrieves a large number of results. Researchers have applied machine learning techniques to find relevant articles by ranking the articles according to the learned relevance function. However, the process of learning and ranking is usually done offline without integrated with the keyword queries, and the users have to provide a large amount of training documents to get a reasonable learning accuracy. This paper proposes a novel multi-level relevance feedback system for PubMed, called RefMed, which supports both ad-hoc keyword queries and a multi-level relevance feedback in real time on PubMed. RefMed supports a multi-level relevance feedback by using the RankSVM as the learning method, and thus it achieves higher accuracy with less feedback. RefMed "tightly" integrates the RankSVM into RDBMS to support both keyword queries and the multi-level relevance feedback in real time; the tight coupling of the RankSVM and DBMS substantially improves the processing time. An efficient parameter selection method for the RankSVM is also proposed, which tunes the RankSVM parameter without performing validation. Thereby, RefMed achieves a high learning accuracy in real time without performing a validation process. RefMed is accessible at http://dm.postech.ac.kr/refmed. RefMed is the first multi-level relevance feedback system for PubMed, which achieves a high accuracy with less feedback. It effectively learns an accurate relevance function from the user's feedback and efficiently processes the function to return relevant articles in real time.

  1. Baseline levels and trimestral variation of triiodothyronine and thyroxine and their association with mortality in maintenance hemodialysis patients.

    Science.gov (United States)

    Meuwese, Christiaan L; Dekker, Friedo W; Lindholm, Bengt; Qureshi, Abdul R; Heimburger, Olof; Barany, Peter; Stenvinkel, Peter; Carrero, Juan J

    2012-01-01

    Conflicting evidence exists with regard to the association of thyroid hormones and mortality in dialysis patients. This study assesses the association between basal and trimestral variation of thyroid stimulating hormone, triiodothyronine, and thyroxine and mortality. In 210 prevalent hemodialysis patients, serum triiodothyronine, thyroxine, thyroid stimulating hormone, and interleukin-6 were measured 3 months apart. Cardiovascular and non-cardiovascular deaths were registered during follow-up. Based on fluctuations along tertiles of distribution, four trimestral patterns were defined for each thyroid hormone: persistently low, decrease, increase, and persistently high. The association of baseline levels and trimestral variation with mortality was investigated with Kaplan-Meier curves and Cox proportional hazard models. During follow-up, 103 deaths occurred. Thyroid stimulating hormone levels did not associate with mortality. Patients with relatively low basal triiodothyronine concentrations had higher hazards of dying than patients with high levels. Longitudinally, patients with persistently low levels of triiodothyronine during the 3-month period had higher mortality hazards than those having persistently high levels. These associations were mainly attributable to cardiovascular-related mortality. The association between thyroxine and mortality was not altered after adjustment for triiodothyronine. Hemodialysis patients with reduced triiodothyronine or thyroxine levels bear an increased mortality risk, especially due to cardiovascular causes. This was true when considering both baseline measurements and trimestral variation patterns. Our longitudinal design adds observational evidence supporting the hypothesis that the link may underlie a causal effect.

  2. Activity Sets in Multi-Organizational Ecologies : A Project-Level Perspective on Sustainable Energy Innovations

    NARCIS (Netherlands)

    Gerrit Willem Ziggers; Kristina Manser; Bas Hillebrand; Paul Driessen; Josée Bloemer

    2014-01-01

    Complex innovations involve multi-organizational ecologies consisting of a myriad of different actors. This study investigates how innovation activities can be interpreted in the context of multi-organizational ecologies. Taking a project-level perspective, this study proposes a typology of four

  3. Cyber Security Policy. A methodology for Determining a National Cyber-Security Alert Level

    OpenAIRE

    Dan Constantin TOFAN; Maria Lavinia ANDREI; Lavinia Mihaela DINCÄ‚

    2012-01-01

    Nowadays, assuring the security of the national cyber-space has become a big issue that can only be tackled through collaborative approaches. Threats cannot be confined to a single computer system just as much as computer systems are rendered useless without being con-nected to a supporting network. The authors of this article propose an innovative architecture of a system designated to help governments collect and analyze data about cyber-security in-cidents, from different organizations, di...

  4. Efficient Multi-Party Computation over Rings

    DEFF Research Database (Denmark)

    Cramer, Ronald; Fehr, Serge; Ishai, Yuval

    2003-01-01

    Secure multi-party computation (MPC) is an active research area, and a wide range of literature can be found nowadays suggesting improvements and generalizations of existing protocols in various directions. However, all current techniques for secure MPC apply to functions that are represented by ...... the usefulness of the above results by presenting a novel application of MPC over (non-field) rings to the round-efficient secure computation of the maximum function. Basic Research in Computer Science (www.brics.dk), funded by the Danish National Research Foundation.......Secure multi-party computation (MPC) is an active research area, and a wide range of literature can be found nowadays suggesting improvements and generalizations of existing protocols in various directions. However, all current techniques for secure MPC apply to functions that are represented...... by (boolean or arithmetic) circuits over finite fields. We are motivated by two limitations of these techniques: – Generality. Existing protocols do not apply to computation over more general algebraic structures (except via a brute-force simulation of computation in these structures). – Efficiency. The best...

  5. [The comparative evaluation of level of security culture in medical organizations].

    Science.gov (United States)

    Roitberg, G E; Kondratova, N V; Galanina, E V

    2016-01-01

    The study was carried out on the basis of clinic “Medicine” in 2014-2015 concerning security culture. The sampling included 465 filled HSPSC questionnaires. The comparative analysis of received was implemented. The “Zubovskaia district hospital” Having no accreditation according security standards and group of clinics from USA functioning for many years in the system of patient security support were selected as objects for comparison. The evaluation was implemented concerning dynamics of security culture in organization at implementation of strategies of security of patients during 5 years and comparison of obtained results with USA clinics was made. The study results demonstrated that in conditions of absence of implemented standards of security in medical organization total evaluation of security remains extremely low. The study of security culture using HSPSC questionnaire is an effective tool for evaluating implementation of various strategies of security ofpatient. The functioning in the system of international standards of quality, primarily JCI standards, permits during several years to achieve high indices of security culture.

  6. Tenant Placement Strategies within Multi-Level Large-Scale Shopping Centers

    OpenAIRE

    Tony Shun-Te Yuo; Colin Lizieri

    2013-01-01

    This paper argues that tenant placement strategies for large-scale multi-unit shopping centers differ depending on the number of floor levels. Two core strategies are identified: dispersion and departmentalization. There exists a trade-off between three income effects: basic footfall effects, spillover effects, and an effective floor area effect, which varies by the number of floor levels. Departmentalization is favored for centers with more than four floors. Greater spatial complexity also p...

  7. Secure Authentication of Cloud Data Mining API

    OpenAIRE

    Bhadauria, Rohit; Borgohain, Rajdeep; Biswas, Abirlal; Sanyal, Sugata

    2013-01-01

    Cloud computing is a revolutionary concept that has brought a paradigm shift in the IT world. This has made it possible to manage and run businesses without even setting up an IT infrastructure. It offers multi-fold benefits to the users moving to a cloud, while posing unknown security and privacy issues. User authentication is one such growing concern and is greatly needed in order to ensure privacy and security in a cloud computing environment. This paper discusses the security at different...

  8. The Integrated Multi-Level Bilingual Teaching of "Social Research Methods"

    Science.gov (United States)

    Zhu, Yanhan; Ye, Jian

    2012-01-01

    "Social Research Methods," as a methodology course, combines theories and practices closely. Based on the synergy theory, this paper tries to establish an integrated multi-level bilingual teaching mode. Starting from the transformation of teaching concepts, we should integrate interactions, experiences, and researches together and focus…

  9. 49 CFR Figure 2b to Subpart B of... - Example of an Intermediate Level Seating Area of a Multi-Level Car Complying With Window Location...

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Example of an Intermediate Level Seating Area of a Multi-Level Car Complying With Window Location Requirements-§§ 238.113 and 238.114 2B Figure 2B to... Intermediate Level Seating Area of a Multi-Level Car Complying With Window Location Requirements—§§ 238.113 and...

  10. 49 CFR Figure 2a to Subpart B of... - Example of an Intermediate Level Seating Area of a Multi-Level Car Complying With Window Location...

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Example of an Intermediate Level Seating Area of a Multi-Level Car Complying With Window Location Requirements-§§ 238.113 and 238.114 2A Figure 2A to... Intermediate Level Seating Area of a Multi-Level Car Complying With Window Location Requirements—§§ 238.113 and...

  11. Multi-Level Marketing - a Tool of Relationship Marketing

    Directory of Open Access Journals (Sweden)

    Constantin C.

    2009-12-01

    Full Text Available This paper aims to analyse the opportunity of using multi-level marketing (MLM as a tool of relationship marketing. The research is firstly based on an analysis regarding the issues about the legality of MLM techniques in the context of EU and US regulation systems. The outcomes of this research stress the main characteristics of legal network marketing and how a person which wants to become independent distributor could avoid the cooperation with an illegal pyramid scheme. The second research is based on a case study at the level of an insurance broker, which emphasizes the benefits that all parties involved in a transaction (broker, distributor and customer could obtain by using an MLM scheme.

  12. X-Switch: An Efficient , Multi-User, Multi-Language Web Application Server

    Directory of Open Access Journals (Sweden)

    Mayumbo Nyirenda

    2010-07-01

    Full Text Available Web applications are usually installed on and accessed through a Web server. For security reasons, these Web servers generally provide very few privileges to Web applications, defaulting to executing them in the realm of a guest ac- count. In addition, performance often is a problem as Web applications may need to be reinitialised with each access. Various solutions have been designed to address these security and performance issues, mostly independently of one another, but most have been language or system-specic. The X-Switch system is proposed as an alternative Web application execution environment, with more secure user-based resource management, persistent application interpreters and support for arbitrary languages/interpreters. Thus it provides a general-purpose environment for developing and deploying Web applications. The X-Switch system's experimental results demonstrated that it can achieve a high level of performance. Further- more it was shown that X-Switch can provide functionality matching that of existing Web application servers but with the added benet of multi-user support. Finally the X-Switch system showed that it is feasible to completely separate the deployment platform from the application code, thus ensuring that the developer does not need to modify his/her code to make it compatible with the deployment platform.

  13. Percutaneous vertebroplasty for multi-level osteoporotic vertebral compression fractures

    International Nuclear Information System (INIS)

    Wang Gefang; Cheng Yongde; Wu Chungen; Zhang Ji; Gu Yifeng; Li Minghua

    2008-01-01

    Objective: To prospectively evaluate the clinical efficiency and safety of patients receiving percutaneous vertebroplasty due to multi-level osteoporotic vertebral compression fractures. Methods: A retrospective study was conducted to review eighty-six osteoporotic vertebral compression fracture patients including 23 with three and more levels of vertebroplasty. The outcome was considered carefully by pre and postoperatively the Visual Analogue Scale (VAS)for pain relief, the Oswestry Disability Index (ODI)for the improvement activity of daily life and also the accompanied imaging information. Results: All procedures were performed successfully. Three patients had a transient high blood pressure and dyspnea, and recovered after sublingual nitroglycerin. The VAS and ODI improved from a mean preoperative score of 8.58±1.12 and 81.43 ±12.54 to a mean postoperative score of 3.03±0.98 and 31.04±11.11 one day afterward. Asymptomatic cement leakage rate was 17.8% with no major complications occurred during operation or post-operation. Five patients had new symptomatic vertebral fracture (s) during follow-up in one year. Conclusions: Vertebroplasty with cement to treat multi-level osteoporotic vertebral compression fractures in the elderly is safe and effective, providing immediate and long-term pain relief with improvement in quality of life. Due to the risk of fat embolism, the limitation of three per session must be kept strictly. (authors)

  14. Sovereignty, Robustness, and Short-Term Energy Security Levels. The Catalonia Case Study

    Energy Technology Data Exchange (ETDEWEB)

    Rosas-Casals, Martí, E-mail: rosas@mmt.upc.edu [Sustainability Measurement and Modelling Lab, Universitat Politècnica de Catalunya – Barcelona Tech, Barcelona (Spain); Marzo, Mariano [Geomodels Institute, Department of Stratigraphy, Paleontology and Marine Geosciences, University of Barcelona, Barcelona (Spain); Salas-Prat, Pep [Sustainability Measurement and Modelling Lab, Universitat Politècnica de Catalunya – Barcelona Tech, Barcelona (Spain); SmartGrid.cat, Barcelona (Spain)

    2014-05-12

    Energy-related impacts and conflicts have been used to account for the emergence, maintenance, and collapse of complex societies. On the other hand in the last years, sustainability science has incorporated different frames of reference in order to facilitate the vision of sustainable futures. Most of them suggest that the search for satisfiers of human needs should be rooted on the local (a) construction of organic articulations of people with nature and technology and (b) generation of growing levels of social, economic, and energy self-reliance. This new regional kind of social agreement implies a redefinition of cultural norms and institutions, which at the same time leads toward increased levels of sovereignty for the social group engaged in this process. Sovereignty must not only be understood here in its political sense (as traditionally found in the literature) but also in its technological and energy acceptations. In this paper, we address this last constituent in terms of energy security levels and hierarchy in energy infrastructures between Spain and Catalonia, the latter being a Spanish autonomous community known for its sovereignty aspirations. We show a remarkable difference in energy security levels between both regions, which clearly hinders Catalonia’s capacity to currently achieve a higher level of self-reliance in energetic terms. We suggest that this result is a consequence of the imperfect hierarchy that characterizes energy infrastructures at the spatial scale, and that it can be generalized to all regions where infrastructural systems have been historically assessed and developed under a nationwide planning scheme.

  15. Sovereignty, Robustness, and Short-Term Energy Security Levels. The Catalonia Case Study

    International Nuclear Information System (INIS)

    Rosas-Casals, Martí; Marzo, Mariano; Salas-Prat, Pep

    2014-01-01

    Energy-related impacts and conflicts have been used to account for the emergence, maintenance, and collapse of complex societies. On the other hand in the last years, sustainability science has incorporated different frames of reference in order to facilitate the vision of sustainable futures. Most of them suggest that the search for satisfiers of human needs should be rooted on the local (a) construction of organic articulations of people with nature and technology and (b) generation of growing levels of social, economic, and energy self-reliance. This new regional kind of social agreement implies a redefinition of cultural norms and institutions, which at the same time leads toward increased levels of sovereignty for the social group engaged in this process. Sovereignty must not only be understood here in its political sense (as traditionally found in the literature) but also in its technological and energy acceptations. In this paper, we address this last constituent in terms of energy security levels and hierarchy in energy infrastructures between Spain and Catalonia, the latter being a Spanish autonomous community known for its sovereignty aspirations. We show a remarkable difference in energy security levels between both regions, which clearly hinders Catalonia’s capacity to currently achieve a higher level of self-reliance in energetic terms. We suggest that this result is a consequence of the imperfect hierarchy that characterizes energy infrastructures at the spatial scale, and that it can be generalized to all regions where infrastructural systems have been historically assessed and developed under a nationwide planning scheme.

  16. Sovereignty, robustness and short-term energy security levels. The Catalonia case study

    Directory of Open Access Journals (Sweden)

    Marti eRosas-Casals

    2014-05-01

    Full Text Available Energy related impacts and conflicts have been used to account for the emergence, maintenance and collapse of complex societies. On the other hand in the last years, sustainability science has incorporated different frames of reference in order to facilitate the vision of sustainable futures. Most of them suggest that the search for satisfiers of human needs should be rooted on the local (a construction of organic articulations of people with nature and technology and (b generation of growing levels of social, economic and energy self-reliance. This new regional kind of social agreement implies a redefinition of cultural norms and institutions, which at the same time leads toward increased levels of sovereignty for the social group engaged in this process. Sovereignty must not only be understood here in its political sense (as traditionally found in the literature but also in its technological and energy acceptations. In this paper we address this last constituent in terms of energy security levels and hierarchy in energy infrastructures between Spain and Catalonia, the latter being a Spanish autonomous community known for its sovereignty aspirations. We show a remarkable difference in energy security levels between both regions which clearly hinders Catalonia’s capacity to currently achieve a higher level of self-reliance in energetic terms. We suggest that this result is a consequence of the imperfect hierarchy that characterize energy infrastructures at the spatial scale, and that it can be generalized to all regions where infrastructural systems have been historically assessed and developed under a nationwide planning scheme.

  17. Leveling up? An inter-neighborhood experiment on parochialism and the efficiency of multi-level public goods provision

    OpenAIRE

    Gallier, Carlo; Goeschl, Timo; Kesternich, Martin; Lohse, Johannes; Reif, Christiane; Römer, Daniel

    2017-01-01

    Many public goods can be provided at different spatial levels. Evidence from social identity theory and in-group favoritism raises the possibility that where higher-level provision is more efficient, subjects’ narrow concern for local outcomes (parochialism) could harm efficiency. Building on the experimental paradigm of multi-level public good games and the ‘neighborhood attachment’ concept, we conduct an artefactual field experiment with 600 participants in a setting conducive to parochial...

  18. Quantum Secure Group Communication.

    Science.gov (United States)

    Li, Zheng-Hong; Zubairy, M Suhail; Al-Amri, M

    2018-03-01

    We propose a quantum secure group communication protocol for the purpose of sharing the same message among multiple authorized users. Our protocol can remove the need for key management that is needed for the quantum network built on quantum key distribution. Comparing with the secure quantum network based on BB84, we show our protocol is more efficient and securer. Particularly, in the security analysis, we introduce a new way of attack, i.e., the counterfactual quantum attack, which can steal information by "invisible" photons. This invisible photon can reveal a single-photon detector in the photon path without triggering the detector. Moreover, the photon can identify phase operations applied to itself, thereby stealing information. To defeat this counterfactual quantum attack, we propose a quantum multi-user authorization system. It allows us to precisely control the communication time so that the attack can not be completed in time.

  19. Security analysis of cyber-physical system

    Science.gov (United States)

    Li, Bo; Zhang, Lichen

    2017-05-01

    In recent years, Cyber-Physical System (CPS) has become an important research direction of academic circles and scientific and technological circles at home and abroad, is considered to be following the third wave of world information technology after the computer, the Internet. PS is a multi-dimensional, heterogeneous, deep integration of open systems, Involving the computer, communication, control and other disciplines of knowledge. As the various disciplines in the research theory and methods are significantly different, so the application of CPS has brought great challenges. This paper introduces the definition and characteristics of CPS, analyzes the current situation of CPS, analyzes the security threats faced by CPS, and gives the security solution for security threats. It also discusses CPS-specific security technology, to promote the healthy development of CPS in information security.

  20. Optimization of airport security lanes

    Science.gov (United States)

    Chen, Lin

    2018-05-01

    Current airport security management system is widely implemented all around the world to ensure the safety of passengers, but it might not be an optimum one. This paper aims to seek a better security system, which can maximize security while minimize inconvenience to passengers. Firstly, we apply Petri net model to analyze the steps where the main bottlenecks lie. Based on average tokens and time transition, the most time-consuming steps of security process can be found, including inspection of passengers' identification and documents, preparing belongings to be scanned and the process for retrieving belongings back. Then, we develop a queuing model to figure out factors affecting those time-consuming steps. As for future improvement, the effective measures which can be taken include transferring current system as single-queuing and multi-served, intelligently predicting the number of security checkpoints supposed to be opened, building up green biological convenient lanes. Furthermore, to test the theoretical results, we apply some data to stimulate the model. And the stimulation results are consistent with what we have got through modeling. Finally, we apply our queuing model to a multi-cultural background. The result suggests that by quantifying and modifying the variance in wait time, the model can be applied to individuals with various habits customs and habits. Generally speaking, our paper considers multiple affecting factors, employs several models and does plenty of calculations, which is practical and reliable for handling in reality. In addition, with more precise data available, we can further test and improve our models.

  1. RFID security a lightweight paradigm

    CERN Document Server

    Khattab, Ahmed; Amini, Esmaeil; Bayoumi, Magdy

    2017-01-01

    This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today’s Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies.

  2. Multi-Level Determinants of Parasitic Fly Infection in Forest Passerines

    Science.gov (United States)

    Manzoli, Darío Ezequiel; Antoniazzi, Leandro Raúl; Saravia, María José; Silvestri, Leonardo; Rorhmann, David; Beldomenico, Pablo Martín

    2013-01-01

    The study of myiasis is important because they may cause problems to the livestock industry, public health, or wildlife conservation. The ecology of parasitic dipterans that cause myiasis is singular, as they actively seek their hosts over relatively long distances. However, studies that address the determinants of myiasis dynamics are very scarce. The genus Philornis include species that may be excellent models to study myiasis ecology, as they exclusively parasitize bird nestlings, which stay in their nests until they are fully fledged, and larvae remain at the point of entry until the parasitic stage is over, thus allowing the collection of sequential individual-level infection data from virtually all the hosts present at a particular area. Here we offer a stratified multi-level analysis of longitudinal data of Philornis torquans parasitism in replicated forest bird communities of central Argentina. Using Generalized Linear Models and Generalized Linear Mixed Models and an information theory approach for model selection, we conducted four groups of analyses, each with a different study unit, the individual, the brood, the community at a given week, and the community at a given year. The response variable was larval abundance per nestling or mean abundance per nestling. At each level, models included the variables of interest of that particular level, and also potential confounders and effect modifiers of higher levels. We found associations of large magnitude at all levels, but only few variables truly governed the dynamics of this parasite. At the individual level, the infection was determined by the species and the age of the host. The main driver of parasite abundance at the microhabitat level was the average height of the forest, and at the community level, the density of hosts and prior rainfall. This multi-level approach contributed to a better understanding of the ecology of myiasis. PMID:23874408

  3. Baseline Levels of Rapid Eye Movement Sleep May Protect Against Excessive Activity in Fear-Related Neural Circuitry.

    Science.gov (United States)

    Lerner, Itamar; Lupkin, Shira M; Sinha, Neha; Tsai, Alan; Gluck, Mark A

    2017-11-15

    Sleep, and particularly rapid eye movement sleep (REM), has been implicated in the modulation of neural activity following fear conditioning and extinction in both human and animal studies. It has long been presumed that such effects play a role in the formation and persistence of posttraumatic stress disorder, of which sleep impairments are a core feature. However, to date, few studies have thoroughly examined the potential effects of sleep prior to conditioning on subsequent acquisition of fear learning in humans. Furthermore, these studies have been restricted to analyzing the effects of a single night of sleep-thus assuming a state-like relationship between the two. In the current study, we used long-term mobile sleep monitoring and functional neuroimaging (fMRI) to explore whether trait-like variations in sleep patterns, measured in advance in both male and female participants, predict subsequent patterns of neural activity during fear learning. Our results indicate that higher baseline levels of REM sleep predict reduced fear-related activity in, and connectivity between, the hippocampus, amygdala and ventromedial PFC during conditioning. Additionally, skin conductance responses (SCRs) were weakly correlated to the activity in the amygdala. Conversely, there was no direct correlation between REM sleep and SCRs, indicating that REM may only modulate fear acquisition indirectly. In a follow-up experiment, we show that these results are replicable, though to a lesser extent, when measuring sleep over a single night just before conditioning. As such, baseline sleep parameters may be able to serve as biomarkers for resilience, or lack thereof, to trauma. SIGNIFICANCE STATEMENT Numerous studies over the past two decades have established a clear role of sleep in fear-learning processes. However, previous work has focused on the effects of sleep following fear acquisition, thus neglecting the potential effects of baseline sleep levels on the acquisition itself. The

  4. Acoustic properties of perforates under high level multi-tone excitation

    OpenAIRE

    Bodén, Hans

    2013-01-01

    This paper discusses the effect of high level multi-tone acoustic excitation on the acoustic properties of perforates. It is based on a large experimental study of the nonlinear properties of these types of samples without mean grazing or bias flow. Compared to previously published results the present investigation concentrates on the effect of multiple harmonics. It is known from previous studies that high level acoustic excitation at one frequency will change the acoustic impedance of perfo...

  5. Off-resonant transitions in the collective dynamics of multi-level atomic ensembles

    DEFF Research Database (Denmark)

    Miroshnychenko, Yevhen; Mølmer, Klaus

    2013-01-01

    We study the contributions of off-resonant transitions to the dynamics of a system of N multi-level atoms sharing one excitation and interacting with the quantized vector electromagnetic field. The rotating wave approximation significantly simplifies the derivation of the equations of motion...... describing the collective atomic dynamics, but it leads to an incorrect expression for the dispersive part of the atom–atom interaction terms. For the case of two-level atoms and a scalar electromagnetic field, it turns out that the atom–atom interaction can be recovered correctly if integrals over...... the photon mode frequencies are extended to incorporate negative values. We explicitly derive the atom–atom interaction for multi-level atoms, coupled to the full vector electromagnetic field, and we recover also in this general case the validity of the results obtained by the extension to negative...

  6. In Good Company? A Multi-Study, Multi-Level Investigation of the Effects of Coworker Relationships on Employee Well-Being

    Science.gov (United States)

    Simon, Lauren S.; Judge, Timothy A.; Halvorsen-Ganepola, Marie D. K.

    2010-01-01

    Two multi-level studies were conducted to examine the effects of attitudes towards coworkers on daily well-being. Study 1 linked daily levels of coworker satisfaction to job satisfaction and life satisfaction and examined the extent to which job satisfaction mediated the relationship between coworker satisfaction and life satisfaction among 33…

  7. Recalibrating Baseline Evidence in Burundi, Malawi, Senegal and Uganda: Exploring the Potential of Multi-Site, National-Level Stakeholder Engagement in Participatory Evaluation

    Science.gov (United States)

    Edge, Karen; Marphatia, Akanksha A.

    2015-01-01

    This paper details our collaborative work on the Improving Learning Outcomes in Primary Schools (ILOPS) project in Burundi, Malawi, Uganda and Senegal. ILOPS set out to establish an innovative template for multi-stakeholder, multinational participatory evaluation (PE) and examine the fundamental roles, relationships and evidence that underpin the…

  8. Graduate Attribute Attainment in a Multi-Level Undergraduate Geography Course

    Science.gov (United States)

    Mager, Sarah; Spronken-Smith, Rachel

    2014-01-01

    We investigated students' perceptions of graduate attributes in a multi-level (second and third year) geography course. A case study with mixed methodology was employed, with data collected through focus groups and a survey. We found that undergraduate geography students can identify the skills, knowledge and attributes that are developed through…

  9. Innovation in Multi-Level Governance for Energy Efficiency. Sharing experience with multi-level governance to enhance energy efficiency. Information paper

    Energy Technology Data Exchange (ETDEWEB)

    Jollands, Nigel; Gasc, Emilien; Pasquier, Sara Bryan

    2009-12-15

    Despite creating a plethora of national and international regulations and voluntary programmes to improve energy efficiency, countries are far from achieving full energy efficiency potential across all sectors of the economy. One major challenge, among numerous barriers, is policy implementation. One strategy that many national governments and international organisations have used to address the implementation issue is to engage regional and local authorities. To that end, many programmes have been created that foster energy efficiency action and collaboration across levels of government. The aim of this report is to identify trends and detail recent developments in multi-level governance in energy efficiency (MLGEE). By sharing lessons learned from daily practitioners in the field, the IEA hopes energy efficiency policy makers at all levels of government will be able to identify useful multilevel governance (MLG) practices across geographical and political contexts and use these to design robust programmes; modify existing programmes, and connect and share experiences with other policy makers in this field.

  10. Measuring cognitive change with ImPACT: the aggregate baseline approach.

    Science.gov (United States)

    Bruce, Jared M; Echemendia, Ruben J; Meeuwisse, Willem; Hutchison, Michael G; Aubry, Mark; Comper, Paul

    2017-11-01

    The Immediate Post-Concussion Assessment and Cognitive Test (ImPACT) is commonly used to assess baseline and post-injury cognition among athletes in North America. Despite this, several studies have questioned the reliability of ImPACT when given at intervals employed in clinical practice. Poor test-retest reliability reduces test sensitivity to cognitive decline, increasing the likelihood that concussed athletes will be returned to play prematurely. We recently showed that the reliability of ImPACT can be increased when using a new composite structure and the aggregate of two baselines to predict subsequent performance. The purpose of the present study was to confirm our previous findings and determine whether the addition of a third baseline would further increase the test-retest reliability of ImPACT. Data from 97 English speaking professional hockey players who had received at least 4 ImPACT baseline evaluations were extracted from a National Hockey League Concussion Program database. Linear regression was used to determine whether each of the first three testing sessions accounted for unique variance in the fourth testing session. Results confirmed that the aggregate baseline approach improves the psychometric properties of ImPACT, with most indices demonstrating adequate or better test-retest reliability for clinical use. The aggregate baseline approach provides a modest clinical benefit when recent baselines are available - and a more substantial benefit when compared to approaches that obtain baseline measures only once during the course of a multi-year playing career. Pending confirmation in diverse samples, neuropsychologists are encouraged to use the aggregate baseline approach to best quantify cognitive change following sports concussion.

  11. Agent-based model with multi-level herding for complex financial systems

    Science.gov (United States)

    Chen, Jun-Jie; Tan, Lei; Zheng, Bo

    2015-02-01

    In complex financial systems, the sector structure and volatility clustering are respectively important features of the spatial and temporal correlations. However, the microscopic generation mechanism of the sector structure is not yet understood. Especially, how to produce these two features in one model remains challenging. We introduce a novel interaction mechanism, i.e., the multi-level herding, in constructing an agent-based model to investigate the sector structure combined with volatility clustering. According to the previous market performance, agents trade in groups, and their herding behavior comprises the herding at stock, sector and market levels. Further, we propose methods to determine the key model parameters from historical market data, rather than from statistical fitting of the results. From the simulation, we obtain the sector structure and volatility clustering, as well as the eigenvalue distribution of the cross-correlation matrix, for the New York and Hong Kong stock exchanges. These properties are in agreement with the empirical ones. Our results quantitatively reveal that the multi-level herding is the microscopic generation mechanism of the sector structure, and provide new insight into the spatio-temporal interactions in financial systems at the microscopic level.

  12. Tabu search approaches for the multi-level warehouse layout problem with adjacency constraints

    Science.gov (United States)

    Zhang, G. Q.; Lai, K. K.

    2010-08-01

    A new multi-level warehouse layout problem, the multi-level warehouse layout problem with adjacency constraints (MLWLPAC), is investigated. The same item type is required to be located in adjacent cells, and horizontal and vertical unit travel costs are product dependent. An integer programming model is proposed to formulate the problem, which is NP hard. Along with a cube-per-order index policy based heuristic, the standard tabu search (TS), greedy TS, and dynamic neighbourhood based TS are presented to solve the problem. The computational results show that the proposed approaches can reduce the transportation cost significantly.

  13. Software Design Level Security Vulnerabilities

    OpenAIRE

    S. Rehman; K. Mustafa

    2011-01-01

    Several thousand software design vulnerabilities have been reported through established databases. But they need to be structured and classified to be optimally usable in the pursuit of minimal and effective mitigation mechanism. In order we developed a criterion set for a communicative description of the same to serve the purpose as a taxonomic description of security vulnerabilities, arising in the design phase of Software development lifecycle. This description is a part of an effort to id...

  14. Prospective in-patient cohort study of moves between levels of therapeutic security: the DUNDRUM-1 triage security, DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales and the HCR-20.

    LENUS (Irish Health Repository)

    Davoren, Mary

    2012-07-01

    We examined whether new structured professional judgment instruments for assessing need for therapeutic security, treatment completion and recovery in forensic settings were related to moves from higher to lower levels of therapeutic security and added anything to assessment of risk.

  15. Analysis of Harmonic Injection to the Modulation of Multi-Level ...

    African Journals Online (AJOL)

    This paper explores the analysis of third and ninth harmonic injection to the modulation of a multilevel diode clamped converter (DCC) at a varying modulation index. The spectral distributions of the various multi-level waveforms obtained under normal modulation index of 0.8 and over modulation index of 1.15 were ...

  16. Regulatory networks, legal federalism, and multi-level regulatory systems

    OpenAIRE

    Kerber, Wolfgang; Wendel, Julia

    2016-01-01

    Transnational regulatory networks play important roles in multi-level regulatory regimes, as e.g, the European Union. In this paper we analyze the role of regulatory networks from the perspective of the economic theory of legal federalism. Often sophisticated intermediate institutional solutions between pure centralisation and pure decentralisation can help to solve complex tradeoff problems between the benefits and problems of centralised and decentralised solutions. Drawing upon the insight...

  17. Methodology development for quantitative optimization of security enhancement in medical information systems -Case study in a PACS and a multi-institutional radiotherapy database-.

    Science.gov (United States)

    Haneda, Kiyofumi; Umeda, Tokuo; Koyama, Tadashi; Harauchi, Hajime; Inamura, Kiyonari

    2002-01-01

    The target of our study is to establish the methodology for analyzing level of security requirements, for searching suitable security measures and for optimizing security distribution to every portion of medical practice. Quantitative expression must be introduced to our study as possible for the purpose of easy follow up of security procedures and easy evaluation of security outcomes or results. Results of system analysis by fault tree analysis (FTA) clarified that subdivided system elements in detail contribute to much more accurate analysis. Such subdivided composition factors very much depended on behavior of staff, interactive terminal devices, kinds of service, and routes of network. As conclusion, we found the methods to analyze levels of security requirements for each medical information systems employing FTA, basic events for each composition factor and combination of basic events. Methods for searching suitable security measures were found. Namely risk factors for each basic event, number of elements for each composition factor and candidates of security measure elements were found. Method to optimize the security measures for each medical information system was proposed. Namely optimum distribution of risk factors in terms of basic events were figured out, and comparison of them between each medical information systems became possible.

  18. Smart grid security innovative solutions for a modernized grid

    CERN Document Server

    Skopik, Florian

    2015-01-01

    The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also opened the way for information security breaches and other types of security breaches. Potential threats range from meter manipulation to directed, high-impact attacks on critical infrastructure that could bring down regi

  19. Nuclear Security Education Program at the Pennsylvania State University

    International Nuclear Information System (INIS)

    Uenlue, Kenan; Jovanovic, Igor

    2015-01-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  20. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  1. Baseline Levels, and Changes Over Time in Body Mass Index and Fasting Insulin, and Their Relationship to Change in Metabolic Trait Clustering

    Science.gov (United States)

    Sullivan, Lisa M.; Fox, Caroline S.; Wilson, Peter W.F.; Nathan, David M.; Vasan, Ramachandran S.; D'Agostino, Ralph B.; Meigs, James B.

    2014-01-01

    Abstract Background: Multiple abnormal metabolic traits are found together or “cluster” within individuals more often than is predicted by chance. The individual and combined role of adiposity and insulin resistance (IR) on metabolic trait clustering is uncertain. We tested the hypothesis that change in trait clustering is a function of both baseline level and change in these measures. Methods: In 2616 nondiabetic Framingham Offspring Study participants, body mass index (BMI) and fasting insulin were related to a within-person 7-year change in a trait score of 0–4 Adult Treatment Panel III metabolic syndrome traits (hypertension, high triglycerides, low high-density lipoprotein cholesterol, hyperglycemia). Results: At baseline assessment, mean trait score was 1.4 traits, and 7-year mean (SEM) change in trait score was +0.25 (0.02) traits, Pfasting insulin were similarly related to trait score change. In models adjusted for age–sex–baseline cluster score, 7-year change in trait score was significantly related to both a 1-quintile difference in baseline BMI (0.07 traits) and fasting insulin (0.18 traits), and to both a 1-quintile 7-year increase in BMI (0.21 traits) and fasting insulin (0.18 traits). Conclusions: Change in metabolic trait clustering was significantly associated with baseline levels and changes in both BMI and fasting insulin, highlighting the importance of both obesity and IR in the clustering of metabolic traits. PMID:25007010

  2. Just how multi-level is leadership research? : A document co-citation analysis 1980–2013 on leadership constructs and outcomes

    NARCIS (Netherlands)

    Batistic, S.; Cerne, Matej; Vogel, Bernd

    2017-01-01

    The use of multi-level theories and methodologies in leadership has gained momentum in recent years. However, the leadership field still suffers from a fragmented and unclear evolution and practice of multi-level approaches. The questions of how and to what extent multi-level research has evolved in

  3. A multi-threading approach to secure VERIFYPIN

    CSIR Research Space (South Africa)

    Frieslaar, Ibraheem

    2016-10-01

    Full Text Available along side a pin-acceptance program in a multi-threaded environment. These threads are inserted randomly on each execution of the program to create confusion for the attacker. Moreover, the research proposes a more improved version of the pin...

  4. A framework for an institutional high level security policy for the processing of medical data and their transmission through the Internet.

    Science.gov (United States)

    Ilioudis, C; Pangalos, G

    2001-01-01

    The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a

  5. Developing the multi-level functioning interface framework for DER models

    DEFF Research Database (Denmark)

    Han, Xue; Bindner, Henrik W.; You, Shi

    2013-01-01

    The paper summarises several modelling applications of distributed energy resources (DERs) for various purposes, and describes the related operational issues regarding the complexity of the future distribution grid. Furthermore, a multi-level functioning interface framework is proposed for DER mo....... The information mapping for photovoltaic panel (PV) modelling is also provided as an example....

  6. Instantaneous Real-Time Kinematic Decimeter-Level Positioning with BeiDou Triple-Frequency Signals over Medium Baselines.

    Science.gov (United States)

    He, Xiyang; Zhang, Xiaohong; Tang, Long; Liu, Wanke

    2015-12-22

    Many applications, such as marine navigation, land vehicles location, etc., require real time precise positioning under medium or long baseline conditions. In this contribution, we develop a model of real-time kinematic decimeter-level positioning with BeiDou Navigation Satellite System (BDS) triple-frequency signals over medium distances. The ambiguities of two extra-wide-lane (EWL) combinations are fixed first, and then a wide lane (WL) combination is reformed based on the two EWL combinations for positioning. Theoretical analysis and empirical analysis is given of the ambiguity fixing rate and the positioning accuracy of the presented method. The results indicate that the ambiguity fixing rate can be up to more than 98% when using BDS medium baseline observations, which is much higher than that of dual-frequency Hatch-Melbourne-Wübbena (HMW) method. As for positioning accuracy, decimeter level accuracy can be achieved with this method, which is comparable to that of carrier-smoothed code differential positioning method. Signal interruption simulation experiment indicates that the proposed method can realize fast high-precision positioning whereas the carrier-smoothed code differential positioning method needs several hundreds of seconds for obtaining high precision results. We can conclude that a relatively high accuracy and high fixing rate can be achieved for triple-frequency WL method with single-epoch observations, displaying significant advantage comparing to traditional carrier-smoothed code differential positioning method.

  7. Instantaneous Real-Time Kinematic Decimeter-Level Positioning with BeiDou Triple-Frequency Signals over Medium Baselines

    Directory of Open Access Journals (Sweden)

    Xiyang He

    2015-12-01

    Full Text Available Many applications, such as marine navigation, land vehicles location, etc., require real time precise positioning under medium or long baseline conditions. In this contribution, we develop a model of real-time kinematic decimeter-level positioning with BeiDou Navigation Satellite System (BDS triple-frequency signals over medium distances. The ambiguities of two extra-wide-lane (EWL combinations are fixed first, and then a wide lane (WL combination is reformed based on the two EWL combinations for positioning. Theoretical analysis and empirical analysis is given of the ambiguity fixing rate and the positioning accuracy of the presented method. The results indicate that the ambiguity fixing rate can be up to more than 98% when using BDS medium baseline observations, which is much higher than that of dual-frequency Hatch-Melbourne-Wübbena (HMW method. As for positioning accuracy, decimeter level accuracy can be achieved with this method, which is comparable to that of carrier-smoothed code differential positioning method. Signal interruption simulation experiment indicates that the proposed method can realize fast high-precision positioning whereas the carrier-smoothed code differential positioning method needs several hundreds of seconds for obtaining high precision results. We can conclude that a relatively high accuracy and high fixing rate can be achieved for triple-frequency WL method with single-epoch observations, displaying significant advantage comparing to traditional carrier-smoothed code differential positioning method.

  8. Simulation and Analysis of a Grid Connected Multi-level Converter Topologies and their Comparison

    Directory of Open Access Journals (Sweden)

    Mohammad Shadab Mirza

    2014-09-01

    Full Text Available This paper presents simulation and analysis of a grid connected multi-level converter topologies. In this paper, converter circuit works as an inverter by controlling the switching angle (α. This paper, presents a MATLAB/SIMULINK model of multi-level converter topologies (topology1 & topology2. Topology1 is without transformer while topology2 with transformer. Both the topologies are simulated and analyzed for three level converters in order to reduce the total harmonic distortion (THD. A comparative study of topology1 and topology2 is also presented in this paper for different switching angles (α and battery voltages. The results have been tabulated and discussed.

  9. Climate technology transfer at the local, national and global levels: analyzing the relationships between multi-level structures

    NARCIS (Netherlands)

    Tessema Abissa, Fisseha; Tessema Abissa, Fisseha

    2014-01-01

    This thesis examines the relationships between multi-leveled decision structures for climate technology transfer through an analysis of top-down macro-policy and bottom-up micro-implementation. It examines how international climate technology transfer policy under the UNFCCC filters down to the

  10. Environmental Modeling, A goal of the Baseline Sampling and Analysis program is to determine baseline levels of select priority pollutants and petroleum markers in areas with high probability for oil spills., Published in 1999, 1:24000 (1in=2000ft) scale, Louisiana State University (LSU).

    Data.gov (United States)

    NSGIC Education | GIS Inventory — Environmental Modeling dataset current as of 1999. A goal of the Baseline Sampling and Analysis program is to determine baseline levels of select priority pollutants...

  11. Experiments in Globalisation, Food Security and Land Use Decision Making

    Science.gov (United States)

    Brown, Calum; Murray-Rust, Dave; van Vliet, Jasper; Alam, Shah Jamal; Verburg, Peter H.; Rounsevell, Mark D.

    2014-01-01

    The globalisation of trade affects land use, food production and environments around the world. In principle, globalisation can maximise productivity and efficiency if competition prompts specialisation on the basis of productive capacity. In reality, however, such specialisation is often constrained by practical or political barriers, including those intended to ensure national or regional food security. These are likely to produce globally sub-optimal distributions of land uses. Both outcomes are subject to the responses of individual land managers to economic and environmental stimuli, and these responses are known to be variable and often (economically) irrational. We investigate the consequences of stylised food security policies and globalisation of agricultural markets on land use patterns under a variety of modelled forms of land manager behaviour, including variation in production levels, tenacity, land use intensity and multi-functionality. We find that a system entirely dedicated to regional food security is inferior to an entirely globalised system in terms of overall production levels, but that several forms of behaviour limit the difference between the two, and that variations in land use intensity and functionality can substantially increase the provision of food and other ecosystem services in both cases. We also find emergent behaviour that results in the abandonment of productive land, the slowing of rates of land use change and the fragmentation or, conversely, concentration of land uses following changes in demand levels. PMID:25437010

  12. Experiments in globalisation, food security and land use decision making.

    Science.gov (United States)

    Brown, Calum; Murray-Rust, Dave; van Vliet, Jasper; Alam, Shah Jamal; Verburg, Peter H; Rounsevell, Mark D

    2014-01-01

    The globalisation of trade affects land use, food production and environments around the world. In principle, globalisation can maximise productivity and efficiency if competition prompts specialisation on the basis of productive capacity. In reality, however, such specialisation is often constrained by practical or political barriers, including those intended to ensure national or regional food security. These are likely to produce globally sub-optimal distributions of land uses. Both outcomes are subject to the responses of individual land managers to economic and environmental stimuli, and these responses are known to be variable and often (economically) irrational. We investigate the consequences of stylised food security policies and globalisation of agricultural markets on land use patterns under a variety of modelled forms of land manager behaviour, including variation in production levels, tenacity, land use intensity and multi-functionality. We find that a system entirely dedicated to regional food security is inferior to an entirely globalised system in terms of overall production levels, but that several forms of behaviour limit the difference between the two, and that variations in land use intensity and functionality can substantially increase the provision of food and other ecosystem services in both cases. We also find emergent behaviour that results in the abandonment of productive land, the slowing of rates of land use change and the fragmentation or, conversely, concentration of land uses following changes in demand levels.

  13. Cost and performance analysis of physical security systems

    International Nuclear Information System (INIS)

    Hicks, M.J.; Yates, D.; Jago, W.H.; Phillips, A.W.

    1998-04-01

    Analysis of cost and performance of physical security systems can be a complex, multi-dimensional problem. There are a number of point tools that address various aspects of cost and performance analysis. Increased interest in cost tradeoffs of physical security alternatives has motivated development of an architecture called Cost and Performance Analysis (CPA), which takes a top-down approach to aligning cost and performance metrics. CPA incorporates results generated by existing physical security system performance analysis tools, and utilizes an existing cost analysis tool. The objective of this architecture is to offer comprehensive visualization of complex data to security analysts and decision-makers

  14. You Should Be the Specialist! Weak Mental Rotation Performance in Aviation Security Screeners - Reduced Performance Level in Aviation Security with No Gender Effect.

    Science.gov (United States)

    Krüger, Jenny K; Suchan, Boris

    2016-01-01

    Aviation security screeners analyze a large number of X-ray images per day and seem to be experts in mentally rotating diverse kinds of visual objects. A robust gender-effect that men outperform women in the Vandenberg & Kuse mental rotation task has been well documented over the last years. In addition it has been shown that training can positively influence the overall task-performance. Considering this, the aim of the present study was to investigate whether security screeners show better performance in the Mental Rotation Test (MRT) independently of gender. Forty-seven security screeners of both sexes from two German airports were examined with a computer based MRT. Their performance was compared to a large sample of control subjects. The well-known gender-effect favoring men on mental rotation was significant within the control group. However, the security screeners did not show any sex differences suggesting an effect of training and professional performance. Surprisingly this specialized group showed a lower level of overall MRT performance than the control participants. Possible aviation related influences such as secondary effects of work-shift or expertise which can cumulatively cause this result are discussed.

  15. Multi level governance framework for sustainable urban mobility

    DEFF Research Database (Denmark)

    Gudmundsson, Henrik

    2013-01-01

    Cities constitute the backbone of European historic development and provide the basis of its economic future. The near neglect of cities in existing European policies for sustainable growth and development such as the Europe 2020 strategy is untenable. The 2011 White Paper has sought to face...... seem essential to move cities beyond business as usual. Research-wise we need to understand in more detail the political and contextual background for successes - and failures - of European cities. This could help build an effective multi level governance framework for sustainable urban mobility...

  16. Application of the level set method for multi-phase flow computation in fusion engineering

    International Nuclear Information System (INIS)

    Luo, X-Y.; Ni, M-J.; Ying, A.; Abdou, M.

    2006-01-01

    Numerical simulation of multi-phase flow is essential to evaluate the feasibility of a liquid protection scheme for the power plant chamber. The level set method is one of the best methods for computing and analyzing the motion of interface among the multi-phase flow. This paper presents a general formula for the second-order projection method combined with the level set method to simulate unsteady incompressible multi-phase flow with/out phase change flow encountered in fusion science and engineering. The third-order ENO scheme and second-order semi-implicit Crank-Nicholson scheme is used to update the convective and diffusion term. The numerical results show this method can handle the complex deformation of the interface and the effect of liquid-vapor phase change will be included in the future work

  17. A Multi-Baseline 12 GHz Atmospheric Phase Interferometer with One Micron Path Length Sensitivity

    Science.gov (United States)

    Kimberk, Robert S.; Hunter, Todd R.; Leiker, Patrick S.; Blundell, Raymond; Nystrom, George U.; Petitpas, Glen R.; Test, John; Wilson, Robert W.; Yamaguchi, Paul; Young, Kenneth H.

    2012-12-01

    We have constructed a five station 12 GHz atmospheric phase interferometer (API) for the Submillimeter Array (SMA) located near the summit of Mauna Kea, Hawaii. Operating at the base of unoccupied SMA antenna pads, each station employs a commercial low noise mixing block coupled to a 0.7 m off-axis satellite dish which receives a broadband, white noise-like signal from a geostationary satellite. The signals are processed by an analog correlator to produce the phase delays between all pairs of stations with projected baselines ranging from 33-261 m. Each baseline's amplitude and phase is measured continuously at a rate of 8 kHz, processed, averaged and output at 10 Hz. Further signal processing and data reduction is accomplished with a Linux computer, including the removal of the diurnal motion of the target satellite. The placement of the stations below ground level with an environmental shield combined with the use of low temperature coefficient, buried fiber optic cables provides excellent system stability. The sensitivity in terms of rms path length is 1.3 microns which corresponds to phase deviations of about 1° of phase at the highest operating frequency of the SMA. The two primary data products are: (1) standard deviations of observed phase over various time scales, and (2) phase structure functions. These real-time statistical data measured by the API in the direction of the satellite provide an estimate of the phase front distortion experienced by the concurrent SMA astronomical observations. The API data also play an important role, along with the local opacity measurements and weather predictions, in helping to plan the scheduling of science observations on the telescope.

  18. Evaluating the Level of Internal Control System in the Management of Financial Security of Bank

    Directory of Open Access Journals (Sweden)

    Pidvysotska Lyudmyla J.

    2017-06-01

    Full Text Available The article is aimed at studying the organization and technology of evaluation process of the internal control system of bank in order to ensure financial security management of its activities. The work of the internal audit service on monitoring and evaluating the performance of the bank’s internal control system was analyzed. It has been found that improving the level of financial security of commercial banks is conditional upon improvements in the quality of audits and the provision of sound and objective conclusions. The interrelation of the tasks of internal audit service and the tasks of bank’s financial security management has been determined. Methodological recommendations on evaluation of the bank’s internal control system on the basis of results of audit have been proposed.

  19. Multi-segmental movement patterns reflect juggling complexity and skill level.

    Science.gov (United States)

    Zago, Matteo; Pacifici, Ilaria; Lovecchio, Nicola; Galli, Manuela; Federolf, Peter Andreas; Sforza, Chiarella

    2017-08-01

    The juggling action of six experts and six intermediates jugglers was recorded with a motion capture system and decomposed into its fundamental components through Principal Component Analysis. The aim was to quantify trends in movement dimensionality, multi-segmental patterns and rhythmicity as a function of proficiency level and task complexity. Dimensionality was quantified in terms of Residual Variance, while the Relative Amplitude was introduced to account for individual differences in movement components. We observed that: experience-related modifications in multi-segmental actions exist, such as the progressive reduction of error-correction movements, especially in complex task condition. The systematic identification of motor patterns sensitive to the acquisition of specific experience could accelerate the learning process. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. Small Area and Individual Level Predictors of Physical Activity in Urban Communities: A Multi-Level Study in Stoke on Trent, England

    Directory of Open Access Journals (Sweden)

    Hilde Stephansen

    2009-02-01

    Full Text Available Reducing population physical inactivity has been declared a global public health priority. We report a detailed multi-level analysis of small area indices and individual factors as correlates of physical activity in deprived urban areas. Multi-level regression analysis was used to investigate environmental and individual correlates of physical activity. Nine individual factors were retained in the overall model, two related to individual intentions or beliefs, three to access to shops, work or fast food outlets and two to weather; age and gender being the other two. Four area level indices related to: traffic, road casualties, criminal damage and access to green space were important in explaining variation in physical activity.

  1. Study of multi-level atomic systems with the application of magnetic field

    Science.gov (United States)

    Hu, Jianping; Roy, Subhankar; Ummal Momeen, M.

    2018-04-01

    The complexity of multiple energy levels associated with each atomic system determines the various processes related to light- matter interactions. It is necessary to understand the influence of different levels in a given atomic system. In this work we focus on multi- level atomic schemes with the application of magnetic field. We analyze the different EIT windows which appears in the presence of moderately high magnetic field (∼ 10 G) strength.

  2. Effects of a multi-level intervention on the pattern of physical activity among in-school adolescents in Oyo state Nigeria: a cluster randomised trial

    Directory of Open Access Journals (Sweden)

    Mojisola Morenike Oluwasanu

    2017-10-01

    Full Text Available Abstract Background Physical inactivity contributes to the global burden of non-communicable diseases. The pattern of physical activity in adulthood are often established during adolescence and sedentary behaviours in the early years could influence the development of diseases later in life. Studies on physical activity in Nigeria have focused largely on individual behaviours and the effects of school-based interventions have not been well investigated. The aim of the proposed study is to identify factors influencing; and evaluate the effects of a multi-level intervention on the physical activity behaviours of in-school adolescents in Oyo state, Nigeria. Methods The study will adopt a cluster randomised controlled trial design and schools will serve as the unit of randomisation. The sample size is 1000 in-school adolescents aged 10–19 years. The study will be guided by the socio-ecological model and theory of reasoned action and baseline data will be obtained through a mixed methods approach comprising a cross sectional survey to document the self-reported physical activity levels coupled with objectively measured physical activity levels using pedometers for a subset of the sample. Other measurements including weight, height, waist and hip circumferences, fitness level using the 20-m shuttle run test (20-mSRT and blood pressure will be obtained. The schools’ built environment and policy support for physical activity will be assessed using structured questionnaires coupled with key informant interviews and focus group discussions with the school authorities. Baseline findings will guide the design and implementation of a 12-week multi-level intervention. The primary outcome measures are self–reported and 7-day objectively measured physical activity. Other secondary outcome measures are body-mass-index for age, waist-to-hip ratio, cardioresiratory fitness and blood pressure. The association between behavioural factors and physical activity

  3. The application of nuclear and national security safeguard strategies to the insider threat in the private sector

    International Nuclear Information System (INIS)

    Campbell, G.K.

    1991-01-01

    This paper reports that the insider threat in commercial enterprises represents multi-billion dollar losses on an annual basis. While much of this experience is in low value, theft-related shrinkage, there are a growing number of organizations where the loss or compromise of critical assets or interruption of vital systems cannot be tolerated. In very real ways, the survival of the organization may turn on the hostile acts of knowledgeable insiders. The nuclear and National security information operations environments represents a baseline of experience from which the corporate world can draw for cost-effective, alternative approaches to this threat. However, it is equally clear that there are a variety of subtle and obvious constraints imposed by the private sector's mission, service delivery, lifestyle and cost-benefit requirements which dictate careful planning and user involvement in safeguards development and application. Where protection of our National security assets are grounded in a consequence-driven set of policies and standards, the private sector is often subject to the lack of a similar (but directly analogous) policy foundation

  4. Early changes in adipokine levels and baseline limb fat may predict HIV lipoatrophy over 2 years following initiation of antiretroviral therapy

    DEFF Research Database (Denmark)

    Calmy, A; Carey, D; Mallon, P W G

    2008-01-01

    levels during the first 6 months of ART, independently predicted a peripheral fat loss of > or = 2 kg [odds ratio (OR) 2.58, 95% confidence interval (CI) 1.04-6.41; OR 3.15, 95% CI 1.34-7.35, respectively). VAT changes showed a borderline association with high baseline tumour necrosis factor-alpha levels...

  5. Multi-Accuracy-Level Burning Plasma Simulations

    International Nuclear Information System (INIS)

    Artaud, J. F.; Basiuk, V.; Garcia, J.; Giruzzi, G.; Huynh, P.; Huysmans, G.; Imbeaux, F.; Johner, J.; Scheider, M.

    2007-01-01

    The design of a reactor grade tokamak is based on a hierarchy of tools. We present here three codes that are presently used for the simulations of burning plasmas. At the first level there is a 0-dimensional code that allows to choose a reasonable range of global parameters; in our case the HELIOS code was used for this task. For the second level we have developed a mixed 0-D / 1-D code called METIS that allows to study the main properties of a burning plasma, including profiles and all heat and current sources, but always under the constraint of energy and other empirical scaling laws. METIS is a fast code that permits to perform a large number of runs (a run takes about one minute) and design the main features of a scenario, or validate the results of the 0-D code on a full time evolution. At the top level, we used the full 1D1/2 suite of codes CRONOS that gives access to a detailed study of the plasma profiles evolution. CRONOS can use a variety of modules for source terms and transport coefficients computation with different level of complexity and accuracy: from simple estimators to highly sophisticated physics calculations. Thus it is possible to vary the accuracy of burning plasma simulations, as a trade-off with computation time. A wide range of scenario studies can thus be made with CRONOS and then validated with post-processing tools like MHD stability analysis. We will present in this paper results of this multi-level analysis applied to the ITER hybrid scenario. This specific example will illustrate the importance of having several tools for the study of burning plasma scenarios, especially in a domain that present devices cannot access experimentally. (Author)

  6. Measuring Global Water Security Towards Sustainable Development Goals

    Science.gov (United States)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  7. Emitter signal separation method based on multi-level digital channelization

    Science.gov (United States)

    Han, Xun; Ping, Yifan; Wang, Sujun; Feng, Ying; Kuang, Yin; Yang, Xinquan

    2018-02-01

    To solve the problem of emitter separation under complex electromagnetic environment, a signal separation method based on multi-level digital channelization is proposed in this paper. A two-level structure which can divide signal into different channel is designed first, after that, the peaks of different channels are tracked using the track filter and the coincident signals in time domain are separated in time-frequency domain. Finally, the time domain waveforms of different signals are acquired by reverse transformation. The validness of the proposed method is proved by experiment.

  8. A Cluster- Based Secure Active Network Environment

    Institute of Scientific and Technical Information of China (English)

    CHEN Xiao-lin; ZHOU Jing-yang; DAI Han; LU Sang-lu; CHEN Gui-hai

    2005-01-01

    We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in active routers. In this environment, the active code authorized or trusted by privileged users is executed in the secure execution environment (EE) of the active router, while others are executed in the secure EE of the nodes in the distributed shared memory (DSM) cluster. With the supports of a multi-process Java virtual machine and KeyNote, untrusted active packets are controlled to securely consume resource. The DSM consistency management makes that active packets can be parallelly processed in the DSM cluster as if they were processed one by one in ANTS (Active Network Transport System). We demonstrate that CSANE has good security and scalability, but imposing little changes on traditional routers.

  9. The DUNDRUM-1 structured professional judgment for triage to appropriate levels of therapeutic security: retrospective-cohort validation study

    Directory of Open Access Journals (Sweden)

    O'Neill Conor

    2011-03-01

    Full Text Available Abstract Background The assessment of those presenting to prison in-reach and court diversion services and those referred for admission to mental health services is a triage decision, allocating the patient to the appropriate level of therapeutic security. This is a critical clinical decision. We set out to improve on unstructured clinical judgement. We collated qualitative information and devised an 11 item structured professional judgment instrument for this purpose then tested for validity. Methods All those assessed following screening over a three month period at a busy remand committals prison (n = 246 were rated in a retrospective cohort design blind to outcome. Similarly, all those admitted to a mental health service from the same prison in-reach service over an overlapping two year period were rated blind to outcome (n = 100. Results The 11 item scale had good internal consistency (Cronbach's alpha = 0.95 and inter-rater reliability. The scale score did not correlate with the HCR-20 'historical' score. For the three month sample, the receiver operating characteristic area under the curve (AUC for those admitted to hospital was 0.893 (95% confidence interval 0.843 to 0.943. For the two year sample, AUC distinguished at each level between those admitted to open wards, low secure units or a medium/high secure service. Open wards v low secure units AUC = 0.805 (95% CI 0.680 to 0.930; low secure v medium/high secure AUC = 0.866, (95% CI 0.784 to 0.949. Item to outcome correlations were significant for all 11 items. Conclusions The DUNDRUM-1 triage security scale and its items performed to criterion levels when tested against the real world outcome. This instrument can be used to ensure consistency in decision making when deciding who to admit to secure forensic hospitals. It can also be used to benchmark admission thresholds between services and jurisdictions. In this study we found some divergence between assessed need and actual placement

  10. The DUNDRUM-1 structured professional judgment for triage to appropriate levels of therapeutic security: retrospective-cohort validation study

    Science.gov (United States)

    2011-01-01

    Background The assessment of those presenting to prison in-reach and court diversion services and those referred for admission to mental health services is a triage decision, allocating the patient to the appropriate level of therapeutic security. This is a critical clinical decision. We set out to improve on unstructured clinical judgement. We collated qualitative information and devised an 11 item structured professional judgment instrument for this purpose then tested for validity. Methods All those assessed following screening over a three month period at a busy remand committals prison (n = 246) were rated in a retrospective cohort design blind to outcome. Similarly, all those admitted to a mental health service from the same prison in-reach service over an overlapping two year period were rated blind to outcome (n = 100). Results The 11 item scale had good internal consistency (Cronbach's alpha = 0.95) and inter-rater reliability. The scale score did not correlate with the HCR-20 'historical' score. For the three month sample, the receiver operating characteristic area under the curve (AUC) for those admitted to hospital was 0.893 (95% confidence interval 0.843 to 0.943). For the two year sample, AUC distinguished at each level between those admitted to open wards, low secure units or a medium/high secure service. Open wards v low secure units AUC = 0.805 (95% CI 0.680 to 0.930); low secure v medium/high secure AUC = 0.866, (95% CI 0.784 to 0.949). Item to outcome correlations were significant for all 11 items. Conclusions The DUNDRUM-1 triage security scale and its items performed to criterion levels when tested against the real world outcome. This instrument can be used to ensure consistency in decision making when deciding who to admit to secure forensic hospitals. It can also be used to benchmark admission thresholds between services and jurisdictions. In this study we found some divergence between assessed need and actual placement. This provides fertile

  11. Securing Chinese nuclear power development: further strengthening nuclear security

    International Nuclear Information System (INIS)

    Zhang Hui

    2014-01-01

    Chinese President Xi Jinping addresses China's new concept of nuclear security with four 'equal emphasis' at the third Nuclear Security Summit, and makes four commitments to strengthen nuclear security in the future. To convert President Xi's political commitments into practical, sustainable reality, China should take further steps to install a complete, reliable, and effective security system to ensure that all its nuclear materials and nuclear facilities are effectively protected against the full spectrum of plausible terrorist and criminal threats. This paper suggests the following measures be taken to improve China's existing nuclear security system, including updating and clarifying the requirements for a national level DBT; updating and enforcing existing regulations; further promoting nuclear security culture; balancing the costs of nuclear security, and further strengthening international cooperation on nuclear security. (author)

  12. Revised CDM baseline study on fuel use and manure management at household level

    Energy Technology Data Exchange (ETDEWEB)

    Buysman, E.; Bryan, S.; Pino, M.

    2010-05-15

    This report presents the revised study of the original CDM baseline study conducted in 2006. The original study was conducted under the authority of the National Biogas Program (NBP), to study the potential GHG mitigation resulting from the adoption of domestic biodigesters. In the beginning of June 2006, a survey amongst 300 randomly selected households with the technical potential for a biodigester was conducted in the NBP's 6-targeted provinces (Kampong Cham, Svay Rieng, Prey Veng, Kampong Speu, Takeo and Kandal) in southeast Cambodia. The revised baseline study includes two additional provinces, Kampot and Kampong Chhnang. The survey showed that a significant proportion of the households have no access to basic sanitation and often have health problems. They consume mainly wood as cooking fuel and the majority use inefficient cooking stoves. The main lighting fuel is kerosene. The GHG emissions were calculated for each type of Animal Waste Management System (AWMS) and the baseline fuel consumption. The main methodology used is the GS-VER biodigester methodology and the IPCC 2006 guidelines to ex-ante estimate baseline, project and the emission reductions. The GHG emission from wood burning is only considered when it originates from a non-renewable source. The NRB analysis determined a NRB share of 70.7% for both collected and purchased wood. Total GHG emission is calculated by combining AWMS and wood fuels emissions. The annual baseline and project emission was estimated to be respectively 5.38 tCO2eq and 0.46 tCO2eq per average household, the emission reductions (ER) are therefore 4.92 tCO2eq/household/year.

  13. Asynchronous Multi-Party Computation with Quadratic Communication

    DEFF Research Database (Denmark)

    Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz

    2008-01-01

    We present an efficient protocol for secure multi-party computation in the asynchronous model with optimal resilience. For n parties, up to t < n/3 of them being corrupted, and security parameter κ, a circuit with c gates can be securely computed with communication complexity O(cn^2k) bits, which...... circuit randomization due to Beaver (Crypto’91), and an abstraction of certificates, which can be of independent interest....

  14. Updated baseline for a staged Compact Linear Collider

    CERN Document Server

    Boland, M J; Giansiracusa, P J; Lucas, T G; Rassool, R P; Balazs, C; Charles, T K; Afanaciev, K; Emeliantchik, I; Ignatenko, A; Makarenko, V; Shumeiko, N; Patapenka, A; Zhuk, I; Abusleme Hoffman, A C; Diaz Gutierrez, M A; Gonzalez, M Vogel; Chi, Y; He, X; Pei, G; Pei, S; Shu, G; Wang, X; Zhang, J; Zhao, F; Zhou, Z; Chen, H; Gao, Y; Huang, W; Kuang, Y P; Li, B; Li, Y; Shao, J; Shi, J; Tang, C; Wu, X; Ma, L; Han, Y; Fang, W; Gu, Q; Huang, D; Huang, X; Tan, J; Wang, Z; Zhao, Z; Laštovička, T; Uggerhoj, U; Wistisen, T N; Aabloo, A; Eimre, K; Kuppart, K; Vigonski, S; Zadin, V; Aicheler, M; Baibuz, E; Brücken, E; Djurabekova, F; Eerola, P; Garcia, F; Haeggström, E; Huitu, K; Jansson, V; Karimaki, V; Kassamakov, I; Kyritsakis, A; Lehti, S; Meriläinen, A; Montonen, R; Niinikoski, T; Nordlund, K; Österberg, K; Parekh, M; Törnqvist, N A; Väinölä, J; Veske, M; Farabolini, W; Mollard, A; Napoly, O; Peauger, F; Plouin, J; Bambade, P; Chaikovska, I; Chehab, R; Davier, M; Kaabi, W; Kou, E; LeDiberder, F; Pöschl, R; Zerwas, D; Aimard, B; Balik, G; Baud, J-P; Blaising, J-J; Brunetti, L; Chefdeville, M; Drancourt, C; Geoffroy, N; Jacquemier, J; Jeremie, A; Karyotakis, Y; Nappa, J M; Vilalte, S; Vouters, G; Bernard, A; Peric, I; Gabriel, M; Simon, F; Szalay, M; van der Kolk, N; Alexopoulos, T; Gazis, E N; Gazis, N; Ikarios, E; Kostopoulos, V; Kourkoulis, S; Gupta, P D; Shrivastava, P; Arfaei, H; Dayyani, M K; Ghasem, H; Hajari, S S; Shaker, H; Ashkenazy, Y; Abramowicz, H; Benhammou, Y; Borysov, O; Kananov, S; Levy, A; Levy, I; Rosenblat, O; D'Auria, G; Di Mitri, S; Abe, T; Aryshev, A; Higo, T; Makida, Y; Matsumoto, S; Shidara, T; Takatomi, T; Takubo, Y; Tauchi, T; Toge, N; Ueno, K; Urakawa, J; Yamamoto, A; Yamanaka, M; Raboanary, R; Hart, R; van der Graaf, H; Eigen, G; Zalieckas, J; Adli, E; Lillestøl, R; Malina, L; Pfingstner, J; Sjobak, K N; Ahmed, W; Asghar, M I; Hoorani, H; Bugiel, S; Dasgupta, R; Firlej, M; Fiutowski, T A; Idzik, M; Kopec, M; Kuczynska, M; Moron, J; Swientek, K P; Daniluk, W; Krupa, B; Kucharczyk, M; Lesiak, T; Moszczynski, A; Pawlik, B; Sopicki, P; Wojtoń, T; Zawiejski, L; Kalinowski, J; Krawczyk, M; Żarnecki, A F; Firu, E; Ghenescu, V; Neagu, A T; Preda, T; Zgura, I-S; Aloev, A; Azaryan, N; Budagov, J; Chizhov, M; Filippova, M; Glagolev, V; Gongadze, A; Grigoryan, S; Gudkov, D; Karjavine, V; Lyablin, M; Olyunin, A; Samochkine, A; Sapronov, A; Shirkov, G; Soldatov, V; Solodko, A; Solodko, E; Trubnikov, G; Tyapkin, I; Uzhinsky, V; Vorozhtov, A; Levichev, E; Mezentsev, N; Piminov, P; Shatilov, D; Vobly, P; Zolotarev, K; Bozovic-Jelisavcic, I; Kacarevic, G; Lukic, S; Milutinovic-Dumbelovic, G; Pandurovic, M; Iriso, U; Perez, F; Pont, M; Trenado, J; Aguilar-Benitez, M; Calero, J; Garcia-Tabares, L; Gavela, D; Gutierrez, J L; Lopez, D; Toral, F; Moya, D; Ruiz-Jimeno, A; Vila, I; Argyropoulos, T; Blanch Gutierrez, C; Boronat, M; Esperante, D; Faus-Golfe, A; Fuster, J; Fuster Martinez, N; Galindo Muñoz, N; García, I; Giner Navarro, J; Ros, E; Vos, M; Brenner, R; Ekelöf, T; Jacewicz, M; Ögren, J; Olvegård, M; Ruber, R; Ziemann, V; Aguglia, D; Alipour Tehrani, N; Aloev, A; Andersson, A; Andrianala, F; Antoniou, F; Artoos, K; Atieh, S; Ballabriga Sune, R; Barnes, M J; Barranco Garcia, J; Bartosik, H; Belver-Aguilar, C; Benot Morell, A; Bett, D R; Bettoni, S; Blanchot, G; Blanco Garcia, O; Bonnin, X A; Brunner, O; Burkhardt, H; Calatroni, S; Campbell, M; Catalan Lasheras, N; Cerqueira Bastos, M; Cherif, A; Chevallay, E; Constance, B; Corsini, R; Cure, B; Curt, S; Dalena, B; Dannheim, D; De Michele, G; De Oliveira, L; Deelen, N; Delahaye, J P; Dobers, T; Doebert, S; Draper, M; Duarte Ramos, F; Dubrovskiy, A; Elsener, K; Esberg, J; Esposito, M; Fedosseev, V; Ferracin, P; Fiergolski, A; Foraz, K; Fowler, A; Friebel, F; Fuchs, J-F; Fuentes Rojas, C A; Gaddi, A; Garcia Fajardo, L; Garcia Morales, H; Garion, C; Gatignon, L; Gayde, J-C; Gerwig, H; Goldblatt, A N; Grefe, C; Grudiev, A; Guillot-Vignot, F G; Gutt-Mostowy, M L; Hauschild, M; Hessler, C; Holma, J K; Holzer, E; Hourican, M; Hynds, D; Inntjore Levinsen, Y; Jeanneret, B; Jensen, E; Jonker, M; Kastriotou, M; Kemppinen, J M K; Kieffer, R B; Klempt, W; Kononenko, O; Korsback, A; Koukovini Platia, E; Kovermann, J W; Kozsar, C-I; Kremastiotis, I; Kulis, S; Latina, A; Leaux, F; Lebrun, P; Lefevre, T; Linssen, L; Llopart Cudie, X; Maier, A A; Mainaud Durand, H; Manosperti, E; Marelli, C; Marin Lacoma, E; Martin, R; Mazzoni, S; Mcmonagle, G; Mete, O; Mether, L M; Modena, M; Münker, R M; Muranaka, T; Nebot Del Busto, E; Nikiforou, N; Nisbet, D; Nonglaton, J-M; Nuiry, F X; Nürnberg, A; Olvegard, M; Osborne, J; Papadopoulou, S; Papaphilippou, Y; Passarelli, A; Patecki, M; Pazdera, L; Pellegrini, D; Pepitone, K; Perez, F; Perez Codina, E; Perez Fontenla, A; Persson, T H B; Petrič, M; Pitters, F; Pittet, S; Plassard, F; Rajamak, R; Redford, S; Renier, Y; Rey, S F; Riddone, G; Rinolfi, L; Rodriguez Castro, E; Roloff, P; Rossi, C; Rude, V; Rumolo, G; Sailer, A; Santin, E; Schlatter, D; Schmickler, H; Schulte, D; Shipman, N; Sicking, E; Simoniello, R; Skowronski, P K; Sobrino Mompean, P; Soby, L; Sosin, M P; Sroka, S; Stapnes, S; Sterbini, G; Ström, R; Syratchev, I; Tecker, F; Thonet, P A; Timeo, L; Timko, H; Tomas Garcia, R; Valerio, P; Vamvakas, A L; Vivoli, A; Weber, M A; Wegner, R; Wendt, M; Woolley, B; Wuensch, W; Uythoven, J; Zha, H; Zisopoulos, P; Benoit, M; Vicente Barreto Pinto, M; Bopp, M; Braun, H H; Csatari Divall, M; Dehler, M; Garvey, T; Raguin, J Y; Rivkin, L; Zennaro, R; Aksoy, A; Nergiz, Z; Pilicer, E; Tapan, I; Yavas, O; Baturin, V; Kholodov, R; Lebedynskyi, S; Miroshnichenko, V; Mordyk, S; Profatilova, I; Storizhko, V; Watson, N; Winter, A; Goldstein, J; Green, S; Marshall, J S; Thomson, M A; Xu, B; Gillespie, W A; Pan, R; Tyrk, M A; Protopopescu, D; Robson, A; Apsimon, R; Bailey, I; Burt, G; Constable, D; Dexter, A; Karimian, S; Lingwood, C; Buckland, M D; Casse, G; Vossebeld, J; Bosco, A; Karataev, P; Kruchinin, K; Lekomtsev, K; Nevay, L; Snuverink, J; Yamakawa, E; Boisvert, V; Boogert, S; Boorman, G; Gibson, S; Lyapin, A; Shields, W; Teixeira-Dias, P; West, S; Jones, R; Joshi, N; Bodenstein, R; Burrows, P N; Christian, G B; Gamba, D; Perry, C; Roberts, J; Clarke, J A; Collomb, N A; Jamison, S P; Shepherd, B J A; Walsh, D; Demarteau, M; Repond, J; Weerts, H; Xia, L; Wells, J D; Adolphsen, C; Barklow, T; Breidenbach, M; Graf, N; Hewett, J; Markiewicz, T; McCormick, D; Moffeit, K; Nosochkov, Y; Oriunno, M; Phinney, N; Rizzo, T; Tantawi, S; Wang, F; Wang, J; White, G; Woodley, M

    2016-01-01

    The Compact Linear Collider (CLIC) is a multi-TeV high-luminosity linear e+e- collider under development. For an optimal exploitation of its physics potential, CLIC is foreseen to be built and operated in a staged approach with three centre-of-mass energy stages ranging from a few hundred GeV up to 3 TeV. The first stage will focus on precision Standard Model physics, in particular Higgs and top-quark measurements. Subsequent stages will focus on measurements of rare Higgs processes, as well as searches for new physics processes and precision measurements of new states, e.g. states previously discovered at LHC or at CLIC itself. In the 2012 CLIC Conceptual Design Report, a fully optimised 3 TeV collider was presented, while the proposed lower energy stages were not studied to the same level of detail. This report presents an updated baseline staging scenario for CLIC. The scenario is the result of a comprehensive study addressing the performance, cost and power of the CLIC accelerator complex as a function of...

  15. The strategic security officer.

    Science.gov (United States)

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  16. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    Science.gov (United States)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  17. Is Preventative Long-Segment Surgery for Multi-Level Spondylolysis Necessary? A Finite Element Analysis Study.

    Directory of Open Access Journals (Sweden)

    Jianqiang Mo

    Full Text Available For multi-level spondylolysis patients, surgeons commonly choose to fix all the segments with pars interarticularis defect even those without slippage and not responsible for clinical symptoms. In this study, we tried to study the necessity of the preventative long-segment surgery for the defected segment without slippage in treatment of multi-level spondylolysis patients from a biomechanical perspective.We established a bi-level spondylolysis model with pars defects at L4 and L5 segments, and simulated posterior lumbar interbody fusion (PLIF and pedicle screw fixation at L5-S1 level. Then we compared the biomechanical changes at L4 segment before and after surgery in neutral, flexion, extension, lateral bending and axial rotation position.The stress on L4 pars interarticularis was very similar before and after surgery, and reached the highest in axial rotation. The L3-L4 intradiscal pressure was almost the same, while L4-L5 intradiscal pressure changed a little in lateral bending (increase from 1.993 to 2.160 MPa and axial rotation (decrease from 1.639 to 1.307 MPa after surgery. The PLIF surgery caused a little increase of range of motion at adjacent L4-L5 and L3-L4 levels, but the change is very tiny (1 degree.The PLIF surgery will not cause significant biomechanical change at adjacent segment with pars defect in multi-level spondylolysis. On the contrary, excessive long-segment surgery will damage surrounding soft tissues which are important for maintaining the stability of spine. So a preventative long-segment surgery is not necessary for multi-level spondylolysis as long as there are no soft tissue degeneration signs at adjacent level.

  18. Is Preventative Long-Segment Surgery for Multi-Level Spondylolysis Necessary? A Finite Element Analysis Study.

    Science.gov (United States)

    Mo, Jianqiang; Zhang, Wen; Zhong, Dongyan; Xu, Hao; Wang, Lan; Yu, Jia; Luo, Zongping

    2016-01-01

    For multi-level spondylolysis patients, surgeons commonly choose to fix all the segments with pars interarticularis defect even those without slippage and not responsible for clinical symptoms. In this study, we tried to study the necessity of the preventative long-segment surgery for the defected segment without slippage in treatment of multi-level spondylolysis patients from a biomechanical perspective. We established a bi-level spondylolysis model with pars defects at L4 and L5 segments, and simulated posterior lumbar interbody fusion (PLIF) and pedicle screw fixation at L5-S1 level. Then we compared the biomechanical changes at L4 segment before and after surgery in neutral, flexion, extension, lateral bending and axial rotation position. The stress on L4 pars interarticularis was very similar before and after surgery, and reached the highest in axial rotation. The L3-L4 intradiscal pressure was almost the same, while L4-L5 intradiscal pressure changed a little in lateral bending (increase from 1.993 to 2.160 MPa) and axial rotation (decrease from 1.639 to 1.307 MPa) after surgery. The PLIF surgery caused a little increase of range of motion at adjacent L4-L5 and L3-L4 levels, but the change is very tiny (1 degree). The PLIF surgery will not cause significant biomechanical change at adjacent segment with pars defect in multi-level spondylolysis. On the contrary, excessive long-segment surgery will damage surrounding soft tissues which are important for maintaining the stability of spine. So a preventative long-segment surgery is not necessary for multi-level spondylolysis as long as there are no soft tissue degeneration signs at adjacent level.

  19. Baseline descriptions for LWR spent fuel storage, handling, and transportation

    Energy Technology Data Exchange (ETDEWEB)

    Moyer, J.W.; Sonnier, C.S.

    1978-04-01

    Baseline descriptions for the storage, handling, and transportation of reactor spent fuel are provided. The storage modes described include light water reactor (LWR) pools, away-from-reactor basins, dry surface storage, reprocessing-facility interim storage pools, and deep geologic storage. Land and water transportation are also discussed. This work was sponsored by the Department of Energy/Office of Safeguards and Security as part of the Sandia Laboratories Fixed Facility Physical Protection Program. 45 figs, 4 tables.

  20. Baseline descriptions for LWR spent fuel storage, handling, and transportation

    International Nuclear Information System (INIS)

    Moyer, J.W.; Sonnier, C.S.

    1978-04-01

    Baseline descriptions for the storage, handling, and transportation of reactor spent fuel are provided. The storage modes described include light water reactor (LWR) pools, away-from-reactor basins, dry surface storage, reprocessing-facility interim storage pools, and deep geologic storage. Land and water transportation are also discussed. This work was sponsored by the Department of Energy/Office of Safeguards and Security as part of the Sandia Laboratories Fixed Facility Physical Protection Program. 45 figs, 4 tables