WorldWideScience

Sample records for critical windows security

  1. *New* CRITICAL Windows Security patch

    CERN Multimedia

    2003-01-01

    On 10 September 2003, Microsoft issued a new CRITICAL security patch, MS03-039. It must be URGENTLY applied on ALL WINDOWS systems, which are not centrally managed for security patches. This includes Experiment computers, Home computers and Windows Portable and Desktop systems not running NICE. Details of the security hole and patch for MS03-039 (which also includes MS03-026) are at: http://cern.ch/it-div/news/hotfix-MS03-039.asp http://www.microsoft.com/technet/security/bulletin/MS03-039.asp

  2. *New*: CRITICAL Windows Security patch

    CERN Multimedia

    2003-01-01

    On 10 September 2003, Microsoft issued a new CRITICAL security patch, MS03-039. It must be URGENTLY applied on ALL WINDOWS systems, which are not centrally managed for security patches. This includes Experiment computers, Home computers and Windows Portable and Desktop systems not running NICE. Details of the security hole and patch for MS03-039 (which also includes MS03-026) are at: http://cern.ch/it-div/news/hotfix-MS03-039.asp http://www.microsoft.com/technet/security/bulletin/MS03-039.asp

  3. *NEW* CRITICAL Windows Security patches

    CERN Multimedia

    2003-01-01

    On 3 October and 10 September 2003, Microsoft issued new CRITICAL security patches MS03-040 and MS03-039. They must be URGENTLY applied on ALL WINDOWS systems, which are not centrally managed for security patches. This includes Experiment computers, Home computers and Windows Portable and Desktop systems not running NICE. Details of the security holes and patches are at: MS03-039: http://cern.ch/it-div/news/hotfix-MS03-039.asp http://www.microsoft.com/technet/security/bulletin/MS03-039.asp MS03-040: http://cern.ch/it-div/news/hotfix-MS03-040.asp http://www.microsoft.com/technet/security/bulletin/MS03-040.asp

  4. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  5. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  6. Windows Server 2012 vulnerabilities and security

    Directory of Open Access Journals (Sweden)

    Gabriel R. López

    2015-09-01

    Full Text Available This investigation analyses the history of the vulnerabilities of the base system Windows Server 2012 highlighting the most critic vulnerabilities given every 4 months since its creation until the current date of the research. It was organized by the type of vulnerabilities based on the classification of the NIST. Next, given the official vulnerabilities of the system, the authors show how a critical vulnerability is treated by Microsoft in order to countermeasure the security flaw. Then, the authors present the recommended security approaches for Windows Server 2012, which focus on the baseline software given by Microsoft, update, patch and change management, hardening practices and the application of Active Directory Rights Management Services (AD RMS. AD RMS is considered as an important feature since it is able to protect the system even though it is compromised using access lists at a document level. Finally, the investigation of the state of the art related to the security of Windows Server 2012 shows an analysis of solutions given by third parties vendors, which offer security products to secure the base system objective of this study. The recommended solution given by the authors present the security vendor Symantec with its successful features and also characteristics that the authors considered that may have to be improved in future versions of the security solution.

  7. Windows 2012 Server network security securing your Windows network systems and infrastructure

    CERN Document Server

    Rountree, Derrick

    2013-01-01

    Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall

  8. Microsoft Windows Server 2003: Security Enhancements and New Features

    National Research Council Canada - National Science Library

    Montehermoso, Ronald

    2004-01-01

    .... Windows NT and Windows 2000 were known to have numerous security vulnerabilities; hence Microsoft focused on improving security by making Windows Server 2003 secure by design, secure by default, secure in deployment...

  9. Windows XP Operating System Security Analysis

    National Research Council Canada - National Science Library

    Goktepe, Meftun

    2002-01-01

    .... The purpose of this research is to determine if Windows XP, when used as a workstation operating system in domain- based networks, provides adequate security policy enforcement for organizations...

  10. Computer Security: Bye, Bye, Windows XP security... Welcome infections!

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Rest in peace, Windows XP. Since your birth on 25 October 2001, you have struggled hard to survive this harsh Internet world. You fell prey to “Melissa”, “Sasser” and “Conficker”, and brought CERN its last large-scale infection with “Blaster” in 2004.    After being upgraded to “SP2”, you discovered software development lifecycles, regular “Patch Tuesdays” and a local firewall that rejected everything by default. In the end, you outlived your weird brother “Vista” and survived as the ugly duckling cousin to the beautiful Mr. Mac. But all your ups and downs are over now. On 8 April 2014, you were given your very last security updates. These life-sustaining measures will be stopped now. Game over. From now on, you are a zombie: presumed dead, but still kept running by your master/owner/user. They might not even understand that you now pose a risk ...

  11. CRITICAL WINDOWS FOR REPRODUCTIVE HEALTH IN CHILDREN AND ADOLESCENTS

    Science.gov (United States)

    This workgroup report addresses the central question: what are the critical windows during development (pre-conception through puberty) when exposure to xenobiotics may have the greatest adverse impact on subsequent reproductive health. The reproductive system develops in stages...

  12. Windows Vista Kernel-Mode: Functions, Security Enhancements and Flaws

    Directory of Open Access Journals (Sweden)

    Mohammed D. ABDULMALIK

    2008-06-01

    Full Text Available Microsoft has made substantial enhancements to the kernel of the Microsoft Windows Vista operating system. Kernel improvements are significant because the kernel provides low-level operating system functions, including thread scheduling, interrupt and exception dispatching, multiprocessor synchronization, and a set of routines and basic objects.This paper describes some of the kernel security enhancements for 64-bit edition of Windows Vista. We also point out some weakness areas (flaws that can be attacked by malicious leading to compromising the kernel.

  13. Design and Verification of Critical Pressurised Windows for Manned Spaceflight

    Science.gov (United States)

    Lamoure, Richard; Busto, Lara; Novo, Francisco; Sinnema, Gerben; Leal, Mendes M.

    2014-06-01

    The Window Design for Manned Spaceflight (WDMS) project was tasked with establishing the state-of-art and explore possible improvements to the current structural integrity verification and fracture control methodologies for manned spacecraft windows.A critical review of the state-of-art in spacecraft window design, materials and verification practice was conducted. Shortcomings of the methodology in terms of analysis, inspection and testing were identified. Schemes for improving verification practices and reducing conservatism whilst maintaining the required safety levels were then proposed.An experimental materials characterisation programme was defined and carried out with the support of the 'Glass and Façade Technology Research Group', at the University of Cambridge. Results of the sample testing campaign were analysed, post-processed and subsequently applied to the design of a breadboard window demonstrator.Two Fused Silica glass window panes were procured and subjected to dedicated analyses, inspection and testing comprising both qualification and acceptance programmes specifically tailored to the objectives of the activity.Finally, main outcomes have been compiled into a Structural Verification Guide for Pressurised Windows in manned spacecraft, incorporating best practices and lessons learned throughout this project.

  14. TCIA Secure Cyber Critical Infrastructure Modernization.

    Energy Technology Data Exchange (ETDEWEB)

    Keliiaa, Curtis M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.

  15. A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications

    Directory of Open Access Journals (Sweden)

    Silvia TRIF

    2011-01-01

    Full Text Available This paper present and implement a Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Application. In the developing process is used a Windows Phone 7 application that interact with a WCF Web Service and a database. The types of Business Intelligence Mobile Applications are presented. The Windows mobile devices security and restrictions are presented. The namespaces and security algorithms used in .NET Compact Framework for assuring the application security are presented. The proposed architecture is showed underlying the flows between the application and the web service.

  16. Cyber security of critical infrastructures

    Directory of Open Access Journals (Sweden)

    Leandros A. Maglaras

    2018-03-01

    Full Text Available Modern Supervisory Control and Data Acquisition (SCADA systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the Internet of Things, SCADA has evolved into big, complex and distributed systems that are prone to be conventional in addition to new threats. Many security methods can be applied to such systems, having in mind that both high efficiency, real time intrusion identification and low overhead are required. Keywords: SCADA systems, Security

  17. Windows

    DEFF Research Database (Denmark)

    Heiselberg, Per; Svidt, Kjeld; Nielsen, Peter V.

    In natural ventilation systems fresh air is often provided through opening of windows. However, the knowledge of the performance of windows is rather limited. Computation of natural ventilation air flow through windows is most commonly made using discharge coefficients, that are regarded as being...... constant. The reported results show that the discharge coefficient for a window opening cannot be regarded as a constant and that it varies considerably with the size of the opening area, the window type and the temperature difference. Therefore, the use of a constant value can lead to serious errors...

  18. Windows 7 Tweaks A Comprehensive Guide on Customizing, Increasing Performance, and Securing Microsoft Windows 7

    CERN Document Server

    Sinchak, Steve

    2009-01-01

    The definitive guide to unlocking the hidden potential of the Windows 7 OS. Written by bestselling author and the creator of tweaks.com Steve Sinchak, this unique guide provides you with the ultimate collection of hidden gems that will enable you to get the most out of Windows 7. Packed with more than 400 pages of insider tips, the book delves beneath the surface to reveal little-known ways to tweak, modify, and customize Windows 7 so you can get every ounce of performance from your operating system. Regardless of your experience with tweaking your system, you'll find fascinating and fun tips

  19. Critically Important Object Security System Element Model

    Directory of Open Access Journals (Sweden)

    I. V. Khomyackov

    2012-03-01

    Full Text Available A stochastic model of critically important object security system element has been developed. The model includes mathematical description of the security system element properties and external influences. The state evolution of the security system element is described by the semi-Markov process with finite states number, the semi-Markov matrix and the initial semi-Markov process states probabilities distribution. External influences are set with the intensity of the Poisson thread.

  20. Critical infrastructure system security and resiliency

    CERN Document Server

    Biringer, Betty; Warren, Drake

    2013-01-01

    Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard. With an emphasis on protecting an infrastructure's ability to perform its mission or function, Critical Infrastructure System Security and Resiliency presents a practical methodology for developing an effective protection system that can either prevent undesired events or mitigate the consequences of such events.Developed at Sandia National Labs, the authors' analytical approach and

  1. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  2. Security for safety critical space borne systems

    Science.gov (United States)

    Legrand, Sue

    1987-01-01

    The Space Station contains safety critical computer software components in systems that can affect life and vital property. These components require a multilevel secure system that provides dynamic access control of the data and processes involved. A study is under way to define requirements for a security model providing access control through level B3 of the Orange Book. The model will be prototyped at NASA-Johnson Space Center.

  3. Critical Infrastructure Protection: Maintenance is National Security

    Directory of Open Access Journals (Sweden)

    Kris Hemme

    2015-10-01

    Full Text Available U.S. critical infrastructure protection (CIP necessitates both the provision of security from internal and external threats and the repair of physically damaged critical infrastructure which may disrupt services. For years, the U.S. infrastructure has been deteriorating, triggering enough damage and loss of life to give cause for major concern. CIP is typically only addressed after a major disaster or catastrophe due to the extreme scrutiny that follows these events. In fact, CIP has been addressed repeatedly since Presidential Decision Directive Sixty-Three (PDD Sixty-Three signed by President Bill Clinton on May Twenty-Second, 1998.[1] This directive highlighted critical infrastructure as “a growing potential vulnerability” and recognized that the United States has to view the U.S. national infrastructure from a security perspective due to its importance to national and economic security. CIP must be addressed in a preventive, rather than reactive, manner.[2] As such, there are sixteen critical infrastructure sectors, each with its own protection plan and unique natural and man-made threats, deteriorations, and risks. A disaster or attack on any one of these critical infrastructures could cause serious damage to national security and possibly lead to the collapse of the entire infrastructure. [1] The White House, Presidential Decision Directive/NSC–63 (Washington D.C.: The White House, May 22, 1998: 1–18, available at: http://www.epa.gov/watersecurity/tools/trainingcd/Guidance/pdd-63.pdf. [2] Ibid, 1.

  4. Critical infrastructure security assessment, prevention, detection, response

    CERN Document Server

    FLAMMINI, F

    2012-01-01

    The most comprehensive handbook on critical infrastructures (CI), addressing both logical and physical security from an engineering point of view. The book surveys state-of-the-art methodologies and tools for CI analysis as well as strategies and technologies for CI protection.

  5. Improving Windows desktop security - the 'Non-Admin' Project

    CERN Multimedia

    NICE Team

    2005-01-01

    From 16 January 2006, Windows XP NICE installations (both new computers installed and old computers re-installed) will no longer grant administrative privileges by default to the main user or to the person responsible for the computer. Administrative privileges allow the user to perform administrative actions on the computer, such as installing new applications or changing system settings. Until now, these privileges have been enforced each time machines are rebooted, but this creates a risk of compromising the computer every time a code from an unknown source (e.g. e-mail attachments or web browsing) is executed. So that users can continue to install software and change system settings on their computers, a shortcut called 'NiceAdmin' in the Start | Programmes menu will offer a means of performing certain tasks requiring administrative privileges, but only on demand. Users with valid reasons to be a permanent administrator for their machine will still have this option. However, users wishing to benefit fr...

  6. Close the Gate, Lock the Windows, Bolt the Doors: Securing Library Computers. Online Treasures

    Science.gov (United States)

    Balas, Janet

    2005-01-01

    This article, written by a systems librarian at the Monroeville Public Library, discusses a major issue affecting all computer users, security. It indicates that while, staying up-to-date on the latest security issues has become essential for all computer users, it's more critical for network managers who are responsible for securing computer…

  7. From Camps to Conversations in Critical Security Studies

    DEFF Research Database (Denmark)

    Hansen, Lene

    2008-01-01

    The article reviews the book "Critical Approaches to International Security," by Karin M. Fierke......The article reviews the book "Critical Approaches to International Security," by Karin M. Fierke...

  8. Security Economics and Critical National Infrastructure

    Science.gov (United States)

    Anderson, Ross; Fuloria, Shailendra

    There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure' against online attack. This is commonly interpreted to mean preventing online sabotage against utilities such as electricity,oil and gas, water, and sewage - including pipelines, refineries, generators, storage depots and transport facilities such as tankers and terminals. A consensus is emerging that the protection of such assets is more a matter of business models and regulation - in short, of security economics - than of technology. We describe the problems, and the state of play, in this paper. Industrial control systems operate in a different world from systems previously studied by security economists; we find the same issues (lock-in, externalities, asymmetric information and so on) but in different forms. Lock-in is physical, rather than based on network effects, while the most serious externalities result from correlated failure, whether from cascade failures, common-mode failures or simultaneous attacks. There is also an interesting natural experiment happening, in that the USA is regulating cyber security in the electric power industry, but not in oil and gas, while the UK is not regulating at all but rather encouraging industry's own efforts. Some European governments are intervening, while others are leaving cybersecurity entirely to plant owners to worry about. We already note some perverse effects of the U.S. regulation regime as companies game the system, to the detriment of overall dependability.

  9. Potential for Bias When Estimating Critical Windows for Air Pollution in Children's Health.

    Science.gov (United States)

    Wilson, Ander; Chiu, Yueh-Hsiu Mathilda; Hsu, Hsiao-Hsien Leon; Wright, Robert O; Wright, Rosalind J; Coull, Brent A

    2017-12-01

    Evidence supports an association between maternal exposure to air pollution during pregnancy and children's health outcomes. Recent interest has focused on identifying critical windows of vulnerability. An analysis based on a distributed lag model (DLM) can yield estimates of a critical window that are different from those from an analysis that regresses the outcome on each of the 3 trimester-average exposures (TAEs). Using a simulation study, we assessed bias in estimates of critical windows obtained using 3 regression approaches: 1) 3 separate models to estimate the association with each of the 3 TAEs; 2) a single model to jointly estimate the association between the outcome and all 3 TAEs; and 3) a DLM. We used weekly fine-particulate-matter exposure data for 238 births in a birth cohort in and around Boston, Massachusetts, and a simulated outcome and time-varying exposure effect. Estimates using separate models for each TAE were biased and identified incorrect windows. This bias arose from seasonal trends in particulate matter that induced correlation between TAEs. Including all TAEs in a single model reduced bias. DLM produced unbiased estimates and added flexibility to identify windows. Analysis of body mass index z score and fat mass in the same cohort highlighted inconsistent estimates from the 3 methods. © The Author(s) 2017. Published by Oxford University Press on behalf of the Johns Hopkins Bloomberg School of Public Health. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  10. Critical Windows of Cardiovascular Susceptibility to Developmental Hypoxia in Common Snapping Turtle (Chelydra serpentina) Embryos.

    Science.gov (United States)

    Tate, Kevin B; Kohl, Zachary F; Eme, John; Rhen, Turk; Crossley, Dane A

    2015-01-01

    Environmental conditions fluctuate dramatically in some reptilian nests. However, critical windows of environmental sensitivity for cardiovascular development have not been identified. Continuous developmental hypoxia has been shown to alter cardiovascular form and function in embryonic snapping turtles (Chelydra serpentina), and we used this species to identify critical periods during which hypoxia modifies the cardiovascular phenotype. We hypothesized that incubation in 10% O2 during specific developmental periods would have differential effects on the cardiovascular system versus overall somatic growth. Two critical windows were identified with 10% O2 from 50% to 70% of incubation, resulting in relative heart enlargement, either via preservation of or preferential growth of this tissue, while exposure to 10% O2 from 20% to 70% of incubation resulted in a reduction in arterial pressure. The deleterious or advantageous aspects of these embryonic phenotypes in posthatching snapping turtles have yet to be explored. However, identification of these critical windows has provided insight into how the developmental environment alters the phenotype of reptiles and will also be pivotal in understanding its impact on the fitness of egg-laying reptiles.

  11. Critical disease windows shaped by stress exposure alter allocation trade-offs between development and immunity.

    Science.gov (United States)

    Kirschman, Lucas J; Crespi, Erica J; Warne, Robin W

    2018-01-01

    Ubiquitous environmental stressors are often thought to alter animal susceptibility to pathogens and contribute to disease emergence. However, duration of exposure to a stressor is likely critical, because while chronic stress is often immunosuppressive, acute stress can temporarily enhance immune function. Furthermore, host susceptibility to stress and disease often varies with ontogeny; increasing during critical developmental windows. How the duration and timing of exposure to stressors interact to shape critical windows and influence disease processes is not well tested. We used ranavirus and larval amphibians as a model system to investigate how physiological stress and pathogenic infection shape development and disease dynamics in vertebrates. Based on a resource allocation model, we designed experiments to test how exposure to stressors may induce resource trade-offs that shape critical windows and disease processes because the neuroendocrine stress axis coordinates developmental remodelling, immune function and energy allocation in larval amphibians. We used wood frog larvae (Lithobates sylvaticus) to investigate how chronic and acute exposure to corticosterone, the dominant amphibian glucocorticoid hormone, mediates development and immune function via splenocyte immunohistochemistry analysis in association with ranavirus infection. Corticosterone treatments affected immune function, as both chronic and acute exposure suppressed splenocyte proliferation, although viral replication rate increased only in the chronic corticosterone treatment. Time to metamorphosis and survival depended on both corticosterone treatment and infection status. In the control and chronic corticosterone treatments, ranavirus infection decreased survival and delayed metamorphosis, although chronic corticosterone exposure accelerated rate of metamorphosis in uninfected larvae. Acute corticosterone exposure accelerated metamorphosis increased survival in infected larvae. Interactions

  12. Critical infrastructure cyber-security risk management

    OpenAIRE

    Spyridopoulos, T.; Maraslis, K.; Tryfonas, T.; Oikonomou, G.

    2017-01-01

    Traditional IT cyber-security risk management methods are based on the evaluation of risks calculated as the likelihood of cyber-security incidents occurring. However, these probabilities are usually estimations or guesses based on past experience and incomplete data. Incorrect estimations can lead to errors in the evaluation of risks that can ultimately affect the protection of the system. This issue is also transferred to methods used in Industrial Control Systems (ICSs), as they are mainly...

  13. Critical Perspective on ASEAN's Security Policy Under ASEAN Political and Security Community

    Directory of Open Access Journals (Sweden)

    Irawan Jati

    2016-03-01

    Full Text Available   Despite economic integration challenges, ASEAN faces greater security challenges. It is obvious to assert that a stable economic development requires a secure regional atmosphere. The most probable threats against ASEAN are ranging from hostile foreign entities infiltration, intra and inter states disputes, radical religious movements, human trafficking, drugs and narcotics smuggling, cybercrimes and environmental disasters. In 2009, ASEAN established the ASEAN Political and Security Community as the umbrella of ASEAN’s political and security initiatives. APSC slots in some significant fora; ASEAN Intergovernmental Commission on Human Rights (AICHR, ASEAN Foreign Ministers Meeting (AMM,  ASEAN Regional Forum (ARF, ASEAN Defense Minister’s Meeting (ADMM, ASEAN Law Ministers Meeting (ALAWMM, and ASEAN Ministerial Meeting on Transnational Crimes (AMMTC. The wide array of these forums signify ASEAN efforts to confront double features of security; the traditional and nontraditional or critical security. The traditional security considers state security as the primary object security. While the critical security tends to focus on non-state aspects such as individual human being as its referent object. Even though some argue that APSC has been able to preserve the stability in the region, it still lack of confidence in solving critical issues such as territorial disputes and irregular migrants problems.Therefore, this piece would examine the fundamental questions: How does ASEAN address beyond state security issues in its security policy through APSC? To search for the answer this paper would apply critical security studies approach. Critical security posits that threats are not always for the states but in many cases for the people. Based on the examination of ASEAN security policies, this paper argues that ASEAN’s security policy has touched the non-traditional security issues but showing slow progress on its development and application. 

  14. U.S. Relations with Japan: A Critical Security Issue?

    National Research Council Canada - National Science Library

    Rodgers, David P

    2006-01-01

    .... The 2005 U.S. National Defense Strategy declares that, "We will create conditions for a favorable international system by honoring our security commitments"--commitments which are critical to our interests abroad...

  15. Critical Security Studies in the 21st Century: Any Directions for Lithuanian Security Studies?

    Directory of Open Access Journals (Sweden)

    Jakniūnaitė Dovilė

    2014-12-01

    Full Text Available This article focuses on recent developments and discussions in the field of security studies and aims to suggest new guidelines for the research of Lithuanian security policy. First it covers the main subjects of contemporary security discourse; next it provides evaluation and review of the critical tradition in security studies that frames presuppositions and is the means for analyzing specific security issues as well as that which fosters reflexive thinking about security. The third part deals with three topics of security research (analysis of security through the concepts of risk, exceptionality and media which have become talking-points in recent years and which have provided innovative insights in security studies.

  16. Critical Infrastructure Information Disclosure and Homeland Security

    National Research Council Canada - National Science Library

    Moteff, John D; Stevens, Gina M

    2003-01-01

    Critical infrastructures have been defined as those systems and assets so vital to the United States that the incapacity of such systems and assets would have a debilitating impact on the United States...

  17. CRITICAL INFORMATION INFRASTRUCTURE SECURITY - NETWORK INTRUSION DETECTION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Cristea DUMITRU

    2011-12-01

    Full Text Available Critical Information Infrastructure security will always be difficult to ensure, just because of the features that make it irreplaceable tor other critical infrastructures normal operation. It is decentralized, interconnected interdependent, controlled by multiple actors (mainly private and incorporating diverse types of technologies. It is almost axiomatic that the disruption of the Critical Information Infrastructure affects systems located much farther away, and the cyber problems have direct consequences on the real world. Indeed the Internet can be used as a multiplier in order to amplify the effects of an attack on some critical infrastructures. Security challenges increase with the technological progress. One of the last lines of defense which comes to complete the overall security scheme of the Critical Information Infrastructure is represented by the Network Intrusion Detection Systems.

  18. The European cooperative approach to securing critical information infrastructure.

    Science.gov (United States)

    Purser, Steve

    2011-10-01

    This paper provides an overview of the EU approach to securing critical information infrastructure, as defined in the Action Plan contained in the Commission Communication of March 2009, entitled 'Protecting Europe from large-scale cyber-attacks and disruptions: enhancing preparedness, security and resilience' and further elaborated by the Communication of May 2011 on critical Information infrastructure protection 'Achievements and next steps: towards global cyber-security'. After explaining the need for pan-European cooperation in this area, the CIIP Action Plan is explained in detail. Finally, the current state of progress is summarised together with the proposed next steps.

  19. WORKSHOP TO IDENTIFY CRITICAL WINDOWS OF EXPOSURE FOR CHILDREN'S HEALTH: REPRODUCTIVE HEALTH IN CHILDREN AND ADOLESCENTS WORK GROUP SUMMARY

    Science.gov (United States)

    This workgroup report addresses the central question: what are the critical windows during development (pre-conception through puberty) when exposure to xenobiotics may have the greatest adverse impact on subsequent reproductive health. The reproductive system develops in stages...

  20. Perinatal bisphenol A exposure and adult glucose homeostasis: identifying critical windows of exposure.

    Directory of Open Access Journals (Sweden)

    Jingli Liu

    Full Text Available Bisphenol A (BPA is a widespread endocrine-disrupting chemical used as the building block for polycarbonate plastics. Epidemiological evidence has correlated BPA exposure with higher risk of heart disease and type 2 diabetes. However, it remains unknown whether there are critical windows of susceptibility to BPA exposure on the development of dysglycemia. This study was an attempt to investigate the critical windows and the long-term consequences of perinatal exposure to BPA on glucose homeostasis. Pregnant mice were given either vehicle or BPA (100 µg/kg/day at different time of perinatal stage: 1 on days 1-6 of pregnancy (P1-P6, preimplantation exposure; 2 from day 6 of pregnancy until postnatal day (PND 0 (P6-PND0, fetal exposure; 3 from lactation until weaning (PND0-PND21, neonatal exposure; and 4 from day 6 of gestation until weaning (P6-PND21, fetal and neonatal exposure. At 3, 6 and 8 months of age, offspring in each group were challenged with glucose and insulin tolerance tests. Then islet morphometry and β-cell function were measured. The glucose homeostasis was impaired in P6-PND0 mice from 3 to 6 months of age, and this continued to 8 months in males, but not females. While in PND0-PND21 and P6-PND21 BPA-treated groups, only the 3-month-old male offspring developed glucose intolerance. Moreover, at the age of 3 months, perinatal exposure to BPA resulted in the increase of β-cell mass mainly due to the coordinate changes in cell replication, neogenesis, and apoptosis. The alterations of insulin secretion and insulin sensitivity, rather than β-cell mass, were consistent with the development of glucose intolerance. Our findings suggest that BPA may contribute to metabolic disorders relevant to glucose homeostasis and the effects of BPA were dose, sex, and time-dependent. Fetal development stage may be the critical window of susceptibility to BPA exposure.

  1. 78 FR 6807 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Science.gov (United States)

    2013-01-31

    ... coordinating and sponsoring an executive-led Critical Infrastructure Protection and Cyber Security mission to... on the cyber security, critical infrastructure protection, and emergency management, ports of entry... security, including border protection, civil defense capabilities, and coast guard and maritime...

  2. The early origins of food preferences: targeting the critical windows of development.

    Science.gov (United States)

    Gugusheff, Jessica Rose; Ong, Zhi Yi; Muhlhausler, Beverly Sara

    2015-02-01

    The nutritional environment to which an individual is exposed during the perinatal period plays a crucial role in determining his or her future metabolic health outcomes. Studies in rodent models have demonstrated that excess maternal intake of high-fat and/or high-sugar "junk foods" during pregnancy and lactation can alter the development of the central reward pathway, particularly the opioid and dopamine systems, and program an increased preference for junk foods in the offspring. More recently, there have been attempts to define the critical windows of development during which the opioid and dopamine systems within the reward pathway are most susceptible to alteration and to determine whether it is possible to reverse these effects through nutritional interventions applied later in development. This review discusses the progress made to date in these areas, highlights the apparent importance of sex in determining these effects, and considers the potential implications of the findings from rodent models in the human context. © FASEB.

  3. Critical Vision of Security Governance in Three Latin American ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    María José Peréz

    2015-05-13

    May 13, 2015 ... It will compare security policies in 3 capitals of Latin America from 2008 to 2013. • Special attention ... Council. ▫ Deputy ministers or vice ministers. Critical aspect. Lack of political weigtht to ... ▫Interventions should be based on.

  4. Climate Change and Food In/Security: A Critical Nexus

    Directory of Open Access Journals (Sweden)

    Md Saidul Islam

    2017-05-01

    Full Text Available The issue of climate change has been gaining widespread attention and concern as it has the ability to directly/indirectly affect our standard of living and quality of life. It has often been postulated that changes in climate would have a vast effect on food production systems and that food security might be threatened due to increasing climate change. However, it seems that research on climate change and food in/security has often been one-sided; with climate change being identified as the cause of food insecurity and not how the systems in place to ensure food security have exacerbated the issue of climate change. This paper thus seeks to give a more balanced view and thus understanding of the complex relationship between climate change and food security by critically examining both systems.

  5. Investigating the Impact of Maternal Residential Mobility on Identifying Critical Windows of Susceptibility to Ambient Air Pollution During Pregnancy.

    Science.gov (United States)

    Warren, Joshua L; Son, Ji-Young; Pereira, Gavin; Leaderer, Brian P; Bell, Michelle L

    2018-05-01

    Identifying periods of increased vulnerability to air pollution during pregnancy with respect to the development of adverse birth outcomes can improve understanding of possible mechanisms of disease development and provide guidelines for protection of the child. Exposure to air pollution during pregnancy is typically based on the mother's residence at delivery, potentially resulting in exposure misclassification and biasing the estimation of critical windows of pregnancy. In this study, we determined the impact of maternal residential mobility during pregnancy on defining weekly exposure to particulate matter less than or equal to 10 μm in aerodynamic diameter (PM10) and estimating windows of susceptibility to term low birth weight. We utilized data sets from 4 Connecticut birth cohorts (1988-2008) that included information on all residential addresses between conception and delivery for each woman. We designed a simulation study to investigate the impact of increasing levels of mobility on identification of critical windows. Increased PM10 exposure during pregnancy weeks 16-18 was associated with an increased probability of term low birth weight. Ignoring residential mobility when defining weekly exposure had only a minor impact on the identification of critical windows for PM10 and term low birth weight in the data application and simulation study. Identification of critical pregnancy windows was robust to exposure misclassification caused by ignoring residential mobility in these Connecticut birth cohorts.

  6. New Security Development and Trends to Secure the SCADA Sensors Automated Transmission during Critical Sessions

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2015-10-01

    Full Text Available Modern technology enhancements have been used worldwide to fulfill the requirements of the industrial sector, especially in supervisory control and data acquisition (SCADA systems as a part of industrial control systems (ICS. SCADA systems have gained popularity in industrial automations due to technology enhancements and connectivity with modern computer networks and/or protocols. The procurement of new technologies has made SCADA systems important and helpful to processing in oil lines, water treatment plants, and electricity generation and control stations. On the other hand, these systems have vulnerabilities like other traditional computer networks (or systems, especially when interconnected with open platforms. Many international organizations and researchers have proposed and deployed solutions for SCADA security enhancement, but most of these have been based on node-to-node security, without emphasizing critical sessions that are linked directly with industrial processing and automation. This study concerns SCADA security measures related to critical processing with specified sessions of automated polling, analyzing cryptography mechanisms and deploying the appropriate explicit inclusive security solution in a distributed network protocol version 3 (DNP3 stack, as part of a SCADA system. The bytes flow through the DNP3 stack with security computational bytes within specified critical intervals defined for polling. We took critical processing knowledge into account when designing a SCADA/DNP3 testbed and deploying a cryptography solution that did not affect communications.

  7. Protecting Commercial Space Systems: A Critical National Security Issue

    Science.gov (United States)

    1999-04-01

    systems. Part two will describe, at the operational level , this author’s theory for space protection and recommend a course of action to work...minimal loss of life. These factors force us to conclude this is a critical national security issue just as many in high- level government positions...Command and Staff College Operational Forces Coursebook (Academic Year 1999), 35. 3 The USCG is not a Title 10 Service, thus Posse Comitatus is not a

  8. Spatial-temporal modeling of the association between air pollution exposure and preterm birth: identifying critical windows of exposure.

    Science.gov (United States)

    Warren, Joshua; Fuentes, Montserrat; Herring, Amy; Langlois, Peter

    2012-12-01

    Exposure to high levels of air pollution during the pregnancy is associated with increased probability of preterm birth (PTB), a major cause of infant morbidity and mortality. New statistical methodology is required to specifically determine when a particular pollutant impacts the PTB outcome, to determine the role of different pollutants, and to characterize the spatial variability in these results. We develop a new Bayesian spatial model for PTB which identifies susceptible windows throughout the pregnancy jointly for multiple pollutants (PM(2.5) , ozone) while allowing these windows to vary continuously across space and time. We geo-code vital record birth data from Texas (2002-2004) and link them with standard pollution monitoring data and a newly introduced EPA product of calibrated air pollution model output. We apply the fully spatial model to a region of 13 counties in eastern Texas consisting of highly urban as well as rural areas. Our results indicate significant signal in the first two trimesters of pregnancy with different pollutants leading to different critical windows. Introducing the spatial aspect uncovers critical windows previously unidentified when space is ignored. A proper inference procedure is introduced to correctly analyze these windows. © 2012, The International Biometric Society.

  9. Intelligent monitoring, control, and security of critical infrastructure systems

    CERN Document Server

    Polycarpou, Marios

    2015-01-01

    This book describes the challenges that critical infrastructure systems face, and presents state of the art solutions to address them. How can we design intelligent systems or intelligent agents that can make appropriate real-time decisions in the management of such large-scale, complex systems? What are the primary challenges for critical infrastructure systems? The book also provides readers with the relevant information to recognize how important infrastructures are, and their role in connection with a society’s economy, security and prosperity. It goes on to describe state-of-the-art solutions to address these points, including new methodologies and instrumentation tools (e.g. embedded software and intelligent algorithms) for transforming and optimizing target infrastructures. The book is the most comprehensive resource to date for professionals in both the private and public sectors, while also offering an essential guide for students and researchers in the areas of modeling and analysis of critical in...

  10. Long-term effects of nutritional programming of the embryo and fetus: mechanisms and critical windows.

    Science.gov (United States)

    Symonds, Michael E; Stephenson, Terence; Gardner, David S; Budge, Helen

    2007-01-01

    The maternal nutritional and metabolic environment is critical in determining not only reproduction, but also long-term health and viability. In the present review, the effects of maternal nutritional manipulation at defined stages of gestation coinciding with embryogenesis, maximal placental or fetal growth will be discussed. Long-term outcomes from these three developmental windows appear to be very different, with brain and cardiovascular function being most sensitive to influences in the embryonic period, the kidney during placental development and adipose tissue in the fetal phase. In view of the similarities in fetal development, number and maturity at birth, there are close similarities in these outcomes between findings from epidemiological studies in historical human cohorts and nutritional manipulation of large animals, such as sheep. One key nutrient that may modulate the long-term metabolic effects is the supply of glucose from the mother to the fetus, because this is sensitive to both global changes in food intake, maternal glucocorticoid status and an increase in the carbohydrate content of the diet. The extent to which these dietary-induced changes may reflect epigenetic changes remains to be established, especially when considering the very artificial diets used to induce these types of effects. In summary, the maintenance of a balanced and appropriate supply of glucose from the mother to the fetus may be pivotal in ensuring optimal embryonic, placental and fetal growth. Increased or decreased maternal plasma glucose alone, or in conjunction with other macro- or micronutrients, may result in offspring at increased risk of adult diseases.

  11. Cyber security deterrence and it protection for critical infrastructures

    CERN Document Server

    Martellini, Maurizio

    2013-01-01

    The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber attacks and argues that nations are entering a new cyber arms race. The brief also provides a technical analysis of possible cyber attacks towards critical infrastructures in the chemical industry and chemical safety industry. The authors also propose modern analyses and a holistic approach to resil

  12. Handbook on Securing Cyber-Physical Critical Infrastructure

    CERN Document Server

    Das, Sajal K; Zhang, Nan

    2012-01-01

    The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports a

  13. 78 FR 39712 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Science.gov (United States)

    2013-07-02

    ... DEPARTMENT OF COMMERCE International Trade Administration Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait Clarification and Amendment AGENCY... cyber-security firms and trade organizations which have not already submitted an application are...

  14. Climate change and critical thresholds in China's food security

    International Nuclear Information System (INIS)

    Xiong, Wei; Lin, Erda; Ju, Hui; Xu, Yinlong

    2007-01-01

    Identification of 'critical thresholds' of temperature increase is an essential task for inform policy decisions on establishing greenhouse gas (GHG) emission targets. We use the A2 (medium-high GHG emission pathway) and B2 (medium-low) climate change scenarios produced by the Regional Climate Model PRECIS, the crop model - CERES, and socio-economic scenarios described by IPCC SRES, to simulate the average yield changes per hectare of three main grain crops (rice, wheat, and maize) at 50 km x 50 km scale. The threshold of food production to temperature increases was analyzed based on the relationship between yield changes and temperature rise, and then food security was discussed corresponding to each IPCC SRES scenario. The results show that without the CO2 fertilization effect in the analysis, the yield per hectare for the three crops would fall consistently as temperature rises beyond 2.5C; when the CO2 fertilization effect was included in the simulation, there were no adverse impacts on China's food production under the projected range of temperature rise (0.9-3.9C). A critical threshold of temperature increase was not found for food production. When the socio-economic scenarios, agricultural technology development and international trade were incorporated in the analysis, China's internal food production would meet a critical threshold of basic demand (300 kg/capita) while it would not under A2 (no CO2 fertilization); whereas basic food demand would be satisfied under both A2 and B2, and would even meet a higher food demand threshold required to sustain economic growth (400 kg/capita) under B2, when CO2 fertilization was considered

  15. Updating appetitive memory during reconsolidation window: critical role of cue-directed behavior and amygdala central nucleus.

    Science.gov (United States)

    Olshavsky, Megan E; Song, Bryan J; Powell, Daniel J; Jones, Carolyn E; Monfils, Marie-H; Lee, Hongjoo J

    2013-01-01

    When presented with a light cue followed by food, some rats simply approach the foodcup (Nonorienters), while others first orient to the light in addition to displaying the food-cup approach behavior (Orienters). Cue-directed orienting may reflect enhanced attentional and/or emotional processing of the cue, suggesting divergent natures of cue-information processing in Orienters and Nonorienters. The current studies investigate how differences in cue processing might manifest in appetitive memory retrieval and updating using a paradigm developed to persistently attenuate fear responses (Retrieval-extinction paradigm; Monfils et al., 2009). First, we examined whether the retrieval-extinction paradigm could attenuate appetitive responses in Orienters and Nonorienters. Next, we investigated if the appetitive memory could be updated using reversal learning (fear conditioning) during the reconsolidation window (as opposed to repeated unreinforced trials, i.e., extinction). Both extinction and new fear learning given within the reconsolidation window were effective at persistently updating the initial appetitive memory in the Orienters, but not the Nonorienters. Since conditioned orienting is mediated by the amygdala central nucleus (CeA), our final experiment examined the CeA's role in the retrieval-extinction process. Bilateral CeA lesions interfered with the retrieval-extinction paradigm-did not prevent spontaneous recovery of food-cup approach. Together, our studies demonstrate the critical role of conditioned orienting behavior and the CeA in updating appetitive memory during the reconsolidation window.

  16. Computer Security: Improvements Needed to Reduce Risk to Critical Federal Operations and Assets

    National Research Council Canada - National Science Library

    Dacey, Robert

    2001-01-01

    .... Accordingly, the security of these systems and data is essential to avoiding disruptions in critical operations, as well as to helping prevent data tampering, fraud, and inappropriate disclosure...

  17. INFORMATION SECURITY: Strengthened Management Needed to Protect Critical Federal Operations and Assets

    National Research Council Canada - National Science Library

    Dodaro, Gene

    1998-01-01

    .... Our most recent report, done at the request of this Committee, delineates the serious information security weaknesses placing critical operations and assets at risk and outlines actions needed...

  18. CRITICAL REVIEW OF OPENSTACK SECURITY: ISSUES AND WEAKNESSES

    OpenAIRE

    Hala Albaroodi; Selvakumar Manickam; Parminder Singh

    2014-01-01

    The purpose of this study is to examine the state of both cloud computing security in general and OpenStack in particular. Conducting a reassessment of cloud computing security can provide a greater understanding of how cloud computing functions and what types of security issues arise therein. This study is divided into two parts; in the first part, the background of cloud computing and its different deployment models are discussed. This section also describes various security challenges that...

  19. Beyond Mirrors and Windows: A Critical Content Analysis of Latinx Children's Books

    Science.gov (United States)

    Braden, Eliza G.; Rodriguez, Sanjuana C.

    2016-01-01

    This critical content analysis examines the representation of Latinx characters in 15 picture books published in 2013 and identified by Children's Cooperative Book Center (CCBC) as having significant Latinx content. The theoretical framework undergirding this study is Critical Race Theory (Ladson-Billings, 1998; Solórzano & Yosso, 2002;…

  20. Guarding America: Security Guards and U.S. Critical Infrastructure Protection

    National Research Council Canada - National Science Library

    Parfomak, Paul W

    2004-01-01

    The Bush Administration's 2003 National Strategy for the Physical Protection of Critical Infrastructures and Key Assets indicates that security guards are an important source of protection for critical facilities...

  1. Critical thinking: assessing the risks to the future security of supply of critical metals

    Science.gov (United States)

    Gunn, Gus

    2015-04-01

    Increasing world population, the spread of prosperity across the globe and the demands of new technologies have led to a revival of concerns about the availability of raw materials needed by society. Despite scare stories about resource depletion, physical exhaustion of minerals is considered to be unlikely. However, we do need to know which materials might be of concern so that we can develop strategies to secure adequate supplies and to mitigate the effects of supply disruption. This requirement has led to renewed interest in criticality, a term that is generally used to refer to metals and minerals of high economic importance that have a relatively high likelihood of supply disruption. The European Union (EU) developed a quantitative methodology for the assessment of criticality which led to the definition of 14 raw materials as critical to the EU economy (EC, 2010). This has succeeded in raising awareness of potential supply issues and in helping to prioritise requirements for new policies and supporting research. The EU has recently assessed a larger number of candidate materials of which 20 are now identified as critical to the EU (EC, 2014). These include metals such as indium, mostly used in flat-screen displays, antimony for flame retardants and cobalt for rechargeable batteries, alloys and a host of other products. Although there is no consensus on the methodology for criticality assessments and broad analyses at this scale are inevitably imperfect, they can, nevertheless, provide early warning of supply problems. However, in order to develop more rigorous and dynamic assessments of future availability detailed analysis of the whole life-cycle of individual metals to identify specific problems and develop appropriate solutions is required. New policies, such as the Raw Materials Initiative (2008) and the European Innovation Partnership on Raw Materials (2013), have been developed by the European Commission (EC) and are aimed at securing sustainable

  2. Windows server cookbook for Windows server 2003 and Windows 2000

    CERN Document Server

    Allen, Robbie

    2005-01-01

    This practical reference guide offers hundreds of useful tasks for managing Windows 2000 and Windows Server 2003, Microsoft's latest server. These concise, on-the-job solutions to common problems are certain to save you many hours of time searching through Microsoft documentation. Topics include files, event logs, security, DHCP, DNS, backup/restore, and more

  3. Cyber Attack on Critical Infrastructure and Its Influence on International Security

    OpenAIRE

    出口 雅史

    2017-01-01

     Since the internet appeared, with increasing cyber threats, the vulnerability of critical infrastructure has become a vital issue for international security. Although cyber attack was not lethal in the past, new type of cyber assaults such as stuxnet are able to damage not only computer system digitally, but also critical infrastructure physically. This article will investigate how the recent cyber attacks have threatened critical infrastructure and their influence on international security....

  4. Effects of Exposure to the Endocrine-Disrupting Chemical Bisphenol A During Critical Windows of Murine Pituitary Development.

    Science.gov (United States)

    Eckstrum, Kirsten S; Edwards, Whitney; Banerjee, Annesha; Wang, Wei; Flaws, Jodi A; Katzenellenbogen, John A; Kim, Sung Hoon; Raetzman, Lori T

    2018-01-01

    Critical windows of development are often more sensitive to endocrine disruption. The murine pituitary gland has two critical windows of development: embryonic gland establishment and neonatal hormone cell expansion. During embryonic development, one environmentally ubiquitous endocrine-disrupting chemical, bisphenol A (BPA), has been shown to alter pituitary development by increasing proliferation and gonadotrope number in females but not males. However, the effects of exposure during the neonatal period have not been examined. Therefore, we dosed pups from postnatal day (PND)0 to PND7 with 0.05, 0.5, and 50 μg/kg/d BPA, environmentally relevant doses, or 50 μg/kg/d estradiol (E2). Mice were collected after dosing at PND7 and at 5 weeks. Dosing mice neonatally with BPA caused sex-specific gene expression changes distinct from those observed with embryonic exposure. At PND7, pituitary Pit1 messenger RNA (mRNA) expression was decreased with BPA 0.05 and 0.5 μg/kg/d in males only. Expression of Pomc mRNA was decreased at 0.5 μg/kg/d BPA in males and at 0.5 and 50 μg/kg/d BPA in females. Similarly, E2 decreased Pomc mRNA in both males and females. However, no noticeable corresponding changes were found in protein expression. Both E2 and BPA suppressed Pomc mRNA in pituitary organ cultures; this repression appeared to be mediated by estrogen receptor-α and estrogen receptor-β in females and G protein-coupled estrogen receptor in males, as determined by estrogen receptor subtype-selective agonists. These data demonstrated that BPA exposure during neonatal pituitary development has unique sex-specific effects on gene expression and that Pomc repression in males and females can occur through different mechanisms. Copyright © 2018 Endocrine Society.

  5. My Critique is Bigger than Yours: Constituting Exclusions in Critical Security Studies

    Directory of Open Access Journals (Sweden)

    David Roger Mutimer

    2009-10-01

    Full Text Available Critical Security Studies proceeds from the premise that words are world-making, that is that the ways we think about security are constitutive of the worlds of security we analyse. Turned to conventional security studies and the practices of global politics, this critical insight has revealed the ways in which the exclusions that are the focus of this conference have been produced. Perhaps most notable in this regard has been David Campbell's work, showing how the theory and practice of security are an identity discourse producing both insides and outsides, but the production of excluded others is a theme that runs through the critical scholarship on security in the past decade or more. This article turns the critical security studies gaze on itself, to explore the field's own complicity in the production of exclusions. The article reads three important instances of critical security studies for the inclusions and exclusions they produce: Ken Booth's Theory of World Securitv, the epilogue to David Campbell's Writing Security, and the CASE Collective Manifesto. The article concludes by asking about the nature of the inclusions and exclusions these divisions produce and the politics which those exclusions, in turn, (reproduce.

  6. The Lauramann Howe Russell Papers: a Window into Critical Care Medicine during the American Civil War.

    Science.gov (United States)

    Gorbaty, Benjamin

    2017-10-01

    The Civil War influenced all aspects of American society and culture, including the field of medicine and critical care. Union physician Lauramann Howe Russell's letter to his daughter, Ellen Howe, written on October 19, 1862, illustrates the changes in hospital construction, gender roles in healthcare and medical treatments which revolutionized healthcare during the Civil War. This letter offers a glimpse of the medical care of wounded soldiers during the early years of the Civil War. In describing his conversion hospital, he reveals the precursor to the new hospital construction which would greatly influence hospital design for decades to come. His description of women volunteers hints at the evolving role and growing importance of women in healthcare. Finally, the advancements in surgical and medical practice which developed during the Civil War are embodied in Russell's descriptions of his patients. His letter freezes a moment in medical history, bridging the gap between archaic medical practice and modern critical care. Copyright © 2017 Elsevier Inc. All rights reserved.

  7. Health security as a public health concept: a critical analysis.

    Science.gov (United States)

    Aldis, William

    2008-11-01

    There is growing acceptance of the concept of health security. However, there are various and incompatible definitions, incomplete elaboration of the concept of health security in public health operational terms, and insufficient reconciliation of the health security concept with community-based primary health care. More important, there are major differences in understanding and use of the concept in different settings. Policymakers in industrialized countries emphasize protection of their populations especially against external threats, for example terrorism and pandemics; while health workers and policymakers in developing countries and within the United Nations system understand the term in a broader public health context. Indeed, the concept is used inconsistently within the UN agencies themselves, for example the World Health Organization's restrictive use of the term 'global health security'. Divergent understandings of 'health security' by WHO's member states, coupled with fears of hidden national security agendas, are leading to a breakdown of mechanisms for global cooperation such as the International Health Regulations. Some developing countries are beginning to doubt that internationally shared health surveillance data is used in their best interests. Resolution of these incompatible understandings is a global priority.

  8. Understanding Windows | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  9. Security Engineering and Educational Initiatives for Critical Information Infrastructures

    Science.gov (United States)

    2013-06-01

    content. The curriculum development efforts are accompanied by exercises that expose students to practical tools and resources for security engineering...with relatively simple analytical features, but high pedagogical value. Information Assurance Courses Curriculum development has occurred for...tool chain and accompanying methodology confronts serious challenges posed by large heterogeneous networks (e.g., SCADA and corporate systems) from

  10. Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292)

    NARCIS (Netherlands)

    Dacer, Marc; Kargl, Frank; König, Hartmut; Valdes, Alfonso

    2014-01-01

    This report documents the program and the outcomes of Dagstuhl Seminar 14292 “Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures”. The main objective of the seminar was to discuss new approaches and ideas for securing industrial control systems. It

  11. Security and Development: Critical Reflections on a Conceptual and Political Nexus

    DEFF Research Database (Denmark)

    Friis, Søren

    2014-01-01

    Sammelrezension: Tschirgi, Neclâ; Lund, Michael S.; Mancini, Francesco (Hrsg.): Security and Development. Searching for Critical Connections. Boulder : Lynne Rienner Publishers 2010 ISBN 978-1-58826-668-2, 449 S. Spear, Joanna; Williams, Paul D. (Hrsg.): Security and Development in Global Politics...

  12. Cyber Security Insider Threats :: Government’s Role in Protecting India’s Critical Infrastructure Sectors

    OpenAIRE

    Vohra, Pulkit

    2014-01-01

    This research identifies the problem of insider threats in the critical infrastructure sectors of India. It is structured to answer the research question: "Why insider threats should be the primary concern for Indian government to protect its critical infrastructure sectors.” It defines the critical infrastructure sectors and portrays the cyber security scenario of India. Also, through the research study, it identifies the lack of awareness and non-seriousness of employees in the critical sec...

  13. Windows for Intel Macs

    CERN Document Server

    Ogasawara, Todd

    2008-01-01

    Even the most devoted Mac OS X user may need to use Windows XP, or may just be curious about XP and its applications. This Short Cut is a concise guide for OS X users who need to quickly get comfortable and become productive with Windows XP basics on their Macs. It covers: Security Networking ApplicationsMac users can easily install and use Windows thanks to Boot Camp and Parallels Desktop for Mac. Boot Camp lets an Intel-based Mac install and boot Windows XP on its own hard drive partition. Parallels Desktop for Mac uses virtualization technology to run Windows XP (or other operating systems

  14. 78 FR 73202 - Review and Revision of the National Critical Infrastructure Security and Resilience (NCISR...

    Science.gov (United States)

    2013-12-05

    ... critical physical and cyber infrastructure. IV. NCISR R&D Plan Outline Below is the list of the topic areas... research and development topics are welcomed. V. Specific Questions Answers to the below specific questions... Critical Infrastructure Security and Resilience (NCISR) Research and Development (R&D) Plan Outline and...

  15. Advanced energy efficient windows

    DEFF Research Database (Denmark)

    Thomsen, Kirsten Engelund

    2007-01-01

    Windows should be paid special attention as they contribute a significant part of the total heat-loss coefficient of the building. Contrary to other parts of the thermal envelope the windows are not only heat loosers, but may gain heat in the day-time. Therefore there are possibilities for large...... energy savings. In terms of energy, windows occupy a special position compared with other thermal envelope structures due to their many functions: 1) windows let daylight into the building and provide occupants with visual contact with their surroundings 2) windows protect against the outdoor climate 3......) windows transmit solar energy that may contribute to a reduction of energy consumption, but which may also lead to unpleasant overheating. In the following paragraphs the current use of windows is reviewed with an emphasis on energy, while special products like solar protection glazing and security...

  16. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    Science.gov (United States)

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  17. Large-scale analysis of acute ethanol exposure in zebrafish development: a critical time window and resilience.

    Directory of Open Access Journals (Sweden)

    Shaukat Ali

    Full Text Available BACKGROUND: In humans, ethanol exposure during pregnancy causes a spectrum of developmental defects (fetal alcohol syndrome or FAS. Individuals vary in phenotypic expression. Zebrafish embryos develop FAS-like features after ethanol exposure. In this study, we ask whether stage-specific effects of ethanol can be identified in the zebrafish, and if so, whether they allow the pinpointing of sensitive developmental mechanisms. We have therefore conducted the first large-scale (>1500 embryos analysis of acute, stage-specific drug effects on zebrafish development, with a large panel of readouts. METHODOLOGY/PRINCIPAL FINDINGS: Zebrafish embryos were raised in 96-well plates. Range-finding indicated that 10% ethanol for 1 h was suitable for an acute exposure regime. High-resolution magic-angle spinning proton magnetic resonance spectroscopy showed that this produced a transient pulse of 0.86% concentration of ethanol in the embryo within the chorion. Survivors at 5 days postfertilisation were analysed. Phenotypes ranged from normal (resilient to severely malformed. Ethanol exposure at early stages caused high mortality (≥88%. At later stages of exposure, mortality declined and malformations developed. Pharyngeal arch hypoplasia and behavioral impairment were most common after prim-6 and prim-16 exposure. By contrast, microphthalmia and growth retardation were stage-independent. CONCLUSIONS: Our findings show that some ethanol effects are strongly stage-dependent. The phenotypes mimic key aspects of FAS including craniofacial abnormality, microphthalmia, growth retardation and behavioral impairment. We also identify a critical time window (prim-6 and prim-16 for ethanol sensitivity. Finally, our identification of a wide phenotypic spectrum is reminiscent of human FAS, and may provide a useful model for studying disease resilience.

  18. Resource Allocation of Security-Critical Tasks with Statistically Guaranteed Energy Constraint

    DEFF Research Database (Denmark)

    Jiang, Wei; Jiang, Ke; Ma, Yue

    2012-01-01

    In this paper, we are interested in resource allocation for energy constrained and security-critical embedded systems. Tasks in such systems need to be successfully executed under certain energy budget and be robust against serious security threatens. Different to former energy minimal scheduling...... energy slack ratio. The proposed algorithm is very efficient in both time and space dimensions, and achieves good solutions. Extensive simulations demonstrate the superiority of our algorithm over other approaches....

  19. Security Vulnerability Profiles of Mission Critical Software: Empirical Analysis of Security Related Bug Reports

    Science.gov (United States)

    Goseva-Popstojanova, Katerina; Tyo, Jacob

    2017-01-01

    While some prior research work exists on characteristics of software faults (i.e., bugs) and failures, very little work has been published on analysis of software applications vulnerabilities. This paper aims to contribute towards filling that gap by presenting an empirical investigation of application vulnerabilities. The results are based on data extracted from issue tracking systems of two NASA missions. These data were organized in three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified security related software bugs and classified them in specific vulnerability classes. Then, we created the security vulnerability profiles, i.e., determined where and when the security vulnerabilities were introduced and what were the dominating vulnerabilities classes. Our main findings include: (1) In IVV issues datasets the majority of vulnerabilities were code related and were introduced in the Implementation phase. (2) For all datasets, around 90 of the vulnerabilities were located in two to four subsystems. (3) Out of 21 primary classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, they contributed from 80 to 90 of vulnerabilities in each dataset.

  20. Diversity for security: case assessment for FPGA-based safety-critical systems

    Directory of Open Access Journals (Sweden)

    Kharchenko Vyacheslav

    2016-01-01

    Full Text Available Industrial safety critical instrumentation and control systems (I&Cs are facing more with information (in general and cyber, in particular security threats and attacks. The application of programmable logic, first of all, field programmable gate arrays (FPGA in critical systems causes specific safety deficits. Security assessment techniques for such systems are based on heuristic knowledges and the expert judgment. Main challenge is how to take into account features of FPGA technology for safety critical I&Cs including systems in which are applied diversity approach to minimize risks of common cause failure. Such systems are called multi-version (MV systems. The goal of the paper is in description of the technique and tool for case-based security assessment of MV FPGA-based I&Cs.

  1. Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures.

    Energy Technology Data Exchange (ETDEWEB)

    Jaeger, Calvin Dell; Roehrig, Nathaniel S.; Torres, Teresa M.

    2008-12-01

    This document presents the security automated Risk Assessment Methodology (RAM) prototype tool developed by Sandia National Laboratories (SNL). This work leverages SNL's capabilities and skills in security risk analysis and the development of vulnerability assessment/risk assessment methodologies to develop an automated prototype security RAM tool for critical infrastructures (RAM-CITM). The prototype automated RAM tool provides a user-friendly, systematic, and comprehensive risk-based tool to assist CI sector and security professionals in assessing and managing security risk from malevolent threats. The current tool is structured on the basic RAM framework developed by SNL. It is envisioned that this prototype tool will be adapted to meet the requirements of different CI sectors and thereby provide additional capabilities.

  2. Critical theory as an approach to the ethics of information security.

    Science.gov (United States)

    Stahl, Bernd Carsten; Doherty, Neil F; Shaw, Mark; Janicke, Helge

    2014-09-01

    Information security can be of high moral value. It can equally be used for immoral purposes and have undesirable consequences. In this paper we suggest that critical theory can facilitate a better understanding of possible ethical issues and can provide support when finding ways of addressing them. The paper argues that critical theory has intrinsic links to ethics and that it is possible to identify concepts frequently used in critical theory to pinpoint ethical concerns. Using the example of UK electronic medical records the paper demonstrates that a critical lens can highlight issues that traditional ethical theories tend to overlook. These are often linked to collective issues such as social and organisational structures, which philosophical ethics with its typical focus on the individual does not tend to emphasise. The paper suggests that this insight can help in developing ways of researching and innovating responsibly in the area of information security.

  3. A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

    Directory of Open Access Journals (Sweden)

    Faouzi Jaïdi

    2018-01-01

    Full Text Available Substantial advances in Information and Communication Technologies (ICT bring out novel concepts, solutions, trends, and challenges to integrate intelligent and autonomous systems in critical infrastructures. A new generation of ICT environments (such as smart cities, Internet of Things, edge-fog-social-cloud computing, and big data analytics is emerging; it has different applications to critical domains (such as transportation, communication, finance, commerce, and healthcare and different interconnections via multiple layers of public and private networks, forming a grid of critical cyberphysical infrastructures. Protecting sensitive and private data and services in critical infrastructures is, at the same time, a main objective and a great challenge for deploying secure systems. It essentially requires setting up trusted security policies. Unfortunately, security solutions should remain compliant and regularly updated to follow and track the evolution of security threats. To address this issue, we propose an advanced methodology for deploying and monitoring the compliance of trusted access control policies. Our proposal extends the traditional life cycle of access control policies with pertinent activities. It integrates formal and semiformal techniques allowing the specification, the verification, the implementation, the reverse-engineering, the validation, the risk assessment, and the optimization of access control policies. To automate and facilitate the practice of our methodology, we introduce our system SVIRVRO that allows managing the extended life cycle of access control policies. We refer to an illustrative example to highlight the relevance of our contributions.

  4. Windows 8.1 bible

    CERN Document Server

    Boyce, Jim; Tidrow, Rob

    2014-01-01

    Windows 8.1 coverage that goes above and beyond all competitors? Serving as an evolutionary update to Windows 8, Windows 8.1 provides critical changes to parts of Windows 8, such as greater customization of the interface and boot operations, return of a 'start button' that reveals apps, greater integration between the two interfaces, and updates to apps. Weighing in at nearly 1000 pages, Windows 8.1 Bible provides deeper Windows insight than any other book on the market. It's valuable for both professionals needing a guide to the nooks and crannies of Windows and regular users wanting a wide

  5. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    Science.gov (United States)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  6. Windows Azure

    CERN Document Server

    Johnson, Bruce; Chambers, James; Garber, Danny; Malik, Jamal; Fazio, Adam

    2013-01-01

    A collection of five must-have Azure titles, from some of the biggest names in the field Available individually, but at a discounted rate for the collection, this bundle of five e-books covers key developer and IT topics of Windows Azure, including ASP.NET, mobile services, web sites, data storage, and the hybrid cloud. A host of Microsoft employees and MPVs come together to cover the biggest challenges that professionals face when working with Windows Azure. The e-books included are as follows: Windows Azure and ASP.NET MVC MigrationWindows Azure Mobile ServicesWindows Azure Web SitesWindows

  7. Window Stories

    DEFF Research Database (Denmark)

    Hauge, Bettina

    This research project has investigated 17 households in Germany (cities and rural areas). The main aim was to learn about the significance of the window to these people: What they think of their windows, how, when and why they use them in their everyday life, if they have a favorite window and wh...

  8. Safeguarding critical e-documents implementing a program for securing confidential information assets

    CERN Document Server

    Smallwood, Robert F

    2012-01-01

    Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.Provides practical, step-by-step guidance o

  9. Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security

    Science.gov (United States)

    Breiing, Marcus; Cole, Mara; D'Avanzo, John; Geiger, Gebhard; Goldner, Sascha; Kuhlmann, Andreas; Lorenz, Claudia; Papproth, Alf; Petzel, Erhard; Schwetje, Oliver

    This paper outlines the scientific goals, ongoing work and first results of the SiVe research project on critical infrastructure security. The methodology is generic while pilot studies are chosen from airport security. The outline proceeds in three major steps, (1) building a threat scenario, (2) development of simulation models as scenario refinements, and (3) assessment of alternatives. Advanced techniques of systems analysis and simulation are employed to model relevant airport structures and processes as well as offences. Computer experiments are carried out to compare and optimise alternative solutions. The optimality analyses draw on approaches to quantitative risk assessment recently developed in the operational sciences. To exploit the advantages of the various techniques, an integrated simulation workbench is build up in the project.

  10. ICS security in maritime transportation : a white paper examining the security and resiliency of critical transportation infrastructure

    Science.gov (United States)

    2013-07-29

    The John A. Volpe National Transportation Systems Center was asked by the Office of Security of the Maritime Administration to examine the issue of industrial control systems (ICS) security in the Maritime Transportation System (MTS), and to develop ...

  11. Critical windows in embryonic development: Shifting incubation temperatures alter heart rate and oxygen consumption of Lake Whitefish (Coregonus clupeaformis) embryos and hatchlings.

    Science.gov (United States)

    Eme, J; Mueller, C A; Manzon, R G; Somers, C M; Boreham, D R; Wilson, J Y

    2015-01-01

    Critical windows are periods of developmental susceptibility when the phenotype of an embryonic, juvenile or adult animal may be vulnerable to environmental fluctuations. Temperature has pervasive effects on poikilotherm physiology, and embryos are especially vulnerable to temperature shifts. To identify critical windows, we incubated whitefish embryos at control temperatures of 2°C, 5°C, or 8°C, and shifted treatments among temperatures at the end of gastrulation or organogenesis. Heart rate (fH) and oxygen consumption ( [Formula: see text] ) were measured across embryonic development, and [Formula: see text] was measured in 1-day old hatchlings. Thermal shifts, up or down, from initial incubation temperatures caused persistent changes in fH and [Formula: see text] compared to control embryos measured at the same temperature (2°C, 5°C, or 8°C). Most prominently, when embryos were measured at organogenesis, shifting incubation temperature after gastrulation significantly lowered [Formula: see text] or fH. Incubation at 2°C or 5°C through gastrulation significantly lowered [Formula: see text] (42% decrease) and fH (20% decrease) at 8°C, incubation at 2°C significantly lowered [Formula: see text] (40% decrease) and fH (30% decrease) at 5°C, and incubation at 5°C and 8°C significantly lowered [Formula: see text] at 2°C (27% decrease). Through the latter half of development, [Formula: see text] and fH in embryos were not different from control values for thermally shifted treatments. However, in hatchlings measured at 2°C, [Formula: see text] was higher in groups incubated at 5°C or 8°C through organogenesis, compared to 2°C controls (43 or 65% increase, respectively). Collectively, these data suggest that embryonic development through organogenesis represents a critical window of embryonic and hatchling phenotypic plasticity. This study presents an experimental design that identified thermally sensitive periods for fish embryos. Crown Copyright

  12. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    Science.gov (United States)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  13. Critical age windows in the impact of lifetime smoking exposure on respiratory symptoms and disease among ever smokers.

    Science.gov (United States)

    Erbas, Bircan; Knudsen, Toril Mørkve; Janson, Christer; Nilsen, Roy M; Accordini, Simone; Benediktdottir, Bryndis; Dratva, Julia; Heinrich, Joachim; Jarvis, Debbie; Leynaert, Benedcite; Matheson, Melanie C; Norbäck, Dan; Real, Francisco G; Raherison-Semjen, Chantal; Villani, Simona; Dharmage, S C; Svanes, C

    2018-07-01

    Despite extensive knowledge of smoking effects on respiratory disease, there is no study including all age windows of exposure among ever smokers. The objective of this study was to assess the effects from smoking exposure in utero, early childhood, adolescence and adulthood on respiratory health outcomes in adult male and female ever smokers. Respiratory health outcomes were assessed in 10,610 participants of the European Community Respiratory Health Survey (ECRHS) I who reported a history of ever smoking by questionnaire. The associations of maternal smoking in utero, maternal smoking during childhood, age of smoking debut and pack-years of smoking with respiratory symptoms, obstructive diseases and bronchial hyperreactivity were analysed using generalized linear regression, non-linearity between age of smoking debut and outcomes were assessed by Generalized additive mixed models. Respiratory symptoms and asthma were more frequent in adults if their mother smoked during pregnancy, and, in men, also if mother smoked in childhood. Wheeze and ≥3 respiratory symptoms declined with later smoking debut among women [≤10 years: OR = 3.51, 95% CI 1.26, 9.73; 11-12 years: 1.57[1.01-2.44]; 13-15 years: 1.11[0.94-1.32] and ≤10 years: 3.74[1.56-8.83]; 11-12 years: 1.76[1.19-2.56]; 13-15 years: 1.12[0.94-1.35], respectively]. Effects of increasing number of packyears were pronounced in women (Chronic Obstructive Pulmonary Disease (COPD): OR/10 packyears women: 1.33 [1.18, 1.50], men: 1.14 [1.04, 1.26] p interaction = 0.01). Among ever smokers, smoking exposure in each stage of the lifespan show persistent harmful effects for adult respiratory health, while women appeared to be more vulnerable to an early age of smoking debut and amount of smoking in adulthood. Copyright © 2018. Published by Elsevier Inc.

  14. Proper Installation of Replacement Windows | Efficient Windows

    Science.gov (United States)

    Collaborative Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring

  15. Window Glazing Types | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  16. Window Frame Types | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  17. Performance Standards for Windows | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  18. Benefits of Efficient Windows | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  19. Assessing Window Replacement Options | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  20. Windows for New Construction | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  1. Window Operator Types | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  2. CONFIGURING AND USING OPEN VPN ON WINDOWS OS

    OpenAIRE

    Ngekeh, Prisca

    2016-01-01

    Hacking is becoming a more critical issue in the world of science and technology today, hence it is necessary to add more security devices to the network to ensure the security of information. Open virtual private network (OpenVPN) is one among the many ways companies use to securely connect in different locations or a remote user connecting to a company’s network. This thesis work describes how to configure and use OpenVPN with Windows operating system. The following paragraphs discusses wha...

  3. A critical assessment of the different approaches aimed to secure electricity generation supply

    Energy Technology Data Exchange (ETDEWEB)

    Batlle, C.; Rodilla, P. [Technological Research Institute, Pontifical University of Comillas, Sta. Cruz de Marcenado 26, 28015 Madrid (Spain)

    2010-11-15

    Since the very beginning of the power systems reform process, one of the key questions posed has been whether the market, of its own accord, is able to provide satisfactory security of supply at the power generation level or if some additional regulatory mechanism needs to be introduced, and in the latter case, which is the most suitable approach to tackle the problem. This matter is undoubtedly gaining importance and it has taken a key role in the energy regulators' agendas. In this paper, we critically review and categorize the different approaches regulators can opt for to deal with the problem of guaranteeing (or at least enhancing) security of supply in a market-oriented environment. We analyze the most relevant regulatory design elements throughout an updated assessment of the broad range of international experiences, highlighting the lessons we have learned so far in a variety of contexts. Based on the analysis, we conclude by providing a set of principles and criteria that should be considered by the regulator when designing a security of supply mechanism. (author)

  4. A critical assessment of the different approaches aimed to secure electricity generation supply

    International Nuclear Information System (INIS)

    Batlle, C.; Rodilla, P.

    2010-01-01

    Since the very beginning of the power systems reform process, one of the key questions posed has been whether the market, of its own accord, is able to provide satisfactory security of supply at the power generation level or if some additional regulatory mechanism needs to be introduced, and in the latter case, which is the most suitable approach to tackle the problem. This matter is undoubtedly gaining importance and it has taken a key role in the energy regulators' agendas. In this paper, we critically review and categorize the different approaches regulators can opt for to deal with the problem of guaranteeing (or at least enhancing) security of supply in a market-oriented environment. We analyze the most relevant regulatory design elements throughout an updated assessment of the broad range of international experiences, highlighting the lessons we have learned so far in a variety of contexts. Based on the analysis, we conclude by providing a set of principles and criteria that should be considered by the regulator when designing a security of supply mechanism.

  5. Applying a Space-Based Security Recovery Scheme for Critical Homeland Security Cyberinfrastructure Utilizing the NASA Tracking and Data Relay (TDRS) Based Space Network

    Science.gov (United States)

    Shaw, Harry C.; McLaughlin, Brian; Stocklin, Frank; Fortin, Andre; Israel, David; Dissanayake, Asoka; Gilliand, Denise; LaFontaine, Richard; Broomandan, Richard; Hyunh, Nancy

    2015-01-01

    Protection of the national infrastructure is a high priority for cybersecurity of the homeland. Critical infrastructure such as the national power grid, commercial financial networks, and communications networks have been successfully invaded and re-invaded from foreign and domestic attackers. The ability to re-establish authentication and confidentiality of the network participants via secure channels that have not been compromised would be an important countermeasure to compromise of our critical network infrastructure. This paper describes a concept of operations by which the NASA Tracking and Data Relay (TDRS) constellation of spacecraft in conjunction with the White Sands Complex (WSC) Ground Station host a security recovery system for re-establishing secure network communications in the event of a national or regional cyberattack. Users would perform security and network restoral functions via a Broadcast Satellite Service (BSS) from the TDRS constellation. The BSS enrollment only requires that each network location have a receive antenna and satellite receiver. This would be no more complex than setting up a DIRECTTV-like receiver at each network location with separate network connectivity. A GEO BSS would allow a mass re-enrollment of network nodes (up to nationwide) simultaneously depending upon downlink characteristics. This paper details the spectrum requirements, link budget, notional assets and communications requirements for the scheme. It describes the architecture of such a system and the manner in which it leverages off of the existing secure infrastructure which is already in place and managed by the NASAGSFC Space Network Project.

  6. Use of Opioid Medications for Employees in Critical Safety or Security Positions and Positions with Safety Sensitive Duties

    Science.gov (United States)

    2017-01-30

    can cause harm) to the physical well-being of or jeopardize the security of the employee , co-workers, customers or the general public through a lapse...DEPARTMENT OF THE ARMY US ARMY PUBLIC HEALTH CENTER 5158 BLACKHAWK ROAD ABERDEEN PROVING GROUND MARYLAND 21010-5403 Directorate of Clinical... Employees in Critical Safety or Security Positions and Positions with Safety Sensitive Duties. 1. REFERENCES. A. Army Regulation 40-5, Preventive

  7. Exploring Shop Window Displays

    Science.gov (United States)

    Christopoulou, Martha

    2011-01-01

    Using visual resources from everyday life in art lessons can enrich students' knowledge about the creation of visual images, artifacts, and sites, and develop their critical understanding about the cultural impact of these images and their effects on people's lives. Through examining an exhibition in the windows of Selfridges department store in…

  8. Climate change and critical thresholds in China's food security

    Energy Technology Data Exchange (ETDEWEB)

    Xiong, Wei; Lin, Erda; Ju, Hui; Xu, Yinlong [Institute of Environment and Sustainable Development in Agriculture, Chinese Academy of Agricultural Sciences, Beijing (China)

    2007-03-15

    Identification of 'critical thresholds' of temperature increase is an essential task for inform policy decisions on establishing greenhouse gas (GHG) emission targets. We use the A2 (medium-high GHG emission pathway) and B2 (medium-low) climate change scenarios produced by the Regional Climate Model PRECIS, the crop model - CERES, and socio-economic scenarios described by IPCC SRES, to simulate the average yield changes per hectare of three main grain crops (rice, wheat, and maize) at 50 km x 50 km scale. The threshold of food production to temperature increases was analyzed based on the relationship between yield changes and temperature rise, and then food security was discussed corresponding to each IPCC SRES scenario. The results show that without the CO2 fertilization effect in the analysis, the yield per hectare for the three crops would fall consistently as temperature rises beyond 2.5C; when the CO2 fertilization effect was included in the simulation, there were no adverse impacts on China's food production under the projected range of temperature rise (0.9-3.9C). A critical threshold of temperature increase was not found for food production. When the socio-economic scenarios, agricultural technology development and international trade were incorporated in the analysis, China's internal food production would meet a critical threshold of basic demand (300 kg/capita) while it would not under A2 (no CO2 fertilization); whereas basic food demand would be satisfied under both A2 and B2, and would even meet a higher food demand threshold required to sustain economic growth (400 kg/capita) under B2, when CO2 fertilization was considered.

  9. The strategy for the development of information society in Serbia by 2020: Information security and critical infrastructure

    Directory of Open Access Journals (Sweden)

    Danijela D. Protić

    2012-10-01

    Full Text Available The development of technology has changed the world economy and induced new political trends. The European Union (EU and many non-EU member states apply the strategies of information society development that raise the level of information security (IS. The Serbian Government (Government has adopted the Strategy for Information Society in Serbia by 2020 (Strategy, and pointed to the challenges for the development of a modern Serbian information society. This paper presents an overview of the open-ended questions about IS, critical infrastructures and protection of critical infrastructures. Based on publicly available data, some critical national infrastructures are listed. As a possible solution to the problem of IS, the Public Key Infrastructure (PKI-based Information security integrated information system (ISIIS is presented. The ISIIS provides modularity and interoperability of critical infrastructures both in Serbia and neighboring countries.

  10. Resources | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  11. Links | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  12. Efficient Windows Collaborative | Home

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  13. FAQ | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  14. Glossary | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  15. Supervisory Control and Data Acquisition (SCADA) Systems and Cyber-Security: Best Practices to Secure Critical Infrastructure

    Science.gov (United States)

    Morsey, Christopher

    2017-01-01

    In the critical infrastructure world, many critical infrastructure sectors use a Supervisory Control and Data Acquisition (SCADA) system. The sectors that use SCADA systems are the electric power, nuclear power and water. These systems are used to control, monitor and extract data from the systems that give us all the ability to light our homes…

  16. The Application of Biometrics in Critical Infrastructures Operations: Guidance for Security Managers. ERNCIP Thematic Group Applied Biometrics for CIP. Deliverable: Guidance for Security Managers - Task 2

    OpenAIRE

    REJMAN-GREENE Marek; BRZOZOWSKI Krzysztof; MANSFIELD Tony; SANCHEZ-REILLO Raul; WAGGETT Peter; WHITAKER Geoff

    2015-01-01

    Biometric technologies have advanced considerably over the past decade, and have paved the way for more widespread use by governments, commercial enterprises and, more recently, by the consumer through the introduction of sensors and apps on mobile phones. This report provides introductory information about the application of these technologies to achieve secure recognition of individuals by organisations which form part of critical infrastructures in the EU. As a specific example, it offers ...

  17. System for critical infrastructure security based on multispectral observation-detection module

    Science.gov (United States)

    Trzaskawka, Piotr; Kastek, Mariusz; Życzkowski, Marek; Dulski, Rafał; Szustakowski, Mieczysław; Ciurapiński, Wiesław; Bareła, Jarosław

    2013-10-01

    Recent terrorist attacks and possibilities of such actions in future have forced to develop security systems for critical infrastructures that embrace sensors technologies and technical organization of systems. The used till now perimeter protection of stationary objects, based on construction of a ring with two-zone fencing, visual cameras with illumination are efficiently displaced by the systems of the multisensor technology that consists of: visible technology - day/night cameras registering optical contrast of a scene, thermal technology - cheap bolometric cameras recording thermal contrast of a scene and active ground radars - microwave and millimetre wavelengths that record and detect reflected radiation. Merging of these three different technologies into one system requires methodology for selection of technical conditions of installation and parameters of sensors. This procedure enables us to construct a system with correlated range, resolution, field of view and object identification. Important technical problem connected with the multispectral system is its software, which helps couple the radar with the cameras. This software can be used for automatic focusing of cameras, automatic guiding cameras to an object detected by the radar, tracking of the object and localization of the object on the digital map as well as target identification and alerting. Based on "plug and play" architecture, this system provides unmatched flexibility and simplistic integration of sensors and devices in TCP/IP networks. Using a graphical user interface it is possible to control sensors and monitor streaming video and other data over the network, visualize the results of data fusion process and obtain detailed information about detected intruders over a digital map. System provide high-level applications and operator workload reduction with features such as sensor to sensor cueing from detection devices, automatic e-mail notification and alarm triggering. The paper presents

  18. A Systems Engineering Framework for Implementing a Security and Critical Patch Management Process in Diverse Environments (Academic Departments' Workstations)

    Science.gov (United States)

    Mohammadi, Hadi

    2014-01-01

    Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to…

  19. Critical Success Factors for an Effective Security Risk Management Program in an Organization: An Exploratory Case Study

    Science.gov (United States)

    Zafar, Humayun

    2010-01-01

    This study investigates differences in perception between layers of management (executive, middle, and lower) and staff with regard to the influence of critical success factors (CSFs) on security risk management (SRM) effectiveness. This is an in-depth case study conducted at a Fortune 500 company. Rockart's (1979) CSF method is modified through…

  20. The National Criticality Experiments Research Center at the Device Assembly Facility, Nevada National Security Site: Status and Capabilities, Summary Report

    International Nuclear Information System (INIS)

    Bragg-Sitton, S.; Bess, J.; Werner, J.

    2011-01-01

    The National Criticality Experiments Research Center (NCERC) was officially opened on August 29, 2011. Located within the Device Assembly Facility (DAF) at the Nevada National Security Site (NNSS), the NCERC has become a consolidation facility within the United States for critical configuration testing, particularly those involving highly enriched uranium (HEU). The DAF is a Department of Energy (DOE) owned facility that is operated by the National Nuclear Security Agency/Nevada Site Office (NNSA/NSO). User laboratories include the Lawrence Livermore National Laboratory (LLNL) and Los Alamos National Laboratory (LANL). Personnel bring their home lab qualifications and procedures with them to the DAF, such that non-site specific training need not be repeated to conduct work at DAF. The NNSS Management and Operating contractor is National Security Technologies, LLC (NSTec) and the NNSS Safeguards and Security contractor is Wackenhut Services. The complete report provides an overview and status of the available laboratories and test bays at NCERC, available test materials and test support configurations, and test requirements and limitations for performing sub-critical and critical tests. The current summary provides a brief summary of the facility status and the method by which experiments may be introduced to NCERC.

  1. Information Security and Wireless: Alternate Approaches for Controlling Access to Critical Information

    National Research Council Canada - National Science Library

    Nandram, Winsome

    2004-01-01

    .... Typically, network managers implement countermeasures to augment security. The goal of this thesis is to research approaches that compliment existing security measures with fine grain access control measures. The Extensible Markup Language (XML) is adopted to accommodate such granular access control as it provides the mechanisms for scaling security down to the document content level.

  2. Window shopping

    International Nuclear Information System (INIS)

    Anon.

    1987-01-01

    'A large window for surprises' was how Gordon Kane of Michigan summarized the potential of the proposed 84-kilometre US Superconducting Supercollider (SSC). With George Trilling of Berkeley unable to attend this year's High Energy Physics Conference at Vanderbilt University, Nashville, Tennessee, from 8-10 October, Kane played a dual role - looking ahead to SSC physics, and summarizing the meeting

  3. Windows 8 visual quick tips

    CERN Document Server

    McFedries, Paul

    2012-01-01

    Easy-in, easy-out format covers all the bells and whistles of Windows 8 If you want to learn how to work smarter and faster in Microsoft's Windows 8 operating system, this easy-to-use, compact guide delivers the goods. Designed for visual learners, it features short explanations and full-color screen shots on almost every page, and it's packed with timesaving tips and helpful productivity tricks. From enhancing performance and managing digital content to setting up security and much more, this handy guide will help you get more out of Windows 8. Uses full-color screen shots and short, step-by-

  4. A Critical assesment of IS Security Research Between 1990-2004

    DEFF Research Database (Denmark)

    Willison, Robert Andrew; Siponen, Mikko

    This paper reviews the IS security literature for the period 1990-2004. More specifically three security journals and the top twenty IS journals were examined. In total 1280 papers were analysed in terms of theories, research methods and research topics. Our research found that 1043 of the papers...... with fourteen of these topics totaling 71.05% of the articles. This papers offers implications for future research directions on IS security, scholars to publish IS security research, tenure practice, and IS security classification schemas....

  5. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    Science.gov (United States)

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.

  6. Methods of securing and controlling critical infrastructure assets allocated in information and communications technology sector companies in leading

    Directory of Open Access Journals (Sweden)

    Piotr Sieńko

    2015-12-01

    Full Text Available Critical Infrastructure (CI plays a significant role in maintaining public order and national security. The state may use many different methods to protect and control CI allocated to commercial companies. This article describes the three most important ones: legislation, ownership and government institutions and agencies. The data presented in this paper is the result of research done on the most developed countries in the EU (United Kingdom, France, Germany and Italy and their strategic enterprises in the ICT sector, one of the most important sectors in any national security system.

  7. Strategic Windows

    DEFF Research Database (Denmark)

    Risberg, Annette; King, David R.; Meglio, Olimpia

    We examine the importance of speed and timing in acquisitions with a framework that identifies management considerations for three interrelated acquisition phases (selection, deal closure and integration) from an acquiring firm’s perspective. Using a process perspective, we pinpoint items within ...... acquisition phases that relate to speed. In particular, we present the idea of time-bounded strategic windows in acquisitions consistent with the notion of kairòs, where opportunities appear and must be pursued at the right time for success to occur....

  8. Window shopping

    OpenAIRE

    Oz Shy

    2013-01-01

    The terms "window shopping" and "showrooming" refer to the activity in which potential buyers visit a brick-and-mortar store to examine a product but end up either not buying it or buying the product from an online retailer. This paper analyzes potential buyers who differ in their preference for after-sale service that is not offered by online retailers. For some buyers, making a trip to the brick-and-mortar store is costly; however, going to the store to examine the product has the advantage...

  9. Governance practices and critical success factors suitable for business information security

    OpenAIRE

    Bobbert, Yuri; Mulder, Hans

    2015-01-01

    Abstract: Information Security (IS) is increasingly becoming an integrated business practice instead of just IT. Security breaches are a challenge to organizations. They run the risk of losing revenue, trust and reputation and in extreme cases they might even go under. IS literature emphasizes the necessity to govern Information Security at the level of the Board of Directors (BoD) and to execute (i.e. plan, build, run and monitor) it at management level. This paper describes explorative rese...

  10. Effect of crude oil and refined petroleum product imports on the national security. Critical technologies

    International Nuclear Information System (INIS)

    1989-01-01

    The report contains the results of an investigation requested under Section 232 of the Trade Expansion Act to study the effect of oil imports on the domestic petroleum industry and on United States energy security. It reviews previous energy security assessments and resulting initiatives, assesses current US energy security, and studies emergency petroleum requirements. The report finds that there have been substantial improvements in US energy security since the last Section 232 Petroleum finding in 1979. However, declining domestic oil production, rising oil imports, and growing dependence on potentially insecure sources of supply raise concerns of vulnerability to a major supply disruption

  11. Windows Azure Platform

    CERN Document Server

    Redkar, Tejaswi

    2011-01-01

    The Windows Azure Platform has rapidly established itself as one of the most sophisticated cloud computing platforms available. With Microsoft working to continually update their product and keep it at the cutting edge, the future looks bright - if you have the skills to harness it. In particular, new features such as remote desktop access, dynamic content caching and secure content delivery using SSL make the latest version of Azure a more powerful solution than ever before. It's widely agreed that cloud computing has produced a paradigm shift in traditional architectural concepts by providin

  12. Critical water requirements for food, methodology and policy consequences for food security

    NARCIS (Netherlands)

    Gerbens-Leenes, P.W.; Nonhebel, S.

    2004-01-01

    Food security and increasing water scarcity have a dominant place on the food policy agenda. Food security requires sufficient water of adequate quality because water is a prerequisite for plant growth. Nowadays, agriculture accounts for 70% of the worldwide human fresh water use. The expected

  13. Design optimization for security-and safety-critical distributed real-time applications

    DEFF Research Database (Denmark)

    Jiang, Wei; Pop, Paul; Jiang, Ke

    2016-01-01

    requirements on confidentiality of messages, task replication is used to enhance system reliability, and dynamic voltage and frequency scaling is used for energy efficiency of tasks. It is challenging to address these factors simultaneously, e.g., better security protections need more computing resources......In this paper, we are interested in the design of real-time applications with security, safety, timing, and energy requirements. The applications are scheduled with cyclic scheduling, and are mapped on distributed heterogeneous architectures. Cryptographic services are deployed to satisfy security...... and consume more energy, while lower voltages and frequencies may impair schedulability and security, and also lead to reliability degradation. We introduce a vulnerability based method to quantify the security performance of communications on distributed systems. We then focus on determining the appropriate...

  14. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  15. You Outsource the Service but Not the Risk: Supply Chain Risk Management for the Cyber Security of Safety Critical Systems

    OpenAIRE

    Johnson, Chris W.

    2016-01-01

    Companies increasingly form interdependent relationships between contractors and sub-contractors that extend\\ud across national borders and legal jurisdictions. In consequence, supply chain risk management (SCRM) is an\\ud increasing concern for the cyber security of safety-critical systems. The following pages argue that outsourcing\\ud undermines SCRM by eroding technical expertise, which companies need to select and audit their suppliers. They\\ud are still held accountable when the failure o...

  16. The security of gas supply-a critical issue for Europe?

    International Nuclear Information System (INIS)

    Weisser, Hellmuth

    2007-01-01

    Gas is competing with oil for being the dominant energy source. In electricity generation gas is to play as pivotal a role as oil in transportation. The security equation of gas and electricity become unseparably interrelated. Energy disruptions have considerable influence on the national accounts far beyond the direct cost of market participants (asymmetry). The present gas supply to the EU depends dangerously on too few sources and venues. There is a decided lack of optionality. The EU directly or through its members needs a clear proactive policy on 'Security of Gas Supply' with a strong multilateral direction. The measures developed for the oil industry over the last 30 years can at least serve as a starting point for a constructive debate. When discussing security of supply dependence it is useful to clearly define the various risks one wishes to protect against. Free riders relying on alternative fuels without participating in their security systems are not permissible

  17. HOMELAND SECURITY: Intergovernmental Coordination and Partnership Will Be Critical to Success

    National Research Council Canada - National Science Library

    2002-01-01

    .... Moreover, formation of a department should not be considered a replacement for the timely issuance of a national homeland security strategy, which is needed to guide implementation of the complex...

  18. WinSCP for Windows File Transfers | High-Performance Computing | NREL

    Science.gov (United States)

    WinSCP for Windows File Transfers WinSCP for Windows File Transfers WinSCP for can used to securely transfer files between your local computer running Microsoft Windows and a remote computer running Linux

  19. Effect of imports of uranium on the national security. Critical technologies

    International Nuclear Information System (INIS)

    1989-09-01

    The report gives results of an investigation to determine the effects of uranium imports on the national security. Uranium is essential to the operation of the Navy's nuclear-powered fleet, for nuclear weapon capability and for civilian nuclear energy generation. US utilities imported 43.8 percent of their uranium requirements in 1986 and 51.1 percent in 1987. The report finds that the domestic industry's competitiveness has deteriorated in recent years, due to the easily accessible and richer deposits available elsewhere. The report concludes, however, that in a national security emergency, defense requirements could be met through stockpiles of finished nuclear materials set aside for military needs. Furthermore, civilian requirements could be met through US production, reliable imports, inventories, and tails reprocessing. The report, therefore, finds that uranium is not being imported in such quantities or under such circumstances as to represent a threat to the national security

  20. Segurança internacional e normatividade: é o liberalismo o elo perdido dos critical securities studies? International security and normativity: is liberalism the critial securities studies' lost link?

    Directory of Open Access Journals (Sweden)

    Rafael Duarte Villa

    2008-01-01

    Full Text Available O surgimento, e afirmação, de uma corrente de estudos críticos em segurança internacional plantou firmemente a idéia de que os problemas de segurança internacional não estão meramente relacionados com aspectos objetivos que ameaçam os Estados, mas esses problemas estão relacionados estreitamente com as relações entre indivíduo e emancipação humana. Assim, a condição de segurança em sentido forte tem, como precondição, a emancipação humana. Porém, em que condições esse overlap entre segurança internacional e emancipação acontece? A tese deste artigo é problematizar essas condições, que escapam ao diálogo endógeno dos critical securities studies (CSS. E que uma pista para operacionalização pode ser procurada nos diálogos entre a teoria crítica cosmopolita e a teoria liberal cosmopolita. Essa interseção, ou continuum, aponta a tese do artigo, é possível se os CSS atentam para dimensões do liberalismo político que têm sido negligenciadas, especialmente a democracia pensada em bases transnacionais e as possibilidades da sociedade civil transnacionalizada.The appearance and consolidation of a critical studies approach on international security fortified the claim that international security problems are not merely related to objective threats to states, but are in deep connection with the relationship between the individual and human emancipation. In those terms, a solid security condition is primarily preconditioned by human emancipation. However, in what conditions do international security and emancipation overlap? The present article intends to explore the question, a topic that is not tackled by the endogenous debate of critical security studies (CSS. An interesting path to be followed seems to be the dialogue between cosmopolitan critical theory and cosmopolitan liberal theory. This article argues that an intersection, or continuum, of these two theories would be possible if CSS focused on dimensions

  1. Protecting America: Reorganizing the Nation's Security Forces to Ensure the Protection of Our Critical Infrastructure

    National Research Council Canada - National Science Library

    Williams

    2004-01-01

    .... This national strategy amplified the significant responsibilities of states, localities, the private sector, and private citizens to protect and defend our communities and our critical infrastructure...

  2. The European Union’s Human Security Doctrine: A Critical Analysis

    Science.gov (United States)

    2009-03-01

    Symbolism: Europe Takes on Human Security,” 92. 91 Ayn Rand, The Virtue of Selfishness: A New Concept of Egoism (New York: Signet Press, 1964). 92 Bailes...New Concept of Egoism . New York: Signet Press, 1964. Report of the International Commission on Intervention and State Sovereignty. The Responsibility

  3. 77 FR 57072 - Proposed Information Collection; Comment Request; National Security and Critical Technology...

    Science.gov (United States)

    2012-09-17

    ..., DC 20230 (or via the Internet at [email protected] ). FOR FURTHER INFORMATION CONTACT: Requests for... techniques or other forms of information technology. Comments submitted in response to this notice will be... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment...

  4. NASA Blue Team: Determining Operational Security Posture of Critical Systems and Networks

    Science.gov (United States)

    Alley, Adam David

    2016-01-01

    Emergence of Cybersecurity has increased the focus on security risks to Information Technology (IT) assets going beyond traditional Information Assurance (IA) concerns: More sophisticated threats have emerged from increasing sources as advanced hacker tools and techniques have emerged and proliferated to broaden the attack surface available across globally interconnected networks.

  5. Virtualization of open-source secure web services to support data exchange in a pediatric critical care research network.

    Science.gov (United States)

    Frey, Lewis J; Sward, Katherine A; Newth, Christopher J L; Khemani, Robinder G; Cryer, Martin E; Thelen, Julie L; Enriquez, Rene; Shaoyu, Su; Pollack, Murray M; Harrison, Rick E; Meert, Kathleen L; Berg, Robert A; Wessel, David L; Shanley, Thomas P; Dalton, Heidi; Carcillo, Joseph; Jenkins, Tammara L; Dean, J Michael

    2015-11-01

    To examine the feasibility of deploying a virtual web service for sharing data within a research network, and to evaluate the impact on data consistency and quality. Virtual machines (VMs) encapsulated an open-source, semantically and syntactically interoperable secure web service infrastructure along with a shadow database. The VMs were deployed to 8 Collaborative Pediatric Critical Care Research Network Clinical Centers. Virtual web services could be deployed in hours. The interoperability of the web services reduced format misalignment from 56% to 1% and demonstrated that 99% of the data consistently transferred using the data dictionary and 1% needed human curation. Use of virtualized open-source secure web service technology could enable direct electronic abstraction of data from hospital databases for research purposes. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  6. What's New in Windows Vista?

    CERN Document Server

    Culp, Brian

    2006-01-01

    Get ready for a quick blast through this significant change to Windows! This guide will give you a quick look at many of the most significant new features in Vista, Microsoft's first revision of Windows in nearly six years. Starting with the changes to the interface, introducing Aero, and showing you some visuals, we then move on to the completely revamped search options. The new task scheduler and printing gadgets, are next with some cool new changes. Probably the most significant changes, however, come in the area of security and this guide takes a look at them from user priveleges, to

  7. Mastering Windows Server 2008 Networking Foundations

    CERN Document Server

    Minasi, Mark; Mueller, John Paul

    2011-01-01

    Find in-depth coverage of general networking concepts and basic instruction on Windows Server 2008 installation and management including active directory, DNS, Windows storage, and TCP/IP and IPv4 networking basics in Mastering Windows Server 2008 Networking Foundations. One of three new books by best-selling author Mark Minasi, this guide explains what servers do, how basic networking works (IP basics and DNS/WINS basics), and the fundamentals of the under-the-hood technologies that support staff must understand. Learn how to install Windows Server 2008 and build a simple network, security co

  8. Critical Conversations and the Role of Dialogue in Delivering Meaningful Improvements in Safety and Security Culture

    International Nuclear Information System (INIS)

    Brissette, S.

    2016-01-01

    Significant scholarship has been devoted to research into safety culture assessment methodologies. These focus on the development, delivery and interpretations of safety culture surveys and other assessment techniques to assure reliable outcomes that provide insights into the safety culture of an organization across multiple dimensions. The lessons from this scholarship can be applied to the emerging area of security culture assessments as the nuclear industry broadens its focus on this topic. The aim of this paper is to discuss the value of establishing mechanisms, immediately after an assessment and regularly between assessments, to facilitate a structured dialogue among leaders around insights derived from an assessment, to enable ongoing improvements in safety and security culture. The leader’s role includes both understanding the current state of culture, the “what is”, and creating regular, open and informed dialogue around their role in shaping the culture to achieve “what should be”.

  9. Choice of optical system is critical for the security of double random phase encryption systems

    Science.gov (United States)

    Muniraj, Inbarasan; Guo, Changliang; Malallah, Ra'ed; Cassidy, Derek; Zhao, Liang; Ryle, James P.; Healy, John J.; Sheridan, John T.

    2017-06-01

    The linear canonical transform (LCT) is used in modeling a coherent light-field propagation through first-order optical systems. Recently, a generic optical system, known as the quadratic phase encoding system (QPES), for encrypting a two-dimensional image has been reported. In such systems, two random phase keys and the individual LCT parameters (α,β,γ) serve as secret keys of the cryptosystem. It is important that such encryption systems also satisfy some dynamic security properties. We, therefore, examine such systems using two cryptographic evaluation methods, the avalanche effect and bit independence criterion, which indicate the degree of security of the cryptographic algorithms using QPES. We compared our simulation results with the conventional Fourier and the Fresnel transform-based double random phase encryption (DRPE) systems. The results show that the LCT-based DRPE has an excellent avalanche and bit independence characteristics compared to the conventional Fourier and Fresnel-based encryption systems.

  10. CRITICAL ASSESSMENT OF AUDITING CONTRIBUTIONS TO EFFECTIVE AND EFFICIENT SECURITY IN DATABASE SYSTEMS

    OpenAIRE

    Olumuyiwa O. Matthew; Carl Dudley

    2015-01-01

    Database auditing has become a very crucial aspect of security as organisations increase their adoption of database management systems (DBMS) as major asset that keeps, maintain and monitor sensitive information. Database auditing is the group of activities involved in observing a set of stored data in order to be aware of the actions of users. The work presented here outlines the main auditing techniques and methods. Some architectural based auditing systems were also consider...

  11. The Critical Success Factor Method: Establishing a Foundation for Enterprise Security Management

    National Research Council Canada - National Science Library

    Caralli, Richard A; Stevens, James F; Willke, Bradford J; Wilson, William R

    2004-01-01

    .... The organization must perform well in key areas on a consistent basis to achieve the mission. These key areas unique to the organization and the industry in which it competes can be defined as the organization's critical success factors...

  12. Teach yourself visually Windows 8

    CERN Document Server

    McFedries, Paul

    2012-01-01

    A practical guide for visual learners eager to get started with Windows 8 If you learn more quickly when you can see how things are done, this Visual guide is the easiest way to get up and running on Windows 8. It covers more than 150 essential Windows tasks, using full-color screen shots and step-by-step instructions to show you just what to do. Learn your way around the interface and how to install programs, set up user accounts, play music and other media files, download photos from your digital camera, go online, set up and secure an e-mail account, and much more. The tried-and-true format

  13. A Family of Key Agreement Mechanisms for Mission Critical Communications for Secure Mobile Ad Hoc and Wireless Mesh Internetworking

    Directory of Open Access Journals (Sweden)

    Tryfonas Theo

    2011-01-01

    Full Text Available Future wireless networks like mobile ad hoc networks and wireless mesh networks are expected to play important role in demanding communications such as mission critical communications. MANETs are ideal for emergency cases where the communication infrastructure has been completely destroyed and there is a need for quick set up of communications among the rescue/emergency workers. In such emergency scenarios wireless mesh networks may be employed in a later phase for providing advanced communications and services acting as a backbone network in the affected area. Internetworking of both types of future networks will provide a broad range of mission critical applications. While offering many advantages, such as flexibility, easy of deployment and low cost, MANETs and mesh networks face important security and resilience threats, especially for such demanding applications. We introduce a family of key agreement methods based on weak to strong authentication associated with several multiparty contributory key establishment methods. We examine the attributes of each key establishment method and how each method can be better applied in different scenarios. The proposed protocols support seamlessly both types of networks and consider system and application requirements such as efficient and secure internetworking, dynamicity of network topologies and support of thin clients.

  14. THE SECURITY OF CRITICAL ENERGY INFRASTRUCTURE IN THE AGE OF MULTIPLE ATTACK VECTORS: NATO’S MULTI-FACETED APPROACH

    Directory of Open Access Journals (Sweden)

    Sorin Dumitru Ducaru

    2017-06-01

    Full Text Available The current NATO threat landscape is characterized by a combination or “hybrid blend” of unconventional emerging challenges (like cyber and terrorist attacks and re-emerging conventional ones (like Russia’s recent military resurgence and assertiveness, that led to the illegal annexation of Crimea and destabilization in Eastern Ukraine. While the resurgence of the Russian military activity pushed the Alliance in the direction of re-discovering its deterrence and collective defence role, the new, not-traditional, trans-national and essentially non-military treats that generate effects below the threshold of an armed attack require a new paradigm shift with a focus on resilience although the protection of critical energy infrastructure is first and foremost a national responsibility, NATO can contribute to meeting the infrastructure protection challenge on many levels. Given the fact that its core deterrence and defence mandate relies in a great measure on the security of Allies’ energy infrastructure NATO’s role and actions in reducing the vulnerabilities and strengthening the resilience of such infrastructure can only increase. A multi-faceted, multi-stakeholder and networked approach is needed to be able to strengthen defences and resilience of critical infrastructure such as energy. Understanding and defending against cyber or terrorist threat vectors, increased situational awareness, education, training, exercises, trusted partnerships as well as increasing strategic security dialogue and cooperation are key for such a comprehensive/network approach to the challenge.

  15. Method of calculation of critical values of financial indicators for developing food security strategy

    Science.gov (United States)

    Aigyl Ilshatovna, Sabirova; Svetlana Fanilevna, Khasanova; Vildanovna, Nagumanova Regina

    2018-05-01

    On the basis of decision making theory (minimax and maximin approaches) the authors propose a technique with the results of calculations of the critical values of effectiveness indicators of agricultural producers in the Republic of Tatarstan for 2013-2015. There is justified necessity of monitoring the effectiveness of the state support and the direction of its improvement.

  16. Safety and security profiles of industry networks used in safety- critical applications

    Directory of Open Access Journals (Sweden)

    Mária FRANEKOVÁ

    2008-01-01

    Full Text Available The author describes the mechanisms of safety and security profiles of industry and communication networks used within safety – related applications in technological and information levels of process control recommended according to standards IEC 61784-3,4. Nowadays the number of vendors of the safety – related communication technologies who guarantees besides the standard communication, the communication amongst the safety – related equipment according to IEC 61508 is increasing. Also the number of safety – related products is increasing, e. g. safety Fieldbus, safety PLC, safety curtains, safety laser scanners, safety buttons, safety relays and other. According to world survey the safety Fieldbus denoted the highest growth from all manufactured safety products.The main part of this paper is the description of the safety-related Fieldbus communication system, which has to guaranty Safety Integrity Level.

  17. Automated X-ray image analysis for cargo security: Critical review and future promise.

    Science.gov (United States)

    Rogers, Thomas W; Jaccard, Nicolas; Morton, Edward J; Griffin, Lewis D

    2017-01-01

    We review the relatively immature field of automated image analysis for X-ray cargo imagery. There is increasing demand for automated analysis methods that can assist in the inspection and selection of containers, due to the ever-growing volumes of traded cargo and the increasing concerns that customs- and security-related threats are being smuggled across borders by organised crime and terrorist networks. We split the field into the classical pipeline of image preprocessing and image understanding. Preprocessing includes: image manipulation; quality improvement; Threat Image Projection (TIP); and material discrimination and segmentation. Image understanding includes: Automated Threat Detection (ATD); and Automated Contents Verification (ACV). We identify several gaps in the literature that need to be addressed and propose ideas for future research. Where the current literature is sparse we borrow from the single-view, multi-view, and CT X-ray baggage domains, which have some characteristics in common with X-ray cargo.

  18. Delay-Tolerant, Low-Power Protocols for Large Security-Critical Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Claudio S. Malavenda

    2012-01-01

    Full Text Available This paper reports the analysis, implementation, and experimental testing of a delay-tolerant and energy-aware protocol for a wireless sensor node, oriented to security applications. The solution proposed takes advantages from different domains considering as a guideline the low power consumption and facing the problems of seamless and lossy connectivity offered by the wireless medium along with very limited resources offered by a wireless network node. The paper is organized as follows: first we give an overview on delay-tolerant wireless sensor networking (DTN; then we perform a simulation-based comparative analysis of state-of-the-art DTN approaches and illustrate the improvement offered by the proposed protocol; finally we present experimental data gathered from the implementation of the proposed protocol on a proprietary hardware node.

  19. Exploration of the financing and management model of a children's critical disease security system in China based on the implementation of Shanghai Children Hospital Care Aid.

    Science.gov (United States)

    Zhang, Zhi-ruo; Wen, Zhao-jun; Chen, Sai-juan; Chen, Zhu

    2011-03-01

    This study is designed to serve as a reference for the establishment of health security systems for children’s critical diseases. Through analysis of the operation of Shanghai Children Hospital Care Aid (SCHCA), this study explored the financing model and management of a children’s critical disease healthcare system and analyzed the possibility of expanding this system to other areas. It is found that a premium as low as RMB 7 per capita per year under SCHCA can provide high-level security for children’s critical diseases. With the good experience in Shanghai and based on the current basic medical insurance system for urban residents and the new rural cooperative medical scheme (NRCMS), it is necessary and feasible to build a health security system for children’s critical diseases at the national level.

  20. Design Guidance for New Windows | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  1. Selection Process for New Windows | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  2. Selection Process for Replacement Windows | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  3. Design Guidance for Replacement Windows | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  4. Replacement Windows for Existing Homes Homes | Efficient Windows

    Science.gov (United States)

    Collaborative Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring

  5. Proper Installation of New Windows | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  6. Securing the future in the anthropocene: A critical analysis of the millennium ecosystem assessment scenarios

    Directory of Open Access Journals (Sweden)

    Robert P. Marzec

    2018-05-01

    Full Text Available This commentary analyzes the ontological character of the United Nations’ Millennium Ecosystem Assessment (2005 and its attempt to imagine business-as-usual and transformative human-environmental futures. The Millennium Ecosystem Assessment (MA constitutes the first and most significant attempt by an international political body to incorporate environmental concerns into the field of imaginative scenario building. In addition to its lengthy report on the threatened status of planetary ecosystems, the MA contains extensive “future scenarios” that imagine how human-environmental relations might unfold over the course of the twenty-first century. These scenarios arise out of the lineage of military scenarios generated during the Cold War, and continue to inform UN assessments in the present. This commentary explores how a politico-military concern for security informs the framework of the scenarios, and limits how the MA characterizes the fundamental human act of narration. In the process, the commentary explores alternative ontologies of narration and how these may lead to more transformative narratological interventions.

  7. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  8. Universal Signatures of Quantum Critical Points from Finite-Size Torus Spectra: A Window into the Operator Content of Higher-Dimensional Conformal Field Theories.

    Science.gov (United States)

    Schuler, Michael; Whitsitt, Seth; Henry, Louis-Paul; Sachdev, Subir; Läuchli, Andreas M

    2016-11-18

    The low-energy spectra of many body systems on a torus, of finite size L, are well understood in magnetically ordered and gapped topological phases. However, the spectra at quantum critical points separating such phases are largely unexplored for (2+1)D systems. Using a combination of analytical and numerical techniques, we accurately calculate and analyze the low-energy torus spectrum at an Ising critical point which provides a universal fingerprint of the underlying quantum field theory, with the energy levels given by universal numbers times 1/L. We highlight the implications of a neighboring topological phase on the spectrum by studying the Ising* transition (i.e. the transition between a Z_{2} topological phase and a trivial paramagnet), in the example of the toric code in a longitudinal field, and advocate a phenomenological picture that provides qualitative insight into the operator content of the critical field theory.

  9. Enhancing Critical Infrastructure and Key Resources (CIKR) Level-0 Physical Process Security Using Field Device Distinct Native Attribute Features

    Energy Technology Data Exchange (ETDEWEB)

    Lopez, Juan [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Liefer, Nathan C. [Wright-Patterson AFB, Dayton, OH (United States); Busho, Colin R. [Wright-Patterson AFB, Dayton, OH (United States); Temple, Michael A. [Wright-Patterson AFB, Dayton, OH (United States)

    2017-12-04

    Here, the need for improved Critical Infrastructure and Key Resource (CIKR) security is unquestioned and there has been minimal emphasis on Level-0 (PHY Process) improvements. Wired Signal Distinct Native Attribute (WS-DNA) Fingerprinting is investigated here as a non-intrusive PHY-based security augmentation to support an envisioned layered security strategy. Results are based on experimental response collections from Highway Addressable Remote Transducer (HART) Differential Pressure Transmitter (DPT) devices from three manufacturers (Yokogawa, Honeywell, Endress+Hauer) installed in an automated process control system. Device discrimination is assessed using Time Domain (TD) and Slope-Based FSK (SB-FSK) fingerprints input to Multiple Discriminant Analysis, Maximum Likelihood (MDA/ML) and Random Forest (RndF) classifiers. For 12 different classes (two devices per manufacturer at two distinct set points), both classifiers performed reliably and achieved an arbitrary performance benchmark of average cross-class percent correct of %C > 90%. The least challenging cross-manufacturer results included near-perfect %C ≈ 100%, while the more challenging like-model (serial number) discrimination results included 90%< %C < 100%, with TD Fingerprinting marginally outperforming SB-FSK Fingerprinting; SB-FSK benefits from having less stringent response alignment and registration requirements. The RndF classifier was most beneficial and enabled reliable selection of dimensionally reduced fingerprint subsets that minimize data storage and computational requirements. The RndF selected feature sets contained 15% of the full-dimensional feature sets and only suffered a worst case %CΔ = 3% to 4% performance degradation.

  10. Provide Views | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  11. Reduced Fading | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  12. EWC Members | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  13. Visible Transmittance | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  14. Gas Fills | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  15. EWC Membership | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  16. Reducing Condensation | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  17. Improved Comfort | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  18. Financing & Incentives | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  19. Tools & Resources | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  20. Books & Publications | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  1. Design Considerations | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  2. [Emergency and disaster response in critical care unit in the Mexican Social Security Institute: triage and evacuation].

    Science.gov (United States)

    Echevarría-Zuno, Santiago; Cruz-Vega, Felipe; Elizondo-Argueta, Sandra; Martínez Valdés, Everardo; Franco-Bey, Rubén; Méndez-Sánchez, Luis Miguel

    2013-01-01

    Providing medical assistance in emergencies and disaster in advance makes the need to maintain Medical Units functional despite the disturbing phenomenon that confronts the community, but conflict occurs when the Medical Unit needs support and needs to be evacuated, especially when the evacuation of patients in a Critical Care Unit is required. In world literature there is little on this topic, and what is there usually focuses on the conversion of areas and increased ability to care for mass casualties, but not about how to evacuate if necessary, and when a wrong decision can have fatal consequences. That is why the Mexican Social Security Institute gave the task of examining these problems to a working group composed of specialists of the Institute. The purpose was to evaluate and establish a method for performing a protocol in the removal of patients and considering always to safeguard both staff and patients and maintain the quality of care.

  3. How to Secure UPS Operation And Supply of Safety Critical Load During Abnormal Conditions in Upstream Supply

    International Nuclear Information System (INIS)

    Andersen, Gert; Kissling, Silvan; Laaser, Joerg

    2015-01-01

    UPS system design margins are usually given by manufacturer, but the events in Forsmark showed that these margins are not sufficient to protect UPS equipment and secure supply to critical loads. To withstand such events, it is not enough just to define margins for particular equipment. The overall plant design including environmental influences must be taken into consideration. For extreme environmental conditions, a UPS must include protection which design is matching to the upstream plant equipment. Immunity against abnormal conditions can not be finally guaranteed by higher margins. A limitation that excludes such influences must be implemented into the design. This presentation discusses possibilities to specify design margins, for rectifiers and inverters based on GUTOR thyristor and IGBT technology. It shows protection features to resist and solutions to limit overvoltages. (authors)

  4. Windows and doors

    Energy Technology Data Exchange (ETDEWEB)

    1988-01-01

    A complete manual is presented on windows and doors for the housing contractor. In order to understand the role of windows and doors in a house's energy performance, an introduction explains the house as a system of components that can have effects on each other. Further chapters explain in detail the parts of a window, window types and RSI values; window servicing and repair; window replacement; parts of a door, door types and RSI values; door service and repair, including weatherstripping; door replacement; and how to ensure quality, service, and customer satisfaction. A glossary of terms is included. 61 figs., 3 tabs.

  5. Windows 10 simplified

    CERN Document Server

    McFedries, Paul

    2015-01-01

    Learn Windows 10 quickly and painlessly with this beginner's guide Windows 10 Simplified is your absolute beginner's guide to the ins and outs of Windows. Fully updated to cover Windows 10, this highly visual guide covers all the new features in addition to the basics, giving you a one-stop resource for complete Windows 10 mastery. Every page features step-by-step screen shots and plain-English instructions that walk you through everything you need to know, no matter how new you are to Windows. You'll master the basics as you learn how to navigate the user interface, work with files, create

  6. Windows 10 for dummies

    CERN Document Server

    Rathbone, Andy

    2015-01-01

    The fast and easy way to get up and running with Windows 10 Windows 10 For Dummies covers the latest version of Windows and gets you up and running with the changes and new features you'll find in this updated operating system. Packed with time-saving tips to help you get the most out of the software, this helpful Windows 10 guide shows you how to manage Windows tasks like navigating the interface with a mouse or touchscreen, connecting to the web, and troubleshooting problems and making quick fixes. Assuming no prior knowledge of the software, Windows 10 For Dummies addresses the updates to

  7. Schematic Window Methodology Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The aim of this IRAD is to produce a generic launch window analyzer (SWM) that allows for large-scale rapid analysis of a launch window and orbit design trade space....

  8. PNNL Measurement Results for the 2016 Criticality Accident Dosimetry Exercise at the Nevada National Security Stite (IER-148)

    Energy Technology Data Exchange (ETDEWEB)

    Rathbone, Bruce A.; Morley, Shannon M.; Stephens, John A.

    2017-05-01

    The Pacific Northwest National Laboratory (PNNL) participated in a criticality accident dosimetry intercomparison exercise held at the Nevada National Security Site (NNSS) May 24-27, 2016. The exercise was administered by Lawrence Livermore National Laboratory (LLNL) and consisted of three exposures performed using the Godiva-IV critical assembly housed in the Device Assembly Facility (DAF) located on the NNSS site. The exercise allowed participants to test the ability of their nuclear accident dosimeters to meet the performance criteria in ANSI/HPS N13.3-2013, Dosimetry for Criticality Accidents and to obtain new measurement data for use in revising dose calculation methods and quick sort screening methods where appropriate. PNNL participated with new prototype Personal Nuclear Accident Dosimeter (PNAD) and Fixed Nuclear Accident Dosimeter (FNAD) designs as well as the existing historical PNAD design. The new prototype designs incorporate optically stimulated luminescence (OSL) dosimeters in place of thermoluminescence dosimeters (TLDs), among other design changes, while retaining the same set of activation foils historically used. The default dose calculation methodology established decades ago for use with activation foils in PNNL PNADs and FNADs was used to calculate neutron dose results for both the existing and prototype dosimeters tested in the exercise. The results indicate that the effective cross sections and/or dose conversion factors used historically need to be updated to accurately measure the operational quantities recommended for nuclear accident dosimetry in ANSI/HPS N13.3-2013 and to ensure PNAD and FNAD performance meets the ANSI/HPS N13.3-2013 performance criteria. The operational quantities recommended for nuclear accident dosimetry are personal absorbed dose, Dp(10), and ambient absorbed dose, D*(10).

  9. Window Selection Tool | Efficient Windows Collaborative

    Science.gov (United States)

    Louisville LA Lake Charles LA New Orleans LA Shreveport MA Boston MD Baltimore ME Portland MI Detroit MI Window Selection Tool will take you through a series of design conditions pertaining to your design and

  10. A critical analysis of the implementation of social networking as an e-recruitment tool within a security enterprise

    Directory of Open Access Journals (Sweden)

    Anthony Lewis

    2015-12-01

    Full Text Available Many enterprises are operating in complex and competitive environments, and changes in the internal and external environment have prompted them to engage in better ways of doing business. In order to respond to these changes, and survive in today’s volatile business environment, enterprises need to change their strategies. Human Resource departments are under pressure to keep operating costs low whilst also ensuring they are attracting, recruiting, and retaining talent within the enterprise. To achieve this, an increasing number of enterprises have adopted social networking into their recruitment strategy. This research aims to critically analyze the implementation of social networking as an e-recruitment tool within a Security Enterprise. The research key objective is to examine the importance of attracting Generation Y through the use of social networking sites and also to develop an understanding of the advantages and disadvantages of using social networking as an e-recruitment tool. The research also looks at contemporary examples of enterprises that have implemented social networking into their recruitment strategy. A further objective of the research is to gain an understanding of the attitudes and perceptions of the use of social networking as an e-recruitment tool. To achieve this, the research has taken a mixed-methods approach whilst focusing on an interpretivist stance. Data was gathered through an interview with the HR Manager at the Security Enterprise and a questionnaire was distributed to 22 employees within the enterprise and 84 respondents on social networking sites. The overall attitudes and perceptions of respondents showed that social networking can be effectively used as an e-recruitment tool as long as a traditional recruitment method is also used.

  11. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  12. Windows® Internals

    CERN Document Server

    Russinovich, Mark E; Ionescu, Alex

    2009-01-01

    See how the core components of the Windows operating system work behind the scenes-guided by a team of internationally renowned internals experts. Fully updated for Windows Server 2008 and Windows Vista, this classic guide delivers key architectural insights on system design, debugging, performance, and support-along with hands-on experiments to experience Windows internal behavior firsthand.Delve inside Windows architecture and internals:Understand how the core system and management mechanisms work-from the object manager to services to the registryExplore internal system data structures usin

  13. Assessment of critical exposure and outcome windows in time-to-event analysis with application to air pollution and preterm birth study.

    Science.gov (United States)

    Chang, Howard H; Warren, Joshua L; Darrow, Lnydsey A; Reich, Brian J; Waller, Lance A

    2015-07-01

    In reproductive epidemiology, there is a growing interest to examine associations between air pollution exposure during pregnancy and the risk of preterm birth (PTB). One important research objective is to identify critical periods of exposure and estimate the associated effects at different stages of pregnancy. However, population studies have reported inconsistent findings. This may be due to limitations from the standard analytic approach of treating PTB as a binary outcome without considering time-varying exposures together over the course of pregnancy. To address this research gap, we present a Bayesian hierarchical model for conducting a comprehensive examination of gestational air pollution exposure by estimating the joint effects of weekly exposures during different vulnerable periods. Our model also treats PTB as a time-to-event outcome to address the challenge of different exposure lengths among ongoing pregnancies. The proposed model is applied to a dataset of geocoded birth records in the Atlanta metropolitan area between 1999-2005 to examine the risk of PTB associated with gestational exposure to ambient fine particulate matter [Formula: see text]m in aerodynamic diameter (PM[Formula: see text]). We find positive associations between PM[Formula: see text] exposure during early and mid-pregnancy, and evidence that associations are stronger for PTBs occurring around week 30. © The Author 2015. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  14. Working with Windows Vista at CERN - (IT3T/2007/3)

    CERN Multimedia

    CERN. Geneva

    2007-01-01

    IT3T/2007/3 - Travailler sur Windows Vista au CERN La présentation fournira une introduction à Windows Vista et montrera les nouvelles fonctionnalités comme le nouveau interface d’utilisateur : Windows Aero, le nouveau Windows Desktop Search et les divers améliorations de sécurité comme User Account Control. IT3T/2007/3 - Working with Windows Vista at CERN The presentation will provide a introduction to Windows Vista and demonstrate the new features such as the new Graphical User Interface including Windows Aero, the new Windows Desktop Search and various Security enhancements like the User Account Control.

  15. Securing Communal Land Rights to Achieve Sustainable Development in Sub-Saharan Africa: Critical Analysis and Policy Implications

    Directory of Open Access Journals (Sweden)

    Ross Andrew Clarke

    2009-09-01

    Full Text Available While the concept of sustainable development gains increasing traction under international law, effective and scalable policies to translate these principles into practice remain largely beyond reach. This article analyses one possible strategy in Sub-Saharan Africa - increasing security of communal tenure to improve resource management and achieve rural sustainable development. Although this approach has attracted some attention, particularly with management responsibility of communal property increasingly devolved to the community-level, the expected results in terms of more sustainable resource exploitation and sounder environmental management have yet to be realised. Through critical analysis, with particular emphasis on the Gestion Terroir approach in Burkina Faso , the article explores the reasons behind the limited success. The article suggests that greater emphasis must be placed on bridging statutory command-and-control regimes with community-based models. Focusing on the links between communal land tenure and environmental management, and effectively embedding community land management institutions within existing environmental governance structures offers a practical model to promote sustainable development.

  16. Windows 8 secrets

    CERN Document Server

    Thurrott, Paul

    2012-01-01

    Tips, tricks, treats, and secrets revealed on Windows 8 Microsoft is introducing a major new release of its Windows operating system, Windows 8, and what better way to learn all its ins and outs than from two internationally recognized Windows experts and Microsoft insiders, authors Paul Thurrott and Rafael Rivera? They cut through the hype to get at useful information you'll not find anywhere else, including what role this new OS plays in a mobile and tablet world. Regardless of your level of knowledge, you'll discover little-known facts about how things work, what's new and different, and h

  17. Mastering Windows 7 Deployment

    CERN Document Server

    Finn, Aidan; van Surksum, Kenneth

    2011-01-01

    Get professional-level instruction on Windows 7 deployment tools Enterprise-level operating system deployment is challenging and requires knowledge of specific tools. It is expected that Windows 7 will be extensively deployed in businesses worldwide. This comprehensive Sybex guide provides thorough coverage of the Microsoft deployment tools that were specifically created for Windows 7, preparing system administrators, MIS professionals, and corporate programmers to tackle the task effectively.Companies worldwide are expected to deploy Windows 7 as their enterprise operating system; system admi

  18. Programming Windows Azure

    CERN Document Server

    Krishnan, Sriram

    2010-01-01

    Learn the nuts and bolts of cloud computing with Windows Azure, Microsoft's new Internet services platform. Written by a key member of the product development team, this book shows you how to build, deploy, host, and manage applications using Windows Azure's programming model and essential storage services. Chapters in Programming Windows Azure are organized to reflect the platform's buffet of services. The book's first half focuses on how to write and host application code on Windows Azure, while the second half explains all of the options you have for storing and accessing data on the plat

  19. Beginning Windows 8

    CERN Document Server

    Halsey, Mike

    2012-01-01

    Windows 8 has been described by Microsoft as its 'boldest' Windows release ever. Beginning Windows 8 takes you through the new features and helps you get more out of the familiar to reveal the possibilities for this amazing new operating system. You will learn, with non-technical language used throughout, how to get up and running in the new Windows interface, minimize downtime, maximize productivity, and harness the features you never knew existed to take control of your computer and enjoy the peace of mind and excitement that comes with it. From tips and tweaks to easy-to-follow guides and d

  20. Windows 8 tweaks

    CERN Document Server

    Sinchak, Steve

    2013-01-01

    Acres of Windows 8 tweaks from a Microsoft MVP and creator of Tweaks.com! From a Microsoft MVP, who is also the savvy creator of Tweaks.com, comes this ultimate collection of Windows 8 workarounds. Steve Sinchak takes you way beyond default system settings, deep under the hood of Windows 8, down to the hidden gems that let you customize your Windows 8 system like you wouldn't believe. From helping you customize the appearance to setting up home networking, sharing media, and squeezing every ounce of performance out of the OS, this book delivers. Get ready to rock and roll with Wind

  1. Improving Safety, Economic, Substantiality, and Security of Nuclear Energy with Canadian Super-Critical Water-cooled Reactor Concept

    International Nuclear Information System (INIS)

    Hamilton, Holly; Pencer, Jeremy; Yetisir, Metin; Leung, Laurence

    2012-01-01

    Super-Critical Water-cooled Reactor is one of the six design concepts being developed under the Generation IV International Forum. It is the only concept evolving from the water-cooled reactors and taking advantages of the balance-of-plant design and operation experience of the fossil-power plants. Canada is developing the SCR concept from the well-established pressure-tube reactor technology. The Canadian SCWR maintains modular design approach using relative small fuel channels with the separation of coolant and moderator. It is equipped with an advanced fuel channel design that is capable to transfer decay heat from the fuel to the moderator under the long-term cooling stage. Coupled with the advanced passive-moderator cooling system, cooling of fuel and fuel channel is continuous even without external power or operator intervention. The Canadian SCWR is operating at a pressure of 25 MPa with a core outlet temperature of 625 deg. C. This has led to a drastic increase in thermal efficiency to 48% from 34% of the current fleet of reactors (a 40% rise in relative efficiency). With the high core outlet temperature, a direct thermal cycle has been adopted and has led to simplification in plant design attributing to the cost reduction compared to the current reactor designs. The Canadian SCWR adopts the advanced Thorium fuel cycle to enhance the substantiality, economic, and security. than uranium in the world (estimated to be three times more). This provides the long-term fuel supply. Thorium's price is stable compared to uranium and is consistently lower than uranium. This would maintain the predictability and economic of fuel supply. Thorium itself is a non-fissile material and once irradiated requires special handling. This improves proliferative resistance. The objective of this paper is to highlight these improvements in generating nuclear energy with the Canadian SCWR

  2. Color Wheel Windows

    Science.gov (United States)

    Leonard, Stephanie

    2012-01-01

    In this article, the author describes a painting and drawing lesson which was inspired by the beautiful circular windows found in cathedrals and churches (also known as "rose windows"). This two-week lesson would reinforce both the concept of symmetry and students' understanding of the color wheel. (Contains 1 online resource.)

  3. Efficient Windows Collaborative

    Energy Technology Data Exchange (ETDEWEB)

    Nils Petermann

    2010-02-28

    The project goals covered both the residential and commercial windows markets and involved a range of audiences such as window manufacturers, builders, homeowners, design professionals, utilities, and public agencies. Essential goals included: (1) Creation of 'Master Toolkits' of information that integrate diverse tools, rating systems, and incentive programs, customized for key audiences such as window manufacturers, design professionals, and utility programs. (2) Delivery of education and outreach programs to multiple audiences through conference presentations, publication of articles for builders and other industry professionals, and targeted dissemination of efficient window curricula to professionals and students. (3) Design and implementation of mechanisms to encourage and track sales of more efficient products through the existing Window Products Database as an incentive for manufacturers to improve products and participate in programs such as NFRC and ENERGY STAR. (4) Development of utility incentive programs to promote more efficient residential and commercial windows. Partnership with regional and local entities on the development of programs and customized information to move the market toward the highest performing products. An overarching project goal was to ensure that different audiences adopt and use the developed information, design and promotion tools and thus increase the market penetration of energy efficient fenestration products. In particular, a crucial success criterion was to move gas and electric utilities to increase the promotion of energy efficient windows through demand side management programs as an important step toward increasing the market share of energy efficient windows.

  4. Visual merchandising window display

    Directory of Open Access Journals (Sweden)

    Opris (Cas. Stanila M.

    2013-12-01

    Full Text Available Window display plays a major part in the selling strategies; it does not only include the simple display of goods, nowadays it is a form of art, also having the purpose of sustaining the brand image. This article wants to reveal the tools that are essential in creating a fabulous window display. Being a window designer is not an easy job, you have to always think ahead trends, to have a sense of colour, to know how to use light to attract customers in the store after only one glance at the window. The big store window displays are theatre scenes: with expensive backgrounds, special effects and high fashion mannequins. The final role of the displays is to convince customers to enter the store and trigger the purchasing act which is the final goal of the retail activity.

  5. GA microwave window development

    International Nuclear Information System (INIS)

    Moeller, C.P.; Kasugai, A.; Sakamoto, K.; Takahashi, K.

    1994-10-01

    The GA prototype distributed window was tested in a 32 mm diam. waveguide system at a power density suitable for a MW gyrotron, using the JAERI/Toshiba 110 GHz long pulse internal converter gyrotron in the JAERI test stand. The presence of the untilted distributed window had no adverse effect on the gyrotron operation. A pulse length of 10 times the calculated thermal equilibrium time (1/e time) of 30 msec was reached, and the window passed at least 750 pulses greater than 30 msec and 343 pulses greater than 60 msec. Beyond 100 msec, the window calorimetry reached steady state, allowing the window dissipation to be measured in a single pulse. The measured loss of 4.0% agrees both with the estimated loss, on which the stress calculations are based, and with the attenuation measured at low power in the HE 11 mode. After the end of the tests, the window was examined; no evidence of arcing air coating was found in the part of the window directly illuminated by the microwaves, although there was discoloration in a recess containing an optical diagnostic which outgassed, causing a local discharge to occur in that recess. Finally, there was no failure of the metal-sapphire joints during a total operating time of 50 seconds consisting of pulses longer than 30 msec

  6. Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-Law-Johnson-noise scheme.

    Directory of Open Access Journals (Sweden)

    Laszlo B Kish

    Full Text Available Recently, Bennett and Riedel (BR (http://arxiv.org/abs/1303.7435v1 argued that thermodynamics is not essential in the Kirchhoff-law-Johnson-noise (KLJN classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional security of the KLJN method has not been successfully challenged.

  7. Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-Law-Johnson-noise scheme.

    Science.gov (United States)

    Kish, Laszlo B; Abbott, Derek; Granqvist, Claes G

    2013-01-01

    Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) argued that thermodynamics is not essential in the Kirchhoff-law-Johnson-noise (KLJN) classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive) attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional) security of the KLJN method has not been successfully challenged.

  8. Windows Server® 2008 Inside Out

    CERN Document Server

    Stanek, William R

    2009-01-01

    Learn how to conquer Windows Server 2008-from the inside out! Designed for system administrators, this definitive resource features hundreds of timesaving solutions, expert insights, troubleshooting tips, and workarounds for administering Windows Server 2008-all in concise, fast-answer format. You will learn how to perform upgrades and migrations, automate deployments, implement security features, manage software updates and patches, administer users and accounts, manage Active Directory® directory services, and more. With INSIDE OUT, you'll discover the best and fastest ways to perform core a

  9. Windows 8 simplified

    CERN Document Server

    McFedries, Paul

    2012-01-01

    The easiest way for visual learners to get started with Windows 8 The popular Simplified series makes visual learning easier than ever, and with more than 360,000 copies sold, previous Windows editions are among the bestselling Visual books. This guide goes straight to the point with easy-to-follow, two-page tutorials for each task. With full-color screen shots and step-by-step directions, it gets beginners up and running on the newest version of Windows right away. Learn to work with the new interface and improved Internet Explorer, manage files, share your computer, and much more. Perfect fo

  10. Windows 95 Beslutningsguide

    DEFF Research Database (Denmark)

    Sørensen, Jens Otto

    1996-01-01

    Mange virksomheder der bruger pc'er står netop nu over for valget: Skal vi fortsætte med DOS/Windows 3.x som operativsystem, eller skal vi skifte til efterfølgeren Windows 95? Skal vi/kan vi skifte successivt, eller skal det være en "alt eller intet beslutning". Hvornår er det rigtige tidspunkt...... at skifte? Denne artikel vil forsøge at give en baggrundsviden om Windows 95, der kan hjælpe virksomhederne igennem denne beslutningsfase....

  11. Rails on Windows

    CERN Document Server

    Hibbs, Curt

    2007-01-01

    It's no secret that the entire Ruby onRails core team uses OS X as their preferreddevelopment environment. Becauseof this, it is very easy to findauthoritative information on the webabout using Rails on OS X. But the truthis that Windows developers using Railsprobably outnumber those using otherplatforms. A Windows development environmentcan be just as productive asany other platform. This is a guide to developing with Rubyon Rails under Windows. It won't teachyou how to write Ruby on Rails web applications,but it will show you what toolsto use and how to set them up to createa complete Rail

  12. The Efficient Windows Collaborative

    Energy Technology Data Exchange (ETDEWEB)

    Petermann, Nils

    2006-03-31

    The Efficient Windows Collaborative (EWC) is a coalition of manufacturers, component suppliers, government agencies, research institutions, and others who partner to expand the market for energy efficient window products. Funded through a cooperative agreement with the U.S. Department of Energy, the EWC provides education, communication and outreach in order to transform the residential window market to 70% energy efficient products by 2005. Implementation of the EWC is managed by the Alliance to Save Energy, with support from the University of Minnesota and Lawrence Berkeley National Laboratory.

  13. Windows 7 resource kit

    CERN Document Server

    Northrup, Tony; Honeycutt, Jerry; Wilson, Ed

    2009-01-01

    In-depth and comprehensive, this RESOURCE KIT delivers the information you need to administer your Windows 7 system. You get authoritative technical guidance from those who know the technology best-Microsoft Most Valuable Professionals (MVPs) and the Windows 7 product team-along with essential scripts and resources. In addition, "Direct from the Source" sidebars offer deep insights and troubleshooting tips from the Windows 7 team. Get expert guidance on how to: Use Microsoft Deployment Toolkit best practices and tools. Plan user-state migration and test application compatibility.

  14. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  15. SAF for Windows

    DEFF Research Database (Denmark)

    Hansen, Timme

    2001-01-01

    SAF for Windows er et computerprogram til parametrisk konstruktion af translationsskaller. Skaloverfladernes tredimensionelle, facetterede form fremkommer ved en kombination af to todimensionelle formbestemmende kurver, som kan vælges og redigeres af brugeren. Programmet kan udfolde de genererede...

  16. Delineating the conformal window

    DEFF Research Database (Denmark)

    Frandsen, Mads Toudal; Pickup, Thomas; Teper, Michael

    2011-01-01

    We identify and characterise the conformal window in gauge theories relevant for beyond the standard model building, e.g. Technicolour, using the criteria of metric confinement and causal analytic couplings, which are known to be consistent with the phase diagram of supersymmetric QCD from Seiberg...... duality. Using these criteria we find perturbation theory to be consistent throughout the predicted conformal window for several of these gauge theories and we discuss recent lattice results in the light of our findings....

  17. Hot Cell Window Shielding Analysis Using MCNP

    International Nuclear Information System (INIS)

    Pope, Chad L.; Scates, Wade W.; Taylor, J. Todd

    2009-01-01

    The Idaho National Laboratory Materials and Fuels Complex nuclear facilities are undergoing a documented safety analysis upgrade. In conjunction with the upgrade effort, shielding analysis of the Fuel Conditioning Facility (FCF) hot cell windows has been conducted. This paper describes the shielding analysis methodology. Each 4-ft thick window uses nine glass slabs, an oil film between the slabs, numerous steel plates, and packed lead wool. Operations in the hot cell center on used nuclear fuel (UNF) processing. Prior to the shielding analysis, shield testing with a gamma ray source was conducted, and the windows were found to be very effective gamma shields. Despite these results, because the glass contained significant amounts of lead and little neutron absorbing material, some doubt lingered regarding the effectiveness of the windows in neutron shielding situations, such as during an accidental criticality. MCNP was selected as an analysis tool because it could model complicated geometry, and it could track gamma and neutron radiation. A bounding criticality source was developed based on the composition of the UNF. Additionally, a bounding gamma source was developed based on the fission product content of the UNF. Modeling the windows required field inspections and detailed examination of drawings and material specifications. Consistent with the shield testing results, MCNP results demonstrated that the shielding was very effective with respect to gamma radiation, and in addition, the analysis demonstrated that the shielding was also very effective during an accidental criticality.

  18. Thin Film & Deposition Systems (Windows)

    Data.gov (United States)

    Federal Laboratory Consortium — Coating Lab: Contains chambers for growing thin film window coatings. Plasma Applications Coating Lab: Contains chambers for growing thin film window coatings. Solar...

  19. Teach yourself visually Windows 8.1

    CERN Document Server

    McFedries, Paul

    2013-01-01

    A practical guide for visual learners eager to get started with Windows 8.1 If you learn more quickly when you can see how things are done, this Visual guide is the easiest way to get up and running on Windows 8.1. It covers more than 150 essential Windows tasks, using full-color screen shots and step-by-step instructions to show you just what to do. Learn your way around the interface and how to install programs, set up user accounts, play music and other media files, download photos from your digital camera, go online, set up and secure an e-mail account, and much more.The tried-and-true f

  20. High performance sapphire windows

    Science.gov (United States)

    Bates, Stephen C.; Liou, Larry

    1993-02-01

    High-quality, wide-aperture optical access is usually required for the advanced laser diagnostics that can now make a wide variety of non-intrusive measurements of combustion processes. Specially processed and mounted sapphire windows are proposed to provide this optical access to extreme environment. Through surface treatments and proper thermal stress design, single crystal sapphire can be a mechanically equivalent replacement for high strength steel. A prototype sapphire window and mounting system have been developed in a successful NASA SBIR Phase 1 project. A large and reliable increase in sapphire design strength (as much as 10x) has been achieved, and the initial specifications necessary for these gains have been defined. Failure testing of small windows has conclusively demonstrated the increased sapphire strength, indicating that a nearly flawless surface polish is the primary cause of strengthening, while an unusual mounting arrangement also significantly contributes to a larger effective strength. Phase 2 work will complete specification and demonstration of these windows, and will fabricate a set for use at NASA. The enhanced capabilities of these high performance sapphire windows will lead to many diagnostic capabilities not previously possible, as well as new applications for sapphire.

  1. Windows® 7 Administrator's Pocket Consultant

    CERN Document Server

    Stanek, William

    2009-01-01

    Portable and precise, this pocket-sized guide delivers immediate answers for the day-to-day administration of Windows 7-from desktop configuration and management to networking and security issues. Zero in on core support and maintenance tasks by using quick-reference tables, instructions, and lists. You'll get the precise information you need to solve problems and get the job done-whether at your desk or in the field!

  2. Electrochromic Window Demonstration at the Donna Land Port of Entry

    Energy Technology Data Exchange (ETDEWEB)

    Fernandes, Luis L. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Lee, Eleanor S. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Thanachareonkit, Anothai [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-05-01

    The U.S. General Services Administration (GSA) Public Buildings Service (PBS) has jurisdiction, custody or control over 105 land ports of entry throughout the United States, 35 of which are located along the southern border. At these facilities, one of the critical functions of windows is to provide border control personnel with direct visual contact with the surrounding environment. This also can be done through surveillance cameras, but the high value that U.S. Customs and Border Protection (CPB) officers place on direct visual contact can be encapsulated in the following statement by a senior officer regarding this project: “nothing replaces line of sight.” In sunny conditions, however, outdoor visibility can be severely compromised by glare, especially when the orb of the sun is in the field of view. This often leads to the deployment of operable shading devices, such as Venetian blinds. While these devices address the glare, they obstruct the view of the surroundings, negating the visual security benefits of the windows.

  3. USB Storage Device Forensics for Windows 10.

    Science.gov (United States)

    Arshad, Ayesha; Iqbal, Waseem; Abbas, Haider

    2018-05-01

    Significantly increased use of USB devices due to their user-friendliness and large storage capacities poses various threats for many users/companies in terms of data theft that becomes easier due to their efficient mobility. Investigations for such data theft activities would require gathering critical digital information capable of recovering digital forensics artifacts like date, time, and device information. This research gathers three sets of registry and logs data: first, before insertion; second, during insertion; and the third, after removal of a USB device. These sets are analyzed to gather evidentiary information from Registry and Windows Event log that helps in tracking a USB device. This research furthers the prior research on earlier versions of Microsoft Windows and compares it with latest Windows 10 system. Comparison of Windows 8 and Windows 10 does not show much difference except for new subkey under USB Key in registry. However, comparison of Windows 7 with latest version indicates significant variances. © 2017 American Academy of Forensic Sciences.

  4. Adaptive Liquid Crystal Windows

    Energy Technology Data Exchange (ETDEWEB)

    Taheri, Bahman; Bodnar, Volodymyr

    2011-12-31

    Energy consumption by private and commercial sectors in the U.S. has steadily grown over the last decade. The uncertainty in future availability of imported oil, on which the energy consumption relies strongly, resulted in a dramatic increase in the cost of energy. About 20% of this consumption are used to heat and cool houses and commercial buildings. To reduce dependence on the foreign oil and cut down emission of greenhouse gases, it is necessary to eliminate losses and reduce total energy consumption by buildings. To achieve this goal it is necessary to redefine the role of the conventional windows. At a minimum, windows should stop being a source for energy loss. Ideally, windows should become a source of energy, providing net gain to reduce energy used to heat and cool homes. It is possible to have a net energy gain from a window if its light transmission can be dynamically altered, ideally electronically without the need of operator assistance, providing optimal control of the solar gain that varies with season and climate in the U.S. In addition, the window must not require power from the building for operation. Resolution of this problem is a societal challenge and of national interest and will have a broad global impact. For this purpose, the year-round, allclimate window solution to provide an electronically variable solar heat gain coefficient (SHGC) with a wide dynamic range is needed. AlphaMicron, Inc. (AMI) developed and manufactured 1ft × 1ft prototype panels for the world’s first auto-adjusting Adaptive Liquid Crystal Windows (ALCWs) that can operate from sunlight without the need for external power source and demonstrate an electronically adjustable SHGC. This novel windows are based on AlphaMicron’s patented e-Tint® technology, a guesthost liquid crystal system implemented on flexible, optically clear plastic films. This technology is suitable both for OEM and aftermarket (retro-fitting) lamination to new and existing windows. Low level of

  5. Windows Azure Platform

    CERN Document Server

    Redkar, Tejaswi

    2010-01-01

    The Azure Services Platform is a brand-new cloud-computing technology from Microsoft. It is composed of four core components-Windows Azure, .NET Services, SQL Services, and Live Services-each with a unique role in the functioning of your cloud service. It is the goal of this book to show you how to use these components, both separately and together, to build flawless cloud services. At its heart Windows Azure Platform is a down-to-earth, code-centric book. This book aims to show you precisely how the components are employed and to demonstrate the techniques and best practices you need to know

  6. Microsoft Windows networking essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    The core concepts and technologies of Windows networking Networking can be a complex topic, especially for those new to the field of IT. This focused, full-color book takes a unique approach to teaching Windows networking to beginners by stripping down a network to its bare basics, thereby making each topic clear and easy to understand. Focusing on the new Microsoft Technology Associate (MTA) program, this book pares down to just the essentials, showing beginners how to gain a solid foundation for understanding networking concepts upon which more advanced topics and technologies can be built.

  7. SPECIAL AND MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS AS VITAL PART OF THE CRITICAL INFRASTRUCTURES IN ROMANIA. SECURING THEIR PHYSICAL AND INFORMATIONAL PROTECTION

    Directory of Open Access Journals (Sweden)

    Constantin MINCU

    2012-11-01

    Full Text Available The article presents several arguments on the need to study the critical infrastructure in Romania including various systems (networks and special military communications. It emphasizes the role and place of such systems and networks to provide national defense and security and the risks and vulnerabilities faced by these infrastructures, and some necessary measures to be taken for the physical and informational protection in the case of hostile military actions, natural disasters or other negative phenomena. Finally some conclusions and proposals are formulated.

  8. Android is the new Windows

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Do you recall the early virus attacks in the early 2000s? “Blaster”, “I love you” and “Slammer” were attacking the pretty much unprotected Microsoft Windows operating system.   While Microsoft has been hit hard in the past, they have tried to improve and are now on a par with other software vendors. Today, they can even be happy that Android is taking over the baton - at least on mobile platforms. According to the Sophos 2013 Security Threat Report “Android [is] today’s the biggest target” and Android devices in Australia and the U.S. experienced even more malware attacks, whether successful or unsuccessful, than PCs during the past three months. The Kaspersky security company recently added that 99% of all mobile threats target Android. Lucky you if you use an iPhone, or a good old Nokia with no Internet connectivity at all. But why is that? It is partly down to the same fac...

  9. Windows and lighting program

    Energy Technology Data Exchange (ETDEWEB)

    1990-06-01

    More than 30% of all energy use in buildings is attributable to two sources: windows and lighting. Together they account for annual consumer energy expenditures of more than $50 billion. Each affects not only energy use by other major building systems, but also comfort and productivity -- factors that influence building economics far more than does direct energy consumption alone. Windows play a unique role in the building envelope, physically separating the conditioned space from the world outside without sacrificing vital visual contact. Throughout the indoor environment, lighting systems facilitate a variety of tasks associated with a wide range of visual requirements while defining the luminous qualities of the indoor environment. Windows and lighting are thus essential components of any comprehensive building science program. Despite important achievements in reducing building energy consumption over the past decade, significant additional savings are still possible. These will come from two complementary strategies: (1) improve building designs so that they effectively apply existing technologies and extend the market penetration of these technologies; and (2) develop advanced technologies that increase the savings potential of each application. Both the Windows and Daylighting Group and the Lighting System Research Group have made substantial contributions in each of these areas, and continue to do so through the ongoing research summarized here. 23 refs., 16 figs.

  10. ICT security management

    OpenAIRE

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  11. Security and Emergency Management Division

    Data.gov (United States)

    Federal Laboratory Consortium — Volpe's Security and Emergency Management Division identifies vulnerabilities, risks, and opportunities to improve the security of transportation systems, critical...

  12. Lower HVAC Costs | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  13. Increased Light & View | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  14. Condensation Resistance (CR) | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  15. Fact Sheets & Publications | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  16. State Fact Sheets | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  17. State Code Guides | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  18. Low Conductance Spacers | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  19. National Fenestration Rating Council (NFRC) | Efficient Windows

    Science.gov (United States)

    Collaborative Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring

  20. Energy & Cost Savings | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  1. Provide Natural Light | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  2. Provide Fresh Air | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  3. Air Leakage (AL) | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  4. Study on burnup credit evaluation method at JAERI towards securing criticality safety rationale for management of spent fuel

    International Nuclear Information System (INIS)

    Nomura, Y.

    1998-01-01

    Lately, due to massive accumulation of spent fuel discharged from light water reactors in Japan, it is gradually demanded to introduce the so-called burnup credit methodology into criticality safety design for nuclear fuel cycle facilities, such as spent fuel storage pools and transport casks. In order to save space in the spent fuel storage pool of the Rokkasho Reprocessing Plant, the burnup credit design has been firstly implemented for its criticality safety evaluation. Here, its design conditions and operational control procedures are briefly shown and research using burned fuel at JAERI is explained to support its licensing safety review, focusing on the relevant content of the Nuclear Criticality Safety Handbook of Japan, which has been prepared so far and planned in the near future. Finally, international co-operation for study on burnup credit issues practiced by JAERI is addressed. (author)

  5. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  6. Thermal bridges of modern windows

    DEFF Research Database (Denmark)

    Hansen, Ernst Jan de Place; Møller, Eva B.; Nielsen, Anker

    2013-01-01

    if the window has an U-factor of 1 W/(m2·K) or lower. This paper describes the development of modern, energy efficient Danish windows with reduced thermal bridges. It focuses on materials, geometry, and sealing of window panes based on a literature review. Examples of modern windows are presented. Experience...... been an important driver for the development of new window solutions in Denmark, increasing the inner-surface temperature at the sealing of window panes. However, it will not stop complaints fromconsumers, as this temperature is calculated under standardized conditions. Increasing requirements...

  7. SECURING DIGITIZED LIBRARY CIRCULATORY SYSTEM

    African Journals Online (AJOL)

    user

    The widespread application of the developed system on smart library circulation .... database management system; [9] through securing .... system running on a Windows 8 Operating system .... mini library for their support, advice and unlimited.

  8. Occupants' window opening behaviour

    DEFF Research Database (Denmark)

    Fabi, Valentina; Andersen, Rune Korsholm; Corgnati, Stefano

    2012-01-01

    Energy consumption in buildings is influenced by several factors related to the building properties and the building controls, some of them highly connected to the behaviour of their occupants.In this paper, a definition of items referring to occupant behaviour related to the building control...... systems is proposed, based on studies presented in literature and a general process leading to the effects on energy consumptions is identified.Existing studies on the topic of window opening behaviour are highlighted and a theoretical framework to deal with occupants' interactions with building controls......, aimed at improving or maintaining the preferred indoor environmental conditions, is elaborated. This approach is used to look into the drivers for the actions taken by the occupants (windows opening and closing) and to investigate the existing models in literature of these actions for both residential...

  9. The Effects of Denial-of-Service Attacks on Secure Time-Critical Communications in the Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Fengli [Univ. of Arkansas, Fayetteville, AR (United States); Li, QInghua [Univ. of Arkansas, Fayetteville, AR (United States); Mantooth, Homer Alan [Univ. of Arkansas, Fayetteville, AR (United States); Ross, Chase [Univ. of Arkansas, Fayetteville, AR (United States); Yang, Jing [Univ. of Arkansas, Fayetteville, AR (United States); Di, Jia [Univ. of Arkansas, Fayetteville, AR (United States); Balda, Juan Carlos [Univ. of Arkansas, Fayetteville, AR (United States)

    2016-04-02

    According to IEC 61850, many smart grid communications require messages to be delivered in a very short time. –Trip messages and sample values applied to the transmission level: 3 ms –Interlocking messages applied to the distribution level: 10 ms •Time-critical communications are vulnerable to denial-of-service (DoS) attacks –Flooding attack: Attacker floods many messages to the target network/machine. We conducted systematic, experimental study about how DoS attacks affect message delivery delays.

  10. THE SECURITY AND CRITICAL LEVELS OF PHYSICAL ACTIVITY FOR TRAINED AND UNTRAINED PERSONS IN MUSCLE PERFORMANCE POWER ORIENTATION.

    Science.gov (United States)

    Chernozub, A A

    The paper studied the problem of finding the optimal methodology for determining the safety and critical load conditions for the body trained and untrained people in the process of training the force pool. It was found that for trained individuals who have a sufficient level of adaptation to the power load, the use of “standard” modes of operation in the course of employment by fitness power safely. However, the problematic issue is that to the untrained troops, it is almost impossible to determine the safe load parameters using conventional techniques, which are mainly used in cyclic sports. Thus, the solution to this problem lies in the fact that using the integral method for estimating the value of power loads and a computer program for determining the relative weight of the index weights, safety and critical load parameters were calculated for untrained persons. At the same time, studied the biochemical parameters of blood (testosterone, cortisol, and lactate dehydrogenase activity) fixed after exercise, compared with the state of rest, confirmed our calculations clearly enough.

  11. Criticality analysis of the EU gas infrastructure: heightened security requirements for gas control and management centres; Kritikalitaetsanalyse der EU-Gasinfrastruktur: Erhoehte Sicherheitsanforderungen an Gasleit- und -kontrollzentren

    Energy Technology Data Exchange (ETDEWEB)

    Nerlich, Uwe; Umbach, Frank [Centre for European Security Strategies (CESS), Muenchen/Berlin (Germany)

    2009-11-15

    Since the terror attacks of 2001 critical infrastructure objects have gained substantially in strategic importance in the eyes of the German government and EU authorities as well as the European industry. This has not only been due to the worldwide increase in terrorist attacks on energy infrastructure objects but also to the attacks of Madrid on 11 March 2004 and London on 7 July 2005, which have shown that Europe is no longer being spared from terrorism. Strategies for the abatement of these hazards and their repercussions are therefore more urgently needed than ever before. This requires a differentiated assessment of the situation, as has been carried out, for example, in raising the security requirements and investigating the vulnerability of the gas management and control centres of the EU's Octavio project.

  12. Windows Home Server users guide

    CERN Document Server

    Edney, Andrew

    2008-01-01

    Windows Home Server brings the idea of centralized storage, backup and computer management out of the enterprise and into the home. Windows Home Server is built for people with multiple computers at home and helps to synchronize them, keep them updated, stream media between them, and back them up centrally. Built on a similar foundation as the Microsoft server operating products, it's essentially Small Business Server for the home.This book details how to install, configure, and use Windows Home Server and explains how to connect to and manage different clients such as Windows XP, Windows Vist

  13. Teach yourself visually Windows 10

    CERN Document Server

    McFedries, Paul

    2015-01-01

    Learn Windows 10 visually with step-by-step instructions Teach Yourself VISUALLY Windows 10 is the visual learner's guide to the latest Windows upgrade. Completely updated to cover all the latest features, this book walks you step-by-step through over 150 essential Windows tasks. Using full color screen shots and clear instruction, you'll learn your way around the interface, set up user accounts, play media files, download photos from your camera, go online, set up email, and much more. You'll even learn how to customize Windows 10 to suit the way you work best, troubleshoot and repair common

  14. Important notice for Windows 2000 Service Pack 3 computers

    CERN Multimedia

    The NICE Team

    2005-01-01

    Microsoft is ending support for Windows 2000 Service Pack 3, which was introduced in 2002. As a consequence, computers running Windows 2000 Service Pack 3 (or older versions1)) must be updated. It is recommended that Windows 2000 computers be re-installed with Windows XP Service Pack 2 (see http://cern.ch/Win/Services/Installation/Diane). If this is not possible for compatibility reasons, Windows 2000 Service Pack 4 must be installed to ensure the computers continue to receive security patches (see http://cern.ch/Win/Docs/2000SP4). In the next few days, NICE 2000 computers requiring an update will receive a pop-up window with instructions. Users requiring help with the update can contact Helpdesk@cern.ch or call 78888. If your computer needs to be updated you are recommended to read the additional information available at http://cern.ch/Win/Docs/2000SP3. The NICE Team 1) To determine your Windows service pack version, use the ‘Start' button and select ‘Run'. In the new window that open...

  15. Important notice for Windows 2000 Service Pack 3 computers

    CERN Multimedia

    The NICE Team

    2005-01-01

    Microsoft is ending support for Windows 2000 Service Pack 3, which was introduced in 2002. As a consequence, computers running Windows 2000 Service Pack 3 (or older versions1) ) must be updated. It is recommended that Windows 2000 computers be re-installed with Windows XP Service Pack 2 (see http://cern.ch/Win/Services/Installation/Diane). If this is not possible for compatibility reasons, Windows 2000 Service Pack 4 must be installed to ensure the computers continue to receive security patches (see http://cern.ch/Win/Docs/2000SP4). In the next few days, NICE 2000 computers requiring an update will receive a pop-up window with instructions. Users requiring help with the update can contact Helpdesk@cern.ch or call 78888. If your computer needs to be updated you are recommended to read the additional information available at http://cern.ch/Win/Docs/2000SP3. The NICE Team 1) To determine your Windows service pack version, use the ‘Start' button and select ‘Run'. In the new window that opens, type ‘wi...

  16. Windows Terminal Servers Orchestration

    Science.gov (United States)

    Bukowiec, Sebastian; Gaspar, Ricardo; Smith, Tim

    2017-10-01

    Windows Terminal Servers provide application gateways for various parts of the CERN accelerator complex, used by hundreds of CERN users every day. The combination of new tools such as Puppet, HAProxy and Microsoft System Center suite enable automation of provisioning workflows to provide a terminal server infrastructure that can scale up and down in an automated manner. The orchestration does not only reduce the time and effort necessary to deploy new instances, but also facilitates operations such as patching, analysis and recreation of compromised nodes as well as catering for workload peaks.

  17. Invariant sets for Windows

    CERN Document Server

    Morozov, Albert D; Dragunov, Timothy N; Malysheva, Olga V

    1999-01-01

    This book deals with the visualization and exploration of invariant sets (fractals, strange attractors, resonance structures, patterns etc.) for various kinds of nonlinear dynamical systems. The authors have created a special Windows 95 application called WInSet, which allows one to visualize the invariant sets. A WInSet installation disk is enclosed with the book.The book consists of two parts. Part I contains a description of WInSet and a list of the built-in invariant sets which can be plotted using the program. This part is intended for a wide audience with interests ranging from dynamical

  18. Windows Azure web sites

    CERN Document Server

    Chambers, James

    2013-01-01

    A no-nonsense guide to maintaining websites in Windows Azure If you're looking for a straightforward, practical guide to get Azure websites up and running, then this is the book for you. This to-the-point guide provides you with the tools you need to move and maintain a website in the cloud. You'll discover the features that most affect developers and learn how they can be leveraged to work to your advantage. Accompanying projects enhance your learning experience and help you to walk away with a thorough understanding of Azure's supported technologies, site deployment, and manageme

  19. A Critical Analysis Of The Majority Judgment In F V Minister Of Safety And Security 2012 1 Sa 536 (Cc

    Directory of Open Access Journals (Sweden)

    James Linscott

    2014-12-01

    Full Text Available The majority judgment of Mogoeng CJ in F v Minister of Safety and Security 2012 1 SA 536 (CC purports to be a straightforward application of the reasoning of the Constitutional Court in K v Minister of Safety and Security 2005 6 SA 419 (CC, in which the court updated and constitutionalised the "standard test" for vicarious liability in deviation cases originally set out in Minister of Police v Rabie 1986 1 SA 117 (A by holding that constitutional and other policy norms now play an important role in deciding questions of vicarious liability. However, it is respectfully submitted that a close reading of the majority judgment in F reveals that the judge misconstrues several key concepts related to the doctrine of vicarious liability. In particular, the judge seems to suggest that there are separate and different tests for vicarious liability in instances where an employee has plainly committed a delict in the course and scope of his employment, and where he has to some extent deviated from his employment duties. In fact, there is a single overarching test for vicarious liability - the course and scope rule - but various subsidiary tests are used by the courts to address difficult or borderline cases. It is also questionable whether F truly is a "typical deviation case", as the judge asserts. The judge then applies the constitutionalised test for vicarious liability originally set out in K in a manner which is subtly, but significantly, different from how it was deployed in that case. In particular, Mogoeng CJ's implication that it is not necessary for a court to consider the second leg of the Rabie test in circumstances where the employee wrongdoer has clearly subjectively intended to further the interests of his employer is undesirable and should not be supported. Furthermore, the judge identifies the question of whether or not there is an "intimate link" between the conduct of the employee wrongdoer and the business of his employer as one of the

  20. Handbook on Windows and Energy

    DEFF Research Database (Denmark)

    Thomsen, Kirsten Engelund; Schultz, Jørgen Munthe; Svendsen, Sv Aa Højgaard

    The handbook on windows and energy is a general description of windows with the main focus put on the energy performance. Common window products are described by commonly used nomenclature, description of frame and sash conctructions and description of commonly used glazing types.The energy...... transmission through windows is described in detail including radiation, convection and conduction as well as solar transmittance of window glazing. The most used terms related to characterization of window energy performance are defined and calculation methods according to international standards...... flow and detailed calculation of light and solar transmittance is given.Different measurement techniques for characterization of window heat loss coefficient and total solar energy transmittance is described and references to interantional standards are given.Finally, the handbook includes...

  1. Windows with improved energy performances

    DEFF Research Database (Denmark)

    Laustsen, Jacob Birck; Svendsen, Svend

    2003-01-01

    Heat loss through windows represents a considerable part of the total heat loss from houses. However, apart from providing daylight access and view, windows offer a unique potential for solar gain to be exploited during the heating season. Until now valuation of the energy performance of windows...... has primary focused on the heat loss coefficient, U-value. However, as the U-value, especially for the glazing part, has improved considerably during the last years, the total solar energy transmittance, g-value, has become equally important to the total energy performance of windows. Improved energy...... resulted in a window with a positive net energy gain (in short the Net Gain Window), which means that it contributes to the space heating of the building. All improvements are based on existing technology and manufacturing methods. The results from this work show that the energy performances of windows can...

  2. The new null testing method for the special optical window

    Science.gov (United States)

    Huang, Changchun

    2009-07-01

    The high speed, high precision and wide range specifications are requirement for the modern aircraft, which the traditional hemispherical dome can't achieve now, and the novel conformal window instead can enhance the aerodynamic performance of the aircraft obviously. To reduce the aerodynamic drag and radar cross-section, the window geometry is generally aspheric in shape. As a result, the involved fabrication and testing processes are much more challenging than that of conventional optics and must be mastered before these windows and systems can be implemented at an acceptable cost and risk. Metrology is one of the critical areas required to advance the conformal window technology. But as the surface of these conformal windows is not the traditional sphere lens, the measurement method for it is infeasible with the conventional optics measurement processes. This paper we express the development of testing technology for the special conformal windows in brief, and emphatically introduces one available novel testing method- a new null testing, and here based on the theory of compensation methods, The principle of Offner's refractive null lens has been extended to test the transmission wavefront through conformal window optics and provide feedback during surface fabrication. a compensator system for the was designed for the conformal window is given which parameters are 100mm for its aperture and two parabolic surface as conformal window, the final residual wavefront error(RMS) of which is less than 1/20λ(λ=632.8nm).

  3. Windows on the axion

    International Nuclear Information System (INIS)

    Turner, M.S.

    1989-04-01

    Peccei-Quinn symmetry with attendant axion is a most compelling, and perhaps the most minimal, extension of the standard model, as it provides a very elegant solution to the nagging strong CP-problem associated with the Θ vacuum structure of QCD. However, particle physics gives little guidance as to the axion mass; a priori, the plausible values span the range: 10/sup /minus/12/ eV /approx lt/ m/sub a/ /approx lt/ 10 6 eV, some 18 orders-of-magnitude. Axions have a host of interesting astrophysical and cosmological effects, including, modifying the evolution of stars of all types (our sun, red giants, white dwarfs, and neutron stars), contributing significantly to the mass density of the Universe today, and producing detectable line radiation through the decays of relic axions. Consideration of these effects has probed 14 orders-of-magnitude in axion mass, and has left open only two windows for further exploration: 10/sup /minus/6/ eV /approx lt/ m/sub a/ /approx lt/ 10/sup /minus/3/ eV and 1 eV /approx lt/ m/sub a/ /approx lt/ 5 eV (hadronic axions only). Both these windows are accessible to experiment, and a variety of very interesting experiments, all of which involve ''heavenly axions,'' are being planned or are underway. 58 refs., 6 figs., 1 tab

  4. WINDOW-CLEANING

    CERN Multimedia

    Environmental Section / ST-TFM

    2001-01-01

    The two-month window-cleaning session on the Meyrin, Prévessin and LEP sites will soon begin. The cleaning contractors will work from Monday to Saturday, every week from 4.00 a.m. to 8.00 p.m. The work will be organised so as to disturb users as little as possible. In any event, a work notice will be left in each office 24 hours beforehand. To prevent any damage to documents or items which could occur despite the precautions taken, please clear completely the window-sills and the area immediately around them. If, however, for valid reasons, the work cannot be done on the scheduled day, please inform the Environmental Section by telephoning: 73753 / 74233 / 72242 If you are going to be absent during this two-month period, we should be grateful if you would clear the above mentioned areas before your departure. REMINDER To allow more thorough cleaning of the entrance doors to buildings and also facilitate the weekly work of the cleaning contractors, we ask you to make use of the notice boards at the...

  5. Working with Windows 7 at CERN (EN)

    CERN Multimedia

    CERN. Geneva

    2010-01-01

    Overview of new concepts and user interface changes in Windows 7 as compared with older versions of Windows: XP or Vista. Availability of Windows 7 at CERN and its integration with CERN Windows infrastructure will be discussed.

  6. Window observers for linear systems

    Directory of Open Access Journals (Sweden)

    Utkin Vadim

    2000-01-01

    Full Text Available Given a linear system x ˙ = A x + B u with output y = C x and a window function ω ( t , i.e., ∀ t , ω ( t ∈ {0,1 }, and assuming that the window function is Lebesgue measurable, we refer to the following observer, x ˆ = A x + B u + ω ( t L C ( x − x ˆ as a window observer. The stability issue is treated in this paper. It is proven that for linear time-invariant systems, the window observer can be stabilized by an appropriate design under a very mild condition on the window functions, albeit for linear time-varying system, some regularity of the window functions is required to achieve observer designs with the asymptotic stability. The corresponding design methods are developed. An example is included to illustrate the possible applications

  7. Windows 7 the definitive guide

    CERN Document Server

    Stanek, William R

    2010-01-01

    This book provides everything you need to manage and maintain Windows 7. You'll learn all of the features and enhancements in complete detail, along with specifics for configuring the operating system to put you in full control. Bestselling author and Windows expert William Stanek doesn't just show you the steps you need to follow, he also tells you how features work, why they work, and how you can customize them to meet your needs. Learn how to squeeze every bit of power out of Windows 7 to take full advantage of its features and programs. Set up, customize, and tune Windows 7-Optimize its

  8. Windows 7 The Missing Manual

    CERN Document Server

    Pogue, David

    2010-01-01

    In early reviews, geeks raved about Windows 7. But if you're an ordinary mortal, learning what this new system is all about will be challenging. Fear not: David Pogue's Windows 7: The Missing Manual comes to the rescue. Like its predecessors, this book illuminates its subject with reader-friendly insight, plenty of wit, and hardnosed objectivity for beginners as well as veteran PC users. Windows 7 fixes many of Vista's most painful shortcomings. It's speedier, has fewer intrusive and nagging screens, and is more compatible with peripherals. Plus, Windows 7 introduces a slew of new features,

  9. Microsoft Windows Operating System Essentials

    CERN Document Server

    Carpenter, Tom

    2012-01-01

    A full-color guide to key Windows 7 administration concepts and topics Windows 7 is the leading desktop software, yet it can be a difficult concept to grasp, especially for those new to the field of IT. Microsoft Windows Operating System Essentials is an ideal resource for anyone new to computer administration and looking for a career in computers. Delving into areas such as fundamental Windows 7 administration concepts and various desktop OS topics, this full-color book addresses the skills necessary for individuals looking to break into a career in IT. Each chapter begins with a list of topi

  10. Beginning Windows 8.1

    CERN Document Server

    Halsey, Mike

    2013-01-01

    Windows 8 has been described by Microsoft as its 'boldest' Windows release ever and the 8.1 update enhances the paradigm further. Beginning Windows 8.1 takes you through the new features and helps you get more out of the familiar to reveal the fullest possibilities for this amazing new operating system. You will learn, with non-technical language used throughout, how to get up and running in the new Windows interface, minimize downtime, maximize productivity, and harness the features you never knew existed to take control of your computer and enjoy the peace of mind and excitement that comes w

  11. Live histograms in moving windows

    International Nuclear Information System (INIS)

    Zhil'tsov, V.E.

    1989-01-01

    Application of computer graphics for specific hardware testing is discussed. The hardware is position sensitive detector (multiwire proportional chamber) which is used in high energy physics experiments, and real-out electronics for it. Testing program is described (XPERT), which utilises multi-window user interface. Data are represented as histograms in windows. The windows on the screen may be moved, reordered, their sizes may be changed. Histograms may be put to any window, and hardcopy may be made. Some program internals are discussed. The computer environment is quite simple: MS-DOS IBM PC/XT, 256 KB RAM, CGA, 5.25'' FD, Epson MX. 4 refs.; 7 figs

  12. Laser induced damage and fracture in fused silica vacuum windows

    International Nuclear Information System (INIS)

    Campbell, J.H.; Hurst, P.A.; Heggins, D.D.; Steele, W.A.; Bumpas, S.E.

    1996-11-01

    Laser-induced damage, that initiates catastrophic fracture, has been observed in large (≤61 cm dia) fused silica lenses that also serve as vacuum barriers in Nova and Beamlet lasers. If the elastic stored energy in the lens is high enough, the lens will fracture into many pieces (implosion). Three parameters control the degree of fracture in the vacuum barrier window: elastic stored energy (tensile stress), ratio of window thickness to flaw depth, and secondary crack propagation. Fracture experiments were conducted on 15-cm dia fused silica windows that contain surface flaws caused by laser damage. Results, combined with window failure data on Beamlet and Nova, were used to develop design criteria for a ''fail-safe'' lens (that may catastrophically fracture but not implode). Specifically, the window must be made thick enough so that the peak tensile stress is less than 500 psi (3.4 MPa) and the thickness/critical flaw size is less than 6. The air leak through the window fracture and into the vacuum must be rapid enough to reduce the load on the window before secondary crack growth occurs. Finite element stress calculations of a window before and immediately following fracture into two pieces show that the elastic stored energy is redistributed if the fragments ''lock'' in place and thereby bridge the opening. In such cases, the peak stresses at the flaw site can increase, leading to further (i.e. secondary) crack growth

  13. Windows forensic analysis toolkit advanced analysis techniques for Windows 7

    CERN Document Server

    Carvey, Harlan

    2012-01-01

    Now in its third edition, Harlan Carvey has updated "Windows Forensic Analysis Toolkit" to cover Windows 7 systems. The primary focus of this edition is on analyzing Windows 7 systems and on processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. The author presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. New to this edition, the companion and toolkit materials are now hosted online. This material consists of electronic printable checklists, cheat sheets, free custom tools, and walk-through demos. This edition complements "Windows Forensic Analysis Toolkit, 2nd Edition", (ISBN: 9781597494229), which focuses primarily on XP. It includes complete coverage and examples on Windows 7 systems. It contains Lessons from the Field, Case Studies, and War Stories. It features companion online material, including electronic printable checklists, cheat sheets, free custom tools, ...

  14. Web Security, Privacy & Commerce

    CERN Document Server

    Garfinkel, Simson

    2011-01-01

    Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Exp

  15. Learning Windows Azure Mobile Services for Windows 8 and Windows Phone 8

    CERN Document Server

    Webber-Cross, Geoff

    2014-01-01

    This book is based around a case study game which was written for the book. This means that the chapters progress in a logical way and build upon lessons learned as we go. Real-world examples are provided for each topic that are practical and not given out-of-context so they can be applied directly to other applications.If you are a developer who wishes to build Windows 8 and Phone 8 applications and integrate them with Windows Azure Mobile Services, this book is for you. Basic C# and JavaScript skills are advantageous, as well as some knowledge of building Windows 8 or Windows Phone 8 applica

  16. Rootkit pro MS Windows

    OpenAIRE

    Trutman, Michal

    2012-01-01

    Tato bakalářská práce se zabývá metodami útoků na operační systém MS Windows a přibližuje techniky skrývání výpočetních prostředků používané existujícími rootkity. Práce je rozdělena na teoretickou a praktickou část. První část pojednává o klasifikaci rootkitů, představuje strukturu jádra systému a následně popisuje jednotlivé techniky napadení operačního systému. V praktické části je prezentována implementace a testování vlastního rootkitu. This bachelor's thesis deals with methods of att...

  17. Destiny's Earth Observation Window

    Science.gov (United States)

    2002-01-01

    Astronaut Michael J. Bloomfield, STS-110 mission commander, looks through the Earth observation window in the Destiny laboratory aboard the International Space Station (ISS). The STS-110 mission prepared the ISS for future spacewalks by installing and outfitting the S0 (S-zero) truss and the Mobile Transporter. The 43-foot-long S0 Truss, weighing in at 27,000 pounds, was the first of 9 segments that will make up the Station's external framework that will eventually stretch 356 feet (109 meters), or approximately the length of a football field. This central truss segment also includes a flatcar called the Mobile Transporter and rails that will become the first 'space railroad,' which will allow the Station's robotic arm to travel up and down the finished truss for future assembly and maintenance. The completed truss structure will hold solar arrays and radiators to provide power and cooling for additional international research laboratories from Japan and Europe that will be attached to the Station. Milestones of the STS-110 mission included the first time the ISS robotic arm was used to maneuver spacewalkers around the Station and marked the first time all spacewalks were based out of the Station's Quest Airlock. It was also the first Shuttle to use three Block II Main Engines. The Space Shuttle Orbiter Atlantis, STS-110 mission, was launched April 8, 2002 and returned to Earth April 19, 2002.

  18. Window prototypes during the project

    DEFF Research Database (Denmark)

    Schultz, Jørgen Munthe

    1996-01-01

    The conditions for the PASSYS test and the results of the measurements on one of the aerogel window prototypes are described.......The conditions for the PASSYS test and the results of the measurements on one of the aerogel window prototypes are described....

  19. Improved Windows for Cold Climates

    DEFF Research Database (Denmark)

    Laustsen, Jacob Birck; Svendsen, Svend

    2005-01-01

    considerably by reducing the frame width, which results in a larger transparent area causing a larger solar gain but still main-taining a low thermal transmittance. Using three layers of glass with large gaps, using very slim frame profiles, and omitting the edge constructions that normally causes thermal...... windows with improved energy performance. Traditionally evaluation of the energy performance of windows has focused on the thermal transmittance, but as windows differ from the rest of the building envelope by allowing solar energy to enter the building, the total solar energy transmittance is equally...... important. In the heating season in cold climates the solar gain through windows can be utilized for space heating which results in a corresponding reduction in the energy production that is often based on fossil fuels. A suitable quantity for evaluating the energy performance of windows in a simple...

  20. Finance/security/life.

    OpenAIRE

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  1. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  2. Database Security: A Historical Perspective

    OpenAIRE

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 ye...

  3. Tokamak physics experiment: Diagnostic windows study

    International Nuclear Information System (INIS)

    Merrigan, M.; Wurden, G.A.

    1995-11-01

    We detail the study of diagnostic windows and window thermal stress remediation in the long-pulse, high-power Tokamak Physics Experiment (TPX) operation. The operating environment of the TPX diagnostic windows is reviewed, thermal loads on the windows estimated, and cooling requirements for the windows considered. Applicable window-cooling technology from other fields is reviewed and its application to the TPX windows considered. Methods for TPX window thermal conditioning are recommended, with some discussion of potential implementation problems provided. Recommendations for further research and development work to ensure performance of windows in the TPX system are presented

  4. Embossing of optical document security devices

    Science.gov (United States)

    Muke, Sani

    2004-06-01

    Embossing in the transparent window area of polymer banknotes, such as those seen on the Australian, New Zealand and Romanian currencies, have enormous potential for the development of novel optical security devices. The intaglio printing process can provide an efficient means for embossing of optical security structures such as micro lenses. Embossed micro lens arrays in the transparent window of a polymer banknote can be folded over a corresponding printed image array elsewhere on the note to reveal a series of moire magnified images. Analysis of samples of embossed micro lenses showed that the engraving side and impression side had a similar embossed profile. The embossed micro lens profiles were modelled using Optalix-LX commercial optical ray tracing software in order to determine the focal length of the lenses and compare with the focal length of desired embossed lenses. A fundamental understanding of how the polymer deforms during the embossing process is critical towards developing a micro lens embossing tool which can achieve the desired embossed micro lenses. This work also looks at extending the early research of the Intaglio Research Group (IRG) to better understand the embossibility of polymer substrates such as biaxially oriented polypropylene (BOPP).

  5. Transparent solar cell window module

    Energy Technology Data Exchange (ETDEWEB)

    Chau, Joseph Lik Hang; Chen, Ruei-Tang; Hwang, Gan-Lin; Tsai, Ping-Yuan [Nanopowder and Thin Film Technology Center, ITRI South, Industrial Technology Research Institute, Tainan County 709 (China); Lin, Chien-Chu [I-Lai Acrylic Corporation, Tainan City (China)

    2010-03-15

    A transparent solar cell window module based on the integration of traditional silicon solar cells and organic-inorganic nanocomposite material was designed and fabricated. The transparent solar cell window module was composed of a nanocomposite light-guide plate and traditional silicon solar cells. The preparation of the nanocomposite light-guide plate is easy without modification of the traditional casting process, the nanoparticles sol can be added directly to the polymethyl methacrylate (PMMA) monomer syrup during the process. The solar energy collected by this window can be used to power up small household electrical appliances. (author)

  6. Big Book of Windows Hacks

    CERN Document Server

    Gralla, Preston

    2008-01-01

    Bigger, better, and broader in scope, the Big Book of Windows Hacks gives you everything you need to get the most out of your Windows Vista or XP system, including its related applications and the hardware it runs on or connects to. Whether you want to tweak Vista's Aero interface, build customized sidebar gadgets and run them from a USB key, or hack the "unhackable" screensavers, you'll find quick and ingenious ways to bend these recalcitrant operating systems to your will. The Big Book of Windows Hacks focuses on Vista, the new bad boy on Microsoft's block, with hacks and workarounds that

  7. Production management of window handles

    Directory of Open Access Journals (Sweden)

    Manuela Ingaldi

    2014-12-01

    Full Text Available In the chapter a company involved in the production of aluminum window and door handles was presented. The main customers of the company are primarily companies which produce PCV joinery and wholesalers supplying these companies. One chosen product from the research company - a single-arm pin-lift window handle - was described and its production process depicted technologically. The chapter also includes SWOT analysis conducted in the research company and the value stream of the single-arm pin-lift window handle.

  8. Windows Phone 7 Made Simple

    CERN Document Server

    Trautschold, Martin

    2011-01-01

    With Windows Phone 7, Microsoft has created a completely new smartphone operating system that focuses on allowing users to be productive with their smartphone in new ways, while offering seamless integration and use of Microsoft Office Mobile as well as other productivity apps available in the Microsoft App Store. Windows Phone 7 Made Simple offers a clear, visual, step-by-step approach to using your Windows Phone 7 smartphone, no matter what the manufacturer. Author Jon Westfall is an expert in mobile devices, recognized by Microsoft as a "Most Valuable Professional" with experience

  9. Holography through optically active windows

    Science.gov (United States)

    Decker, A. J.

    1979-01-01

    By using two orthogonally polarized reference beams, holograms can be recorded through stressed windows and the reconstructed virtual image will show no stress pattern. As shown analytically, the stress-pattern-free hologram is recordable for any polarization state of the object illumination. Hence, the more efficient nondepolarizing diffuser can be used in performing holography through stressed windows if two reference beams are used. Results are presented for a pair of machined polysulfone windows intended for use in a holographic flow-visualization setup in a single-stage-compressor test rig.

  10. Grab Windows training opportunities; check CERN Windows roadmap!

    CERN Multimedia

    IT Department

    2011-01-01

    CERN Operating Systems and Information Services group (IT-OIS) actively monitors market trends to check how new software products correspond to CERN needs. In the Windows world, Windows 7 has been a big hit, with over 1500 Windows 7 PCs within less than a year since its support was introduced at CERN. No wonder: Windows XP is nearly 10 years old and is steadily approaching the end of its life-cycle. At CERN, support for Windows XP will stop at the end of December 2012. Compared to Vista, Windows 7 has the same basic hardware requirements, but offers higher performance, so the decision to upgrade is rather straightforward. CERN support for Vista will end in June 2011. In the world of Microsoft Office, version 2007 offers better integration with the central services than the older version 2003. Progressive upgrade from 2003 to 2007 is planned to finish in September 2011, but users are encouraged to pro-actively upgrade at their convenience. Please note that Office 2007 brings an important change in the area of ...

  11. National Reachback Systems for Nuclear Security: State-of-play report: ERNCIP Thematic Group Radiological and Nuclear Threats to Critical Infrastructure: Deliverable of task 3.1b

    OpenAIRE

    TOIVONEN H.; HUBERT Schoech; REPPENHAGEN GRIM P.; PIBIDA Leticia; JAMES Mark; ZHANG Weihua; PERÄJÄRVI K.

    2015-01-01

    Operational systems for nuclear security in Finland, France, Denmark, UK, US and Canada were reviewed. The Finnish case is a holistic approach to Nuclear Security Detection Architecture, as defined by the International Atomic Energy Agency; reachback is only one component of the system, albeit an important crosscutting element of the detection architecture. The French and US studies concentrate on the reachback itself. The Danish nuclear security system is information-driven, relying on th...

  12. Gated cardiac blood pool studies in atrial fibrillation: Role of cycle length windowing

    Energy Technology Data Exchange (ETDEWEB)

    Wallis, J W; Juni, J E; Wu, L [Michigan Univ., Ann Arbor (USA). Div. of Nuclear Medicine

    1991-01-01

    Cycle length windowing is gaining increasing acceptance in gated blood pool imaging of patients with atrial fibrillation (AF). The goals of this study were: to assess differences of ejection fraction (EF) in AF with and without windowing and to determine how EF varied with cycle length in patients with AF. Twenty patients with AF were prospectively studied by gated blood pool imaging, with simultaneous collection in each patient of 5-7 studies with cycle length windows spanning the cycle length histogram. Each window accepted beats of only a narrow range of cycle lengths. EF was determined for each of the narrow cycle length windows as well as for the entire gated blood pool study without cycle length windowing. For every patient an average of the windowed EFs was compared with the non-windowed EF. EF values were similar (mean windowed: 46.6; non-windowed: 45.5; P=0.16), and there was a good correlation between the two techniques (r=0.97). The data were then examined for a relationship of EF with cycle length. The difference from average windowed EF ({Delta}EF) was calculated for each window and plotted vs. the cycle length of the center of each window. No predictable linear or nonlinear relationship of {Delta}EF with window position was observed. Lack of predictable variation of EF with cycle length is likely due to lack of a predictable amount of ventricular filling for a given cycle length, as the amount of diastolic filling in AF depends on the random cycle length of the preceding beat. In summary, windowing in AF does not provide a clinically significant difference in EF determination. If cycle length windowing is used, the exact location of the window is not critical. (orig.).

  13. Peliohjelmointi Windows Phone 8:lle

    OpenAIRE

    Bäckström, Toni

    2014-01-01

    Tässä insinöörityössä tutustutaan Windows Phone 8 -mobiilikäyttöjärjestelmään peliohjelmoijan näkökulmasta. Työn tavoitteena oli erityisesti esitellä Microsoftin itse kehittämiä XNA- ja DirectX-peliohjelmointikirjastoja teoriassa ja käytännössä. Työn aluksi käydään läpi hieman Windows Phonen historiaa ja yleisesti kehittämistä Windows Phone 8:lle. Tämän jälkeen luodaan katsaus Windows Phone 8:aan pelialustana. Työn suurin osuus on XNA:n ja DirectX:n esittely teoriassa; kummastakin men...

  14. A window on urban sustainability

    International Nuclear Information System (INIS)

    Stigt, Rien van; Driessen, Peter P.J.; Spit, Tejo J.M.

    2013-01-01

    Sustainable urban development requires the integration of environmental interests in urban planning. Although various methods of environmental assessment have been developed, plan outcomes are often disappointing due to the complex nature of decision-making in urban planning, which takes place in multiple arenas within multiple policy networks involving diverse stakeholders. We argue that the concept of ‘decision windows’ can structure this seemingly chaotic chain of interrelated decisions. First, explicitly considering the dynamics of the decision-making process, we further conceptualized decision windows as moments in an intricate web of substantively connected deliberative processes where issues are reframed within a decision-making arena, and interests may be linked within and across arenas. Adopting this perspective in two case studies, we then explored how decision windows arise, which factors determine their effectiveness and how their occurrence can be influenced so as to arrive at more sustainable solutions. We conclude that the integration of environmental interests in urban planning is highly dependent on the ability of the professionals involved to recognize and manipulate decision windows. Finally, we explore how decision windows may be opened. -- Highlights: • Decision-making about sustainable urban development occurs in networks. • The concept of ‘decision windows’ was further elaborated. • Decision windows help understand how environmental interests enter decision-making. • Decision windows can, to some extent, be influenced

  15. A window on urban sustainability

    Energy Technology Data Exchange (ETDEWEB)

    Stigt, Rien van, E-mail: rien.vanstigt@hu.nl [Research Center for Technology and Innovation, Utrecht University of Applied Sciences, P.O. Box 182, 3500 AD Utrecht (Netherlands); Driessen, Peter P.J., E-mail: p.driessen@uu.nl [Copernicus Institute of Sustainable Development, Faculty of Geosciences, Utrecht University, P.O. Box 80.115, 3508 TC Utrecht (Netherlands); Spit, Tejo J.M., E-mail: T.J.M.Spit@uu.nl [Department of Human Geography and Spatial Planning, Faculty of Geosciences, Utrecht University, P.O. Box 80.115, 3508 TC Utrecht (Netherlands)

    2013-09-15

    Sustainable urban development requires the integration of environmental interests in urban planning. Although various methods of environmental assessment have been developed, plan outcomes are often disappointing due to the complex nature of decision-making in urban planning, which takes place in multiple arenas within multiple policy networks involving diverse stakeholders. We argue that the concept of ‘decision windows’ can structure this seemingly chaotic chain of interrelated decisions. First, explicitly considering the dynamics of the decision-making process, we further conceptualized decision windows as moments in an intricate web of substantively connected deliberative processes where issues are reframed within a decision-making arena, and interests may be linked within and across arenas. Adopting this perspective in two case studies, we then explored how decision windows arise, which factors determine their effectiveness and how their occurrence can be influenced so as to arrive at more sustainable solutions. We conclude that the integration of environmental interests in urban planning is highly dependent on the ability of the professionals involved to recognize and manipulate decision windows. Finally, we explore how decision windows may be opened. -- Highlights: • Decision-making about sustainable urban development occurs in networks. • The concept of ‘decision windows’ was further elaborated. • Decision windows help understand how environmental interests enter decision-making. • Decision windows can, to some extent, be influenced.

  16. Mastering Microsoft Windows Server 2008 R2

    CERN Document Server

    Minasi, Mark; Finn, Aidan

    2010-01-01

    The one book you absolutely need to get up and running with Windows Server 2008 R2. One of the world's leading Windows authorities and top-selling author Mark Minasi explores every nook and cranny of the latest version of Microsoft's flagship network operating system, Windows Server 2008 R2, giving you the most in-depth coverage in any book on the market.: Focuses on Windows Windows Server 2008 R2, the newest version of Microsoft's Windows' server line of operating system, and the ideal server for new Windows 7 clients; Author Mark Minasi is one of the world's leading Windows authorities and h

  17. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    National Research Council Canada - National Science Library

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...

  18. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  19. Switchable Materials for Smart Windows.

    Science.gov (United States)

    Wang, Yang; Runnerstrom, Evan L; Milliron, Delia J

    2016-06-07

    This article reviews the basic principles of and recent developments in electrochromic, photochromic, and thermochromic materials for applications in smart windows. Compared with current static windows, smart windows can dynamically modulate the transmittance of solar irradiation based on weather conditions and personal preferences, thus simultaneously improving building energy efficiency and indoor human comfort. Although some smart windows are commercially available, their widespread implementation has not yet been realized. Recent advances in nanostructured materials provide new opportunities for next-generation smart window technology owing to their unique structure-property relations. Nanomaterials can provide enhanced coloration efficiency, faster switching kinetics, and longer lifetime. In addition, their compatibility with solution processing enables low-cost and high-throughput fabrication. This review also discusses the importance of dual-band modulation of visible and near-infrared (NIR) light, as nearly 50% of solar energy lies in the NIR region. Some latest results show that solution-processable nanostructured systems can selectively modulate the NIR light without affecting the visible transmittance, thus reducing energy consumption by air conditioning, heating, and artificial lighting.

  20. Interview with Violet Oaklander, Author of "Windows to Our Children."

    Science.gov (United States)

    Campbell, Chari A.

    1993-01-01

    Presents interview with Dr. Violent Oaklander, experienced child therapist and author of "Windows to Our Children: A Gestalt Therapy with Children and Adolescents." Discusses critical components of successful therapy with children. Explains how developmental stage of child affects therapeutic process, and provides specific examples of working with…

  1. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  2. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  3. Design and implementation of face recognition system based on Windows

    Science.gov (United States)

    Zhang, Min; Liu, Ting; Li, Ailan

    2015-07-01

    In view of the basic Windows login password input way lacking of safety and convenient operation, we will introduce the biometrics technology, face recognition, into the computer to login system. Not only can it encrypt the computer system, also according to the level to identify administrators at all levels. With the enhancement of the system security, user input can neither be a cumbersome nor worry about being stolen password confidential.

  4. Vulnerability assessment of critical infrastructure : activity 2 final report : information on SCADA systems and other security monitoring techniques used in oil and gas pipelines

    Energy Technology Data Exchange (ETDEWEB)

    Gu, G.P.; Revie, R.W. [Natural Resources Canada, Ottawa, ON (Canada). CANMET Materials Technology Laboratory

    2008-03-15

    This study evaluated various technologies for monitoring the security of remote pipeline infrastructure. The technologies included flow, pressure and mass variations; negative pressure waves; dynamic and statistical modelling; hydrocarbon-sensitive cables; fiber optic systems; infrared thermography; spectral imaging; and synthetic aperture radar and radio frequency identification methods. A brief outline of the technologies was provided, along with suggestions for integrating the technology with other commercially available tools designed to manage security and reduce risk. The study demonstrated that many monitoring technologies are suitable for detecting pipeline leaks and identifying third party intrusions. A combination of different methods may provide optimal security and accuracy in leak detection and location. Automatic range and plausibility checks can be used to enhance system security and to recognize invalid changes in measuring devices and poorly parameterized media. Detailed reviews of the technologies were included in 2 appendices. 28 refs., 2 appendices.

  5. Travailler avec Windows 7 au CERN (FR)

    CERN Multimedia

    CERN. Geneva

    2010-01-01

    Vue d'ensemble des nouveaux concepts et des changements dans l'interface utilisateur survenus dans Windows 7 depuis les versions antérieures de Windows (XP ou Vista). La mise à disposition de Windows 7 au CERN et son intégration dans l’infrastructure de Windows au CERN seront présentées.

  6. Music@Microsoft.Windows: Composing Ambience

    Science.gov (United States)

    Rickert, Thomas

    2010-01-01

    It is well known, of course, that all Windows versions except for 3.1 have a brief (four to six second) piece of music indicating that Windows is booted and ready for use. While the music may indicate Windows has booted, it bears no immediately discernable relation to the various uses we might actually put Windows to--working, gaming,…

  7. Windows Server 2012 R2 administrator cookbook

    CERN Document Server

    Krause, Jordan

    2015-01-01

    This book is intended for system administrators and IT professionals with experience in Windows Server 2008 or Windows Server 2012 environments who are looking to acquire the skills and knowledge necessary to manage and maintain the core infrastructure required for a Windows Server 2012 and Windows Server 2012 R2 environment.

  8. Windows with improved energy performance

    DEFF Research Database (Denmark)

    Noyé, Peter Anders; Laustsen, Jacob Birck; Svendsen, Svend

    2002-01-01

    According to the Danish energy protocol, Energy 21, one of the goals with highest priority is to reduce the CO2-emission. Energy consumption for domestic heating is a major contributor to the CO2-emission; hence one of the primary efforts to reach the goal is by saving energy in the households...... performances. During the last 20 years the U-value of the glazing part of windows has been improved considerably, but the frame part has not followed the same development with respect to energy performance. Therefore an increasingly large part of the total heat loss through windows is relating to the frame...... part, for which reason, as far as energy efficiency and total economy are concerned, it has become more interesting to further develop frame structures. Traditionally, the energy performance of windows has primarily been characterised by the heat loss coefficient, U-value. However as the heat loss has...

  9. Oscillatory integration windows in neurons

    Science.gov (United States)

    Gupta, Nitin; Singh, Swikriti Saran; Stopfer, Mark

    2016-01-01

    Oscillatory synchrony among neurons occurs in many species and brain areas, and has been proposed to help neural circuits process information. One hypothesis states that oscillatory input creates cyclic integration windows: specific times in each oscillatory cycle when postsynaptic neurons become especially responsive to inputs. With paired local field potential (LFP) and intracellular recordings and controlled stimulus manipulations we directly test this idea in the locust olfactory system. We find that inputs arriving in Kenyon cells (KCs) sum most effectively in a preferred window of the oscillation cycle. With a computational model, we show that the non-uniform structure of noise in the membrane potential helps mediate this process. Further experiments performed in vivo demonstrate that integration windows can form in the absence of inhibition and at a broad range of oscillation frequencies. Our results reveal how a fundamental coincidence-detection mechanism in a neural circuit functions to decode temporally organized spiking. PMID:27976720

  10. Towards Information Security Awareness

    OpenAIRE

    Marius Petrescu; Delia Mioara Popescu; Nicoleta Sirbu

    2010-01-01

    Information security has come to be recognized as increasingly important because global communication and information systems allow a potentially large number of unauthorized users to access and possibly alter information from around the world. As the dependence on information systems grows, so the security of information networks becomes ever more critical to any entity, no matter if it is a company or a public institution. Information security involves both technology and people. Any securi...

  11. Roadmap on optical security

    NARCIS (Netherlands)

    javidi, B.; Carnicer, A.; Yamaguchi, M.; Nomura, T.; Pérez-Cabré, E.; Millan, M.S.; Nishchal, N.K.; Torroba, R.; Barrera, J.F.; He, W.; Peng, X.; Stern, A.; Rivenson, Y.; Alfalou, A.; Brosseau, C.; Guo, C.; Sheridan, J.T.; Situ, G.; Naruse, M.; Matsumoto, T.; Juvells, I.; Tajahuerce, E.; Lancis, J.; Chen, Wen; Chen, X.; Markman, A.; Mosk, Allard; Pinkse, Pepijn Willemszoon Harry

    2016-01-01

    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical

  12. DTIC Review: Biometric Security

    National Research Council Canada - National Science Library

    2007-01-01

    ...: Biometrics, the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits, is a critical tool used in law enforcement, computer security and homeland defense...

  13. Human security policy challenges

    Directory of Open Access Journals (Sweden)

    Andrew Morton

    2008-10-01

    Full Text Available All evidence points towards climate- and environmentallyinduced migration becoming one of the major policychallenges of this century. Adequate planning for andmanagement of this phenomenon will be critical forhuman security.

  14. Windows 7 is supported at CERN

    CERN Multimedia

    IT Department

    2010-01-01

    The new version of the Windows operating system - Windows 7 - is now officially supported at CERN. Windows 7 32-bit is now the default operating system for the new computers at CERN. What’s new in Windows 7 Users of Windows XP will find many new features and options. Users of Windows Vista will feel very familiar with one major difference: higher performance and better responsiveness of the operating system. Other enhancements include: refined Aero desktop that makes it easier to navigate between your different application windows; new snapping windows that allows user to resize a window simply by dragging it to the edge of the screen and “pin” that allows grouping and arranging often accessed applications on the taskbar. Windows 7 introduces the new concept of libraries – containers for user files that have links to different local or network folders. By default, users can see four libraries: Documents, Music, Pictures and Videos. These libraries point to the cor...

  15. Microsoft Windows Server Administration Essentials

    CERN Document Server

    Carpenter, Tom

    2011-01-01

    The core concepts and technologies you need to administer a Windows Server OS Administering a Windows operating system (OS) can be a difficult topic to grasp, particularly if you are new to the field of IT. This full-color resource serves as an approachable introduction to understanding how to install a server, the various roles of a server, and how server performance and maintenance impacts a network. With a special focus placed on the new Microsoft Technology Associate (MTA) certificate, the straightforward, easy-to-understand tone is ideal for anyone new to computer administration looking t

  16. Windows Vista Administrator's Pocket Guide

    CERN Document Server

    Stanek, William R

    2007-01-01

    Portable and precise, this pocket-sized guide delivers immediate answers for the day-to-day administration of Windows Vista. Zero in on core support and maintenance tasks using quick-reference tables, instructions, and lists. You'll get the precise information you need to solve problems and get the job done-whether you're at your desk or in the field! Get fast facts to: Install and configure Windows Vista-and optimize the user workspaceMaintain operating system components, hardware devices, and driversCreate user and group accounts-and control rights and permissionsAdminister group policy se

  17. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  18. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  19. Computer Security: Mac security – nothing for old versions

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2016-01-01

    A fundamental pillar of computer security is the regular maintenance of your code, operating system and application software – or, in computer lingo: patching, patching, patching.   Only software which is up-to-date should be free from any known vulnerabilities and thus provide you with a basic level of computer security. Neglecting regular updates is putting your computer at risk – and consequently your account, your password, your data, your photos, your videos and your money. Therefore, prompt and automatic patching is paramount. But the Microsofts, Googles and Apples of this world do not always help… Software vendors handle their update policy in different ways. While Android is a disaster – not because of Google, but due to the slow adaptation of many smartphone vendors (see “Android’s Armageddon”) – Microsoft provides updates for their Windows 7, Windows 8 and Windows 10 operating systems through their &ldq...

  20. Exceptional and Spinorial Conformal Windows

    DEFF Research Database (Denmark)

    Mojaza, Matin; Pica, Claudio; Ryttov, Thomas

    2012-01-01

    We study the conformal window of gauge theories containing fermionic matter fields, where the gauge group is any of the exceptional groups with the fermions transforming according to the fundamental and adjoint representations and the orthogonal groups where the fermions transform according...

  1. Fpga As A Part Of Ms Windows Control Environment

    Directory of Open Access Journals (Sweden)

    Krzysztof Kołek

    2007-01-01

    Full Text Available The attention is focused on the Windows operating system (OS used as a control and measurementenvironment. Windows OS due to extensions becomes a real-time OS (RTOS.Benefits and drawbacks of typical software extensions are compared. As far as hardwaresolutions are concerned the field programmable gate arrays FPGA technology is proposed toensure fast time-critical operations. FPGA-based parallel execution and hardware implementationof the data processing algorithms significantly outperform the classical microprocessoroperating modes. Suitability of the RTOS for a particular application and FPGA hardwaremaintenance is studied.

  2. THE CYBER THREAT AND THE PROBLEM OF INFORMATION SECURITY - A critical analysis of the concepts of cyber-power and cyber-space

    Directory of Open Access Journals (Sweden)

    Sebastian SÂRBU

    2017-06-01

    Full Text Available In this paper we approached from a researcher’s angle and analyzed the concepts of cyber-space, cyber-power from the security school perspective, from that of the international organizations, and from the civil society point of view. Therefore we referred to the documents and the international initiatives concerning the security of data transfer in the context of the current threats against cybernetic security on the one hand, and its interpretation as a threat to the values, rights and democratic freedoms of the civil society, on the other. The risk society is defined both through the grid of political sociology, of the Copenhagen school, as a key element of reference in this case, as well as through the necessity to build a safe cyber space, here being scrutinized in a value-based antithesis between terror and democracy / freedom of speech.

  3. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  4. Maximum likelihood window for time delay estimation

    International Nuclear Information System (INIS)

    Lee, Young Sup; Yoon, Dong Jin; Kim, Chi Yup

    2004-01-01

    Time delay estimation for the detection of leak location in underground pipelines is critically important. Because the exact leak location depends upon the precision of the time delay between sensor signals due to leak noise and the speed of elastic waves, the research on the estimation of time delay has been one of the key issues in leak lovating with the time arrival difference method. In this study, an optimal Maximum Likelihood window is considered to obtain a better estimation of the time delay. This method has been proved in experiments, which can provide much clearer and more precise peaks in cross-correlation functions of leak signals. The leak location error has been less than 1 % of the distance between sensors, for example the error was not greater than 3 m for 300 m long underground pipelines. Apart from the experiment, an intensive theoretical analysis in terms of signal processing has been described. The improved leak locating with the suggested method is due to the windowing effect in frequency domain, which offers a weighting in significant frequencies.

  5. Solar Heat Gain Coefficient (SHGC) | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  6. U-Factor (U-value) | Efficient Windows Collaborative

    Science.gov (United States)

    Foundry Foundry New Construction Windows Window Selection Tool Selection Process Design Guidance Installation Replacement Windows Window Selection Tool Assessing Options Selection Process Design Guidance Installation Understanding Windows Benefits Design Considerations Measuring Performance Performance Standards

  7. Virtual queuing at airport security lanes

    NARCIS (Netherlands)

    Lange, de R.; Samoilovich, I.; Rhee, van der B.

    2013-01-01

    Airports continuously seek opportunities to reduce the security costs without negatively affecting passenger satisfaction. In this paper, we investigate the possibilities of implementing virtual queuing at airport security lanes, by offering some passengers a time window during which they can arrive

  8. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  9. Migration towards Windows 2000/XP

    International Nuclear Information System (INIS)

    Gal, J.

    2004-01-01

    The article deals with interesting technical solutions used in the project 'Migration towards Windows 2000/XP', which was introduced by the company AITEN, Plc for companies SE Plc, SEPS Plc and TEKO, Plc in the period 2002 and 2003. The contents of the project was migration of about 100 servers and more than 4 000 PC to the Windows 2000 and XP environs. The result of the project is a unified and documented system in the field of file, print and small application servers and PC. It has enabled to increase the system reliability and availability, to decrease the total costs for administration and operation and to establish the steady environs for users of the applications. (author)

  10. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    field of PP and most of them have been revised at least once. They have been produced by the French Operators, assessed by the IPSN and approved by the French Competent Authority. They are mandatory as far as PP is concerned for NM held in category I facilities. To go ahead preliminary security studies in the field of MC and A have been performed by operators of two different types of facilities, the results of which are very encouraging. In the field of PP, security studies are based on an analysis consisting in grouping together all the possible paths leading to NM in compliance with a set of threats. Diagrams could be used to show which actions have to be taken to successfully carry out the theft of NM. This may involve crossing zones or outwitting detection devices and overcoming obstacles. By following the diagrams mentioned above, the probability of undetected persons or nuclear materials as they progress in the facility is evaluated. The relevant criteria to assume that the theft has been detected is determined. Then the time elapsing between positive detection of the action and the removal of the NM from the facility is estimated. This estimate is based on documented data and/or the results of tests carried out in the facility or elsewhere. Critical paths are taken as being those along which nuclear materials can be removed from the facility in the shortest time after detection. Special care is taken when analyzing these paths. In the field of MC and A, when unauthorized removal or dysfunction occurs, a discrepancy appears between the physical reality of NM and the way in which it is represented in the MC and A systems. In the case of these studies, an assumption is made that such a discrepancy exists in compliance with a set of threats. Then, the purpose of the security study is to analyse the way in which the discrepancy is revealed in connection with a discovery threshold amount, if any. It should be noted that possible detection of the discrepancy by the

  11. Electrochromic Windows: Advanced Processing Technology

    Energy Technology Data Exchange (ETDEWEB)

    SAGE Electrochromics, Inc

    2006-12-13

    This project addresses the development of advanced fabrication capabilities for energy saving electrochromic (EC) windows. SAGE EC windows consist of an inorganic stack of thin films deposited onto a glass substrate. The window tint can be reversibly changed by the application of a low power dc voltage. This property can be used to modulate the amount of light and heat entering buildings (or vehicles) through the glazings. By judicious management of this so-called solar heat gain, it is possible to derive significant energy savings due to reductions in heating lighting, and air conditioning (HVAC). Several areas of SAGE’s production were targeted during this project to allow significant improvements to processing throughput, yield and overall quality of the processing, in an effort to reduce the cost and thereby improve the market penetration. First, the overall thin film process was optimized to allow a more robust set of operating points to be used, thereby maximizing the yield due to the thin film deposition themselves. Other significant efforts aimed at improving yield were relating to implementing new procedures and processes for the manufacturing process, to improve the quality of the substrate preparation, and the quality of the IGU fabrication. Furthermore, methods for reworking defective devices were developed, to enable devices which would otherwise be scrapped to be made into useful product. This involved the in-house development of some customized equipment. Finally, the improvements made during this project were validated to ensure that they did not impact the exceptional durability of the SageGlass® products. Given conservative estimates for cost and market penetration, energy savings due to EC windows in residences in the US are calculated to be of the order 0.026 quad (0.026×1015BTU/yr) by the year 2017.

  12. Linear gate with prescaled window

    Energy Technology Data Exchange (ETDEWEB)

    Koch, J; Bissem, H H; Krause, H; Scobel, W [Hamburg Univ. (Germany, F.R.). 1. Inst. fuer Experimentalphysik

    1978-07-15

    An electronic circuit is described that combines the features of a linear gate, a single channel analyzer and a prescaler. It allows selection of a pulse height region between two adjustable thresholds and scales the intensity of the spectrum within this window down by a factor 2sup(N) (0<=N<=9), whereas the complementary part of the spectrum is transmitted without being affected.

  13. Windows Vista Annoyances Tips, Secrets, and Hacks for the Cranky Consumer

    CERN Document Server

    Karp, David

    2008-01-01

    Windows Vista may be the next big thing, but it still contains enough quirks and unaccountable behaviors to vex anyone. This unique guide not only discusses the most irritating features of the latest Microsoft operating system and how to get around them, but also explains how to improve Windows and do more with the software than Microsoft intended. You'll find information on setup, installation, upgrade from other Windows versions, the revamped interface, new security features, user accounts, troubleshooting, and the markedly improved Internet Explorer 7. Other chapters cover a wide range of

  14. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  15. Vulnerability assessment of critical infrastructure : activity 2 progress report : information of SCADA systems and other security monitoring systems used in oil and gas pipelines

    Energy Technology Data Exchange (ETDEWEB)

    Gu, G.P. [Natural Resources Canada, Ottawa, ON (Canada). CANMET Materials Technology Laboratory

    2007-12-15

    Many pipelines are located in remote regions and subjected to harsh environmental conditions. Damage to pipelines can have significant economic and environmental impacts. This paper discussed the use of supervisory control and data acquisition (SCADA) systems to monitor and control oil and gas pipeline infrastructure. SCADA systems are a real time, distributed computerized system with an intelligent capability for condition identification and fault diagnosis. SCADA systems can be used to capture thousands of miles of pipeline system process data and distribute it to pipeline operators, whose work stations are networked with the SCADA central host computer. SCADA architectures include monolithic, distributed, and networked systems that can be distributed across wide area networks (WANs). SCADA security strategies must be implemented to ensure corporate network security. Case studies of SCADA systems currently used by oil and gas operators in Alberta were also presented. 15 refs., 1 fig.

  16. Food for Work Program and its Implications on Food Security: A Critical Review with a Practical Example from the Amhara Region, Ethiopia

    Directory of Open Access Journals (Sweden)

    Ashenafi Gedamu

    2006-10-01

    Full Text Available A systematic evaluation of food-for-work (FFW programs in Ethiopia is seriously lacking. Most of the few available reports indicate that these programs have reached very few achievements in terms of food security and reduction of poverty at large. As expressed by Holden et al. (2005, FFW programs are commonly aimed to produce or maintain potentially valuable public goods necessary to stimulate productivity and thus income growth. Natural resources management, like rural road construction, erosion control and afforestation of degraded lands can be mentioned as valuable measures which could stimulate productivity and agricultural growth. The poverty reduction and food security impact of food or cash for work activities are larger if they offer not only seasonal job opportunities to the rural community but also long term employment possibilities. This is more likely if the projects are regionally dispersed and combined with basic education. In the Ethiopian context, it was always questionable if the continuous boom in food aid (regardless of cash or food for work purposes was the solution for the long standing food insecurity and poverty crises in the country. The study discusses the efficiency of FFW programs that aimed to reduce rural poverty and ensure food security on the one hand, and the impact of the food aid on resource and time allocation of the participating households for own food production on the other. The study is based on a field research conducted at a FFW program project, in the Amhara region, Ethiopia run by the German Agency for Technical Cooperation (GTZ with the view of improving food security in the Amhara region, Ethiopia. A household theoretical model is used to analyze the sample data, whether FFW program may indeed reduce household food insecurity and/or has some crowding-out effects on labour allocation of participating households for own field production.

  17. Complementary feeding: a critical window of opportunity from six ...

    African Journals Online (AJOL)

    2013-04-12

    Apr 12, 2013 ... infants.7 They state that “exclusive breastfeeding provides adequate ... reference lists from January 2004 to April 2012, including studies published prior to 2004. ..... for six months confers several benefits on the infant and.

  18. Critical time window of neuronal cholesterol synthesis during neurite outgrowth.

    Science.gov (United States)

    Fünfschilling, Ursula; Jockusch, Wolf J; Sivakumar, Nandhini; Möbius, Wiebke; Corthals, Kristina; Li, Sai; Quintes, Susanne; Kim, Younghoon; Schaap, Iwan A T; Rhee, Jeong-Seop; Nave, Klaus-Armin; Saher, Gesine

    2012-05-30

    Cholesterol is an essential membrane component enriched in plasma membranes, growth cones, and synapses. The brain normally synthesizes all cholesterol locally, but the contribution of individual cell types to brain cholesterol metabolism is unknown. To investigate whether cortical projection neurons in vivo essentially require cholesterol biosynthesis and which cell types support neurons, we have conditionally ablated the cholesterol biosynthesis in these neurons in mice either embryonically or postnatally. We found that cortical projection neurons synthesize cholesterol during their entire lifetime. At all stages, they can also benefit from glial support. Adult neurons that lack cholesterol biosynthesis are mainly supported by astrocytes such that their functional integrity is preserved. In contrast, microglial cells support young neurons. However, compensatory efforts of microglia are only transient leading to layer-specific neuronal death and the reduction of cortical projections. Hence, during the phase of maximal membrane growth and maximal cholesterol demand, neuronal cholesterol biosynthesis is indispensable. Analysis of primary neurons revealed that neurons tolerate only slight alteration in the cholesterol content and plasma membrane tension. This quality control allows neurons to differentiate normally and adjusts the extent of neurite outgrowth, the number of functional growth cones and synapses to the available cholesterol. This study highlights both the flexibility and the limits of horizontal cholesterol transfer in vivo and may have implications for the understanding of neurodegenerative diseases.

  19. Group Policy Fundamentals, Security, and the Managed Desktop

    CERN Document Server

    Moskowitz, Jeremy

    2010-01-01

    The ultimate Group Policy guide-now updated for Windows 7 and Server 2008 R2!. IT and network administrators can streamline their Windows Server management tasks by using Group Policy tools to automate or implement rules, processes, or new security across the enterprise. In this comprehensive guide, Microsoft Group Policy MVP Jeremy Moskowitz thoroughly explores Group Policy across all Windows platforms, including the latest on Windows 7 and Server 2008 R2. If you're a Windows network administrator managing scores of users and computers, you need this essential reference on your desk.: Covers

  20. Microsoft Windows Intune 20 Quickstart Administration

    CERN Document Server

    Overton, David

    2012-01-01

    This book is a concise and practical tutorial that shows you how to plan, set up and maintain Windows Intune and manage a group of PCs. If you are an administrator or partner who wants to plan, set up and maintain Windows Intune and manage a group of PCs then this book is for you . You should have a basic understanding of Windows administration, however, knowledge of Windows Intune would not be required.

  1. Incorporating Security Quality Requirements Engineering (SQUARE) into Standard Life-Cycle Models

    National Research Council Canada - National Science Library

    Mead, Nancy R; Viswanathan, Venkatesh; Padmanabhan, Deepa; Raveendran, Anusha

    2008-01-01

    ...). This report is for information technology managers and security professionals, management personnel with technical and information security knowledge, and any personnel who manage security-critical...

  2. Travailler avec Windows 7 au CERN

    CERN Multimedia

    CERN. Geneva

    2011-01-01

    Vue d'ensemble des nouveaux concepts et des changements dans l'interface utilisateur survenus dans Windows 7 depuis les versions antérieures de Windows (XP ou Vista). Le plan de migration à Windows 7 sera aussi débattu.

  3. Travailler avec Windows 7 au CERN

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Vue d'ensemble des nouveaux concepts et des changements dans l'interface utilisateur survenus dans Windows 7 depuis les versions antérieures de Windows (XP ou Vista). Le plan de migration à Windows 7 sera aussi débattu.

  4. Rigid thin windows for vacuum applications

    Science.gov (United States)

    Meyer, Glenn Allyn; Ciarlo, Dino R.; Myers, Booth Richard; Chen, Hao-Lin; Wakalopulos, George

    1999-01-01

    A thin window that stands off atmospheric pressure is fabricated using photolithographic and wet chemical etching techniques and comprises at least two layers: an etch stop layer and a protective barrier layer. The window structure also comprises a series of support ribs running the width of the window. The windows are typically made of boron-doped silicon and silicon nitride and are useful in instruments such as electron beam guns and x-ray detectors. In an electron beam gun, the window does not impede the electrons and has demonstrated outstanding gun performance and survivability during the gun tube manufacturing process.

  5. Purged window apparatus utilizing heated purge gas

    Science.gov (United States)

    Ballard, Evan O.

    1984-01-01

    A purged window apparatus utilizing tangentially injected heated purge gases in the vicinity of electromagnetic radiation transmitting windows, and a tapered external mounting tube to accelerate these gases to provide a vortex flow on the window surface and a turbulent flow throughout the mounting tube. Use of this apparatus prevents backstreaming of gases under investigation which are flowing past the mouth of the mounting tube which would otherwise deposit on the windows. Lengthy spectroscopic investigations and analyses can thereby be performed without the necessity of interrupting the procedures in order to clean or replace contaminated windows.

  6. Professional Windows Embedded Compact 7

    CERN Document Server

    Phung, Samuel; Joubert, Thierry; Hall, Mike

    2011-01-01

    Learn to program an array of customized devices and solutions As a compact, highly efficient, scalable operating system, Windows Embedded Compact 7 (WEC7) is one of the best options for developing a new generation of network-enabled, media-rich, and service-oriented devices. This in-depth resource takes you through the benefits and capabilities of WEC7 so that you can start using this performance development platform today. Divided into several major sections, the book begins with an introduction and then moves on to coverage of OS design, application development, advanced application developm

  7. Image annotation under X Windows

    Science.gov (United States)

    Pothier, Steven

    1991-08-01

    A mechanism for attaching graphic and overlay annotation to multiple bits/pixel imagery while providing levels of performance approaching that of native mode graphics systems is presented. This mechanism isolates programming complexity from the application programmer through software encapsulation under the X Window System. It ensures display accuracy throughout operations on the imagery and annotation including zooms, pans, and modifications of the annotation. Trade-offs that affect speed of display, consumption of memory, and system functionality are explored. The use of resource files to tune the display system is discussed. The mechanism makes use of an abstraction consisting of four parts; a graphics overlay, a dithered overlay, an image overly, and a physical display window. Data structures are maintained that retain the distinction between the four parts so that they can be modified independently, providing system flexibility. A unique technique for associating user color preferences with annotation is introduced. An interface that allows interactive modification of the mapping between image value and color is discussed. A procedure that provides for the colorization of imagery on 8-bit display systems using pixel dithering is explained. Finally, the application of annotation mechanisms to various applications is discussed.

  8. The plant-window system

    International Nuclear Information System (INIS)

    Wood, R.T.; Mullens, J.A.; Naser, J.A.

    1995-01-01

    Power plant data, and the information that can be derived from it, provide the link to the plant through which the operations, maintenance and engineering staff understand and manage plant performance. The increasing use of computer technology in the U.S. nuclear power industry has greatly expanded the capability to obtain, analyze, and present data about the plant to station personnel. However, it is necessary to transform the vast quantity of available data into clear, concise, and coherent information that can be readily accessed and used throughout the plant. This need can be met by an integrated computer workstation environment that provides the necessary information and software applications, in a manner that can be easily understood and used, to the proper users throughout the plant. As part of a Cooperative Research and Development Agreement with the Electric Power Research Institute, the Oak Ridge National Laboratory has developed functional requirements for a Plant-Wide Integrated Environment Distributed On Workstations (Plant-Window) System. The Plant-Window System (PWS) can serve the needs of operations, engineering, and maintenance personnel at nuclear power stations by providing integrated data and software applications (e.g., monitoring, analysis, diagnosis, and control applications) within a common environment. The PWS requirements identify functional capabilities and provide guidelines for standardized hardware, software, and display interfaces to define a flexible computer environment that permits a tailored implementation of workstation capabilities and facilitates future upgrades

  9. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  10. Bayesian distributed lag interaction models to identify perinatal windows of vulnerability in children's health.

    Science.gov (United States)

    Wilson, Ander; Chiu, Yueh-Hsiu Mathilda; Hsu, Hsiao-Hsien Leon; Wright, Robert O; Wright, Rosalind J; Coull, Brent A

    2017-07-01

    Epidemiological research supports an association between maternal exposure to air pollution during pregnancy and adverse children's health outcomes. Advances in exposure assessment and statistics allow for estimation of both critical windows of vulnerability and exposure effect heterogeneity. Simultaneous estimation of windows of vulnerability and effect heterogeneity can be accomplished by fitting a distributed lag model (DLM) stratified by subgroup. However, this can provide an incomplete picture of how effects vary across subgroups because it does not allow for subgroups to have the same window but different within-window effects or to have different windows but the same within-window effect. Because the timing of some developmental processes are common across subpopulations of infants while for others the timing differs across subgroups, both scenarios are important to consider when evaluating health risks of prenatal exposures. We propose a new approach that partitions the DLM into a constrained functional predictor that estimates windows of vulnerability and a scalar effect representing the within-window effect directly. The proposed method allows for heterogeneity in only the window, only the within-window effect, or both. In a simulation study we show that a model assuming a shared component across groups results in lower bias and mean squared error for the estimated windows and effects when that component is in fact constant across groups. We apply the proposed method to estimate windows of vulnerability in the association between prenatal exposures to fine particulate matter and each of birth weight and asthma incidence, and estimate how these associations vary by sex and maternal obesity status in a Boston-area prospective pre-birth cohort study. © The Author 2017. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  11. MS Windows domēna darbstaciju migrācija no MS Windows XP uz Windows Vista.

    OpenAIRE

    Tetere, Agate

    2009-01-01

    Kvalifikācijas darbā izpētīju darbstaciju migrācijas no Windows XP uz Windows Vista plusus un mīnusus. Darba gaitā tika veikti sekojoši uzdevumi: 1.Veikta Windows XP un Windows Vista darbstaciju instalācija, iestatījumu konfigurēšana un tika pārbaudīta sistēmas darbība 2.Veikta Windows Server 2003 un Windows Server 2008 instalācija, iestatījumu konfigurēšana un tika pārbaudīta sistēmas darbība 3.Izstrādāts migrācijas modelis 4.Veikta migrācijas optimizēšana 5.Veikta datu migrāc...

  12. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  13. Nuclear security officer training

    International Nuclear Information System (INIS)

    Harrington, W.F.

    1981-01-01

    Training has become complex and precise in today's world of critical review and responsibility. Entrusted to a security officer is the success or demise of large business. In more critical environments the security officer is entrusted with the monitoring and protection of life sensitive systems and devices. The awareness of this high visibility training requirement has been addressed by a limited few. Those involved in the nuclear power industry through dedication and commitment to the American public have without a doubt become leading pioneers in demanding training excellence

  14. Instant Windows PowerShell

    CERN Document Server

    Menon, Vinith

    2013-01-01

    Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A practical, hands-on tutorial approach that explores the concepts of PowerShell in a friendly manner, taking an adhoc approach to each topic.If you are an administrator who is new to PowerShell or are looking to get a good grounding in these new features, this book is ideal for you. It's assumed that you will have some experience in PowerShell and Windows Server, as well being familiar with the PowerShell command-line.

  15. Editorial - Opening windows onto data

    Directory of Open Access Journals (Sweden)

    Judith Winters

    2012-05-01

    Full Text Available One of Internet Archaeology's strengths and 'unique selling points' not yet replicated by (many other e-journals, is that data is integrated into articles rather than being 'supplementary' or offered for download. The aim has always been for the narrative to be a wave driving readers towards the underlying data. Opening windows onto the data from within the text is one of the things I think the journal does best and is a feature used throughout Emma Durham's article 'Depicting the gods: metal figurines in Roman Britain'. Archaeological data does not speak for itself. It needs a narrative. It needs context. But by intermeshing data with interpretation, readers can dip into the data and start to explore it while reading the article, allowing a more immediate understanding of the bigger picture.

  16. Windows VPN Set Up | High-Performance Computing | NREL

    Science.gov (United States)

    Windows VPN Set Up Windows VPN Set Up To set up Windows for HPC VPN, here are the steps: Download your version of Windows. Note: We only support the the Endian Connect software when connecting to the a VPN connection to the HPC systems. Windows Version Connect App Windows 10

  17. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    terrorist or criminal targets based on their grade, assignment, symbolic value, criticality, and threat and vulnerability assessment. Levels of protection The recommendations contained in this criterion are intended to minimize the possibility of HRP casualties in buildings or portions of buildings in which they work and live. These recommendations provide appropriate and implementable measures to establish a level of protection against terrorist attacks where no known threat of terrorist activity currently exists. While complete protection against all potential threats is cost prohibitive, the intent of these recommendations can be achieved through prudent master planning, real estate acquisition, and design and construction practices. Tag number The tag number at the beginning of each physical security measure (recommendation is unique and is intended to be a communication aid when linking the requirement (recommendation to the supporting text or commentary. The three-character tag number uses the following legend. Tag Number First Character -The first character is an abbreviation for the defense zone layer that is most applicable for the countermeasure. “S” is used to represent site or external zone issues. “P” is used to represent the perimeter zone. “G” is used to represent issues relative to the property grounds. “E” is used to represent issues associated with the building exterior of the HRP office or residence. “I” is used to represent issues associated with the building interior. “H” is used to represent issues associated with the safe room or safe haven. Tag Number Second Character - The second character is a sequential number for countermeasures in a given zone - a requirement or a recommendation. This number ensures a unique tag number. Tag Number Third Character- The third character indicates whether the countermeasure is applicable to offices, residences, or both (common. “O” indicates a requirement or recommendation unique to

  18. Hybrid window layer for photovoltaic cells

    Science.gov (United States)

    Deng, Xunming

    2010-02-23

    A novel photovoltaic solar cell and method of making the same are disclosed. The solar cell includes: at least one absorber layer which could either be a lightly doped layer or an undoped layer, and at least a doped window-layers which comprise at least two sub-window-layers. The first sub-window-layer, which is next to the absorber-layer, is deposited to form desirable junction with the absorber-layer. The second sub-window-layer, which is next to the first sub-window-layer, but not in direct contact with the absorber-layer, is deposited in order to have transmission higher than the first-sub-window-layer.

  19. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  20. Analysis of surface contaminants on beryllium windows

    International Nuclear Information System (INIS)

    Gmur, N.F.

    1986-12-01

    It is known that various crystalline and liquid compounds form on the downstream surfaces of beryllium windows exposed to air. It is also known that the integrity of such windows may be compromised resulting in leaks through the window. The purpose of this report is to document the occurrences described as they pertain to the NSLS and to analyze, where possible, the various substances formed

  1. Windows PowerShell 20 Bible

    CERN Document Server

    Lee, Thomas; Schill, Mark E; Tanasovski, Tome

    2011-01-01

    Here's the complete guide to Windows PowerShell 2.0 for administrators and developers Windows PowerShell is Microsoft's next-generation scripting and automation language. This comprehensive volume provides the background that IT administrators and developers need in order to start using PowerShell automation in exciting new ways. It explains what PowerShell is, how to use the language, and specific ways to apply PowerShell in various technologies. Windows PowerShell is Microsoft's standard automation tool and something that every Windows administrator will eventually have to understand; this b

  2. Scott Brothers Windows and Doors Information Sheet

    Science.gov (United States)

    Scott Brothers Windows and Doors (the Company) is located in Bridgeville, Pennsylvania. The settlement involves renovation activities conducted at property constructed prior to 1978, located in Pittsburgh, Pennsylvania.

  3. Windows 7 Annoyances Tips, Secrets, and Solutions

    CERN Document Server

    Karp, David

    2010-01-01

    Windows 7 may be faster and more stable than Vista, but it's a far cry from problem-free. David A. Karp comes to the rescue with the latest in his popular Windows Annoyances series. This thorough guide gives you the tools you need to fix the troublesome parts of this operating system, plus the solutions, hacks, and timesaving tips to make the most of your PC. Streamline Windows Explorer, improve the Search tool, eliminate the Green Ribbon of Death, and tame User Account Control promptsExplore powerful Registry tips and tools, and use them to customize every aspect of Windows and solve its sho

  4. Aerodynamic window for a laser fusion device

    International Nuclear Information System (INIS)

    Masuda, Wataru

    1983-01-01

    Since the window of a laser system absorbs a part of the laser energy, the output power is determined by the characteristics of the window. The use of an aerodynamic window has been studied. The required characteristics are to keep the large pressure difference. An equation of motion of a vortex was presented and analyzed. The operation power of the system was studied. A multi-stage aerodynamic window was proposed to reduce the power. When the jet flow of 0.3 of the Mach number is used, the operation power will be several Megawatt, and the length of an optical path will be about 100 m. (Kato, T.)

  5. Windows 8.1 for dummies

    CERN Document Server

    Rathbone, Andy

    2013-01-01

    The bestselling book on Windows, now updated for the new 8.1 features Microsoft has fine-tuned Windows 8 with some important new features, and veteran author Andy Rathbone explains every one in this all-new edition of a long-time bestseller. Whether you're using Windows for the first time, upgrading from an older version, or just moving from Windows 8 to 8.1, here's what you need to know. Learn about the dual interfaces, the new Start button, how to customize the interface and boot operations, and how to work with programs and files, use the web and social media, manage music and photos, and

  6. Microsoft Windows 7 Administration Instant Reference

    CERN Document Server

    Panek, William

    2010-01-01

    An on-the-spot reference for Windows 7 administrators. Hundreds of thousands of IT administrators, network administrators, and IT support technicians work daily with Windows 7. This well-organized, portable reference covers every facet of Windows 7, providing no-nonsense instruction that is readily accessible when you need it. Designed for busy administrators, it features thumb tabs and chapter outlines to make answers easy to find.: Windows 7 administrative and support personnel need quick answers to situations they confront each day; this Instant Reference is designed to provide information,

  7. Modelling window opening behaviour in Danish dwellings

    DEFF Research Database (Denmark)

    Andersen, Rune Vinther; Olesen, Bjarne W.; Toftum, Jørn

    2011-01-01

    In this paper we present and analyse data from two studies of window opening behaviour in residential buildings in Denmark. Based on measurements of indoor environment, weather and window opening behaviour in 15 dwellings, we propose a model that will predict window opening behaviour. The data...... showed that other factors than thermal effects impact the behaviour of the occupants. Some of these factors were included in the model. We present data from repeated questionnaire surveys that show that occupants tend to adjust heating setpoints, adjust clothing and operate windows when feeling thermally...

  8. Opto-mechanical design of optical window for aero-optics effect simulation instruments

    Science.gov (United States)

    Wang, Guo-ming; Dong, Dengfeng; Zhou, Weihu; Ming, Xing; Zhang, Yan

    2016-10-01

    A complete theory is established for opto-mechanical systems design of the window in this paper, which can make the design more rigorous .There are three steps about the design. First, the universal model of aerodynamic environment is established based on the theory of Computational Fluid Dynamics, and the pneumatic pressure distribution and temperature data of optical window surface is obtained when aircraft flies in 5-30km altitude, 0.5-3Ma speed and 0-30°angle of attack. The temperature and pressure distribution values for the maximum constraint is selected as the initial value of external conditions on the optical window surface. Then, the optical window and mechanical structure are designed, which is also divided into two parts: First, mechanical structure which meet requirements of the security and tightness is designed. Finally, rigorous analysis and evaluation are given about the structure of optics and mechanics we have designed. There are two parts to be analyzed. First, the Fluid-Solid-Heat Coupled Model is given based on finite element analysis. And the deformation of the glass and structure can be obtained by the model, which can assess the feasibility of the designed optical windows and ancillary structure; Second, the new optical surface is fitted by Zernike polynomials according to the deformation of the surface of the optical window, which can evaluate imaging quality impact of spectral camera by the deformation of window.

  9. Temporal integration windows for naturalistic visual sequences.

    Directory of Open Access Journals (Sweden)

    Scott L Fairhall

    Full Text Available There is increasing evidence that the brain possesses mechanisms to integrate incoming sensory information as it unfolds over time-periods of 2-3 seconds. The ubiquity of this mechanism across modalities, tasks, perception and production has led to the proposal that it may underlie our experience of the subjective present. A critical test of this claim is that this phenomenon should be apparent in naturalistic visual experiences. We tested this using movie-clips as a surrogate for our day-to-day experience, temporally scrambling them to require (re- integration within and beyond the hypothesized 2-3 second interval. Two independent experiments demonstrate a step-wise increase in the difficulty to follow stimuli at the hypothesized 2-3 second scrambling condition. Moreover, only this difference could not be accounted for by low-level visual properties. This provides the first evidence that this 2-3 second integration window extends to complex, naturalistic visual sequences more consistent with our experience of the subjective present.

  10. Navigable windows of the Northwest Passage

    Science.gov (United States)

    Liu, Xing-he; Ma, Long; Wang, Jia-yue; Wang, Ye; Wang, Li-na

    2017-09-01

    Artic sea ice loss trends support a greater potential for Arctic shipping. The information of sea ice conditions is important for utilizing Arctic passages. Based on the shipping routes given by ;Arctic Marine Shipping Assessment 2009 Report;, the navigable windows of these routes and the constituent legs were calculated by using sea ice concentration product data from 2006 to 2015, by which a comprehensive knowledge of the sea ice condition of the Northwest Passage was achieved. The results showed that Route 4 (Lancaster Sound - Barrow Strait - Prince Regent Inlet and Bellot Strait - Franklin Strait - Larsen Sound - Victoria Strait - Queen Maud Gulf - Dease Strait - Coronation Gulf - Dolphin and Union Strait - Amundsen Gulf) had the best navigable expectation, Route 2 (Parry Channel - M'Clure Strait) had the worst, and the critical legs affecting the navigation of Northwest Passage were Viscount Melville Sound, Franklin Strait, Victoria Strait, Bellot Strait, M'Clure Strait and Prince of Wales Strait. The shortest navigable period of the routes of Northwest Passage was up to 69 days. The methods used and the results of the study can help the selection and evaluation of Arctic commercial routes.

  11. The Nicest way to migrate your Windows computer ( The Windows 2000 Migration Task Force)

    CERN Document Server

    2001-01-01

    With Windows 2000, CERN users will discover a more stable and reliable working environment and will have access to all the latest applications. The Windows 2000 Migration Task Force - a representative from each division.

  12. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  13. Proactive Security Testing and Fuzzing

    Science.gov (United States)

    Takanen, Ari

    Software is bound to have security critical flaws, and no testing or code auditing can ensure that software is flaw-less. But software security testing requirements have improved radically during the past years, largely due to criticism from security conscious consumers and Enterprise customers. Whereas in the past, security flaws were taken for granted (and patches were quietly and humbly installed), they now are probably one of the most common reasons why people switch vendors or software providers. The maintenance costs from security updates often add to become one of the biggest cost items to large Enterprise users. Fortunately test automation techniques have also improved. Techniques like model-based testing (MBT) enable efficient generation of security tests that reach good confidence levels in discovering zero-day mistakes in software. This technique is called fuzzing.

  14. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  15. Handheld White Light Interferometer for Measuring Defect Depth in Windows

    Science.gov (United States)

    Youngquist, Robert; Simmons, Stephen; Cox, Robert

    2010-01-01

    Accurate quantification of defects (scratches and impacts) is vital to the certification of flight hardware and other critical components. The amount of damage to a particular component contributes to the performance, reliability, and safety of a system, which ultimately affects the success or failure of a mission or test. The launch-commit criteria on a Space Shuttle Orbiter window are governed by the depth of the defects that are identified by a visual inspection. This measurement of a defect is not easy to obtain given the environment, size of the defect, and location of the window(s). The determination of depth has typically been performed by taking a mold impression and measuring the impression with an optical profiling instrument. Another method of obtaining an estimate of the depth is by using a refocus microscope. To use a refocus microscope, the surface of the glass and bottom of the defect are, in turn, brought into focus by the operator. The amount of movement between the two points corresponds to the depth of the defect. The refocus microscope requires a skilled operator and has been proven to be unreliable when used on Orbiter windows. White light interferometry was chosen as a candidate to replace the refocus microscope. The White Light Interferometer (WLI) was developed to replace the refocus microscope as the instrument used for measuring the depth of defects in Orbiter windows. The WLI consists of a broadband illumination source, interferometer, detector, motion control, displacement sensor, mechanical housing, and support electronics. The illumination source for the WLI is typically a visible light emitting diode (LED) or a near-infrared superluminescent diode (SLD) with power levels of less than a milliwatt. The interferometer is a Michelson configuration consisting of a 1-in. (2.5-cm) cube beam splitter, a 0.5-in. (1.3-cm) optical window as a movable leg (used to closely match the return intensity of the fixed leg from the window), and a

  16. Humeral windows in revision total elbow arthroplasty.

    Science.gov (United States)

    Peach, Chris A; Salama, Amir; Stanley, David

    2016-04-01

    The use of cortical windows for revision elbow arthroplasty has not previously been widely reported. Their use aids safe revision of a well fixed humeral prosthesis and can be used in the setting of dislocation, periprosthetic fracture or aseptic loosening of the ulnar component. We describe our technique and results of cortical windows in the distal humerus for revision elbow arthroplasty surgery.

  17. What are windows on language evolution?

    NARCIS (Netherlands)

    Botha, Rudolf

    2008-01-01

    This chapter offers an elucidation of the idea that certain phenomena provide windows on language evolution. Non-metaphorically, such windows are shown to be conceptual constructs used for making inferences about aspects of language evolution from data or assumptions about properties of

  18. Thermal Bridge Effects in Window Grooves

    DEFF Research Database (Denmark)

    Rose, Jørgen

    1997-01-01

    In this report thermal bridge effects in window grooves are analyzed. The analysis is performed using different thicknesses of the window groove insulation, to evaluate what the optimal solution is.All analysis in the report is performed using both 2- and 3-dimensional numerical analysis....

  19. Automatic Water Sensor Window Opening System

    KAUST Repository

    Percher, Michael

    2013-01-01

    A system can automatically open at least one window of a vehicle when the vehicle is being submerged in water. The system can include a water collector and a water sensor, and when the water sensor detects water in the water collector, at least one window of the vehicle opens.

  20. Measure Guideline: Window Repair, Rehabilitation, and Replacement

    Energy Technology Data Exchange (ETDEWEB)

    Baker, P.

    2012-12-01

    This measure guideline provides information and guidance on rehabilitating, retrofitting, and replacing existing window assemblies in residential construction. The intent is to provide information regarding means and methods to improve the energy and comfort performance of existing wood window assemblies in a way that takes into consideration component durability, in-service operation, and long term performance of the strategies.

  1. On the inverse windowed Fourier transform

    OpenAIRE

    Rebollo Neira, Laura; Fernández Rubio, Juan Antonio

    1999-01-01

    The inversion problem concerning the windowed Fourier transform is considered. It is shown that, out of the infinite solutions that the problem admits, the windowed Fourier transform is the "optimal" solution according to a maximum-entropy selection criterion. Peer Reviewed

  2. Automatic Water Sensor Window Opening System

    KAUST Repository

    Percher, Michael

    2013-12-05

    A system can automatically open at least one window of a vehicle when the vehicle is being submerged in water. The system can include a water collector and a water sensor, and when the water sensor detects water in the water collector, at least one window of the vehicle opens.

  3. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  4. Energy Gaining Windows for Residental Buildings

    DEFF Research Database (Denmark)

    Kragh, Jesper; Laustsen, Jacob Birck; Svendsen, Svend

    2008-01-01

    This paper presents some of the research done during the last 8 years at the Technical University of Denmark developing improved low-energy window solutions. The focus has been on maximizing the net energy gain of windows for residential buildings. The net energy gain of windows is the solar gain...... minus the heat loss integrated over the heating season. It is assumed that in northern cold climates all of the solar gain during the heating season can be utilized for space heating. Problems with overheating in the summer period must be solved with overhang or moveable solar shading devices. Two...... and longer durability of the window. The glazing in these fiber reinforced polyester windows is both unsealed and sealed triple glazing units. To increase the net energy gain slim frame profiles have been developed to increase the glazing area and thereby the solar gain. The challenge when developing slim...

  5. Mastering Windows Server 2012 R2

    CERN Document Server

    Minasi, Mark; Booth, Christian; Butler, Robert; McCabe, John; Panek, Robert; Rice, Michael; Roth, Stefan

    2013-01-01

    Check out the new Hyper-V, find new and easier ways to remotely connect back into the office, or learn all about Storage Spaces-these are just a few of the features in Windows Server 2012 R2 that are explained in this updated edition from Windows authority Mark Minasi and a team of Windows Server experts led by Kevin Greene. This book gets you up to speed on all of the new features and functions of Windows Server, and includes real-world scenarios to put them in perspective. If you're a system administrator upgrading to, migrating to, or managing Windows Server 2012 R2, find what you need to

  6. Compact UHV valve with field replaceable windows

    International Nuclear Information System (INIS)

    Johnson, E.D.; Freeman, J.; Powell, F.

    1991-01-01

    There are many applications in synchrotron radiation research where window valves can be usefully employed. Examples include gas cells for monochromator calibration, filters for high order light rejection, and as vacuum isolation elements between machine and experimental vacua. Often these devices are fairly expensive, and have only fixed (ie non-removable) windows. The development of a new type of seal technology by VAT for their series 01 valves provides a gate surface which is free from obstructions due to internal mechanical elements. This feature allows a threaded recess to be machined into the gate to receive a removable window frame which can carry standard size Luxel thin film windows. The combination of these features results in a DN 40 (2.75in. conflat flange) valve which provides a clear aperture of 21mm diameter for the window material. 8 refs., 2 figs

  7. Windows 8 app projects XAML and C#

    CERN Document Server

    Vermeir, Nico

    2013-01-01

    Become a leading Windows 8 app developer by using Windows 8 App Projects - XAML and C# Edition to learn techniques, tools, and ideas to create successful, 5-star apps. Windows 8 App Projects - XAML and C# Edition shows you the nuts and bolts of the Windows 8 development ecosystem. Then, through a series of example driven chapters, you'll discover how to leverage the platform's unique features. With each project, you'll be one step closer to building full-featured, responsive, and well designed apps that feel like they're a part of the operating system. Windows 8 App Projects - XAML and C# Edit

  8. Railway infrastructure security

    CERN Document Server

    Sforza, Antonio; Vittorini, Valeria; Pragliola, Concetta

    2015-01-01

    This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railway infrastructure security. Based on analyses by academics, technology providers, and railway operators, it explains how to assess terrorist and criminal threats, design countermeasures, and implement effective security strategies. In so doing, it draws upon a range of experiences from different countries in Europe and beyond. The book is the first to be devoted entirely to this subject. It will serve as a timely reminder of the attractiveness of the railway infrastructure system as a target for criminals and terrorists and, more importantly, as a valuable resource for stakeholders and professionals in the railway security field aiming to develop effective security based on a mix of methodological, technological, and organizational tools. Besides researchers and decision makers in the field, the book will appeal to students interested in critical infrastructur...

  9. Resilience and (in)security

    DEFF Research Database (Denmark)

    dunn cavelty, myriam; Kaufmann, Mareile; Kristensen, Kristian Søby

    2015-01-01

    , and redefine relations of security and insecurity. We show the increased attention – scholarly as well as political – given to resilience in recent times and provide a review of the state of critical security studies literature on resilience. We argue that to advance this discussion, resilience needs...

  10. Health Security and Risk Aversion.

    Science.gov (United States)

    Herington, Jonathan

    2016-09-01

    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (i) that security is intrinsically valuable, (ii) that it is necessary for social planning and (iii) that it is an appropriate response to decision-making in contexts of very limited information. Striking the right balance between securing and maximizing population health thus requires a substantive, and hitherto unrecognized, value judgment. Finally, I critically evaluate the current health security agenda in light of this new account of the concept and its relationship to the other aims of public health policy. © 2016 John Wiley & Sons Ltd.

  11. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  12. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security

    National Research Council Canada - National Science Library

    Ganger, Gregory

    2000-01-01

    This report contains the technical content of a recent funding proposal. In it, we propose a new approach to network security in which each individual device erects its own security perimeter and defends its own critical resources...

  13. Focal plane scanner with reciprocating spatial window

    Science.gov (United States)

    Mao, Chengye (Inventor)

    2000-01-01

    A focal plane scanner having a front objective lens, a spatial window for selectively passing a portion of the image therethrough, and a CCD array for receiving the passed portion of the image. All embodiments have a common feature whereby the spatial window and CCD array are mounted for simultaneous relative reciprocating movement with respect to the front objective lens, and the spatial window is mounted within the focal plane of the front objective. In a first embodiment, the spatial window is a slit and the CCD array is one-dimensional, and successive rows of the image in the focal plane of the front objective lens are passed to the CCD array by an image relay lens interposed between the slit and the CCD array. In a second embodiment, the spatial window is a slit, the CCD array is two-dimensional, and a prism-grating-prism optical spectrometer is interposed between the slit and the CCD array so as to cause the scanned row to be split into a plurality of spectral separations onto the CCD array. In a third embodiment, the CCD array is two-dimensional and the spatial window is a rectangular linear variable filter (LVF) window, so as to cause the scanned rows impinging on the LVF to be bandpass filtered into spectral components onto the CCD array through an image relay lens interposed between the LVF and the CCD array.

  14. AN INTRODUCTION TO WINDOWS 2000 AT CERN

    CERN Document Server

    2001-01-01

    A demonstration of the new supported Windows environment for all the CERN personal computers (PC) will be given which is based on Windows 2000. This presentation will assume little or no familiarity with the PC, or NICE, and will concentrate on the services being offered to the users of PCs at CERN. How NICE 2000 can facilitate the work of all users, eventually becoming the key access point to all activities in the laboratory will be demonstrated. Date Title Language Location Speaker Fri 1/6 10:00 Une introduction à Windows 2000 au CERN F IT Auditorium (31/3-004) Alberto Pace Tue 5/6 10:00 Une introduction à Windows 2000 au CERN F LHC Auditorium (30/7th floor) Frederic Hemmer Tue 5/6 14:00 Une introduction à Windows 2000 au CERN F SL Auditorium (864/1s floor) Michel Bornand Tue 5/6 14:00 An introduction to Windows 2000 at CERN E IT Auditorium (31/3-004) Andreas Wagner Wed 6/6 14:00 Une introduction à Windows 2000 au CERN F SL ...

  15. Malware Forensics Field Guide for Windows Systems Digital Forensics Field Guides

    CERN Document Server

    Malin, Cameron H; Aquilina, James M

    2010-01-01

    Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, Malware Forensics Field Guide for Windows Systems is a "tool" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. *A condensed hand-held guide complete with on-the-job tasks and checklists *Specific for Windows-based systems, the largest running OS in the world

  16. Teach yourself visually Windows 8 tablets

    CERN Document Server

    McFedries, Paul

    2012-01-01

    A visual guide to all the features of the new Windows 8 Tablet This must-have resource features visually rich, step-by-step instructions that show you how to get the most enjoyment from your Windows 8 tablet. Learn about the exciting new Metro UI, optimized specifically for touch devices. The most popular and commonly used apps and functions are covered too, along with the basics of syncing with a network, setting up e-mail, watching videos, listening to music, and common productivity tasks. This book provides all the guidance needed to enjoy all the best the new Windows 8 tablets have to offe

  17. Window Shopping, Granada, 1930s”

    Directory of Open Access Journals (Sweden)

    Mae Claxton

    2010-02-01

    Full Text Available “Window Shopping, Granada, 1930s,” Photographs, p. 16, with the gracious permission of the Eudora Welty FoundationAn African American woman, dressed in her Saturday go-to-town-best, stands outside a store window, chin in hand, contemplating the contents in the window. The image is reflective and thoughtful. What is she thinking? And what lies beyond the frame of this photograph? In Mississippi in the 1930s, could she walk into this store, perhaps try on clothes or hats, and make a purchase? I...

  18. Conceptual design of proton beam window

    International Nuclear Information System (INIS)

    Teraoku, Takuji; Kaminaga, Masanori; Terada, Atsuhiko; Ishikura, Syuichi; Kinoshita, Hidetaka; Hino, Ryutaro

    2001-01-01

    In a MW-scale neutron scattering facility coupled with a high-intensity proton accelerator, a proton beam window is installed as the boundary between a high vacuum region of the proton beam transport line and a helium environment around the target assembly working as a neutron source. The window is cooled by water so as to remove high volumetric heat generated by the proton beam. A concept of the flat-type proton beam window consisting of two plates of 3 mm thick was proposed, which was found to be feasible under the proton beam power of 5 MW through thermal-hydraulic and structural strength analyses. (authors)

  19. CSS for Windows 8 app development

    CERN Document Server

    Foster, Jeremy

    2013-01-01

    CSS for Windows 8 App Development is your learning guide for CSS - the language of great Windows 8-style apps. Learn the built-in styles that make the built-in controls shine, how to define them, and how to use CSS to give your custom app assets that beautiful Modern UI style. CSS (Cascading Style Sheets) is the clear standard for styling web applications, and with HTML, CSS, and JavaScript now powering apps on Windows 8, it's the clear standard there as well. CSS is a powerful styling and layout language that greatly simplifies the selection of page elements and their visual display, layout,

  20. Managing customer arrivals with time windows

    DEFF Research Database (Denmark)

    Chen, Gang; Jiang, Liping

    2016-01-01

    Due to increasing container traffic and mega-ships, many seaports face challenges of huge amounts of truck arrivals and congestion problem at terminal gates, which affect port efficiency and generate serious air pollution. To solve this congestion problem, we propose a solution of managing truck...... arrivals with time windows based on the truck-vessel service relationship, specifically trucks delivering containers for the same vessel share one common time window. Time windows can be optimized with different strategies. In this paper, we first propose a framework for installing this solution...

  1. Windows 8 & Office 2010 for dummies

    CERN Document Server

    Rathbone, Andy

    2012-01-01

    Two complete e-books covering Windows and Office for one low price! This unique value-priced e-book set brings together two bestselling For Dummies books in a single e-book file. Including a comprehensive table of contents and the full text of each book, complete with cover, this e-book set gives you in-depth information on the leading PC productivity tools: Windows 8 and Office 2010. Best of all, you'll pay less than the cost of each book purchased separately. You'll get the complete text of: Windows 8 For Dummies, which covers The core component

  2. A Memristor Model with Piecewise Window Function

    Directory of Open Access Journals (Sweden)

    J. Yu

    2013-12-01

    Full Text Available In this paper, we present a memristor model with piecewise window function, which is continuously differentiable and consists of three nonlinear pieces. By introducing two parameters, the shape of this window function can be flexibly adjusted to model different types of memristors. Using this model, one can easily obtain an expression of memristance depending on charge, from which the numerical value of memristance can be readily calculated for any given charge, and eliminate the error occurring in the simulation of some existing window function models.

  3. Prototype solid-state electrochromic window devices

    International Nuclear Information System (INIS)

    Dao, L.H.; Nguyen, M.T.

    1989-01-01

    This paper discusses electrochromic smart windows which are prospective devices for the control of light transmission in response to the variation of brightness of the environment. The fabrication of electrochromic windows based on cathodically coloring transition metal oxides and anodically coloring conducting polymers are described. The device consists of gel or glassy polymer electrolytes sandwiches by a pair of transparent conducting glass coated respectively with a thin film of WO 3 or MoO 3 prepared by electrodeposition, and with a thin film of ploy(aniline) derivatives obtained by electropolymerization or solution casting. The electrochromic properties of the five-layer smart window devices are presented

  4. Microsoft Windows Server 2012 administration instant reference

    CERN Document Server

    Hester, Matthew

    2013-01-01

    Fast, accurate answers for common Windows Server questions Serving as a perfect companion to all Windows Server books, this reference provides you with quick and easily searchable solutions to day-to-day challenges of Microsoft's newest version of Windows Server. Using helpful design features such as thumb tabs, tables of contents, and special heading treatments, this resource boasts a smooth and seamless approach to finding information. Plus, quick-reference tables and lists provide additional on-the-spot answers. Covers such key topics as server roles and functionality, u

  5. Time Modeling: Salvatore Sciarrino, Windows and Beclouding

    Directory of Open Access Journals (Sweden)

    Acácio Tadeu de Camargo Piedade

    2017-08-01

    Full Text Available In this article I intend to discuss one of the figures created by the Italian composer Salvatore Sciarrino: the windowed form. After the composer's explanation of this figure, I argue that windows in composition can open inwards and outwards the musical discourse. On one side, they point to the composition's inner ambiences and constitute an internal remission. On the other, they instigate the audience to comprehend the external reference, thereby constructing intertextuality. After the outward window form, I will consider some techniques of distortion, particularly one that I call beclouding. To conclude, I will comment the question of memory and of compostition as time modeling.

  6. Integral window/photon beam position monitor and beam flux detectors for x-ray beams

    Science.gov (United States)

    Shu, Deming; Kuzay, Tuncer M.

    1995-01-01

    A monitor/detector assembly in a synchrotron for either monitoring the position of a photon beam or detecting beam flux may additionally function as a vacuum barrier between the front end and downstream segment of the beamline in the synchrotron. A base flange of the monitor/detector assembly is formed of oxygen free copper with a central opening covered by a window foil that is fused thereon. The window foil is made of man-made materials, such as chemical vapor deposition diamond or cubic boron nitrate and in certain configurations includes a central opening through which the beams are transmitted. Sensors of low atomic number materials, such as aluminum or beryllium, are laid on the window foil. The configuration of the sensors on the window foil may be varied depending on the function to be performed. A contact plate of insulating material, such as aluminum oxide, is secured to the base flange and is thereby clamped against the sensor on the window foil. The sensor is coupled to external electronic signal processing devices via a gold or silver lead printed onto the contact plate and a copper post screw or alternatively via a copper screw and a copper spring that can be inserted through the contact plate and coupled to the sensors. In an alternate embodiment of the monitor/detector assembly, the sensors are sandwiched between the window foil of chemical vapor deposition diamond or cubic boron nitrate and a front foil made of similar material.

  7. Extension of the DIRAC workload management system to allow use of distributed windows resources

    International Nuclear Information System (INIS)

    Li, Y Y; Harrison, K; Parker, M A; Lyutsarev, V; Tsaregorodtsev, A

    2008-01-01

    The DIRAC Workload Management System of the LHCb experiment allows coordinated use of globally distributed computing power and data storage. The system was initially deployed on the Linux platforms, where it has been used very successfully both for collaboration-wide production activities and for single-user physics studies. To increase the resources available to LHCb, DIRAC has been extended so that it also allows use of Microsoft Windows machines. As DIRAC is mostly written in Python, a large part of the code base was already platform independent, but Windows-specific solutions have had to be found in areas such as certificate-based authentication and secure file transfers, where .NetGridFTP has been used. In addition, new code has been written to deal with the way that jobs are run and monitored under Windows, enabling interaction with Microsoft Windows Compute Cluster Server 2003 on sets of machines were this is available. The result is a system that allows users transparent access to Linux and Windows distributed resources. This paper gives details of the Windows-specific developments for DIRAC; outlines the experience gained in deploying the system at a number of sites, and reports on the performance achieved running the LHCb data-processing applications

  8. The impact of windows and daylight on acute-care nurses' physiological, psychological, and behavioral health.

    Science.gov (United States)

    Zadeh, Rana Sagha; Shepley, Mardelle McCuskey; Williams, Gary; Chung, Susan Sung Eun

    2014-01-01

    To investigate the physiological and psychological effects of windows and daylight on registered nurses. To date, evidence has indicated that appropriate environmental lighting with characteristics similar to natural light can improve mood, alertness, and performance. The restorative effects of windows also have been documented. Hospital workspaces generally lack windows and daylight, and the impact of the lack of windows and daylight on healthcare employees' well being has not been thoroughly investigated. Data were collected using multiple methods with a quasi-experimental approach (i.e., biological measurements, behavioral mapping, and analysis of archival data) in an acute-care nursing unit with two wards that have similar environmental and organizational conditions, and similar patient populations and acuity, but different availability of windows in the nursing stations. Findings indicated that blood pressure (p windows and daylight. A possible micro-restorative effect of windows and daylight may result in lowered blood pressure and increased oxygen saturation and a positive effect on circadian rhythms (as suggested by body temperature) and morning sleepiness. Critical care/intensive care, lighting, nursing, quality care, work environment.

  9. Windows of sensitivity to toxic chemicals in the motor effects development.

    Science.gov (United States)

    Ingber, Susan Z; Pohl, Hana R

    2016-02-01

    Many chemicals currently used are known to elicit nervous system effects. In addition, approximately 2000 new chemicals introduced annually have not yet undergone neurotoxicity testing. This review concentrated on motor development effects associated with exposure to environmental neurotoxicants to help identify critical windows of exposure and begin to assess data needs based on a subset of chemicals thoroughly reviewed by the Agency for Toxic Substances and Disease Registry (ATSDR) in Toxicological Profiles and Addenda. Multiple windows of sensitivity were identified that differed based on the maturity level of the neurological system at the time of exposure, as well as dose and exposure duration. Similar but distinct windows were found for both motor activity (GD 8-17 [rats], GD 12-14 and PND 3-10 [mice]) and motor function performance (insufficient data for rats, GD 12-17 [mice]). Identifying specific windows of sensitivity in animal studies was hampered by study designs oriented towards detection of neurotoxicity that occurred at any time throughout the developmental process. In conclusion, while this investigation identified some critical exposure windows for motor development effects, it demonstrates a need for more acute duration exposure studies based on neurodevelopmental windows, particularly during the exposure periods identified in this review. Published by Elsevier Inc.

  10. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  11. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  12. Cyber Security Analysis of Turkey

    OpenAIRE

    Senturk, Hakan; Çil, Zaim; Sağıroğlu, Şeref

    2016-01-01

    Considering the criticality of the cyber security threat in the 21st century, it is presumed that the nations are busy with series of activities in order to protect their security in the cyber space domain. In this paper, in light of the recent developments in the cyber security field, Turkey’s cyber security analysis is performed using a macro analysis model. We researched for the measures taken in Turkey with respect to those in the other countries, reviewed the posture, the activities and ...

  13. Audit for Information Systems Security

    Directory of Open Access Journals (Sweden)

    Ana-Maria SUDUC

    2010-01-01

    Full Text Available The information and communication technologies advances made available enormous and vast amounts of information. This availability generates also significant risks to computer systems, information and to the critical operations and infrastructures they support. In spite of significant advances in the information security area many information systems are still vulnerable to inside or outside attacks. The existence of an internal audit for information system security increases the probability of adopting adequate security measures and preventing these attacks or lowering the negative consequences. The paper presents an exploratory study on informatics audit for information systems security.

  14. Window selection for dual photopeak window scatter correction in Tc-99m imaging

    International Nuclear Information System (INIS)

    Vries, D.J. de; King, M.A.

    1994-01-01

    The width and placement of the windows for the dual photopeak window (DPW) scatter subtraction method for Tc-99m imaging is investigated in order to obtain a method that is stable on a multihead detector system for single photon emission computed tomography (SPECT) and is capable of providing a good scatter estimate for extended objects. For various window pairs, stability and noise were examined with experiments using a SPECT system, while Monte Carlo simulations were used to predict the accuracy of scatter estimates for a variety of objects and to guide the development of regression relations for various window pairs. The DPW method that resulted from this study was implemented with a symmetric 20% photopeak window composed of a 15% asymmetric photopeak window and a 5% lower window abutted at 7 keV below the peak. A power function regression was used to relate the scatter-to-total ratio to the lower window-to-total ratio at each pixel, from which an estimated scatter image was calculated. DPW demonstrated good stability, achieved by abutting the two windows away from the peak. Performance was assessed and compared with Compton window subtraction (CWS). For simulated extended objects, DPW generally produced a less biased scatter estimate than the commonly used CWS method with k = 0.5. In acquisitions of a clinical SPECT phantom, contrast recovery was comparable for both DPW and CWS; however, DPW showed greater visual contrast in clinical SPECT bone studies

  15. Fermi and nuclear security

    International Nuclear Information System (INIS)

    Alcober Bosch, V.

    2003-01-01

    Following the scientific life of Fermi the article reviews the historical evolution of nuclear security from the base of the first system foreseen for the CP-1 critical pile, which made it possible to demonstrate self-sustaining fission reaction, until the mid-fifties by which time the subsequent importance of this concept was perceived. Technological advances have gone hand in hand with the development of the concept of security, and have become a further point to be taken into account in any nuclear installation, and which Fermi always kept in mind during his professional life. (Author) 12 refs

  16. Upstate Windows and Exteriors Information Sheet

    Science.gov (United States)

    Upstate Windows and Exteriors (the Company) is located in Greenville, South Carolina. The settlement involves renovation activities conducted at properties constructed prior to 1978, located in Greenville and Easley, South Carolina.

  17. UV conformal window for asymptotic safety

    Science.gov (United States)

    Bond, Andrew D.; Litim, Daniel F.; Vazquez, Gustavo Medina; Steudtner, Tom

    2018-02-01

    Interacting fixed points in four-dimensional gauge theories coupled to matter are investigated using perturbation theory up to three loop order. It is shown how fixed points, scaling exponents, and anomalous dimensions are obtained as a systematic power series in a small parameter. The underlying ordering principle is explained and contrasted with conventional perturbation theory and Weyl consistency conditions. We then determine the conformal window with asymptotic safety from the complete next-to-next-to-leading order in perturbation theory. Limits for the conformal window arise due to fixed point mergers, the onset of strong coupling, or vacuum instability. A consistent picture is uncovered by comparing various levels of approximation. The theory remains perturbative in the entire conformal window, with vacuum stability dictating the tightest constraints. We also speculate about a secondary conformal window at strong coupling and estimate its lower limit. Implications for model building and cosmology are indicated.

  18. Microsoft Windows 2000 Router Configuration Guide

    National Research Council Canada - National Science Library

    Richburg, Florence

    2001-01-01

    The purpose of this guide is to provide technical guidance to network administrators of small to medium size networks in the configuration and integration of Microsoft Windows 2000 Server Router features...

  19. Microsoft Windows 2000 Network Architecture Guide

    National Research Council Canada - National Science Library

    Bartock, Paul

    2000-01-01

    The purpose of this guide is to inform the reader about the services that are available in the Microsoft Windows 2000 environment and how to integrate these services into their network architecture...

  20. Characteristics of Air Flow through Windows

    DEFF Research Database (Denmark)

    Heiselberg, Per; Dam, Henrik; Sørensen, Lars C.

    This paper describes the first results of a series of laboratory investigations that is performed to characterise three different window types. The results show the air flow conditions for different ventilation strategies and temperature differences. For one of the windows values of the discharge...... coefficient are shown for both isothermal and non-isothermal flow conditions and the thermal comfort conditions are evaluated by measurements of velocity and temperature levels in the air flow in the occupied zone.......This paper describes the first results of a series of laboratory investigations that is performed to characterise three different window types. The results show the air flow conditions for different ventilation strategies and temperature differences. For one of the windows values of the discharge...

  1. Translational nanomedicine--through the therapeutic window.

    Science.gov (United States)

    Pierce, Robin L

    2015-01-01

    Translational nanomedicine occurs only through the successful integration of multiple inputs and iterative modifications. The therapeutic window plays a pivotal role in the trajectory of translational nanomedicine. Often defined in terms of the range of dosage for safe and effective therapeutic effect, a second definition of the therapeutic window refers to the often narrow temporal window in which a therapeutic effect can be obtained. Expanding the second definition to explicitly include the spatial dimension, this article explores aspects of the therapeutic spaces created by nanomedicine that shift the traditional dimensions of symptom, sign and pathology. This article analyzes three aspects of the therapeutic window in nanomedicine - temporal, spatial and manner of construction and their impact on the dimensions of modern medicine.

  2. The lateral infratrigeminal transpontine window to deep pontine lesions.

    Science.gov (United States)

    Ferroli, Paolo; Schiariti, Marco; Cordella, Roberto; Boffano, Carlo; Nava, Simone; La Corte, Emanuele; Cavallo, Claudio; Bauer, Dario; Castiglione, Melina; Broggi, Morgan; Acerbi, Francesco; Broggi, Giovanni

    2015-09-01

    Surgery of brainstem lesions is increasingly performed despite the fact that surgical indications and techniques continue to be debated. The deep pons, in particular, continues to be a critical area in which the specific risks related to different surgical strategies continue to be examined. With the intention of bringing new knowledge into this important arena, the authors systematically examined the results of brainstem surgeries that have been performed through the lateral infratrigeminal transpontine window. Between 1990 and 2013, 29 consecutive patients underwent surgery through this window for either biopsy sampling or for removal of a deep pontine lesion. All of this work was performed at the Department of Neurosurgery of the Istituto Nazionale Neurologico "Carlo Besta", in Milan, Italy. A retrospective analysis of the findings was conducted with the intention of bringing further clarity to this important surgical strategy. The lateral infratrigeminal transpontine window was exposed through 4 different approaches: 1) classic retrosigmoid (15 cases), 2) minimally invasive keyhole retrosigmoid (10 cases), 3) translabyrinthine (1 case), and 4) combined petrosal (3 cases). No deaths occurred during the entire clinical study. The surgical complications that were observed included hydrocephalus (2 cases) and CSF leakage (1 case). In 6 (20.7%) of 29 patients the authors encountered new neurological deficits during the immediate postoperative period. All 6 of these patients had undergone lesion removal. In only 2 of these 6 patients were permanent sequelae observed at 3 months follow-up. These findings show that 93% of the patients studied did not report any permanent worsening of their neurological condition after this surgical intervention. This retrospective study supports the idea that the lateral infratrigeminal transpontine window is both a low-risk and safe corridor for either biopsy sampling or for removal of deep pontine lesions.

  3. Cascaded Window Memoization for Medical Imaging

    OpenAIRE

    Khalvati , Farzad; Kianpour , Mehdi; Tizhoosh , Hamid ,

    2011-01-01

    Part 12: Medical Applications of ANN and Ethics of AI; International audience; Window Memoization is a performance improvement technique for image processing algorithms. It is based on removing computational redundancy in an algorithm applied to a single image, which is inherited from data redundancy in the image. The technique employs a fuzzy reuse mechanism to eliminate unnecessary computations. This paper extends the window memoization technique such that in addition to exploiting the data...

  4. Windows in Low Energy Houses. Size Matters

    Energy Technology Data Exchange (ETDEWEB)

    Persson, Mari-Louise

    2004-06-01

    A generally accepted way of building passive houses has been to have small windows facing north and a large glass facade to the south. This is to minimize losses on the north side while gaining as much solar heat as possible on the south. In spring 2001, twenty terraced houses were built outside Goeteborg partly in this way. The indoor temperature is kept at a comfortable level by passive methods, using solar gains and internal gains from household appliances and occupants. Heat losses are very low, since the building envelope is well insulated and since modern coated triple-glazed windows have been installed. The purpose of this work is to investigate how decreasing the window size facing south and increasing the window size facing north in low energy houses will influence the energy consumption and maximum power needed to keep the indoor temperature between 23 and 26 deg C. Different climates and orientations have been investigated and so have the influence of occupancy and window type. A dynamic building simulation tool, DEROB, has been used and the simulations indicate an extremely low energy demand for the houses. The results show that the size of the energy efficient windows does not have a major influence on the heating demand in winter, but is of relevant signification looking at the cooling need in summer. This indicates that instead of the traditional technique of building passive houses it is possible to enlarge the window area facing north and get better lighting conditions. To decrease the energy need for cooling, there is an optimal window size facing south that is smaller than the original size of the investigated buildings.

  5. Information Security Service Branding – beyond information security awareness

    Directory of Open Access Journals (Sweden)

    Rahul Rastogi

    2012-12-01

    Full Text Available End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of information security in the organization and exhibit non-compliance. In order to improve compliance levels, it is vital to improve the image of information security in the minds of end-users. This paper borrows the concepts of brands and branding from the domain of marketing to achieve this objective and applies these concepts to information security. The paper also describes a process for creating the information security service brand in the organization.

  6. AN INTRODUCTION TO WINDOWS 2000 AT CERN

    CERN Multimedia

    2001-01-01

    A demonstration of the new supported Windows environment for all the CERN personal computers (PC) will be given which is based on Windows 2000. This presentation will assume little or no familiarity with the PC, or NICE, and will concentrate on the services being offered to the users of PCs at CERN. How NICE 2000 can facilitate the work of all users, eventually becoming the key access point to all activities in the laboratory will be demonstrated. Information: http://winservices.web.cern.ch/winservices/Seminars/Tutorials/ Date Title Language Location Speaker Fri 1/6 10:00 Une introduction à Windows 2000 au CERN F IT Auditorium (31/3-004) Alberto Pace Tue 5/6 10:00 Une introduction à Windows 2000 au CERN F LHC Auditorium (30/7th floor) Frederic Hemmer Tue 5/6 14:00 Une introduction à Windows 2000 au CERN F SL Auditorium (864/1s floor) Michel Bornand Tue 5/6 14:00 An introduction to Windows 2000 at CERN E IT Auditorium (31/3-004) Andreas Wagner ...

  7. Window Size Impact in Human Activity Recognition

    Directory of Open Access Journals (Sweden)

    Oresti Banos

    2014-04-01

    Full Text Available Signal segmentation is a crucial stage in the activity recognition process; however, this has been rarely and vaguely characterized so far. Windowing approaches are normally used for segmentation, but no clear consensus exists on which window size should be preferably employed. In fact, most designs normally rely on figures used in previous works, but with no strict studies that support them. Intuitively, decreasing the window size allows for a faster activity detection, as well as reduced resources and energy needs. On the contrary, large data windows are normally considered for the recognition of complex activities. In this work, we present an extensive study to fairly characterize the windowing procedure, to determine its impact within the activity recognition process and to help clarify some of the habitual assumptions made during the recognition system design. To that end, some of the most widely used activity recognition procedures are evaluated for a wide range of window sizes and activities. From the evaluation, the interval 1–2 s proves to provide the best trade-off between recognition speed and accuracy. The study, specifically intended for on-body activity recognition systems, further provides designers with a set of guidelines devised to facilitate the system definition and configuration according to the particular application requirements and target activities.

  8. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  9. Metabolomics window into diabetic complications.

    Science.gov (United States)

    Wu, Tao; Qiao, Shuxuan; Shi, Chenze; Wang, Shuya; Ji, Guang

    2018-03-01

    Diabetes has become a major global health problem. The elucidation of characteristic metabolic alterations during the diabetic progression is critical for better understanding its pathogenesis, and identifying potential biomarkers and drug targets. Metabolomics is a promising tool to reveal the metabolic changes and the underlying mechanism involved in the pathogenesis of diabetic complications. The present review provides an update on the application of metabolomics in diabetic complications, including diabetic coronary artery disease, diabetic nephropathy, diabetic retinopathy and diabetic neuropathy, and this review provides notes on the prevention and prediction of diabetic complications. © 2017 The Authors. Journal of Diabetes Investigation published by Asian Association for the Study of Diabetes (AASD) and John Wiley & Sons Australia, Ltd.

  10. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  11. Lemnos Interoperable Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Stewart, John [Tennessee Valley Authority, Knoxville, TN (United States); Halbgewachs, Ron [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Chavez, Adrian [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Smith, Rhett [Schweitzer Engineering Laboratories, Chattanooga, TN (United States); Teumim, David [Teumim Technical, Allentown, PA (United States)

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  12. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  13. Designing for Windows 8 fundamentals of great design in Windows Store apps

    CERN Document Server

    Schooley, Brent

    2013-01-01

    Designing for Windows 8 is a fast-paced, 150-page primer on the key design concepts you need to create successful Windows 8 apps. This book will help you design a user interface that is both delightful and effective, feels 'right' to your users, and encapsulates a great Windows 8 experience. In this book, you will: Meet the building blocks of solid Windows 8 UI design in a well-designed sample app. Learn how to incorporate key design elements into your apps, such as the app bar, charms and subtle animations from the animation library. Find out how to deliver the core experience that your users

  14. Transforming the market for residential windows: design considerations for DOE's Efficient Window Collaborative

    Energy Technology Data Exchange (ETDEWEB)

    Eto, J.; Arasteh, D.; Selkowitz, S.

    1998-08-01

    Market adoption of recent, commercially available technological advances that improve the energy performance of windows will lead to immediate economic and energy savings benefits to the nation. This paper is a scoping study intended to inform the design of a major DOE initiative to accelerate market adoption of these windows in the residential sector. We describe the structure of the US residential window market and the interests of the various market players. We then briefly review five recent market transformation initiatives. Finally, we summarize our findings in a list of considerations we believe will be important for the DOE's initiative to transform the US residential window market.

  15. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  16. From spotting - to sustaining the window of opportunity

    DEFF Research Database (Denmark)

    Knudsen, Henrik; Lindgren, Peter

    2006-01-01

    Modern societies are increasingly dependent on entrepreneurship and innovation to develop their competitiveness and wealth. In the agenda for today's development of the competence of innovation and entrepreneurship is paramount and this is also one major objective for the educational sector...... business to the entrepreneur should be given greater focus. The educational system must secure unique sustainable capabilities and ideas in the entrepreneurs business otherwise the society and the entrepreneurs will only stay shortly in business (Knudsen & Lindgren, 2004). However, there is relative little...... in the literature on the sustainable innovation and entrepreneurship. The question being, how can entrepreneurs articulate and embed innovation and entrepreneurship into sustainable businesses accompanying customers innovation process and become leaders of the customers innovation process - sustaining the window...

  17. Cyber Security: Critical Infrastructure Controls Assessment Framework

    Science.gov (United States)

    2011-05-01

    the threats to and 3 • Patch and configuration management • Vulnerability and incident t 2 vulnerabilities • Recommendations to reduce 4 managemen 5... Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other...unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 Purpose P id i t hrov e an overv ew on assessmen

  18. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  19. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  20. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  1. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  2. CriticalEd

    DEFF Research Database (Denmark)

    Kjellberg, Caspar Mølholt; Meredith, David

    2014-01-01

    . Since the comments are not input sequentially, with regard to position, but in arbitrary order, this list must be sorted by copy/pasting the rows into place—an error-prone and time-consuming process. Scholars who produce critical editions typically use off-the-shelf music notation software......The best text method is commonly applied among music scholars engaged in producing critical editions. In this method, a comment list is compiled, consisting of variant readings and editorial emendations. This list is maintained by inserting the comments into a document as the changes are made......, consisting of a Sibelius plug-in, a cross-platform application, called CriticalEd, and a REST-based solution, which handles data storage/retrieval. A prototype has been tested at the Danish Centre for Music Publication, and the results suggest that the system could greatly improve the efficiency...

  3. A continuous wave RF vacuum window

    International Nuclear Information System (INIS)

    Walton, R.

    1999-09-01

    An essential part of an ICRF system to be used in fusion reactor is the RF window. This is fitted in a coaxial transmission line. It forms a vacuum and tritium boundary between the antenna, situated inside the machine, and the transmission line, which feeds it. A double window is required with a vacuum inter-space. The dielectric, which forms the vacuum boundary, must be brazed into its housing. The window must be of a robust construction, and capable of withstanding both axial and radial loads. The vacuum boundaries should be thick walled in order act as a suitable tritium barrier. A further requirement is that the window is capable of continuous operation. The design of such a window is presented below. A half scale prototype has been manufactured, which has successfully completed RF, vacuum, and mechanical testing at JET, but has no water cooling, which is a requirement for continuous operation. The design presented here is for a window to match the existing 30 Ω main transmission lines at JET. It employs two opposed ceramic dielectric cones with a much increased angle of incidence compared with existing JET windows. The housing is machined from titanium. Small corona rings are used, and the tracking distance along the ceramic surface is large. The geometry minimizes the peak electric field strength. The design uses substantial pre-stressing during manufacture, to produce a compressive stress field throughout the dielectric material. Significant tensile stresses in the ceramic, and therefore the possibility of fracture due to applied thermal and mechanical loading, are eliminated in this way. A full-scale actively cooled RF window using this basic design should be capable of continuous use at 50 kV in the 20 - 90 MHz range. A half scale, inertially cooled prototype window has been designed, built and tested successfully at JET to 48 kV for up to 20 seconds. The prototype uses alumina for the dielectric, whereas beryllia is more appropriate for continuous

  4. Low-E Storm Windows Gain Acceptance as a Home Weatherization Measure

    Energy Technology Data Exchange (ETDEWEB)

    Gilbride, Theresa L.; Cort, Katherine A.

    2016-05-16

    This article for Home Energy Magazine describes work by the U.S. Department of Energy to develop low-emissivity storm windows as an energy efficiency-retrofit option for existing homes. The article describes the low-emissivity invisible silver metal coatings on the glass, which reflect heat back into the home in winter or back outside in summer and the benefits of low-e storm windows including insulation, air sealing, noise blocking, protection of antique windows, etc. The article also describes Pacific Northwest National Laboratory's efforts on behalf of DOE to overcome market barriers to adoption of the technology, including performance validation studies in the PNNL Lab Homes, cost effectiveness analysis, production of reports, brochures, how-to guides on low-e storm window installation for the Building America Solution Center, and a video posted on YouTube. PNNL's efforts were reviewed by the Pacific Northwest Regional Technical Forum (RTF), which serves as the advisory board to the Pacific Northwest Electric Power Planning Council and Bonneville Power Administration. In late July 2015, the RTF approved the low-e storm window measure’s savings and specifications, a critical step in integrating low-e storm windows into energy-efficiency planning and utility weatherization and incentive programs. PNNL estimates that more than 90 million homes in the United States with single-pane or low-performing double-pane windows would benefit from the technology. Low-e storm windows are suitable not only for private residences but also for small commercial buildings, historic properties, and facilities that house residents, such as nursing homes, dormitories, and in-patient facilities. To further assist in the market transformation of low-e storm windows and other high-efficiency window attachments, DOE helped found the window Attachment Energy Rating Council (AERC) in 2015. AERC is an independent, public interest, non-profit organization whose mission is to rate

  5. VIS-IR transmitting BGG glass windows

    Science.gov (United States)

    Bayya, Shyam S.; Chin, Geoff D.; Sanghera, Jasbinder S.; Aggarwal, Ishwar D.

    2003-09-01

    BaO-Ga2O3-GeO2 (BGG) glasses have the desired properties for various window applications in the 0.5-5 μm wavelength region. These glasses are low cost alternatives to the currently used window materials. Fabrication of a high optical quality 18" diameter BGG glass window has been demonstrated with a transmitted wave front error of λ/10 at 632 nm. BGG substrates have also been successfully tested for environmental weatherability (MIL-F-48616) and rain erosion durability up to 300 mph. Preliminary EMI grids have been successfully applied on BGG glasses demonstrating attenuation of 20dB in X and Ku bands. Although the mechanical properties of BGG glasses are acceptable for various window applications, it is demonstrated here that the properties can be further improved significantly by the glassceramization process. The ceramization process does not add any significant cost to the final window material. The crystallite size in the present glass-ceramic limits its transmission to the 2-5 μm region.

  6. Optimising window parameters for energy efficiency

    Energy Technology Data Exchange (ETDEWEB)

    Boland, J. [South Australia Univ., Adelaide, SA (Australia); Luther, M. [Deakin Univ., Geelong, VIC (Australia)

    1996-12-31

    Large north facing windows act a solar collectors, with the heat being stored in the building mass and being released later in the day. This study examines one of the elements of this paradigm, that increasing the size of equatorially facing windows necessarily improves the energy efficiency of a dwelling. This question and that of whether there is a case for using double glazing in Australia were examined for a number of locations ranging from cool temperate to warm temperate and for several types of construction from lightweight to heavyweight. Simulations were performed using the modelling tool Cheetah. It was found that the optimal window size on equatorially facing walls was smaller than expected for singly glazed windows. Double glazing was found to be effective in most situations and increased the optimum size of the window substantially. Changing the operational pattern of the house (specifically when cooling equipment may be employed) considerably affects conclusions about single and double glazing. (author). 3 tabs., 3 figs., 13 refs.

  7. Optimising the performance of the window

    Energy Technology Data Exchange (ETDEWEB)

    Luther, M.B. [Deakin Univ., Geelong, VIC (Australia); Boland, J. [South Australia Univ., Adelaide, SA (Australia)

    1996-12-31

    Glass is a versatile material in the design and performance of windows. Advancements in the technologies of the glass material have produced variable degrees of window thermal performance. A closer look at the glazing system itself in reference to overall building thermal performance will hopefully explain when, where and how the window is a benefit under specific climatic conditions. The optimization of equatorially facing window area for either single or double glazing systems is investigated in another paper in this conference, and it is now queried as to how the design of the window itself can benefit the annual performance of a residence. Two locations were investigated, each for a hot summer and cold winter week. Separate glazing analysis programs are also used independent of the thermal residential program CHEETAH. Three glazing systems, single 3 mm, double 3 mm, and a spectrally-selective double 3 mm system were investigated. There appears to be little difference in the total overall performance between a clear and a selective double insulated glazing system. It is further suggested that there is room for future improvement to thermal simulation programs by incorporating rigorous glazing simulation. 9 figs., 8 refs.

  8. Bispectral analysis: comparison of two windowing functions

    Science.gov (United States)

    Silvagni, D.; Djerroud, C.; Réveillé, T.; Gravier, E.

    2018-02-01

    Amongst all the normalized forms of bispectrum, the bicoherence is shown to be a very useful diagnostic tool in experimental studies of nonlinear wave interactions in plasma, as it measures the fraction of wave power due to the quadratic wave coupling in a self-excited fluctuation spectrum [1, 2]. In order to avoid spectral leakage, the application of a windowing function is needed during the bicoherence computation. Spectral leakage from statistically dependent components are of crucial importance in the discrimination between coupled and uncoupled modes, as they will introduce in the bicoherence spectrum phase-coupled modes which in reality do not exist. Therefore, the windowing function plays a key role in the bicoherence estimation. In this paper, two windowing methods are compared: the multiplication of the initial signal by the Hanning function and the subtraction of the straight line which links the two extremities of the signal. The influence of these two windowing methods on both the power spectrum and the bicoherence spectrum is showed. Although both methods give precise results, the Hanning function appears to be the more suitable window.

  9. CYBER SECURITY FOR AIRPORTS

    OpenAIRE

    Kasthurirangan Gopalakrishnan; Manimaran Govindarasu; Doug W. Jacobson; Brent M. Phares

    2013-01-01

    In today’s information age, government organizations and business enterprises are heavily relying on interconnected computer systems to manage a variety of public services including energy, transportation, water, etc. While this increased connectivity has many operational advantages benefitting the public, they have also become vulnerable to cyber attacks such as Corporate Security Breaches, Spear Phishing, and Social Media Fraud. The aviation sector is one the critical infrastructure systems...

  10. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  11. Information Security Management: The Study of Lithuanian State Institutions

    OpenAIRE

    Jastiuginas, Saulius

    2012-01-01

    Growing information security cases and scope illustrate that the relevance of information security issues becomes critical and present information security means are not sufficient enough to manage information security. Narrow comprehension of information security merely as technological problem is broadened by the research results of economic, managerial, psychological, legal and other related aspects’ influence to information security. Information is named as the object of information s...

  12. Thermal features of spallation window targets

    International Nuclear Information System (INIS)

    Martinez-Val, J. M.; Sordo, F.; Leon, P. T.

    2007-01-01

    Subcritical nuclear reactors have been proposed for a number of applications, from energy production to fertile-to-fissile conversion, and to transmutation of long-lived radio nuclei into stable or much shorter-lived nuclei. The main advantage of subcritical reactors is their large reactivity margin for not to attain prompt-supercritical power surges. On the contrary, subcritical reactors present some economic drawbacks and technical complexities that deserve suitable attention in the Research and Development phase. Namely, they need a very intense neutron source in order to keep the neutron flux and the reactor power at the required level. The most intense neutron source seems to be based on the proton-induced (or deuteron-induced) spallation reaction in heavy nuclei targets, which present very demanding thermal features that must be properly limited. Those limits pose upper bounds to the neutron yield of the target. In turn, the limits depend on the features of the impinging particle beam and the material composition and geometry of the target. Although the potential design window for spallation targets is rather wide, the analysis presented in this paper identifies specific topics that must properly be covered in the detailed project of a spallation source, in order to avoid unacceptable temperatures and mechanical stresses in the most critical parts of the source. In this paper, some calculations are reported on solid targets (water cooled or helium cooled) and molten metals targets. It is seen that thermal-hydraulic and mechanical calculations of spallation targets are fundamental elements in the coherent design of this type of very intense neutron sources. This coherence implies the need of a suitable trade-off among the relevant beam parameters (proton energy, total intensity and cross-section shape) and the features of the target (structural materials, coolant characteristics and target geometry). The goal of maximizing the neutron yield has to be checked

  13. The Moving Window Technique: A Window into Developmental Changes in Attention during Facial Emotion Recognition

    Science.gov (United States)

    Birmingham, Elina; Meixner, Tamara; Iarocci, Grace; Kanan, Christopher; Smilek, Daniel; Tanaka, James W.

    2013-01-01

    The strategies children employ to selectively attend to different parts of the face may reflect important developmental changes in facial emotion recognition. Using the Moving Window Technique (MWT), children aged 5-12 years and adults ("N" = 129) explored faces with a mouse-controlled window in an emotion recognition task. An…

  14. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  15. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  16. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  17. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  18. A Model of Managerial Effectiveness in Information Security: From Grounded Theory to Empirical Test

    National Research Council Canada - National Science Library

    Knapp, Kenneth J

    2005-01-01

    Information security is a critical issue facing organizations worldwide. in order to mitigate risk and protect valuable information, organizations need to operate and manage effective information security programs...

  19. Key design features of multi-vacuum glazing for windows: A review

    Directory of Open Access Journals (Sweden)

    Ali Hassan

    2017-01-01

    Full Text Available The use of vacuum glazed windows is increasing due to their application in mod-ern building design. Among various types of vacuum glazed windows reported in literature, thermal transmittance of single glass sheet (conventional window i. e 6 W/m2k is reduced by 66 and 77% using air filled double glazed and air filled triple glazed windows, respectively. Using low emittance coatings thermal transmittance of double glazed windows is reduced by 53%, however it offsets the visibility by reduc-ing light transmittance by 5%. Stresses due to temperature/pressure gradients if not eliminated may lead to reduction in service life of vacuum glazed windows. Vacuum created between the glass sheets is used to reduce conductive heat transfer. Degrada-tion in the vacuum is caused by number of factors such as, permeation of gaseous molecules through glass sheets, leakage through sealing, thermal/optical desorption, and photo-fragmentation of organic species have been critically reviewed and future trends are outlined.

  20. 30 CFR 18.30 - Windows and lenses.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Windows and lenses. 18.30 Section 18.30 Mineral... § 18.30 Windows and lenses. (a) MSHA may waive testing of materials for windows or lenses except headlight lenses. When tested, material for windows or lenses shall meet the test requirements prescribed in...

  1. 49 CFR 238.114 - Rescue access windows.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Rescue access windows. 238.114 Section 238.114... § 238.114 Rescue access windows. (a) Number and location. Except as provided in paragraph (a)(1)(ii) of... rescue access windows. At least one rescue access window shall be located in each side of the car...

  2. Energy Gaining Windows for Residental Buildings

    DEFF Research Database (Denmark)

    Kragh, Jesper; Laustsen, Jacob Birck; Svendsen, Svend

    2008-01-01

    window is made of fiber-reinforced plastic (plastic reinforced by fine fibers made of glass). This composite material is a weatherproof material with very low thermal conductivity and high mechanical strength. These properties make the material very suitable for frame profiles due to lower heat loss...... minus the heat loss integrated over the heating season. It is assumed that in northern cold climates all of the solar gain during the heating season can be utilized for space heating. Problems with overheating in the summer period must be solved with overhang or moveable solar shading devices. Two...... and longer durability of the window. The glazing in these fiber reinforced polyester windows is both unsealed and sealed triple glazing units. To increase the net energy gain slim frame profiles have been developed to increase the glazing area and thereby the solar gain. The challenge when developing slim...

  3. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    Science.gov (United States)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  4. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  5. PV window - Development and demonstrations. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Haugaard, P.

    2011-05-15

    Using the results from the EU project RenewTransnet, which focused on the development of a pane with integrated solar cells, the goal of this project is to develop these principles into a window solution. This window solution is targeted to Danish building tradition and architecture. It is expected that an elegant PV-window solution for both new and retrofit buildings is developed during this project, and which appearance can be customized to each building. Based on results from a related projects carried out by Gaia Solar, the window solution will have the potential of being approximately 30% cheaper than similar products on the market. In this project this price reduction is the objective of the development of a window solution. The project team has succeeded in developing a 2-layer PV-window with glass / glass lamination with EVA as foil, which is 35% cheaper than similar products on the market. Since the price for the frame-profile does not differ significantly at market level, the price comparison is made on the basis of the developed PV-pane. The objective of 30 % price reduction in relation to similar products on the market is met. A special production process to the making glass/glass lamination with EVA as foil has been developed, in which a frame is put around the module which intends both to remove the unwanted tension along the edges, and to prevent the significant spillage of EVA from the module under pressure and prevent the invasive bubbles along the edge of module. Since the developed production method for making glass/glass modules with EVA is simple, a further cost reduction will primarily be in a reduction of the price of the cell. The project process has resulted in the development of a product, which due to continuous restrictions in the building regulations, will be very attractive in future buildings. (LN)

  6. Effective Approach to Calculate Analysis Window in Infinite Discrete Gabor Transform

    Directory of Open Access Journals (Sweden)

    Rui Li

    2018-01-01

    Full Text Available The long-periodic/infinite discrete Gabor transform (DGT is more effective than the periodic/finite one in many applications. In this paper, a fast and effective approach is presented to efficiently compute the Gabor analysis window for arbitrary given synthesis window in DGT of long-periodic/infinite sequences, in which the new orthogonality constraint between analysis window and synthesis window in DGT for long-periodic/infinite sequences is derived and proved to be equivalent to the completeness condition of the long-periodic/infinite DGT. By using the property of delta function, the original orthogonality can be expressed as a certain number of linear equation sets in both the critical sampling case and the oversampling case, which can be fast and efficiently calculated by fast discrete Fourier transform (FFT. The computational complexity of the proposed approach is analyzed and compared with that of the existing canonical algorithms. The numerical results indicate that the proposed approach is efficient and fast for computing Gabor analysis window in both the critical sampling case and the oversampling case in comparison to existing algorithms.

  7. Study on the application of low energy U-window

    International Nuclear Information System (INIS)

    Li Binghai; Liu Shikai; Chen Guosheng

    2012-01-01

    For using the low energy U-window information, based on the theory and experiment, the advantage of identifying the subtle anomaly that the low energy U-window information has given is discussed, the method of drawing the low energy U-window information is stated; a method of calibration and obtaining the calibration parameters was developed which was applied to Dongsheng region. The result indicated that the anomaly of low energy U-window information upon known field is more easy identified by comparing with the standard three windows U-window information, which proved the practicability of the method of low energy U-windows information. (authors)

  8. Roadmap on optical security

    Science.gov (United States)

    Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam

    2016-08-01

    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections

  9. Mastering Microsoft Windows Small Business Server 2008

    CERN Document Server

    Johnson, Steven

    2010-01-01

    A complete, winning approach to the number one small business solution. Do you have 75 or fewer users or devices on your small-business network? Find out how to integrate everything you need for your mini-enterprise with Microsoft's new Windows Server 2008 Small Business Server, a custom collection of server and management technologies designed to help small operations run smoothly without a giant IT department. This comprehensive guide shows you how to master all SBS components as well as handle integration with other Microsoft technologies.: Focuses on Windows Server 2008 Small Business Serv

  10. Economic efficiency of application of solar window

    Science.gov (United States)

    Shapoval, Stepan

    2017-12-01

    Priority and qualitatively new direction in the fuel and energy sector is renewable energy. This paper describes a feasibility study of using solar window in the system of solar heat supply. The article presents literature data about the effectiveness of the use of solar systems in other countries. The results confirm a sufficient efficiency of solar heat supply with using solar Windows. Insights based on practical experience and mathematical calculations, which are aimed at a detailed explanation of economic efficiency of the proposed construction.

  11. Inferior hilar window on lateral chest radiographs

    International Nuclear Information System (INIS)

    Park, C.K.; Webb, W.R.; Klein, J.S.

    1990-01-01

    This paper determines the accuracy of lateral chest radiography in the detection of masses in the inferior hilar window, a normally avascular hilar region anterior to the lower lobe bronchi. Fifty patients with normal thoracic CT scans and 25 with hilar masses/adenopathy were selected retrospectively. The 75 corresponding lateral chest radiographs were blindly evaluated for visibility of the anterior walls of the lower lobe bronchi and the presence and laterality of abnormal soft tissue (>1 cm) in the inferior hilar window. Only a 7 x 7-cm square of the lateral radiograph was viewed

  12. New window materials for high power gyrotron

    International Nuclear Information System (INIS)

    Afsar, M.N.; Hua Chi

    1993-01-01

    A single free standing synthetic diamond window seems to have higher absorption coefficient value at millimeter wavelength region at this time although it is claimed that it possesses good mechanical strength and higher thermal conductivity characteristics. It certainly does not rule out the use of diamond film on single crystal high resistivity silicon to improve its mechanical strength and thermal conductivity. One may have to use an appropriate film thickness for a particular wavelength in gyrotron window application. It is also necessary to use an appropriate thickness for the silicon perhaps equivalent to a quaterwavelength in order to avoid the reflection mismatch

  13. Supporting Multiple Pointing Devices in Microsoft Windows

    DEFF Research Database (Denmark)

    Westergaard, Michael

    2002-01-01

    In this paper the implementation of a Microsoft Windows driver including APIs supporting multiple pointing devices is presented. Microsoft Windows does not natively support multiple pointing devices controlling independent cursors, and a number of solutions to this have been implemented by us and...... and others. Here we motivate and describe a general solution, and how user applications can use it by means of a framework. The device driver and the supporting APIs will be made available free of charge. Interested parties can contact the author for more information....

  14. 鹿死Windows Phone 7?

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Windows Phone 7终于千呼万唤始出来。10月11日,微软发布了9款Windows Phone 7手机,它们将于11月在美国上市销售,运营商分别是AT&T,T-mobile。本期MI除了为米饭们带来几款新机,还将在看天下栏目解析Windwos Phone 7手机的胜负前路。

  15. Thin Cryogenic X-ray Windows

    CERN Document Server

    Niinikoski, T O; Davenport, M; Elias, N; Aune, S; Franz, J

    2009-01-01

    We describe the construction and tests of cryogenic X-ray windows of 47 mm diameter made of 15 ìm thick polypropylene foil glued on a UHV flange and supported with a strongback mesh machined by electro-erosion. These hermetic windows of the solar axion telescope of the CAST experiment at CERN withstand the static and dynamic pressures of the buffer gas that are normally below 130 mbar, but may reach 1.2 bar when the magnet quenches. They were tested at 60 K up to 3.5 bar static pressure without permanent deformation.

  16. MOVING WINDOW SEGMENTATION FRAMEWORK FOR POINT CLOUDS

    Directory of Open Access Journals (Sweden)

    G. Sithole

    2012-07-01

    Full Text Available As lidar point clouds become larger streamed processing becomes more attractive. This paper presents a framework for the streamed segmentation of point clouds with the intention of segmenting unstructured point clouds in real-time. The framework is composed of two main components. The first component segments points within a window shifting over the point cloud. The second component stitches the segments within the windows together. In this fashion a point cloud can be streamed through these two components in sequence, thus producing a segmentation. The algorithm has been tested on airborne lidar point cloud and some results of the performance of the framework are presented.

  17. Compare of Energy Efficiency of Windows in Aalborg and Chongqing

    DEFF Research Database (Denmark)

    Lin, Zhenguo; Heiselberg, Per; Yao, Runming

    2007-01-01

    Focus on window's energy efficiency, this paper compared the difference of windows in Aalborg and Chongqing. The author analysed the designing process, the thermal insulation performances, the sun shading devices and the ventilation of windows in Aalborg and Chongqing respectively. Furthermore......, the author explored the reasons for window problems in Chongqing, found out the main barriers to overcome and measures to take for solving the problem. Deeper analysis should be made before the energy efficient windows of Aalborg used in Chongqing....

  18. Information Security Management System toolkit

    OpenAIRE

    Καραμανλής, Μάνος; Karamanlis, Manos

    2016-01-01

    Secure management of information is becoming critical for any organization because information is one of the most valuable assets in organization’s business operations. An Information security management system (ISMS) consists of the policies, procedures, guidelines, and associated resources and activities, collectively managed by an organization, in the pursuit of protecting its information assets. An ISMS is a systematic approach for establishing, implementing, operating, mon...

  19. Federal Funding for Health Security in FY2017.

    Science.gov (United States)

    Boddie, Crystal; Watson, Matthew; Sell, Tara Kirk

    2016-01-01

    This latest article in the Federal Funding for Health Security series assesses FY2017 US government funding in 5 domains critical to strengthening health security: biosecurity, radiological and nuclear security, chemical security, pandemic influenza and emerging infectious disease, and multiple-hazard and general preparedness.

  20. Problems and solutions of information security management in Latvia

    Directory of Open Access Journals (Sweden)

    Deruma S.

    2014-01-01

    Security cannot exist as a standalone function, it should be integrated in the associated processes continuously supervising and improving the security management programme based on predefined criteria. Adopting a holistic approach with regard to security has proven to be a critical contributing factor to effective security in organizations.

  1. Lagged kernel machine regression for identifying time windows of susceptibility to exposures of complex mixtures.

    Science.gov (United States)

    Liu, Shelley H; Bobb, Jennifer F; Lee, Kyu Ha; Gennings, Chris; Claus Henn, Birgit; Bellinger, David; Austin, Christine; Schnaas, Lourdes; Tellez-Rojo, Martha M; Hu, Howard; Wright, Robert O; Arora, Manish; Coull, Brent A

    2018-07-01

    The impact of neurotoxic chemical mixtures on children's health is a critical public health concern. It is well known that during early life, toxic exposures may impact cognitive function during critical time intervals of increased vulnerability, known as windows of susceptibility. Knowledge on time windows of susceptibility can help inform treatment and prevention strategies, as chemical mixtures may affect a developmental process that is operating at a specific life phase. There are several statistical challenges in estimating the health effects of time-varying exposures to multi-pollutant mixtures, such as: multi-collinearity among the exposures both within time points and across time points, and complex exposure-response relationships. To address these concerns, we develop a flexible statistical method, called lagged kernel machine regression (LKMR). LKMR identifies critical exposure windows of chemical mixtures, and accounts for complex non-linear and non-additive effects of the mixture at any given exposure window. Specifically, LKMR estimates how the effects of a mixture of exposures change with the exposure time window using a Bayesian formulation of a grouped, fused lasso penalty within a kernel machine regression (KMR) framework. A simulation study demonstrates the performance of LKMR under realistic exposure-response scenarios, and demonstrates large gains over approaches that consider each time window separately, particularly when serial correlation among the time-varying exposures is high. Furthermore, LKMR demonstrates gains over another approach that inputs all time-specific chemical concentrations together into a single KMR. We apply LKMR to estimate associations between neurodevelopment and metal mixtures in Early Life Exposures in Mexico and Neurotoxicology, a prospective cohort study of child health in Mexico City.

  2. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  3. Security Problems in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Rola Motawie

    2016-12-01

    Full Text Available Cloud is a pool of computing resources which are distributed among cloud users. Cloud computing has many benefits like scalability, flexibility, cost savings, reliability, maintenance and mobile accessibility. Since cloud-computing technology is growing day by day, it comes with many security problems. Securing the data in the cloud environment is most critical challenges which act as a barrier when implementing the cloud. There are many new concepts that cloud introduces, such as resource sharing, multi-tenancy, and outsourcing, create new challenges for the security community. In this work, we provide a comparable study of cloud computing privacy and security concerns. We identify and classify known security threats, cloud vulnerabilities, and attacks.

  4. Windows XP ends its life at CERN – register for Windows 7 training!

    CERN Multimedia

    Michał Kwiatek (IT-OIS)

    2012-01-01

    Windows XP has been around for over 10 years and it is now time to move on. At CERN, general support for Windows XP will end in December 2012, and before this date users are requested to schedule a migration to the next version of WindowsWindows 7.   Windows 7 is already well established at CERN – it is used by a large majority of users. In fact, there was a considerable user demand even before its official release in October 2009 and its adoption has been smooth. Users praise Windows 7 for its improved stability and a clear advantage on laptops is a much more efficient implementation of offline files. The migration to Windows 7 involves a reinstallation of the operating system. Files stored in user home folders on DFS will be immediately available after the reinstallation. Applications will be upgraded to more recent versions and in certain cases, an application may even be replaced by another application providing the same functionality. Microsoft Office suite is a good ...

  5. Microwave response of ITER vacuum windows

    NARCIS (Netherlands)

    Oosterbeek, J.W.; Maquet, P.; Sirinelli, A.; Udintsev, V.S.; Vayakis, G.; Walsh, M.J.

    2017-01-01

    Diagnostic systems are essential for the development of ITER discharges and to reach the ITER goals. Many of these diagnostics require a line of sight to relay signals from the plasma to the diagnostic, typically located outside the torus hall. Such diagnostics then require vacuum windows that

  6. Source-system windowing for speech analysis

    NARCIS (Netherlands)

    Yegnanarayana, B.; Satyanarayana Murthy, P.; Eggen, J.H.

    1993-01-01

    In this paper we propose a speech-analysis method to bring out characteristics of the vocal tract system in short segments which are much less than a pitch period. The method performs windowing in the source and system components of the speech signal and recombines them to obtain a signal reflecting

  7. Multistate Luminescent Solar Concentrator "Smart" Windows

    NARCIS (Netherlands)

    Sol, Jeroen A.H.P.; Timmermans, Gilles H.; Breugel, van Abraham J.; Schenning, Albertus P.H.J.; Debije, Michael G.

    2018-01-01

    A supertwist liquid crystalline luminescent solar concentrator (LSC) "smart" window is fabricated which can be switched electrically between three states: one designed for increased light absorption and electrical generation (the "dark" state), one for transparency (the "light" state), and one for

  8. Windows Phone 8 application development essentials

    CERN Document Server

    Szostak, Tomasz

    2013-01-01

    A mini-tutorial full of code examples and strategies to give you plenty of options when building your own applications for Windows Phone 8.This book is ideal if you are a developers who wants to get into mobile development. Some C# background may be useful for a complete understanding.

  9. Windows 8: What Educators Need to Know

    Science.gov (United States)

    Vedder, Richard G.

    2012-01-01

    In October 2012, Microsoft will release the commercial version of its next operating system, presently called "Windows 8." This version represents a significant departure from the past. Microsoft wants this operating system to meet user needs regardless of physical platform (e.g., desktop, notebook, tablet, mobile phone). As part of this mission,…

  10. Schools Facing the Expiration of Windows XP

    Science.gov (United States)

    Cavanagh, Sean

    2013-01-01

    Microsoft's plans to end support for Windows XP, believed to be the dominant computer operating system in K-12 education, could pose big technological and financial challenges for districts nationwide--issues that many school systems have yet to confront. The giant software company has made it clear for years that it plans to stop supporting XP…

  11. Program design of data acquisition in Windows

    International Nuclear Information System (INIS)

    Cai Jianxin; Yan Huawen

    2004-01-01

    Several methods for the design of data acquisition program based on Microsoft Windows are introduced. Then their respective advantages and disadvantages are totally analyzed. At the same time, the data acquisition modes applicable to each method are also pointed out. It is convenient for data acquisition programmers to develop data acquisition systems. (authors)

  12. New Window into the Human Body

    Science.gov (United States)

    1985-01-01

    Michael Vannier, MD, a former NASA engineer, recognized the similarity between NASA's computerized image processing technology and nuclear magnetic resonance. With technical assistance from Kennedy Space Center, he developed a computer program for Mallinckrodt Institute of Radiology enabling Nuclear Magnetic Resonance (NMR) to scan body tissue for earlier diagnoses. Dr. Vannier feels that "satellite imaging" has opened a new window into the human body.

  13. A methodology to enlarge narrow stability windows

    Energy Technology Data Exchange (ETDEWEB)

    Araujo, Ewerton M.P.; Pastor, Jorge A.S.C.; Fontoura, Sergio A.B. [Pontificia Univ. Catolica do Rio de Janeiro (PUC-Rio), RJ (Brazil). Dept. de Engenharia Civil. Grupo de Tecnologia e Engenharia de Petroleo

    2004-07-01

    The stability window in a wellbore design is defined by the difference between fracture pressure and collapse pressure. Deep water environments typically present narrow stability windows, because rocks have low strength due to under-compaction process. Often also, horizontal wells are drilled to obtain a better development of reservoirs placed in thin layers of sandstone. In this scenario, several challenges are faced when drilling in deep water. The traditional approach for predicting instabilities is to determine collapses and fractures at borehole wall. However, the initiation of rupture does not indicate that the borehole fails to perform its function as a wellbore. Thus, a methodology in which the stability window may be enlarged is desirable. This paper presents one practical analytical methodology that consists in allowing wellbore pressures smaller than the conventional collapse pressure, i.e., based upon failure on the borehole wall. This means that a collapse region (shear failure) will be developed around the borehole wall. This collapse region is pre-defined and to estimate its size is used a failure criterion. The aforementioned methodology is implemented in a user-friendly software, which can perform analyses of stress, pore pressure, formation failure, mud weight and mud salinity design for drilling in shale formations. Simulations of a wellbore drilling in a narrow stability window environment are performed to demonstrate the improvements of using the methodology. (author)

  14. Translational nanomedicine : Through the therapeutic window

    NARCIS (Netherlands)

    Pierce, Robin

    2015-01-01

    Translational nanomedicine occurs only through the successful integration of multiple inputs and iterative modifications. The therapeutic window plays a pivotal role in the trajectory of translational nanomedicine. Often defined in terms of the range of dosage for safe and effective therapeutic

  15. Ada To X-Window Bindings

    Science.gov (United States)

    Souleles, Dean

    1993-01-01

    Ada to X-Window Bindings computer program developed to provide Ada programmers with complete interfaces to Xt Intrinsics and OSF Motif toolkits. Provides "Ada view" of some mostly C-language programming libraries. Package of software written in Ada and C languages.

  16. Windowed active sampling for reliable neural learning

    NARCIS (Netherlands)

    Barakova, E.I; Spaanenburg, L

    The composition of the example set has a major impact on the quality of neural learning. The popular approach is focused on extensive pre-processing to bridge the representation gap between process measurement and neural presentation. In contrast, windowed active sampling attempts to solve these

  17. Performance of the Analog Moving Window Detector

    DEFF Research Database (Denmark)

    Hansen, V. Gregers

    1970-01-01

    A type of analog integrating moving window detector for use with a scanning pulse radar is examined. A performance analysis is carried out, which takes into account both the radiation pattern of the antenna and the dynamic character of the detection process due to the angular scanning...

  18. CHDS Sponsors Critical Infrastructure Protection Workshop

    OpenAIRE

    Center for Homeland Defense and Security

    2008-01-01

    Center for Homeland Defense and Security, PRESS RELEASES The NPS Center for Homeland Defense and Security in partnership with the U.S. Department of Homeland Security recently hosted its first Critical Infrastructure Protection Workshop. The workshop brought together practitioners and...

  19. The Water Security Hydra

    Science.gov (United States)

    Lall, U.

    2017-12-01

    As the editor of a new journal on water security, I have been pondering what it can mean theoretically and practically. At one level, it is pretty aobvious that it refers to the ability to affordably and reliably access water of appropriate quality, and to be protected from the water related ravages of nature, such as floods, droughts and water borne disease. The concept of water security can apply to a family, a company, a state or globally. Of course, since we value the environment, water security embraces the needs of the environment. Where, we consider economic development or energy production, water security also emerges as a critical factor. So, in short it touches almost all things about water that pertain to our lives. New stresses are created by a changing climate, growing populations and an ever changing society, economic activity and environment. Thus, if assuring water security is a goal at any of the scales of interest, many factors need to be considered, and what can really be assured, where and for how long emerges as an interesting question. Local (place, time, individuals, politics) as well as global (climate, economics, hydrology) factors interact to determine outcomes, not all of which are readily mapped in our mathematical or cognitive models to a functional notion of what constitutes security in the face of changing conditions and actors. Further, assurance implies going beyond characterization to developing actions, responses to stressors and risk mitigation strategies. How these perform in the short and long run, and what are the outcomes and strategies for impact mitigation in the event of failure then determines water security. Recognizing that providing assurance of water security has always been the goal of water management, regulation and development, perhaps the challenge is to understand what this means from the perspective of not just the "water managers" but the individuals who are the unwitting beneficiaries, or the instruments for

  20. Gabor windows supported on [-1,1] and compactly supported dual windows

    DEFF Research Database (Denmark)

    Christensen, Ole; Kim, H. O.; Rae Young, Kim

    2010-01-01

    window. More precisely, we show that if b window supported on [-N, N]. Under the additional assumption that g is continuous and only has a finite number of zeros on inverted left perpendicular-1, 1inverted right perpendicular, we...... characterize the frame property of {E(mb)T(n)g}(m,n is an element of Z). As a consequence we obtain easily verifiable criteria for a function g to generate a Gabor frame with a dual window having compact support of prescribed size....