WorldWideScience

Sample records for dynamic security assessment

  1. Dynamic security assessment processing system

    Science.gov (United States)

    Tang, Lei

    The architecture of dynamic security assessment processing system (DSAPS) is proposed to address online dynamic security assessment (DSA) with focus of the dissertation on low-probability, high-consequence events. DSAPS upgrades current online DSA functions and adds new functions to fit into the modern power grid. Trajectory sensitivity analysis is introduced and its applications in power system are reviewed. An index is presented to assess transient voltage dips quantitatively using trajectory sensitivities. Then the framework of anticipatory computing system (ACS) for cascading defense is presented as an important function of DSAPS. ACS addresses various security problems and the uncertainties in cascading outages. Corrective control design is automated to mitigate the system stress in cascading progressions. The corrective controls introduced in the dissertation include corrective security constrained optimal power flow, a two-stage load control for severe under-frequency conditions, and transient stability constrained optimal power flow for cascading outages. With state-of-the-art computing facilities to perform high-speed extended-term time-domain simulation and optimization for large-scale systems, DSAPS/ACS efficiently addresses online DSA for low-probability, high-consequence events, which are not addressed by today's industrial practice. Human interference is reduced in the computationally burdensome analysis.

  2. Research progress in dynamic security assessment

    Energy Technology Data Exchange (ETDEWEB)

    1982-12-01

    Areas discussed are power system modeling, state estimation, structure decomposition, state forecasting, clustering and security measure development. A detailed dynamic model of a multi-machine power system has been developed. A process state estimator was developed to estimate the long-term dynamic behavior of the power system. The algorithm is identical to the extended Kalman filter but has a modified process noise driving term. A two-stage structure estimation technique was proposed for identifying the power system network configuration. Two approaches to structure decomposition were investigated. A time-scale decomposition of the system equations, based on a singular perturbation approach, was evaluated using a detailed model of a generating system. Spatial decomposition was examined by applying an optimal network decomposition technique to a 39-bus test system. Stochastic approximation based approaches to estimator simplification were examined. Explicit expressions were obtained for the evolution of the first and second moments of the system state. Research into security measures proceeded in three directions. The first area involves viewing the security assessment problem as a hyperplane crossing problem for a stochastic process. The second approach examined the stability of an unforced linear system where the system coefficients are subject to future jumps. The third area of research has led to the formulation of a security measure suitable for on-line assessment of transient stability.

  3. Dynamic security risk assessment and optimization of power transmission system

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The paper presents a practical dynamic security region (PDSR) based dynamic security risk assessment and optimization model for power transmission system. The cost of comprehensive security control and the influence of uncertainties of power injections are considered in the model of dynamic security risk assessment. The transient stability constraints and uncertainties of power injections can be considered easily by PDSR in form of hyper-box. A method to define and classify contingency set is presented, and a risk control optimization model is given which takes total dynamic insecurity risk as the objective function for a dominant con-tingency set. An optimal solution of dynamic insecurity risk is obtained by opti-mizing preventive and emergency control cost and contingency set decomposition. The effectiveness of this model has been proved by test results on the New Eng-land 10-genarator 39-bus system.

  4. Real-time dynamic security assessment of power grids

    Science.gov (United States)

    Kerin, Uros; Heyde, Chris; Krebs, Rainer; Lerch, Edwin

    2014-10-01

    This paper presents a dynamic security assessment solution, which can be used in the power system control room to improve system stability. It is based on a set of security indices. The indices are able of establishing contingencies' severity levels as a measure of different aspects of power system security. A system based on fuzzy logic is used to combine the indices into a single composite index. The composite index is able to alert the control operator to the network conditions that represent a significant risk to system security based on over-all system performance.

  5. On-line Dynamic Security Assessment in Power Systems

    DEFF Research Database (Denmark)

    Weckesser, Johannes Tilman Gabriel

    tools may no longer be feasible, since they are generally based on extensive off-line studies. A core component of an efficient on-line dynamic security assessment is a fast and reliable contingency screening. As part of this thesis a contingency screening method is developed and its performance......The thesis concerns the development of tools and methods for on-line dynamic security assessment (DSA). In a future power system with low-dependence or even independence of fossil fuels, generation will be based to a large extent on noncontrollable renewable energy sources (RES), such as wind...... and solar radiation. Moreover, ongoing research suggests that demand response will be introduced to maintain power balance between generation and consumption at all times. Due to these changes the operating point of the power system will be less predictable and today’s stability and security assessment...

  6. Dynamic Security Assessment of Western Danish Power System Based on Ensemble Decision Trees

    DEFF Research Database (Denmark)

    Liu, Leo; Bak, Claus Leth; Chen, Zhe

    2014-01-01

    With the increasing penetration of renewable energy resources and other forms of dispersed generation, more and more uncertainties will be brought to the dynamic security assessment (DSA) of power systems. This paper proposes an approach that uses ensemble decision trees (EDT) for online DSA. Fed...

  7. Dynamic Security Assessment of Danish Power System Based on Decision Trees: Today and Tomorrow

    DEFF Research Database (Denmark)

    Rather, Zakir Hussain; Liu, Leo; Chen, Zhe;

    2013-01-01

    The research work presented in this paper analyzes the impact of wind energy, phasing out of central power plants and cross border power exchange on dynamic security of Danish Power System. Contingency based decision tree (DT) approach is used to assess the dynamic security of present and future...... Danish Power System. Results from offline time domain simulation for large number of possible operating conditions (OC) and critical contingencies are organized to build up the database, which is then used to predict the security of present and future power system. The mentioned approach is implemented...... in DIgSILENT PowerFactory environment and applied to western Danish Power System which is passing through a phase of major transformation. The results have shown that phasing out of central power plants coupled with large scale wind energy integration and more dependence on international ties can have...

  8. Dynamic secrets in communication security

    CERN Document Server

    Xiao, Sheng; Towsley, Donald

    2013-01-01

    Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. 'Dynamic Secrets in Communication Security' presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic

  9. Application of learning from examples methods for on-line dynamic security assessment of electric power systems - state of the art

    Energy Technology Data Exchange (ETDEWEB)

    Pecas Lopes, J.A. [Universidade do Porto, Porto (Portugal). Faculdade de Engenharia] Hatziargyriou, Nikos D. [National Technical University of Athens, Athens (Greece)

    1994-12-31

    This paper provides an overview of the application of `learning from examples` techniques like pattern recognition, artificial neural networks and decision trees, when used for fast dynamic security assessment. Problems concerning the system security evaluation relatively to transient stability and voltage stability are addressed with more details and references to research works in this field are briefly described. (author) 44 refs., 3 tabs.

  10. A Systematic Approach for Dynamic Security Assessment and the Corresponding Preventive Control Scheme Based on Decision Trees

    DEFF Research Database (Denmark)

    Liu, Leo; Sun, Kai; Rather, Zakir Hussain

    2014-01-01

    This paper proposes a decision tree (DT)-based systematic approach for cooperative online power system dynamic security assessment (DSA) and preventive control. This approach adopts a new methodology that trains two contingency-oriented DTs on a daily basis by the databases generated from power...... system simulations. Fed with real-time wide-area measurements, one DT of measurable variables is employed for online DSA to identify potential security issues, and the other DT of controllable variables provides online decision support on preventive control strategies against those issues. A cost......-effective algorithm is adopted in this proposed approach to optimize the trajectory of preventive control. The paper also proposes an importance sampling algorithm on database preparation for efficient DT training for power systems with high penetration of wind power and distributed generation. The performance...

  11. Secure High Dynamic Range Images

    OpenAIRE

    Med Amine Touil; Noureddine Ellouze

    2016-01-01

    In this paper, a tone mapping algorithm is proposed to produce LDR (Limited Dynamic Range) images from HDR (High Dynamic Range) images. In the approach, non-linear functions are applied to compress the dynamic range of HDR images. Security tools will be then applied to the resulting LDR images and their effectiveness will be tested on the reconstructed HDR images. Three specific examples of security tools are described in more details: integrity verification using hash function to compute loc...

  12. Secure High Dynamic Range Images

    Directory of Open Access Journals (Sweden)

    Med Amine Touil

    2016-04-01

    Full Text Available In this paper, a tone mapping algorithm is proposed to produce LDR (Limited Dynamic Range images from HDR (High Dynamic Range images. In the approach, non-linear functions are applied to compress the dynamic range of HDR images. Security tools will be then applied to the resulting LDR images and their effectiveness will be tested on the reconstructed HDR images. Three specific examples of security tools are described in more details: integrity verification using hash function to compute local digital signatures, encryption for confidentiality, and scrambling technique.

  13. Can we quantitatively assess security?

    NARCIS (Netherlands)

    Haverkort, Boudewijn R.

    2006-01-01

    This short note describes a number of methods for assessing security in a quantitative way. Next to describing a five existing approaches (where no completeness is claimed), a new assessment technique is proposed, that finds its roots in methods known from performability evaluation and stochastic mo

  14. Soil Security Assessment of Tasmania

    Science.gov (United States)

    Field, Damien; Kidd, Darren; McBratney, Alex

    2017-04-01

    The concept of soil security aligns well with the aspirational and marketing policies of the Tasmanian Government, where increased agricultural expansion through new irrigation schemes and multiple-use State managed production forests co-exists beside pristine World Heritage conservation land, a major drawcard of the economically important tourism industry . Regarding the Sustainable Development Gaols (SDG's) this could be seen as a exemplar of the emerging tool for quantification of spatial soil security to effectively protect our soil resource in terms of food (SDG 2.4, 3.9) and water security (SDG 6.4, 6.6), biodiversity maintenance and safeguarding fragile ecosystems (SDG 15.3, 15.9). The recent development and application of Digital Soil Mapping and Assessment capacities in Tasmania to stimulate agricultural production and better target appropriate soil resources has formed the foundational systems that can enable the first efforts in quantifying and mapping Tasmanian Soil Security, in particular the five Soil Security dimensions (Capability, Condition, Capital, Codification and Connectivity). However, to provide a measure of overall soil security, it was necessary to separately assess the State's three major soil uses; Agriculture, Conservation and Forestry. These products will provide an indication of where different activities are sustainable or at risk, where more soil data is needed, and provide a tool to better plan for a State requiring optimal food and fibre production, without depleting its natural soil resources and impacting on the fragile ecosystems supporting environmental benefits and the tourism industry.

  15. Complex networks: Dynamics and security

    Indian Academy of Sciences (India)

    Ying-Cheng Lai; Adilson Motter; Takashi Nishikawa; Kwangho Park; Liang Zhao

    2005-04-01

    This paper presents a perspective in the study of complex networks by focusing on how dynamics may affect network security under attacks. In particular, we review two related problems: attack-induced cascading breakdown and range-based attacks on links. A cascade in a network means the failure of a substantial fraction of the entire network in a cascading manner, which can be induced by the failure of or attacks on only a few nodes. These have been reported for the internet and for the power grid (e.g., the August 10, 1996 failure of the western United States power grid). We study a mechanism for cascades in complex networks by constructing a model incorporating the flows of information and physical quantities in the network. Using this model we can also show that the cascading phenomenon can be understood as a phase transition in terms of the key parameter characterizing the node capacity. For a parameter value below the phase-transition point, cascading failures can cause the network to disintegrate almost entirely. We will show how to obtain a theoretical estimate for the phase-transition point. The second problem is motivated by the fact that most existing works on the security of complex networks consider attacks on nodes rather than on links. We address attacks on links. Our investigation leads to the finding that many scale-free networks are more sensitive to attacks on short-range than on long-range links. Considering that the small-world phenomenon in complex networks has been identified as being due to the presence of long-range links, i.e., links connecting nodes that would otherwise be separated by a long node-to-node distance, our result, besides its importance concerning network efficiency and security, has the striking implication that the small-world property of scale-free networks is mainly due to short-range links.

  16. Security Dynamics of Cloud Computing

    OpenAIRE

    Khaled M. Khan

    2009-01-01

    This paper explores various dimensions of cloud computing security. It argues that security concerns of cloud computing need to be addressed from the perspective of individual stakeholder. Security focuses of cloud computing are essentially different in terms of its characteristics and business model. Conventional way of viewing as well as addressing security such as ‘bolting-in’ on the top of cloud computing may not work well. The paper attempts to portray the security spectrum necessary for...

  17. Strengthening E - Banking security using Keystroke Dynamics

    OpenAIRE

    AHMAD KABIR USMAN; MAHMOOD HUSSA IN SHAH

    2013-01-01

    This paper investigates keystroke dynamics and its possible use as a tool to prevent or detect fraud in the banking industry. Given that banks are constantly on the lookout for improved methods to address the menace of fraud, the paper sets out to review keystroke dynamics, its advantages, disadvantages and potential for improving the security of e-banking systems. This paper evaluates keystroke dynamics suitability of use for enhancing security in the banking sector. Results from the literat...

  18. Conducting a Nuclear Security Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Leach, Janice [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Snell, Mark K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-06-01

    There are three general steps that make up a nuclear security assessment: 1. Develop data Libraries that indicate how effective the physical protection measures are both individually but also as parts of subsystems and actual systems. 2. Perform Path Analysis 3. Perform Scenario Analysis Depending upon the nature and objectives of the assessment not all three of these steps may need to be performed; for example, at facilities with simple layouts there may not be a need to perform path analysis. Each of these steps is described within this report.

  19. A Dynamic Framework for Water Security

    Science.gov (United States)

    Srinivasan, Veena; Konar, Megan; Sivapalan, Murugesu

    2017-04-01

    Water security is a multi-faceted problem, going beyond mere balancing of supply and demand. Conventional attempts to quantify water security starting rely on static indices at a particular place and point in time. While these are simple and scalable, they lack predictive or explanatory power. 1) Most static indices focus on specific spatial scales and largely ignore cross-scale feedbacks between human and water systems. 2) They fail to account for the increasing spatial specialization in the modern world - some regions are cities others are agricultural breadbaskets; so water security means different things in different places. Human adaptation to environmental change necessitates a dynamic view of water security. We present a framework that defines water security as an emergent outcome of a coupled socio-hydrologic system. Over the medium term (5-25 years), water security models might hold governance, culture and infrastructure constant, but allow humans to respond to changes and thus predict how water security would evolve. But over very long time-frames (25-100 years), a society's values, norms and beliefs themselves may themselves evolve; these in turn may prompt changes in policy, governance and infrastructure. Predictions of water security in the long term involve accounting for such regime shifts in the cultural and political context of a watershed by allowing the governing equations of the models to change.

  20. DOT Cyber Security Assessment Management -

    Data.gov (United States)

    Department of Transportation — This data set contains information about the security and compliance status of FISMA systems within the Department. The information contains detailed descriptions of...

  1. The Short- to Medium-Term Predictive Accuracy of Static and Dynamic Risk Assessment Measures in a Secure Forensic Hospital

    Science.gov (United States)

    Chu, Chi Meng; Thomas, Stuart D. M.; Ogloff, James R. P.; Daffern, Michael

    2013-01-01

    Although violence risk assessment knowledge and practice has advanced over the past few decades, it remains practically difficult to decide which measures clinicians should use to assess and make decisions about the violence potential of individuals on an ongoing basis, particularly in the short to medium term. Within this context, this study…

  2. The Short- to Medium-Term Predictive Accuracy of Static and Dynamic Risk Assessment Measures in a Secure Forensic Hospital

    Science.gov (United States)

    Chu, Chi Meng; Thomas, Stuart D. M.; Ogloff, James R. P.; Daffern, Michael

    2013-01-01

    Although violence risk assessment knowledge and practice has advanced over the past few decades, it remains practically difficult to decide which measures clinicians should use to assess and make decisions about the violence potential of individuals on an ongoing basis, particularly in the short to medium term. Within this context, this study…

  3. Assessing the Security of Connected Diabetes Devices.

    Science.gov (United States)

    Out, Dirk-Jan; Tettero, Olaf

    2017-03-01

    This article discusses the assessment of the (cyber)security of wirelessly connected diabetes devices under the DTSEC standard. We discuss the relation between diabetes devices and hackers, provide an overview of the DTSEC standard, and describe the process of security assessment of diabetes devices.

  4. Strengthening E - Banking security using Keystroke Dynamics

    Directory of Open Access Journals (Sweden)

    AHMAD KABIR USMAN

    2013-12-01

    Full Text Available This paper investigates keystroke dynamics and its possible use as a tool to prevent or detect fraud in the banking industry. Given that banks are constantly on the lookout for improved methods to address the menace of fraud, the paper sets out to review keystroke dynamics, its advantages, disadvantages and potential for improving the security of e-banking systems. This paper evaluates keystroke dynamics suitability of use for enhancing security in the banking sector. Results from the literature review found that keystroke dynamics can offer impressive accuracy rates for user identification. Lcosts of deployment and minimal change to users modus operandi make this technology an attractive investment for banks. The paper goes on to argue that although this behavioural biometric may not be suitable as a primary method of authentication, it can be used as a secondary or tertiary method to complement existing authentication systems.

  5. Design tools for complex dynamic security systems.

    Energy Technology Data Exchange (ETDEWEB)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III (.; ); Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  6. An IOT Security Risk Autonomic Assessment Algorithm

    Directory of Open Access Journals (Sweden)

    Zhengchao Ma

    2013-02-01

    Full Text Available In terms of Internet of Things (IOT system with the possibility criterion of fuzziness and randomness security risk, we qualitatively analyze the security risk level of IOT security scene by describing generalization metrics the potential impact and likelihood of occurrence of every major threat scenarios. On this basis, we proposed self-assessment algorithm of IOT security risk, adopting three-dimensional normal cloud model integrated consideration of risk indicators, researching the multi-rule mapping relationship between the qualitative input of safety indicators and the quantitative reasoning of self-assessment. Finally, we build security risk assessment simulation platform, and verify the validity and accuracy of the algorithm in the premise of substantiating the risk level and the safety criterion domain.

  7. A security assessment methodology for critical infrastructures

    NARCIS (Netherlands)

    Caselli, Marco; Kargl, Frank; Hämmerli, Bernhard M.; Lopez, Javier

    2014-01-01

    Interest in security assessment and penetration testing techniques has steadily increased. Likewise, security of industrial control systems (ICS) has become more and more important. Very few methodologies directly target ICS and none of them generalizes the concept of "critical infrastructures pente

  8. Drought Dynamics and Food Security in Ukraine

    Science.gov (United States)

    Kussul, N. M.; Kogan, F.; Adamenko, T. I.; Skakun, S. V.; Kravchenko, O. M.; Kryvobok, O. A.; Shelestov, A. Y.; Kolotii, A. V.; Kussul, O. M.; Lavrenyuk, A. M.

    2012-12-01

    In recent years food security became a problem of great importance at global, national and regional scale. Ukraine is one of the most developed agriculture countries and one of the biggest crop producers in the world. According to the 2011 statistics provided by the USDA FAS, Ukraine was the 8th largest exporter and 10th largest producer of wheat in the world. Therefore, identifying current and projecting future trends in climate and agriculture parameters is a key element in providing support to policy makers in food security. This paper combines remote sensing, meteorological, and modeling data to investigate dynamics of extreme events, such as droughts, and its impact on agriculture production in Ukraine. Two main problems have been considered in the study: investigation of drought dynamics in Ukraine and its impact on crop production; and investigation of crop growth models for yield and production forecasting and its comparison with empirical models that use as a predictor satellite-derived parameters and meteorological observations. Large-scale weather disasters in Ukraine such as drought were assessed using vegetation health index (VHI) derived from satellite data. The method is based on estimation of green canopy stress/no stress from indices, characterizing moisture and thermal conditions of vegetation canopy. These conditions are derived from the reflectance/emission in the red, near infrared and infrared parts of solar spectrum measured by the AVHRR flown on the NOAA afternoon polar-orbiting satellites since 1981. Droughts were categorized into exceptional, extreme, severe and moderate. Drought area (DA, in % from total Ukrainian area) was calculated for each category. It was found that maximum DA over past 20 years was 10% for exceptional droughts, 20% for extreme droughts, 50% for severe droughts, and 80% for moderate droughts. Also, it was shown that in general the drought intensity and area did not increase considerably over past 10 years. Analysis

  9. Analysis of MANET Security, Architecture and Assessment

    Directory of Open Access Journals (Sweden)

    Sweta Kaushik

    2012-03-01

    Full Text Available in these days, the Mobile ad hoc network (MANET technology spreads widely. Architecture and security issue is the most sensitive challenge of MANET. MANET support to nodes for directly communications with all the other nodes within their radio ranges through multiple wireless links, where the nodes are not in the direct communication range using intermediate node(s to communicate with each other. In a MANET, the users’ mobile devices behave as a network, and they must cooperatively provide the different functions which are generally provided by the network infrastructure like as routers, switches, servers. The security issues and requirement of the MANET depends on its application. Specific security architecture is necessary for specific application. The security challenges in the MANET generate because of its dynamic topology, vulnerable wireless link and nomadic environment. In this paper we have discussed the architecture and security issues of MANET.

  10. Security Issues Specific to e-Assessments

    OpenAIRE

    2006-01-01

    E-learning systems play a primary and/or supportive role in modern education. With e-learning systems e-assessments are an integral part of a course be it to do formative or summative assessments. This paper identifies security vulnerabilities unique to e-assessment that are not addressed in commercial products and web security research. The reason for the additional requirements is that e-assessments are being used more and more to replace paper based tests. The e-assessments need to be in a...

  11. Energy security assessment framework and three case-studies

    OpenAIRE

    2013-01-01

    This chapter provides a novel framework for assessing energy security and illustrates its application by the Global Energy Assessment, the IEA Model for Short-term energy security and in several studies of long-term global energy security.

  12. Assessment of global water security: moving beyond water scarcity assessment

    Science.gov (United States)

    Wada, Y.; Gain, A. K.; Giupponi, C.

    2015-12-01

    Water plays an important role in underpinning equitable, stable and productive societies, and the ecosystems on which we depend. Many international river basins are likely to experience 'low water security' over the coming decades. Hence, ensuring water security along with energy and food securities has been recognised as priority goals in Sustainable Development Goals (SDGs) by the United Nations. This water security is not rooted only in the limitation of physical resources, i.e. the shortage in the availability of freshwater relative to water demand, but also on social and economic factors (e.g. flawed water planning and management approaches, institutional incapability to provide water services, unsustainable economic policies). Until recently, advanced tools and methods are available for assessment of global water scarcity. However, integrating both physical and socio-economic indicators assessment of water security at global level is not available yet. In this study, we present the first global understanding of water security using a spatial multi-criteria analysis framework that goes beyond available water scarcity assessment. For assessing water security at global scale, the term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The Water security index is calculated by aggregating the indicators using both simple additive weighting (SAW) and ordered weighted average (OWA).

  13. Assessing the Security Vulnerabilities of Correctional Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  14. Automatic Security Assessment for Next Generation Wireless Mobile Networks

    Directory of Open Access Journals (Sweden)

    Francesco Palmieri

    2011-01-01

    Full Text Available Wireless networks are more and more popular in our life, but their increasing pervasiveness and widespread coverage raises serious security concerns. Mobile client devices potentially migrate, usually passing through very light access control policies, between numerous and heterogeneous wireless environments, bringing with them software vulnerabilities as well as possibly malicious code. To cope with these new security threats the paper proposes a new active third party authentication, authorization and security assessment strategy in which, once a device enters a new Wi-Fi environment, it is subjected to analysis by the infrastructure, and if it is found to be dangerously insecure, it is immediately taken out from the network and denied further access until its vulnerabilities have been fixed. The security assessment module, that is the fundamental component of the aforementioned strategy, takes advantage from a reliable knowledge base containing semantically-rich information about the mobile node under examination, dynamically provided by network mapping and configuration assessment facilities. It implements a fully automatic security analysis framework, based on AHP, which has been conceived to be flexible and customizable, to provide automated support for real-time execution of complex security/risk evaluation tasks which depends on the results obtained from different kind of analysis tools and methodologies. Encouraging results have been achieved utilizing a proof-of-concept model based on current technology and standard open-source networking tools.

  15. Cyber Assessment Methods for SCADA Security

    Energy Technology Data Exchange (ETDEWEB)

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  16. Cyber Assessment Methods For SCADA Security

    Energy Technology Data Exchange (ETDEWEB)

    May Robin Permann; Kenneth Rohde

    2005-06-01

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  17. Stress Assessment of Security Injection Tank

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    The purpose of the calculating is to make the stress assessment of the security injection tank according to the requirements of the code and the designing on the basis of the gained results of the static, the seism and the thermal stress in order to judge

  18. Nuclear power plant security assessment technical manual.

    Energy Technology Data Exchange (ETDEWEB)

    O' Connor, Sharon L.; Whitehead, Donnie Wayne; Potter, Claude S., III

    2007-09-01

    This report (Nuclear Power Plant Security Assessment Technical Manual) is a revision to NUREG/CR-1345 (Nuclear Power Plant Design Concepts for Sabotage Protection) that was published in January 1981. It provides conceptual and specific technical guidance for U.S. Nuclear Regulatory Commission nuclear power plant design certification and combined operating license applicants as they: (1) develop the layout of a facility (i.e., how buildings are arranged on the site property and how they are arranged internally) to enhance protection against sabotage and facilitate the use of physical security features; (2) design the physical protection system to be used at the facility; and (3) analyze the effectiveness of the PPS against the design basis threat. It should be used as a technical manual in conjunction with the 'Nuclear Power Plant Security Assessment Format and Content Guide'. The opportunity to optimize physical protection in the design of a nuclear power plant is obtained when an applicant utilizes both documents when performing a security assessment. This document provides a set of best practices that incorporates knowledge gained from more than 30 years of physical protection system design and evaluation activities at Sandia National Laboratories and insights derived from U.S. Nuclear Regulatory Commission technical staff into a manual that describes a development and analysis process of physical protection systems suitable for future nuclear power plants. In addition, selected security system technologies that may be used in a physical protection system are discussed. The scope of this document is limited to the identification of a set of best practices associated with the design and evaluation of physical security at future nuclear power plants in general. As such, it does not provide specific recommendations for the design and evaluation of physical security for any specific reactor design. These best practices should be applicable to the design and

  19. Improving Social Security's Financial Capability Assessments.

    Science.gov (United States)

    Appelbaum, Paul S; Birkenmaier, Julie; Norman, Marc

    2016-07-01

    When Social Security beneficiaries are incapable of managing their benefits, the agency can appoint a representative payee to administer benefits on their behalf. A committee of the Institute of Medicine was asked by the Social Security Administration to review the process by which financial capability determinations are made and to recommend improvements. The committee's conclusions and recommendations include the following: giving priority to real-world financial performance in assessing capability, providing clearer instructions to informants, developing systematic approaches to identifying beneficiaries at risk of incapability, exploring the use of a supervised direct payment option, and instituting regular data collection to assist in improving operations.

  20. Energy security and climate policy. Assessing interactions

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-03-28

    World energy demand is surging. Oil, coal and natural gas still meet most global energy needs, creating serious implications for the environment. One result is that CO2 emissions, the principal cause of global warming, are rising. This new study underlines the close link between efforts to ensure energy security and those to mitigate climate change. Decisions on one side affect the other. To optimise the efficiency of their energy policy, OECD countries must consider energy security and climate change mitigation priorities jointly. The book presents a framework to assess interactions between energy security and climate change policies, combining qualitative and quantitative analyses. The quantitative analysis is based on the development of energy security indicators, tracking the evolution of policy concerns linked to energy resource concentration. The 'indicators' are applied to a reference scenario and CO2 policy cases for five case-study countries: The Czech Republic, France, Italy, the Netherlands, and the United Kingdom. Simultaneously resolving energy security and environmental concerns is a key challenge for policy makers today. This study helps chart the course.

  1. 76 FR 43696 - Nationwide Cyber Security Review (NCSR) Assessment

    Science.gov (United States)

    2011-07-21

    ... government to complete a cyber network security assessment so that a full measure of gaps and capabilities... SECURITY Nationwide Cyber Security Review (NCSR) Assessment AGENCY: National Protection and Programs...: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD),...

  2. 76 FR 22409 - Nationwide Cyber Security Review (NCSR) Assessment

    Science.gov (United States)

    2011-04-21

    ... a cyber network security assessment so that a full measure of gaps and capabilities can be completed... SECURITY Nationwide Cyber Security Review (NCSR) Assessment AGENCY: National Protection and Programs.... SUMMARY: The Department of Homeland Security (DHS), National Protection and Programs Directorate...

  3. Considerations on Cyber Security Assessments of Korean Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Han, Kyung-Soo; Lee, Cheol Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Kang, Mingyun [E-Gonggam Co. Ltd., Daejeon (Korea, Republic of)

    2015-10-15

    Korea Institute of Nuclear Nonproliferation and Control (KINAC) has prepared the regulatory standard RS-015 based on RG 5.71. RS-015 defines the elements of a cyber security program to be established in nuclear facilities and describes the security control items and relevant requirements. Cyber security assessments are important initial activities in a cyber security program for NPPs. Cyber security assessments can be performed in the following key steps: 1) Formation of a cyber security assessment team (CSAT); 2) Identification of critical systems and critical digital assets (CDAs); 3) Plant compliance checks with the security control requirements in RS-015. Through the assessments, the current status of security controls applied to NPPs can be found out. The assessments provide baseline data for remedial activities. Additional analyses with the results from the assessments should be performed before the implementation of remedial security controls. The cyber security team at the Korea Atomic Energy Research Institute (KAERI) has studied how to perform cyber security assessments for NPPs based on the regulatory requirements. Recently, KAERI's cyber security team has performed pilot cyber security assessments of a Korean NPP. Based on this assessment experience, considerations and checkpoints which would be helpful for full-scale cyber security assessments of Korean NPPs and the implementation of remedial security controls are discussed in this paper. Cyber security assessment is one of important and immediate activities for NPP cyber security. The quality of the first assessment will be a barometer for NPP cyber security. Hence cyber security assessments of Korean NPPs should be performed elaborately.

  4. PREDICT: Privacy and Security Enhancing Dynamic Information Monitoring

    Science.gov (United States)

    2015-08-03

    AFRL-OSR-VA-TR-2015-0217 PREDICT Privacy and Security Enhancing Dynamic Information Monitoring VAIDY S SUNDERAM EMORY UNIVERSITY Final Report 08/03...TITLE AND SUBTITLE PREDICT: Privacy and Security Enhancing Dynamic Information Monitoring 5a. CONTRACT NUMBER 5b. GRANT NUMBER FA9550-12-1-0240 5c...SUPPLEMENTARY NOTES 14. ABSTRACT The PREDICT project incorporates security and privacy in DDDAS systems to deliver provable guarantees of privacy and

  5. Security Assessment of Web Based Distributed Applications

    Directory of Open Access Journals (Sweden)

    Catalin BOJA

    2010-01-01

    Full Text Available This paper presents an overview about the evaluation of risks and vulnerabilities in a web based distributed application by emphasizing aspects concerning the process of security assessment with regards to the audit field. In the audit process, an important activity is dedicated to the measurement of the characteristics taken into consideration for evaluation. From this point of view, the quality of the audit process depends on the quality of assessment methods and techniques. By doing a review of the fields involved in the research process, the approach wants to reflect the main concerns that address the web based distributed applications using exploratory research techniques. The results show that many are the aspects which must carefully be worked with, across a distributed system and they can be revealed by doing a depth introspective analyze upon the information flow and internal processes that are part of the system. This paper reveals the limitations of a non-existing unified security risk assessment model that could prevent such risks and vulnerabilities debated. Based on such standardize models, secure web based distributed applications can be easily audited and many vulnerabilities which can appear due to the lack of access to information can be avoided.

  6. Risk assessment for sustainable food security in China according to integrated food security--taking Dongting Lake area for example.

    Science.gov (United States)

    Qi, Xiaoxing; Liu, Liming; Liu, Yabin; Yao, Lan

    2013-06-01

    Integrated food security covers three aspects: food quantity security, food quality security, and sustainable food security. Because sustainable food security requires that food security must be compatible with sustainable development, the risk assessment of sustainable food security is becoming one of the most important issues. This paper mainly focuses on the characteristics of sustainable food security problems in the major grain-producing areas in China. We establish an index system based on land resources and eco-environmental conditions and apply a dynamic assessment method based on status assessments and trend analysis models to overcome the shortcomings of the static evaluation method. Using fuzzy mathematics, the risks are categorized into four grades: negligible risk, low risk, medium risk, and high risk. A case study was conducted in one of China's major grain-producing areas: Dongting Lake area. The results predict that the status of the sustainable food security in the Dongting Lake area is unsatisfactory for the foreseeable future. The number of districts at the medium-risk range will increase from six to ten by 2015 due to increasing population pressure, a decrease in the cultivated area, and a decrease in the effective irrigation area. Therefore, appropriate policies and measures should be put forward to improve it. The results could also provide direct support for an early warning system-which could be used to monitor food security trends or nutritional status so to inform policy makers of impending food shortages-to prevent sustainable food security risk based on some classical systematic methods. This is the first research of sustainable food security in terms of risk assessment, from the perspective of resources and the environment, at the regional scale.

  7. A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges

    Directory of Open Access Journals (Sweden)

    Mrs. D. Shanmugapriya

    2009-09-01

    Full Text Available Biometrics technologies are gaining popularity today since they provide more reliable and efficient means of authentication and verification. Keystroke Dynamics is one of the famous biometric technologies, which will try to identify the authenticity of a user when the user is working via a keyboard. The authentication process is done by observing the change in the typing pattern of the user. A comprehensive survey of the existing keystroke dynamics methods, metrics, different approaches are given in this study. This paper also discusses about the various security issues and challenges faced by keystroke dynamics..Keywords- Biometris; Keystroke Dynamics; computer Security; Information Security; User Authentication.

  8. Security threat assessment of an Internet security system using attack tree and vague sets.

    Science.gov (United States)

    Chang, Kuei-Hu

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.

  9. Y-12 National Security Complex Water Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Elam, Shana E.; Bassett, P.; McMordie Stoughton, Kate

    2010-11-01

    The Department of Energy's Federal Energy Management Program (FEMP) sponsored a water assessment at the Y 12 National Security Complex (Y 12) located in Oak Ridge, Tennessee. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment is to develop a comprehensive understanding of the current water-consuming applications and equipment at Y 12 and to identify key areas for water efficiency improvements that could be applied not only at Y-12 but at other Federal facilities as well. FEMP selected Pacific Northwest National Laboratory to coordinate and manage the water assessment. PNNL contracted Water Savers, LLC to lead the technical aspects of the water assessment. Water Savers provided key technical expertise in water auditing, metering, and cooling systems. This is the report of that effort, which concluded that the Y-12 facility could realize considerable water savings by implementing the recommended water efficiency opportunities.

  10. Anticipating the unintended consequences of security dynamics.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Overfelt, James Robert; Malczynski, Leonard A.; Saltiel, David H.; Simon Paul Moulton

    2010-01-01

    In a globalized world, dramatic changes within any one nation causes ripple or even tsunamic effects within neighbor nations and nations geographically far removed. Multinational interventions to prevent or mitigate detrimental changes can easily cause secondary unintended consequences more detrimental and enduring than the feared change instigating the intervention. This LDRD research developed the foundations for a flexible geopolitical and socioeconomic simulation capability that focuses on the dynamic national security implications of natural and man-made trauma for a nation-state and the states linked to it through trade or treaty. The model developed contains a database for simulating all 229 recognized nation-states and sovereignties with the detail of 30 economic sectors including consumers and natural resources. The model explicitly simulates the interactions among the countries and their governments. Decisions among governments and populations is based on expectation formation. In the simulation model, failed expectations are used as a key metric for tension across states, among ethnic groups, and between population factions. This document provides the foundational documentation for the model.

  11. Research on Assessment Model of Information System Security Based on Various Security Factors

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    With the rapid development of network technology, the meaning of layers and attributes in respect of information system security must be extended based on the understanding of the concept of information system security. The layering model (LM) of information system security and the five-attribute model (FAM) based on security factors were put forward to perfect the description and modeling of the information system security framework. An effective framework system of risk calculation and assessment was proposed, which is based on FAM.

  12. MANAGEMENT OF RESOURCES IN DYNAMICALLY CHANGING SECURITY ENVRIONMENT

    Directory of Open Access Journals (Sweden)

    Sevdalina Dimitrova

    2014-09-01

    Full Text Available The monograph recommends integration between science and practice, experts from national bodies and scientific research potential of academic community of military universities in the field of management of resources of security and defence in accordance to the challenges in security environment caused by its dynamic and often unpredictable changes.

  13. A Quantitative Assessment Approach to COTS Component Security

    Directory of Open Access Journals (Sweden)

    Jinfu Chen

    2013-01-01

    Full Text Available The vulnerability of software components hinders the development of component technology. An effective assessment approach to component security level can promote the development of component technology. Thus, the current paper proposes a quantitative assessment approach to COTS (commercial-off-the-shelf component security. The steps of interface fault injection and the assessment framework are given based on the internal factors of the tested component. The quantitative assessment algorithm and formula of component security level are also presented. The experiment results show that the approach not only can detect component security vulnerabilities effectively but also quantitatively assess the component security level. The score of component security can be accurately calculated, which represents the security level of the tested component.

  14. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shibo Luo

    2015-12-01

    Full Text Available Software-Defined Networking-based Mobile Networks (SDN-MNs are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  15. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.

    Science.gov (United States)

    Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua

    2015-12-17

    Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  16. Security Assessment Simulation Toolkit (SAST) Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.

    2009-11-15

    The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSD NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.

  17. Regional security assessments : a strategic approach to securing federal facilities

    OpenAIRE

    Consolini, Todd

    2009-01-01

    CHDS State/Local The 18 critical infrastructure sectors identified by the U.S. Department of Homeland Security form a vast and complex network of interdependent assets that supports the functioning of nearly every aspect of business, government, and commerce. The disruption of even one critical infrastructure sector by a terrorist attack or natural or manmade disaster is likely to have cascading effects on other sectors. As the Sector-Specific Agency for the Government Facilities Sector, t...

  18. Assessing Information Security Strategies, Tactics, Logic and Framework

    CERN Document Server

    Vladimirov, Andrew; Michajlowski, Andriej

    2010-01-01

    This book deals with the philosophy, strategy and tactics of soliciting, managing and conducting information security audits of all flavours. It will give readers the founding principles around information security assessments and why they are important, whilst providing a fluid framework for developing an astute 'information security mind' capable of rapid adaptation to evolving technologies, markets, regulations, and laws.

  19. Secure Multiparty Computation for Cooperative Cyber Risk Assessment

    Science.gov (United States)

    2016-11-01

    Secure Multiparty Computation for Cooperative Cyber Risk Assessment Kyle Hogan, Noah Luther, Nabil Schear, Emily Shen, Sophia Yakoubov, Arkady...Malacaria. How to spend it: Optimal investment for cyber security . In Proceedings of the 1st International Workshop on Agents and CyberSecurity...common problem organizations face is determining which security updates to perform and patches to apply to minimize the risk of potential vulnerabilities

  20. EFFECTIVENESS ASSESSMENT METHODOLOGY OF INFORMATION SECURITY MANAGEMENT SYSTEM THROUGH THE SYSTEM RESPONSE TIME TO INFORMATION SECURITY INCIDENTS

    OpenAIRE

    F. N. Shago

    2014-01-01

    Quality assessment of information security management system is an important step for obtaining baseline data for analysis of the security system control effectiveness, and evaluating implementation of the specified information security requirements of the organization. Proceeding from current analysis practice of information security management systems effectiveness assessment, it can be concluded that, in most cases, independent measurement of security control is carried out wit...

  1. Study on Combination of Online-function and Offline-function for Power System Dynamic Security Assessment System%动态安全评估中在线和离线结合的探究

    Institute of Scientific and Technical Information of China (English)

    秦长锋; 李伟; 康建东; 吴国辉; 陈继林

    2014-01-01

    Oline dynamic security assessment system using real-time operating data and model parameters, track and analyze power flow,power system stability,short circuit current,etc.,and advanced assessment of total transfer capacity(TTC).Real-time alarm information of power grid is shown which reflect weak points of the grid.However,with the development of grid structure and data model,only displaying current alarm results that is unable to meet dispatchers’ demands through pre-allocation fixed parameters mechanism adopted. This paper introduced combination of dynamic security assessment system and offline system, not only view Online historical data and online information of grid,but also achieve online monitoring, assessment and early warning for power grid at all levels,which ensure the system's flexibility and stability,improve work efficiency,and provide convenient means for operator.%在线动态安全评估系统利用实时运行数据和模型参数,进行电力系统潮流、电力系统稳定性、短路电流等进行跟踪分析,并进行高级的稳定裕度评估,给出电网实时的告警信息,反应电网的薄弱点。然而随着电网结构的发展,数据模型的变化,采用预分配的固定参数设置,显示当前告警结果已无法满足调度自动化的需求。本文将动态安全评估的在线与离线结合起来,不但能提供电网的历史数据和在线信息查看,而且实现了对各级电网的在线监视、评估和预警,保证了系统的灵活性和稳定性,提高了工作效率,为运行人员提供了便捷手段。

  2. Secure Group Communications for Large Dynamic Multicast Group

    Institute of Scientific and Technical Information of China (English)

    Liu Jing; Zhou Mingtian

    2003-01-01

    As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dynamic multicast group have been researched and a solution based on SubGroup Secure Controllers (SGSCs) is presented, which solves many problems in IOLUS system and WGL scheme.

  3. System security assessment in real-time using synchrophasor measurements

    DEFF Research Database (Denmark)

    Jóhannsson, Hjörtur; Wache, Markus

    2013-01-01

    assessment and sheds light on ongoing research activities that focus on exploiting wide-area synchrophasor measurements for real-time security assessment of sustainable power systems. At last, an mathematical mapping enabling informative visualization of the system state in respect to aperiodic rotor angle...... measures to ensure stable and secure operation of the system are necessary. Time stamped synchrophasor measurements lay the foundation for development of new real-time applications for security and stability assessment. The paper provides overview of existing solutions for synchrophasor based security...

  4. A Review of Cyber-Physical Energy System Security Assessment

    DEFF Research Database (Denmark)

    Rasmussen, Theis Bo; Yang, Guangya; Nielsen, Arne Hejde

    2017-01-01

    to the consumption side. This transition entails that the future power system evolves into a complex cyber-physical energy system (CPES) with strong interactions between the power, communication and neighboring energy systems. Current power system security assessment methods are based on centralized computation...... and N-1 contingencies, while these risks should still be considered in the future CPES, additional factors are affecting the system security. This paper serves as a review of the challenges entailed by transforming the power system into a CPES from a security assessment perspective. It gives...... an indication of theoretical solutions to CPES challenges and proposes a new framework for security assessment in CPES....

  5. BWS Open System Architecture Security Assessment

    Directory of Open Access Journals (Sweden)

    Cristian Ionita

    2011-12-01

    Full Text Available Business process management systems play a central role in supporting the business operations of medium and large organizations. Because of this the security characteristics of these systems are becoming very important. The present paper describes the BWS architecture used to implement the open process aware information system DocuMentor. Using the proposed platform, the article identifies the security characteristics of such systems, shows the correlation between these characteristics and the security features implemented by the platform and presents examples of how the security of such systems can be enhanced using the extension mechanism.

  6. Regulatory Guide on Conducting a Security Vulnerability Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Ek, David R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-01-01

    This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.

  7. [Ecological security assessment of Tangshan City based on emergy analysis].

    Science.gov (United States)

    Cao, Ming-lan; Li, Ya-dong

    2009-09-01

    Based on 'pressure-state-response' model and by using emergy analysis method, the urban ecological security assessment system and urban ecological security index (EUESI) were constructed, and the variation of ecological security level of Tangshan City in 1995-2005 was evaluated. During this period, the ecological security level of the city increased first and decreased then. The EUESI increased from 0.017 in 1995 to 0.022 in 1996, then dropped yearly, and became unsecure in 2003. The urban ecological security assessment method based on emergy analysis overcame the disadvantages of conventional assessment system, e.g., numerous and repetitive indicators, non-uniform units, and poor comparability, and reflected the urban ecological security state more objectively, being able to provide scientific basis for urban ecological environment management and decision-making.

  8. Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mónica Pinto

    2015-03-01

    Full Text Available Providing security and privacy to wireless sensor nodes (WSNs is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs.We evaluate our approach using a case study from the intelligent transportation system domain.

  9. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    Energy Technology Data Exchange (ETDEWEB)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  10. Population dynamics: Social security, markets, and families.

    Science.gov (United States)

    Mason, Andrew W; Lee, Ronald D; Lee, Sang-Hyop

    2010-07-01

    Upward intergenerational flows - from the working ages to old age - are increasing substantially in the advanced industrialized countries and are much larger than in developing countries. Population aging is the most important factor leading to this change. Thus, in the absence of a major demographic shift, e.g., a return to high fertility, an increase in upward flows is inevitable. Even so, three other important factors will influence the magnitudes of upward flows. First, labor income varies at older ages due to differences in average age at retirement, productivity, unemployment, and hours worked. Second, the age patterns of consumption at older ages vary primarily due to differences in spending on health. Third, spending on human capital, i.e., spending child health and education, varies. Human capital spending competes with spending on the elderly, but it also increases the productivity of subsequent generations of workers and the resources available to support consumption in old age. All contemporary societies rely on a variety of institutions and economic mechanisms to shift economic resources from the working ages to the dependent ages - the young and the old. Three institutions dominate intergenerational flows: governments which implement social security, education, and other public transfer programs; markets which are key to the accumulation of assets, e.g., funded pensions and housing; and families which provide economic support to children in all societies and to the elderly in many. The objectives of this paper are, first, to describe how population aging and other changes influence the direction and magnitude of intergenerational flows; and, second, to contrast the institutional approaches to intergenerational flows as they are practiced around the world. The paper relies extensively on National Transfer Accounts, a system for measuring economic flows across age in a manner consistent with the UN System of National Accounts. These accounts are

  11. An advanced tool for Preventive Voltage Security Assessment

    OpenAIRE

    Van Cutsem, Thierry; Capitanescu, Florin; Moors, Cédric; Lefebvre, Daniel; Sermanson, Vincent

    2000-01-01

    This paper deals with methods for the preventive assessment of voltage security with respect to contingencies. We describe a computing tool for the determination of secure operation limits, together with methods for contingency filtering. Examples from two very different real-life systems are provided. We outline extensions in the field of preventive control. Peer reviewed

  12. Population dynamics: Social security, markets, and families

    Science.gov (United States)

    Lee, Ronald D.; Lee, Sang-Hyop

    2015-01-01

    Upward intergenerational flows – from the working ages to old age – are increasing substantially in the advanced industrialized countries and are much larger than in developing countries. Population aging is the most important factor leading to this change. Thus, in the absence of a major demographic shift, e.g., a return to high fertility, an increase in upward flows is inevitable. Even so, three other important factors will influence the magnitudes of upward flows. First, labor income varies at older ages due to differences in average age at retirement, productivity, unemployment, and hours worked. Second, the age patterns of consumption at older ages vary primarily due to differences in spending on health. Third, spending on human capital, i.e., spending child health and education, varies. Human capital spending competes with spending on the elderly, but it also increases the productivity of subsequent generations of workers and the resources available to support consumption in old age. All contemporary societies rely on a variety of institutions and economic mechanisms to shift economic resources from the working ages to the dependent ages – the young and the old. Three institutions dominate intergenerational flows: governments which implement social security, education, and other public transfer programs; markets which are key to the accumulation of assets, e.g., funded pensions and housing; and families which provide economic support to children in all societies and to the elderly in many. The objectives of this paper are, first, to describe how population aging and other changes influence the direction and magnitude of intergenerational flows; and, second, to contrast the institutional approaches to intergenerational flows as they are practiced around the world. The paper relies extensively on National Transfer Accounts, a system for measuring economic flows across age in a manner consistent with the UN System of National Accounts. These accounts are

  13. Security breaches: tips for assessing and limiting your risks.

    Science.gov (United States)

    Coons, Leeanne R

    2011-01-01

    As part of their compliance planning, medical practices should undergo a risk assessment to determine any vulnerability within the practice relative to security breaches. Practices should also implement safeguards to limit their risks. Such safeguards include facility access controls, information and electronic media management, use of business associate agreements, and education and enforcement. Implementation of specific policies and procedures to address security incidents is another critical step that medical practices should take as part of their security incident prevention plan. Medical practices should not only develop policies and procedures to prevent, detect, contain, and correct security violations, but should make sure that such policies and procedures are actually implemented in their everyday operations.

  14. A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges

    CERN Document Server

    Shanmugapriya, D

    2009-01-01

    Biometrics technologies are gaining popularity today since they provide more reliable and efficient means of authentication and verification. Keystroke Dynamics is one of the famous biometric technologies, which will try to identify the authenticity of a user when the user is working via a keyboard. The authentication process is done by observing the change in the typing pattern of the user. A comprehensive survey of the existing keystroke dynamics methods, metrics, different approaches are given in this study. This paper also discusses about the various security issues and challenges faced by keystroke dynamics.

  15. Critical infrastructure security assessment, prevention, detection, response

    CERN Document Server

    FLAMMINI, F

    2012-01-01

    The most comprehensive handbook on critical infrastructures (CI), addressing both logical and physical security from an engineering point of view. The book surveys state-of-the-art methodologies and tools for CI analysis as well as strategies and technologies for CI protection.

  16. Integrating a flexible modeling framework (FMF) with the network security assessment instrument to reduce software security risk

    Science.gov (United States)

    Gilliam, D. P.; Powell, J. D.

    2002-01-01

    This paper presents a portion of an overall research project on the generation of the network security assessment instrument to aid developers in assessing and assuring the security of software in the development and maintenance lifecycles.

  17. Integrating a flexible modeling framework (FMF) with the network security assessment instrument to reduce software security risk

    Science.gov (United States)

    Gilliam, D. P.; Powell, J. D.

    2002-01-01

    This paper presents a portion of an overall research project on the generation of the network security assessment instrument to aid developers in assessing and assuring the security of software in the development and maintenance lifecycles.

  18. Analysis of MANET Security, Architecture and Assessment

    OpenAIRE

    Sweta Kaushik; Manorma Kaushik

    2012-01-01

    in these days, the Mobile ad hoc network (MANET) technology spreads widely. Architecture and security issue is the most sensitive challenge of MANET. MANET support to nodes for directly communications with all the other nodes within their radio ranges through multiple wireless links, where the nodes are not in the direct communication range using intermediate node(s) to communicate with each other. In a MANET, the users’ mobile devices behave as a network, and they must cooperatively provide ...

  19. A Homeland Security Net Assessment Needed Now!

    Science.gov (United States)

    2015-12-01

    significant such historical comparisons are for today. One of the most important developments has been the establishment of a network of 78 state...mission of directing DOD cyber opera- tions and defending military information networks . The commander of USCYBERCOM also serves as director of the...to telecoms to aviation.”71 In recent years it seems as if just about everybody in the national security and intelligence communities has jumped on

  20. A dynamic,secure,and efficient group key agreement protocol

    Institute of Scientific and Technical Information of China (English)

    ZHENG Shihui; WANG Shaohui; ZHANG Guoyan

    2007-01-01

    The key challenge of dynamic peer communication is how to realize secure and efficient group key management.A two rounds key agreement protocol for dynamic peer group (DPG) is proposed in this paper.The protocol,which was obtained by combining the E1Gamal encryption scheme with the E1Gamal signature scheme,is efficient and simple.The protocol is proven secure against passive attack by using indistinguishable method.Moreover,both perfect forward secrecy (PFS) and key independence (KI) were achieved.Because the protocol is based on the broadcast channel,it is also suitable for key agreement in wireless communications,especially in ad-hoc networks.

  1. Security Measures in Automated Assessment System for Programming Courses

    Directory of Open Access Journals (Sweden)

    Jana Šťastná

    2015-12-01

    Full Text Available A desirable characteristic of programming code assessment is to provide the learner the most appropriate information regarding the code functionality as well as a chance to improve. This can be hardly achieved in case the number of learners is high (500 or more. In this paper we address the problem of risky code testing and availability of an assessment platform Arena, dealing with potential security risks when providing an automated assessment for a large set of source code. Looking at students’ programs as if they were potentially malicious inspired us to investigate separated execution environments, used by security experts for secure software analysis. The results also show that availability issues of our assessment platform can be conveniently resolved with task queues. A special attention is paid to Docker, a virtual container ensuring no risky code can affect the assessment system security. The assessment platform Arena enables to regularly, effectively and securely assess students' source code in various programming courses. In addition to that it is a motivating factor and helps students to engage in the educational process.

  2. Security Assessment of Software Design using Neural Network

    Directory of Open Access Journals (Sweden)

    A Adebiyi

    2012-07-01

    Full Text Available Security flaws in software applications today has been attributed mostly to design flaws. With limited budget and time to release software into the market, many developers often consider security as an afterthought. Previous research shows that integrating security into software applications at a later stage of software development lifecycle (SDLC has been found to be more costly than when it is integrated during the early stages. To assist in the integration of security early in the SDLC stages, a new approach for assessing security during the design phase by neural network is investigated in this paper. Our findings show that by training a back propagation neural network to identify attack patterns, possible attacks can be identified from design scenarios presented to it. The result of performance of the neural network is presented in this paper.

  3. Computer Security Issues in Online Banking: An Assessment from the Context of Usable Security

    Science.gov (United States)

    Mahmadi, FN; Zaaba, ZF; Osman, A.

    2016-11-01

    Today's online banking is a convenient mode of finance management. Despite the ease of doing online banking, there are people that still sceptical in utilizing it due to perception and its security. This paper highlights the subject of online banking security in Malaysia, especially from the perspective of the end-users. The study is done by assessing human computer interaction, usability and security. An online survey utilising 137 participants was previously conducted to gain preliminary insights on security issues of online banking in Malaysia. Following from those results, 37 participants were interviewed to gauge deeper understanding about end-users perception on online banking within the context of usable security. The results suggested that most of the end-users are continuingly experiencing significant difficulties especially in relation to the technical terminologies, security features and other technical issues. Although the security features are provided to provide a shield or protection, users are still incapable to cope with the technical aspects of such implementation.

  4. Fuzzy assessment of health information system users' security awareness.

    Science.gov (United States)

    Aydın, Özlem Müge; Chouseinoglou, Oumout

    2013-12-01

    Health information systems (HIS) are a specific area of information systems (IS), where critical patient data is stored and quality health service is only realized with the correct use and efficient dissemination of this data to health workers. Therefore, a balance needs to be established between the levels of security and flow of information on HIS. Instead of implementing higher levels and further mechanisms of control to increase the security of HIS, it is preferable to deal with the arguably weakest link on HIS chain with respect to security: HIS users. In order to provide solutions and approaches for transforming users to the first line of defense in HIS but also to employ capable and appropriate candidates from the pool of newly graduated students, it is important to assess and evaluate the security awareness levels and characteristics of these existing and future users. This study aims to provide a new perspective to understand the phenomenon of security awareness of HIS users with the use of fuzzy analysis, and to assess the present situation of current and future HIS users of a leading medical and educational institution of Turkey, with respect to their security characteristics based on four different security scales. The results of the fuzzy analysis, the guide on how to implement this fuzzy analysis to any health institution and how to read and interpret these results, together with the possible implications of these results to the organization are provided.

  5. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  6. Security Assessment of Two-Wave Encryption

    Science.gov (United States)

    Kitano, Motoki; Okamoto, Atsushi; Sano, Takayuki

    2009-03-01

    To determine the degree of security in two-wave encryption under practical conditions, we present a novel numerical technique for simulating the recording and readout of two-wave encryption. The calculation results of the retrieval characteristics show that the diffraction efficiency in an incorrect decryption is 10 times as low as that in correct decryption key and that the output data with an incorrect key is a white noise image. We estimate the necessary key correlation to decrypt an encrypted data is 0.2 when the length of an encryption key is 2313. This means that the decoding probability of the encryption key in two-wave encryption is less than 10-6 even if such a short key is used.

  7. Assessing Security of Supply: Three Methods Used in Finland

    Science.gov (United States)

    Sivonen, Hannu

    Public Private Partnership (PPP) has an important role in securing supply in Finland. Three methods are used in assessing the level of security of supply. First, in national expert groups, a linear mathematical model has been used. The model is based on interdependency estimates. It ranks societal functions or its more detailed components, such as items in the food supply chain, according to the effect and risk pertinent to the interdependencies. Second, the security of supply is assessed in industrial branch committees (clusters and pools) in the form of indicators. The level of security of supply is assessed against five generic factors (dimension 1) and tens of business branch specific functions (dimension 2). Third, in two thousand individual critical companies, the maturity of operational continuity management is assessed using Capability Maturity Model (CMM) in an extranet application. The pool committees and authorities obtain an anonymous summary. The assessments are used in allocating efforts for securing supply. The efforts may be new instructions, training, exercising, and in some cases, investment and regulation.

  8. Dynamic Assessment of Language Disabilities

    Science.gov (United States)

    Martin, Deirdre

    2015-01-01

    The paper reports a study of a narrative-based Dynamic Assessment (DA) procedure developed in the USA that is used in the UK with children with developmental language disabilities. Three monolingual English children with language disabilities are assessed by a speech/language pathologist/therapist who is learning to work with DA in collaboration…

  9. 33 CFR 103.410 - Persons involved in the Area Maritime Security (AMS) Assessment.

    Science.gov (United States)

    2010-07-01

    ... Maritime Security (AMS) Assessment. 103.410 Section 103.410 Navigation and Navigable Waters COAST GUARD... Security (AMS) Assessment § 103.410 Persons involved in the Area Maritime Security (AMS) Assessment. The persons carrying out the AMS Assessment must have the appropriate skills to evaluate the security of...

  10. Validation of the "Security Needs Assessment Profile" for measuring the profiles of security needs of Chinese forensic psychiatric inpatients.

    Science.gov (United States)

    Siu, B W M; Au-Yeung, C C Y; Chan, A W L; Chan, L S Y; Yuen, K K; Leung, H W; Yan, C K; Ng, K K; Lai, A C H; Davies, S; Collins, M

    2017-05-17

    Mapping forensic psychiatric services with the security needs of patients is a salient step in service planning, audit and review. A valid and reliable instrument for measuring the security needs of Chinese forensic psychiatric inpatients was not yet available. This study aimed to develop and validate the Chinese version of the Security Needs Assessment Profile for measuring the profiles of security needs of Chinese forensic psychiatric inpatients. The Security Needs Assessment Profile by Davis was translated into Chinese. Its face validity, content validity, construct validity and internal consistency reliability were assessed by measuring the security needs of 98 Chinese forensic psychiatric inpatients. Principal factor analysis for construct validity provided a six-factor security needs model explaining 68.7% of the variance. Based on the Cronbach's alpha coefficient, the internal consistency reliability was rated as acceptable for procedural security (0.73), and fair for both physical security (0.62) and relational security (0.58). A significant sex difference (p=0.002) in total security score was found. The Chinese version of the Security Needs Assessment Profile is a valid and reliable instrument for assessing the security needs of Chinese forensic psychiatric inpatients. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. Privacy Enhanced Pervasive Computing Model with Dynamic Trust and Security

    Directory of Open Access Journals (Sweden)

    Geetha Mariappan

    2014-06-01

    Full Text Available The objective of the research work is to propose a policy aware privacy enhancement model using dynamic trust and security management techniques. The different polices of the stakeholders incorporating device manufacturer, service provider, Mobile agents and mobile users are considered to achieve an enhanced privacy for on-demand request. The entities involving direct and indirect trust establishment with all forms of uncertainties like DDoS attacks are considered along with multiple layers of security management operations across varying trusted entities. The focus is to enhance the existing privacy through an efficient, preventive, detective, response mechanisms for those attacks, which will address the problem of DDoS before, during and after an actual attack. The session time and access time are controlled by the privileges and rights for disclosure of information in pervasive environment.

  12. Integrated Safeguards and Security Management Self-Assessment 2004

    Energy Technology Data Exchange (ETDEWEB)

    Lunford, Dan; Ramsey, Dwayne

    2005-04-01

    In 2002 Ernest Orlando Lawrence Berkeley National Laboratory deployed the first Integrated Safeguards and Security Management (ISSM) Self-Assessment process, designed to measure the effect of the Laboratory's ISSM efforts. This process was recognized by DOE as a best practice and model program for self-assessment and training. In 2004, the second Self-Assessment was launched. The cornerstone of this process was an employee survey that was designed to meet several objectives: (1) Ensure that Laboratory assets are protected. (2) Provide a measurement of the Laboratory's current security status that can be compared against the 2002 Self-Assessment baseline. (3) Educate all Laboratory staff about security responsibilities, tools, and practices. (4) Provide security staff with feedback on the effectiveness of security programs. (5) Provide line management with the information they need to make informed decisions about security. This 2004 Self Assessment process began in July 2004 with every employee receiving an information packet and instructions for completing the ISSM survey. The Laboratory-wide survey contained questions designed to measure awareness and conformance to policy and best practices. The survey response was excellent--90% of Berkeley Lab employees completed the questionnaire. ISSM liaisons from each division followed up on the initial survey results with individual employees to improve awareness and resolve ambiguities uncovered by the questionnaire. As with the 2002 survey, the Self-Assessment produced immediate positive results for the ISSM program and revealed opportunities for longer-term corrective actions. Results of the questionnaire provided information for organizational profiles and an institutional summary. The overall level of security protection and awareness was very high--often above 90%. Post-survey work by the ISSM liaisons and line management consistently led to improved awareness and metrics, as shown by a comparison of

  13. Risk assessment of climate systems for national security.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing; Conrad, Stephen Hamilton; Constantine, Paul G; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

    2012-10-01

    Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

  14. Assessing the Risk Situation of Network Security for Active Defense

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xiang; YAO Shuping; TANG Chenghua

    2006-01-01

    The risk situation assessment and forecast technique of network security is a basic method of active defense techniques. In order to assess the risk of network security two methods were used to define the index of risk and forecast index in time series, they were analytical hierarchy process (AHP) and support vector regression (SVR). The module framework applied the methods above was also discussed. Experiment results showed the forecast values were so close to actual values and so it proved the approach is correct.

  15. Assessing Causality in a Complex Security Environment

    Science.gov (United States)

    2015-01-01

    how. “The Arab Spring. That shows that the image of an Iraqi woman holding up her purple fingertip after having voted, it resonated with the entire...would not disturb the dream world of self -worship in which he so often chose to live.”5 Assess the Full Spectrum of Causal Factors Involved. Since...desires and perceptions that we have. Just as a mirror reflects us, mirror-imaging suggests the danger of projecting our strategic preferences onto

  16. Dynamic Data Possession Checking for Secure Cloud Storage Service

    Directory of Open Access Journals (Sweden)

    Wenzhe Jiao

    2013-12-01

    Full Text Available Using cloud storage service, data owners can access their data anywhere at any time and enjoy the on-demand high quality applications and services, without the burden of local data storage and maintenance. Meanwhile, the risk of losing data stored with any untrustworthy service provider is the key barrier to widely adopt cloud storage service. To verify the integrity of data stored in cloud and relieve the security concerns of customers, a privacy-preserving data possession checking (DPC scheme is presented. This scheme uses Merkle Hash Tree to support fully dynamic data operations. To achieve robustness, forward error-correcting codes can be combined with the proposed DPC scheme, which can recover the data when a small amount of file has been corrupted. The scheme allows unlimited times verification without the need for the verifier to compare against the original data, which reduces the communication and computation complexity dramatically and preserves the privacy of the data. Extensive security analysis and simulation show that the proposed scheme is highly provably secure.

  17. ArgueSecure: Out-of-the-box Risk Assessment

    NARCIS (Netherlands)

    Ionita, Dan; Kegel, Roeland; Wieringa, Roel; Baltuta, Andrei

    2016-01-01

    Most established security risk assessment methodologies aim to produce ranked lists of risks. But ranking requires quantification of risks, which in turn relies on data which may not be available or estimations which might not be accurate. As an alternative, we have previously proposed argumentation

  18. 49 CFR 1540.209 - Fees for security threat assessment.

    Science.gov (United States)

    2010-10-01

    ... current cost of conducting security threat assessments. TSA determines fee amounts and any necessary revisions to the fee amounts based on current costs, using a method of analysis consistent with widely accepted accounting principles and practices, and calculated in accordance with the provisions of 31...

  19. Information Uncertainty to Compare Qualitative Reasoning Security Risk Assessment Results

    Energy Technology Data Exchange (ETDEWEB)

    Chavez, Gregory M [Los Alamos National Laboratory; Key, Brian P [Los Alamos National Laboratory; Zerkle, David K [Los Alamos National Laboratory; Shevitz, Daniel W [Los Alamos National Laboratory

    2009-01-01

    The security risk associated with malevolent acts such as those of terrorism are often void of the historical data required for a traditional PRA. Most information available to conduct security risk assessments for these malevolent acts is obtained from subject matter experts as subjective judgements. Qualitative reasoning approaches such as approximate reasoning and evidential reasoning are useful for modeling the predicted risk from information provided by subject matter experts. Absent from these approaches is a consistent means to compare the security risk assessment results. Associated with each predicted risk reasoning result is a quantifiable amount of information uncertainty which can be measured and used to compare the results. This paper explores using entropy measures to quantify the information uncertainty associated with conflict and non-specificity in the predicted reasoning results. The measured quantities of conflict and non-specificity can ultimately be used to compare qualitative reasoning results which are important in triage studies and ultimately resource allocation. Straight forward extensions of previous entropy measures are presented here to quantify the non-specificity and conflict associated with security risk assessment results obtained from qualitative reasoning models.

  20. Development and Application of a New Grey Dynamic Hierarchy Analysis System (GDHAS for Evaluating Urban Ecological Security

    Directory of Open Access Journals (Sweden)

    Qiang Xie

    2013-05-01

    Full Text Available Selecting indicators based on the characteristics and development trends of a given study area is essential for building a framework for assessing urban ecological security. However, few studies have focused on how to select the representative indicators systematically, and quantitative research is lacking. We developed an innovative quantitative modeling approach called the grey dynamic hierarchy analytic system (GDHAS for both the procedures of indicator selection and quantitative assessment of urban ecological security. Next, a systematic methodology based on the GDHAS is developed to assess urban ecological security comprehensively and dynamically. This assessment includes indicator selection, driving force-pressure-state-impact-response (DPSIR framework building, and quantitative evaluation. We applied this systematic methodology to assess the urban ecological security of Tianjin, which is a typical coastal super megalopolis and the industry base in China. This case study highlights the key features of our approach. First, 39 representative indicators are selected for the evaluation index system from 62 alternative ones available through the GDHAS. Second, the DPSIR framework is established based on the indicators selected, and the quantitative assessment of the eco-security of Tianjin is conducted. The results illustrate the following: urban ecological security of Tianjin in 2008 was in alert level but not very stable; the driving force and pressure subsystems were in good condition, but the eco-security levels of the remainder of the subsystems were relatively low; the pressure subsystem was the key to urban ecological security; and 10 indicators are defined as the key indicators for five subsystems. These results can be used as the basis for urban eco-environmental management.

  1. Conceptual Framework of Energy Security Assessment in Korea

    Energy Technology Data Exchange (ETDEWEB)

    Moon, Kee Hwan; Chung, Whan Sam; Kim, Seung Su [KAERI, Daejeon (Korea, Republic of)

    2016-05-15

    Korea's electric power is an essential source of energy, supplying 21.4% of the energy required by the manufacturing industry, 43.4% of that required for commerce, and 59.5% of that required by the public sector in 2014. Korea relies heavily on imports of energy sources because of its lack of natural resources. Its land area is limited, making it difficult to utilize renewable energy. Moreover, it is difficult to trade electricity through grid connections with neighbouring countries. Considering the key role of electric power in Korea and the circumstances of its power generation industry, we must understand the contribution of each fuel used in power plants to energy sustainability. This study derives the conceptual framework to quantify energy security levels for nuclear power generation in Korea and employ them in evaluating the national energy security. And sample calculation of nuclear energy security indicators is performed. The implications drawn from the evaluation are as follows. Nuclear power demonstrates dominance in the dimensions of economy and technology as the related technologies have entered into the stage of maturity. Without constant technological innovation, however, sustainability of nuclear sources will not be guaranteed. Nuclear has in the middle in terms of SS, but their high volatility impels Korea to pursue the diversification of energy suppliers. The energy security indicators suggested in this study are anticipated to contribute to establishing an energy security policy based on a comprehensive understanding of the energy security status in Korea. In the future, it will be necessary to establish specific scenarios for a decrease of regional conflicts and a post-2020 climate change conventions and conduct realistic and dynamic analyses.

  2. A RISK ASSESSMENT METHOD OF THE WIRELESS NETWORK SECURITY

    Institute of Scientific and Technical Information of China (English)

    Zhao Dongmei; Wang Changguang; Ma Jianfeng

    2007-01-01

    The core of network security is the risk assessment.In this letter,a risk assessment method is introduced to estimate the wireless network security.The method,which combines Analytic Hierarchy Process(AHP)method and fuzzy logical method,is applied to the risk assessment.Fuzzy logical method is applied to judge the important degree of each factor in the aspects of the probability,the influence and the uncontrollability,not to directly judge the important degree itself.The risk assessment is carved up 3 layers applying AHP method,the sort weight of the third layer is calculated by fuzzy logical method.Finally,the important degree is calculated by AHP method.By comparing the important degree of each factor,the risk which can be controlled by taking measures is known.The study of the case shows that the method can be easily used to the risk assessment of the wireless network security and its results conform to the actual situation.

  3. 49 CFR 1540.203 - Security threat assessment.

    Science.gov (United States)

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY CIVIL AVIATION SECURITY: GENERAL RULES... Transportation Worker Identification Credential or Hazardous Materials Endorsement programs. (3) A...

  4. Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security.

    Science.gov (United States)

    Pavone, Vincenzo; Esposti, Sara Degli

    2012-07-01

    As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.

  5. Water security assessment using blue and green water footprint concepts

    Science.gov (United States)

    Veettil, Anoop Valiya; Mishra, Ashok K.

    2016-11-01

    The quantitative assessment of water security using the concept of blue and green water footprints can improve water resources management at local to regional scale. We developed an integrated modeling framework by considering both climatic and anthropogenic factors to investigate spatio-temporal variability of blue and green water availability and to quantify the water security in a river basin. The proposed modeling framework can be useful for providing an overview of the water security within the watershed and to identify water stress (hot spots) regions within the river basin. We applied Soil and Water Assessment Tool (SWAT) to quantify the availability of fresh water (blue water and green water) in Savannah River Basin (SRB), USA. The anthropogenic factors (e.g., water demand) and Environmental Flow Requirement (EFR) information are incorporated to quantify the water security in terms of scarcity and vulnerability indices. A higher amount of blue water was observed for counties located in the upper part of SRB and higher green water flow was observed for counties that has the presence of intensive agriculture and large water bodies (e.g., reservoir). A time lag exists between the maximum rainfall during June-September and the maximum blue water observed in December-March. The study also analyzed the monthly variation of blue and green water flow for counties located in SRB. We expect that the water security assessment can provide useful information for understanding the emerging hot spots within a river basin (eco-system) due to the abstraction of water for human activities, such as irrigation, industrial use, energy production and domestic use.

  6. Resilience to leaking--dynamic systems modeling of information security.

    Science.gov (United States)

    Hamacher, Kay

    2012-01-01

    Leaking of confidential material is a major threat to information security within organizations and to society as a whole. This insight has gained traction in the political realm since the activities of Wikileaks, which hopes to attack 'unjust' systems or 'conspiracies'. Eventually, such threats to information security rely on a biologistic argument on the benefits and drawbacks that uncontrolled leaking might pose for 'just' and 'unjust' entities. Such biological metaphors are almost exclusively based on the economic advantage of participants. Here, I introduce a mathematical model of the complex dynamics implied by leaking. The complex interactions of adversaries are modeled by coupled logistic equations including network effects of econo-communication networks. The modeling shows, that there might arise situations where the leaking envisioned and encouraged by Wikileaks and the like can strengthen the defending entity (the 'conspiracy'). In particular, the only severe impact leaking can have on an organization seems to originate in the exploitation of leaks by another entity the organization competes with. Therefore, the model suggests that leaks can be used as a `tactical mean' in direct adversary relations, but do not necessarily increase public benefit and societal immunization to 'conspiracies'. Furthermore, within the model the exploitation of the (open) competition between entities seems to be a more promising approach to control malicious organizations : divide-et-impera policies triumph here.

  7. Resilience to Leaking — Dynamic Systems Modeling of Information Security

    Science.gov (United States)

    Hamacher, Kay

    2012-01-01

    Leaking of confidential material is a major threat to information security within organizations and to society as a whole. This insight has gained traction in the political realm since the activities of Wikileaks, which hopes to attack ‘unjust’ systems or ‘conspiracies’. Eventually, such threats to information security rely on a biologistic argument on the benefits and drawbacks that uncontrolled leaking might pose for ‘just’ and ‘unjust’ entities. Such biological metaphors are almost exclusively based on the economic advantage of participants. Here, I introduce a mathematical model of the complex dynamics implied by leaking. The complex interactions of adversaries are modeled by coupled logistic equations including network effects of econo-communication networks. The modeling shows, that there might arise situations where the leaking envisioned and encouraged by Wikileaks and the like can strengthen the defending entity (the ‘conspiracy’). In particular, the only severe impact leaking can have on an organization seems to originate in the exploitation of leaks by another entity the organization competes with. Therefore, the model suggests that leaks can be used as a `tactical mean’ in direct adversary relations, but do not necessarily increase public benefit and societal immunization to ‘conspiracies’. Furthermore, within the model the exploitation of the (open) competition between entities seems to be a more promising approach to control malicious organizations : divide-et-impera policies triumph here. PMID:23227151

  8. Resilience to leaking--dynamic systems modeling of information security.

    Directory of Open Access Journals (Sweden)

    Kay Hamacher

    Full Text Available Leaking of confidential material is a major threat to information security within organizations and to society as a whole. This insight has gained traction in the political realm since the activities of Wikileaks, which hopes to attack 'unjust' systems or 'conspiracies'. Eventually, such threats to information security rely on a biologistic argument on the benefits and drawbacks that uncontrolled leaking might pose for 'just' and 'unjust' entities. Such biological metaphors are almost exclusively based on the economic advantage of participants. Here, I introduce a mathematical model of the complex dynamics implied by leaking. The complex interactions of adversaries are modeled by coupled logistic equations including network effects of econo-communication networks. The modeling shows, that there might arise situations where the leaking envisioned and encouraged by Wikileaks and the like can strengthen the defending entity (the 'conspiracy'. In particular, the only severe impact leaking can have on an organization seems to originate in the exploitation of leaks by another entity the organization competes with. Therefore, the model suggests that leaks can be used as a `tactical mean' in direct adversary relations, but do not necessarily increase public benefit and societal immunization to 'conspiracies'. Furthermore, within the model the exploitation of the (open competition between entities seems to be a more promising approach to control malicious organizations : divide-et-impera policies triumph here.

  9. 33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.

    Science.gov (United States)

    2010-07-01

    ... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT... Security (AMS) Assessment § 103.405 Elements of the Area Maritime Security (AMS) Assessment. (a) The AMS... paragraph (a) of this section, an AMS Assessment should consider each of the following: (1)...

  10. Information Security: A Scientometric Study of the Profile, Structure, and Dynamics of an Emerging Scholarly Specialty

    Science.gov (United States)

    Olijnyk, Nicholas Victor

    2014-01-01

    The central aim of the current research is to explore and describe the profile, dynamics, and structure of the information security specialty. This study's objectives are guided by four research questions: 1. What are the salient features of information security as a specialty? 2. How has the information security specialty emerged and evolved from…

  11. Quantitative Vulnerability Assessment of Cyber Security for Distribution Automation Systems

    Directory of Open Access Journals (Sweden)

    Xiaming Ye

    2015-06-01

    Full Text Available The distribution automation system (DAS is vulnerable to cyber-attacks due to the widespread use of terminal devices and standard communication protocols. On account of the cost of defense, it is impossible to ensure the security of every device in the DAS. Given this background, a novel quantitative vulnerability assessment model of cyber security for DAS is developed in this paper. In the assessment model, the potential physical consequences of cyber-attacks are analyzed from two levels: terminal device level and control center server level. Then, the attack process is modeled based on game theory and the relationships among different vulnerabilities are analyzed by introducing a vulnerability adjacency matrix. Finally, the application process of the proposed methodology is illustrated through a case study based on bus 2 of the Roy Billinton Test System (RBTS. The results demonstrate the reasonability and effectiveness of the proposed methodology.

  12. Asset-Centric Security Risk Assessment of Software Components

    OpenAIRE

    Rauter, Tobias; Höller, Andrea; Kajtazovic, Nermin; Kreiner, Christian

    2016-01-01

    Risk management is a crucial process for the development of secure systems. Valuable objects (assets) must be identified and protected. In order to prioritize the protection mechanisms, the values of assets need to be quantified. More valuable or exposed assets require more powerful protection. There are many risk assessment approaches that aim to provide a metric to generate this quantification for different domains. In software systems, these assets are reflected in res...

  13. Dynamical systems probabilistic risk assessment.

    Energy Technology Data Exchange (ETDEWEB)

    Denman, Matthew R.; Ames, Arlo Leroy

    2014-03-01

    Probabilistic Risk Assessment (PRA) is the primary tool used to risk-inform nuclear power regulatory and licensing activities. Risk-informed regulations are intended to reduce inherent conservatism in regulatory metrics (e.g., allowable operating conditions and technical specifications) which are built into the regulatory framework by quantifying both the total risk profile as well as the change in the risk profile caused by an event or action (e.g., in-service inspection procedures or power uprates). Dynamical Systems (DS) analysis has been used to understand unintended time-dependent feedbacks in both industrial and organizational settings. In dynamical systems analysis, feedback loops can be characterized and studied as a function of time to describe the changes to the reliability of plant Structures, Systems and Components (SSCs). While DS has been used in many subject areas, some even within the PRA community, it has not been applied toward creating long-time horizon, dynamic PRAs (with time scales ranging between days and decades depending upon the analysis). Understanding slowly developing dynamic effects, such as wear-out, on SSC reliabilities may be instrumental in ensuring a safely and reliably operating nuclear fleet. Improving the estimation of a plant's continuously changing risk profile will allow for more meaningful risk insights, greater stakeholder confidence in risk insights, and increased operational flexibility.

  14. Dynamical systems probabilistic risk assessment

    Energy Technology Data Exchange (ETDEWEB)

    Denman, Matthew R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Ames, Arlo Leroy [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-03-01

    Probabilistic Risk Assessment (PRA) is the primary tool used to risk-inform nuclear power regulatory and licensing activities. Risk-informed regulations are intended to reduce inherent conservatism in regulatory metrics (e.g., allowable operating conditions and technical specifications) which are built into the regulatory framework by quantifying both the total risk profile as well as the change in the risk profile caused by an event or action (e.g., in-service inspection procedures or power uprates). Dynamical Systems (DS) analysis has been used to understand unintended time-dependent feedbacks in both industrial and organizational settings. In dynamical systems analysis, feedback loops can be characterized and studied as a function of time to describe the changes to the reliability of plant Structures, Systems and Components (SSCs). While DS has been used in many subject areas, some even within the PRA community, it has not been applied toward creating long-time horizon, dynamic PRAs (with time scales ranging between days and decades depending upon the analysis). Understanding slowly developing dynamic effects, such as wear-out, on SSC reliabilities may be instrumental in ensuring a safely and reliably operating nuclear fleet. Improving the estimation of a plant's continuously changing risk profile will allow for more meaningful risk insights, greater stakeholder confidence in risk insights, and increased operational flexibility.

  15. Security assessment for intentional island operation in modern power system

    DEFF Research Database (Denmark)

    Chen, Yu; Xu, Zhao; Østergaard, Jacob

    2011-01-01

    operator can clearly know if it is suitable to conduct island operation at one specific moment. Besides, in order to improve the computation efficiency, the Artificial Neural Network (ANN) is applied for fast ISR formation. Thus, online application of ISR based islanding security assessment could......There has been a high penetration level of Distributed Generations (DGs) in distribution systems in Denmark. Even more DGs are expected to be installed in the coming years. With that, to utilize them in maintaining the security of power supply is of great concern for Danish utilities. During...... the emergency in the power system, some distribution networks may be intentionally separated from the main grid to avoid complete system collapse. If DGs in those networks could continuously run instead of immediately being shut down, the blackout could be avoided and the reliability of supply could...

  16. Assessing and comparing information security in swiss hospitals.

    Science.gov (United States)

    Landolt, Sarah; Hirschel, Jürg; Schlienger, Thomas; Businger, Walter; Zbinden, Alex M

    2012-11-07

    Availability of information in hospitals is an important prerequisite for good service. Significant resources have been invested to improve the availability of information, but it is also vital that the security of this information can be guaranteed. The goal of this study was to assess information security in hospitals through a questionnaire based on the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) standard ISO/IEC 27002, evaluating Information technology - Security techniques - Code of practice for information-security management, with a special focus on the effect of the hospitals' size and type. The survey, set up as a cross-sectional study, was conducted in January 2011. The chief information officers (CIOs) of 112 hospitals in German-speaking Switzerland were invited to participate. The online questionnaire was designed to be fast and easy to complete to maximize participation. To group the analyzed controls of the ISO/IEC standard 27002 in a meaningful way, a factor analysis was performed. A linear score from 0 (not implemented) to 3 (fully implemented) was introduced. The scores of the hospitals were then analyzed for significant differences in any of the factors with respect to size and type of hospital. The participating hospitals were offered a benchmark report about their status. The 51 participating hospitals had an average score of 51.1% (range 30.6% - 81.9%) out of a possible 100% where all items in the questionnaire were fully implemented. Room for improvement could be identified, especially for the factors covering "process and quality management" (average score 1.3 ± 0.8 out of a maximum of 3) and "organization and risk management" (average score 1.3 ± 0.7 out of a maximum of 3). Private hospitals scored significantly higher than university hospitals in the implementation of "security zones" and "backup" (P = .008). Half (50.00%, 8588/17,177) of all assessed hospital beds

  17. Three tenets for secure cyber-physical system design and assessment

    Science.gov (United States)

    Hughes, Jeff; Cybenko, George

    2014-06-01

    This paper presents a threat-driven quantitative mathematical framework for secure cyber-physical system design and assessment. Called The Three Tenets, this originally empirical approach has been used by the US Air Force Research Laboratory (AFRL) for secure system research and development. The Tenets were first documented in 2005 as a teachable methodology. The Tenets are motivated by a system threat model that itself consists of three elements which must exist for successful attacks to occur: - system susceptibility; - threat accessibility and; - threat capability. The Three Tenets arise naturally by countering each threat element individually. Specifically, the tenets are: Tenet 1: Focus on What's Critical - systems should include only essential functions (to reduce susceptibility); Tenet 2: Move Key Assets Out-of-Band - make mission essential elements and security controls difficult for attackers to reach logically and physically (to reduce accessibility); Tenet 3: Detect, React, Adapt - confound the attacker by implementing sensing system elements with dynamic response technologies (to counteract the attackers' capabilities). As a design methodology, the Tenets mitigate reverse engineering and subsequent attacks on complex systems. Quantified by a Bayesian analysis and further justified by analytic properties of attack graph models, the Tenets suggest concrete cyber security metrics for system assessment.

  18. PMU-Aided Voltage Security Assessment for a Wind Power Plant: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Jiang, H.; Zhang, Y. C.; Zhang, J. J.; Muljadi, E.

    2015-04-08

    Because wind power penetration levels in electric power systems are continuously increasing, voltage stability is a critical issue for maintaining power system security and operation. The traditional methods to analyze voltage stability can be classified into two categories: dynamic and steady-state. Dynamic analysis relies on time-domain simulations of faults at different locations; however, this method needs to exhaust faults at all locations to find the security region for voltage at a single bus. With the widely located phasor measurement units (PMUs), the Thevenin equivalent matrix can be calculated by the voltage and current information collected by the PMUs. This paper proposes a method based on a Thevenin equivalent matrix to identify system locations that will have the greatest impact on the voltage at the wind power plant’s point of interconnection. The number of dynamic voltage stability analysis runs is greatly reduced by using the proposed method. The numerical results demonstrate the feasibility, effectiveness, and robustness of the proposed approach for voltage security assessment for a wind power plant.

  19. PMU-Aided Voltage Security Assessment for a Wind Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Jiang, Huaiguang; Zhang, Yingchen; Zhang, Jun Jason; Muljadi, Eduard

    2015-10-05

    Because wind power penetration levels in electric power systems are continuously increasing, voltage stability is a critical issue for maintaining power system security and operation. The traditional methods to analyze voltage stability can be classified into two categories: dynamic and steady-state. Dynamic analysis relies on time-domain simulations of faults at different locations; however, this method needs to exhaust faults at all locations to find the security region for voltage at a single bus. With the widely located phasor measurement units (PMUs), the Thevenin equivalent matrix can be calculated by the voltage and current information collected by the PMUs. This paper proposes a method based on a Thevenin equivalent matrix to identify system locations that will have the greatest impact on the voltage at the wind power plant's point of interconnection. The number of dynamic voltage stability analysis runs is greatly reduced by using the proposed method. The numerical results demonstrate the feasibility, effectiveness, and robustness of the proposed approach for voltage security assessment for a wind power plant.

  20. Assessing work disability for social security benefits: international models for the direct assessment of work capacity.

    Science.gov (United States)

    Geiger, Ben Baumberg; Garthwaite, Kayleigh; Warren, Jon; Bambra, Clare

    2017-08-25

    It has been argued that social security disability assessments should directly assess claimants' work capacity, rather than relying on proxies such as on functioning. However, there is little academic discussion of how such assessments could be conducted. The article presents an account of different models of direct disability assessments based on case studies of the Netherlands, Germany, Denmark, Norway, the United States of America, Canada, Australia, and New Zealand, utilising over 150 documents and 40 expert interviews. Three models of direct work disability assessments can be observed: (i) structured assessment, which measures the functional demands of jobs across the national economy and compares these to claimants' functional capacities; (ii) demonstrated assessment, which looks at claimants' actual experiences in the labour market and infers a lack of work capacity from the failure of a concerned rehabilitation attempt; and (iii) expert assessment, based on the judgement of skilled professionals. Direct disability assessment within social security is not just theoretically desirable, but can be implemented in practice. We have shown that there are three distinct ways that this can be done, each with different strengths and weaknesses. Further research is needed to clarify the costs, validity/legitimacy, and consequences of these different models. Implications for rehabilitation It has recently been argued that social security disability assessments should directly assess work capacity rather than simply assessing functioning - but we have no understanding about how this can be done in practice. Based on case studies of nine countries, we show that direct disability assessment can be implemented, and argue that there are three different ways of doing it. These are "demonstrated assessment" (using claimants' experiences in the labour market), "structured assessment" (matching functional requirements to workplace demands), and "expert assessment" (the

  1. Steady state security assessment in deregulated power systems

    Science.gov (United States)

    Manjure, Durgesh Padmakar

    Power system operations are undergoing changes, brought about primarily due to deregulation and subsequent restructuring of the power industry. The primary intention of the introduction of deregulation in power systems was to bring about competition and improved customer focus. The underlying motive was increased economic benefit. Present day power system analysis is much different than what it was earlier, essentially due to the transformation of the power industry from being cost-based to one that is price-based and due to open access of transmission networks to the various market participants. Power is now treated as a commodity and is traded in an open market. The resultant interdependence of the technical criteria and the economic considerations has only accentuated the need for accurate analysis in power systems. The main impetus in security analysis studies is on efficient assessment of the post-contingency status of the system, accuracy being of secondary consideration. In most cases, given the time frame involved, it is not feasible to run a complete AC load flow for determining the post-contingency state of the system. Quite often, it is not warranted as well, as an indication of the state of the system is desired rather than the exact quantification of the various state variables. With the inception of deregulation, transmission networks are subjected to a host of multilateral transactions, which would influence physical system quantities like real power flows, security margins and voltage levels. For efficient asset utilization and maximization of the revenue, more often than not, transmission networks are operated under stressed conditions, close to security limits. Therefore, a quantitative assessment of the extent to which each transaction adversely affects the transmission network is required. This needs to be done accurately as the feasibility of the power transactions and subsequent decisions (execution, curtailment, pricing) would depend upon the

  2. Reliability, compliance, and security in web-based course assessments

    Directory of Open Access Journals (Sweden)

    Scott Bonham

    2008-04-01

    Full Text Available Pre- and postcourse assessment has become a very important tool for education research in physics and other areas. The web offers an attractive alternative to in-class paper administration, but concerns about web-based administration include reliability due to changes in medium, student compliance rates, and test security, both question leakage and utilization of web resources. An investigation was carried out in introductory astronomy courses comparing pre- and postcourse administration of assessments using the web and on paper. Overall no difference was seen in performance due to the medium. Compliance rates fluctuated greatly, and factors that seemed to produce higher rates are identified. Notably, email reminders increased compliance by 20%. Most of the 559 students complied with requests to not copy, print, or save questions nor use web resources; about 1% did copy some question text and around 2% frequently used other windows or applications while completing the assessment.

  3. Reliability, compliance, and security in web-based course assessments

    Directory of Open Access Journals (Sweden)

    Scott Bonham

    2008-04-01

    Full Text Available Pre- and postcourse assessment has become a very important tool for education research in physics and other areas. The web offers an attractive alternative to in-class paper administration, but concerns about web-based administration include reliability due to changes in medium, student compliance rates, and test security, both question leakage and utilization of web resources. An investigation was carried out in introductory astronomy courses comparing pre- and postcourse administration of assessments using the web and on paper. Overall no difference was seen in performance due to the medium. Compliance rates fluctuated greatly, and factors that seemed to produce higher rates are identified. Notably, email reminders increased compliance by 20%. Most of the 559 students complied with requests to not copy, print, or save questions nor use web resources; about 1% did copy some question text and around 2% frequently used other windows or applications while completing the assessment.

  4. Cyber security risk assessment for SCADA and DCS networks.

    Science.gov (United States)

    Ralston, P A S; Graham, J H; Hieb, J L

    2007-10-01

    The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs). It is critical that engineers and managers understand these issues and know how to locate the information they need. This paper provides a broad overview of cyber security and risk assessment for SCADA and DCS, introduces the main industry organizations and government groups working in this area, and gives a comprehensive review of the literature to date. Major concepts related to the risk assessment methods are introduced with references cited for more detail. Included are risk assessment methods such as HHM, IIM, and RFRM which have been applied successfully to SCADA systems with many interdependencies and have highlighted the need for quantifiable metrics. Presented in broad terms is probability risk analysis (PRA) which includes methods such as FTA, ETA, and FEMA. The paper concludes with a general discussion of two recent methods (one based on compromise graphs and one on augmented vulnerability trees) that quantitatively determine the probability of an attack, the impact of the attack, and the reduction in risk associated with a particular countermeasure.

  5. The Euro-Mediterranean Partnership: Critical Assessment of the Security Aspects

    OpenAIRE

    2004-01-01

    This thesis attempts to assess the security aspect of the Barcelona Process (Process), or so called Euro-Mediterranean Partnership (EMP) within the theoretical framework of new regionalism and the Copenhagen School (Security complex theory) which agrees with neo/realism, neo-liberal institutionalism and constructivism in some aspects. The end of the Cold War broadened the security agenda and new security concerns emerged. Actually, most of the so- called security threats are not new, but the ...

  6. Secure physical layer using dynamic permutations in cognitive OFDMA systems

    DEFF Research Database (Denmark)

    Meucci, F.; Wardana, Satya Ardhy; Prasad, Neeli R.

    2009-01-01

    This paper proposes a novel lightweight mechanism for a secure Physical (PHY) layer in Cognitive Radio Network (CRN) using Orthogonal Frequency Division Multiplexing (OFDM). User's data symbols are mapped over the physical subcarriers with a permutation formula. The PHY layer is secured...... of the permutations are analyzed for several DSA patterns. Simulations are performed according to the parameters of the IEEE 802.16e system model. The securing mechanism proposed provides intrinsic PHY layer security and it can be easily implemented in the current IEEE 802.16 standard applying almost negligible...

  7. Research of Network Security Situational Assessment Quantization Based on Mobile Agent

    Science.gov (United States)

    Xiaorong, Cheng; Su, Lang; Mingxuan, Li

    As the security situational assessment widely applying to the computer network field, scholars have designed and implemented a large number of network security situational assessment methods. However, most works are based on local area network and single host, which is hardly to meet the demand of large-scale network security assessment. In this paper, we based on quantitative hierarchical network security situational assessment model, introduced the mobile agent technology, designed the distributed computing for large-scale network and evaluated the whole network security situation for future prediction.

  8. Monitoring and Forecasting Reference Evapotranspiration for Food Security Assessments

    Science.gov (United States)

    Shukla, S.; Hobbins, M.; McEvoy, D.; Husak, G. J.; Dewes, C.; McNally, A.; Huntington, J. L.; Funk, C. C.; Verdin, J. P.

    2016-12-01

    Reference evapotranspiration (Ref ET; driven by temperature, humidity, wind speed, and solar radiation) and precipitation are the two most important climatic drivers of seasonal crop yields, which are directly associated with food security in several parts of the globe. In the last decade or so, significant strides have been made by the Famine Early Warning Systems Network (FEWS NET) team and collaborators, towards improving precipitation monitoring. However, efforts to improve Ref ET monitoring and forecasting have thus far lagged by comparison. This presentation describes ongoing activities of the FEWS NET team and collaborators towards the development and implementation of a near-real time Ref ET monitoring and forecasting system, focusing primarily on the food-insecure FEWS NET countries. Due to a lack of in situ observations of meteorological forcings, the Ref ET monitoring dataset, which is calculated using the Penman-Monteith formulation of the ASCE Standardized Reference ET, uses NASA's MERRA-2 atmospheric forcings and is spatially downscaled using a finer resolution climatology of the International Water Management Institute global PET dataset. Ref ET forecasts (up to 6 months lead time) are calculated using seasonal climate forecasts from NCEP's CFSv2 and NASA's GEOS-5 models. Long-term (since early 1980s through 2015) evaluation of Ref ET monitoring and forecast datasets and the approach to provide operational updates of both datasets in near-real time, are summarized in this presentation. As a case study, the influence of improved Ref ET monitoring and Ref ET forecasts on crop yield estimates and food security outlooks in East Africa is also examined using the Water Requirement Satisfaction Index model. In summary, this presentation highlights the importance of monitoring and forecasting Ref ET for food security assessments and early warning.

  9. Dynamic Data Storage and Public Auditability for Cloud Storage Security

    DEFF Research Database (Denmark)

    Banoth, Rajkumar

    2012-01-01

    IT has moved into next generation with cloud computing being realized. The way application software and databases are stored has been changed. Now they are stored in cloud data centers in which security is a concern from client point of view. The new phenomenon which is used to store and manage...... data without capital investment has brought many security challenges which are not thoroughly understood. This paper focuses on the security and integrity of data stored in cloud data servers. The data integrity verification is done by using a third party auditor who is authorized to check integrity...

  10. Primary, secondary and tertiary frequency control in dynamic security analyses of electric power interconnections

    Directory of Open Access Journals (Sweden)

    Ivanović Milan

    2012-01-01

    Full Text Available This paper presents the incorporation of primary, secondary and tertiary frequency control in the dynamic security analyses of electric power interconnections. This was done in accordance with the wider environment of the existing state of the Serbian power system. The improved software for dynamic security analysis has been tested on the regional transmission network, which includes power systems of Serbia, Montenegro, Bosnia and Herzegovina, Croatia, Hungary, Macedonia, Romania, Bulgaria, Greece and Albania.

  11. Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report.

    Energy Technology Data Exchange (ETDEWEB)

    Wheeler, Timothy A.; Denman, Matthew R; Williams, R. A.; Martin, Nevin; Jankovsky, Zachary Kyle

    2017-09-01

    Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities. iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber ex- ploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by cou- pling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated im- pact and the associated degree of difficulty to achieve the attack vector) on accident manage- ment establishes a technical risk informed framework for developing effective cyber security controls for nuclear power. iv

  12. Systems Thinking Safety Analysis: Nuclear Security Assessment of Physical Protection System in Nuclear Power Plants

    Directory of Open Access Journals (Sweden)

    Tae Ho Woo

    2013-01-01

    Full Text Available The dynamical assessment has been performed in the aspect of the nuclear power plants (NPPs security. The physical protection system (PPS is constructed by the cyber security evaluation tool (CSET for the nuclear security assessment. The systems thinking algorithm is used for the quantifications by the Vensim software package. There is a period of 60 years which is the life time of NPPs' operation. The maximum possibility happens as 3.59 in the 30th year. The minimum value is done as 1.26 in the 55th year. The difference is about 2.85 times. The results of the case with time delay have shown that the maximum possibility of terror or sabotage incident happens as 447.42 in the 58th year and the minimum value happens as 89.77 in the 51st year. The difference is about 4.98 times. Hence, if the sabotage happens, the worst case is that the intruder can attack the target of the nuclear material in about one and a half hours. The general NPPs are modeled in the study and controlled by the systematic procedures.

  13. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.

    Science.gov (United States)

    Lin, Zhaowen; Tao, Dan; Wang, Zhenji

    2017-04-21

    For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.

  14. Dynamic Tracking and Comprehensive Evaluation on the Natural Resources Security Elements and System in China

    Institute of Scientific and Technical Information of China (English)

    Yao Yulong; Zhou Hong

    2010-01-01

    System theory,pressure-state-response and drivingpressure-state-impact-response model have been applied to establishing China's dynamic tracking evaluation system of natural resources security in this article.Based on analytic hierarchy process and Delphi methods,the natural resources security situation has been evaluated systematically from 1991 to 2007.The result showed that the overall level of China's natural resources security presented a downtrend from 1991 to 2007.The basic reasons are the pressure indicators such as population,GDP,natural resources trade increased gradually,resulting in tension and fragility of natural resources security.

  15. Analysis of Dynamic Complexity of the Cyber Security Ecosystem of Colombia

    Directory of Open Access Journals (Sweden)

    Angélica Flórez

    2016-07-01

    Full Text Available This paper presents two proposals for the analysis of the complexity of the Cyber security Ecosystem of Colombia (CEC. This analysis shows the available knowledge about entities engaged in cyber security in Colombia and the relationships between them, which allow an understanding of the synergy between the different existing components. The complexity of the CEC is detailed from the view of the Influence Diagram of System Dynamics and the Domain Diagram of Software Engineering. The resulting model makes cyber security evident as a strategic component of national security.

  16. Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures

    Science.gov (United States)

    Flammini, Francesco; Gaglione, Andrea; Mazzocca, Nicola; Pragliola, Concetta

    Scientists have been long investigating procedures, models and tools for the risk analysis in several domains, from economics to computer networks. This paper presents a quantitative method and a tool for the security risk assessment and management specifically tailored to the context of railway transportation systems, which are exposed to threats ranging from vandalism to terrorism. The method is based on a reference mathematical model and it is supported by a specifically developed tool. The tool allows for the management of data, including attributes of attack scenarios and effectiveness of protection mechanisms, and the computation of results, including risk and cost/benefit indices. The main focus is on the design of physical protection systems, but the analysis can be extended to logical threats as well. The cost/benefit analysis allows for the evaluation of the return on investment, which is a nowadays important issue to be addressed by risk analysts.

  17. Security and Vulnerability Assessment of Social Media Sites: An Exploratory Study

    Science.gov (United States)

    Zhao, Jensen; Zhao, Sherry Y.

    2015-01-01

    While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…

  18. Security and Vulnerability Assessment of Social Media Sites: An Exploratory Study

    Science.gov (United States)

    Zhao, Jensen; Zhao, Sherry Y.

    2015-01-01

    While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…

  19. Application-Oriented Confidentiality and Integrity Dynamic Union Security Model Based on MLS Policy

    Science.gov (United States)

    Xue, Mingfu; Hu, Aiqun; He, Chunlong

    We propose a new security model based on MLS Policy to achieve a better security performance on confidentiality, integrity and availability. First, it realizes a combination of BLP model and Biba model through a two-dimensional independent adjustment of integrity and confidentiality. And, the subject's access range is adjusted dynamically according to the security label of related objects and the subject's access history. Second, the security level of the trusted subject is extended to writing and reading privilege range respectively, following the principle of least privilege. Third, it adjusts the objects' security levels after adding confidential information to prevent the information disclosure. Fourth, it uses application-oriented logic to protect specific applications to avoid the degradation of security levels. Thus, it can ensure certain applications operate smoothly. Lastly, examples are presented to show the effectiveness and usability of the proposed model.

  20. Dynamic Security Architecture among E-Commerce Websites

    Directory of Open Access Journals (Sweden)

    Ramesh R

    2015-06-01

    Full Text Available Nowadays privileged channel is utilized by the ISPs and other websites for handling privilege services of important clients only, there by normal clients are discriminated against getting access to privilege channel service. Thus a new global movement known as “Net Neutrality” for providing an open and non-discriminating Internet is fast popularizing in India, Europe and other parts of the world. We are proposing a system among E-Commerce websites so that without much difficulty even normal clients are able to access a particular destination website through a source website using privilege channel network without any hindrance from the ISP and also provides a security protocol for safer referrals. The existing system of security protocols doesn’t allow the e-commerce websites to come forward for making the referral service an option for business opportunity. They are reluctant to initiate site-to-site referral due to security risks and other opportunities they need to sacrifice. The proposed system using site graph shows how mutually trusted web servers can effectively implement a secure referral system by coordinating the traffic flow of referred clients. DDoS attacks and Phishing attacks focused on a particular website can be effectively averted by this coordinated security protocol among e-commerce web servers.

  1. Information Security Assessment of SMEs as Coursework -- Learning Information Security Management by Doing

    Science.gov (United States)

    Ilvonen, Ilona

    2013-01-01

    Information security management is an area with a lot of theoretical models. The models are designed to guide practitioners in prioritizing management resources in companies. Information security management education should address the gap between the academic ideals and practice. This paper introduces a teaching method that has been in use as…

  2. A secure dynamic collaboration environment in a cloud context

    DEFF Research Database (Denmark)

    Piechotta, C.; Jensen, Adam Enø; Olsen, Martin Grooss;

    In recent years, the cloud has emerged as an attractive means for hosting and delivering services over the Internet. This has resulted in a renewed focus on information security in the case where data is stored in the virtual space of the cloud and is not physically accessible to the customer. Th...

  3. Social security, dynamic efficiency and self-control problems

    NARCIS (Netherlands)

    A. Bucciol

    2008-01-01

    We develop an OLG model with uncertainty on labor income and death age to study the welfare implications of unfunded Social Security programs in an economy where agents are affected by temptation à la Gul and Pesendorfer (2001, Econometrica 69, 1403). Tempted agents give additional value to the pre-

  4. How a system backfires: dynamics of redundancy problems in security.

    Science.gov (United States)

    Ghaffarzadegan, Navid

    2008-12-01

    Increasing attention is being paid to reliability, safety, and security issues in social systems. Scott Sagan examined why more security forces (a redundancy solution) may lead to less security. He discussed how such a solution can backfire due to three major issues (i.e., "common-mode error,"social shirking," and "overcompensation"). In this article, using Sagan's hypotheses, we simulate and analyze a simple and generic security system as more guards are added to the system. Simulation results support two of Sagan's hypotheses. More specifically, the results show that "common-mode error" causes the system to backfire, and "social shirking" leads to an inefficient system while exacerbating the common-mode error's effect. Simulation results show that "overcompensation" has no effect of backfiring, but it leads the system to a critical state in which it can easily be affected by the common-mode error. Furthermore, the simulation results make us question the importance of the initial power of adversaries (e.g., terrorists) as the results show that, for any exogenous level of adversary power, the system endogenously overcompensates to a level that makes the system more susceptible to being attacked.

  5. Dynamic fragmentation and query translation based security framework for distributed databases

    Directory of Open Access Journals (Sweden)

    Arunabha Sengupta

    2015-09-01

    Full Text Available The existing security models for distributed databases suffer from several drawbacks viz. tight coupling with the choice of database; lack of dynamism, granularity and flexibility; non scalability and vulnerability to intrusion attacks. There is a lack of an integrated flexible and interoperable security framework that can dynamically control access to table, row, column and field level data entity. The objective of this proposed framework is to address the issue of security in distributed query processing using the dynamic fragmentation and query translation methodologies based on a parameterized security model which could be tailored based on the business requirements to take care of relational level, record level, column level as well as the atomic data element level security and access requirements. This solution has been implemented and tested for DML operations on distributed relational databases and the execution results are found to be very promising in terms of restricting access to data elements with higher security clearance; blocking queries that return data at/below user’s level but its evaluation requires accessing columns/rows with higher security clearance; and blocking aggregate queries used for inferring classified information.

  6. 33 CFR 105.305 - Facility Security Assessment (FSA) requirements.

    Science.gov (United States)

    2010-07-01

    ..., personnel identification documents and communication, alarm, lighting, access control, and similar systems...-keeping duties and risk of fatigue on facility personnel alertness and performance; (iv) Security training...

  7. Assessment of Political Vulnerabilities on Security of Energy Supply in the Baltic States

    Directory of Open Access Journals (Sweden)

    Česnakas Giedrius

    2016-06-01

    Full Text Available The article argues that despite the evident link between political environment and security of energy supply, political elements are not sufficiently represented in contemporary scientific literature, namely in indexes that are designed for the assessment of security of energy supply. In an attempt to fill this gap, the article presents an innovative methodology for quantitative assessment of the political vulnerabilities on security of energy supply and applies it to the analysis of the Baltic States.

  8. Pilot Implementation and Preliminary Evaluation of START:AV Assessments in Secure Juvenile Correctional Facilities.

    Science.gov (United States)

    Desmarais, Sarah L; Sellers, Brian G; Viljoen, Jodi L; Cruise, Keith R; Nicholls, Tonia L; Dvoskin, Joel A

    2012-01-01

    The Short-Term Assessment of Risk and Treatability: Adolescent Version (START:AV) is a new structured professional judgment guide for assessing short-term risks in adolescents. The scheme may be distinguished from other youth risk assessment and treatment planning instruments by its inclusion of 23 dynamic factors that are each rated for both vulnerability and strength. In addition, START:AV is also unique in that it focuses on multiple adverse outcomes-namely, violence, self-harm, suicide, unauthorized leave, substance abuse, self-neglect, victimization, and general offending-over the short-term (i.e., weeks to months) rather than long-term (i.e., years). This paper describes a pilot implementation and preliminary evaluation of START:AV in three secure juvenile correctional facilities in the southern United States. Specifically, we examined the descriptive characteristics and psychometric properties of START:AV assessments completed by 21 case managers on 291 adolescent offenders (250 boys and 41 girls) at the time of admission. Results provide preliminary support for the feasibility of completing START:AV assessments as part of routine practice. Findings also highlight differences in the characteristics of START:AV assessments for boys and girls and differential associations between the eight START:AV risk domains. Though results are promising, further research is needed to establish the reliability and validity of START:AV assessments completed in the field.

  9. Climate Change Dynamics and Imperatives for Food Security in Nigeria

    Directory of Open Access Journals (Sweden)

    Olumide D. Onafeso

    2016-02-01

    Full Text Available Decadal variability in African rainfall is projected from General Circulation Models (GCMs to continue under elevated greenhouse gas scenarios. Effects on rain intensity, spatio-temporal variability of growing seasons, flooding, drought, and land-use change impose feedbacks at regional-local scales. Yet, empirical knowledge of associated impacts on crop yield is limited; thus, we examined the imperatives for food security in Nigeria. Bivariate correlation and multiple regression suggests impending drought in the northern region where livestock farming is predominant. Relative contributions of climate independent variables in determining crop yield by backward selection procedures with stepwise approach indexed the impacts of annual climate variability by a parameter computed as annual yield minus mean annual yield divided by the standard deviation. Results show Z-distribution approximately 5 to + 5, when 3 indicate impacts significant at 95% confidence levels. In conclusion, we established the interwoven relationship between climatic change and food security.

  10. PLANNING INTELLIGENCE ACTIVITIES IN A DYNAMIC SECURITY ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Anca Pavel

    2016-10-01

    Full Text Available The hypothesis introduced by this article is that, in order to perform intelligence missions and to obtain valuable intelligence for the consumers it is necessary to implement processes and tools to support planning activities. Today's challenges consist rather in the ability of intelligence organizations to identify and initiate new connections, processes and communication flows with other partners operating in the security environment than to plan in their own name secret operations. From this point of view, planning activities should focus on new procedures, at a much more extensive level in order to align institutional efforts beyond the boundaries of their own organization and the national community of information. Also, in order to coordinate intelligence activities, strategic planning must be anchored into a complex analysis of the potential impact of existing and possible future global phenomena that shape the security environment and thus identify better ways of improving results.

  11. What are we assessing when we measure food security? A compendium and review of current metrics.

    Science.gov (United States)

    Jones, Andrew D; Ngure, Francis M; Pelto, Gretel; Young, Sera L

    2013-09-01

    The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics.

  12. An Information Security Control Assessment Methodology for Organizations

    Science.gov (United States)

    Otero, Angel R.

    2014-01-01

    In an era where use and dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by organizations is more and more serious. Alarming facts within the literature point to inadequacies in information security practices, particularly the evaluation of…

  13. An Information Security Control Assessment Methodology for Organizations

    Science.gov (United States)

    Otero, Angel R.

    2014-01-01

    In an era where use and dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by organizations is more and more serious. Alarming facts within the literature point to inadequacies in information security practices, particularly the evaluation of…

  14. Security

    Science.gov (United States)

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  15. A Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges

    OpenAIRE

    D. Shanmugapriya; Padmavathi, Dr. G.

    2009-01-01

    Biometrics technologies are gaining popularity today since they provide more reliable and efficient means of authentication and verification. Keystroke Dynamics is one of the famous biometric technologies, which will try to identify the authenticity of a user when the user is working via a keyboard. The authentication process is done by observing the change in the typing pattern of the user. A comprehensive survey of the existing keystroke dynamics methods, metrics, different approaches are g...

  16. Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures.

    Energy Technology Data Exchange (ETDEWEB)

    Jaeger, Calvin Dell; Roehrig, Nathaniel S.; Torres, Teresa M.

    2008-12-01

    This document presents the security automated Risk Assessment Methodology (RAM) prototype tool developed by Sandia National Laboratories (SNL). This work leverages SNL's capabilities and skills in security risk analysis and the development of vulnerability assessment/risk assessment methodologies to develop an automated prototype security RAM tool for critical infrastructures (RAM-CITM). The prototype automated RAM tool provides a user-friendly, systematic, and comprehensive risk-based tool to assist CI sector and security professionals in assessing and managing security risk from malevolent threats. The current tool is structured on the basic RAM framework developed by SNL. It is envisioned that this prototype tool will be adapted to meet the requirements of different CI sectors and thereby provide additional capabilities.

  17. 33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.

    Science.gov (United States)

    2010-07-01

    ...) Personnel identification documents; (v) Communication systems; (vi) Alarms; (vii) Lighting; (viii) Access... security assignments; (iii) The impact of watch-keeping duties and risk of fatigue on vessel personnel...

  18. National Security Reform 2010: A Mid-Term Assessment

    Science.gov (United States)

    2011-08-01

    foundation for the NSC’s function was laid under Tru- man. See, for example, John P. Burke , “The National Security Ad- visor and Staff: Transition... Edmund Muskie, and Brent Scowcroft, The Tower Commission Report: The Full Text of the President’s Special Re- view Board, New York: Random House, 1987...446. 15. George H. W. Bush and Brent Scowcroft, A World Trans- formed, New York: Alfred A. Knopf, 1998, p. 31. 16. Burke , “The National Security

  19. Independent Assessment of the Afghan National Security Forces

    Science.gov (United States)

    2014-01-01

    equipment, such as night vision goggles and weapons- mounted lights and lasers that are not part of the conventional ANA forces’ supply chain. U.S...MiG-21 and other helicopters at Shindand airbase, these aircraft were useless without pilots and technicians provided by Dostum in a deal brokered...force posture , and capabilities required to make the Afghan National Security Forces (ANSF) capable of providing security for their own country so as

  20. Uniform Comparison Approach for Different Network security Assessment Using HRCAL Method

    Directory of Open Access Journals (Sweden)

    Ankita Patil

    2015-10-01

    Full Text Available Network security the field of network security is very dynamic, and highly technical field dealing with all aspects of scanning, hacking and securing system against intrusion. And we know that today’s the attacks on internet is major issue, today’s world of technology the fault security is becoming an almost incurable problem in today’s network. For these attacks Here we provide the  situation awareness mechanism to know about the situation of network and let them aware from situation of network. In my previous work, I had provided the situation awareness mechanism that gather the network actual condition and clearly define the boundaries by which security solution can be made and I had also gone to detect network condition and draw the graphs with the help of security metrics. In this paper I am going to compared my proposed work with other work.

  1. The Concept of Security Revisited New Approaches: Human Security and Risk Assessment

    OpenAIRE

    Adriana Mărgărit

    2009-01-01

    The field of study of security is confronted today with a proliferation of security relatedconcepts. In this regard we can mention various concepts, such as: “transnational security”, “extendedsecurity”, “human security”, “global security”, “cooperative security”, “international security”,“economic security” and many others. Ever since the end of the Cold War, the concept of humansecurity began to appear more often in the speeches of scholars, policy makers and even the media.Despite the more...

  2. Spatio-temporal dynamics of security investments in an interdependent risk environment

    Science.gov (United States)

    Shafi, Kamran; Bender, Axel; Zhong, Weicai; Abbass, Hussein A.

    2012-10-01

    In a globalised world where risks spread through contagion, the decision of an entity to invest in securing its premises from stochastic risks no longer depends solely on its own actions but also on the actions of other interacting entities in the system. This phenomenon is commonly seen in many domains including airline, logistics and computer security and is referred to as Interdependent Security (IDS). An IDS game models this decision problem from a game-theoretic perspective and deals with the behavioural dynamics of risk-reduction investments in such settings. This paper enhances this model and investigates the spatio-temporal aspects of the IDS games. The spatio-temporal dynamics are studied using simple replicator dynamics on a variety of network structures and for various security cost tradeoffs that lead to different Nash equilibria in an IDS game. The simulation results show that the neighbourhood configuration has a greater effect on the IDS game dynamics than network structure. An in-depth empirical analysis of game dynamics is carried out on regular graphs, which leads to the articulation of necessary and sufficient conditions for dominance in IDS games under spatial constraints.

  3. A dynamic systems approach to family assessment

    NARCIS (Netherlands)

    van Geert, PLC; Lichtwarck-Aschoff, A

    2005-01-01

    The dynamic systems approach provides a general framework for studying processes. Properties of that approach are applied to the issue of fan-lily assessment. The description covers methods of assessment of short-term processes (e.g., dyadic interaction) and long-term processes (e.g., changes in int

  4. Dynamic Assessment in the Language Classroom

    Science.gov (United States)

    Poehner, Matthew E.; Lantolf, James P.

    2005-01-01

    The focus of this paper is on the implementation of Dynamic Assessment (henceforth, DA) in the L2 classroom setting. DA is an approach to assessment and instruction derived from Vygotsky's theory of the Zone of Proximal Development (henceforth, ZPD). In what follows, we will first discuss briefly the concept of the ZPD and its realization in DA…

  5. Dynamic Auditing Protocol for Efficient and Secure Data Storage in Cloud Computing

    Directory of Open Access Journals (Sweden)

    J. Noorul Ameen

    2014-06-01

    Full Text Available Cloud computing, where the data has been stored on cloud servers and retrieved by users (data consumers the data from cloud servers. However, there are some security challenges which are in need of independent auditing services to verify the data integrity and safety in the cloud. Until now a numerous methods has been developed for remote integrity checking whichever only serve for static archive data and cannot be implemented to the auditing service if the data in the cloud is being dynamically updated. Therefore, it is expected to design an efficient and secure dynamic auditing protocol to convince the data owners for t he security and integrity of their data. In this paper, we intent to construct an auditing framework for cloud storage systems for efficient privacy-preserving auditing service. Then, our auditing protocol is extended to support the data dynamic operations for secure auditing in the random oracle model. In addition, our auditing protocol is improved to support batch auditing for both multiple owners and multiple clouds without any trusted organizer. Our proposed auditing protocols will be proved for their secure and efficient computation with reduced cost for the auditing.

  6. A security vulnerabilities assessment tool for interim storage facilities of low-level radioactive wastes.

    Science.gov (United States)

    Bible, J; Emery, R J; Williams, T; Wang, S

    2006-11-01

    Limited permanent low-level radioactive waste (LLRW) disposal capacity and correspondingly high disposal costs have resulted in the creation of numerous interim storage facilities for either decay-in-storage operations or longer term accumulation efforts. These facilities, which may be near the site of waste generation or in distal locations, often were not originally designed for the purpose of LLRW storage, particularly with regard to security. Facility security has become particularly important in light of the domestic terrorist acts of 2001, wherein LLRW, along with many other sources of radioactivity, became recognized commodities to those wishing to create disruption through the purposeful dissemination of radioactive materials. Since some LLRW materials may be in facilities that may exhibit varying degrees of security control sophistication, a security vulnerabilities assessment tool grounded in accepted criminal justice theory and security practice has been developed. The tool, which includes dedicated sections on general security, target hardening, criminalization benefits, and the presence of guardians, can be used by those not formally schooled in the security profession to assess the level of protection afforded to their respective facilities. The tool equips radiation safety practitioners with the ability to methodically and systematically assess the presence or relative status of various facility security aspects, many of which may not be considered by individuals from outside the security profession. For example, radiation safety professionals might not ordinarily consider facility lighting aspects, which is a staple for the security profession since it is widely known that crime disproportionately occurs more frequently at night or in poorly lit circumstances. Likewise, the means and associated time dimensions for detecting inventory discrepancies may not be commonly considered. The tool provides a simple means for radiation safety professionals to

  7. Uncertainty-based Estimation of the Secure Range for ISO New England Dynamic Interchange Adjustment

    Energy Technology Data Exchange (ETDEWEB)

    Etingov, Pavel V.; Makarov, Yuri V.; Wu, Di; Hou, Zhangshuan; Sun, Yannan; Maslennikov, S.; Luo, Xiaochuan; Zheng, T.; George, S.; Knowland, T.; Litvinov, E.; Weaver, S.; Sanchez, E.

    2014-04-14

    The paper proposes an approach to estimate the secure range for dynamic interchange adjustment, which assists system operators in scheduling the interchange with neighboring control areas. Uncertainties associated with various sources are incorporated. The proposed method is implemented in the dynamic interchange adjustment (DINA) tool developed by Pacific Northwest National Laboratory (PNNL) for ISO New England. Simulation results are used to validate the effectiveness of the proposed method.

  8. A secure and efficient audit mechanism for dynamic shared data in cloud storage.

    Science.gov (United States)

    Kwon, Ohmin; Koo, Dongyoung; Shin, Yongjoo; Yoon, Hyunsoo

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data.

  9. Assessing security technology's impact: old tools for new problems.

    Science.gov (United States)

    Kreissl, Reinhard

    2014-09-01

    The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.

  10. Technology transfer of dynamic IT outsourcing requires security measures in SLAs

    NARCIS (Netherlands)

    F. Dickmann (Frank); M. Brodhun (Maximilian); J. Falkner (Jürgen); T.A. Knoch (Tobias); U. Sax (Ulrich)

    2010-01-01

    textabstractFor the present efforts in dynamic IT outsourcing environments like Grid or Cloud computing security and trust are ongoing issues. SLAs are a proved remedy to build up trust in outsourcing relations. Therefore, it is necessary to determine whether SLAs can improve trust from the perspect

  11. A Security Assessment Approach with Graded Importance Score of Security Controls and Asset Consequence for I and C Systems in Operating NPPs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Sooill; Kim, Yong Sik; Moon, Insun; Lee, Euijong [KHNP CRI, Daejeon (Korea, Republic of)

    2016-10-15

    This paper introduces a security assessment approach with graded importance score of security controls and the asset consequence through an asset and risk analysis to manage the security levels in operating NPPs (Nuclear Power Plants). Whereas, those are being exposed to various types of new and existing cyber threats, vulnerabilities and risks which significantly increase the likelihood that those could be compromised. U.S. NRC(United States Nuclear Regulatory Commission) and KINAC(Korea Institute of Nuclear Nonproliferation And Control) request the cyber security plan by establishing the cyber security program through assessing and managing the potential for adverse effect on safety, security and emergency preparedness functions so as to provide high assurance that critical functions are properly protected from the cyber-attack. This paper shows the security assessment approach with graded importance score of security controls and the asset consequence. It could lead to manage the security levels consistent with the purpose of defense in- depth strategy based on regulatory rule as well as internal risk-based self-assessment. Also, this management of the security level may make effect of encouraging the installation of high ranked countermeasures in order to rapidly increase the security level. Proposed approach could be conducted for the pilot test on the model plants with each reactor type of operating NPPs.

  12. An Assessment of Future Patterns of Security in Central Asia

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Since the disintegration of the Soviet Union in the early 1990s, various social problems left over have emerged in some Central Asian states, thus threatening social stability in the region. Under globalization, the former Soviet republics in Central Asia have made great efforts to develop constructive relations with others in the hope of strengthening their security. However, the threat of terrorism, extremism and separatism still exists. These non-traditional security issues play a role in current international politics, and the countries in the region are trylng to meet new challenges.

  13. Assessment of Critical Mass Laboratory safeguards and security upgrades

    Energy Technology Data Exchange (ETDEWEB)

    Merrill, B.J.; DeMyer, J.J.

    1985-05-31

    Pacific Northwest Laboratory (PNL) conducted an evaluation of the safeguards and security systems at the Critical Mass Laboratory (CML) in February 1985, to identify appropriate upgrading actions necessary to ensure that effective and efficient systems consistent with DOE-RL policies, procedures, and site priorities are in place. Since that evaluation, there have been changes in Patrol contingency philosophy, response tactics, and distribution of manpower. Because of these changes, and at the request of DOE-RL, PNL has re-evaluated the safeguards and security systems in place at CML.

  14. Governance, Security and Culture: Assessing Africa’s Youth Bulge

    Directory of Open Access Journals (Sweden)

    Marc Sommers

    2011-12-01

    Full Text Available

    Although Africa has a youth-dominated population, African government policies are often not youth-centered and African governments and their international supporters are frequently under-informed about the priorities of most youth. Reliance on the “youth bulge and instability thesis” leads to distorted assessments of everyday realities. Examination of the lives, priorities, and cultural contexts of African youth, and the cases of youth in Rwanda and Burundi in particular, shows that the nature of relations between the state and massive populations of young, marginalized, and alienated citizens directly impacts the governance, security, and development prospects of African nations.

  15. INFORMATION SECURITY ASSESSMENT FOR MULTI-AGENT ROBOTIC SYSTEM UNDER THE INFORMATION IMPACT

    Directory of Open Access Journals (Sweden)

    I. S. Lebedev

    2014-03-01

    Full Text Available The paper deals with the features of information security guaranteeing of the multi-agent robotic system with self-organizing behavior. The main attention is paid to the possibility of implementing information security threats on the level of interaction between the individual elements. The definitions “information impact” and “disorganization” are introduced for multi-agent robotic system. As a criterion for the system safety state assessment, probability is selected of number of items available at time t for required task execution of multi-agent robotic system, not suffering from the effects of the information impact. A method for estimating the probability of the multi-agent robotic system being in a safe state is proposed. The method is based on mathematical apparatus of Markov chains. Its distinction is the usage of functional dependencies for intensity information impact. The method gives the possibility to identify required characteristics of the individual elements in the early stages of development. Graphs of probability for secure system state of group of elements at different intensities of information impact by intruder and intensities are given, characterizing software and hardware capabilities of element output from the unsafe condition. The system behavior is modeled in the dynamics for different functional dependencies of the information impact intensity. An example of group consisting of four identical elements staying in a safe condition and attacking by three disorganizing elements is shown. Technique of obtaining numerical values for the intensities of information impact at successive instants is revealed.

  16. Defining the cloud battlefield - supporting security assessments by cloud customers

    NARCIS (Netherlands)

    Bleikertz, Sören; Mastelic, Toni; Pape, Sebastian; Pieters, Wolter; Dimkov, Trajce

    2013-01-01

    Cloud computing is becoming more and more popular, but security concerns overshadow its technical and economic benefits. In particular, insider attacks and malicious insiders are considered as one of the major threats and risks in cloud computing. As physical boundaries disappear and a variety of pa

  17. Aviation Security, Risk Assessment, and Risk Aversion for Public Decisionmaking

    Science.gov (United States)

    Stewart, Mark G.; Mueller, John

    2013-01-01

    This paper estimates risk reductions for each layer of security designed to prevent commercial passenger airliners from being commandeered by terrorists, kept under control for some time, and then crashed into specific targets. Probabilistic methods are used to characterize the uncertainty of rates of deterrence, detection, and disruption, as well…

  18. Health Security Intelligence: Assessing the Nascent Public Health Capability

    Science.gov (United States)

    2012-03-01

    Information Sharing System MOU Memorandum of Understanding NBIC National Biosurveillance Integration Center NCMI National Center for...definition, have come to the fore in the literature, biosurveillance and health security. Biosurveillance , as a term, is too limited to provide the...purposes. The Government Accountability Office (GAO) in a 2006 report on public health infrastructure described biosurveillance as, “…automated

  19. Defining the cloud battlefield - supporting security assessments by cloud customers

    NARCIS (Netherlands)

    Bleikertz, Sören; Mastelic, Toni; Pape, Sebastian; Pieters, Wolter; Dimkov, T.

    Cloud computing is becoming more and more popular, but security concerns overshadow its technical and economic benefits. In particular, insider attacks and malicious insiders are considered as one of the major threats and risks in cloud computing. As physical boundaries disappear and a variety of

  20. Crucial problems on security assessment of a building site adjacent to an excavated high slope

    Institute of Scientific and Technical Information of China (English)

    文海家; ZHANG; Jialan; 等

    2002-01-01

    The subject of this work is the assessment on the stability of an excavated high slope in order to insure the security of the building site adjacent to the slope,which is frequently encountered in town construction in mountainous areas due to terrain limit.On the base of some typical engineering cases in Chongqing,several crucial problems on security assessment of building site adjacent to an excavated high slope,including the natural geological conditions and man-destroyed degree,engineering environment,potential failure pattern of the high slope,calculation parameters and analysis methods,are roundly discussed.It is demonstrated that the conclusion of security assessment can be determined according to the aspects above-mentioned,and the security assessment is one of the fundamental data to insure the safety of the related construction,site and buildings.

  1. DEVELOPMENT PROBABILITY-LINGUISTIC MODELS VULNERABILITY ASSESSMENT OF AVIATION SECURITY IMPORTANT TECHNICAL FACILITIES

    National Research Council Canada - National Science Library

    2016-01-01

    ... are justified, and the assessment problem of the protected object vulnerability is formulated. The main advantage of the developed model is the extensive opportunities of formalization of diverse information on the security status of the object...

  2. The contemporary dynamics of Sino-Indian relations: Examining maritime security, economics, energy and elite dialogue

    Science.gov (United States)

    Athwal, Amardeep

    This dissertation examines the modern-day dynamics of the Sino-Indian relationship---with a particular focus on issues relating to maritime security, economics, energy and elite bilateral dialogue. In exploring the contemporary nature of the Sino-Indian relationship, the dissertation also seeks to assess the accuracy of predominant neorealist accounts of the Sino-Indian relationship. Since the 1962 Sino-Indian War, most analysts have continued to emphasize the conflictual and competitive elements within the Sino-Indian relationship. The dissertation first explores the crucial post-independence history of Sino-Indian relations to provide the appropriate contextual background (chapter one). Thereafter, the dissertation explores the geopolitical significance of the Indian Ocean in light of soaring (global) energy demands. This then leads into an analysis of China and India's naval modernization and China's strategic partnership with Pakistan and Myanmar (chapter two). While acknowledging the credibility of neorealist insights in the realm of maritime security by detailing China and India's naval buildup and naval strategy, overall, it is found that the security dilemma argument is overstated. There is both a lack of threat perception and the existence of alternate explanations for both Chinese and Indian activities in Southern Asia. The dissertation then moves on to explore the positive elements within the Sino-Indian relationship---growing economic interdependence, energy convergence and elite consensus. In the economic realm (chapter three) it is found that Sino-Indian bilateral trade is increasingly being framed institutionally and rapidly expanding every year. The areas where the Sino-Indian economic relationship could be fruitfully expanded are traced and the great potential of bilateral trade is discussed. Thereafter, the dissertation highlights how China and India are beginning to coordinate energy policy (chapter four) as well as the growing political will

  3. Priority and Random Selection for Dynamic Window Secured Implicit Geographic Routing in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Zurina M. Hanapi

    2009-01-01

    Full Text Available Problem statement: Sensor nodes are easily exposed to many attacks since it were deployed in unattended adversarial environment with no global addressing and used for critical applications such as battlefield surveillance and emergency response. While the sensor also needs to act as a router to relay a message to a required recipient, then this increased the vulnerabilities to a network layer. However, existing security mechanisms are not permissible to be fitted directly into any sensor network due to constraints on energy and computational capabilities of sensor node itself that require on the modification on the protocols that associated with the sensor node itself in order to provide the security. Approach: In this study, a Dynamic Window Secured Implicit Geographic Forwarding (DWIGF routing protocol was presented which based on an approach of lazy binding technique and dynamic time on collection window and inherits a geographical routing techniques. Results: The DWIGF was intelligent to minimize a Clear To Send (CTS rushing attack and robust against black hole and selective forwarding attacks with high packet delivery ratios because of selection of a failed node and an attacker was minimized respectively. Moreover, few routing attacks were eliminated since the routing technique used was classified as geographic routing. Conclusion: This novel routing protocol was promising a secured routing without inserting any existing security mechanism inside.

  4. Integrated Solution Modeling Software: A New Paradigm on Information Security Review and Assessment

    CERN Document Server

    Susanto, Heru; Tuan, Yong Chee; Aksoy, Mehmet Sabih; Syam, Wahyudin P

    2012-01-01

    Actually Information security becomes a very important part for the organization's intangible assets, so level of confidence and stakeholder trusted are performance indicator as successes organization. Since information security has a very important role in supporting the activities of the organization, we need a standard or benchmark which regulates governance over information security. The main objective of this paper is to implement a novel practical approach framework to the development of information security management system (ISMS) assessment and monitoring software, called by I-SolFramework. System / software is expected to assist stakeholders in assessing the level of their ISO27001 compliance readiness, the software could help stakeholders understood security control or called by compliance parameters, being shorter and more structured. The case study illustrated provided to the reader with a set of guidelines, that aims easy understood and applicable as measuring tools for ISMS standards (ISO27001)...

  5. Dynamic analysis and assessment for sustainable development

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    The assessment of sustainable development is crucial for constituting sustainable development strategies. Assessment methods that exist so far usually only use an indicator system for making sustainable judgement. These indicators rarely reflect dynamic characteristics. However, sustainable development is influenced by changes in the social-economic system and in the eco-environmental system at different times. Besides the spatial character, sustainable development has a temporal character that can not be neglected; therefore the research system should also be dynamic. This paper focuses on this dynamic trait, so that the assessment results obtained provide more information for judgements in decision-making processes. Firstly the dynamic characteristics of sustainable development are analyzed, which point to a track of sustainable development that is an upward undulating curve. According to the dynamic character and the development rules of a social, economic and ecological system, a flexible assessment approach that is based on tendency analysis, restrictive conditions and a feedback system is then proposed for sustainable development.

  6. A Consistent Approach for Security Risk Assessments of Dams and Related Critical Infrastructure

    Science.gov (United States)

    2014-06-01

    Risk Assessments of Dams and Related Critical Infrastructure J. Darrell Morgeson Jason A. Dechant Yev Kirpichevsky Yazmin Seda -Sanabria, U.S...Kirpichevsky Yazmin Seda -Sanabria, U.S. Army Corps of Engineers Enrique E. Matheu, U.S. Department of Homeland Security A Consistent Approach...for Security Risk Assessments of Dams and Related Critical Infrastructure James D. Morgeson1, Yazmin Seda -Sanabria2, Yevgeniy Kirpichevsky3, Jason A

  7. How to use security risk assessments to manage risks, prevent violence and deal with new threats.

    Science.gov (United States)

    Ramsey-Hamilton, Caroline

    2015-01-01

    With a growing number of healthcare security requirements from states as well as regulators like FEMA, CMS, and DHS, the need to conduct comprehensive Security Risk Assessments has become essential, according to the author. In this article, she provides the basic elements of such assessments as well as guidance on how to apply them to a facility report and how to present the report to management.

  8. Assessing Security Vulnerabilities: An Application of Partial and End-Game Verification and Validation

    OpenAIRE

    Frazier, Edward Snead

    2010-01-01

    Modern software applications are becoming increasingly complex, prompting a need for expandable software security assessment tools. Violable constraints/assumptions presented by Bazaz [1] are expandable and can be modified to fit the changing landscape of software systems. Partial and End-Game Verification, Validation, and Testing (VV&T) strategies utilize the violable constraints/assumptions and are established by this research as viable software security assessment tools. The applicati...

  9. Security dynamics in the South Atlantic: Brazil and the United States in Africa

    Directory of Open Access Journals (Sweden)

    Pedro Seabra

    2013-09-01

    Full Text Available This article acknowledges the international community’s growing concern over the new security dynamics currently brewing in the South Atlantic, and the potential upgrade of this area on the internationalsecurity agenda. By building on both old and new threats in the background interest being displayed by such countries as Brazil and the US towards this specific area, and by highlighting these two countries’ political-strategic interests in Africa, this article provides an accurate portrait of the current security context, which ranges from the chances of competition of all the actors involved to the opportunities for cooperation between them.

  10. Dynamic learning rates algorithm for BPNN to forecast time series of dam security

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Time series data of dam security have a large number of observed values and should be forecasted accurately in time.Neural networks have the powerful approach ablilities of arbitrary functions and have been broadly utilized in many domains.In this paper,a dynamic learning rate training algorithm of hack-propagation neural networks for time series forecasting is proposed and the networks with this algorithm are built to forecast time series of dam security.The application results demonostrate the efficiency of modelling and the effictiveness of forecasting.

  11. A GIS-based decision support system for regional eco-security assessment and its application on the Tibetan Plateau.

    Science.gov (United States)

    Xiaodan, Wang; Xianghao, Zhong; Pan, Gao

    2010-10-01

    Regional eco-security assessment is an intricate, challenging task. In previous studies, the integration of eco-environmental models and geographical information systems (GIS) usually takes two approaches: loose coupling and tight coupling. However, the present study used a full coupling approach to develop a GIS-based regional eco-security assessment decision support system (ESDSS). This was achieved by merging the pressure-state-response (PSR) model and the analytic hierarchy process (AHP) into ArcGIS 9 as a dynamic link library (DLL) using ArcObjects in ArcGIS and Visual Basic for Applications. Such an approach makes it easy to capitalize on the GIS visualization and spatial analysis functions, thereby significantly supporting the dynamic estimation of regional eco-security. A case study is presented for the Tibetan Plateau, known as the world's "third pole" after the Arctic and Antarctic. Results verified the usefulness and feasibility of the developed method. As a useful tool, the ESDSS can also help local managers to make scientifically-based and effective decisions about Tibetan eco-environmental protection and land use.

  12. Architecture and Assessment: Privacy Preserving Biometrically Secured Electronic Documents

    Science.gov (United States)

    biometric version of the Electronic System for Travel Authorization (ESTA) travel authorization required by US Customs and Border Protection (CBP) for...This document explores an application which uses biometrics to secure electronic travel authorizations granted to foreign passport holders wishing to...information must be stored by the application. We describe the architecture and key algorithms for a biometric-enabled electronic Travel Authority(b

  13. Defense Transportation’s EDI Program: A Security Risk Assessment

    Science.gov (United States)

    1993-05-01

    available when needed. One way to provide proof of system-security procedures is to follow the guide- lines in the Inteinal Management Control Program ( IMCP ...as mandated by the Federal Manager’s Financial Integrity Act (FMFIA). The IMCP prescribes both general and specific standards for maintaining...appropriate internal controls. For 12 example, the IMCP states that control systems shall be properly documented, trans- actions and other significant

  14. Assessment of a Heuristic Algorithm for Scheduling Theater Security Cooperation Naval Missions

    Science.gov (United States)

    2009-03-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS ASSESSMENT OF A HEURISTIC ALGORITHM FOR SCHEDULING THEATER SECURITY...blank) 2. REPORT DATE March 2009 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE Assessment of a Heuristic Algorithm for...INTENTIONALLY LEFT BLANK iii Approved for public release; distribution is unlimited ASSESSMENT OF A HEURISTIC ALGORITHM FOR SCHEDULING THEATER

  15. Assessment on security system of radioactive sources used in hospitals of Thailand

    Energy Technology Data Exchange (ETDEWEB)

    Jitbanjong, Petchara, E-mail: petcharajit@gmail.com; Wongsawaeng, Doonyapong [Nuclear Engineering Department, Faculty of Engineering, Chulalongkorn University, 254 Phayathai Road, Pathumwan, Bangkok 10330 (Thailand)

    2016-01-22

    Unsecured radioactive sources have caused deaths and serious injuries in many parts of the world. In Thailand, there are 17 hospitals that use teletherapy with cobalt-60 radioactive sources. They need to be secured in order to prevent unauthorized removal, sabotage and terrorists from using such materials in a radiological weapon. The security system of radioactive sources in Thailand is regulated by the Office of Atoms for Peace in compliance with Global Threat Reduction Initiative (GTRI), U.S. DOE, which has started to be implemented since 2010. This study aims to perform an assessment on the security system of radioactive sources used in hospitals in Thailand and the results can be used as a recommended baseline data for development or improvement of hospitals on the security system of a radioactive source at a national regulatory level and policy level. Results from questionnaires reveal that in 11 out of 17 hospitals (64.70%), there were a few differences in conditions of hospitals using radioactive sources with installation of the security system and those without installation of the security system. Also, personals working with radioactive sources did not clearly understand the nuclear security law. Thus, government organizations should be encouraged to arrange trainings on nuclear security to increase the level of understanding. In the future, it is recommended that the responsible government organization issues a minimum requirement of nuclear security for every medical facility using radioactive sources.

  16. Data Center Governance Information Security Compliance Assessment Based on the Cobit Framewok

    Directory of Open Access Journals (Sweden)

    Andrey Ferriyan

    2015-02-01

    Full Text Available One of control domain of Cobit describes information security lies in Deliver and Support (DS on DS5 Ensure Systems Security. This domain describes what things should be done by an organization to preserve and maintain the integrity of the information assets of IT where this all requires a security management process. One of the process is to perform security monitoring by conducting periodic vulnerability assessment to identify weaknesses. Because Cobit is not explained technically so it needs a method to utilizes data that has been standardized. One of the standardized database for vulnerability is CVE (Common Vulnerabilites and Exposures.This study aims to assess current condition of Data Center on Department of Transportation, Communication and Information Technology at Sleman Regency and assess the maturity level of security as well as providing solutions in particular on IT security. Next goal is to perform vulnerability assessment to find out which are the parts of the data center that may be vulnerable. Knowing weaknesses can help evaluate and provide solutions for better future. Result from this research is to create tool for vulnerability assessment and tool to calculate maturity model.

  17. Secure and Dynamic Model for Book Searching on Cloud Computing as Mobile Augmented Reality

    Directory of Open Access Journals (Sweden)

    Adeel Rafiq

    2014-01-01

    Full Text Available Availability of internet on different devices like smart phones like android based, IOs based, windows based and PDA etc. has brought into the evolution of mobile cloud computing, which is a vast side of research nowadays. Internet connectivity has become very easy with the evolution of Wi-Fi, everyone can access the internet using wireless connectivity. A major issue in wireless connectivity is the low level of encryption and low security. This might be a security risk for the sensitive data available on the cloud. There are mobile augmented reality systems based on cloud computing, we want to propose a dynamic framework for the security of cloud and live update data on cloud.

  18. SD-AODV: A Protocol for Secure and Dynamic Data Dissemination in Mobile Ad Hoc Network

    CERN Document Server

    Nath, Rajender

    2011-01-01

    Security remains as a major concern in the mobile ad hoc networks. This paper presents a new protocol SD-AODV, which is an extension of the exiting protocol AODV. The proposed protocol is made secure and dynamic against three main types of routing attacks- wormhole attack, byzantine attack and blackhole attack. SD-AODV protocol was evaluated through simulation experiments done on Glomosim and performance of the network was measured in terms of packet delivery fraction, average end-to-end delay, global throughput and route errors of a mobile ad hoc network where a defined percentage of nodes behave maliciously. Experimentally it was found that the performance of the network did not degrade in the presence of the above said attacks indicating that the proposed protocol was secure against these attacks.

  19. SD-AODV: A Protocol for Secure and Dynamic Data Dissemination in Mobile Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Rajender Nath

    2010-11-01

    Full Text Available Security remains as a major concern in the mobile ad hoc networks. This paper presents a new protocol SD-AODV, which is an extension of the exiting protocol AODV. The proposed protocol is made secure and dynamic against three main types of routing attacks-wormhole attack, byzantine attack and blackhole attack. SD-AODV protocol was evaluated through simulation experiments done on Glomosim and performance of the network was measured in terms of packet delivery fraction, average end-to-end delay, global throughput and route errors of a mobile ad hoc network where a defined percentage of nodes behave maliciously. Experimentally it was found that the performance of the network did not degrade in the presence of the above said attacks indicating that the proposed protocol was secure against these attacks.

  20. Assessing information security strategies, tactics, logic and framewortk

    CERN Document Server

    Vladimirov, Andrew; Gavrilenko, Konstantin

    2015-01-01

    Build a strategic response to cyber attacks The activities of the cyber criminal are both deliberate and hostile, and they can be compared to military operations. Many people in business understand that the insights from the classics of military strategy are as relevant to modern commerce as they are to war. It is clear that organisations need to develop a view of cybersecurity that goes beyond technology: all staff in the organisation have a role to play, and it is the senior managers who must ensure, like generals marshalling their forces, that all staff know the cyber security policies that

  1. Assessment And Testing of Industrial Devices Robustness Against Cyber Security Attacks

    CERN Document Server

    Tilaro, F

    2011-01-01

    CERN (European Organization for Nuclear Research),like any organization, needs to achieve the conflicting objectives of connecting its operational network to Internet while at the same time keeping its industrial control systems secure from external and internal cyber attacks. With this in mind, the ISA-99[0F1] international cyber security standard has been adopted at CERN as a reference model to define a set of guidelines and security robustness criteria applicable to any network device. Devices robustness represents a key link in the defense-in-depth concept as some attacks will inevitably penetrate security boundaries and thus require further protection measures. When assessing the cyber security robustness of devices we have singled out control system-relevant attack patterns derived from the well-known CAPEC[1F2] classification. Once a vulnerability is identified, it needs to be documented, prioritized and reproduced at will in a dedicated test environment for debugging purposes. CERN - in collaboration ...

  2. Dynamic High Level Cross Layer Security Mechanisms for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sanjeev Puri

    2012-06-01

    Full Text Available In dynamic insensitive application specific network, WSN consists of hundred and thousands of sensor nodes densely deployed in the sensor field. Majority of sensor nodes are static having power limitations, low network throughput, message transfer delays and computation power limits that are major obstacles. The limited communication range of WSN nodes, link asymmetry, and the characteristics of the physical environment lead to a major sources of QoS degradation in WSNs. The potential applications of the WSNs typically range from those in defense, military, environmental monitoring, health monitoring and civilian surveillance applications etc. All of these applications being omnipresent in nature necessitate appropriate heavy secure mechanisms to ensure the data security and privacy. On the other hand, the WSN nodes, being extremely resource constrained, it is really challenging to devise the WSNs security protocols. So need to propose dynamic high level cross layer security mechanism for detecting various attacks and the countermeasures taken to avoid the same without comprising any network resources.

  3. Sustainability impact assessment to improve food security of smallholders in Tanzania

    Energy Technology Data Exchange (ETDEWEB)

    Schindler, Jana, E-mail: jana.schindler@zalf.de [Leibniz Centre for Agricultural Landscape Research (ZALF), Institute of Land Use Systems, Eberswalder Straße 84, 15374 Müncheberg (Germany); Humboldt Universität zu Berlin, Faculty of Agriculture and Horticulture, Invalidenstr. 42, 10099 Berlin (Germany); Graef, Frieder, E-mail: graef@zalf.de [Leibniz Centre for Agricultural Landscape Research (ZALF), Institute of Land Use Systems, Eberswalder Straße 84, 15374 Müncheberg (Germany); König, Hannes Jochen, E-mail: hkoenig@zalf.de [Leibniz Centre for Agricultural Landscape Research (ZALF), Institute of Land Use Systems, Eberswalder Straße 84, 15374 Müncheberg (Germany); Mchau, Devotha, E-mail: dvtmchau@yahoo.com [Agricultural Research Institute (ARI Hombolo/Makutupora), P. O. Box 1676, Dodoma (Tanzania, United Republic of); Saidia, Paul, E-mail: saidiapaul@gmail.com [Sokoine University of Agriculture (SUA) Morogoro, Department of Crop Science and Production, P O. Box 3005, Morogoro (Tanzania, United Republic of); Sieber, Stefan, E-mail: stefan.sieber@zalf.de [Leibniz Centre for Agricultural Landscape Research (ZALF), Institute of Socio-Economics, Eberswalder Straße 84, 15374 Müncheberg (Germany)

    2016-09-15

    The objective of this paper was to assess the sustainability impacts of planned agricultural development interventions, so called upgrading strategies (UPS), to enhance food security and to identify what advantages and risks are assessed from the farmer's point of view in regards to social life, the economy and the environment. We developed a participatory methodological procedure that links food security and sustainable development. Farmers in four different case study villages in rural Tanzania chose their priority UPS. For these UPS, they assessed the impacts on locally relevant food security criteria. The positive impacts identified were mainly attributed to increased agricultural production and its related positive impacts such as increased income and improved access to necessary means to diversify the diet. However, several risks of certain UPS were also indicated by farmers, such as increased workload, high maintenance costs, higher competition among farmers, loss of traditional knowledge and social conflicts. We discussed the strong interdependence of socio-economic and environmental criteria to improve food security for small-scale farmers and analysed several trade-offs in regards to UPS choices and food security criteria. We also identified and discussed the advantages and challenges of our methodological approach. In conclusion, the participatory impact assessment on the farmer level allowed a locally specific analysis of the various positive and negative impacts of UPS on social life, the economy and the environment. We emphasize that only a development approach that considers social, economic and environmental challenges simultaneously can enhance food security.

  4. A new measure for assessment of architectural speech security

    Science.gov (United States)

    Gover, Bradford N.; Bradley, John S.

    2003-10-01

    A new measure has been developed to indicate the audibility and intelligibility of speech transmitted through walls from adjacent rooms. The new measure is a frequency-weighted signal-to-noise ratio. It is shown to be a more accurate predictor of subjective ratings than the Articulation Index, the Speech Intelligibility Index, and simple A-weighted signal-to-noise ratios. Listening tests using English sentences were conducted to measure the fraction of words intelligible to acute-hearing, native-English-speaking listeners under a range of acoustical conditions. Each subject listened to 500 sentences, each of which had been filtered to represent passage through some type of wall construction. The level of the speech, as well as the level and spectrum of background ventilation-type noise was varied. The conditions in the test ranged from those where all subjects were able to correctly identify all the words in a sentence (i.e., very poor security), through to those where all subjects were unable to even recognize the presence of a speaking voice (i.e., excellent security). The tests, analysis, and derivation of the measure will be discussed, as will the directions of ongoing work in the area.

  5. Wide Area Measurement Based Security Assessment & Monitoring of Modern Power System: A Danish Power System Case Study

    DEFF Research Database (Denmark)

    Rather, Zakir Hussain; Chen, Zhe; Thøgersen, Paul

    2013-01-01

    Power System security has become a major concern across the global power system community. This paper presents wide area measurement system (WAMS) based security assessment and monitoring of modern power system. A new three dimensional security index (TDSI) has been proposed for online security...... monitoring of modern power system with large scale renewable energy penetration. Phasor measurement unit (PMU) based WAMS has been implemented in western Danish Power System to realize online security monitoring and assessment in power system control center. The proposed security monitoring system has been...

  6. A new transient stability margin based on dynamic security region and its applications

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    A new transient stability margin is proposed based on a new expression of dynamic security region (DSR) which is developed from the existing expression of DSR. Applications of the DSR based transient stability margin to contingency ranking and screening are discussed. Simulations in the 10-machine 39-bus New England system are performed to show the effectiveness of the proposed DSR based tran-sient stability margin.

  7. Requirements for Development of an Assessment System for IT&C Security Audit

    Directory of Open Access Journals (Sweden)

    Marius Popa

    2010-12-01

    Full Text Available IT&C security audit processes are carried out to implement information security management. The audit processes are included in an audit program as decision of the management staff to establish the organization situation against to the planned or expected one. The audit processes require evidence to highlight the above issues. The evidences are gathered by audit team and some automation processes to increase the productivity and accuracy of the audit are needed. The paper presents some issues of the requirements for development of an assessment system with some considerations for IT&C security audit. The emphasized issues are grouped in the following sections: IT&C security audit processes, characteristics of the indicators development process and implementation issues of an assessment system.

  8. Security Situation Assessment of All-Optical Network Based on Evidential Reasoning Rule

    Directory of Open Access Journals (Sweden)

    Zhong-Nan Zhao

    2016-01-01

    Full Text Available It is important to determine the security situations of the all-optical network (AON, which is more vulnerable to hacker attacks and faults than other networks in some cases. A new approach of the security situation assessment to the all-optical network is developed in this paper. In the new assessment approach, the evidential reasoning (ER rule is used to integrate various evidences of the security factors including the optical faults and the special attacks in the AON. Furthermore, a new quantification method of the security situation is also proposed. A case study of an all-optical network is conducted to demonstrate the effectiveness and the practicability of the new proposed approach.

  9. The Common Risk Model for Dams: A Portfolio Approach to Security Risk Assessments

    Science.gov (United States)

    2013-06-01

    Portfolio Approach to Security Risk Assessments Yev Kirpichevsky Yazmin Seda -Sanabria, U.S. Army Corps of Engineers Enrique E. Matheu, U.S...Yev Kirpichevsky Yazmin Seda -Sanabria, U.S. Army Corps of Engineers Enrique E. Matheu, U.S. Department of Homeland Security Jason A. Dechant M...adaptive threats across a large portfolio [ Seda -Sanabria et al., 20111]. At the most basic level, risk is estimated for an attack scenario, defined as

  10. Building an information security strategy for EHR: guidelines for assessing the current situation.

    Science.gov (United States)

    Mohammad, Yara; Stergioulas, Lampros

    2010-01-01

    This paper is looking at electronic health record (EHR) systems and their information security strategy. It focuses on the first step of building an information security strategy which is analysing the current situation of an EHR system. This research is based on different research methods applied to different EHR systems. In this paper we define eight elements that can be used as guidelines for how best to assess the current situation of any EHR system.

  11. An integrated water-energy-food-livelihoods approach for assessing environmental livelihood security

    Science.gov (United States)

    Biggs, E. M.; Duncan, J.; Boruff, B.; Bruce, E.; Neef, A.; McNeill, K.; van Ogtrop, F. F.; Haworth, B.; Duce, S.; Horsley, J.; Pauli, N.; Curnow, J.; Imanari, Y.

    2015-12-01

    Environmental livelihood security refers to the challenges of maintaining global food security and universal access to freshwater and energy to sustain livelihoods and promote inclusive economic growth, whilst sustaining key environmental systems' functionality, particularly under variable climatic regimes. Environmental security is a concept complementary to sustainable development, and considers the increased vulnerability people have to certain environmental stresses, such as climatic change. Bridging links between the core component concepts of environmental security is integral to future human security, and in an attempt to create this bridge, the nexus approach to human protection has been created, where water resource availability underpins food, water and energy security. The water-energy-food nexus has an influential role in attaining human security, yet little research has made the link between the nexus and livelihoods. In this research we provide a critical appraisal of the synergies between water-energy-food nexus framings and sustainable livelihoods approaches, both of which aim to promote sustainable development. In regions where livelihoods are dependent on environmental conditions, the concept of sustainable development is critical for ensuring future environmental and human security. Given our appraisal we go on to develop an integrated framework for assessing environmental livelihood security of multiscale and multi-level systems. This framework provides a tangible approach for assessing changes in the water-energy-food-livelihood indicators of a system. Examples of where system applications may occur are discussed for the Southeast Asia and Oceania region. Our approach will be particularly useful for policy-makers to inform evidence-based decision-making, especially in localities where climate change increases the vulnerability of impoverished communities and extenuates environmental livelihood insecurity.

  12. Group Decision-Making Information Security Risk Assessment Based on AHP and Information Entropy

    Directory of Open Access Journals (Sweden)

    Zuowen Tan

    2012-08-01

    Full Text Available The phenomenon of over-reliance on subjective assignment is a challenging task in the information security risk assessment process. This study deals with this problem. We have presented a group decisionmaking information security risk assessment method by combining Analytic Hierarchy Process (AHP with Information entropy. When AHP is used to assess the security risk of information systems, the elements of the Criteria level are the risk probability, impact and uncontrollability. The priorities of the Alternatives as risk factors with respect to the Criteria level are determined by applying the group decision-making approach. And the experts’ weights are obtained through information entropy. The experts’ judgments are aggregated into a consensus matrix. The consensus matrix reduces the subjectivity of judgments due to the experts’ preferences.

  13. A Needs Assessment Study and Curriculum Development for a Public and Private Security Program at Alvin Community College.

    Science.gov (United States)

    Bethscheider, John

    A needs assessment for a community college curriculum in public and private security was conducted by surveying 50 high schools, four-year colleges, and private security agencies in the Alvin Community College area; 36 institutions responded. Findings revealed: most have a designated director of their security program; most would rather hire the…

  14. Wireless Local Area Network (WLAN) Vulnerability Assessment and Security

    Science.gov (United States)

    2005-09-01

    vulnerability assessment capability within the Marine Corps. 15. NUMBER OF PAGES 177 14. SUBJECT TERMS Wireless Local Area Network (WLAN), WiFi ... WiFi Protected Access xviii THIS PAGE INTENTIONALLY LEFT BLANK xix...intelligence officers in how to hack into U.S. computers2. Government networks, proprietary commercial information, and scientific research are all

  15. Dynamic proliferation assessment in flow cytometry.

    Science.gov (United States)

    Diermeier-Daucher, Simone; Brockhoff, Gero

    2010-09-01

    Dynamic proliferation assessment via flow cytometry is legitimately supposed to be the most powerful tool for recording cell cycle kinetics in-vitro. The preeminent feature is a single cell-based multi-informative analysis by temporal high-resolution. Flow cytometric approaches are based on labeling of proliferating cells via thymidine substitution by a base analog (e.g., 5-bromo-2'-deoxyuridine, BrdU) that is added to cell cultures either for a short period of time (pulse labeling) or continuously until cell harvesting. This unit describes the alternative use of the thymidine analog 5-ethynyl-2'-deoxyuridine (EdU) in place of BrdU for three different applications: (1) dynamic proliferation assessment by EdU pulse cell labeling; (2) the same approach as (1) but in combination with live/dead cell discrimination; and (3) dynamic cell cycle analysis based on continuous cell labeling with EdU and Hoechst fluorochrome quenching. In contrast to the detection of BrdU incorporation, EdU-positive cells can be identified by taking advantage of click chemistry, which facilitates a simplified and fast cell preparation. Further analysis options but also limitations of the utilization of EdU are discussed.

  16. Hydrologic variability in dryland regions: impacts on ecosystem dynamics and food security.

    Science.gov (United States)

    D'Odorico, Paolo; Bhattachan, Abinash

    2012-11-19

    Research on ecosystem and societal response to global environmental change typically considers the effects of shifts in mean climate conditions. There is, however, some evidence of ongoing changes also in the variance of hydrologic and climate fluctuations. A relatively high interannual variability is a distinctive feature of the hydrologic regime of dryland regions, particularly at the desert margins. Hydrologic variability has an important impact on ecosystem dynamics, food security and societal reliance on ecosystem services in water-limited environments. Here, we investigate some of the current patterns of hydrologic variability in drylands around the world and review the major effects of hydrologic fluctuations on ecosystem resilience, maintenance of biodiversity and food security. We show that random hydrologic fluctuations may enhance the resilience of dryland ecosystems by obliterating bistable deterministic behaviours and threshold-like responses to external drivers. Moreover, by increasing biodiversity and the associated ecosystem redundancy, hydrologic variability can indirectly enhance post-disturbance recovery, i.e. ecosystem resilience.

  17. Two Stage Secure Dynamic Load Balancing Architecture for SIP Server Clusters

    Directory of Open Access Journals (Sweden)

    G. Vennila

    2014-08-01

    Full Text Available Session Initiation Protocol (SIP is a signaling protocol emerged with an aim to enhance the IP network capabilities in terms of complex service provision. SIP server scalability with load balancing has a greater concern due to the dramatic increase in SIP service demand. Load balancing of session method (request/response and security measures optimizes the SIP server to regulate of network traffic in Voice over Internet Protocol (VoIP. Establishing a honeywall prior to the load balancer significantly reduces SIP traffic and drops inbound malicious load. In this paper, we propose Active Least Call in SIP Server (ALC_Server algorithm fulfills objectives like congestion avoidance, improved response times, throughput, resource utilization, reducing server faults, scalability and protection of SIP call from DoS attacks. From the test bed, the proposed two-tier architecture demonstrates that the ALC_Server method dynamically controls the overload and provides robust security, uniform load distribution for SIP servers.

  18. Dynamic Group Management Scheme for Sustainable and Secure Information Sensing in IoT

    Directory of Open Access Journals (Sweden)

    Hyungjoo Kim

    2016-10-01

    Full Text Available The services provided to users in the environment associated with the Internet of Things (hereinafter referred to as IoT begin with the information collected from sensors. It is imperative to transmit high-quality sensor data for providing better services. It is also required to collect data only from those authenticated sensors. Moreover, it is imperative to collect high-quality data on a sustainable and continuous basis in order to provide services anytime and anywhere in the IoT environment. Therefore, high-quality, authenticated sensor networks should be constructed. The most prominent routing protocol to enhance the energy consumption efficiency for the sustainable data collection in a sensor network is the LEACH routing protocol. The LEACH routing protocol transmits sensor data by measuring the energy of sensors and allocating sensor groups dynamically. However, these sensor networks have vulnerabilities such as key leakage, eavesdropping, replay attack and relay attack, given the nature of wireless network communication. A large number of security techniques have been studied in order to solve these vulnerabilities. Nonetheless, these studies still cannot support the dynamic sensor group allocation of the LEACH routing protocol. Furthermore, they are not suitable for the sensor nodes whose hardware computing ability and energy resources are limited. Therefore, this paper proposed a group sensor communication protocol that utilizes only the four fundamental arithmetic operations and logical operation for the sensor node authentication and secure data transmission. Through the security analysis, this paper verified that the proposed scheme was secure to the vulnerabilities resulting from the nature of wireless network communication. Moreover, this paper verified through the performance analysis that the proposed scheme could be utilized efficiently.

  19. How strategic dynamics complicate the framing of alternatives in strategic environmental assessment

    DEFF Research Database (Denmark)

    Lyhne, Ivar

    2012-01-01

    of the Danish Natural Gas Security of Supply Plan. Special emphasis is given to the framing of alternatives in the SEA process, since alternatives are directly related to the contextual developments. Based on a participative approach, strategic dynamics are mapped and the reactions and concerns in the SEA team......Unpredictable and complex developments challenge the application of strategic environmental assessment (SEA), e.g. in terms of timing, prediction, and relevance of assessments. Especially multi-actor and unstructured strategic level decision-making processes often seem to be characterised...... are outlined. The contribution of the article is enhanced empirical understanding of strategic dynamics and how it challenges SEA application....

  20. Assessing Impacts of Climate Change on Food Security Worldwide

    Science.gov (United States)

    Rosenzweig, Cynthia E.; Antle, John; Elliott, Joshua

    2015-01-01

    The combination of a warming Earth and an increasing population will likely strain the world's food systems in the coming decades. Experts involved with the Agricultural Model Intercomparison and Improvement Project (AgMIP) focus on quantifying the changes through time. AgMIP, a program begun in 2010, involves about 800 climate scientists, economists, nutritionists, information technology specialists, and crop and livestock experts. In mid-September 2015, the Aspen Global Change Institute convened an AgMIP workshop to draft plans and protocols for assessing global- and regional-scale modeling of crops, livestock, economics, and nutrition across major agricultural regions worldwide. The goal of this Coordinated Global and Regional Integrated Assessments (CGRA) project is to characterize climate effects on large- and small-scale farming systems.

  1. Assessing Impacts of Climate Change on Food Security Worldwide

    Science.gov (United States)

    Rosenzweig, Cynthia E.; Antle, John; Elliott, Joshua

    2015-01-01

    The combination of a warming Earth and an increasing population will likely strain the world's food systems in the coming decades. Experts involved with the Agricultural Model Intercomparison and Improvement Project (AgMIP) focus on quantifying the changes through time. AgMIP, a program begun in 2010, involves about 800 climate scientists, economists, nutritionists, information technology specialists, and crop and livestock experts. In mid-September 2015, the Aspen Global Change Institute convened an AgMIP workshop to draft plans and protocols for assessing global- and regional-scale modeling of crops, livestock, economics, and nutrition across major agricultural regions worldwide. The goal of this Coordinated Global and Regional Integrated Assessments (CGRA) project is to characterize climate effects on large- and small-scale farming systems.

  2. Diversity for security: case assessment for FPGA-based safety-critical systems

    Directory of Open Access Journals (Sweden)

    Kharchenko Vyacheslav

    2016-01-01

    Full Text Available Industrial safety critical instrumentation and control systems (I&Cs are facing more with information (in general and cyber, in particular security threats and attacks. The application of programmable logic, first of all, field programmable gate arrays (FPGA in critical systems causes specific safety deficits. Security assessment techniques for such systems are based on heuristic knowledges and the expert judgment. Main challenge is how to take into account features of FPGA technology for safety critical I&Cs including systems in which are applied diversity approach to minimize risks of common cause failure. Such systems are called multi-version (MV systems. The goal of the paper is in description of the technique and tool for case-based security assessment of MV FPGA-based I&Cs.

  3. Coccygeal movement: Assessment with dynamic MRI

    Energy Technology Data Exchange (ETDEWEB)

    Grassi, Roberto [Institute of Radiology, Second University of Naples, Piazza Miraglia, 80138 Naples (Italy)]. E-mail: Roberto.grassi@unina2.it; Lombardi, Giulio [Institute of Radiology, Second University of Naples, Piazza Miraglia, 80138 Naples (Italy); Reginelli, Alfonso [Institute of Radiology, Second University of Naples, Piazza Miraglia, 80138 Naples (Italy); Capasso, Francesco [Institute of Radiology, Second University of Naples, Piazza Miraglia, 80138 Naples (Italy); Romano, Francesco [Institute of Radiology, Second University of Naples, Piazza Miraglia, 80138 Naples (Italy); Floriani, Irene [Clinical Trial Unit, Oncology Department, Istituto di Ricerche Farmacologiche ' Mario Negri' , Milan (Italy); Colacurci, Nicola [Department of Gynecologic Obstetric and Reproduction Sciences, Second University of Naples, 80138 Naples (Italy)

    2007-03-15

    Purpose: Chronic coccygodynia is a difficult problem diagnostically and therapeutically. Moreover, there is no deep knowledge especially in the field of imaging of chronic coccygodynia. In this study several possible measurements are proposed, which all are able to demonstrate coccygeal movement during defecation, in order to assess coccygeal mobility using dynamic MRI during maximum contraction and during straining-evacuation. Materials and methods: A dynamic MRI study of the pelvic floor was performed in 112 patients. Five methods of measurement were assessed. Coccygeal movements were determined through the evaluation of three angles pair and two different distances measured during the phase of maximum contraction and during the phase of straining-evacuation. Results were compared according to age, sex, parity and experience of minor trauma. No patient included in the study had coccygodynia. Measurements taken by two radiologist were compared to determine interobserver agreement. Results: The maximum measurement values of the two distances are homogeneous, between 9 and 9.4 mm. The maximum measurement values of the three angles showed a difference that is between 21 deg. and 38 deg. Two of three angles showed a major measurement values in the funtional texts. In only one patient the coccyx was not mobile. Conclusion: Our dynamic MRI study indicates that the coccyx is mobile during defecation and that it is possible to demonstrate coccygeal excursions by assessing the difference between its positions at maximum contraction and during straining-evacuation. The measurement methods used in this study for evaluating coccygeal movements resulted in variably sized observed differences, but all yielded statistically significant results in demonstrating coccygeal excursion. Among the five measurement methods, two resulted in the largest differences. Our data indicate no correlation between coccygeal movements and age, sex, parity, minor trauma and coccygodynia.

  4. Assessment of Food Security Situation among Farming Households in Rural Areas of Kano State, Nigeria

    Directory of Open Access Journals (Sweden)

    Irohibe Ifeoma

    2014-03-01

    Full Text Available Achieving food security is still a major problem for households in most rural areas of Nigeria. This study was therefore designed to assess the food security status among farming households in rural areas of Kano state, Nigeria. The study utilized a multistage random sampling technique to +select a sample of 120 rural farm households for interview. Data collected were analysed using percentages, mean score, logistic regression and food security index. Using the food security index approach, the study revealed that 74% of the respondents were food secure while 26% were food insecure. The results of the logistic regression revealed that educational level (p0.05; z = 1.95, sex (p0.05; z = 1.99, household size (p0.05; -4.29 and access to credit (p0.05; z = 2.4 were significant determinants of food security. Also, the major effect of food insecurity on the households include reduction in household income/ savings due to increased expenditure on food (M= 3.58, among others. The perceived coping strategies in cushioning the effects of food insecurity include engaging in off-farm and non-farm jobs to increase household income, (M= 2.77, among others. The study therefore recommends the fast tracking of already established policy measures aimed at reducing food insecurity in the country. Also, efforts aimed at reducing food insecurity among rural farming households should focus on increasing household income and food supply.

  5. Import Security: Assessing the Risks of Imported Food.

    Science.gov (United States)

    Welburn, Jonathan; Bier, Vicki; Hoerning, Steven

    2016-11-01

    We use data on food import violations from the FDA Operational and Administrative System for Import Support (OASIS) to address rising concerns associated with imported food, quantify import risks by product and by country of origin, and explore the usefulness of OASIS data for risk assessment. In particular, we assess whether there are significant trends in violations, whether import violations can be used to quantify risks by country and by product, and how import risks depend on economic factors of the country of origin. The results show that normalizing import violations by volume of imports provides a meaningful indicator of risk. We then use regression analysis to characterize import risks.  Using this model, we analyze import risks by product type, violation type, and economic factors of the country of origin.  We find that OASIS data are useful in quantifying food import risks, and that the rate of refusals provides a useful decision tool for risk management.  Furthermore, we find that some economic factors are significant indicators of food import risk by country. © 2016 Society for Risk Analysis.

  6. Assessing the effect of marine reserves on household food security in Kenyan coral reef fishing communities.

    Science.gov (United States)

    Darling, Emily S

    2014-01-01

    Measuring the success or failure of natural resource management is a key challenge to evaluate the impact of conservation for ecological, economic and social outcomes. Marine reserves are a popular tool for managing coastal ecosystems and resources yet surprisingly few studies have quantified the social-economic impacts of marine reserves on food security despite the critical importance of this outcome for fisheries management in developing countries. Here, I conducted semi-structured household surveys with 113 women heads-of-households to investigate the influence of two old, well-enforced, no-take marine reserves on food security in four coastal fishing communities in Kenya, East Africa. Multi-model information-theoretic inference and matching methods found that marine reserves did not influence household food security, as measured by protein consumption, diet diversity and food coping strategies. Instead, food security was strongly influenced by fishing livelihoods and household wealth: fishing families and wealthier households were more food secure than non-fishing and poorer households. These findings highlight the importance of complex social and economic landscapes of livelihoods, urbanization, power and gender dynamics that can drive the outcomes of marine conservation and management.

  7. Assessing the effect of marine reserves on household food security in Kenyan coral reef fishing communities.

    Directory of Open Access Journals (Sweden)

    Emily S Darling

    Full Text Available Measuring the success or failure of natural resource management is a key challenge to evaluate the impact of conservation for ecological, economic and social outcomes. Marine reserves are a popular tool for managing coastal ecosystems and resources yet surprisingly few studies have quantified the social-economic impacts of marine reserves on food security despite the critical importance of this outcome for fisheries management in developing countries. Here, I conducted semi-structured household surveys with 113 women heads-of-households to investigate the influence of two old, well-enforced, no-take marine reserves on food security in four coastal fishing communities in Kenya, East Africa. Multi-model information-theoretic inference and matching methods found that marine reserves did not influence household food security, as measured by protein consumption, diet diversity and food coping strategies. Instead, food security was strongly influenced by fishing livelihoods and household wealth: fishing families and wealthier households were more food secure than non-fishing and poorer households. These findings highlight the importance of complex social and economic landscapes of livelihoods, urbanization, power and gender dynamics that can drive the outcomes of marine conservation and management.

  8. Assessing the Effect of Marine Reserves on Household Food Security in Kenyan Coral Reef Fishing Communities

    Science.gov (United States)

    Darling, Emily S.

    2014-01-01

    Measuring the success or failure of natural resource management is a key challenge to evaluate the impact of conservation for ecological, economic and social outcomes. Marine reserves are a popular tool for managing coastal ecosystems and resources yet surprisingly few studies have quantified the social-economic impacts of marine reserves on food security despite the critical importance of this outcome for fisheries management in developing countries. Here, I conducted semi-structured household surveys with 113 women heads-of-households to investigate the influence of two old, well-enforced, no-take marine reserves on food security in four coastal fishing communities in Kenya, East Africa. Multi-model information-theoretic inference and matching methods found that marine reserves did not influence household food security, as measured by protein consumption, diet diversity and food coping strategies. Instead, food security was strongly influenced by fishing livelihoods and household wealth: fishing families and wealthier households were more food secure than non-fishing and poorer households. These findings highlight the importance of complex social and economic landscapes of livelihoods, urbanization, power and gender dynamics that can drive the outcomes of marine conservation and management. PMID:25422888

  9. An Actuarial Model for Assessment of Prison Violence Risk Among Maximum Security Inmates

    Science.gov (United States)

    Cunningham, Mark D.; Sorensen, Jon R.; Reidy, Thomas J.

    2005-01-01

    An experimental scale for the assessment of prison violence risk among maximum security inmates was developed from a logistic regression analysis involving inmates serving parole-eligible terms of varying length (n = 1,503), life-without-parole inmates (n = 960), and death-sentenced inmates who were mainstreamed into the general prison population…

  10. Chair Report Consultancy Meeting on Nuclear Security Assessment Methodologies (NUSAM) Transport Case Study Working Group

    Energy Technology Data Exchange (ETDEWEB)

    Shull, Doug [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-08-19

    The purpose of the consultancy assignment was to (i) apply the NUSAM assessment methods to hypothetical transport security table top exercise (TTX) analyses and (ii) document its results to working materials of NUSAM case study on transport. A number of working group observations, using the results of TTX methodologies, are noted in the report.

  11. Model of Information Security Risk Assessment based on Improved Wavelet Neural Network

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2013-09-01

    Full Text Available This paper concentrates on the information security risk assessment model utilizing the improved wavelet neural network. The structure of wavelet neural network is similar to the multi-layer neural network, which is a feed-forward neural network with one or more inputs. Afterwards, we point out that the training process of wavelet neural networks is made up of four steps until the value of error function can satisfy a pre-defined error criteria. In order to enhance the quality of information security risk assessment, we proposed a modified version of wavelet neural network which can effectively combine all influencing factors in assessing information security risk by linear integrating several weights. Furthermore, the proposed wavelet neural network is trained by the BP algorithm with batch mode, and the weight coefficients of the wavelet are modified with the adopting mode. Finally, a series of experiments are conduct to make performance evaluation. From the experimental results, we can see that the proposed model can assess information security risk accurately and rapidly

  12. Developing a new assessment procedure of social information processing in adolescents within secure residential care

    NARCIS (Netherlands)

    van Rest, Maaike M.; van Bokhoven, Irene; van Nieuwenhuijzen, Maroesjka; Embregts, Petri J. C. M.; Vriens, Aart; Matthys, Walter

    2014-01-01

    The purpose of the present study was to develop a new assessment procedure of social information processing (SIP) for adolescents, to explore its validity and to examine whether it differentiated between IQ groups. Ninety-four adolescents within secure residential care were administered the SIP inst

  13. The International Test Commission Guidelines on the Security of Tests, Examinations, and Other Assessments

    Science.gov (United States)

    International Journal of Testing, 2016

    2016-01-01

    The amount and severity of security threats have increased considerably over the past two decades, calling into question the validity of assessments administered around the world. These threats have increased for a number of reasons, including the popular use of computerized and online technologies for test administration and the use of almost…

  14. 9 CFR 121.7 - Registration and related security risk assessments.

    Science.gov (United States)

    2010-01-01

    ..., changes in ownership or control of the entity, new researchers or graduate students, etc.) (2) The responsible official will be notified in writing if an application to amend a certificate of registration has..., including public accredited academic institutions, are exempt from the security risk assessments for...

  15. 9 CFR 121.10 - Restricting access to select agents and toxins; security risk assessments.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Restricting access to select agents and toxins; security risk assessments. 121.10 Section 121.10 Animals and Animal Products ANIMAL AND... intelligence agency of committing a crime set forth in 18 U.S.C. 2332b(g)(5); knowing involvement with...

  16. An Actuarial Model for Assessment of Prison Violence Risk Among Maximum Security Inmates

    Science.gov (United States)

    Cunningham, Mark D.; Sorensen, Jon R.; Reidy, Thomas J.

    2005-01-01

    An experimental scale for the assessment of prison violence risk among maximum security inmates was developed from a logistic regression analysis involving inmates serving parole-eligible terms of varying length (n = 1,503), life-without-parole inmates (n = 960), and death-sentenced inmates who were mainstreamed into the general prison population…

  17. 28 CFR 105.11 - Individuals not requiring a security risk assessment.

    Science.gov (United States)

    2010-07-01

    ... citizen or national of the United States prior to providing training in the operation of an aircraft with... BACKGROUND CHECKS Aviation Training for Aliens and Other Designated Individuals § 105.11 Individuals not requiring a security risk assessment. (a) Citizens and nationals of the United States. A citizen or...

  18. Where Did All the Data Go? Internet Security for Web-based Assessments.

    Science.gov (United States)

    Shermis, Mark D.; Averitt, Jason

    2002-01-01

    Outlines a series of security steps that might be taken by researchers or organizations that are contemplating Web-based tests and performance assessments. Focuses on what can be done to avoid the loss, compromising, or modification of data collected by or stored through the Internet. (SLD)

  19. Security Risk Assessment Process for UAS in the NAS CNPC Architecture

    Science.gov (United States)

    Iannicca, Dennis Christopher; Young, Daniel Paul; Suresh, Thadhani; Winter, Gilbert A.

    2013-01-01

    This informational paper discusses the risk assessment process conducted to analyze Control and Non-Payload Communications (CNPC) architectures for integrating civil Unmanned Aircraft Systems (UAS) into the National Airspace System (NAS). The assessment employs the National Institute of Standards and Technology (NIST) Risk Management framework to identify threats, vulnerabilities, and risks to these architectures and recommends corresponding mitigating security controls. This process builds upon earlier work performed by RTCA Special Committee (SC) 203 and the Federal Aviation Administration (FAA) to roadmap the risk assessment methodology and to identify categories of information security risks that pose a significant impact to aeronautical communications systems. A description of the deviations from the typical process is described in regards to this aeronautical communications system. Due to the sensitive nature of the information, data resulting from the risk assessment pertaining to threats, vulnerabilities, and risks is beyond the scope of this paper

  20. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  1. Impacts of Base-Case and Post-Contingency Constraint Relaxations on Static and Dynamic Operational Security

    Science.gov (United States)

    Salloum, Ahmed

    Constraint relaxation by definition means that certain security, operational, or financial constraints are allowed to be violated in the energy market model for a predetermined penalty price. System operators utilize this mechanism in an effort to impose a price-cap on shadow prices throughout the market. In addition, constraint relaxations can serve as corrective approximations that help in reducing the occurrence of infeasible or extreme solutions in the day-ahead markets. This work aims to capture the impact constraint relaxations have on system operational security. Moreover, this analysis also provides a better understanding of the correlation between DC market models and AC real-time systems and analyzes how relaxations in market models propagate to real-time systems. This information can be used not only to assess the criticality of constraint relaxations, but also as a basis for determining penalty prices more accurately. Constraint relaxations practice was replicated in this work using a test case and a real-life large-scale system, while capturing both energy market aspects and AC real-time system performance. System performance investigation included static and dynamic security analysis for base-case and post-contingency operating conditions. PJM peak hour loads were dynamically modeled in order to capture delayed voltage recovery and sustained depressed voltage profiles as a result of reactive power deficiency caused by constraint relaxations. Moreover, impacts of constraint relaxations on operational system security were investigated when risk based penalty prices are used. Transmission lines in the PJM system were categorized according to their risk index and each category was as-signed a different penalty price accordingly in order to avoid real-time overloads on high risk lines. This work also extends the investigation of constraint relaxations to post-contingency relaxations, where emergency limits are allowed to be relaxed in energy market models

  2. Assessing and managing security risk in IT systems a structured methodology

    CERN Document Server

    McCumber, John

    2004-01-01

    SECURITY CONCEPTSUsing ModelsIntroduction: Understanding, Selecting, and Applying Models Understanding AssetsLayered Security Using Models in Security Security Models for Information Systems Shortcomings of Models in SecuritySecurity in Context Reference Defining Information SecurityConfidentiality, Integrity, and Availability Information AttributesIntrinsic versus Imputed Value Information as an Asset The Elements of Security Security Is Security Only in Context Information as an Asset Introduction Determining Value Managing Information Resources ReferencesUnderstanding Threat and Its Relatio

  3. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    Energy Technology Data Exchange (ETDEWEB)

    Ray Fink

    2006-10-01

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  4. What Are We Assessing When We Measure Food Security? A Compendium and Review of Current Metrics12

    Science.gov (United States)

    Jones, Andrew D.; Ngure, Francis M.; Pelto, Gretel; Young, Sera L.

    2013-01-01

    The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics. PMID:24038241

  5. Synchrophasor Sensing and Processing based Smart Grid Security Assessment for Renewable Energy Integration

    Science.gov (United States)

    Jiang, Huaiguang

    With the evolution of energy and power systems, the emerging Smart Grid (SG) is mainly featured by distributed renewable energy generations, demand-response control and huge amount of heterogeneous data sources. Widely distributed synchrophasor sensors, such as phasor measurement units (PMUs) and fault disturbance recorders (FDRs), can record multi-modal signals, for power system situational awareness and renewable energy integration. An effective and economical approach is proposed for wide-area security assessment. This approach is based on wavelet analysis for detecting and locating the short-term and long-term faults in SG, using voltage signals collected by distributed synchrophasor sensors. A data-driven approach for fault detection, identification and location is proposed and studied. This approach is based on matching pursuit decomposition (MPD) using Gaussian atom dictionary, hidden Markov model (HMM) of real-time frequency and voltage variation features, and fault contour maps generated by machine learning algorithms in SG systems. In addition, considering the economic issues, the placement optimization of distributed synchrophasor sensors is studied to reduce the number of the sensors without affecting the accuracy and effectiveness of the proposed approach. Furthermore, because the natural hazards is a critical issue for power system security, this approach is studied under different types of faults caused by natural hazards. A fast steady-state approach is proposed for voltage security of power systems with a wind power plant connected. The impedance matrix can be calculated by the voltage and current information collected by the PMUs. Based on the impedance matrix, locations in SG can be identified, where cause the greatest impact on the voltage at the wind power plants point of interconnection. Furthermore, because this dynamic voltage security assessment method relies on time-domain simulations of faults at different locations, the proposed approach

  6. L-Band Digital Aeronautical Communications System Engineering - Initial Safety and Security Risk Assessment and Mitigation

    Science.gov (United States)

    Zelkin, Natalie; Henriksen, Stephen

    2011-01-01

    This document is being provided as part of ITT's NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract NNC05CA85C, Task 7: "New ATM Requirements--Future Communications, C-Band and L-Band Communications Standard Development." ITT has completed a safety hazard analysis providing a preliminary safety assessment for the proposed L-band (960 to 1164 MHz) terrestrial en route communications system. The assessment was performed following the guidelines outlined in the Federal Aviation Administration Safety Risk Management Guidance for System Acquisitions document. The safety analysis did not identify any hazards with an unacceptable risk, though a number of hazards with a medium risk were documented. This effort represents a preliminary safety hazard analysis and notes the triggers for risk reassessment. A detailed safety hazards analysis is recommended as a follow-on activity to assess particular components of the L-band communication system after the technology is chosen and system rollout timing is determined. The security risk analysis resulted in identifying main security threats to the proposed system as well as noting additional threats recommended for a future security analysis conducted at a later stage in the system development process. The document discusses various security controls, including those suggested in the COCR Version 2.0.

  7. METHODS FOR ASSESSING SECURITY THREATS CONFIDENTIAL INFORMATION FOR THE INFORMATION AND TELECOMMUNICATIONS SYSTEMS

    Directory of Open Access Journals (Sweden)

    E. V. Belokurova

    2015-01-01

    Full Text Available The article discusses the different approaches to assessing the safety of confidential information-term for information and telecommunication systems of various pre-appreciable destination in the presence of internal and external threats to its integrity and availability. The difficulty of ensuring the security of confidential information from exposure to information and telecommunication systems of external and internal threats at the present time, is of particular relevance. This problem is confirmed by the analysis of available statistical information on the impact of threats on the security circulating in the information and telecommunications system. Leak confidential information, intellectual property, information, know-how is the result of significant material and moral damage caused to the owner of the restricted information. The paper presents the structure of the indicators and criteria shows that the most promising are analytical criteria. However, their use to assess the level of security of confidential information is difficult due to the lack of appropriate mathematical models. The complexity of the problem is that existing traditional mathematical models are not always appropriate for the stated objectives. Therefore, it is necessary to develop mathematical models designed to assess the security of confidential information and its impact on information and telecommunication system threats.

  8. 78 FR 32241 - U.S. Air Force Seeks Industry Input for National Security Space Launch Assessment

    Science.gov (United States)

    2013-05-29

    ... Department of the Air Force U.S. Air Force Seeks Industry Input for National Security Space Launch Assessment..., Office of the Deputy Under Secretary of the Air Force for Space, seeks industry views and perspectives to inform an on-going strategic National Security Space Launch Assessment. To support this effort, the Air...

  9. A coherency-based method to increase dynamic security in power systems

    Energy Technology Data Exchange (ETDEWEB)

    De Tuglie, E. [Dipartimento di Ingegneria dell' Ambiente e per lo Sviluppo Sostenibile - DIASS, Politecnico di Bari, Viale del Turismo 8, 74100 Taranto (Italy); Iannone, S.M.; Torelli, F. [Dipartimento di Elettrotecnica ed Elettronica - DEE, Politecnico di Bari, Via Re David 200, 70125 Bari (Italy)

    2008-08-15

    Dynamic security analysis is the evaluation of the ability of a system to withstand contingencies by surviving transient conditions to acceptable steady-state operative states. When potential instability due to contingency is detected, preventive action may be desired to improve the system security. This is very important in the on-line operation of a power system, especially when the system is stability-limited. The method proposed in this paper is based on the idea that increasing coherency between generators in the transient behaviour following a system perturbation gives rise to a more stable system. In this paper, we suggest the use of the ''input-output feedback-linearization'' with a reference trajectory obtained using a system dynamic equivalent based on the centre of inertia. To quantify coherency levels a new coherency indicator has been assumed for the given reference trajectory. The result is an increasing level in coherency, critical clearing time and system stability. The method is tested on the IEEE 30 bus test system. (author)

  10. Reliability and Security Analysis on Two-Cell Dynamic Redundant System

    Directory of Open Access Journals (Sweden)

    Hongsheng Su

    2013-05-01

    Full Text Available Based on analysis on reliability and security on three types of two-cell dynamic redundant systems which has been widely applied in modern railway signal system, whose isomorphic Markov model was established in this paper. During modeling several important factors, including common-cause failure, coverage of diagnostic systems, online maintainability, and periodic inspection maintenance, and as well as many failure modes, were considered, which made the established model more credible. Through analysis and calculation on reliability and security indexes of the three types of two-module dynamic redundant structures, the paper acquires a significant conclusion, i.e., the safety and reliability of the kind of structure possesses an upper limit, and can not be inordinately improved through the hardware and software comparison methods under the failure and repairing rate fixed. Finally, the paper performs the simulation investigations, and compares the calculation results of the three redundant systems, and analysis each advantages and disadvantages, and gives out each application scope, which provides a theoretical technical support for the railway signal equipments selection.

  11. Assessment of Geological Security and Integrated Assessment Geo-environmental Suitability in Worst-hit Areas in Wenchuan Quake

    Institute of Scientific and Technical Information of China (English)

    LI Wenpeng; WEN Dongguang; ZHOU Aiguo; SUN Xiaoming; MENG Hui; SHI Jusong; CHEN Zongyu; XHANG Liqin; FENG Xiaoming; LIU Changli; ZHOU Jianwei

    2009-01-01

    The Wenchuan earthquake in 2008 and geo-hazards triggered by the earthquake caused large injuries and deaths as well as destructive damage for infrastructures like construction, traffic and electricity. It is urgent to select relatively secure areas for townships and cities constructed in high mountainous regions with high magnitude earthquakes. This paper presents the basic thoughts, evaluation indices and evaluation methods of geological security evaluation, water and land resources security demonstration and integrated assessments of geo-environmental suitability for reconstruction in alp and ravine with high magnitude earthquakes, which are applied in the worst-hit areas (12 counties). The integrated assessment shows that: (1) located in the Longmenshan fault zone, the evaluated area is of poor regional crust stability, in which the unstable and second unstable areas account for 79% of the total; (2) the geo-hazards susceptibility is high in the evaluation area. The spots of geo-hazards triggered by earthquake are mainly distributed along the active fault zone with higher distribution in the moderate and high mountains area, in which the areas of high and moderate susceptibility zoning accounts for 40.1% of the total; (3) geological security is poor in the evaluated area, in which the area of the unsuitable construction occupies 73.1%, whereas in the suitable construction area, the areas of geological security, second security and insecurity zoning account for 8.3%, 9.3% and 9.3% of the evaluated area respectively; (4) geo-environmental suitability is poor in the evaluated area, in which the areas of suitability and basic suitability zoning account for 3.5% and 7.3% of the whole evaluation area.

  12. CRITICAL ASSESSMENT OF AUDITING CONTRIBUTIONS TO EFFECTIVE AND EFFICIENT SECURITY IN DATABASE SYSTEMS

    Directory of Open Access Journals (Sweden)

    Olumuyiwa O. Matthew

    2015-03-01

    Full Text Available Database auditing has become a very crucial aspect of security as organisations increase their adoption of database management systems (DBMS as major asset that keeps, maintain and monitor sensitive information. Database auditing is the group of activities involved in observing a set of stored data in order to be aware of the actions of users. The work presented here outlines the main auditing techniques and methods. Some architectural based auditing systems were also considered to assess the contribution of auditing to database security. Here a framework of several stages to be used in the instigation of auditing is proposed. Some issues relating to handling of audit trails are also discussed in this paper. This paper also itemizes some of the key important impacts of the concept to security and how compliance with government policies and regulations is enforced through auditing. Once the framework is adopted, it will provide support to database auditors and DBAs.

  13. Assessment of ecological security in Changbai Mountain Area, China based on MODIS data and PSR model

    Science.gov (United States)

    Huang, Fang; Wang, Ping; Qi, Xin

    2014-11-01

    The assessment of ecological security is to identify the stability of the ecosystem, and to distinguish the capacity of sustainable health and integrity under different kinds of risks. Using MODIS time series images from 2000 to 2008 as the main data source, the derived parameters including NDVI, the ratio of NPP and GPP, forest coverage, landscape diversity and ecological flexibility etc. are integrated to depict the properties of the ecological system. The pressure and response indicators such as population density, industrial production intensity, arable land per capita, fertilizer consumption, highway density, agricultural mechanization level and GDP per capita are also collected and managed by ArcGIS. The `pressure-state-response' (PSR) conceptual model and a hierarchical weighted model are applied to construct an evaluation framework and determine the state of ecological security in Changbai Mountain area. The results show that the ecological security index (ESI) values in 2000 and 2008 were 5.75 and 5.59 respectively, indicating the ecological security state in Changbai Mountain area degraded. In 2000, the area of in good state of ecological security was 21901km2, occupying 28.96% of the study region. 48201 km2 of the land were with moderate level. The grades of ESI in Dunhua, Longjing and Antu decreased from moderate to poor. Though the ESI value of Meihekou increased by 0.12 during 2000-2008, it was still in a very poor state of ecological security induced by intensive human activities. The ecological security situation of Changbai Mountain region was not optimistic on the whole.

  14. Critical thinking: assessing the risks to the future security of supply of critical metals

    Science.gov (United States)

    Gunn, Gus

    2015-04-01

    Increasing world population, the spread of prosperity across the globe and the demands of new technologies have led to a revival of concerns about the availability of raw materials needed by society. Despite scare stories about resource depletion, physical exhaustion of minerals is considered to be unlikely. However, we do need to know which materials might be of concern so that we can develop strategies to secure adequate supplies and to mitigate the effects of supply disruption. This requirement has led to renewed interest in criticality, a term that is generally used to refer to metals and minerals of high economic importance that have a relatively high likelihood of supply disruption. The European Union (EU) developed a quantitative methodology for the assessment of criticality which led to the definition of 14 raw materials as critical to the EU economy (EC, 2010). This has succeeded in raising awareness of potential supply issues and in helping to prioritise requirements for new policies and supporting research. The EU has recently assessed a larger number of candidate materials of which 20 are now identified as critical to the EU (EC, 2014). These include metals such as indium, mostly used in flat-screen displays, antimony for flame retardants and cobalt for rechargeable batteries, alloys and a host of other products. Although there is no consensus on the methodology for criticality assessments and broad analyses at this scale are inevitably imperfect, they can, nevertheless, provide early warning of supply problems. However, in order to develop more rigorous and dynamic assessments of future availability detailed analysis of the whole life-cycle of individual metals to identify specific problems and develop appropriate solutions is required. New policies, such as the Raw Materials Initiative (2008) and the European Innovation Partnership on Raw Materials (2013), have been developed by the European Commission (EC) and are aimed at securing sustainable

  15. Assessment of Farm Household Food Security and Consumption Indices in Nigeria

    Directory of Open Access Journals (Sweden)

    Ojeleye, O. A.

    2014-09-01

    Full Text Available This study was carried out to assess farm households’ food security and consumption indices. The study was conducted in Kaduna state, Nigeria. Data used for this study was collected from a total of 244 farm households with the use of structured questionnaire using a multistage random and purposive sampling technique. The main tools of analysis for this study include descriptive statistics and food security index. The study shows that about one third of the rural farm households sampled was food insecure and that the average farm size of the farm households was 2.05ha as food secure and insecure households cultivate 2.09ha and 1.96ha respectively. Average farm and non-farm income were $1,130.7 and $810.3 per annum respectively as household daily calorie consumed was found to exceed household daily calorie requirement. The food security indices for the food secure and insecure households were found to be 1.462 and 0.852 respectively. Large family size was found to lower available calorie intake of households. The study recommends the need for family planning education and policy frames to increase household farm size.

  16. A dynamic human health risk assessment system.

    Science.gov (United States)

    Prasad, Umesh; Singh, Gurmit; Pant, A B

    2012-05-01

    An online human health risk assessment system (OHHRAS) has been designed and developed in the form of a prototype database-driven system and made available for the population of India through a website - www.healthriskindia.in. OHHRAS provide the three utilities, that is, health survey, health status, and bio-calculators. The first utility health survey is functional on the basis of database being developed dynamically and gives the desired output to the user on the basis of input criteria entered into the system; the second utility health status is providing the output on the basis of dynamic questionnaire and ticked (selected) answers and generates the health status reports based on multiple matches set as per advise of medical experts and the third utility bio-calculators are very useful for the scientists/researchers as online statistical analysis tool that gives more accuracy and save the time of user. The whole system and database-driven website has been designed and developed by using the software (mainly are PHP, My-SQL, Deamweaver, C++ etc.) and made available publically through a database-driven website (www.healthriskindia.in), which are very useful for researchers, academia, students, and general masses of all sectors.

  17. Biomass Productivity Dynamics Monitoring and its Drivers in Sahelian Croplands and Rangelands to Support Food Security Policies

    Science.gov (United States)

    Leroux, L.

    2015-12-01

    Since the Sahelian population livelihood relies mainly on agropastoral activities, accurate information on biomass productivity dynamics and the underlying drivers are needed to manage a wide range of issues such as food security. This study aims to contribute to a better understanding of these drivers in rangeland and cropland, both at the Sahel and local scales (an agropastoral site in South-West Niger). At the Sahel scale, the MODIS Land Cover product was used to extract cropland and rangeland pixels. By analyzing MODIS NDVI trends together with TRMM3B43 annual rainfall (2000-2010), we developed a new classification scheme allowing to identify areas of persistent decline/improvement in biomass productivity and to separate rainfall-driven dynamics from other factors. The results showed an overall increase of productivity in the rangeland, and both an improvement and a degradation in the cropland. We found strong evidence that the increase in biomass productivity was generally linked to increasing rainfall, while the decrease could be attributed chiefly to other factors exclusively or to a combination of both climate- and human-induced factors (see the attached Figure). At the Niger site scale, biomass trends have been put in relation with a set of potential drivers via a RandomForest model, to define which were the explanatory factors of the observed trends. The factor set covered 5 categories: climate, natural constraints, demography, physical accessibility and land cover changes. We highlighted that tiger bushes areas were particularly prone to pressure due to overgrazing and overexploitation of wood, while positive trends were mainly observed near rivers and in fossil valleys where new agricultural practices might have been promoted. The approach developped here could help to delineate areas with decrease in crop and grassland production and thus to assess the vulnerability of the population, but also to target zones with good potential for planning long

  18. Real-time network security situation visualization and threat assessment based on semi-Markov process

    Science.gov (United States)

    Chen, Junhua

    2013-03-01

    To cope with a large amount of data in current sensed environments, decision aid tools should provide their understanding of situations in a time-efficient manner, so there is an increasing need for real-time network security situation awareness and threat assessment. In this study, the state transition model of vulnerability in the network based on semi-Markov process is proposed at first. Once events are triggered by an attacker's action or system response, the current states of the vulnerabilities are known. Then we calculate the transition probabilities of the vulnerability from the current state to security failure state. Furthermore in order to improve accuracy of our algorithms, we adjust the probabilities that they exploit the vulnerability according to the attacker's skill level. In the light of the preconditions and post-conditions of vulnerabilities in the network, attack graph is built to visualize security situation in real time. Subsequently, we predict attack path, recognize attack intention and estimate the impact through analysis of attack graph. These help administrators to insight into intrusion steps, determine security state and assess threat. Finally testing in a network shows that this method is reasonable and feasible, and can undertake tremendous analysis task to facilitate administrators' work.

  19. An Assessment of the New York State Enhanced Security Guard Training Legislation and Its Efficacy on Security Officer Preparedness

    Science.gov (United States)

    2011-12-01

    Relations ................................60  c.  Training with Security Technology ........................................60  d.  Training in Report...128  Table 27.  Training in Security Technology ...................................................................129  Table 28...and the program sites of financial institutions, stock markets and money markets.” Banks like Goldman Sachs, Citibank , JP Morgan Chase, Barclays

  20. Dynamic assessment: an approach to assessing children's language-learning potential.

    Science.gov (United States)

    Gutiérrez-Clellen, V F

    2000-01-01

    Dynamic assessment represents an alternative approach to traditional language assessments. In dynamic assessment, the examiner attempts to assess the child's potential for language change or modifiability. This article discusses the development of this approach from its early psychological applications to current models of dynamic assessment as they apply to the assessment of child language. Dynamic assessment is particularly useful in addressing cultural differences that may influence children's assessment performance. The approach involves a test-teach-retest paradigm that includes mediated learning experiences, measures of test score gains, ratings of modifiability and language-learning strategies, as well as analyses of qualitative changes in children's responses.

  1. Transmission grid security

    CERN Document Server

    Haarla, Liisa; Hirvonen, Ritva; Labeau, Pierre-Etienne

    2011-01-01

    In response to the growing importance of power system security and reliability, ""Transmission Grid Security"" proposes a systematic and probabilistic approach for transmission grid security analysis. The analysis presented uses probabilistic safety assessment (PSA) and takes into account the power system dynamics after severe faults. In the method shown in this book the power system states (stable, not stable, system breakdown, etc.) are connected with the substation reliability model. In this way it is possible to: estimate the system-wide consequences of grid faults; identify a chain of eve

  2. Risk-based Security Assessment in Distribution Network with the Integration of Photovoltaic

    Directory of Open Access Journals (Sweden)

    Sheng Wanxing

    2016-01-01

    Full Text Available With the development of distribution network, distributed generation such as wind and photovoltaic (PV power will become increasingly prominent in the near future. PV is widely constructed because of advantages it has. However, the volatility and randomness of PV makes it more complex than traditional energy in the security assessment of distribution network. Based on risk theory, considering the randomness of PV, node low voltage risk index and line overload risk index are established in this paper. Also, K (N - 1 + 1 principle for distribution network which is developed from traditional (N-1 deterministic principle is applied to reflect the flexible structure of distribution network. IEEE three-feeder example system is utilized to investigate the influence of PV power on the security assessment of distribution network.

  3. COMPARATIVE STUDY ON ENERGY CONSUMPTION IN DYNAMIC WINDOW SECURED IMPLICIT GEOGRAPHIC FORWARDING ROUTING PROTOCOL

    Directory of Open Access Journals (Sweden)

    Abubakar Idris Umar

    2014-01-01

    Full Text Available An Ideal WSNs should operate with the least possible energy required in order to increase the lifetime of the sensor nodes and at the same time, ensure network connectivity. But the Inherent power limitation makes power-awareness a critical requirement for WSN, this calls for the need to manage energy in sensor nodes. Also In order to ensure successful transmission of data from sensor node source to destination, it becomes necessary to maintain network availability. The network must be resilient to individual node failure which can happen due to zero power posses by the node and due to security attacks posed on the node and the network. Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF routing protocol has proven to be robust, efficient and resistant to some security attack which causes failure in network availability. However the extent to which energy is consumed in sensor nodes which deploys DWSIGF as its routing protocol has never been mentioned. In this research, we performed a comparative study on energy consumption in DWSIGF routing protocol. Using the first order radio model, we determined the energy consumed in a network. The protocol (DWSIGF is matched up against its counterpart SIGF as the traffic is increased. Observation shows that DWSIGF due to the variable timing assigned to the CTS collection window, CTS signal fails to reach destination as collection window time expires, thus the need for retransmission. This in turn consumes more energy than the counterpart SIGF which has a fixed CTS collection time. The simulation work was done using Matlab 7.0. Energy consumed in the random variant of both protocols (DWSIGF and SIGF was also observed to be higher than the priority variant of the protocols.

  4. Dynamic Allocation of CPUs in Multicore Processor for Performance Improvement in Network Security Applications

    Directory of Open Access Journals (Sweden)

    Sudhakar Gummadi

    2011-01-01

    Full Text Available Problem statement: Multicore and multithreaded CPUs have become the new approach for increase in the performance of the processor based systems. Numerous applications benefit from use of multiple cores. Increasing performance of the system by increasing the number of CPUs of the multicore processor for a given application warrants detailed experimentation. In this study, the results of the experimentation done by dynamic allocation/deallocation of the CPU based on the workload conditions for the packet processing for security application are analyzed and presented. Approach: This evaluation was conducted on SunfireT1000 server having Sun UltraSPARC T1 multicore processor. OpenMP tasking feature is used for scheduling the logical CPUs for the parallelized application. Dynamic allocation of a CPU to a process is done depending on the workload characterization. Results: Execution time for packet processing was analyzed to arrive at an effective dynamic allocation methodology that is dependant on the hardware and the workload. Conclusion/Recommendations: Based on the analysis, the methodology and the allocation of the number of CPUs for the parallelized application are suggested.

  5. Actions Needed to Improve the Reliability of Afghan Security Force Assessments

    Science.gov (United States)

    2010-06-29

    Assessment Tool VTT Validation Transition Team SIGAR Audit-10-11 Security/ANSF Capability Ratings Page 1 Actions Needed to Improve the...the part of Afghan units. In addition, IJC’s Validation Transition Team ( VTT ), which provides independent validation of CM1 capabilities for the...personnel were present for duty in ANA-fielded combat units. The ANA’s manning shortage was confirmed in statements by VTT officials who reported

  6. The use of information technology security assessment criteria to protect specialized computer systems

    Energy Technology Data Exchange (ETDEWEB)

    Lykov, V.A.; Shein, A.V. [Atominform of Russia (Russian Federation); Piskarev, A.S. [Atomzashchitinform of Russia (Russian Federation); Devaney, D.M.; Melton, R.B. [Pacific Northwest National Lab., Richland, WA (United States); Hunteman, W.J.; Prommel, J.M. [Los Alamos National Lab., NM (United States); Rothfuss, J.S. [Lawrence Livermore National Lab., CA (United States)

    1997-10-01

    The purpose of this paper is to discuss the information security assessment criteria used in Russia and compare it with that used in the United States. The computer system security assessment criteria utilized by the State Technical Commission of Russia and similar criteria utilized by the US Department of Defense (TCSEC) are intended for the development and implementation of proven methods for achieving a required level of information security. These criteria are utilized, first and foremost, when conducting certification assessments of general purpose systems. The Russian Federation is creating specialized systems for nuclear material control and accountancy (MC and A) within the framework of the international laboratory-to-laboratory collaboration. Depending on the conditions in which the MC and A system is intended to operate, some of the criteria and the attendant certification requirements may exceed those established or may overlap the requirements established for attestation of such systems. In this regard it is possible to modify the certification and attestation requirements depending on the conditions in which a system will operate in order to achieve the ultimate goal--implementation of the systems in the industry.

  7. On the security of a dynamic ID-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Lin, Han-Yu

    2013-04-01

    Telecare medical information systems (TMISs) are increasingly popular technologies for healthcare applications. Using TMISs, physicians and caregivers can monitor the vital signs of patients remotely. Since the database of TMISs stores patients' electronic medical records (EMRs), only authorized users should be granted the access to this information for the privacy concern. To keep the user anonymity, recently, Chen et al. proposed a dynamic ID-based authentication scheme for telecare medical information system. They claimed that their scheme is more secure and robust for use in a TMIS. However, we will demonstrate that their scheme fails to satisfy the user anonymity due to the dictionary attacks. It is also possible to derive a user password in case of smart card loss attacks. Additionally, an improved scheme eliminating these weaknesses is also presented.

  8. Dynamic security issues in autonomous power systems with increasing wind power penetration

    DEFF Research Database (Denmark)

    Margaris, I.D.; Hansen, Anca Daniela; Sørensen, Poul Ejnar

    2011-01-01

    Technical requirements set by the network operators nowadays include various aspects, such as fault ride-through capability of wind turbines during faults, voltage-reactive power control and overall control of the wind farms as conventional power plants. Detailed models for the power system as well...... as for the wind farms are therefore essential for power system studies related to these issues, especially when applied to non interconnected systems with high wind power penetration. Detailed generic models for three different wind turbine technologies – Active Stall Induction Generator (ASIG), Doubly Fed...... Asynchronous Generator (DFAG) and Permanent Magnet Synchronous Generator (PMSG) – are applied and issues regarding interaction with the power system are investigated. This paper provides conclusions about the dynamic security of non-interconnected power systems with high wind power penetration based...

  9. Truck shipment risks for assessing hazardous materials - a new paradigm incorporating safety and security

    Energy Technology Data Exchange (ETDEWEB)

    Greenberg, A.; McSweeney, T.; Allen, J.; Lepofsky, M. [Battelle Memorial Inst., Columbus, OH (United States); Abkowitz, M. [Dept. of Civil Engineering, Vanderbilt Univ., Nashville, TN (United States)

    2004-07-01

    Recent terrorist events, most notably September 11, 2001, have taught us that transportation risk management must be performed with a different lens to accommodate terrorism scenarios that would have previously been considered unlikely to warrant serious attention. Given these circumstances, a new paradigm is needed for managing the risks associated with highway transport of hazardous materials. In particular, this paradigm must: 1) more explicitly consider security threat and vulnerability, and 2) integrate security considerations into an overall framework for addressing natural and man-made disasters, be they accidental or planned. This paper summarizes the results of a study sponsored by the U.S. Department of Transportation, Federal Motor Carrier Safety Administration for the purpose of exploring how a paradigm might evolve in which both safety and security risks can be evaluated as a systematic, integrated process. The work was directed at developing a methodology for assessing the impacts of hazardous materials safety and security incident consequences when transported by highway. This included consideration of the manner in which these materials could be involved in initiating events as well as potential outcomes under a variety of release conditions. The methodology is subsequently applied to various classes of hazardous materials to establish an economic profile of the impacts that might be expected if a major release were to occur. The paper concludes with a discussion of the findings and implications associated with this effort.

  10. A Fuzzy Set-Based Approach for Model-Based Internet-Banking System Security Risk Assessment

    Institute of Scientific and Technical Information of China (English)

    LI Hetian; LIU Yun; HE Dequan

    2006-01-01

    A fuzzy set-based evaluation approach is demonstrated to assess the security risks for Internet-banking System. The Internet-banking system is semi-formally described using Unified Modeling Language (UML) to specify the behavior and state of the system on the base of analyzing the existing qualitative risk assessment methods. And a quantitative method based on fuzzy set is used to measure security risks of the system. A case study was performed on the WEB server of the Internet-banking System using fuzzy-set based assessment algorithm to quantitatively compute the security risk severity. The numeric result also provides a method to decide the most critical component which should arouse the system administrator enough attention to take the appropriate security measure or controls to alleviate the risk severity. The experiments show this method can be used to quantify the security properties for the Internet-banking System in practice.

  11. A DPSIR model for ecological security assessment through indicator screening: a case study at Dianchi Lake in China.

    Science.gov (United States)

    Wang, Zhen; Zhou, Jingqing; Loaiciga, Hugo; Guo, Huaicheng; Hong, Song

    2015-01-01

    Given the important role of lake ecosystems in social and economic development, and the current severe environmental degradation in China, a systematic diagnosis of the ecological security of lakes is essential for sustainable development. A Driving-force, Pressure, Status, Impact, and Risk (DPSIR) model, combined with data screening for lake ecological security assessment was developed to overcome the disadvantages of data selection in existing assessment methods. Correlation and principal component analysis were used to select independent and representative data. The DPSIR model was then applied to evaluate the ecological security of Dianchi Lake in China during 1988-2007 using an ecological security index. The results revealed a V-shaped trend. The application of the DPSIR model with data screening provided useful information regarding the status of the lake's ecosystem, while ensuring information efficiency and eliminating multicollinearity. The modeling approach described here is practical and operationally efficient, and provides an attractive alternative approach to assess the ecological security of lakes.

  12. Development and usage of a secure assessment software system for the medical education

    Directory of Open Access Journals (Sweden)

    Heid, Jörn

    2006-11-01

    Full Text Available The regulation governing the licensing of physicians in Germany requires a large amount of examinations in medical curricula. The usage of computer-based assessment software, especially for case based examinations, is recommended. Today most systems available use a web-based approach. However, this approach reveals a lack of legal certainty and fail-safety with respect to problems related to the network and the application. To solve these problems a secure assessment software has been developed which is successfully used at the University of Heidelberg.

  13. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  14. The Multimodal Assessment of Adult Attachment Security: Developing the Biometric Attachment Test.

    Science.gov (United States)

    Parra, Federico; Miljkovitch, Raphaële; Persiaux, Gwenaelle; Morales, Michelle; Scherer, Stefan

    2017-04-06

    Attachment theory has been proven essential for mental health, including psychopathology, development, and interpersonal relationships. Validated psychometric instruments to measure attachment abound but suffer from shortcomings common to traditional psychometrics. Recent developments in multimodal fusion and machine learning pave the way for new automated and objective psychometric instruments for adult attachment that combine psychophysiological, linguistic, and behavioral analyses in the assessment of the construct. The aim of this study was to present a new exposure-based, automatic, and objective adult-attachment assessment, the Biometric Attachment Test (BAT), which exposes participants to a short standardized set of visual and music stimuli, whereas their immediate reactions and verbal responses, captured by several computer sense modalities, are automatically analyzed for scoring and classification. We also aimed to empirically validate two of its assumptions: its capacity to measure attachment security and the viability of using themes as placeholders for rotating stimuli. A total of 59 French participants from the general population were assessed using the Adult Attachment Questionnaire (AAQ), the Adult Attachment Projective Picture System (AAP), and the Attachment Multiple Model Interview (AMMI) as ground truth for attachment security. They were then exposed to three different BAT stimuli sets, whereas their faces, voices, heart rate (HR), and electrodermal activity (EDA) were recorded. Psychophysiological features, such as skin-conductance response (SCR) and Bayevsky stress index; behavioral features, such as gaze and facial expressions; as well as linguistic and paralinguistic features, were automatically extracted. An exploratory analysis was conducted using correlation matrices to uncover the features that are most associated with attachment security. A confirmatory analysis was conducted by creating a single composite effects index and by testing it

  15. The complexity of an investment competition dynamical model with imperfect information in a security market

    Energy Technology Data Exchange (ETDEWEB)

    Xin Baogui [Nonlinear Dynamics and Chaos Group, School of Management, Tianjin University, Tianjin 300072 (China); School of Economics and Management, Shandong University of Science and Technology, Qingdao 266510 (China)], E-mail: baoguixin@yahoo.com; Ma Junhai; Gao Qin [Nonlinear Dynamics and Chaos Group, School of Management, Tianjin University, Tianjin 300072 (China)

    2009-11-30

    We present a nonlinear discrete dynamical model of investment competition with imperfect information for N heterogeneous oligopolists in a security market. In this paper, our focus is on a given three-dimensional model which exhibits highly rich dynamical behaviors. Based on Wen's Hopf bifurcation criterion [Wen GL. Criterion to identify Hopf bifurcations in maps of arbitrary dimension. Phys Rev E 2005;72:026201-3; Wen GL, Xu DL, Han X. On creation of Hopf bifurcations in discrete-time nonlinear systems. Chaos 2002;12(2):350-5] and Kuznetsov's normal form theory [Kuznetsov YA. Elements of applied bifurcation theory. New York: Springer-Verlag; 1998. p. 125-37], we study the model's stability, criterion and direction of Neimark-Sacker bifurcation. Moreover, we numerically simulate a complexity evolution route: fixed point, closed invariant curve, double closed invariant curves, fourfold closed invariant curves, strange attractor, period-3 closed invariant curve, period-3 2-tours, period-4 closed invariant curve, period-4 2-tours.

  16. Security Enhancement of Knowledge-based User Authentication through Keystroke Dynamics

    Directory of Open Access Journals (Sweden)

    Roy Soumen

    2016-01-01

    Full Text Available Keystroke Dynamics is a behavioural biometrics characteristic in Biometric science, which solve the issues in user identification or verification. In Knowledge-based user authentication technique, we compromise with PIN or password which is unsafe due to different type of attacks. It is good to choose password with the combination of upper and lower case letter with some digits and symbols, but which is very hard to remember or generally we forget to distinguish those passwords for different access control systems. Our system not only takes the users’ entered texts but their typing style is also account for. In our experiment, we have not taken hard password type texts, we have chosen some daily used words where users are habituated and comfortable at typing and we obtained the consisting typing pattern. Different distance-based and data mining algorithms we have applied on collected typing pattern and obtained impressive results. As per our experiment, if we use keystroke dynamics in existing knowledge based user authentication system with minimum of five daily used common texts then it increases the security level up to 97.6% to 98.2% (if we remove some of the irrelevant feature sets.

  17. Assessment of information impacts in power system security against malicious attacks in a general framework

    Energy Technology Data Exchange (ETDEWEB)

    Bompard, E. [Dipartimento di Ingegneria Elettrica, Politecnico di Torino, I-10129 Torino (Italy)], E-mail: ettore.bompard@polito.it; Napoli, R.; Xue, F. [Dipartimento di Ingegneria Elettrica, Politecnico di Torino, I-10129 Torino (Italy)

    2009-06-15

    In the analysis of power systems security, recently a new concern related to possible malicious attacks caught much attention. Coordination among different transmission system operators (TSO) in an interconnected power system to counteract such attacks has become an important problem. This paper presents a general framework for describing the physical, cyber and decision-making aspects of the problem and their interrelations; within this framework, an analytic tool for the assessment of information impacts in handling on-line security after a malicious attack is proposed and discussed. The model is based on the socially rational multi-agent systems and the equilibrium of a fictitious play is considered to analyze the impacts of various levels of information available to the interconnected system operators on the outcomes of the decision-making process under attack. A 34-buses test system, with 3 systems interconnected by tie-lines, is presented to illustrate the model and compare the impacts of different information scenarios.

  18. Dynamic Assessment, Potential Giftedness and Mathematics Achievement in Elementary School

    Science.gov (United States)

    Popa, Nicoleta Laura; Pauc, Ramona Loredana

    2015-01-01

    Dynamic assessment is currently discussed in educational literature as one of the most promising practices in stimulating learning among various groups of students, including gifted and potentially gifted students. The present study investigates effects of dynamic assessment on mathematics achievement among elementary school students, with…

  19. Mapping the environmental risk of a tourist harbor in order to foster environmental security: Objective vs. subjective assessments.

    Science.gov (United States)

    Petrosillo, Irene; Irene, Petrosillo; Vassallo, Paolo; Paolo, Vassallo; Valente, Donatella; Donatella, Valente; Mensa, Jean Alberto; Alberto, Mensa Jean; Fabiano, Mauro; Mauro, Fabiano; Zurlini, Giovanni; Giovanni, Zurlini

    2010-07-01

    A new definition of environmental security gives equal importance to the objective and subjective assessments of environmental risk. In this framework, the management of tourist harbors has to take into account managers' perceptions. The subject of the present study is a tourist harbor in southern Italy where six different managers are present. This paper aims to assess subjectively and objectively the environmental risks associated with the harbor, and to compare the results to provide estimates of environmental security. Hereby managers have been interviewed and a simple model is used for making preliminary assessment of environmental risks. The comparison of the results highlighted a common mismatch between risk perception and risk assessment. We demonstrated that the old part of the harbor is less secure than the new part. In addition, one specific manager representing a public authority showed a leading role in ensuring the environmental security of the whole harbor.

  20. A Weakest Chain Approach to Assessing the Overall Effectiveness of the 802.11 Wireless Network Security

    CERN Document Server

    Tasoluk, Berker; 10.5121/ijwmn.2011.3101

    2011-01-01

    This study aims to assess wireless network security holistically and attempts to determine the weakest link among the parts that comprise the 'secure' aspect of the wireless networks: security protocols, wireless technologies and user habits. The assessment of security protocols is done by determining the time taken to break a specific protocol's encryption key, or to pass an access control by using brute force attack techniques. Passphrase strengths as well as encryption key strengths ranging from 40 to 256 bits are evaluated. Different scenarios are planned and created for passphrase generation, using different character sets and different number of characters. Then each scenario is evaluated based on the time taken to break that passphrase. At the end of the study, it is determined that the choice of the passphrase is the weakest part of the entire 802.11 wireless security system.

  1. 业务安全评估初探%Exploration on Business Security Assessment

    Institute of Scientific and Technical Information of China (English)

    李蔚

    2012-01-01

    In order to improve the security situation of E-government services, the general framework and method for e-government security assessment is proposed and designed. Under the guidance of this framework and method, the people could implement e-government business security assessment more systematically. Experiment indicates that this innovative assessment framework and method is very effective and comprehensive. This assessment framework and method could reduce various risks and vulnerabilities in technical implementation and management process of e-government web-site, thus to ensure a well protected e-government services environment.%为提高电子政务业务安全,降低电子政务业务活动过程中可能出现的安全风险,文中通过设计电子政务业务安全评估的一般性框架和评估方法,并在该框架和方法指导下,专门针对特定电子政务业务应用进行评估实践,完成了特定电子政务业务各活动的安全评估过程。通过实践表明,业务安全评估这一创新的评估框架和方法,能够有效减少电子政务网站业务的技术、管理过程中的各种风险和脆弱性,以保障一个业务交付的安全。

  2. A critical assessment of the different approaches aimed to secure electricity generation supply

    Energy Technology Data Exchange (ETDEWEB)

    Batlle, C.; Rodilla, P. [Technological Research Institute, Pontifical University of Comillas, Sta. Cruz de Marcenado 26, 28015 Madrid (Spain)

    2010-11-15

    Since the very beginning of the power systems reform process, one of the key questions posed has been whether the market, of its own accord, is able to provide satisfactory security of supply at the power generation level or if some additional regulatory mechanism needs to be introduced, and in the latter case, which is the most suitable approach to tackle the problem. This matter is undoubtedly gaining importance and it has taken a key role in the energy regulators' agendas. In this paper, we critically review and categorize the different approaches regulators can opt for to deal with the problem of guaranteeing (or at least enhancing) security of supply in a market-oriented environment. We analyze the most relevant regulatory design elements throughout an updated assessment of the broad range of international experiences, highlighting the lessons we have learned so far in a variety of contexts. Based on the analysis, we conclude by providing a set of principles and criteria that should be considered by the regulator when designing a security of supply mechanism. (author)

  3. Formal Safety and Security Assessment of an Avionic Architecture with Alloy

    Directory of Open Access Journals (Sweden)

    Julien Brunel

    2014-05-01

    Full Text Available We propose an approach based on Alloy to formally model and assess a system architecture with respect to safety and security requirements. We illustrate this approach by considering as a case study an avionic system developed by Thales, which provides guidance to aircraft. We show how to define in Alloy a metamodel of avionic architectures with a focus on failure propagations. We then express the specific architecture of the case study in Alloy. Finally, we express and check properties that refer to the robustness of the architecture to failures and attacks.

  4. Analysis And Assessment Of The Security Method Against Incidental Contamination In The Collective Water Supply System

    Directory of Open Access Journals (Sweden)

    Szpak Dawid

    2015-09-01

    Full Text Available The paper presents the main types of surface water incidental contaminations and the security method against incidental contamination in water sources. Analysis and assessment the collective water supply system (CWSS protection against incidental contamination was conducted. Failure Mode and Effects Analysis (FMEA was used. The FMEA method allow to use the product or process analysis, identification of weak points, and implementation the corrections and new solutions for eliminating the source of undesirable events. The developed methodology was shown in application case. It was found that the risk of water contamination in water-pipe network of the analyzed CWSS caused by water source incidental contamination is at controlled level.

  5. Measuring Boston’s Security Investment: Methods and Tools to Assess Homeland Security Initiatives. Policy Analysis Exercise

    Science.gov (United States)

    2009-03-31

    recommendations for MOEP as they move forward in developing a performance management system: (1) Implement a Balanced Scorecard approach; (2) Focus on...performance management systems, particularly those measuring preparedness and security -- we determined that the Balanced Scorecard is the most practical, applicable, and sustainable solution for MOEP.

  6. Research on Methods of Ecological Security Assessment of the Middle and Lower Reaches of Liaohe River Based on GIS

    Institute of Scientific and Technical Information of China (English)

    Wang Geng; Nie Baochi; Wang Lin; Wu Wei

    2005-01-01

    Ecological security assessment and early warning research possess the attributes of spatiality,non-linearity and randomicity, so we must process much spatial information. Spatial analysis and data management are the advantages of GIS, which can define distribution trend and spatial relations of environmental factors, and show ecological security pattern graphically. Spatial differences of ecological security assessment based on GIS are discussed in this paper, of which the middle and lower reaches of the Liaohe River is taken as a study case. First, to work out pressure-state-response (P-S-R) assessment indicators system, and investigate in person and gather information; second, to digitize the watershed; third,to quantize and calculate by the fuzzy method; last,to construct GIS grid database, and expound spatial differences of ecological security by GIS interpolation and assembly analysis.

  7. Comparing Two Forms of Dynamic Assessment and Traditional Assessment of Preschool Phonological Awareness

    Science.gov (United States)

    Kantor, Patricia Thatcher; Wagner, Richard K.; Torgesen, Joseph K.; Rashotte, Carol A.

    2011-01-01

    The goal of the current study was to compare two forms of dynamic assessment and standard assessment of preschool children's phonological awareness. The first form of dynamic assessment was a form of scaffolding in which item formats were modified in response to an error so as to make the task easier or more explicit. The second form of dynamic…

  8. Spatial distribution of ecological security status assessment of West-Liaohe River based on geographic information system

    Institute of Scientific and Technical Information of China (English)

    WANG Geng; WU Wei

    2007-01-01

    Eco-security assessment is a hot research area in resource and environmental science,which involves data with much spatial,non-linear,and random features.Geographic information system (GIS),as a useful tool to analyze and manage spatial information,has a superior advantage in this field.A case study in the western part of the Liaohe River featuring a method of eco-security spatial differences (ESSD) based on GIS is developed in this paper.The method includes four steps:1) developing the pressure-state-response (P-S-R) framework with site data;2) digitizing West-Liaohe River and setting its GRID database of ecosecurity assessment indicators;3) figuring out the relative membership degree (RMD) of eco-security indicators by using the analytical hierarchy process with the weight of indicator;4) classifying the security zone and mapping the assessment result of eco-security status in grid by GIS method of assigning and clustering.The visual spatial differences of eco-security based on GIS enables decision makers to know the status of eco-security better in making policies for achieving sustainability.

  9. Prediction of Instability Separation Modes and Its Application in Practical Dynamic Security Region

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The transient critical boundary of dynamic security region (DSR) can be approximated by a few hyper planes correlated with instability separation modes. A method to fast predict instability separation modes is proposed for DSR calculation in power injection space. The method identifies coherent generation groups by the developed K-medoids algorithm, taking a similarity matrix derived from the reachability Grammian as the index. As an experimental result, reachability Grammian matrices under local injections are approximately invariant. It indicates that the generator coherency identifications are nearly consistent for different injections. Then instability separation modes can be predicted at the normal operating point, while average initial acceleration is considered as the measure of the critical generator group to amend the error. Moreover, based on these predicted instability separation modes, a critical point search strategy for DSR calculation is illustrated in the reduced injection space of the critical generators. The proposed method was evaluated using New England Test System, and the computation accuracy and speed in determining the practical DSR were improve.

  10. Assessment of Available Numerical Tools for Dynamic Mooring Analysis

    DEFF Research Database (Denmark)

    Thomsen, Jonas Bjerg; Eskilsson, Claes; Ferri, Francesco

    This report covers a preliminary assessment of available numerical tools to be used in upcoming full dynamic analysis of the mooring systems assessed in the project _Mooring Solutions for Large Wave Energy Converters_. The assessments tends to cover potential candidate software and subsequently c...

  11. Correlates of Food Security among Low-Resource Young People: An Assessment of Community Protective Factors within Public Housing Neighborhoods.

    Science.gov (United States)

    Nebbitt, Von E; Lombe, Margaret; Chu, Yoosun; Sinha, Aakanksha; Tirmazi, Tagi

    2016-01-01

    This paper assesses how and/or whether household and community factors are associated with self-reported food security among young people living in public housing (N=151). Results suggest that food security was negatively related to age, particularly to older youth. Also, household size-have many people in the household, household hardships, and household conflict were negatively related to food security. On the contrary, food security was positively related to community cohesion and the presence of the extended family within the public housing neighborhood. Findings seem to suggest that non-specialty food previsions (e.g., community cohesion and family networks) may be important in understanding food security among families living in public housing. A number of program and policy implications are presented.

  12. Feasibility of using associative memories for static security assessment of power system overloads. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Pao, Y.H.

    1982-04-01

    As the cost of computer memory continues to decrease, at a rate about ten times that of the cost of processers, it becomes reasonable to ask whether some power systems monitoring and control tasks might be carried out more effectively with pattern recognition methodology which requires a larger memory size. Pattern recognition methods consist, in effect, of comparing a current system state with a pre-established set of data whose relative degree of security has been evaluated. This is in contrast to calculating an answer anew every time a need for information arises. This report explores the feasibility of the use of that approach for the task of static security assessment. The actual methods used are somewhat different from those used in conventional pattern recognition methodology. The two implementations explored are called associative memory patten recognition and rule-based (or rule-directed) associative memory pattern recognition. In both cases training set data are stored in association between training set patterns and attribute lists and the primary process is that of estimation of attributes. In the latter case, the entire procedure is guided on some rules providing strategy for localizing the search of training set data. The methods were investigated using a computer model of an actual transmission network comprising 196 buses at 328 branches. Our results indicate that this approach is indeed feasible and with the use of a multilevel tree-like structure of associative memories real time processing can be obtained. The rule directed associative memory pattern recognition techniques can accommodate changes in network topology. These new computer science based alternative techniques for steady states security assessment can also be applied to system control and planning.

  13. Assessment Analysis and Forecasting for Security Early Warning of Energy Consumption Carbon Emissions in Hebei Province, China

    Directory of Open Access Journals (Sweden)

    Yi Liang

    2017-03-01

    Full Text Available Against the backdrop of increasingly serious global climate change and the development of the low-carbon economy, the coordination between energy consumption carbon emissions (ECCE and regional population, resources, environment, economy and society has become an important subject. In this paper, the research focuses on the security early warning of ECCE in Hebei Province, China. First, an assessment index system of the security early warning of ECCE is constructed based on the pressure-state-response (P-S-R model. Then, the variance method and linearity weighted method are used to calculate the security early warning index of ECCE. From the two dimensions of time series and spatial pattern, the security early warning conditions of ECCE are analyzed in depth. Finally, with the assessment analysis of the data from 2000 to 2014, the prediction of the security early warning of carbon emissions from 2015 to 2020 is given, using a back propagation neural network based on a kidney-inspired algorithm (KA-BPNN model. The results indicate that: (1 from 2000 to 2014, the security comprehensive index of ECCE demonstrates a fluctuating upward trend in general and the trend of the alarm level is “Severe warning”–“Moderate warning”–“Slight warning”; (2 there is a big spatial difference in the security of ECCE, with relatively high-security alarm level in the north while it is relatively low in the other areas; (3 the security index shows the trend of continuing improvement from 2015 to 2020, however the security level will remain in the state of “Semi-secure” for a long time and the corresponding alarm is still in the state of “Slight warning”, reflecting that the situation is still not optimistic.

  14. Methodology for assessing the security risks associated with computer sites and networks. Part 1: development of a formal questionnaire for collecting security information

    Energy Technology Data Exchange (ETDEWEB)

    Corynen, G.C.

    1982-06-23

    A new methodology has been developed for the assessment of security risks associated with the operation of computer complexes. It is designed to assist computer security managers and their risk assessment teams in obtaining an overall risk figure for their computer site or network. This report emphasizes the determination of harms to computation assets due to various natural and human threats. Natural threats include earthquakes, floods, fires, and other disasters. Human threats include intentional harms such as asset theft or data modification, and unintentional harms such as errors and omissions. A group of individuals assisting each other in reaching a collective goal is also discussed. In addition to asset damages, the effects of damaging the countermeasures protecting the assets, or the supports which allow the operation of the assets, can be determined. The effects of damage to countermeasures which protect other countermeasures or supports can be analyzed also.

  15. Development Of Dynamic Probabilistic Safety Assessment: The Accident Dynamic Simulator (ADS) Tool

    Energy Technology Data Exchange (ETDEWEB)

    Chang, Y.H.; Mosleh, A.; Dang, V.N

    2003-03-01

    The development of a dynamic methodology for Probabilistic Safety Assessment (PSA) addresses the complex interactions between the behaviour of technical systems and personnel response in the evolution of accident scenarios. This paper introduces the discrete dynamic event tree, a framework for dynamic PSA, and its implementation in the Accident Dynamic Simulator (ADS) tool. Dynamic event tree tools generate and quantify accident scenarios through coupled simulation models of the plant physical processes, its automatic systems, the equipment reliability, and the human response. The current research on the framework, the ADS tool, and on Human Reliability Analysis issues within dynamic PSA, is discussed. (author)

  16. 网络安全威胁态势评估与分析技术研究%Network Security Threats Situation Assessment and Analysis Technology Study

    Institute of Scientific and Technical Information of China (English)

    王青峰; 范艳红

    2012-01-01

    近年来,网络安全逐渐发展成为互联网领域的突出问题之一,全球每年因网络安全遭到破坏而发生的军事泄密事件呈上升态势。如何实时把握网络安全威胁的动态变化,对可能发生的威胁做出预警并及时应对,成为目前我军网络安全领域亟需面对的问题之一。本文通过对安全威胁态势、评估要素的介绍,探索了当前对网络安全威胁的研究分析路径。%In recent years,network security and gradually developed into one of the outstanding problems of the Internet in the field,the global annual military network security breaches and leaks upward trend. How real-time grasp the dynamic changes of network security threats,the threat that might occur to make the early warning and timely response to become one of the urgent problems faced by our military network security field. In this paper, the trend of security threats,assess the introduction of elements,and explore the current path of research and analysis of network security threats.

  17. 支持动态策略的安全核(Security Kernel)机制的研究%Research of Security Kernel Mechanism Supporting Dynamical Policies

    Institute of Scientific and Technical Information of China (English)

    吴新勇; 熊光泽

    2002-01-01

    Security of information system requires a secure operation system. Security kernel meets the requirement and provides a bedrock to security of operation system. This paper extracts the deficiency of traditional security kernel, presents a security kernel mechanism supporting policy flexibility, simplified secure interface. It optimizes the performance by reused policy cache, provids a method to revoke granted permissions and assures the atomicity of revocation permissions and granting new permissions. As a result, all refinements help security kernel to improve its flexibility, extensibility and portability.

  18. A Secured and Improved Dynamic ID based Remote User Authentication Scheme using Smart Card and Hash Function for Distributed Systems

    Directory of Open Access Journals (Sweden)

    S.Ramesh

    2014-08-01

    Full Text Available Authentication is a major concern for accessing remote service residing over on server in an distributed systems. It is difficult to remember different identities and passwords for users. In order to solve the flaws encountered in many remote user authentication schemes in multi-server environment, only authentic user login to the remote server has been used. These remote schemes resist various attacks and have some weakness. Leu and Hsieh proposed an efficient and secure dynamic ID based remote user authentication for distributed environment using smart cards but is vulnerable to impersonation attack, leak verifier attack, stolen smart card attack. We propose a strong authentication scheme with user anonymity and secured dynamic ID based remote user authentication using smart cards that remove aforementioned weakness in distributed systems. The function and performance efficiency of our scheme was analysed and proved to provide a strong mutual authentication between user and server when compared with the existing methods.

  19. Mobile detection assessment and response systems (MDARS): a force protection physical security operational success

    Science.gov (United States)

    Shoop, Brian; Johnston, Michael; Goehring, Richard; Moneyhun, Jon; Skibba, Brian

    2006-05-01

    MDARS is a Semi-autonomous unmanned ground vehicle with intrusion detection & assessment, product & barrier assessment payloads. Its functions include surveillance, security, early warning, incident first response and product and barrier status primarily focused on a depot/munitions security mission at structured/semi-structured facilities. MDARS is in Systems Development and Demonstration (SDD) under the Product Manager for Force Protection Systems (PM-FPS). MDARS capabilities include semi-autonomous navigation, obstacle avoidance, motion detection, day and night imagers, radio frequency tag inventory/barrier assessment and audio challenge and response. Four SDD MDARS Patrol Vehicles have been undergoing operational evaluation at Hawthorne Army Depot, NV (HWAD) since October 2004. Hawthorne personnel were trained to administer, operate and maintain the system in accordance with the US Army Military Police School (USAMPS) Concept of Employment and the PM-FPS MDARS Integrated Logistic Support Plan. The system was subjected to intensive periods of evaluation under the guidance and control of the Army Test and Evaluation Center (ATEC) and PM-FPS. Significantly, in terms of User acceptance, the system has been under the "operational control" of the installation performing security and force protection missions in support of daily operations. This evaluation is intended to assess MDARS operational effectiveness in an operational environment. Initial observations show that MDARS provides enhanced force protection, can potentially reduce manpower requirements by conducting routine tasks within its design capabilities and reduces Soldier exposure in the initial response to emerging incidents and situations. Success of the MDARS program has been instrumental in the design and development of two additional robotic force protection programs. The first was the USAF Force Protection Battle Lab sponsored Remote Detection Challenge & Response (REDCAR) concept demonstration

  20. Scenario-neutral Food Security Risk Assessment: A livestock Heat Stress Case Study

    Science.gov (United States)

    Broman, D.; Rajagopalan, B.; Hopson, T. M.

    2015-12-01

    Food security risk assessments can provide decision-makers with actionable information to identify critical system limitations, and alternatives to mitigate the impacts of future conditions. The majority of current risk assessments have been scenario-led and results are limited by the scenarios - selected future states of the world's climate system and socioeconomic factors. A generic scenario-neutral framework for food security risk assessments is presented here that uses plausible states of the world without initially assigning likelihoods. Measures of system vulnerabilities are identified and system risk is assessed for these states. This framework has benefited greatly by research in the water and natural resource fields to adapt their planning to provide better risk assessments. To illustrate the utility of this framework we develop a case study using livestock heat stress risk within the pastoral system of West Africa. Heat stress can have a major impact not only on livestock owners, but on the greater food production system, decreasing livestock growth, milk production, and reproduction, and in severe cases, death. A heat stress index calculated from daily weather is used as a vulnerability measure and is computed from historic daily weather data at several locations in the study region. To generate plausible states, a stochastic weather generator is developed to generate synthetic weather sequences at each location, consistent with the seasonal climate. A spatial model of monthly and seasonal heat stress provide projections of current and future livestock heat stress measures across the study region, and can incorporate in seasonal climate and other external covariates. These models, when linked with empirical thresholds of heat stress risk for specific breeds offer decision-makers with actionable information for use in near-term warning systems as well as for future planning. Future assessment can indicate under which states livestock are at greatest risk

  1. Applications of nuclear safety probabilistic risk assessment to nuclear security for optimized risk mitigation

    Energy Technology Data Exchange (ETDEWEB)

    Donnelly, S.K.; Harvey, S.B. [Amec Foster Wheeler, Toronto, Ontario (Canada)

    2016-06-15

    Critical infrastructure assets such as nuclear power generating stations are potential targets for malevolent acts. Probabilistic methodologies can be applied to evaluate the real-time security risk based upon intelligence and threat levels. By employing this approach, the application of security forces and other protective measures can be optimized. Existing probabilistic safety analysis (PSA) methodologies and tools employed. in the nuclear industry can be adapted to security applications for this purpose. Existing PSA models can also be adapted and enhanced to consider total plant risk, due to nuclear safety risks as well as security risks. By creating a Probabilistic Security Model (PSM), safety and security practitioners can maximize the safety and security of the plant while minimizing the significant costs associated with security upgrades and security forces. (author)

  2. Causes, rationales and dynamics : exploring the strategic security partnership between the European Union and Africa

    NARCIS (Netherlands)

    Siradag, Abdurrahim

    2012-01-01

    This study examines a strategic partnership in the areas of peace and security between the EU and Africa. The EU has been strengthening its institutional ties with African organisations since 2000, with security relations with Africa a priority on the EU’s agenda following the 9/11 attacks on the Un

  3. Dynamic model of minimax control over economic security state of the region in the presence of risks

    Directory of Open Access Journals (Sweden)

    Andrey Fedorovich Shorikov

    2012-06-01

    Full Text Available Investigation and solution of management of economic security state in the region (MESSR requires development of a dynamic economic-mathematical model that takes into account the presence of control actions, uncontrolled parameters (risk modeling errors, etc. and availability of information deficit. At the same time, the existing approaches to solving such problems are based primarily on static models and the use of stochastic modeling of the device, which is required for the application of knowledge of the probability characteristics of the main model parameters and special conditions for the realization of the process. We should note that to use the apparatus of stochastic modeling, very strict conditions are required, which in practice are usually not feasible in advance In this paper, we propose to use a deterministic approach for modeling and solving the original problem in the form of a dynamic programming problem of minimax control (optimization of a guaranteed result MESSR at the determined point of time, taking into account the availability of risks of deterministic and stochastic nature (combined risks model. At thesametime, under therisks in thesocial and economic system we understand thefactors that negatively catastrophically affect the results of the reviewed processes inside it. For an effective use, a technique of prediction and assessment of time rows and stochastic risks in MESSR optimization process is presented, which can serve as a basis for the development of appropriate computer software. To solve the problem of program minimax control MESSR in the presence of risks, we propose a method which is reduced to the realization of a finite number of solutions of linear and convex mathematical programming and discrete optimization problem. The proposed method makes it possible to develop efficient numerical procedures to implement computer simulation of the dynamics of the problem, build program minimax control and gain optimal

  4. Indonesian CPO availability analysis to support food and energy security: a system dynamic approach

    Science.gov (United States)

    Rahman, T.; Arkeman, Y.; Setyaningsih, D.; Saparita, R.

    2017-05-01

    The development of biofuels could be a solution to overcome the energy problem. One of biofuel that has the potential to be developed, namely palm oil biodiesel that is also the raw material for food. As a provider of CPO raw materials, the production of palm biodiesel could trigger competitions, from biofuels demand growth and utilization of agricultural resources. Thus, it needs to be analyzed to determine the adequency of CPO supply to fulfill the need of food and policy recomendation which sets the development of palm oil biodiesel can be synergies with food need especially for the supply of raw material CPO. To obtain the optimal policy in the synergy between the raw material of CPO for food and energy is a need to establish some policy scenarios that allow to be applied and then chosen the best policy alternative of all scenarios. The purpose of this research were to : 1) analysis the availability of CPO to meet the needs of food and energy, 2) provide policy recommendation with regard biodiesel development of food security. The model made used system dynamic method. Several scenarios that used in the model are: 1) existing condition, 2) The scenario increase biodiesel production capacity and increase land productivity, 3) reduction scenario CPO export by 30%, 4) scenario use othe raw material for biodiesel by 20%. The simulation results showed the availability of CPO raw materials would answer all needs of both food and biodiesel when there was an increase in productivity, diversification of raw materials, and also a reduction in palm oil exports. It was needed an integrated policy from upstream to downstream along with the consistency of implementation. Policy suggestions that could be considered were increased productivity through agricultural intensification, enforcement disincentive policies of CPO to exports, and development of non-CPO biodiesel raw materials and development of renewable energy.

  5. Agriculture and food security challenge of climate change: a dynamic analysis for policy selection

    Directory of Open Access Journals (Sweden)

    Ferdous Ahmed

    2016-08-01

    Full Text Available ABSTRACT This study presents an empirical examination of climate change related to vulnerability impacts on food security and remedial adaptation options as a suitable strategy by prioritizing needs over a 50-year period. An Empirical Dynamic Commutable General Equilibrium Model for Climate and the Economy (EDCGECE is applied using future strategies for Malaysia against a baseline scenario of existing conditions, following the top-down options. The model takes into account various climatic variables, including climatic damage, carbon cycle, temperature and rainfall fluctuation, carbon emissions, vulnerability and carbon concentrations, which were adapted from national observational predictions of climatic changes caused by global warming from 2015 to 2065. The results prioritize climate change mitigation for the future. Specifically, this study estimates Malaysia’s food sustainability prospects without adaptation actions and with 5 % to 20 % adaptation actions overtime in different adaptation scenarios, as contrasted with the baseline. The results indicate that food sustainability cost in the baseline in 2015 is 859.3 million US Dollar (USD, which is about a 30-35 % shortage compared with the national targets, and that the shortage will rise over time to USD 987.3 million in 2065. However, the cost of applying different levels of adaptation for food sustainability over time is rising considerably. However, the residual damage also decreases with all adaptation actions in the different scenarios. Thus, adaptation shows a positive sign for Malaysia’s agricultural sectors. As growth values are positive and show rising trends, therefore the projected adaptation policy can be effective for food sustainability for sustainable future strategies in Malaysia.

  6. Developing the P2/6 methodology [to assess the security capability of modern distributed generation

    Energy Technology Data Exchange (ETDEWEB)

    Allan, Ron; Strbac, Goran; Djapic, Predrag; Jarrett, Keith [Manchester Univ. Inst. of Science and Technology, Manchester (United Kingdom)

    2004-04-29

    The main objective of the project was to use the methodology developed in the previous Methodology project (ETSU/FES Project K/EL/00287) to assess the security capability of modern distributed generation in order to review Table 2 and related text of Engineering Recommendation P2/5, and to propose information and results that could be used to create a new P2/6 that takes into account modern types of generating units; unit numbers; unit availabilities; and capacities. Technical issues raised in the previous study but held over until this project include: Treatment of single unit generation systems; Effect of shape of load duration curves; Persistence of intermittent generation, T{sub m}; Time resolution of intermittent generation output profiles; Ride-through capability; Risk to loss of supply. Three main ways of implementing the methodology were recommended: Look-up table(s), Graphical, and Computer program. The specification for the computer program was to produce a simple spreadsheet application package that an engineer with a reasonably knowledge of the approach could use. This prototype package has been developed in conjunction with Workstream 3. Its objective is to calculate the capability contribution to security of supply from distributed generation connected to a particular demand group. The application has been developed using Microsoft Excel and Visual Basic for Applications. New Tables for inclusion in P2/6 are included. (UK)

  7. An Integrated Framework For Power And ICT System Risk-Based Security Assessment

    Directory of Open Access Journals (Sweden)

    Emanuele Ciapessoni*,

    2014-01-01

    Full Text Available Power system (PS is exposed to natural and man-related threats which may affect the security of power supply, depending on the vulnerabilities of the system to the threats themselves as well as on the pre-fault operating conditions. Threats regard not only the power components, but also the Information and Communications Technology (ICT systems involved in PS control and protection. The resulting picture is characterized by significant uncertainties, especially as far as high impact, low probability (HILP events (typical causes of blackout events are concerned. These considerations call for the adoption of novel techniques to perform more in-depth security analyses, able to identify the contributions of the different threats and vulnerabilities to the overall operational risk. The paper describes a probabilistic risk-based methodology, developed within the European Union (EU research project AFTER (A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration, aiming to perform risk assessment (by means of hazard, vulnerability, and impact analysis of the integrated power and ICT systems. Initial results of the approach are described with reference to a test system.

  8. Security risk assessment of the primary layer of wavelength division multiplexing passive optical network

    Science.gov (United States)

    Koudelka, Petr; Siska, Petr; Latal, Jan; Poboril, Radek; Hajek, Lukas; Kepak, Stanislav; Vasinek, Vladimir

    2015-01-01

    Next-generation passive optical access networks come to the fore nowadays. These optical next-generation networks are the response to the increasing qualitative requirements from end users. Technologies using Time Division Multiplexing include NG-PON (XG-PON 1 and XG-PON 2) and 10GEPON. Their advantage is the applicability to older topologies, which are operated by the original technology of passive optical access networks. Wavelength Division Multiplexing Passive Optical Network (WDM-PON) is an alternative also belonging to next-generation networks. Time Division Multiplexing is in this case replaced by Wavelength Division Multiplexing. Certain variants of WDM-PON use a combination of broadband light source, optical circulator, optical phased array and tunable FP laser. Construction of the terminal units (ONU) is advantageous because it can always tune in to the appropriate wavelength in the given optical DWDM channel (100 GHz). The disadvantage is the increased security risk on the primary layer due to channel crosstalk in an optical phased array (AWG). The aim of this paper is to assess the degree of security risk in real conditions. The article includes both simulation and real measurements in C + L bands with 100 GHz DWDM spacing.

  9. Computer-Based Dynamic Assessment of Multidigit Multiplication.

    Science.gov (United States)

    Gerber, Michael M.; And Others

    1994-01-01

    Design details, operation, and initial field test results are reported for DynaMath, a computer-based dynamic assessment system that provides individually tailored, instructionally useful assessment of students with disabilities. DynaMath organizes and outputs student performance data, graphically shows the "zone of proximal…

  10. Dynamic weight-bearing assessment of pain in knee osteoarthritis

    DEFF Research Database (Denmark)

    Klokker, Louise; Christensen, Robin; Wæhrens, Eva Elisabet Ejlersen

    2016-01-01

    BACKGROUND: The Osteoarthritis Research Society International (OARSI) has suggested to asses pain after specific activities consistently in clinical trials on knee OA. The Dynamic weight-bearing Assessment of Pain (DAP) assesses pain during activity (30 s of performing repeated deep knee-bends from...

  11. Secure Internet video conferencing for assessing acute medical problems in a nursing facility.

    Science.gov (United States)

    Weiner, M; Schadow, G; Lindbergh, D; Warvel, J; Abernathy, G; Dexter, P; McDonald, C J

    2001-01-01

    Although video-based teleconferencing is becoming more widespread in the medical profession, especially for scheduled consultations, applications for rapid assessment of acute medical problems are rare. Use of such a video system in a nursing facility may be especially beneficial, because physicians are often not immediately available to evaluate patients. We have assembled and tested a portable, wireless conferencing system to prepare for a randomized trial of the system s influence on resource utilization and satisfaction. The system includes a rolling cart with video conferencing hardware and software, a remotely controllable digital camera, light, wireless network, and battery. A semi-automated paging system informs physicians of patient s study status and indications for conferencing. Data transmission occurs wirelessly in the nursing home and then through Internet cables to the physician s home. This provides sufficient bandwidth to support quality motion images. IPsec secures communications. Despite human and technical challenges, this system is affordable and functional.

  12. A blue/green water-based accounting framework for assessment of water security

    Science.gov (United States)

    Rodrigues, Dulce B. B.; Gupta, Hoshin V.; Mendiondo, Eduardo M.

    2014-09-01

    A comprehensive assessment of water security can incorporate several water-related concepts, while accounting for Blue and Green Water (BW and GW) types defined in accordance with the hydrological processes involved. Here we demonstrate how a quantitative analysis of provision probability and use of BW and GW can be conducted, so as to provide indicators of water scarcity and vulnerability at the basin level. To illustrate the approach, we use the Soil and Water Assessment Tool (SWAT) to model the hydrology of an agricultural basin (291 km2) within the Cantareira Water Supply System in Brazil. To provide a more comprehensive basis for decision making, we analyze the BW and GW-Footprint components against probabilistic levels (50th and 30th percentile) of freshwater availability for human activities, during a 23 year period. Several contrasting situations of BW provision are distinguished, using different hydrological-based methodologies for specifying monthly Environmental Flow Requirements (EFRs), and the risk of natural EFR violation is evaluated by use of a freshwater provision index. Our results reveal clear spatial and temporal patterns of water scarcity and vulnerability levels within the basin. Taking into account conservation targets for the basin, it appears that the more restrictive EFR methods are more appropriate than the method currently employed at the study basin. The blue/green water-based accounting framework developed here provides a useful integration of hydrologic, ecosystem and human needs information on a monthly basis, thereby improving our understanding of how and where water-related threats to human and aquatic ecosystem security can arise.

  13. The application of multiloop diagnostics model to assess and improve the economic security of enterprises

    Directory of Open Access Journals (Sweden)

    Pluzhnikov Vladimir

    2017-01-01

    Full Text Available The author’s research is dedicated to the enhancement of the level of the enterprise economic safety. This task involves developing the concept of an integrated system for early prevention of dangers and threats of business activity, substantiation of procedures for regulating the activities of the enterprise in accordance with the changing external and internal factors. Multiloop diagnostics model is proposed to identify causal relations of management dysfunction. It allows you to receive an adequate assessment of the basic parameters of activity of the enterprise and accurately identify its status. Researching problems of economic safety of the enterprise such diagnostic methods as economic and logical analysis, statistical monitoring and strategic management were applied. There was made a conclusion that a qualitative assessment is a key tool of the level assessment of the enterprise economic safety, its control, and monitoring. It allows you to get reliable information about the real possibilities of the enterprise at different stages of development, to monitor and evaluate the level of economic security, find effective solutions to transition to a higher level of economic safety of the enterprise.

  14. Dynamic assessment in EFL classrooms: Assessing listening comprehension in three proficiency levels

    Directory of Open Access Journals (Sweden)

    Sara Hashemi Shahraki

    2015-01-01

    Full Text Available The use of dynamic assessment (DA, grounded in Vygotskian Sociocultural theory, in classrooms is believed to have the potential to provide a situation for creating a group of learners’ Zone of Proximal Development (ZPD (Poehener, 2009. The present study explored the implementation of DA in English as Foreign Language (EFL classrooms on groups of learners at different proficiency levels in the context of listening comprehension. 146 Iranian EFL learners at three proficiency levels were selected for this study (experimental groups=71 and control groups=75. A multi-assessment procedure in the format of dynamic and non-dynamic pretest-enrichment phase-dynamic and non-dynamic posttest was conducted. During the nine-week group dynamic assessment procedures, mediational strategies were only given to the experimental groups. The quantitative data analysis revealed that through mediated interactions within the group’s ZPD, group dynamic assessment is able to determine the learners’ developed abilities in listening comprehension while at the same time support the development of individual learners in this skill. Moreover, it was found that the level of proficiency of the learners did not have a significant effect on learners’ gains from group dynamic assessment procedures. These findings can have implications for all classroom teachers that the use of DA in classroom setting cannot only be beneficial to them but also be considered as a strategic learning and assessment method that can meet both the learners’ and teacher’s needs.

  15. A DPSIR model for ecological security assessment through indicator screening: a case study at Dianchi Lake in China.

    Directory of Open Access Journals (Sweden)

    Zhen Wang

    Full Text Available Given the important role of lake ecosystems in social and economic development, and the current severe environmental degradation in China, a systematic diagnosis of the ecological security of lakes is essential for sustainable development. A Driving-force, Pressure, Status, Impact, and Risk (DPSIR model, combined with data screening for lake ecological security assessment was developed to overcome the disadvantages of data selection in existing assessment methods. Correlation and principal component analysis were used to select independent and representative data. The DPSIR model was then applied to evaluate the ecological security of Dianchi Lake in China during 1988-2007 using an ecological security index. The results revealed a V-shaped trend. The application of the DPSIR model with data screening provided useful information regarding the status of the lake's ecosystem, while ensuring information efficiency and eliminating multicollinearity. The modeling approach described here is practical and operationally efficient, and provides an attractive alternative approach to assess the ecological security of lakes.

  16. Environmental income improves household-level poverty assessments and dynamics

    DEFF Research Database (Denmark)

    Walelign, Solomon Zena; Charlery, Lindy Callen; Smith-Hall, Carsten

    2016-01-01

    and poverty dynamics. Poverty incidence and dynamics models including environmental income perform better than those without. Rural poverty studies based on welfare measures excluding environmental income may thus be inaccurate for environmental reliant communities.......Household-level poverty assessments and analyses of poverty dynamics in developing countries typically do not include environmental income. Using household (n = 427 in 2006, 2009 and 2012) total income panel data sets, with and without environmental income, from Nepal, we analysed the importance...... of environmental income in household-level poverty assessments (Foster-Greer-Thorbecke indices) and dynamics (movements in the Poverty Transition Matrix). Random effects logit and ordered logit models were applied to estimate variables covarying with poverty categories and compared for annual household incomes...

  17. Non-invasive assessment of phonatory and respiratory dynamics.

    Science.gov (United States)

    LaBlance, G R; Steckol, K F; Cooper, M H

    1991-10-01

    Evaluation of vocal pathology and the accompanying dysphonia should include an assessment of laryngeal structure and mobility as well as respiratory dynamics. Laryngeal structure is best observed through laryngoscopy which provides an accurate assessment of the tissues and their mobility. Respiratory measures of lung volume, air-flow and pressure, and breathing dynamics are typically determined via spirometry and pneumotachography. While the above are traditional invasive procedures which interfere with normal speech production, recent advances in electronic technology have resulted in the development of non-invasive procedures to assess phonatory and respiratory dynamics. These procedures, when used as an adjunct to laryngoscopy, can provide information that is useful in the diagnosis and management of vocal tract dysfunction. The Laryngograph and Computer-Aided Fluency Establishment Trainer, described here, are examples of this new technology.

  18. Landscape ecological security assessment based on projection pursuit in Pearl River Delta.

    Science.gov (United States)

    Gao, Yang; Wu, Zhifeng; Lou, Quansheng; Huang, Huamei; Cheng, Jiong; Chen, Zhangli

    2012-04-01

    Regional landscape ecological security is an important issue for ecological security, and has a great influence on national security and social sustainable development. The Pearl River Delta (PRD) in southern China has experienced rapid economic development and intensive human activities in recent years. This study, based on landscape analysis, provides a method to discover the alteration of character among different landscape types and to understand the landscape ecological security status. Based on remotely sensed products of the Landsat 5 TM images in 1990 and the Landsat 7 ETM+ images in 2005, landscape classification maps of nine cities in the PRD were compiled by implementing Remote Sensing and Geographic Information System technology. Several indices, including aggregation, crush index, landscape shape index, Shannon's diversity index, landscape fragile index, and landscape security adjacent index, were applied to analyze spatial-temporal characteristics of landscape patterns in the PRD. A landscape ecological security index based on these outcomes was calculated by projection pursuit using genetic algorithm. The landscape ecological security of nine cities in the PRD was thus evaluated. The main results of this research are listed as follows: (1) from 1990 to 2005, the aggregation index, crush index, landscape shape index, and Shannon's diversity index of nine cities changed little in the PRD, while the landscape fragile index and landscape security adjacent index changed obviously. The landscape fragile index of nine cities showed a decreasing trend; however, the landscape security adjacent index has been increasing; (2) from 1990 to 2005, landscape ecology of the cities of Zhuhai and Huizhou maintained a good security situation. However, there was a relatively low value of ecological security in the cities of Dongguan and Foshan. Except for Foshan and Guangzhou, whose landscape ecological security situation were slightly improved, the cities had reduced

  19. Assessing Group Dynamics in a Mars Simulation

    Science.gov (United States)

    Bishop, S. L.

    2007-10-01

    International interest in psychosocial functioning generally and issues of group and inter-group function for space crews has increased as focus has shifted towards longer duration spaceflight and, particularly, the issues involved in sending a human crew to Mars (Kanas, et al., 2001; Dawson, 2002). Planning documents for a human mission to Mars such as the NASA Design Reference Mission (DRM 1.0) emphasize the need for adaptability of crewmembers and autonomy in the crew as a whole (Hoffman and Kaplan, 1997). Similarly a major study by the International Space University (ISU, 1991) emphasized the need for autonomy and initiative for a Mars crew given that many of the scenarios that will be encountered on Mars cannot be rehearsed on earth and given the lack of any realistic possibility for rescue of the crew. This research project was only one subset of data collected during the larger AustroMars Expedition at the Mars Desert Research Facility (MDRS) in 2006. The participating crew comprises part of a multi-year investigation on teams utilizing the MDRS facility. The program of research has included numerous researchers since 2002 with a progressive evolution of key foci addressing stress, personality, coping, adaptation, cognitive functioning, and group identity assessed across the duration period of the individual missions.

  20. Development and Validation of Mechanical Engineering Trade Skills Assessment Instrument for Sustainable Job Security in Yobe State

    Science.gov (United States)

    Adamu, Gishua Garba; Dawha, Josphine Musa; Kamar, Tiamiyu Salihu

    2015-01-01

    Mechanical Engineering Trade Skills Assessment Instrument (METSAI) is aimed at determining the extent to which students have acquired practical skills before graduation that will enable them get employment for sustainable job security in Yobe state. The study employed instrumentation research design. The populations of the study were 23 mechanical…

  1. Assessment of the DoD Establishment of the Office of Security Cooperation -- Iraq

    Science.gov (United States)

    2012-03-16

    Cooperation, Defense Institute of Security Assistance Management “ Greenbook ”, 30th Edition, January 2010, pp. 1-1 – 1-6. 44...Management “ Greenbook ”, 30th Edition, January 2010, pp. 1-6 – 1-16, except for those items annotated with an asterisk (*) in the title. [Note: Items...Institute of Security Assistance Management Greenbook indicates that other sources for identifying DoD security cooperation programs include the

  2. An In-Depth Study of Complex Power System Dynamic Behavior Characteristics for Chinese UHV Power Grid Security

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. These decisions were adopted by American government and would also be helpful for the strategic development of Chinese power grid. It is proposed that China should take precaution,carry out security research on the overall dynamic behaviour characteristics of the UHV grid using the complexity theo...

  3. Dynamic weight-bearing assessment of pain in knee osteoarthritis

    DEFF Research Database (Denmark)

    Klokker, Louise; Christensen, Robin; Wæhrens, Eva E;

    2016-01-01

    BACKGROUND: The Osteoarthritis Research Society International (OARSI) has suggested to asses pain after specific activities consistently in clinical trials on knee OA. The Dynamic weight-bearing Assessment of Pain (DAP) assesses pain during activity (30 s of performing repeated deep knee-bends fr....... A change of 2.4 or more can be interpreted as clinically relevant. The DAP is a promising alternative to using 'pain on walking' as a clinical trial inclusion criterion/outcome....

  4. The Arctic as a test case for an assessment of climate impacts on national security.

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, Mark A.; Zak, Bernard Daniel; Backus, George A.; Ivey, Mark D.; Boslough, Mark Bruce Elrick

    2008-11-01

    The Arctic region is rapidly changing in a way that will affect the rest of the world. Parts of Alaska, western Canada, and Siberia are currently warming at twice the global rate. This warming trend is accelerating permafrost deterioration, coastal erosion, snow and ice loss, and other changes that are a direct consequence of climate change. Climatologists have long understood that changes in the Arctic would be faster and more intense than elsewhere on the planet, but the degree and speed of the changes were underestimated compared to recent observations. Policy makers have not yet had time to examine the latest evidence or appreciate the nature of the consequences. Thus, the abruptness and severity of an unfolding Arctic climate crisis has not been incorporated into long-range planning. The purpose of this report is to briefly review the physical basis for global climate change and Arctic amplification, summarize the ongoing observations, discuss the potential consequences, explain the need for an objective risk assessment, develop scenarios for future change, review existing modeling capabilities and the need for better regional models, and finally to make recommendations for Sandia's future role in preparing our leaders to deal with impacts of Arctic climate change on national security. Accurate and credible regional-scale climate models are still several years in the future, and those models are essential for estimating climate impacts around the globe. This study demonstrates how a scenario-based method may be used to give insights into climate impacts on a regional scale and possible mitigation. Because of our experience in the Arctic and widespread recognition of the Arctic's importance in the Earth climate system we chose the Arctic as a test case for an assessment of climate impacts on national security. Sandia can make a swift and significant contribution by applying modeling and simulation tools with internal collaborations as well as with

  5. ASSESSMENT OF THE DYNAMIC PROPERTIES OF PLAIN AND RUBBERIZED CONCRETE

    Directory of Open Access Journals (Sweden)

    Ionuţ Ovidiu TOMA

    2015-11-01

    Full Text Available The use of rubber from discarded car tires as an alternative to natural aggregates in concrete may help preventing the complete depletion of natural resources and work towards a sustainable future. Moreover it can significantly reduce the environmental footprint of the construction industry. The assessment of the dynamic properties of a material are very important from the point of view of the energy dissipation capability of the investigated material. This can be determined from the dynamic modulus of elasticity, damping and the loss coefficients of the material. The paper presents the results obtained during an experimental program aimed at assessing the dynamic characteristics of plain and rubberized concrete containing rubber crumbs from discarded car tires. The theoretical background and the investigation methodology are presented with particular application to cylindrical concrete specimens.

  6. Classroom Dynamic Assessment: A Critical Examination of Constructs and Practices

    Science.gov (United States)

    Davin, Kristin J.

    2016-01-01

    This article explores the implementation of dynamic assessment (DA) in an elementary school foreign language classroom by considering its theoretical basis and its applicability to second language (L2) teaching, learning, and development. In existing applications of L2 classroom DA, errors serve as a window into learners' instructional needs and…

  7. Discriminating Disorder from Difference Using Dynamic Assessment with Bilingual Children

    Science.gov (United States)

    Hasson, Natalie; Camilleri, Bernard; Jones, Caroline; Smith, Jodie; Dodd, Barbara

    2013-01-01

    The DAPPLE (Dynamic Assessment of Preschoolers' Proficiency in Learning English) is currently being developed in response to a clinical need. Children exposed to English as an additional language may be referred to speech and language therapy because their proficiency in English is not the same as their monolingual peers. Some, but not all, of…

  8. Dynamic Vehicle Impact for Safety Assessment of Bridges

    DEFF Research Database (Denmark)

    Kirkegaard, Poul Henning; Nielsen, Søren R. K.; Enevoldsen, I.

    In this paper the dynamic amplification of vehicle load at minor highway bridges is considered for safety assessment of the load carrying capacity of bridges. The considered case is the most critical for bridges, i.e. the simultaneous passage of two heavy trucks. A short description...

  9. Discriminating Disorder from Difference Using Dynamic Assessment with Bilingual Children

    Science.gov (United States)

    Hasson, Natalie; Camilleri, Bernard; Jones, Caroline; Smith, Jodie; Dodd, Barbara

    2013-01-01

    The DAPPLE (Dynamic Assessment of Preschoolers' Proficiency in Learning English) is currently being developed in response to a clinical need. Children exposed to English as an additional language may be referred to speech and language therapy because their proficiency in English is not the same as their monolingual peers. Some, but not all, of…

  10. Dynamic weight-bearing assessment of pain in knee osteoarthritis

    DEFF Research Database (Denmark)

    Klokker, Louise; Christensen, Robin; Osborne, Richard

    2015-01-01

    PURPOSE: To evaluate the reliability, agreement and smallest detectable change in a measurement instrument for pain and function in knee osteoarthritis; the Dynamic weight-bearing Assessment of Pain (DAP). METHODS: The sample size was set to 20 persons, recruited from the outpatient osteoarthritis...

  11. Assessing Grant Allocation Methods for Federal Homeland Security Urban Area Assistance Funding

    Science.gov (United States)

    2015-12-01

    case study of the United Kingdom’s grant allocation approach provides a comparative analysis for DHS funding. Components of the UK’s allocation...the degree of MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL POSTGRADUATE SCHOOL December 2015...38 V. UNITED KINGDOM CASE STUDY ................................................................41 A. UNITED KINGDOM APPROACH

  12. Integrated assessment and mitigation of physical and digital security threats: Case studies on virtualization

    NARCIS (Netherlands)

    Cleeff, van André; Pieters, Wolter; Wieringa, Roel; Tiel, van F.

    2011-01-01

    Virtualization is one of the enabling technologies of cloud computing. It turns once dedicated physical computing resources such as servers into digital resources that can be provisioned on demand. Cloud computing thus tends to replace physical with digital security controls, and cloud security must

  13. Assessment of the Office of Security Cooperation-Iraq Mission Capabilities

    Science.gov (United States)

    2013-09-18

    Management,” ( Greenbook ) 32nd Edition, January 2013, pp. 1-1 – 1-7. 77 AECA, and originally served to provide credit (loans) as an effective...The Management of Security Cooperation, Defense Institute of Security Assistance Management,” ( Greenbook ) 32nd Edition, January 2013, pp. 1-7 – 1-26

  14. Risk Assessment Generated by Usage of ICT and Information Security Measures

    Directory of Open Access Journals (Sweden)

    Ilie TAMAS

    2006-01-01

    Full Text Available Information societies involve the usage of information technology and communications (ITC on a large scale. The dependence on ITC is an unquestionable problem in the present, because we assist to a generality of computers usage in all economic and social life activities. That is why organization information systems became accessible at the global level and there are permanently open for a quick exchange of information between different categories of users located by different geographical nods. The ITC usage involves the existing of some risks that should be known, evaluation and based on these, we must have information systems security measure. We consider that the risk is an indicator very important that must be permanently assess in the usage process of the information system based on ITC. Risk management suppose a permanently evaluation of these problems and also restrain by some practical actions who goes to the decrease of its effects. From the expose point of view, in this paper work it is presented the results of research based on specialty literature and current cases from practical activities, regarding the risks of ITC usage and their diminishing measure. There are distinguished the main factors (threat, vulnerability and impact who affect the information risk and on the other way, diminishing measure of the action to these factors for optimum working of an economic and social organism who use ITC. We consider that through proposed measures we assume safety in design process, implement and usage of the informational systems based on ITC.

  15. Assessment of the ecological security of immobilized enzyme remediation process with biological indicators of soil health.

    Science.gov (United States)

    Zhang, Ying; Dong, Xiaonan; Jiang, Zhao; Cao, Bo; Ge, Shijie; Hu, Miao

    2013-08-01

    This study used the enzymes extracted from an atrazine-degrading strain, Arthrobacter sp. DNS10, which had been immobilized by sodium alginate to rehabilitate atrazine-polluted soil. Meanwhile, a range of biological indices were selected to assess the ecological health of contaminated soils and the ecological security of this bioremediation method. The results showed that there was no atrazine detected in soil samples after 28 days in EN+AT (the soil containing atrazine and immobilized enzyme) treatment. However, the residual atrazine concentration of the sample in AT (the soil containing atrazine only) treatment was about 5.02 ± 0.93 mg kg(-1). These results suggest that the immobilized enzyme exhibits an excellent ability in atrazine degradation. Furthermore, the immobilized enzyme could relieve soil microbial biomass carbon and soil microbial respiration intensity to 772.33 ± 34.93 mg C kg(-1) and 5.01 ± 0.17 mg CO(2) g(-1) soil h(-1), respectively. The results of the polymerase chain reaction-degeneration gradient gel electrophoresis experiment indicated that the immobilized enzyme also could make the Shannon-Wiener index and evenness index of the soil sample increase from 1.02 and 0.74 to 1.51 and 0.84, respectively. These results indicated that the immobilized enzymes not only could relieve the impact from atrazine on the soil, but also revealed that the immobilized enzymes did no significant harm on the soil ecological health.

  16. An end-to-end assessment of extreme weather impacts on food security

    Science.gov (United States)

    Chavez, Erik; Conway, Gordon; Ghil, Michael; Sadler, Marc

    2015-11-01

    Both governments and the private sector urgently require better estimates of the likely incidence of extreme weather events, their impacts on food crop production and the potential consequent social and economic losses. Current assessments of climate change impacts on agriculture mostly focus on average crop yield vulnerability to climate and adaptation scenarios. Also, although new-generation climate models have improved and there has been an exponential increase in available data, the uncertainties in their projections over years and decades, and at regional and local scale, have not decreased. We need to understand and quantify the non-stationary, annual and decadal climate impacts using simple and communicable risk metrics that will help public and private stakeholders manage the hazards to food security. Here we present an `end-to-end’ methodological construct based on weather indices and machine learning that integrates current understanding of the various interacting systems of climate, crops and the economy to determine short- to long-term risk estimates of crop production loss, in different climate and adaptation scenarios. For provinces north and south of the Yangtze River in China, we have found that risk profiles for crop yields that translate climate into economic variability follow marked regional patterns, shaped by drivers of continental-scale climate. We conclude that to be cost-effective, region-specific policies have to be tailored to optimally combine different categories of risk management instruments.

  17. Do grain reserves necessarily contribute to prices stability and food security in Sudan? An assessment

    Directory of Open Access Journals (Sweden)

    Adam E. Ahmed

    2012-06-01

    Full Text Available Most governments in Africa implement policies aiming to stabilize the prices of staple foods, which often include building up grain reserves, besides other trade measures insulating their domestic market from the world market. The mechanism should ideally work as follows, grains should be bought and stored from areas, during the surplus seasons (after harvest so as to assure fair prices to producers and should be distributed during deficit seasons, in deficit areas besides in cases of emergencies. However, ideal approaches are not necessarily followed in many developing countries due to different constraints and situations. The Strategic Reserve Corporation (SRC is an institution that is established ten years ago to play such a role in Sudan. This paper tries to assess the performance of the SRC against the overall goals and to study the related obstacles if any. We use a sample of 112 respondents from the SRC staff, related and grain farmers as our data source. Results of the research revealed numerous financial and administrative constraints that obstruct SRC from playing the intended role, which need to be considered so as to contribute to price stability and food security in Sudan.

  18. Enhanced secure strategy for electro-optic chaotic systems with delayed dynamics by using fractional Fourier transformation.

    Science.gov (United States)

    Cheng, Mengfan; Deng, Lei; Li, Hao; Liu, Deming

    2014-03-10

    We propose a scheme whereby a time domain fractional Fourier transform (FRFT) is used to post process the optical chaotic carrier generated by an electro-optic oscillator. The time delay signature of the delay dynamics is successfully masked by the FRFT when some conditions are satisfied. Meanwhile the dimension space of the physical parameters is increased. Pseudo random binary sequence (PRBS) with low bit rate (hundreds of Mbps) is introduced to control the parameters of the FRFT. The chaotic optical carrier, FRFT parameters and the PRBS are covered by each other so that the eavesdropper has to search the whole key space to crack the system. The scheme allows enhancing the security of communication systems based on delay dynamics without modifying the chaotic source. In this way, the design of chaos based communication systems can be implemented in a modular manner.

  19. Assessing atmospheric bias correction for dynamical consistency using potential vorticity

    Science.gov (United States)

    Rocheta, Eytan; Evans, Jason P.; Sharma, Ashish

    2014-12-01

    Correcting biases in atmospheric variables prior to impact studies or dynamical downscaling can lead to new biases as dynamical consistency between the ‘corrected’ fields is not maintained. Use of these bias corrected fields for subsequent impact studies and dynamical downscaling provides input conditions that do not appropriately represent intervariable relationships in atmospheric fields. Here we investigate the consequences of the lack of dynamical consistency in bias correction using a measure of model consistency—the potential vorticity (PV). This paper presents an assessment of the biases present in PV using two alternative correction techniques—an approach where bias correction is performed individually on each atmospheric variable, thereby ignoring the physical relationships that exists between the multiple variables that are corrected, and a second approach where bias correction is performed directly on the PV field, thereby keeping the system dynamically coherent throughout the correction process. In this paper we show that bias correcting variables independently results in increased errors above the tropopause in the mean and standard deviation of the PV field, which are improved when using the alternative proposed. Furthermore, patterns of spatial variability are improved over nearly all vertical levels when applying the alternative approach. Results point to a need for a dynamically consistent atmospheric bias correction technique which results in fields that can be used as dynamically consistent lateral boundaries in follow-up downscaling applications.

  20. I-SolFramework: An Integrated Solution Framework Six Layers Assessment on Multimedia Information Security Architecture Policy Compliance

    CERN Document Server

    Susanto, Heru; Tuan, Yong Chee; Aksoy, Mehmet Sabih

    2012-01-01

    Multimedia Information security becomes a important part for the organization's intangible assets. Level of confidence and stakeholder trusted are performance indicator as successes organization, it is imperative for organizations to use Information Security Management System (ISMS) to effectively manage their multimedia information assets. The main objective of this paper is to Provide a novel practical framework approach to the development of ISMS, Called by the I-SolFramework, implemented in multimedia information security architecture (MISA), it divides a problem into six object domains or six layers, namely organization,stakeholders, tool & technology, policy, knowledge, and culture. In addition, this framework also introduced novelty algorithm and mathematic models as measurement and assessment tools of MISA parameters.

  1. The AgMIP Coordinated Global and Regional Assessments (CGRA) of Climate Change Impacts on Agriculture and Food Security

    Science.gov (United States)

    Ruane, Alex; Rosenzweig, Cynthia; Elliott, Joshua; Antle, John

    2015-01-01

    The Agricultural Model Intercomparison and Improvement Project (AgMIP) has been working since 2010 to construct a protocol-based framework enabling regional assessments (led by regional experts and modelers) that can provide consistent inputs to global economic and integrated assessment models. These global models can then relay important global-level information that drive regional decision-making and outcomes throughout an interconnected agricultural system. AgMIPs community of nearly 800 climate, crop, livestock, economics, and IT experts has improved the state-of-the-art through model intercomparisons, validation exercises, regional integrated assessments, and the launch of AgMIP programs on all six arable continents. AgMIP is now launching Coordinated Global and Regional Assessments (CGRA) of climate change impacts on agriculture and food security to link global and regional crop and economic models using a protocol-based framework. The CGRA protocols are being developed to utilize historical observations, climate projections, and RCPsSSPs from CMIP5 (and potentially CMIP6), and will examine stakeholder-driven agricultural development and adaptation scenarios to provide cutting-edge assessments of climate changes impact on agriculture and food security. These protocols will build on the foundation of established protocols from AgMIPs 30+ activities, and will emphasize the use of multiple models, scenarios, and scales to enable an accurate assessment of related uncertainties. The CGRA is also designed to provide the outputs necessary to feed into integrated assessment models (IAMs), nutrition and food security assessments, nitrogen and carbon cycle models, and additional impact-sector assessments (e.g., water resources, land-use, biomes, urban areas). This presentation will describe the current status of CGRA planning and initial prototype experiments to demonstrate key aspects of the protocols before wider implementation ahead of the IPCC Sixth Assessment

  2. The AgMIP Coordinated Global and Regional Assessments (CGRA) of Climate Change Impacts on Agriculture and Food Security

    Science.gov (United States)

    Ruane, A. C.; Rosenzweig, C.; Antle, J. M.; Elliott, J. W.

    2015-12-01

    The Agricultural Model Intercomparison and Improvement Project (AgMIP) has been working since 2010 to construct a protocol-based framework enabling regional assessments (led by regional experts and modelers) that can provide consistent inputs to global economic and integrated assessment models. These global models can then relay important global-level information that drive regional decision-making and outcomes throughout an interconnected agricultural system. AgMIP's community of nearly 800 climate, crop, livestock, economics, and IT experts has improved the state-of-the-art through model intercomparisons, validation exercises, regional integrated assessments, and the launch of AgMIP programs on all six arable continents. AgMIP is now launching Coordinated Global and Regional Assessments (CGRA) of climate change impacts on agriculture and food security to link global and regional crop and economic models using a protocol-based framework. The CGRA protocols are being developed to utilize historical observations, climate projections, and RCPs/SSPs from CMIP5 (and potentially CMIP6), and will examine stakeholder-driven agricultural development and adaptation scenarios to provide cutting-edge assessments of climate change's impact on agriculture and food security. These protocols will build on the foundation of established protocols from AgMIP's 30+ activities, and will emphasize the use of multiple models, scenarios, and scales to enable an accurate assessment of related uncertainties. The CGRA is also designed to provide the outputs necessary to feed into integrated assessment models (IAMs), nutrition and food security assessments, nitrogen and carbon cycle models, and additional impact-sector assessments (e.g., water resources, land-use, biomes, urban areas). This presentation will describe the current status of CGRA planning and initial prototype experiments to demonstrate key aspects of the protocols before wider implementation ahead of the IPCC Sixth Assessment

  3. Towards Dynamic Authentication in the Grid — Secure and Mobile Business Workflows Using GSet

    Science.gov (United States)

    Mangler, Jürgen; Schikuta, Erich; Witzany, Christoph; Jorns, Oliver; Ul Haq, Irfan; Wanek, Helmut

    Until now, the research community mainly focused on the technical aspects of Grid computing and neglected commercial issues. However, recently the community tends to accept that the success of the Grid is crucially based on commercial exploitation. In our vision Foster's and Kesselman's statement "The Grid is all about sharing." has to be extended by "... and making money out of it!". To allow for the realization of this vision the trust-worthyness of the underlying technology needs to be ensured. This can be achieved by the use of gSET (Gridified Secure Electronic Transaction) as a basic technology for trust management and secure accounting in the presented Grid based workflow. We present a framework, conceptually and technically, from the area of the Mobile-Grid, which justifies the Grid infrastructure as a viable platform to enable commercially successful business workflows.

  4. A quantitative assessment of LCOs for operations using system dynamics

    Energy Technology Data Exchange (ETDEWEB)

    Kyung, Min Kang [Department of Nuclear Engineering, Hanyang University, 17 Haengdang-Dong, Sungdong-Gu, Seoul 133-791 (Korea, Republic of); Jae, Moosung [Department of Nuclear Engineering, Hanyang University, 17 Haengdang-Dong, Sungdong-Gu, Seoul 133-791 (Korea, Republic of)]. E-mail: jae@hanyang.ac.kr

    2005-02-01

    Limiting conditions for operations (LCOs) define the allowed outage times (AOTs) and the actions to be taken if the repair cannot be completed within the AOT. Typically plant shutdown is required. In situations where the risk associated with the action, i.e. the risk of plant shutdown given a failure of the safety system, may be substantial, a strategy is needed to control the plant risk. In this study the changing operation modes are evaluated quantitatively and dynamically using the tool of system dynamics. System dynamics has been developed to analyze the dynamic reliability of a complicated system. System dynamics using the Vensim software have been applied to LCOs assessment for an example system, the auxiliary feed water system of a reference nuclear power plant. Analysis results of both full power operation and shutdown operation have been compared for a measure of core damage frequency. The increase in core damage frequency is used as a measure in this study. A time dependent framework developed in this study has been shown to be very flexible in that it can be applied to assess LCOs quantitatively under any operational context of the Technical Specifications in Final Safety Analysis Report of the reference plant.

  5. A preliminary cyber-physical security assessment of the Robot Operating System (ROS)

    Science.gov (United States)

    McClean, Jarrod; Stull, Christopher; Farrar, Charles; Mascareñas, David

    2013-05-01

    Over the course of the last few years, the Robot Operating System (ROS) has become a highly popular software framework for robotics research. ROS has a very active developer community and is widely used for robotics research in both academia and government labs. The prevalence and modularity of ROS cause many people to ask the question: "What prevents ROS from being used in commercial or government applications?" One of the main problems that is preventing this increased use of ROS in these applications is the question of characterizing its security (or lack thereof). In the summer of 2012, a crowd sourced cyber-physical security contest was launched at the cyber security conference DEF CON 20 to begin the process of characterizing the security of ROS. A small-scale, car-like robot was configured as a cyber-physical security "honeypot" running ROS. DEFFCON-20 attendees were invited to find exploits and vulnerabilities in the robot while network traffic was collected. The results of this experiment provided some interesting insights and opened up many security questions pertaining to deployed robotic systems. The Federal Aviation Administration is tasked with opening up the civil airspace to commercial drones by September 2015 and driverless cars are already legal for research purposes in a number of states. Given the integration of these robotic devices into our daily lives, the authors pose the following question: "What security exploits can a motivated person with little-to-no experience in cyber security execute, given the wide availability of free cyber security penetration testing tools such as Metasploit?" This research focuses on applying common, low-cost, low-overhead, cyber-attacks on a robot featuring ROS. This work documents the effectiveness of those attacks.

  6. Design of risk assessment system for information security%信息安全风险评估系统的设计

    Institute of Scientific and Technical Information of China (English)

    安庆权; 王希忠; 马遥

    2011-01-01

    As an important guarantee for security of information systems, information security risk assessment service has become a top priority. The security risk assessment could correctly guide the organization to invest in network security, application security, security management and security hardware and software products, consulting, systems integration, security services outsourcing, security training, thus to drive information security products and the development of information security services, and promote the healthy development of the information security industry. This article aims to provide an idea to design an automate risk assessment system, conduct risk assessment activities to provide a standardized operation for the organization, and redue the risk assessment due to the introduction of the risk.%作为信息系统安全的重要保障手段,开展信息安全风险评估服务已成为当务之急;通过安全风险评估,能够正确引导组织在网络安全、应用安全、安全管理等软硬件产品以及安全咨询、系统集成、安全服务外包、安全培训等方面的投资,从而带动信息安全产品及信息安全服务业的发展,促进信息安全产业的健康发展.文中旨在提供一种能够实现自动化风险评估系统的设计思想,为组织开展风险评估活动提供规范化的操作,降低因风险评估而引入的风险.

  7. [Landscape ecological security assessment of Beijing City based on RS and GIS].

    Science.gov (United States)

    Song, Yu-qin; Cao, Ming-lan

    2010-11-01

    By using RS, GIS, and landscape ecology methods, and based on the landscape structure, function, vitality, ecological sensitivity, and landscape pressure, an evaluation index system of landscape ecological security was constructed to analyze the landscape ecological security level and its spatiotemporal distribution pattern in Beijing City in 1988-2004. During the study period, the ecological service value of Beijing City was on a relatively high level, while the landscape vigor index and landscape pressure were on a relatively low level. The stability of landscape structure dropped, and the ecological sensitivity was also on a relatively low level. In 1998 and 2004, the landscape ecological security index of Beijing City was on a medium level, with the average value being 0.410 and 0.403, respectively, suggesting a slight deterioration in the landscape ecological security during the study period.

  8. Formal indicators to assess the quality of radio systems perimeter security facilities

    Directory of Open Access Journals (Sweden)

    Kolesnik K. V.

    2012-08-01

    Full Text Available Quality estimation method based on the use of formal parameters, which greatly simplifies the process of creating effective radio systems for perimeter security of distributed objects in the design phase is proposed.

  9. State of security at US colleges and universities: a national stakeholder assessment and recommendations.

    Science.gov (United States)

    Greenberg, Sheldon F

    2007-09-01

    In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds.

  10. Chapter 3: Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  11. A reliability assessment method using system dynamics and application

    Energy Technology Data Exchange (ETDEWEB)

    Kyung, Min Kang; Moosung, Jae [Hanyang Univ., Dept. of Nuclear Engineering, Seoul (Korea, Republic of); Sangman, Kwak [Systemix, Inc, Seoul (Korea, Republic of)

    2005-07-01

    An advanced method for assessing dynamic safety of nuclear power plants is introduced and applied. A commercial software, VENtana SIMulation environment, VENSIM, is used to develop a dynamics model for an example system. In this study the 18-month refuel cycle is simulated for the dynamic analysis. The failure rate when the plant is a zero power like maintenance, test, and refueling processes, which are not properly modeled in conventional method using event/fault trees, is higher than that of the full power. This also means the human failure rate during both standby and shutdown operation is higher than that of normal operations. Various time steps are applied for the different failure cases. The simulation results show that the common cause failure is much affected by the time step process. The results also include the dynamic simulation for the standby-running and shutdown-running cases. The graphical presentation has been easily modeled by a unique graphic designed method incorporated in the VENSIM. The diagrams well understood by operators or system analysts are constructed and evaluated quantitatively using system dynamics. (authors)

  12. Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and Discretization

    Directory of Open Access Journals (Sweden)

    Wai Kuan Yip

    2007-01-01

    Full Text Available We introduce a novel method for secure computation of biometric hash on dynamic hand signatures using BioPhasor mixing and discretization. The use of BioPhasor as the mixing process provides a one-way transformation that precludes exact recovery of the biometric vector from compromised hashes and stolen tokens. In addition, our user-specific discretization acts both as an error correction step as well as a real-to-binary space converter. We also propose a new method of extracting compressed representation of dynamic hand signatures using discrete wavelet transform (DWT and discrete fourier transform (DFT. Without the conventional use of dynamic time warping, the proposed method avoids storage of user's hand signature template. This is an important consideration for protecting the privacy of the biometric owner. Our results show that the proposed method could produce stable and distinguishable bit strings with equal error rates (EERs of and for random and skilled forgeries for stolen token (worst case scenario, and for both forgeries in the genuine token (optimal scenario.

  13. A dynamic process of health risk assessment for business continuity management during the World Exposition Shanghai, China, 2010.

    Science.gov (United States)

    Sun, Xiaodong; Keim, Mark; Dong, Chen; Mahany, Mollie; Guo, Xiang

    2014-01-01

    Reports of health issues related to mass gatherings around the world have indicated a potential for public health and medical emergencies to occur on a scale that could place a significant impact on business continuity for national and international organisations. This paper describes a risk assessment process for business continuity management that was performed as part of the planning efforts related to the World Expo 2010 Shanghai China (Expo), the world's largest mass gathering to date. Altogether, 73 million visitors attended the Expo, generating over US$2bn of revenue. During 2008 to 2010, the Shanghai Municipal Center for Disease Control and Prevention performed a dynamic series of four disaster risk assessments before and during the Expo. The purpose of this assessment process was to identify, analyse and evaluate risks for public health security during different stages of the Expo. This paper describes an overview of the novel approach for this multiple and dynamic process of assessment of health security risk for ensuring business continuity.

  14. Dynamic drought risk assessment using crop model and remote sensing techniques

    Science.gov (United States)

    Sun, H.; Su, Z.; Lv, J.; Li, L.; Wang, Y.

    2017-02-01

    Drought risk assessment is of great significance to reduce the loss of agricultural drought and ensure food security. The normally drought risk assessment method is to evaluate its exposure to the hazard and the vulnerability to extended periods of water shortage for a specific region, which is a static evaluation method. The Dynamic Drought Risk Assessment (DDRA) is to estimate the drought risk according to the crop growth and water stress conditions in real time. In this study, a DDRA method using crop model and remote sensing techniques was proposed. The crop model we employed is DeNitrification and DeComposition (DNDC) model. The drought risk was quantified by the yield losses predicted by the crop model in a scenario-based method. The crop model was re-calibrated to improve the performance by the Leaf Area Index (LAI) retrieved from MODerate Resolution Imaging Spectroradiometer (MODIS) data. And the in-situ station-based crop model was extended to assess the regional drought risk by integrating crop planted mapping. The crop planted area was extracted with extended CPPI method from MODIS data. This study was implemented and validated on maize crop in Liaoning province, China.

  15. A novel optimization method of transient stability emergency control based on practical dynamic security region (PDSR) of power systems

    Institute of Scientific and Technical Information of China (English)

    YU; Yixin; LIU; Hui; ZENG; Yuan

    2004-01-01

    This paper proposes a novel optimization method of transient stability emergency control based on a new concept of the so-called extended practical dynamic security region (EPDSR) defined in this paper and four experiential laws about the EPDSRs found from a number of studies in real power systems. In this method, the effect of a control action is represented by the displacement of EPDSR's critical hyper-plane boundary in the direction of its outer normal vector. If an unstable contingency occurs, appropriate emergency control actions are triggered so that the enlarged EPDSR can cover the current operating point. Based on these ideas, a mathematics model of emergency control strategy is developed for minimizing its total cost and guaranteeing power system transient stability. The simulation results on the 10-generator, 39-bus New-England Test System as well as other real power systems have shown the validity of this method.

  16. [Assessment and early warning of land ecological security in rapidly urbanizing coastal area: A case study of Caofeidian new district, Hebei, China].

    Science.gov (United States)

    Zhang, Li; Chen, Ying; Wang, Shu-tao; Men, Ming-xin; Xu, Hao

    2015-08-01

    Assessment and early warning of land ecological security (LES) in rapidly urbanizing coastal area is an important issue to ensure sustainable land use and effective maintenance of land ecological security. In this study, an index system for the land ecological security of Caofeidian new district was established based on the Pressure-State-Response (P-S-R) model. Initial assessment units of 1 km x 1 km created with the remote sensing data and GIS methods were spatially interpolated to a fine pixel size of 30 m x 30 m, which were combined with the early warning method (using classification tree method) to evaluate the land ecological security of Caofeidian in 2005 and 2013. The early warning level was classed into four categories: security with degradation potential, sub-security with slow degradation, sub-security with rapid degradation, and insecurity. Result indicated that, from 2005 to 2013, the average LES of Caofeidian dropped from 0.55 to 0.52, indicating a degradation of land ecological security from medium security level to medium-low security level. The areas at the levels of insecurity with rapid degradation were mainly located in the rapid urbanization areas, illustrating that rapid expansion of urban construction land was the key factor to the deterioration of the regional land ecological security. Industrial District, Shilihai town and Nanpu saltern, in which the lands at the levels of insecurity and sub-security with rapid degradation or slow degradation accounted for 58.3%, 98.9% and 81.2% of their respective districts, were at the stage of high early warning. Thus, land ecological security regulation for these districts should be strengthened in near future. The study could provide a reference for land use planning and ecological protection of Caofeidian new district.

  17. Android应用软件安全测评方法研究%Security on Assessment Methods for Android Applications

    Institute of Scientific and Technical Information of China (English)

    李向东; 夏冰; 郑秋生

    2014-01-01

    Android is a widely used operating system with high software compatibility. Based on Linux kernel,Android is mainly ap-plied in mobile devices such as smart phones and tablets.With its rapid development and high market share,Android's security charac-teristic now becomes the hotspot of research. Focusing on the application software assessment technology and based on the practical ex-perience,this paper discusses in detail the Android system framework,security mechanism,Android data storage,and data transmission,etc.. Finally,based on the analysis of Android security mechanism and risk,the security assessment method and procedure for Android applications are proposed,and the assessing tools also briefly described.%Android是一种应用广泛、软件兼容性良好的操作系统。 Android基于Linux内核,主要应用于触屏移动设备,如智能手机和平板电脑等。随着Android手机的快速发展和大量使用,其安全特性成为研究热点。文中以Android手机应用软件测评技术为主线,根据对实际工作经验的总结,详细分析了Android系统架构、安全机制以及Android手机应用软件在数据存储和数据传输中的安全问题。根据对Android安全机制和风险的分析,提出一种Android手机软件安全测评方法和流程,并简要说明了使用的测评工具软件。

  18. Assessment of raw-mineral resources exploration influence on economic security of russia

    Directory of Open Access Journals (Sweden)

    Andrey Gennad’evich Shelomentsev

    2012-06-01

    Full Text Available This paper is devoted to the impact of development of mineral resources on the economic security of Russia. The main branch of the national economy, to which mineral resources have a significant impact, are reviewed. The authors examine the economic security in terms of strategictypes of mineralresources of the nationaleconomy and thecompetitiveness of mineralresources and theirreproduction in thelong term, as well as theimpact of mineral resources development on theregionaleconomy. It isconcluded that the primary socioeconomic development of the regions demands, on the one hand, rapid reproduction and development of mineral resources, and on the other hand, infrastructure of thereclaimed subsoil. The paper presents the activities of the state and recommendations on the formation of public policy in the sphere of economic security at the federal, sectoral and regional levels. The findings are based on the evaluation of the role of mineral resources in the leading economies, developing countries and Russia

  19. 基于动态控制机制的工作流安全访问模型%Workflow Security Access Model Based on Dynamic Control Mechanism

    Institute of Scientific and Technical Information of China (English)

    巫茜; 周庆

    2012-01-01

    为确保工作流系统安全可靠地工作,在传统基于角色的访问控制模型中引入目标案例、用户管理和目标3个关系元素,设计动态授权机制,构建一种基于动态控制机制的工作流安全访问模型,通过基本约束关系与动态约束条件,保证模型的安全运行,并将其与工作流引擎组件进行集成,为独立安全领域应用提供安全授权服务.应用结果表明,该模型可将动态职责与互惠职责较好地分离,对动态职责进行绑定,为系统工作流安全访问提供技术支持.%In order to ensure the workflow system secure and reliable, this paper introduces three relation elements of Target Case(TC), User Management(UM) and Target(T) in the conventional access control model based on role, designs the dynamic authorization mechanism, and builds a sort of security access model in workflow based on dynamic control mechanism, which ensures the secure running of the model by means of basic constraint relation and dynamic constraint conditions. The model is integrated with workflow engine component to provide the security authorization service for the application of independent security field. Application results show that the model can better separate the dynamic responsibility and reciprocal responsibility, make the binding of dynamic responsibility, and provide technical support for security access of system workflow.

  20. Assessment for Social Security Pilot in Jilin and Hei Longjiang of China

    Institute of Scientific and Technical Information of China (English)

    Bingwen Zheng

    2006-01-01

    The present paper reviews the social security pilot in Jilin and Hei Longjiang that was carried out between 2004 and 2005. The pilot in the two provinces has basically achieved its main objectives, but there are still some unsolved problems, the most severe being lack of effective investment of the funds accumulated by individual accounts. During periods of high economic growth and high growth in average wages, this problem might undermine the partially-funded security system. To this end, the paper makes some suggestions, one of which is to introduce the notional defined contribution system.

  1. Application of classification methods in assessment of NATO member countries' economic, security and political risks

    Science.gov (United States)

    Odehnal, Jakub

    2013-10-01

    The aim of this paper is to attempt possible quantification of determinants of military expenditure and their application to current NATO member countries. To analyse the economic, security and political risks of NATO member countries, author employ multivariate statistical techniques which take into consideration the multivariate properties of the data sets used as input variables. Classification of countries based on cluster analysis has made it possible to identify disparities between NATO member countries, and thus to describe diverse economic or security environment affecting the amount of military expenditure as a percentage of the respective countries' gross domestic product.

  2. Dynamic assessment versus static assessment: A study of reading comprehension ability in Iranian EFL learners

    OpenAIRE

    Nazari, Behzad; Mansouri, Saeed

    2014-01-01

    This study extends traditional or static assessment of reading comprehension in foreign language contexts and applies dynamic assessment (DA) to the development of learners’ reading ability. To homogenize the research population (N= 250), an Oxford Placement Test (OPT) was administered. On the basis of the test results, the population was sorted into three groups of reading-low, reading-mid, and reading-high students. The participants of this study were a sample of 30 participants with the lo...

  3. Cloud Radar: Near Real-Time Detection of Security Failures in Dynamic Virtualized Infrastructures

    NARCIS (Netherlands)

    Bleikertz, Sören; Vogel, Carsten; Groß, Thomas

    2014-01-01

    Cloud infrastructures are designed to share physical resources among many different tenants while ensuring overall secu- rity and tenant isolation. The complexity of dynamically changing and growing cloud environments, as well as insider attacks, can lead to misconfigurations that ultimately result

  4. Individual social security accounts: issues in assessing administrative feasibility and costs.

    Science.gov (United States)

    Olsen, K A; Salisbury, D L

    1998-11-01

    Whether to add individual accounts (IAs) to the Social Security system is a highly political issue. But almost lost in the debate so far have been any practical considerations about how to administer such accounts. Any discussion of whether to create individual accounts must also address the basic but critical questions of how they would work: Who would run them? What would they cost? Logistically, are they even possible? This EBRI Issue Brief provides an overview of the most salient administrative issues facing the current Social Security reform debate--issues that challenge proponents to carefully think through how their proposals could be implemented so as to achieve their policy goals. The options and difficulties in administering IAs raise concerns that cut across ideology. The object of this report is neither to dissuade the advocates nor support the critics of individual accounts. Rather, it is to bring practical considerations to a political debate that has largely ignored the pragmatic challenges of whether IAs would be too complex for participants to understand or too difficult for record keepers to administer. The major findings in this analysis include: Adding individual accounts to Social Security could be the largest undertaking in the history of the U.S. financial market, and no system to date has the capacity to administer such a system. The number of workers currently covered by Social Security--the largest single entitlement program in the nation--is at least four times higher than the combined number of all tax-favored employment-based retirement accounts in the United States, which are administered by hundreds of entities. Direct comparisons between employment-based retirement savings plans and Social Security reform are tenuous at best. Social Security covers workers and businesses that are disproportionately excluded from employment-based plans. Because of these differences, a system of individual Social Security accounts would be more

  5. Computational fluid dynamics framework for aerodynamic model assessment

    Science.gov (United States)

    Vallespin, D.; Badcock, K. J.; Da Ronch, A.; White, M. D.; Perfect, P.; Ghoreyshi, M.

    2012-07-01

    This paper reviews the work carried out at the University of Liverpool to assess the use of CFD methods for aircraft flight dynamics applications. Three test cases are discussed in the paper, namely, the Standard Dynamic Model, the Ranger 2000 jet trainer and the Stability and Control Unmanned Combat Air Vehicle. For each of these, a tabular aerodynamic model based on CFD predictions is generated along with validation against wind tunnel experiments and flight test measurements. The main purpose of the paper is to assess the validity of the tables of aerodynamic data for the force and moment prediction of realistic aircraft manoeuvres. This is done by generating a manoeuvre based on the tables of aerodynamic data, and then replaying the motion through a time-accurate computational fluid dynamics calculation. The resulting forces and moments from these simulations were compared with predictions from the tables. As the latter are based on a set of steady-state predictions, the comparisons showed perfect agreement for slow manoeuvres. As manoeuvres became more aggressive some disagreement was seen, particularly during periods of large rates of change in attitudes. Finally, the Ranger 2000 model was used on a flight simulator.

  6. Dynamical resource nexus assessments: from accounting to sustainability approaches

    Science.gov (United States)

    Salmoral, Gloria; Yan, Xiaoyu

    2017-04-01

    Continued economic development and population growth result in increasing pressures on natural resources, from local to international levels, for meeting societal demands on water, energy and food. To date there are a few tools that link models to identify the relationships and to account for flows of water, energy and food. However, these tools in general can offer only a static view often at national level and with annual temporal resolution. Moreover, they can only account flows but cannot consider the required amounts and conditions of the natural capital that supplies and maintains these flows. With the emerging nexus thinking, our research is currently focused on promoting dynamical environmental analyses beyond the conventional silo mentalities. Our study aims to show new advancements in existing tools (e.g., dynamical life cycle assessment) and develop novel environmental indicators relevant for the resource nexus assessment. We aim to provide a step forward when sustainability conditions and resilience thresholds are aligned with flows under production (e.g., food, water and energy), process level under analysis (e.g., local production, transport, manufacturing, final consumption, reuse, disposal) and existing biophysical local conditions. This approach would help to embrace and better characterise the spatiotemporal dynamics, complexity and existing links between and within the natural and societal systems, which are crucial to evaluate and promote more environmentally sustainable economic activities.

  7. 78 FR 7334 - Port Authority Access to Facility Vulnerability Assessments and the Integration of Security Systems

    Science.gov (United States)

    2013-02-01

    ... not have access to the Internet, you may view the docket online by visiting the Docket Management..., emergency preparedness and response, and communications capabilities (33 CFR 105.305). Facility Security... about the costs associated with these approaches as well as any potential benefit. These comments...

  8. Cooperative home light: assessment of a security function for the automotive field

    NARCIS (Netherlands)

    Knapik, Peter; Petit, Jonathan; Kargl, Frank; Schoch, Elmar

    2014-01-01

    Crime and feeling of security are omnipresent and can be influenced by lighting conditions. However, lighting improvements are generally concentrated on street lighting. Meanwhile, a vast variety of new technologies, including innovative lighting systems and connected mobility, are entering into the

  9. Assessing the Sexual Knowledge of Women in Secure Settings: The Development of a New Screening Measure

    Science.gov (United States)

    Long, Clive G.; Krawczyk, Kirsten M.; Kenworthy, Nathalie E.

    2013-01-01

    Little research has been published on the need for sexual education for women in secure psychiatric facilities when patients present with a combination of learning disability, mental illness and personality disorder. The development of a brief, feasible, gender-speci?c sexual knowledge questionnaire is described, which has

  10. Assessing and Improving SCADA Security in the Dutch Drinking Water Sector

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Ali, M.; Zielstra, A.

    2009-01-01

    International studies have shown that information security for process control systems, in particular SCADA, is weak. As many critical infrastructure (CI) services depend on process control systems, any vulnerability in the protection of process control systems in CI may result in serious consequenc

  11. Assessing and improving SCADA security in the Dutch drinking water sector

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Ali, M.; Zielstra, A.

    2011-01-01

    International studies have shown that information security for process control systems, in particular SCADA, is weak. Many of the critical infrastructure (CI) services critically depend on process control systems. Therefore, any vulnerability in the protection of process control systems in CI may re

  12. Assessing Community Readiness to Reduce Childhood Diarrheal Disease and Improve Food Security in Dioro, Mali.

    Science.gov (United States)

    Borresen, Erica C; Stone, Cordelia; Boré, Abdoulaye; Cissoko, Alima; Maiga, Ababacar; Koita, Ousmane A; Ryan, Elizabeth P

    2016-06-08

    Diarrhea and malnutrition represent leading causes of death for children in Mali. Understanding a community's needs and ideas are critical to ensure the success of prevention and treatment interventions for diarrheal disease, as well as to improve food security to help reduce malnutrition. The objective of this study was to incorporate the Community Readiness Model (CRM) for the issues of childhood diarrheal disease and food security in Mali to measure baseline community readiness prior to any program implementation. Thirteen key respondents residing in Dioro, Mali were selected based on varied social roles and demographics and completed two questionnaires on these public health issues. The overall readiness score to reduce childhood diarrheal disease was 5.75 ± 1.0 standard deviation (preparation stage). The overall readiness score to improve food security was 5.5 ± 0.5 standard deviation (preparation stage). The preparation stage indicates that at least some of the community have basic knowledge regarding these issues, and want to act locally to reduce childhood diarrhea and improve food security and nutrition. Proposed activities to increase community readiness on these issues are provided and are broad enough to allow opportunities to implement community- and culturally-specific activities by the Dioro community.

  13. 7 CFR 331.7 - Registration and related security risk assessments.

    Science.gov (United States)

    2010-01-01

    ... official, changes in ownership or control of the entity, new researchers or graduate students, etc.). (2) The responsible official will be notified in writing if an application to amend a certificate of... governmental agencies, including public accredited academic institutions, are exempt from the security...

  14. Assessing Community Readiness to Reduce Childhood Diarrheal Disease and Improve Food Security in Dioro, Mali

    Directory of Open Access Journals (Sweden)

    Erica C. Borresen

    2016-06-01

    Full Text Available Diarrhea and malnutrition represent leading causes of death for children in Mali. Understanding a community’s needs and ideas are critical to ensure the success of prevention and treatment interventions for diarrheal disease, as well as to improve food security to help reduce malnutrition. The objective of this study was to incorporate the Community Readiness Model (CRM for the issues of childhood diarrheal disease and food security in Mali to measure baseline community readiness prior to any program implementation. Thirteen key respondents residing in Dioro, Mali were selected based on varied social roles and demographics and completed two questionnaires on these public health issues. The overall readiness score to reduce childhood diarrheal disease was 5.75 ± 1.0 standard deviation (preparation stage. The overall readiness score to improve food security was 5.5 ± 0.5 standard deviation (preparation stage. The preparation stage indicates that at least some of the community have basic knowledge regarding these issues, and want to act locally to reduce childhood diarrhea and improve food security and nutrition. Proposed activities to increase community readiness on these issues are provided and are broad enough to allow opportunities to implement community- and culturally-specific activities by the Dioro community.

  15. Environmental Assessment: Construction and Operation of Security Forces & Command Post / Installation Control Center Facilities

    Science.gov (United States)

    2008-01-03

    Operation of Security Forces &Command Post/ICC Facilities January 03, 2008 91 6.0 PERSONS CONTACTED Russell Adams – 78th CEG/CEVQ Larry J. Allen...fPD believes the proposed project will have no adverse effect on Building 300, as defined in 36 CFR Parr 800.5(d)(l). Please note that historic and

  16. Final Environmental Assessment for the Boles Wells Field Perimeter Security Improvement Project Otero County, New Mexico

    Science.gov (United States)

    2005-10-03

    2-5 3.0 AFFECTED ENV" IRONMENT ...County, New Mexico. The majority of the existing fence is five-strand barbed wired secured on iron "T" posts or wooden posts. Access to the well field...mesquite ( Prosopis glandulosa var. torreyana), prickly pear (Opuntia spp.), and opportunistic plants in disturbed areas. State-listed noxious weeds

  17. An assessment of the cyber security legislation and its impact on the United States electrical sector

    Science.gov (United States)

    Born, Joshua

    The purpose of this research was to examine the cyber-security posture for the United States' electrical grid, which comprises a major component of critical infrastructure for the country. The United States electrical sector is so vast, that the Department of Homeland Security (DHS) estimates, it contains more than 6,413 power plants (this includes 3,273 traditional electric utilities and 1,738 nonutility power producers) with approximately 1,075 gigawatts of energy produced on a daily basis. A targeted cyber-security attack against the electric grid would likely have catastrophic results and could even serve as a precursor to a physical attack against the United States. A recent report by the consulting firm Black and Veatch found that one of the top five greatest concerns for United States electric utilities is the risk that cybersecurity poses to their industry and yet, only one-third state they are currently prepared to meet the increasingly likely threat. The report goes on to state, "only 32% of electric utilities surveyed had integrated security systems with the proper segmentation, monitoring and redundancies needed for cyber threat protection. Another 48 % said they did not" Recent estimates indicate that a large-scale cyber-attack against this sector could cost the United States economy as much as a trillion dollars within a weeks' time. Legislative efforts in the past have primarily been focused on creating mandates that encourage public and private partnership, which have been not been adopted as quickly as desired. With 85 % of all electric utilities being privately owned, it is key that the public and private sector partner in order to mitigate risks and respond as a cohesive unit in the event of a major attack. Keywords: Cybersecurity, Professor Riddell, cyber security, energy, intelligence, outlook, electrical, compliance, legislation, partnerships, critical infrastructure.

  18. Security Analysis of a Block Encryption Algorithm Based on Dynamic Sequences of Multiple Chaotic Systems

    Institute of Scientific and Technical Information of China (English)

    DU Mao-Kang; HE Bo; WANG Yong

    2011-01-01

    Recently, the cryptosystem based on chaos has attracted much attention. Wang and Yu (Commun. Nonlin. Sci. Numer. Simulat. 14(2009)574) proposed a block encryption algorithm based on dynamic sequences of multiple chaotic systems. We analyze the potential Saws in the algorithm. Then, a chosen-plaintext attack is presented. Some remedial measures are suggested to avoid the flaws effectively. Furthermore, an improved encryption algorithm is proposed to resist the attacks and to keep all the merits of the original cryptosystem.

  19. The Secure Dynamic Source Routing Protocol in MANET using MD5 Hash Function

    Directory of Open Access Journals (Sweden)

    Radha S. Savankar

    2012-06-01

    Full Text Available Dynamic Source Routing (DSR is a routing protocol designed specifically for use in mobile ad hoc networks. The protocol allows nodes to dynamically discover a source route across multiple network hops to any destination in the ad hoc network. The protocol is composed of the two mechanisms of Route Discovery and Route Maintenance, which work together to allow nodes to discover and maintain source routes to arbitrary destinations in the ad hoc network. When using source routing, each packet to be routed carries in its header the complete, ordered list of nodes through which the packet must pass. A key advantage of source routing is that intermediate hops do not need to maintain routing information in order to route the packets they receive, since the packets themselves already contain all of the necessary routing information. This, coupled with the dynamic, on-demand nature of Route Discovery, completely eliminates the need for periodic router advertisements and link status packets, reducing the overhead of DSR, especially during periods when the network topology is stable and these packets serve only as keep-alives

  20. Preliminary Strategic Environmental Assessment of the Great Western Development Strategy: Safeguarding Ecological Security for a New Western China

    Science.gov (United States)

    Li, Wei; Liu, Yan-Ju; Yang, Zhifeng

    2012-02-01

    The Great Western Development Strategy (GWDS) is a long term national campaign aimed at boosting development of the western area of China and narrowing the economic gap between the western and the eastern parts of China. The Strategic Environmental Assessment (SEA) procedure was employed to assess the environmental challenges brought about by the western development plans. These plans include five key developmental domains (KDDs): water resource exploitation and use, land utilization, energy generation, tourism development, and ecological restoration and conservation. A combination of methods involving matrix assessment, incorporation of expert judgment and trend analysis was employed to analyze and predict the environmental impacts upon eight selected environmental indicators: water resource availability, soil erosion, soil salinization, forest destruction, land desertification, biological diversity, water quality and air quality. Based on the overall results of the assessment, countermeasures for environmental challenges that emerged were raised as key recommendations to ensure ecological security during the implementation of the GWDS. This paper is intended to introduce a consensus-based process for evaluating the complex, long term pressures on the ecological security of large areas, such as western China, that focuses on the use of combined methods applied at the strategic level.

  1. Preliminary strategic environmental assessment of the Great Western Development Strategy: safeguarding ecological security for a new western China.

    Science.gov (United States)

    Li, Wei; Liu, Yan-ju; Yang, Zhifeng

    2012-02-01

    The Great Western Development Strategy (GWDS) is a long term national campaign aimed at boosting development of the western area of China and narrowing the economic gap between the western and the eastern parts of China. The Strategic Environmental Assessment (SEA) procedure was employed to assess the environmental challenges brought about by the western development plans. These plans include five key developmental domains (KDDs): water resource exploitation and use, land utilization, energy generation, tourism development, and ecological restoration and conservation. A combination of methods involving matrix assessment, incorporation of expert judgment and trend analysis was employed to analyze and predict the environmental impacts upon eight selected environmental indicators: water resource availability, soil erosion, soil salinization, forest destruction, land desertification, biological diversity, water quality and air quality. Based on the overall results of the assessment, countermeasures for environmental challenges that emerged were raised as key recommendations to ensure ecological security during the implementation of the GWDS. This paper is intended to introduce a consensus-based process for evaluating the complex, long term pressures on the ecological security of large areas, such as western China, that focuses on the use of combined methods applied at the strategic level.

  2. Dynamic Bayesian Networks for Context-Aware Fall Risk Assessment

    Directory of Open Access Journals (Sweden)

    Gregory Koshmak

    2014-05-01

    Full Text Available Fall incidents among the elderly often occur in the home and can cause serious injuries affecting their independent living. This paper presents an approach where data from wearable sensors integrated in a smart home environment is combined using a dynamic Bayesian network. The smart home environment provides contextual data, obtained from environmental sensors, and contributes to assessing a fall risk probability. The evaluation of the developed system is performed through simulation. Each time step is represented by a single user activity and interacts with a fall sensors located on a mobile device. A posterior probability is calculated for each recognized activity or contextual information. The output of the system provides a total risk assessment of falling given a response from the fall sensor.

  3. EVALUATION OF VULNERABILITY ASSESSMENT IN SYSTEM FROM HACKERS IN CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    S.Suma Christal Mary

    2010-07-01

    Full Text Available Vulnerability is very essential in cyber security related mechanisms. The usage of this vulnerability is to identify the attacks over the cyber space system. This term become increased the challenges in cyberspace system in large areas. Interdependencies between computer communication system and the physical infrastructure also become more complex as information technologies are further integrated into devices and networks. Vulnerability causes due to ethical hacking, Trojan attacks, logical bombing. In the recent days firewalls are eliminate the various cyber attacks. The usage of filtering algorithm prevent from E-mail bombing. To secure the server system we can avoid hacking. The above countermeasures are identifying the attacks and improve the efficiency.

  4. Information security governance: a risk assessment approach to health information systems protection.

    Science.gov (United States)

    Williams, Patricia A H

    2013-01-01

    It is no small task to manage the protection of healthcare data and healthcare information systems. In an environment that is demanding adaptation to change for all information collection, storage and retrieval systems, including those for of e-health and information systems, it is imperative that good information security governance is in place. This includes understanding and meeting legislative and regulatory requirements. This chapter provides three models to educate and guide organisations in this complex area, and to simplify the process of information security governance and ensure appropriate and effective measures are put in place. The approach is risk based, adapted and contextualized for healthcare. In addition, specific considerations of the impact of cloud services, secondary use of data, big data and mobile health are discussed.

  5. Measuring Preparedness: Assessing the Impact of the Homeland Security Grant Program

    Science.gov (United States)

    2009-03-01

    effectively. One of the primary functions of the GRT is to provide DHS with an electronic database to query in the event of a Congressional data call. In...we need an easy to ready catalog/ database of what resources (physical and non-physical) are available at the federal, state, regional, and local...Local Performance Regimes for Homeland Security.” Review of Policy Research 23, no. 1 (2006). Business Source Complete, EBSCOhost (accessed December 30

  6. Assessing the Parameters for Determining Mission Accomplishment of the Philippine Marine Corps in Internal Security Operations

    Science.gov (United States)

    2009-01-01

    of the MILF attacked innocent civilian communities in Lanao del Norte , North Cotabato, and Sarangani in August 2008 to protest of the non-signing of...Abu Sayyaf spokesman Abu Sabaya and his group aboard local watercraft off Barangay Panganuran, Sibuco, Zamboanga Del Norte in June 21, 2002.46 As the...Asia Africa Intelligence Wire, "Filipino Defense Chief: Communist Remain Biggest Threat to National Security," The Philippine Star, October 5,2007

  7. Cooperative Monitoring Center Occasional Paper/8: Cooperative Border Security for Jordan: Assessment and Options

    Energy Technology Data Exchange (ETDEWEB)

    Qojas, M.

    1999-03-01

    This document is an analysis of options for unilateral and cooperative action to improve the security of Jordan's borders. Sections describe the current political, economic, and social interactions along Jordan's borders. Next, the document discusses border security strategy for cooperation among neighboring countries and the adoption of confidence-building measures. A practical cooperative monitoring system would consist of hardware for early warning, command and control, communications, and transportation. Technical solutions can expand opportunities for the detection and identification of intruders. Sensors (such as seismic, break-wire, pressure-sensing, etc.) can warn border security forces of intrusion and contribute to the identification of the intrusion and help formulate the response. This document describes conceptual options for cooperation, offering three scenarios that relate to three hypothetical levels (low, medium, and high) of cooperation. Potential cooperative efforts under a low cooperation scenario could include information exchanges on military equipment and schedules to prevent misunderstandings and the establishment of protocols for handling emergency situations or unusual circumstances. Measures under a medium cooperation scenario could include establishing joint monitoring groups for better communications, with hot lines and scheduled meetings. The high cooperation scenario describes coordinated responses, joint border patrols, and sharing border intrusion information. Finally, the document lists recommendations for organizational, technical, and operational initiatives that could be applicable to the current situation.

  8. Measures for assessing architectural speech security (privacy) of closed offices and meeting rooms

    Science.gov (United States)

    Gover, Bradford N.; Bradley, John S.

    2004-12-01

    Objective measures were investigated as predictors of the speech security of closed offices and rooms. A new signal-to-noise type measure is shown to be a superior indicator for security than existing measures such as the Articulation Index, the Speech Intelligibility Index, the ratio of the loudness of speech to that of noise, and the A-weighted level difference of speech and noise. This new measure is a weighted sum of clipped one-third-octave-band signal-to-noise ratios; various weightings and clipping levels are explored. Listening tests had 19 subjects rate the audibility and intelligibility of 500 English sentences, filtered to simulate transmission through various wall constructions, and presented along with background noise. The results of the tests indicate that the new measure is highly correlated with sentence intelligibility scores and also with three security thresholds: the threshold of intelligibility (below which speech is unintelligible), the threshold of cadence (below which the cadence of speech is inaudible), and the threshold of audibility (below which speech is inaudible). The ratio of the loudness of speech to that of noise, and simple A-weighted level differences are both shown to be well correlated with these latter two thresholds (cadence and audibility), but not well correlated with intelligibility. .

  9. Assessment of patellar maltracking using combined static and dynamic MRI

    Energy Technology Data Exchange (ETDEWEB)

    McNally, E.G.; Ostlere, S.J.; Pal, C.; Phillips, A.; Reid, H. [Department of Radiology, Nuffield Orthopaedic Centre, Headington, Oxford OX3 9JW (United Kingdom); Dodd, C. [Department of Orthopaedic Surgery, Nuffield Orthopaedic Centre, Headington, Oxford OX3 9JW (United Kingdom)

    2000-07-01

    Between January 1995 and Jul 1997, 474 patients with anterior knee pain resistant to conservative treatment were referred for MR of the knee. The MR examination consisted of routine sequences with an additional patellofemoral dynamic examination using a technique that has been developed at this institution. The dynamic study examines both knees simultaneously, with the patient supine and the quadriceps loaded. No gating or restraint apparatus is needed. Patellar subluxation or tilt was present in 188(40%) of cases, bilateral in 104 and unilateral in 84 cases (right 39, left 45). It was classified as mild in 51%, moderate in 39% and severe in 10%. Subluxation was more prevalent in females than males (42% vs. 37%) and this was most obvious in the severe group where 68% were female. In 90 knees selected at random, four measurements of patellofemoral morphology were obtained using reconstructed images from a volume gradient echo sequence. These measurements were correlated with the degree of subluxation or tilt. A tibial tubercle distance greater than 20 mm, a femoral sulcus angle greater than 150 degrees, sulcus depth less than 4 mm were specific for subluxation but no measurement proved to be sufficiently sensitive to preclude a tracking study. MRI can be used to define more precisely the anatomy of the extensor mechanism and its relationship to the femur and tibia, in both a static and dynamic setting. In this way, patients with anterior knee pain can be classified more accurately and the outcomes of treatment more reliably assessed. (orig.)

  10. Novel data visualizations of X-ray data for aviation security applications using the Open Threat Assessment Platform (OTAP)

    Science.gov (United States)

    Gittinger, Jaxon M.; Jimenez, Edward S.; Holswade, Erica A.; Nunna, Rahul S.

    2017-02-01

    This work will demonstrate the implementation of a traditional and non-traditional visualization of x-ray images for aviation security applications that will be feasible with open system architecture initiatives such as the Open Threat Assessment Platform (OTAP). Anomalies of interest to aviation security are fluid, where characteristic signals of anomalies of interest can evolve rapidly. OTAP is a limited scope open architecture baggage screening prototype that intends to allow 3rd-party vendors to develop and easily implement, integrate, and deploy detection algorithms and specialized hardware on a field deployable screening technology [13]. In this study, stereoscopic images were created using an unmodified, field-deployed system and rendered on the Oculus Rift, a commercial virtual reality video gaming headset. The example described in this work is not dependent on the Oculus Rift, and is possible using any comparable hardware configuration capable of rendering stereoscopic images. The depth information provided from viewing the images will aid in the detection of characteristic signals from anomalies of interest. If successful, OTAP has the potential to allow for aviation security to become more fluid in its adaptation to the evolution of anomalies of interest. This work demonstrates one example that is easily implemented using the OTAP platform, that could lead to the future generation of ATR algorithms and data visualization approaches.

  11. Assessing farmer use of climate change adaptation practices and impacts on food security and poverty in Pakistan

    Directory of Open Access Journals (Sweden)

    Akhter Ali

    2017-01-01

    Full Text Available Climate change is set to be particularly disruptive in poor agricultural communities. We assess the factors influencing farmers’ choice of climate change adaptation practices and associated impacts on household food security and poverty in Pakistan using comprehensive data from 950 farmers from its major provinces. A probit model was used to investigate the factors influencing the use of climate-change adaptation practices; the censored least absolute deviation (CLAD was used to analyze the determinants of the number of adaptation practices used; and a propensity score matching (PSM approach was employed to evaluate the impact of adaptation practices on food security and poverty levels. Adjustment in sowing time (22% households, use of drought tolerant varieties (15% and shifting to new crops (25% were the three major adaptation practices used by farmers in the study area. Results show that younger farmers and farmers with higher levels of education are more likely to use these adaptation practices, as do farmers that are wealthier, farm more land and have joint families. The number of adaptation practices used was found to be positively associated with education, male household heads, land size, household size, extension services, access to credit and wealth. Farmers adopting more adaptation practices had higher food security levels (8–13% than those who did not, and experienced lower levels of poverty (3–6%. Climate change adaptation practices at farm level can thereby have significant development outcomes in addition to reducing exposure to weather risks.

  12. Assessment of current criteria for dynamic stability of container vessels

    Science.gov (United States)

    Stanca, C.; Ancuta, C.; Acomi, N.; Andrei, C.

    2016-08-01

    Container vessels sailing through heavy weather are exposed to a significant variation of stability due to specific shape of the hull combined with the action of the waves. Even if the weather forecast is transmitted to vessels, the way of acting it is a matter of officers’ experience. The Maritime Safety Committee, under the International Maritime Organization, has approved the Guidance to the master for avoiding dangerous situations in adverse weather and sea conditions. Adverse weather conditions include wind induced waves or heavy swell. The development of dangerous phenomena such as surf-riding and broaching to, syncronious and parametric rollings is a result of a these adverse conditions which has to be encountered by the vessels. Understanding the dynamic stability of the vessel in the waves and ship's behaviour based on mathematical and physical rules is a difficult task, any effort in order to assess these components are salutary. To avoid excessive acceleration and forces which can damage the hull of the vessel, lashing and integrity of containers, course and speed may need to be changed for the vessel's motion in heavy seas. Specific software have been developed as aids for evaluating the response of the vessel in heavy seas according to parameters variations. The paper aims at assessing of current criteria for dynamic stability of a container vessel model ship in order to determine the ways for avoiding dangerous conditions. The results should be regarded as a supporting tool during the decision making process.

  13. Developing a voltage-stability-constrained security assessment system part II : Structure and function design and technology used

    OpenAIRE

    Ni, YX; Wu, FF; Shi, LB; Zhou, HF; Tam, PTC; Chang, NC; Su, JF; Du, ZB

    2005-01-01

    This is the second part in a two-part paper on the development of a voltage stability constrained security assessment system (VSC-SAS). In this part, overall VSC-SAS structure and function design and technology used will be presented. The system is expected to be used in both on-line and off-line modes. In on-line mode, on-line SCADA/EMS data will be used for VSC-SAS use; while in off-line mode (usually day-ahead calculation), historical data can be used for VSC-SAS. Both results (i.e. system...

  14. Distributed Energy Resources and Dynamic Microgrid: An Integrated Assessment

    Science.gov (United States)

    Shang, Duo Rick

    The overall goal of this thesis is to improve understanding in terms of the benefit of DERs to both utility and to electricity end-users when integrated in power distribution system. To achieve this goal, a series of two studies was conducted to assess the value of DERs when integrated with new power paradigms. First, the arbitrage value of DERs was examined in markets with time-variant electricity pricing rates (e.g., time of use, real time pricing) under a smart grid distribution paradigm. This study uses a stochastic optimization model to estimate the potential profit from electricity price arbitrage over a five-year period. The optimization process involves two types of PHEVs (PHEV-10, and PHEV-40) under three scenarios with different assumptions on technology performance, electricity market and PHEV owner types. The simulation results indicate that expected arbitrage profit is not a viable option to engage PHEVs in dispatching and in providing ancillary services without more favorable policy and PHEV battery technologies. Subsidy or change in electricity tariff or both are needed. Second, it examined the concept of dynamic microgrid as a measure to improve distribution resilience, and estimates the prices of this emerging service. An economic load dispatch (ELD) model is developed to estimate the market-clearing price in a hypothetical community with single bid auction electricity market. The results show that the electricity market clearing price on the dynamic microgrid is predominantly decided by power output and cost of electricity of each type of DGs. At circumstances where CHP is the only source, the electricity market clearing price in the island is even cheaper than the on-grid electricity price at normal times. Integration of PHEVs in the dynamic microgrid will increase electricity market clearing prices. It demonstrates that dynamic microgrid is an economically viable alternative to enhance grid resilience.

  15. Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage

    Directory of Open Access Journals (Sweden)

    Nithiavathy.R, Suresh.J

    2013-03-01

    Full Text Available Cloud computing hasbeen thegenuinesolution tothe rising storage costs of IT Enterprises.The costofdatastorage devices is too high rate at which datais being generated, where the enterprises orindividual users to frequently update theirhardwareor software. The data outsourced tothecloudwould help inreducing themaintenance.Theuser’s dataare moved from cloudto large datacenters, which are located remotely which does nothave control over it. Hence there is a securitybreech which has to beresolved. To address thisissue, we proposeaneffectivemethodtoachievesecureand dependable cloud storageby usingdistributed storage integrityauditingmechanism,which incorporatehomomorphic token anddistributed erasure-coded data for dynamicallystoring data.The proposed design allows the userwith lightweight communication and computationcost. To maintainreliablecloud storage correctness,and to locatethemisbehaving serverinwhich thedata arefrequently changingincloud. It isanefficient method for dynamic operation whichinclude erase, append, and block modification and itvery effective in fighting against server colludingattacks, byzantinefailure, maliciousdata blockmodifications.

  16. Dynamic Probe Window Based Optimization for Surveillance in Home Security System

    Directory of Open Access Journals (Sweden)

    Bhaskar Kapoor

    2010-02-01

    Full Text Available Tracking of a moving object is very important for video surveillance in a real time scenario. The proposedalgorithm uses dynamic probe window based approach & combines the conventional edge based and framedifferencing approach to achieve better algorithmic time complexity as well as improved results. First itcomputes the edge map of two consecutive frames with the help of first order differential sobel operator dueto its noise resistant attributes and applies the frame differencing method between the two consecutive edgemaps. Apart from the above optimization, our method doesn’t differentiate between the scenario when motionoccurs and when it doesn’t, that is, almost same computation overhead is required even if motion is not thereso it reduces the time complexity of the algorithm when no motion is detected. The effectiveness of theproposed motion detection algorithm is demonstrated in a real time environment and the evaluation resultsare reported.

  17. Assessing predictability of a hydrological stochastic-dynamical system

    Science.gov (United States)

    Gelfan, Alexander

    2014-05-01

    The water cycle includes the processes with different memory that creates potential for predictability of hydrological system based on separating its long and short memory components and conditioning long-term prediction on slower evolving components (similar to approaches in climate prediction). In the face of the Panta Rhei IAHS Decade questions, it is important to find a conceptual approach to classify hydrological system components with respect to their predictability, define predictable/unpredictable patterns, extend lead-time and improve reliability of hydrological predictions based on the predictable patterns. Representation of hydrological systems as the dynamical systems subjected to the effect of noise (stochastic-dynamical systems) provides possible tool for such conceptualization. A method has been proposed for assessing predictability of hydrological system caused by its sensitivity to both initial and boundary conditions. The predictability is defined through a procedure of convergence of pre-assigned probabilistic measure (e.g. variance) of the system state to stable value. The time interval of the convergence, that is the time interval during which the system losses memory about its initial state, defines limit of the system predictability. The proposed method was applied to assess predictability of soil moisture dynamics in the Nizhnedevitskaya experimental station (51.516N; 38.383E) located in the agricultural zone of the central European Russia. A stochastic-dynamical model combining a deterministic one-dimensional model of hydrothermal regime of soil with a stochastic model of meteorological inputs was developed. The deterministic model describes processes of coupled heat and moisture transfer through unfrozen/frozen soil and accounts for the influence of phase changes on water flow. The stochastic model produces time series of daily meteorological variables (precipitation, air temperature and humidity), whose statistical properties are similar

  18. Political Dynamics and Security in the Arabian Peninsula Through the 1990s,

    Science.gov (United States)

    1993-01-01

    available. Pierre Salinger reported that the Kuwatis agreed to pay $9 billion to Iraq at the ill-fated 31 July 1990 Jidda Conference convened to settle the...war of words between the two states. According to Salinger , L 10 In: AWatftThrtaff Strategic Objectives Before 2 August 1990 A few months after the...1990. For de- tails, see Salinger , op. ciL, pp. 34-70. m AWsingmrest? 13 First, Saddun Humin and his advisors may well have assessed that neither

  19. The Ob Estuary (Kara Sea) Coastal Dynamics Interannual Variability Assessment

    Science.gov (United States)

    Kopa-Ovdienko, N.; Volobueva, N.; Ogorodov, S.

    2012-04-01

    There are several promising gas fields in the Ob Estuary. For their development comprehensive research, including coastal dynamics assessment, is required. To estimate current and speak about future coastal dynamics rates we need to investigate its interannual variability connecting it with variability of major coastal dynamics factors. It is known that in this region one of the main coastal dynamics factors is wave action, which, in turn, depends on wind velocity and direction. Wind data for ice-free period were derived from nearby hydro-meteorological stations. The research was conducted for two sections of the Ob Estuary coast. One section is located on the eastern coast of the estuary (Taz peninsula); the other is located on the western one (Yamal peninsula). Each of these sections is 10 km length. For key-sites of the coast wave-dangerous rhumbs were determined. For ice-free period of each year accumulated summer storm duration (ASSD) - number of hours with strong winds (≥10 m/s) from wave-dangerous directions - was calculated for both sections of coast. Supposing that coast retreat rate is proportional to number of hours with strong winds from wave-dangerous rhumbs, we can approximately assess interannual variability of coast retreat rate. Our research revealed that: 1)There are significant (from hours to a few hundreds of hours) differences in ASSD from year to year due to short ice-free period and high variability of wind velocity and direction. So, we can expect sharp interannual differences in coastal retreat rate. 2)The duration of strong winds from wave-dangerous rhumbs during ice-free period is more on the eastern coast of the estuary than on the western. This goes from the predominance of northern and northwestern winds during ice-free period. These winds cause waves leading to coastal erosion on the eastern coast of estuary and don't cause such waves on the western one. However, we can't draw conclusions about the comparative rates of coastal

  20. Dynamic monitoring of engineering structures as a key element of its technical security

    Directory of Open Access Journals (Sweden)

    Patrikeev Aleksandr Vladimirovich

    2014-03-01

    Full Text Available On an example of a complex engineering structure with aerodynamically unfavorable constructive form, equipped with mechanisms dampers, the results of long-term observations of the oscillation frequency under the influence of wind loads were reviewed. The experimental dependence of the first tone oscillation frequency on time for this structure is shown. The hypothesis on the causes of frequency oscillations change in engineering structures in time is proposed. The experimental data confirms this hypothesis. The results of a comparison of the experimental data for long-term observations with the oscillation frequency in accordance with the safety criteria of GOST 31937-2011 “Buildings and Constructions. Rules of inspection and monitoring of the technical condition” are shown. It has been shown that the results of comparison indicate technical safety of the whole object. It is offered to use dynamic monitoring systems for technically complex heavy-duty engineering structures for early detection of the transition beginning of the control object to the limited functional or emergency condition.

  1. Assessing food security in water scarce regions by Life Cycle Analysis: a case study in the Gaza strip

    Science.gov (United States)

    Recanati, Francesca; Castelletti, Andrea; Melià, Paco; Dotelli, Giovanni

    2013-04-01

    Food security is a major issue in Palestine for both political and physical reasons, with direct effects on the local population living conditions: the nutritional level of people in Gaza is classified by FAO as "insecure". As most of the protein supply comes from irrigated agricultural production and aquaculture, freshwater availability is a limiting factor to food security, and the primary reason for frequent conflicts among food production processes (e.g. aquaculture, land livestock or different types of crops). In this study we use Life Cycle Analysis to assess the environmental impacts associated to all the stages of water-based protein production (from agriculture and aquaculture) in the Gaza strip under different agricultural scenarios and hydroclimatic variability. As reported in several recent studies, LCA seems to be an appropriate methodology to analyze agricultural systems and assess associated food security in different socio-economic contexts. However, we argue that the inherently linear and static nature of LCA might prove inadequate to tackle with the complex interaction between water cycle variability and the food production system in water-scarce regions of underdeveloped countries. Lack of sufficient and reliable data to characterize the water cycle is a further source of uncertainty affecting the robustness of the analysis. We investigate pros and cons of LCA and LCA-based option planning in an average size farm in Gaza strip, where farming and aquaculture are family-based and integrated by reuse of fish breeding water for irrigation. Different technological solutions (drip irrigation system, greenhouses etc.) are evaluated to improve protein supply and reduce the pressure on freshwater, particularly during droughts. But this use of technology represent also a contribution in increasing sustainability in agricultural processes, and therefore in economy, of Gaza Strip (reduction in chemical fertilizers and pesticides etc.).

  2. Assessing Tumor Angiogenesis with Dynamic Contrast Enhanced Magnetic Resonance Imaging

    Science.gov (United States)

    Esparza-Coss, Emilio; Jackson, Edward F.

    2006-09-01

    Dynamic contrast enhanced magnetic resonance imaging (DCE-MRI) is a method able of assessing microvascular changes at high spatial resolution and without ionizing radiation. The microcirculation and structure of tumors are fundamentally chaotic in that tumor-derived factors stimulate the endothelial cells to form new small vessels (angiogenesis) and this vasculature deviates markedly from normal hierarchical branching patterns. The tumor-induced microvascular changes lead to blood flow that is both spatially and temporally more heterogeneous than the efficient and uniform perfusion of normal organs and tissues. DCE-MRI allows for the assessment of perfusion and permeability of the tumor microvasculature, including the network of vessels with diameters less than 100 μm, which are beyond the resolution of conventional angiograms. The microvessel permeability to small molecular weight contrast media as well as measures of tumor response can be assessed with different analysis techniques ranging from simple measures of enhancement to pharmacokinetic models. In this work, such DCE-MRI analysis techniques are discussed.

  3. Water security, risk and economic growth: lessons from a dynamical systems model

    Science.gov (United States)

    Dadson, Simon; Hall, Jim; Garrick, Dustin; Sadoff, Claudia; Grey, David; Whittington, Dale

    2016-04-01

    Investments in the physical infrastructure, human capital, and institutions needed for water resources management have been a noteworthy feature in the development of most civilisations. These investments affect the economy in two distinct ways: (i) by improving the factor productivity of water in multiple sectors of the economy, especially those that are water intensive such as agriculture and energy; and (ii) by reducing the acute and chronic harmful effects of water-related hazards like floods, droughts, and water-related diseases. The need for capital investment to mitigate these risks in order to promote economic growth is widely acknowledged, but prior work to conceptualise the relationship between water-related risks and economic growth has focused on the productive and harmful roles of water in the economy independently. Here the two influences are combined using a simple, dynamical model of water-related investment, risk, and growth at the national level. The model suggests the existence of a context-specific threshold above which growth proceeds along an 'S'-curve. In many cases there is a requirement for initial investment in water-related assets to enable growth. Below the threshold it is possible for a poverty trap to arise. The presence and location of the poverty trap is context-specific and depends on the relative exposure of productive water-related assets to risk, compared with risks faced by assets in the wider economy. Exogenous changes in the level of water-related risk (through, for example, climate and land cover change) can potentially push an economy away from a growth path towards a poverty trap. These results illustrate the value of accounting for environmental risk in models of economic growth and may offer guidance in the design of robust policies for investment in water-related productive assets to manage risk, particularly in the face of global and regional environmental change.

  4. A New Myohaptic Instrument to Assess Wrist Motion Dynamically

    Directory of Open Access Journals (Sweden)

    Mario Manto

    2010-04-01

    Full Text Available The pathophysiological assessment of joint properties and voluntary motion in neurological patients remains a challenge. This is typically the case in cerebellar patients, who exhibit dysmetric movements due to the dysfunction of cerebellar circuitry. Several tools have been developed, but so far most of these tools have remained confined to laboratories, with a lack of standardization. We report on a new device which combines the use of electromyographic (EMG sensors with haptic technology for the dynamic investigation of wrist properties. The instrument is composed of a drivetrain, a haptic controller and a signal acquisition unit. Angular accuracy is 0.00611 rad, nominal torque is 6 N·m, maximal rotation velocity is 34.907 rad/sec, with a range of motion of –1.0472 to +1.0472 rad. The inertia of the motor and handgrip is 0.004 kg·m². This is the first standardized myohaptic instrument allowing the dynamic characterization of wrist properties, including under the condition of artificial damping. We show that cerebellar patients are unable to adapt EMG activities when faced with an increase in damping while performing fast reversal movements. The instrument allows the extraction of an electrophysiological signature of a cerebellar deficit.

  5. A new myohaptic instrument to assess wrist motion dynamically.

    Science.gov (United States)

    Manto, Mario; Van Den Braber, Niels; Grimaldi, Giuliana; Lammertse, Piet

    2010-01-01

    The pathophysiological assessment of joint properties and voluntary motion in neurological patients remains a challenge. This is typically the case in cerebellar patients, who exhibit dysmetric movements due to the dysfunction of cerebellar circuitry. Several tools have been developed, but so far most of these tools have remained confined to laboratories, with a lack of standardization. We report on a new device which combines the use of electromyographic (EMG) sensors with haptic technology for the dynamic investigation of wrist properties. The instrument is composed of a drivetrain, a haptic controller and a signal acquisition unit. Angular accuracy is 0.00611 rad, nominal torque is 6 N·m, maximal rotation velocity is 34.907 rad/sec, with a range of motion of -1.0472 to +1.0472 rad. The inertia of the motor and handgrip is 0.004 kg·m2. This is the first standardized myohaptic instrument allowing the dynamic characterization of wrist properties, including under the condition of artificial damping. We show that cerebellar patients are unable to adapt EMG activities when faced with an increase in damping while performing fast reversal movements. The instrument allows the extraction of an electrophysiological signature of a cerebellar deficit.

  6. A new fuzzy-dynamic risk and reliability assessment

    Directory of Open Access Journals (Sweden)

    Majid Vaziri Sarashk

    2014-06-01

    Full Text Available The purpose of this article is to consider system safety and reliability analysts to evaluate the risk associated with item failure modes. The factors considered in traditional failure mode and effect analysis (FMEA for risk assessment are frequency of occurrence (O, severity (S and detectability (D of an item failure mode. Because of the subjective, qualitative and dynamic nature of the information and to make the analysis more consistent and logical, an approach using fuzzy logic and system dynamics methodology is proposed. In the proposed approach, severity is replaced by dependency parameter then, these parameters are represented as members of a fuzzy set fuzzified by using appropriate membership functions and they are evaluated in fuzzy inference engine, which makes use of well-defined rule base and fuzzy logic operations to determine the value of parameters related to system’s transfer functions. The fuzzy conclusion is then defuzzified to get transfer function for risk and failure rate. The applicability of the proposed approach is investigated with the help of an illustrative case study from the automotive industry.

  7. A New Myohaptic Instrument to Assess Wrist Motion Dynamically

    Science.gov (United States)

    Manto, Mario; Van Den Braber, Niels; Grimaldi, Giuliana; Lammertse, Piet

    2010-01-01

    The pathophysiological assessment of joint properties and voluntary motion in neurological patients remains a challenge. This is typically the case in cerebellar patients, who exhibit dysmetric movements due to the dysfunction of cerebellar circuitry. Several tools have been developed, but so far most of these tools have remained confined to laboratories, with a lack of standardization. We report on a new device which combines the use of electromyographic (EMG) sensors with haptic technology for the dynamic investigation of wrist properties. The instrument is composed of a drivetrain, a haptic controller and a signal acquisition unit. Angular accuracy is 0.00611 rad, nominal torque is 6 N·m, maximal rotation velocity is 34.907 rad/sec, with a range of motion of −1.0472 to +1.0472 rad. The inertia of the motor and handgrip is 0.004 kg·m2. This is the first standardized myohaptic instrument allowing the dynamic characterization of wrist properties, including under the condition of artificial damping. We show that cerebellar patients are unable to adapt EMG activities when faced with an increase in damping while performing fast reversal movements. The instrument allows the extraction of an electrophysiological signature of a cerebellar deficit. PMID:22319293

  8. Vulnerability assessment of critical infrastructure : activity 2 final report : information on SCADA systems and other security monitoring techniques used in oil and gas pipelines

    Energy Technology Data Exchange (ETDEWEB)

    Gu, G.P.; Revie, R.W. [Natural Resources Canada, Ottawa, ON (Canada). CANMET Materials Technology Laboratory

    2008-03-15

    This study evaluated various technologies for monitoring the security of remote pipeline infrastructure. The technologies included flow, pressure and mass variations; negative pressure waves; dynamic and statistical modelling; hydrocarbon-sensitive cables; fiber optic systems; infrared thermography; spectral imaging; and synthetic aperture radar and radio frequency identification methods. A brief outline of the technologies was provided, along with suggestions for integrating the technology with other commercially available tools designed to manage security and reduce risk. The study demonstrated that many monitoring technologies are suitable for detecting pipeline leaks and identifying third party intrusions. A combination of different methods may provide optimal security and accuracy in leak detection and location. Automatic range and plausibility checks can be used to enhance system security and to recognize invalid changes in measuring devices and poorly parameterized media. Detailed reviews of the technologies were included in 2 appendices. 28 refs., 2 appendices.

  9. A global assessment of wildfire risks to human and environmental water security

    Science.gov (United States)

    Robinne, François-Nicolas; Parisien, Marc-André; Flannigan, Mike; Miller, Carol; Bladon, Kevin D.

    2017-04-01

    Extreme wildfire events extensively affect hydrosystem stability and generate an important threat to the reliability of the water supply for human and natural communities. While actively studied at the watershed scale, the development of a global vision of wildfire risk to water security has only been undertaken recently, pointing at potential water security concerns in an era of global changes. In order to address this concern, we propose a global-scale analysis of the wildfire risk to surface water supplies based on the Driving forces-Pressures-States-Impacts-Responses (DPSIR) framework. This framework relies on the cause-and-effect relationships existing between the five categories of the DPSIR chain. Based on the literature, we gathered an extensive set of spatial indicators relevant to fire-induced hydrological hazards and water consumption patterns by human and natural communities. Each indicator was assigned a DPSIR category. Then, we collapsed the information in each category using a principal component analysis in order to extract the most relevant pixel-based information provided by each spatial indicator. Finally, we compiled our five categories using an additive indexation process to produce a spatially-explicit index of the wildfire-water risk (WWR). For comparison purposes, we aggregated index scores by global hydrological regions, or hydrobelts, for analysis. Overall, our results show a distinct pattern of medium-to-high risk levels in areas where sizeable wildfire activity, water resources, and water consumption are concomitant, which mainly encompasses temperate and sub-tropical zones. A closer look at hydrobelts reveals differences in the factors driving the risk, with fire activity being the primary factor of risk in the circumboreal forest, and freshwater resource density being prevalent in tropical areas. We also identified major urban areas across the world whose source waters should be protected from extreme fire events, particularly when

  10. EMI Security Architecture

    CERN Document Server

    White, J.; Schuller, B.; Qiang, W.; Groep, D.; Koeroo, O.; Salle, M.; Sustr, Z.; Kouril, D.; Millar, P.; Benedyczak, K.; Ceccanti, A.; Leinen, S.; Tschopp, V.; Fuhrmann, P.; Heyman, E.; Konstantinov, A.

    2013-01-01

    This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.

  11. Architecture for Integrated Medical Model Dynamic Probabilistic Risk Assessment

    Science.gov (United States)

    Jaworske, D. A.; Myers, J. G.; Goodenow, D.; Young, M.; Arellano, J. D.

    2016-01-01

    Probabilistic Risk Assessment (PRA) is a modeling tool used to predict potential outcomes of a complex system based on a statistical understanding of many initiating events. Utilizing a Monte Carlo method, thousands of instances of the model are considered and outcomes are collected. PRA is considered static, utilizing probabilities alone to calculate outcomes. Dynamic Probabilistic Risk Assessment (dPRA) is an advanced concept where modeling predicts the outcomes of a complex system based not only on the probabilities of many initiating events, but also on a progression of dependencies brought about by progressing down a time line. Events are placed in a single time line, adding each event to a queue, as managed by a planner. Progression down the time line is guided by rules, as managed by a scheduler. The recently developed Integrated Medical Model (IMM) summarizes astronaut health as governed by the probabilities of medical events and mitigation strategies. Managing the software architecture process provides a systematic means of creating, documenting, and communicating a software design early in the development process. The software architecture process begins with establishing requirements and the design is then derived from the requirements.

  12. Assessing Numerical Error in Structural Dynamics Using Energy Balance

    Directory of Open Access Journals (Sweden)

    Rabindranath Andujar

    2013-01-01

    Full Text Available This work applies the variational principles of Lagrange and Hamilton to the assessment of numerical methods of linear structural analysis. Different numerical methods are used to simulate the behaviour of three structural configurations and benchmarked in their computation of the Lagrangian action integral over time. According to the principle of energy conservation, the difference at each time step between the kinetic and the strain energies must equal the work done by the external forces. By computing this difference, the degree of accuracy of each combination of numerical methods can be assessed. Moreover, it is often difficult to perceive numerical instabilities due to the inherent complexities of the modelled structures. By means of the proposed procedure, these complexities can be globally controlled and visualized in a straightforward way. The paper presents the variational principles to be considered for the collection and computation of the energy-related parameters (kinetic, strain, dissipative, and external work. It then introduces a systematic framework within which the numerical methods can be compared in a qualitative as well as in a quantitative manner. Finally, a series of numerical experiments is conducted using three simple 2D models subjected to the effect of four different dynamic loadings.

  13. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  14. Assessing the internal validity of a household survey-based food security measure adapted for use in Iran

    Directory of Open Access Journals (Sweden)

    Sadeghizadeh Atefeh

    2009-06-01

    Full Text Available Abstract Background The prevalence of food insecurity is an indicator of material well-being in an area of basic need. The U.S. Food Security Module has been adapted for use in a wide variety of cultural and linguistic settings around the world. We assessed the internal validity of the adapted U.S. Household Food Security Survey Module to measure adult and child food insecurity in Isfahan, Iran, using statistical methods based on the Rasch measurement model. Methods The U.S. Household Food Security Survey Module was translated into Farsi and after adaptation, administered to a representative sample. Data were provided by 2,004 randomly selected households from all sectors of the population of Isfahan, Iran, during 2005. Results 53.1 percent reported that their food had run out at some time during the previous 12 months and they did not have money to buy more, while 26.7 percent reported that an adult had cut the size of a meal or skipped a meal because there was not enough money for food, and 7.2 percent reported that an adult did not eat for a whole day because there was not enough money for food. The severity of the items in the adult scale, estimated under Rasch-model assumptions, covered a range of 6.65 logistic units, and those in the child scale 11.68 logistic units. Most Item-infit statistics were near unity, and none exceeded 1.20. Conclusion The range of severity of items provides measurement coverage across a wide range of severity of food insecurity for both adults and children. Both scales demonstrated acceptable levels of internal validity, although several items should be improved. The similarity of the response patterns in the Isfahan and the U.S. suggests that food insecurity is experienced, managed, and described similarly in the two countries.

  15. Development and Validation of an Online Dynamic Assessment for Raising Students' Comprehension of Science Text

    Science.gov (United States)

    Wang, Jing-Ru; Chen, Shin-Feng

    2016-01-01

    This article reports on the development of an online dynamic approach for assessing and improving students' reading comprehension of science texts--the dynamic assessment for reading comprehension of science text (DARCST). The DARCST blended assessment and response-specific instruction into a holistic learning task for grades 5 and 6 students. The…

  16. Chemical Security Analysis Center

    Data.gov (United States)

    Federal Laboratory Consortium — In 2006, by Presidential Directive, DHS established the Chemical Security Analysis Center (CSAC) to identify and assess chemical threats and vulnerabilities in the...

  17. Computation of Steady State Nodal Voltages for Fast Security Assessment in Power Systems

    DEFF Research Database (Denmark)

    Møller, Jakob Glarbo; Jóhannsson, Hjörtur; Østergaard, Jacob

    2014-01-01

    Development of a method for real-time assess-ment of post-contingency nodal voltages is introduced. Linear network theory is applied in an algorithm that utilizes Thevenin equivalent representation of power systems as seen from every voltage-controlled node in a network. The method is evaluated b...

  18. Web Security Testing Cookbook

    CERN Document Server

    Hope, Paco

    2008-01-01

    Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite.

  19. Dynamic Assessment in Iranian EFL Classrooms: A Post- method Enquiry

    Directory of Open Access Journals (Sweden)

    Seyed Javad Es-hagi Sardrood

    2011-11-01

    Full Text Available Derived from the emerging paradigm shift in English language teaching and assessment, there has been a renewal of interest in dynamic assessment (DA to be used as an alternative to the traditional static testing in language classrooms. However, to date, DA practice has been mostly limited to clinical treatments of children with learning disabilities, and it has not been widely incorporated into the EFL contexts. In order to find out the reasons behind the slow trend of DA practice, this research adopted a framework, based on the post method pedagogical principles and recommendations, to delve into the prospect of methodological realization of DA approaches in Iranian EFL classrooms. To this end, two instruments, a questionnaire and an interview were developed to explore the practicality of DA through seeking 51 Iranian EFL teachers' perception of DA practice in their classrooms. The results indicated that most of the teachers were negative about the practice of DA in their classrooms and believed that a full-fledged implementation of DA in Iranian EFL classrooms is too demanding. The feasibility of DA in Iranian EFL classrooms, where teachers are deprived of DA training, guideline, and technological resources, is questioned seriously due to the factors such as time-constrained nature of DA procedures, large number of students in EFL classrooms, the common practice of static tests as the mainstream, and overreliance on the teachers' teaching and assessment abilities. The paper suggests the framework of inquiry in this study, which was derived from the post method pedagogy, to be utilized as a blueprint for a critical appraisal of any alternative method or theory which is introduced into ELT contexts.

  20. Dynamic hazard identification and evaluation techniques for regional airport safety and security%支线机场安全动态预警技术研究

    Institute of Scientific and Technical Information of China (English)

    许红军; 田俊改

    2011-01-01

    How to promote management ability of regional airport safety and security is the major problem which China regional airports will face in the future. In order to control the safety and security risk in regional airport operation, a series of dynamic risk early warning technology were put forward in this paper. Based on the safety and security risk management theory, a three dimensions hazard identification model was put forward. In this model,the hazards which the regional airports are facing could be identified by time, space and logistic dimension. Hazard identification in time dimension referred to analyze regional airport running process and identify the risk factor in these process. Hazard identification in spatial dimension refers to identify the risk factor in the spatial composition of regional airport. Hazard identification in the logical dimension was to establish management, personnel, equipment and environment hierarchical evaluation model by analyzing the risk factors in management, man, machine and media. By using this model, the hazards which the regional airports are facing could be identified more comprehensive. The multi-dimension characteristics of the risk were also introduced, such as the likehood, consequence,predictability and the controllability into regional airports risk analysis procedure. The multi-dimension risk assessment model could reflect the effect of risk response measures and give more systematic and comprehensively evaluation for the risk factor. By using these techniques, the hazards which the regional airport are facing could be identified comprehensively and dynamically, which will help improve the risk early warning technology for regional airport.%提升支线机场安全管理能力是中国支线机场未来发展面临的一个重大问题,为提高我国支线机场安全管理水平,本文基于系统动态的风险管理思想,针对支线机场安全风险发生随机、动态和系统的特点,结合支线机场安

  1. Assessing Sensorimotor Function Following ISS with Computerized Dynamic Posturography.

    Science.gov (United States)

    Wood, Scott J; Paloski, William H; Clark, Jonathan B

    2015-12-01

    Postflight postural ataxia reflects both the control strategies adopted for movement in microgravity and the direct effects of deconditioning. Computerized dynamic posturography (CDP) has been used during the first decade of the International Space Station (ISS) expeditions to quantify the initial postflight decrements and recovery of postural stability. The CDP data were obtained on 37 crewmembers as part of their pre- and postflight medical examinations. Sensory organization tests evaluated the ability to make effective use of (or suppress inappropriate) visual, vestibular, and somatosensory information for balance control. This report focuses on eyes closed conditions with either a fixed or sway-referenced base of support, with the head erect or during pitch-head tilts (± 20° at 0.33 Hz). Equilibrium scores were derived from peak-to-peak anterior-posterior sway. Motor-control tests were also used to evaluate a crewmember's ability to automatically recover from unexpected support-surface perturbations. The standard Romberg condition was the least sensitive. Dynamic head tilts led to increased incidence of falls and revealed significantly longer recovery than head-erect conditions. Improvements in postflight postural performance during the later expeditions may be attributable to higher preflight baselines and/or advanced exercise capabilities aboard the ISS. The diagnostic assessment of postural instability is more pronounced during unstable-support conditions requiring active head movements. In addition to supporting return-to-duty decisions by flight surgeons, the CDP provides a standardized sensorimotor measure that can be used to evaluate the effectiveness of countermeasures designed to either minimize deconditioning on orbit or promote reconditioning upon return to Earth.

  2. Research on early warning of food security using a system dynamics model: evidence from Jiangsu province in China.

    Science.gov (United States)

    Xu, Jianling; Ding, Yi

    2015-01-01

    Analyzing the early warning of food security, this paper sets the self-sufficiency rate as the principal indicator in a standpoint of supplement. It is common to use the quantitative methods to forecast and warning the insecurity. However, this paper considers more about the probable outcome when the government intervenes. By constructing the causal feedbacks among grain supplement, demand, productive input, and the policy factors to simulate the future food security in Jiangsu province, conclusions can be drawn as the following: (1) The situation of food security is insecure if the self-sufficiency rate is under 68.3% according to the development of system inertia. (2) it is difficult to guarantee the food security in Jiangsu just depending on the increase of grain sown area. (3) The valid solution to ensure the food security in Jiangsu is to improve the productivity.

  3. Assessing tiger population dynamics using photographic capture-recapture sampling

    Science.gov (United States)

    Karanth, K.U.; Nichols, J.D.; Kumar, N.S.; Hines, J.E.

    2006-01-01

    Although wide-ranging, elusive, large carnivore species, such as the tiger, are of scientific and conservation interest, rigorous inferences about their population dynamics are scarce because of methodological problems of sampling populations at the required spatial and temporal scales. We report the application of a rigorous, noninvasive method for assessing tiger population dynamics to test model-based predictions about population viability. We obtained photographic capture histories for 74 individual tigers during a nine-year study involving 5725 trap-nights of effort. These data were modeled under a likelihood-based, ?robust design? capture?recapture analytic framework. We explicitly modeled and estimated ecological parameters such as time-specific abundance, density, survival, recruitment, temporary emigration, and transience, using models that incorporated effects of factors such as individual heterogeneity, trap-response, and time on probabilities of photo-capturing tigers. The model estimated a random temporary emigration parameter of =K' =Y' 0.10 ? 0.069 (values are estimated mean ? SE). When scaled to an annual basis, tiger survival rates were estimated at S = 0.77 ? 0.051, and the estimated probability that a newly caught animal was a transient was = 0.18 ? 0.11. During the period when the sampled area was of constant size, the estimated population size Nt varied from 17 ? 1.7 to 31 ? 2.1 tigers, with a geometric mean rate of annual population change estimated as = 1.03 ? 0.020, representing a 3% annual increase. The estimated recruitment of new animals, Bt, varied from 0 ? 3.0 to 14 ? 2.9 tigers. Population density estimates, D, ranged from 7.33 ? 0.8 tigers/100 km2 to 21.73 ? 1.7 tigers/100 km2 during the study. Thus, despite substantial annual losses and temporal variation in recruitment, the tiger density remained at relatively high levels in Nagarahole. Our results are consistent with the hypothesis that protected wild tiger populations can remain

  4. Assessing future risks to agricultural productivity, water resources and food security: How can remote sensing help?

    Science.gov (United States)

    Thenkabail, Prasad S.; Knox, Jerry W.; Ozdogan, Mutlu; Gumma, Murali Krishna; Congalton, Russell G.; Wu, Zhuoting; Milesi, Cristina; Finkral, Alex; Marshall, Mike; Mariotto, Isabella; You, Songcai; Giri, Chandra; Nagler, Pamela

    2012-01-01

    Although global food production has been rising, the world sti ll faces a major food security challenge. Over one billion people are currently undernourished (Wheeler and Kay, 2010). By the 2050s, the human population is projected to grow to 9.1 billion. Over three-quarters of these people will be living in developing countries, in regions that already lack the capacity to feed their populations . Under current agricultural practices, the increased demand for food would require in excess of one billion hectares of new cropland, nearly equivalent to the land area of the United States, and would lead to significant increases in greenhouse gases (Tillman et al., 2011). Since climate is the primary determinant of agricultural productivity, changes to it will influence not only crop yields, but also hydrologic balances and supplies of inputs to managed farming systems, and may lead to a shift in the geographic location of some crops . Therefore, not only must crop productivity (yield per unit of land; kg/m2) increase, but water productivity (yield per unit of water or "crop per drop"; kg/m3) must increase as well in order to feed a burgeoning population against a backdrop

  5. Assessing future risks to agricultural productivity, water resources and food security: How can remote sensing help?

    Science.gov (United States)

    Thenkabail, Prasad S.; Knox, Jerry W.; Ozdogan, Mutlu; Gumma, Murali Krishna; Congalton, Russell G.; Wu, Zhuoting; Milesi, Cristina; Finkral, Alex; Marshall, Mike; Mariotto, Isabella; You, Songcai; Giri, Chandra; Nagler, Pamela

    2012-01-01

    Although global food production has been rising, the world sti ll faces a major food security challenge. Over one billion people are currently undernourished (Wheeler and Kay, 2010). By the 2050s, the human population is projected to grow to 9.1 billion. Over three-quarters of these people will be living in developing countries, in regions that already lack the capacity to feed their populations . Under current agricultural practices, the increased demand for food would require in excess of one billion hectares of new cropland, nearly equivalent to the land area of the United States, and would lead to significant increases in greenhouse gases (Tillman et al., 2011). Since climate is the primary determinant of agricultural productivity, changes to it will influence not only crop yields, but also hydrologic balances and supplies of inputs to managed farming systems, and may lead to a shift in the geographic location of some crops . Therefore, not only must crop productivity (yield per unit of land; kg/m2) increase, but water productivity (yield per unit of water or "crop per drop"; kg/m3) must increase as well in order to feed a burgeoning population against a backdrop

  6. FOREST ECOSYSTEM DYNAMICS ASSESSMENT AND PREDICTIVE MODELLING IN EASTERN HIMALAYA

    Directory of Open Access Journals (Sweden)

    S. P. S. Kushwaha

    2012-09-01

    Full Text Available This study focused on the forest ecosystem dynamics assessment and predictive modelling deforestation and forest cover prediction in a part of north-eastern India i.e. forest areas along West Bengal, Bhutan, Arunachal Pradesh and Assam border in Eastern Himalaya using temporal satellite imagery of 1975, 1990 and 2009 and predicted forest cover for the period 2028 using Cellular Automata Markov Modedel (CAMM. The exercise highlighted large-scale deforestation in the study area during 1975–1990 as well as 1990–2009 forest cover vectors. A net loss of 2,334.28 km2 forest cover was noticed between 1975 and 2009, and with current rate of deforestation, a forest area of 4,563.34 km2 will be lost by 2028. The annual rate of deforestation worked out to be 0.35 and 0.78% during 1975–1990 and 1990–2009 respectively. Bamboo forest increased by 24.98% between 1975 and 2009 due to opening up of the forests. Forests in Kokrajhar, Barpeta, Darrang, Sonitpur, and Dhemaji districts in Assam were noticed to be worst-affected while Lower Subansiri, West and East Siang, Dibang Valley, Lohit and Changlang in Arunachal Pradesh were severely affected. Among different forest types, the maximum loss was seen in case of sal forest (37.97% between 1975 and 2009 and is expected to deplete further to 60.39% by 2028. The tropical moist deciduous forest was the next category, which decreased from 5,208.11 km2 to 3,447.28 (33.81% during same period with further chances of depletion to 2,288.81 km2 (56.05% by 2028. It noted progressive loss of forests in the study area between 1975 and 2009 through 1990 and predicted that, unless checked, the area is in for further depletion of the invaluable climax forests in the region, especially sal and moist deciduous forests. The exercise demonstrated high potential of remote sensing and geographic information system for forest ecosystem dynamics assessment and the efficacy of CAMM to predict the forest cover change.

  7. Groundwater Dynamics and Quality Assessment in an Agricultural Area

    Directory of Open Access Journals (Sweden)

    Stefano L. Russo

    2011-01-01

    Full Text Available Problem statement: The analysis of the relationships among the different hydrogeological Units and the assessment of groundwater quality are fundamental to adopt suitable territorial planning measures aimed to reduce the potential groundwater pollution especially in agricultural regions. In this study, the characteristics of groundwater dynamics and the assessment of its quality in the Cuneo Plain (NW Italy were examined. Approach: In order to define the geological setting an intense bibliographic analysis has been performed by the authors. This analysis was implemented by several correlated land controls and specific surveys that have permitted to analyze to certain reliability the Quaternary evolution of the entire plain sector and the current relationships among the different geological bodies that strongly affect the groundwater dynamics. Results: The Quaternary alluvial deposits overlap a Tertiary sedimentary succession through a series of erosional unconformity surfaces. These Quaternary deposits highlight a variable thickness ranging from 80-100 m in the foothills of the mountains up to a few meters in the more distal portion of the plain. In these deposits there are several unconfined aquifers which are not hydraulically interconnected due to the deep fluvial incisions that reach the underlying tertiary substrate. The Cuneo plain is intensively populated and lot of villages and farms characterize the landscape. In the overall area it is present an intensive agricultural and livestock activity predominantly represented by crops of wheat and corn and farms of cattle and pigs. All these activities represent point and diffuse groundwater pollution sources and require a considerable amount of groundwater which is withdrawn from the Quaternary aquifers by means of thousands of water wells. The groundwater quality is strongly influenced by the content of nitrates and manganese. The nitrates are linked to pollution due to agricultural activities

  8. Report on the Assessment of Arms, Ammunition, and Explosives Accountability and Control; Security Assistance; and Logistics Sustainment for the Iraq Security Forces

    Science.gov (United States)

    2008-12-19

    Forces equipment requirements. Specifically, we examined the organizational structure and processes used to execute security assistance programs during...logistics and transportation sectors within the DoD portion of the Federal Government Critical Infrastructure Protection structure . 29 30 maintaining...Procedures Comprehensive Standare Operating Procedures (SOP) with site-specific guidance were ordinarily unavailable for SAO personnel at the Iraqi

  9. Importance Sampling Based Decision Trees for Security Assessment and the Corresponding Preventive Control Schemes: the Danish Case Study

    DEFF Research Database (Denmark)

    Liu, Leo; Rather, Zakir Hussain; Chen, Zhe

    2013-01-01

    and adopts a methodology of importance sampling to maximize the information contained in the database so as to increase the accuracy of DT. Further, this paper also studies the effectiveness of DT by implementing its corresponding preventive control schemes. These approaches are tested on the detailed model......Decision Trees (DT) based security assessment helps Power System Operators (PSO) by providing them with the most significant system attributes and guiding them in implementing the corresponding emergency control actions to prevent system insecurity and blackouts. DT is obtained offline from time......-domain simulation and the process of data mining, which is then implemented online as guidelines for preventive control schemes. An algorithm named Classification and Regression Trees (CART) is used to train the DT and key to this approach lies on the accuracy of DT. This paper proposes contingency oriented DT...

  10. Research on Security Evaluation and Risk Assessment for Internet of Things%物联网安全测评和风险评估技术研究*

    Institute of Scientific and Technical Information of China (English)

    雷王景

    2013-01-01

    The main technology,platform framework and system realization of Internet of Things(IOT)security test with evaluation and risk assessment service platform are presented,which is realized based on information security simulation,Internet of Things security test with evaluation,security risk assessment technology. The platform can test and evaluate the construction scheme,security technology means of Internet of Things,and can also promote China′s Internet of Things construction and security industry development.%  提出采用信息安全仿真、物联网安全测评和安全风险评估技术实现的物联网安全测评和风险评估服务平台的主要技术、平台结构和系统实现。此平台能够为物联网建设方案、安全技术手段进行测试与评估,推动我国物联网建设和物联网安全产业的发展。

  11. 基于DPSIR模型的区域水安全评价研究%Study on regional water security assessment based on DPSIR model

    Institute of Scientific and Technical Information of China (English)

    向红梅; 金腊华

    2011-01-01

    为了对区域水安全状况进行有效评价,采用"驱动力-压力-状态-影响-响应"模型,选取27项指标,构建区域水安全评价指标体系,通过层次分析法与熵值法确定评价指标在满足主客观条件下的组合权重,运用综合指数法模型,对2004-2008年广东省水安全状况进行了动态评价.结果表明,广东省水安全水平逐年提高,但总体水平不高,处于警戒状态,存在较大的不安全隐患.虽然响应指标在水安全方面起重要的作用,使系统存在的状态都处于上升的趋势,但系统驱动力、压力强度仍然较大,说明广东省水安全水平的提高很大程度上是依赖对环境的治理和投入.%This paper is aimed to introduce the application of the author's DPSIR model for regional water security assessment. Regional water security always includes various hazards resulting from the social and economic development, such as water shortage, pollution and flood etc. The scholars from home and abroad have carried out researches in different aspects, but the research of water quantification and assessment is still inadequate. Analyzing the components of regional water security on the basis of historical research findings and the related literature, this article has established a regional water security assessment system by using DPSIR model. This system includes five subsystems ( Driving Forces-Pressure-State-lmpact-Response ),three levels and 27 indicators. All the indexes are divided into two categories and also each category has its own calculation method. On the basis of the regional water security assessment index systems, the weight of indicators is confirmed by the method of Analytic Hierarchy Process and Entropy via calculating the comprehensive weight with the respect of considering the objective and subjective conditions. The composite index method is introduced to assess the comprehensive indicator system which is classified into five grades. The water

  12. Quantitative Assessment of Molecular Dynamics Sampling for Flexible Systems.

    Science.gov (United States)

    Nemec, Mike; Hoffmann, Daniel

    2017-02-14

    Molecular dynamics (MD) simulation is a natural method for the study of flexible molecules but at the same time is limited by the large size of the conformational space of these molecules. We ask by how much the MD sampling quality for flexible molecules can be improved by two means: the use of diverse sets of trajectories starting from different initial conformations to detect deviations between samples and sampling with enhanced methods such as accelerated MD (aMD) or scaled MD (sMD) that distort the energy landscape in controlled ways. To this end, we test the effects of these approaches on MD simulations of two flexible biomolecules in aqueous solution, Met-Enkephalin (5 amino acids) and HIV-1 gp120 V3 (a cycle of 35 amino acids). We assess the convergence of the sampling quantitatively with known, extensive measures of cluster number Nc and cluster distribution entropy Sc and with two new quantities, conformational overlap Oconf and density overlap Odens, both conveniently ranging from 0 to 1. These new overlap measures quantify self-consistency of sampling in multitrajectory MD experiments, a necessary condition for converged sampling. A comprehensive assessment of sampling quality of MD experiments identifies the combination of diverse trajectory sets and aMD as the most efficient approach among those tested. However, analysis of Odens between conventional and aMD trajectories also reveals that we have not completely corrected aMD sampling for the distorted energy landscape. Moreover, for V3, the courses of Nc and Odens indicate that much higher resources than those generally invested today will probably be needed to achieve convergence. The comparative analysis also shows that conventional MD simulations with insufficient sampling can be easily misinterpreted as being converged.

  13. Assessing iron dynamics in the release from a stratified reservoir

    Science.gov (United States)

    Ashby, S.L.; Faulkner, S.P.; Gambrell, R.P.; Smith, B.A.

    2004-01-01

    Field and laboratory studies were conducted to describe the fate of total, dissolved, and ferrous (Fe2.) iron in the release from a stratified reservoir with an anoxic hypolimnion. Concentrations of total iron in the tail water indicated a first order removal process during a low flow release (0.6 m3sec1), yet negligible loss was observed during a period of increased discharge (2.8 m 3 sec-1). Dissolved and ferrous iron concentrations in the tailwater were highly variable during both release regimes and did not follow responses based on theoretical predictions. Ferrous iron concentrations in unfiltered samples were consistently greater than concentrations observed in samples filtered separately through 0.4, 0.2, and 0.1 ??m filters. Total iron removal in laboratory studies followed first order kinetics, but was twice that rate (0.077 mg.L-1 .hr 1) observed during low flow discharge in the tailwater (0.036 mg. L1 .hr1). Dissolved and ferrous iron losses in laboratory studies were rapid (???75% in the first 15 minutes and 95% within 1 hour), followed theoretical predictions, and were much faster than observations in the tailwater (???30% within the first hour). The presence of particulate forms of ferrous iron in the field and differences in removal rates observed in field and laboratory studies indicate a need for improved field assessment techniques and consideration of complexation reactions when assessing the dynamics of iron in reservoir releases and downstream impacts as a result of operation regimes. ?? Copyright by the North American Lake Management Society 2004.

  14. Secure Dynamic Program Repartitioning

    DEFF Research Database (Denmark)

    Hansen, Rene Rydhoff; Probst, Christian

    2005-01-01

    , but the partitioning compiler becomes a part of the network and can recompile applications, thus alowing hosts to enter or leave the framework. We contend that this setting is superior to static partitioning, since it allows redistribution of data and computations. This is especialy beneficial if the new host alows...

  15. 信息安全风险评估学习中的问题与对策%Information Security Risk Assessment Learning Problems and Solutions

    Institute of Scientific and Technical Information of China (English)

    王光源

    2013-01-01

    Information Security Risk Assessment course has been overlooked by students through teaching findings, and it is unin-terested for them to be dynamic on this regard. While via observations from the position, content and application of the course we have been standing on a vague point for a time;therefore, how to enable students to apply their knowledge to use and to im-prove the motivation to study through the reform and practice of instructional design, which has a certain promotional value in order to receive good teaching efficiency.%在教学过程中发现,学生对学习信息安全风险评估课程始终没有兴趣,对课程的地位、内容、作用和应用,一直处于模糊的状态。如何让学生学以致用,提高学习的积极性,通过对教学设计进行改革和实践,收到了好的教学效果,有一定的推广价值。

  16. Dynamic safety assessment of natural gas stations using Bayesian network.

    Science.gov (United States)

    Zarei, Esmaeil; Azadeh, Ali; Khakzad, Nima; Aliabadi, Mostafa Mirzaei; Mohammadfam, Iraj

    2017-01-05

    Pipelines are one of the most popular and effective ways of transporting hazardous materials, especially natural gas. However, the rapid development of gas pipelines and stations in urban areas has introduced a serious threat to public safety and assets. Although different methods have been developed for risk analysis of gas transportation systems, a comprehensive methodology for risk analysis is still lacking, especially in natural gas stations. The present work is aimed at developing a dynamic and comprehensive quantitative risk analysis (DCQRA) approach for accident scenario and risk modeling of natural gas stations. In this approach, a FMEA is used for hazard analysis while a Bow-tie diagram and Bayesian network are employed to model the worst-case accident scenario and to assess the risks. The results have indicated that the failure of the regulator system was the worst-case accident scenario with the human error as the most contributing factor. Thus, in risk management plan of natural gas stations, priority should be given to the most probable root events and main contribution factors, which have identified in the present study, in order to reduce the occurrence probability of the accident scenarios and thus alleviate the risks.

  17. Assessment of dynamic balance via measurement of lower extremities tortuosity.

    Science.gov (United States)

    Eltoukhy, Moataz; Kuenze, Christopher; Jun, Hyung-Pil; Asfour, Shihab; Travascio, Francesco

    2015-03-01

    Tortuosity describes how twisted or how much curvature is present in an observed movement or path. The purpose of this study was to investigate the differences in segmental tortuosity between Star Excursion Balance Test (SEBT) reach directions. Fifteen healthy participants completed this study. Participants completed the modified three direction (anterior, posteromedial, posterolateral) SEBT with three-dimensional motion analysis using an 8 camera BTS Smart 7000DX motion analysis system. The tortuosity of stance limb retro-reflective markers was then calculated and compared between reach directions using a 1 × 3 ANOVA with repeated measures, while the relationship between SEBT performance and tortuosity was established using Pearson product moment correlations. Anterior superior iliac spine tortuosity was significantly greater (p < 0.001) and lateral knee tortuosity was lesser (p = 0.018) in the anterior direction compared to the posteromedial and posterolateral directions. In addition, second metatarsal tortuosity was greater in the anterior reach direction when compared to posteromedial direction (p = 0.024). Tortuosity is a novel biomechanical measurement technique that provides an assessment of segmental movement during common dynamic tasks such as the SEBT. This enhanced level of detail compared to more global measures of joint kinematic may provide insight into compensatory movement strategies adopted following lower extremity joint injury.

  18. Social Security: Theoretical Aspects

    Directory of Open Access Journals (Sweden)

    O. I. Kashnik

    2013-01-01

    Full Text Available The paper looks at the phenomena of security and social security from the philosophical, sociological and psychological perspective. The undertaken analysis of domestic and foreign scientific materials demonstrates the need for interdisciplinary studies, including pedagogy and education, aimed at developing the guidelines for protecting the social system from destruction. The paper defines the indicators, security level indices and their assessment methods singled out from the analytical reports and security studies by the leading Russian sociological centers and international expert organizations, including the United Nations.The research is aimed at finding out the adequate models of personal and social security control systems at various social levels. The theoretical concepts can be applied by the teachers of the Bases of Life Safety course, the managers and researches developing the assessment criteria and security indices of educational environment evaluation, as well as the methods of diagnostics and expertise of educational establishments from the security standpoint. 

  19. Asset protection through security awareness

    CERN Document Server

    Speed, Tyler Justin

    2011-01-01

    Introduction: What Is Information Security? Creating a Culture of Security Awareness Protecting Corporate Assets Protective MeasuresA Culture of Security AwarenessRemaining DynamicOverview of Security Awareness Categories Overview Industry StandardsPrivacy ConcernsPassword Management Credit Card Compliance (PCI) General File ManagementExamples of Security Regulations and LawsWho Is an IS Professional?Introduction Empowering Security Professionals Top-Down ApproachDiplomacyThe People Portion of Information SecurityThe IS SpecialistDiplomacy-The IS Professional's Best FriendEnd Users Are Great N

  20. Annex C. Data Libraries for IAEA Nuclear Security Assessment Methodologies (NUSAM)

    Energy Technology Data Exchange (ETDEWEB)

    Shull, D. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Lane, M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-06-23

    Data Libraries are a collection of experimental data for PP elements based on specific defeat mechanisms. The data can de related to probability of detection, assessment, or barrier delay times. The data libraries can be a manually tabulated list or an electronic menu values enbedded in a stand-alone database or in an assessment software program such as SAVI or EASI. Data library values are usually based on years of historical testing data for many forms of common and sometimes unique PPS systems. Most useful testing libraries include data from the most basic alarm sensors, doors, walls, and barriers to very sophisticated PP elements. Each PP element is tested using increasing levels of defeat techniques from hand tools, power tools, breaching tools, explosives, and vehicles, as applicable.

  1. Dynamic testing : Assessing cognitive potential of children with culturally diverse backgrounds

    NARCIS (Netherlands)

    Stevenson, C.E.; Heiser, W.J.; Resing, W.C.M.

    Dynamic testing may be useful in assessing cognitive potential in disadvantaged populations such as ethnic minorities. Majority and minority culture children's performance on a dynamic test of figural matrices was examined using a pretest-training-posttest design. Dynamically tested children were

  2. Assessment of pulmonary dynamics in normal newborns: a pneumotachographic method.

    Science.gov (United States)

    Estol, P; Píriz, H; Pintos, L; Nieto, F; Simini, F

    1988-01-01

    A pneumotachographic method for assessment of pulmonary dynamics in critically ill newborns in an intensive care setting was developed in our laboratory. Before the results obtained with this method could be applied, the normal range of values were determined in 48 normal term and preterm newborns. Their body weight ranged between 1200 and 4100 g, and postnatal ages between 24 hours and 21 days. In three infants, two determinations were performed after an interval of 7 days. The studies were performed with a pneumotachograph applied to the upper airway by means of an inflatable face mask or latex nasal prongs. The air flow signal was electronically integrated to time to produce a volume signal. Airway pressure was determined proximal to the pneumotachograph. Esophageal pressure was determined with a water filled catheter placed in the lower third of the esophague. Tidal volume (VT), minute ventilation (V), Dynamic compliance (Cdyn), total pulmonary resistance (R), total pulmonary work (Wt), Elastic work (We), and flow resistive work (Wv), were determined. A significant linear correlation was found between Cdyn and body weight (r = 0.50, p less than 0.01) whereas no significative correlation was found between body weight and VT, V or R. Values for VT, V and Cdyn were corrected for body weight and means (X), standard deviation (SD) so as 10th and 90th percentiles are shown in table III. X, SD and percentiles for R were shown in table III. Wt, We and Wv were corrected for V, and X, SD and percentiles shown in table III. Values of VT/Kg, Cdyn/Kg and R are similar to those found by other authors with pneumotachography and plethysmography. The V/Kg values obtained by us were higher than those reported by other authors, which together with the lack of correlation of VT and V with body weight, question the reliability of V values in our study. This could be explained by: 1) excessive increase in dead space in cases in which a face mask was used; 2) nocioceptive stimulus

  3. Dynamic DNS update security, based on cryptographically generated addresses and ID-based cryptography, in an IPv6 autoconfiguration context

    OpenAIRE

    Combes, Jean-Michel; Arfaoui, Ghada; LAURENT, Maryline

    2012-01-01

    International audience; This paper proposes a new security method for protecting signalling for Domain Name System (DNS) architecture. That is, it makes secure DNS update messages for binding a Fully Qualified Domain Name (FQDN) of an IPv6 node and the IPv6 address of the node owning this FQDN. This method is based on the use of Cryptographically Generated Addresses (CGA) and IDBased Cryptography (IBC). Combination of these two techniques allows DNS server to check the ownership of the IPv6 a...

  4. A New Fuzzy MCDM Framework to Evaluate E-Government Security Strategy

    CERN Document Server

    Syamsuddin, Irfan

    2010-01-01

    Ensuring security of e-government applications and infrastructures is crucial to maintain trust among stakeholders to store, process and exchange information over the e-government systems. Due to dynamic and continuous threats on e-government information security, policy makers need to perform evaluation on existing information security strategy as to deliver trusted e-government services. This paper presents an information security evaluation framework based on new fuzzy multi criteria decision making (MCDM) to help policy makers conduct comprehensive assessment of e-government security strategy.

  5. ASSESSING THE DYNAMIC ERRORS OF COORDINATE MEASURING MACHINES

    Institute of Scientific and Technical Information of China (English)

    1998-01-01

    The main factors affecting the dynamic errors of coordinate measuring machines are analyzed. It is pointed out that there are two main contributors to the dynamic errors: One is the rotation of the elements around the joints connected with air bearings and the other is the bending of the elements caused by the dynamic inertial forces. A method for obtaining the displacement errors at the probe position from dynamic rotational errors is presented. The dynamic rotational errors are measured with inductive position sensors and a laser interferometer. The theoretical and experimental results both show that during the process of fast probing, due to the dynamic inertial forces, there are not only large rotation of the elements around the joints connected with air bearings but also large bending of the weak elements themselves.

  6. The Effect of Dynamic Assessment on Iranian EFL Learners' Reading Comprehension

    Science.gov (United States)

    Amirian, Mohammad Reza; Davoudi, Mohammad; Ramazanian, Mohsen

    2014-01-01

    Dynamic Assessment (DA), is grounded in Vygotsky's idea on Sociocultural Theory (SCT) of mind, his concept of Zone of Proximal Development (ZPD) and its related metaphor; scaffolding. This study examined the effects of dynamic assessment on improving reading comprehension of Iranian intermediate students who were learning English as a foreign…

  7. Dynamic Assessment in the Classroom: Vygotskian Praxis for Second Language Development

    Science.gov (United States)

    Lantolf, James P.; Poehner, Matthew E.

    2011-01-01

    This article reports the efforts of an elementary school teacher of Spanish as a second language to implement principles of dynamic assessment (DA) in her daily interactions with learners. DA is neither an assessment instrument nor a method of assessing but a framework for conceptualizing teaching and assessment as an integrated activity of…

  8. Lahars in Java: Initiations, Dynamics, Hazard Assessment And Deposition Processes

    Directory of Open Access Journals (Sweden)

    Franck Lavigne

    2016-05-01

    Full Text Available Lahar has been applied as a general term for rapidly flowing, high-concentration, poorly sorted sediment-laden mixtures of rock debris and water (other than normal streamflow from a volcano. Lahars are one of the most destructive phenomena associated with composite volcanoes, which are dominant in Java Island. Resulting deposits of lahar are poorly sorted, massive, made up of clasts (chiefly of volcanic composition, that generally include a mud-poor matrix. The aim of this research is threefold: to discuss the initiation of lahars occurrences, their dynamics, to assess the hazard and to analyse the deposition. Lahars are either a direct result of eruptive activity or not temporally related to eruptions. Syn-eruptive lahars may result from the transformation on pyroclastic flows or debris avalanches which transform to aqueous flows (e.g. at Papandayan in November 2002; They may be also generated through lake outburst or breaching (e.g. at Kelut in 1909 or 1966, and through removal of pyroclastic debris by subsequent heavy rainstorms. Post-eruptive lahar occurs during several years after an eruption. At Merapi, lahars are commonly rain-triggered by rainfalls having an average intensity of about 40 mm in 2 hours. Most occur during the rainy season from November to April. Non-eruptive lahars are flows generated without eruptive activity, particularly in the case of a debris avalanche or a lake outburst (e.g., Kelut. A lahar may include one or more discrete flow processes and encompass a variety of rheological flow types and flow transformations. As such, lahars encompass a continuum between debris flows and hyperconcentrated flows, as observed at Merapi, Kelut and Semeru volcanoes. Debris flows, with water contents ranging from 10 to no more than about 25% weight, are non-newtonian fluids that move as fairly coherent masses in what is thought to be predominantly laminar fashion. However, the relative importance of laminar versus turbulent regime is

  9. PREDICTIVE ASSESSMENT OF AN AIRCRAFT STRUCTURE BEHAVIOUR FOR PASSENGER AND CREW SECURITY

    Directory of Open Access Journals (Sweden)

    Daniela BARAN

    2009-12-01

    Full Text Available In the aerospace industry one of the most important requirements in the aircraft design andoperation is the high level of fiability under various atmosphere and environmental conditions. Thedesign and validation of such a system is a great challenge. It must meet several requirements suchas: high resistence, low weight and a small occupied volume. The stresses that occur during theaircraft operation are extremely complex, being the result of the interaction of differentsystems.Consequently, in order to obtain an optimal design of the whole system, the design, testingand operating processes require a combination of laborious analysis and experimental data. As upto 90% of the structure failures are du to the fatigue, high performance methods of fatigue analysisare needed to estimate the aircraft ressources. These methods must enable a precise determinationof the static and dynamic strains inder to correctly estimate the aircraft ressource. The projectproposes an approach of some aspects of the aircraft/ aircraft subassemblies simulation and testingand develop o calculation methodology of experimental data and high performance numericmethods integration in order to establish the ressource.

  10. A systematic review of dynamics in climate risk and vulnerability assessments

    Science.gov (United States)

    Jurgilevich, Alexandra; Räsänen, Aleksi; Groundstroem, Fanny; Juhola, Sirkku

    2017-01-01

    Understanding climate risk is crucial for effective adaptation action, and a number of assessment methodologies have emerged. We argue that the dynamics of the individual components in climate risk and vulnerability assessments has received little attention. In order to highlight this, we systematically reviewed 42 sub-national climate risk and vulnerability assessments. We analysed the assessments using an analytical framework with which we evaluated (1) the conceptual approaches to vulnerability and exposure used, (2) if current or future risks were assessed, and (3) if and how changes over time (i.e. dynamics) were considered. Of the reviewed assessments, over half addressed future risks or vulnerability; and of these future-oriented studies, less than 1/3 considered both vulnerability and exposure dynamics. While the number of studies that include dynamics is growing, and while all studies included socio-economic aspects, often only biophysical dynamics was taken into account. We discuss the challenges of assessing socio-economic and spatial dynamics, particularly the poor availability of data and methods. We suggest that future-oriented studies assessing risk dynamics would benefit from larger stakeholder involvement, discussion of the assessment purpose, the use of multiple methods, inclusion of uncertainty/sensitivity analyses and pathway approaches.

  11. Multivariate error assessment of response time histories method for dynamic systems

    Institute of Scientific and Technical Information of China (English)

    Zhen-fei ZHAN; Jie HU; Yan FU; Ren-Jye YANG; Ying-hong PENG; Jin QI

    2012-01-01

    In this paper,an integrated validation method and process are developed for multivariate dynamic systems.The principal component analysis approach is used to address multivariate correlation and dimensionality reduction,the dynamic time warping and correlation coefficient are used for error assessment,and the subject matter experts (SMEs)' opinions and principal component analysis coefficients are incorporated to provide the overall rating of the dynamic system.The proposed method and process are successfully demonstrated through a vehicle dynamic system problem.

  12. Metro Network Security Assessment: Network—Single Line—Network%地铁网络安全评估:网络—单线—网络

    Institute of Scientific and Technical Information of China (English)

    孙章

    2013-01-01

    On December 27, 2012. 2012 Shanghai Financial Innovation Awards were announced. The Pacific Insurance Group's project "The Third-Party Safety Assessment for Shanghai Rail Transit Network Operations" won the first avard of the current year financial innovation. On the basis of the third-party security assessment for the rail transit network, Shanghai Municipal Transport and Port Authority decided that in future, every 3 years a safety assessment would be carried out for those lines which had been put into operation for 10 years or more, and for those lines which had been put into operation under 10 years, every 5 years a security assessment will be conducted. Such a system is designed so as to establish a long-term effective mechanism of safety management. It is of great significance for the risk control of the urban rail transit network operation. On October 22, 2012. Commissioned by Shanghai Urban Transport and Port Authority, Shanghai Tianlin Security Consulting Co. Ltd. and Tongji University officially launched the operation safety assessment of Shanghai Rail Transit Line 1. Shanghai Rail Transit Line I possesses many characteristics, such as long operating time, construction in phases, large passenger flow voiume, devices with different models, a variety of the platform lines, and etc. According to the characteristics of Line 1, the assessment groups are divided into 7 professional groups of civil engineering, communication signals, power supply, vehicles, electrical and mechanical equipment, operation organization, and security management. By reviewing the self-inspection reports and failure records, the on-sitc survey and research and the idea-exchange, etc., it takes the assessment groups three months to complete "The Safe Operation Assessment General Report of Shanghai Rail Transit Line 1" and 7 profession-classification reports. The assessment groups adopt the international common method for risk identification and risk classification standard, risk points

  13. 操作系统中安全审计项目测评%Assessment of security audit for operating system

    Institute of Scientific and Technical Information of China (English)

    刘环鹏

    2013-01-01

    通过安全审计来关注系统和网络日志文件、目录和文件中不期望的改变、程序执行中的不期望行为、物理形式的入侵信息等,用以检查和防止欺骗行为和虚假数据,是保障计算机系统网络安全和本地安全的重要技术,对审计信息的分析可以为计算机系统的责任认定、脆弱性评估、系统恢复、损失评估提供关键性信息,所以审计覆盖范围必须要覆盖到每个数据库用户和操作系统用户.%The security audit pays attention to the system, weblog, directories and files. The security audit is the best way to check and prevent fraud action and false data which pay attention to the system and network security audit log files, directories and files which are changed without expectations, program execution in the desired behavior, the physical form of the intrusion information. The security audit is an important technology to protect the network security and local computer security. Audit analysis provides critical information for computer responsibility confirmation, vulnerability assessment, system recovery, loss assessment. So the security audit must be covered to every operating system user and database user.

  14. Asthma severity, child security, and child internalizing: using story stem techniques to assess the meaning children give to family and disease-specific events.

    Science.gov (United States)

    Winter, Marcia A; Fiese, Barbara H; Spagnola, Mary; Anbar, Ran D

    2011-12-01

    Children with persistent asthma are at increased risk for mental health problems. Although mechanisms of effect are not yet known, it may be that children are less trusting of the family as a source of support and security when they have more severe asthma. This study tested whether asthma severity is related to children's perceptions of insecurity in the family, and whether insecurity is in turn associated with child adjustment. Children (N = 168; mean age = 8 years) completed story stems pertaining to routine family events (e.g., mealtimes) and ambiguous but potentially threatening asthma events such as tightness in the chest. Responses were evaluated for the extent to which appraisals portrayed the family as responding in cohesive, security-provoking ways. Asthma severity was assessed by both objective lung function testing and primary caregiver report. Caregivers reported child symptomatology. Beyond medication adherence, caregiver education, and child age and gender, greater asthma severity predicted more internalizing and externalizing symptoms. Greater asthma severity, assessed using spirometry (but not parent report), was related to less secure child narratives of the family, which in turn related to more child internalizing symptoms. Results suggest that asthma can take a considerable toll on children's feelings of security and mental health. Furthermore, given the difficulty in assessing young children's perceptions, this study helps demonstrate the potential of story stem techniques in assessing children's appraisals of illness threat and management in the family.

  15. Assessing the Impact of Security Behavior on the Awareness of Open-Source Intelligence: A Quantitative Study of IT Knowledge Workers

    Science.gov (United States)

    Daniels, Daniel B., III

    2014-01-01

    There is a lack of literature linking end-user behavior to the availability of open-source intelligence (OSINT). Most OSINT literature has been focused on the use and assessment of open-source intelligence, not the proliferation of personally or organizationally identifiable information (PII/OII). Additionally, information security studies have…

  16. Assessing the Impact of Security Behavior on the Awareness of Open-Source Intelligence: A Quantitative Study of IT Knowledge Workers

    Science.gov (United States)

    Daniels, Daniel B., III

    2014-01-01

    There is a lack of literature linking end-user behavior to the availability of open-source intelligence (OSINT). Most OSINT literature has been focused on the use and assessment of open-source intelligence, not the proliferation of personally or organizationally identifiable information (PII/OII). Additionally, information security studies have…

  17. A City and National Metric measuring Isolation from the Global Market for Food Security Assessment

    Science.gov (United States)

    Brown, Molly E.; Silver, Kirk Coleman; Rajagopalan, Krishnan

    2013-01-01

    The World Bank has invested in infrastructure in developing countries for decades. This investment aims to reduce the isolation of markets, reducing both seasonality and variability in food availability and food prices. Here we combine city market price data, global distance to port, and country infrastructure data to create a new Isolation Index for countries and cities around the world. Our index quantifies the isolation of a city from the global market. We demonstrate that an index built at the country level can be applied at a sub-national level to quantify city isolation. In doing so, we offer policy makers with an alternative metric to assess food insecurity. We compare our isolation index with other indices and economic data found in the literature.We show that our Index measures economic isolation regardless of economic stability using correlation and analysis

  18. Research on Dynamic Security Appraisal of Saline Water Irrigation%微咸水灌溉动态安全评价理论及方法研究

    Institute of Scientific and Technical Information of China (English)

    李江云; 熊玲; 贺娟; 裴婷

    2012-01-01

    This paper aims at investigating the security of irrigation water,soil,economic crops and eremophytes,together with a number of dynamic factors including irrigation scheduling,irrigation methods,irrigation water management strategies and soil amelioration methods are taken into account at the same time,then index system and method of security appraisal by using saline water are studied.Based on the dynamic security index system,judgment method and grade standards security appraisal software model named SASI are compiled.SASI software is used to appraise the security of using mildly saline groundwater for agricultural irrigation in the southern part of Junggar Basin.The result shows that as the continuous irrigation with mildly saline groundwater for years,soil and crop in the cotton field are gradually polluted to a certain degree.And finally,measures and suggestions for improving the security situation of mildly saline groundwater irrigation are put forward.%针对灌溉水质、土壤安全、经济作物及荒漠植物安全等各项目标,结合灌溉制度、灌水方法、灌溉方式及土壤改良措施等动态因子,就微咸水资源化利用的安全性评价及其指标体系的建立进行了研究,确定了动态安全评价指标体系、评价方法及评价等级并编制了用于微咸水灌溉动态安全性评价的SASI软件。利用该软件对准噶尔盆地南缘莫索湾灌区微咸水农业灌溉的安全性进行了评价。评价结果表明该研究区域内,随着微咸水灌溉年份的增加,棉田土壤及作物虽然仍保持在未受污染的范围内,但污染指数逐渐增大,由此提出改善微咸水灌溉安全状况的措施及建议。

  19. Trivariate Modeling of Interparental Conflict and Adolescent Emotional Security: An Examination of Mother-Father-Child Dynamics.

    Science.gov (United States)

    Cheung, Rebecca Y M; Cummings, E Mark; Zhang, Zhiyong; Davies, Patrick T

    2016-11-01

    Recognizing the significance of interacting family subsystems, the present study addresses how interparental conflict is linked to adolescent emotional security as a function of parental gender. A total of 272 families with a child at 12.60 years of age (133 boys, 139 girls) were invited to participate each year for three consecutive years. A multi-informant method was used, along with trivariate models to test the associations among mothers, fathers, and their adolescent children's behaviors. The findings from separate models of destructive and constructive interparental conflict revealed intricate linkages among family members. In the model of destructive interparental conflict, mothers and fathers predicted each other's conflict behaviors over time. Moreover, adolescents' exposure to negativity expressed by either parent dampened their emotional security. Consistent with child effects models, adolescent emotional insecurity predicted fathers' destructive conflict behaviors. As for the model of constructive interparental conflict, fathers predicted mothers' conflict behaviors over time. Adolescents' exposure to fathers' constructive conflict behaviors also enhanced their sense of emotional security. Consistent with child effects models, adolescent emotional security predicted mothers' and fathers' constructive conflict behaviors. These findings extended the family and the adolescent literature by indicating that family processes are multiidirectional, involving multiple dyads in the study of parents' and adolescents' functioning. Contributions of these findings to the understanding of interparental conflict and emotional security in adolescence are discussed.

  20. Security Risk Assessment of Cloud Computing Services in a Networked Environment

    Directory of Open Access Journals (Sweden)

    Eli WEINTRAUB

    2016-11-01

    Full Text Available Different cloud computing service providers offer their customers' services with different risk levels. The customers wish to minimize their risks for a given expenditure or investment. This paper concentrates on consumers' point of view. Cloud computing services are composed of services organized according to a hierarchy of software application services, beneath them platform services which also use infrastructure services. Providers currently offer software services as bundles which include the software, platform and infrastructure services. Providers also offer platform services bundled with infrastructure services. Bundling services prevent customers from splitting their service purchases between a provider of software and a different provider of the underlying platform or infrastructure. In this paper the underlying assumption is the existence of a free competitive market, in which consumers are free to switch their services among providers. The proposed model is aimed at the potential customer who wishes to compare the risks of cloud service bundles offered by providers. The article identifies the major components of risk in each level of cloud computing services. A computational scheme is offered to assess the overall risk on a common scale.

  1. 一种安全的动态源路由协议%A Secure Dynamic Source Routing

    Institute of Scientific and Technical Information of China (English)

    李嘉为; 郭达伟; 张国庆; 陈骁

    2011-01-01

    研究了移动 Ad hoc 网络(MANET)按需路由协议的安全问题,针对 DSR 路由协议分析了现有安全改进方案的优缺点.为了防止恶意攻击,降低网络开销,以一种基于椭圆曲线密码体制的高效数字签名算法为基础,结合后向验证策略,提出了一种适用于 DSR 协议的安全解决方案(Sec-DSR).对协议的安全性进行了论证,并在 QualNet 仿真环境下进行实验验证.仿真过程实现了安全算法,同时使用 blackhole 和 rushing 两种常见攻击模型测试协议抗攻击能力,结果表明 Sec-DSR 协议模型能够以较小的协议开销确保较高的安全性能.%On-demand routing protocol is very popular in multi-hop mobile ad hoc network (MANET) for its low overhead, but vulnerable to malicious attacks for lack of secure mechanism. The advantages and drawbacks of the current secure enhancement method based on the DSR are analyzed. A new secure enhancement method based on an efficient Elliptical Curve Cryptosystem (ECC) digital signature using backward authentication is proposed for DSR protocol Sec-DSR,which has be proved secure and efficient theoretically. By using the blackhole and rushing attack model, Sec-DSR is simulated on the QualNet simulation tools. The results show that the proposed secure protocol can obtain stronger security without sacrificing large overhead.

  2. Assessing planetary and regional nitrogen boundaries related to food security and adverse environmental impacts

    Science.gov (United States)

    de Vries, Wim; Kros, Hans; Kroeze, Carolien; Seitzinger, Sybil

    2014-05-01

    In this presentation, we first discuss the concept of -, governance interest in- and criticism on planetary boundaries, specifically with respect to the nitrogen (N) cycle. We then systematically evaluate the criticism and argue that planetary N boundaries need to include both the benefits and adverse impacts of reactive N (Nr) and the spatial variability of Nr impacts, in terms of shortage and surplus, being main arguments for not deriving such boundaries. Next, we present an holistic approach for an updated planetary N boundary by considering the need to: (i) avoid adverse impacts of elevated Nr emissions to water, air and soils, and (ii) feed the world population in an adequate way. The derivation of a planetary N boundary, in terms of anthropogenic fixation of di-nitrogen (N2) by growing legumes and production of N fertilizer, is illustrated by (i) identification of multiple threat N indicators and setting critical limits for them, (ii) back calculating critical N losses from critical limits for N indicators, while accounting for the spatial variability of indicators and their exceedance and (iii) back calculating critical N fixation rates from critical N losses. The derivation of the needed planetary N fixation is assessed from the global population, the recommended dietary N consumption per capita and the N use efficiency in the complete chain from N fixation to N consumption. Results of example applications show that the previously suggested planetary N boundary of 25% of the current value is too low in view of needed N fixation and also unnecessary in view of most environmental impacts. We also illustrate the impacts of changes in the N use efficiency on planetary boundaries in terms of critical N fixation rates.

  3. The E-net model for the Risk Analysis and Assessment System for the Information Security of Communication and Information Systems ("Defining" Subsystem)

    CERN Document Server

    Stoianov, Nikolai

    2010-01-01

    This paper presents one suggestion that comprises the authors' experience in development and implementation of systems for information security in the Automated Information Systems of the Bulgarian Armed Forces. The architecture of risk analysis and assessment system for the communication and information system's information security (CIS IS) has been presented. E-net model of "Defining" Subsystem as a tool that allows to examine the subsystems is proposed as well. Such approach can be applied successfully for communication and information systems in the business field.

  4. Secure transmission of static and dynamic images via chaotic encryption in acousto-optic hybrid feedback with profiled light beams

    Science.gov (United States)

    Chatterjee, Monish R.; Almehmadi, Fares S.

    2015-01-01

    Secure information encryption via acousto-optic (AO) chaos with profiled optical beams indicates substantially better performance in terms of system robustness. This paper examines encryption of static and time-varying (video) images onto AO chaotic carriers using Gaussian-profile beams with diffracted data numerically generated using transfer functions. The use of profiled beams leads to considerable improvement in the encrypted signal. While static image encryption exhibits parameter tolerances within about +/-10% for uniform optical beams, profiled beams reduce the tolerance to less than 1%, thereby vastly improving both the overall security of the transmitted information as well as the quality of the image retrieval.

  5. Structure and Dynamics of Dinucleosomes Assessed by Atomic Force Microscopy

    Directory of Open Access Journals (Sweden)

    Nina A. Filenko

    2012-01-01

    Full Text Available Dynamics of nucleosomes and their interactions are important for understanding the mechanism of chromatin assembly. Internucleosomal interaction is required for the formation of higher-order chromatin structures. Although H1 histone is critically involved in the process of chromatin assembly, direct internucleosomal interactions contribute to this process as well. To characterize the interactions of nucleosomes within the nucleosome array, we designed a dinucleosome and performed direct AFM imaging. The analysis of the AFM data showed dinucleosomes are very dynamic systems, enabling the nucleosomes to move in a broad range along the DNA template. Di-nucleosomes in close proximity were observed, but their population was low. The use of the zwitterionic detergent, CHAPS, increased the dynamic range of the di-nucleosome, facilitating the formation of tight di-nucleosomes. The role of CHAPS and similar natural products in chromatin structure and dynamics is also discussed.

  6. Assessment of pelvic floor dysfunctions using dynamic magnetic resonance imaging

    Directory of Open Access Journals (Sweden)

    Hoda Salah Darwish

    2014-03-01

    Conclusion: Dynamic MRI is an ideal, non invasive technique which does not require patient preparation for evaluation of pelvic floor. It acts as one stop shop for diagnosing single or multiple pelvic compartment involvement in patients with pelvic floor dysfunction.

  7. Rethinking the neurological examination II: dynamic balance assessment

    Directory of Open Access Journals (Sweden)

    Péricles A. Maranhão-Filho

    2011-12-01

    Full Text Available The authors propose that the neurological exam needs reevaluation with respect to the dynamic balance test (walking. Validated tests such as: preferred and maximum gait speed, dynamic gait index, five-times-sit-to-stand test, timed up & go cognitive and manual, should be part of the neurological examination routine. In the neurological exam of older patients, these same bedside tests bring the plus of evaluation the risk of occasional falling.

  8. SecurID

    CERN Document Server

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  9. The Human Threat to River Ecosystems at the Watershed Scale: An Ecological Security Assessment of the Songhua River Basin, Northeast China

    Directory of Open Access Journals (Sweden)

    Yuan Shen

    2017-03-01

    Full Text Available Human disturbances impact river basins by reducing the quality of, and services provided by, aquatic ecosystems. Conducting quantitative assessments of ecological security at the watershed scale is important for enhancing the water quality of river basins and promoting environmental management. In this study, China’s Songhua River Basin was divided into 204 assessment units by combining watershed and administrative boundaries. Ten human threat factors were identified based on their significant influence on the river ecosystem. A modified ecological threat index was used to synthetically evaluate the ecological security, where frequency was weighted by flow length from the grids to the main rivers, while severity was weighted by the potential hazard of the factors on variables of river ecosystem integrity. The results showed that individual factors related to urbanization, agricultural development and facility construction presented different spatial distribution characteristics. At the center of the plain area, the provincial capital cities posed the highest level of threat, as did the municipal districts of prefecture-level cities. The spatial relationships between hot spot locations of the ecological threat index and water quality, as well as the distribution areas of critically endangered species, were analyzed. The sensitivity analysis illustrated that alteration of agricultural development largely changed the ecological security level of the basin. By offering a reference for assessing ecological security, this study can enhance water environmental planning and management.

  10. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...... will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general....

  11. Surviving security how to integrate people, process, and technology

    CERN Document Server

    Andress, Amanda

    2003-01-01

    WHY DO I NEED SECURITY? Introduction The Importance of an Effective Security Infrastructure People, Process, and Technology What Are You Protecting Against? Types of Attacks Types of Attackers Security as a Competitive Advantage Choosing a Solution Finding Security Employees The Layered Approach UNDERSTANDING REQUIREMENTS AND RISK What Is Risk? Embracing Risk Information Security Risk Assessment Assessing Risk Insurance SECURITY POLICIES AND PROCEDURES Internal Focus Is Key Security Awareness and Education Policy Life Cycle Developing Policies Components of a Security Policy Sample Security Po

  12. Automated security management

    CERN Document Server

    Al-Shaer, Ehab; Xie, Geoffrey

    2013-01-01

    In this contributed volume, leading international researchers explore configuration modeling and checking, vulnerability and risk assessment, configuration analysis, and diagnostics and discovery. The authors equip readers to understand automated security management systems and techniques that increase overall network assurability and usability. These constantly changing networks defend against cyber attacks by integrating hundreds of security devices such as firewalls, IPSec gateways, IDS/IPS, authentication servers, authorization/RBAC servers, and crypto systems. Automated Security Managemen

  13. Predicting First Graders' Development of Calculation versus Word-Problem Performance: The Role of Dynamic Assessment

    Science.gov (United States)

    Seethaler, Pamela M.; Fuchs, Lynn S.; Fuchs, Douglas; Compton, Donald L.

    2012-01-01

    The purpose of this study was to assess the value of dynamic assessment (DA; degree of scaffolding required to learn unfamiliar mathematics content) for predicting 1st-grade calculations (CAs) and word problems (WPs) development, while controlling for the role of traditional assessments. Among 184 1st graders, predictors (DA, Quantity…

  14. Dynamic Assessment of Incidental Vocabularies: A Case of Iranian ESP Learners

    Science.gov (United States)

    Hanifi, Sepideh; Nasiri, Mahdi; Aliasin, Hesamuddin

    2016-01-01

    Dynamic assessment (DA), stemmed from both Vygotsky's (1978) learning theory and Feuerstein's (1979) theory of mediated learning experiences, is an alternative to static assessment. It focuses on both instruction and assessment aiming at promoting learning through mediation. DA has been widely researched in different linguistic areas, but there is…

  15. Probabilistic assessment of dynamic system performance. Part 3

    Energy Technology Data Exchange (ETDEWEB)

    Belhadj, M.

    1993-12-31

    Accurate prediction of dynamic system failure behavior can be important for the reliability and risk analyses of nuclear power plants, as well as for their backfitting to satisfy given constraints on overall system reliability, or optimization of system performance. Global analysis of dynamic systems through investigating the variations in the structure of the attractors of the system and the domains of attraction of these attractors as a function of the system parameters is also important for nuclear technology in order to understand the fault-tolerance as well as the safety margins of the system under consideration and to insure a safe operation of nuclear reactors. Such a global analysis would be particularly relevant to future reactors with inherent or passive safety features that are expected to rely on natural phenomena rather than active components to achieve and maintain safe shutdown. Conventionally, failure and global analysis of dynamic systems necessitate the utilization of different methodologies which have computational limitations on the system size that can be handled. Using a Chapman-Kolmogorov interpretation of system dynamics, a theoretical basis is developed that unifies these methodologies as special cases and which can be used for a comprehensive safety and reliability analysis of dynamic systems.

  16. Model-based Impact Assessment of an Integrated Water Management Strategy on Ecosystem Services relevant to Food Security in Namibia

    Science.gov (United States)

    Luetkemeier, R.; Liehr, S.

    2012-04-01

    North-central Namibia is characterized by seasonal alterations of drought and heavy rainfall, mostly saline groundwater resources and a lack of perennial rivers. Water scarcity poses a great challenge for freshwater supply, harvest and food security against the background of high population growth and climate change. CuveWaters project aims at poverty reduction and livelihood improvement on a long term basis by introducing a multi-resource-mix as part of an integrated water resources management (IWRM) approach. Herein, creating water buffers by rainwater harvesting (RWH) and subsurface water storage as well as reuse of treated wastewater facilitates micro-scale gardening activities. This link constitutes a major component of a sustainable adaptation strategy by contributing to the conservation and improvement of basic food and freshwater resources in order to reduce drought vulnerability. This paper presents main findings of an impact assessment carried out on the effect of integrated water resources management on ecosystem services (ESS) relevant to food security within the framework of CuveWaters project. North-central Namibia is perceived as a social-ecological system characterized by a strong mutual dependence between natural environment and anthropogenic system. This fundamental reliance on natural resources highlights the key role of ESS in semi-arid environments to sustain human livelihoods. Among other services, food provision was chosen for quantification as one of the most fundamental ESS in north-central Namibia. Different nutritional values were utilized as indicators to adopt a demand-supply approach (Ecosystem Service Profile) to illustrate the ability of the ecosystem to meet people's nutritional requirements. Calculations have been conducted using both Bayesian networks to incorporate uncertainty introduced by the variability of monthly precipitation and the application of plant specific water production functions. Results show that improving the

  17. 区域旅游生态安全的动态仿真模拟%Dynamic Simulation of Regional Ecological Security of Tourism

    Institute of Scientific and Technical Information of China (English)

    武春友; 郭玲玲; 于惊涛

    2013-01-01

    生态系统的安全是区域旅游业可持续发展的前提与基础.旅游业发展所引起的环境问题威胁着生态系统的安全,而不安全的生态系统也会影响旅游业的可持续发展.运用系统动力学理论与方法,分析区域旅游生态安全系统中各要素的因果反馈关系,构建区域旅游生态安全系统的系统动力学模型,并以辽宁省旅游生态安全系统为例进行系统仿真,通过对模型中主要参数的调控,提出辽宁省旅游业发展的不同模式.最后通过分析,得出环境保护、旅游投资、政策法规与旅游工作人员素质是影响辽宁省旅游生态系统安全状态的主要因素.%Ecological security is the basis for sustainable development of regional tourism. Environmental problems caused by tourism development have threatened the security of ecosystem, while unsafe ecosystem will affect sustainable development of tourism as well. A system dynamics model, which can describe the causal feedback relationships of regional tourist ecological security system, was built by using system dynamics. On basis of system dynamics modeling and simulation, the different modes of tourism development are put forward through regulation and control of several key indexes. Results show that environmental protection, tourism investment, policies, regulations and tourism staff quality are the main influencing factors of ecological security of tourism in Liaoning Province.

  18. Assessment of ecological security based on soil and water conservation: a case study from Gansu Province, China

    Science.gov (United States)

    Li, Z. J.; Tian, Q.; Song, L. L.

    2016-08-01

    In this study, the analytic hierarchy process (ahp), ecological security index(S) and PSR model were used to evaluate Gansu's ecological security based on the large number of survey data. The results indicated that Gansu's ecological security index increased from 0.31 in 1986 to 0.66 in 2013, which reflected ecological security was in sensitive state (0.7༞S≥⃒0.5). The main reason was that national policy on protecting the ecological environment has played a crucial role, especially the national project of returning farmland to forest and grass carried out in recent years. Moreover, the environmental issues such as the higher PM2.5, sand storms and climate extremes, had significantly improved people's environmental awareness in the study area. The regional difference of ecological security index was significant in Gansu Provinces, and the part of Yangtze river basin was higher than the part of Yellow River basin, whiles the in-land river basin was the lowest value. In a world, Gansu's ecological security had improved in recent years, but there was strong need for paying more attention to policy for ecological environment protection and increasing the propaganda to ensure the Gansu's ecological security in the future. This study will provide a scientific basis for the sustainable development of regional social economy and ecological environment.

  19. Assessment of the potential enhancement of rural food security in Mexico using decision tree land use classification on medium resolution satellite imagery

    Science.gov (United States)

    Bermeo, A.; Couturier, S.

    2017-01-01

    Because of its renewed importance in international agendas, food security in sub-tropical countries has been the object of studies at different scales, although the spatial components of food security are still largely undocumented. Among other aspects, food security can be assessed using a food selfsufficiency index. We propose a spatial representation of this assessment in the densely populated rural area of the Huasteca Poblana, Mexico, where there is a known tendency towards the loss of selfsufficiency of basic grains. The main agricultural systems in this area are the traditional milpa (a multicrop practice with maize as the main basic crop) system, coffee plantations and grazing land for bovine livestock. We estimate a potential additional milpa - based maize production by smallholders identifying the presence of extensive coffee and pasture systems in the production data of the agricultural census. The surface of extensive coffee plantations and pasture land were estimated using the detailed coffee agricultural census data, and a decision tree combining unsupervised and supervised spectral classification techniques of medium scale (Landsat) satellite imagery. We find that 30% of the territory would benefit more than 50% increment in food security and 13% could theoretically become maize self-sufficient from the conversion of extensive systems to the traditional multicrop milpa system.

  20. Dynamic Behaviour CO2 Capture and Compression: An Assessment

    NARCIS (Netherlands)

    Nienoord, M.; Ogink, M.; Khakharia, P.; Goetheer, E.L.V.; De Kler, R.

    2014-01-01

    A clear understanding of the dynamic behavior of the whole chain of conventional power generation to CO2 storage is necessary. The rapidly increasing share of renewable energy makes the energy delivered to the grid more fluctuating leading to an impact on the CCS chain as well. A 250 MW scale carbon

  1. Dynamic behaviour CO2 capture and compression: an assessment

    NARCIS (Netherlands)

    Nienoord, M.; Ogink, M.H.L.; Khakharia, P.M.; Goetheer, E.L.V.; Kler, R.F.C. de

    2014-01-01

    A clear understanding of the dynamic behavior of the whole chain of conventional power generation to CO2 storage is necessary. The rapidly increasing share of renewable energy makes the energy delivered to the grid more fluctuating leading to an impact on the CCS chain as well. A 250 MW scale carbon

  2. Dynamic behaviour CO2 capture and compression: an assessment

    NARCIS (Netherlands)

    Nienoord, M.; Ogink, M.H.L.; Khakharia, P.M.; Goetheer, E.L.V.; Kler, R.F.C. de

    2014-01-01

    A clear understanding of the dynamic behavior of the whole chain of conventional power generation to CO2 storage is necessary. The rapidly increasing share of renewable energy makes the energy delivered to the grid more fluctuating leading to an impact on the CCS chain as well. A 250 MW scale carbon

  3. Dynamic Behaviour CO2 Capture and Compression: An Assessment

    NARCIS (Netherlands)

    Nienoord, M.; Ogink, M.; Khakharia, P.; Goetheer, E.L.V.; De Kler, R.

    2014-01-01

    A clear understanding of the dynamic behavior of the whole chain of conventional power generation to CO2 storage is necessary. The rapidly increasing share of renewable energy makes the energy delivered to the grid more fluctuating leading to an impact on the CCS chain as well. A 250 MW scale carbon

  4. Distress dynamics : An efficiency assessment of Dutch bankruptcy law

    NARCIS (Netherlands)

    Hummelen, Jochem

    2015-01-01

    Both in the Netherlands and the United States of America a change in the dynamics of bankruptcy procedures is taking place. In the Netherlands, the opening of a bankruptcy procedure (faillissement) traditionally leads to the sale of the assets of the debtor and a distribution of the proceeds among

  5. An Assessment of Productive Computational Fluid Dynamics for Aerodynamic Design

    Science.gov (United States)

    2008-01-01

    PANAIR [7]) to marching techniques (like ZEUS [8] and parabolized Navier-S tokes codes) and full-field, elliptical, Computational Fluid Dynamics (CFD...undeflected case), but individual representations were required to create each deflection angle for the bent nose configuration. Figure 1. Three

  6. Using Simulation to Assess the Opportunities of Dynamic Waste Collection

    NARCIS (Netherlands)

    Mes, Martijn R.K.

    In this paper, we illustrate the use of discrete event simulation to evaluate how dynamic planning methodologies can be best applied for the collection of waste from underground containers. We present a case study that took place at the waste collection company Twente Milieu, located in The

  7. Using simulation to assess the opportunities of dynamic waste collection

    NARCIS (Netherlands)

    Mes, Martijn R.K.; Bangsow, S.

    2012-01-01

    In this chapter, we illustrate the use of discrete event simulation to evaluate how dynamic planning methodologies can be best applied for the collection of waste from underground containers. We present a case study that took place at the waste collection company Twente Milieu, located in The

  8. Making instruction and assessment responsive to diverse students' progress: group-administered dynamic assessment in teaching mathematics.

    Science.gov (United States)

    Jeltova, Ida; Birney, Damian; Fredine, Nancy; Jarvin, Linda; Sternberg, Robert J; Grigorenko, Elena L

    2011-01-01

    This study entailed a 3 (instructional intervention) × 2 (assessment-type) between-subjects experimental design employing a pretest-intervention-posttest methodology. The instructional interventions were administered between subjects in three conditions: (a) dynamic instruction, (b) triarchic or theory of successful intelligence-control instruction, and (c) standard-control instruction. The assessment-type consisted between subjects of either (a) a group-administered dynamic posttest or (b) the same group-administered posttest interspersed with a control filler activity. Performance in different mathematics content areas taught in fourth grade was investigated. In total, 1,332 students and 63 classroom teachers in 24 schools across six school districts participated in the study. The results indicate the advantages of using dynamic instruction and assessment in regular classrooms while teaching mathematics, especially when the student body is highly ethnically diverse.

  9. Energy systems security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  10. Application of eco-exergy for assessment of ecosystem health and development of structurally dynamic models

    DEFF Research Database (Denmark)

    Zhang, J.; Gürkan, Zeren; Jørgensen, S.E.

    2010-01-01

    Eco-exergy has been widely used in the assessment of ecosystem health, parameter estimations, calibrations, validations and prognoses. It offers insights into the understanding of ecosystem dynamics and disturbance-cl riven changes. Particularly, structurally dynamic models (SDMs), which are deve...... of structurally dynamic models (SDMs). The limitations and possible future applications of the approach are also addressed. (C) 2009 Elsevier B.V. All rights reserved....

  11. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  12. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  13. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  14. Systems dynamics modelling to assess the sustainability of renewable energy technologies in developing countries

    CSIR Research Space (South Africa)

    Brent, AC

    2011-04-01

    Full Text Available supply, and the related cost implications, for water supply; concentrated solar thermal technology options are currently considered. In this paper a systems dynamics approach is used to assess the sustainability of these types of renewable energy...

  15. A screening model for assessing water quality in small, dynamic estuaries

    CSIR Research Space (South Africa)

    Taljaard, Susan

    2017-09-01

    Full Text Available , a design science approach is adopted to develop a screening (box) model for the water quality assessment of South African estuaries. The key design principles are first distilled from literature on the nutrient dynamics and hydro...

  16. A Comparison Between a Dynamic and Static Approach to Asset Management Using CAPM Models on the Australian Securities Market

    Directory of Open Access Journals (Sweden)

    Dionigi Gerace

    2015-06-01

    Full Text Available Despite the capital asset pricing model being one of the most influential mod¬els in modern portfolio theory, it has also been a victim of criticism in numerous academic papers. Its assumptions which seem to be rather unre¬alistic, have caused many academics to improve the model by relaxing some of its restrictive statements. In this journal article, we compare the performance of an optimal portfolio of securities in the Australian securities market by constructing two theoretical portfolios; one using the capital asset pricing model which uses a single beta throughout a static investment horizon; and another, which allows the op¬timal portfolio to be rebalanced each week with an adjusted beta. The performance of the two theoretical portfolios is compared to determine the superior model. Overall, findings showed that due to rebalancing of the portfolio, the multiple period model was the superior model based on before and after transaction cost returns.

  17. Analysis of information security risk assessment in E-government%浅析电子政务中的信息安全风险评估

    Institute of Scientific and Technical Information of China (English)

    刘飞飞

    2016-01-01

    针对电子政务系统中的安全风险评估问题,介绍了电子政务系统的现状以及信息安全风险评估的相关概念;分析了电子政务系统中常用的风险评估方法OCTAVE法、SSE-CMM法和自适应法的特点;探讨了未来需要解决的问题,以期对电子政务风险评估提供参考。%In view of the security risk assessment in E-government system, the current situation of E-government system and the related concepts of information security risk assessment are introduced; The characteristics of risk assessment methods are analyzed, including OCTAVE method, SSE-CMM method and adaptive method being commonly used in E-government system; And the problems that need to be solved are discussed in order to provide reference for the security risk assessment of E-government.

  18. LTE security

    CERN Document Server

    Forsberg, Dan; Moeller, Wolf-Dietrich

    2010-01-01

    Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms em

  19. The dynamics of dissolved oxygen concentration for water quality monitoring and assessment in polder ditches

    NARCIS (Netherlands)

    Veeningen, R.

    1983-01-01

    This study deals with the use of the dynamics of dissolved oxygen concentration for water quality assessment in polder ditches. The dynamics of the dissolved oxygen concentration, i.e. the temporal and spatial variations in a few polder ditches under a range of natural, pollution and management

  20. Role of ANN in Secured Wireless Multicast Routing during Dynamic Channel Allocation for User Demanded Packet Optimality

    Directory of Open Access Journals (Sweden)

    Dr. B.S. Pradeep

    2011-09-01

    Full Text Available The application of Artificial Neural Network (ANNís to mobile Ad Hock Network for multicasting where the problem is to find an efficient route to transmit packets over many nodes in the network. For multicasting in MANETS which address the security and Quality of service (Q.O.S. issues on the utility database makes this area highly suitable for ANN implementation. ANN is able to learn the relationship among past, current, and future route discoveries of the different nodes in the mobility range. A wide variety of different ANN has been used for route discoveries in the few years resulting in a noticeable number of publications on the subject. This paper proposes effective and novel application of Artificial Neural Network to Secure Multicasting in MANETís with Supporting Nodes has gained a lot of attention for secure routing using an ANN model. The methodology considers selection of input Variables for the ANN, determination of the optimum number of neurons for the hidden Layer selection of Multicasting with supporting nodes routing function. The proposed ANN model uses the feed forward network using back propagation algorithms.