WorldWideScience

Sample records for enhancing regional security

  1. Enhancing water security in a rapidly developing shale gas region

    Directory of Open Access Journals (Sweden)

    Shannon Holding

    2017-06-01

    New hydrological insights for the region: Initiatives and tools enhancing water security in the region include strategic partnerships and stakeholder collaborations, policy and regulation development, and data collection and distribution efforts. The contributions and limitations of each of these are discussed. A vulnerability mapping framework is presented which addresses data gaps and provides a tool for decision-making surrounding risk to water quality from various hazards. An example vulnerability assessment was conducted for wastewater transport along pipeline and trucking corridors.

  2. ENTNEA: A concept for enhancing regional atomic energy cooperation for securing nuclear transparency in northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Shin, S. T. [Korea Institute for Defence Analyses, Seoul (Korea)

    2000-11-01

    Nuclear energy continues to be a strong and growing component of economic development in Northeast Asia. A broad range of nuclear energy systems already exists across the region and vigorous growth is projected. Associated with these capabilities and plans are various concerns about operational safety, environmental protection, and accumulation of spent fuel and other nuclear materials. We consider cooperative measures that might address these concerns. The confidence building measures suggested here center on the sharing of information to lessen concerns about nuclear activities or to solve technical problems. These activities are encompassed by an Enhanced Nuclear Transparency in Northeast Asia (ENTNEA) concept that would be composed of near-term, information-sharing activities and an eventual regional institution. The near-term activities would address specific concerns and build a tradition of cooperation; examples include radiation measurements for public safety and emergency response, demonstration of safe operations at facilities and in transportation, and material security in the back end of the fuel cycle. Linkages to existing efforts and organizations would be sought to maximize the benefits of cooperation. In the longer term, the new cooperative tradition might evolve into an ENTNEA institution. In institutional form, ENTNEA could combine the near-term activities and new cooperative activities, which might require an institutional basis, for the mutual benefit and security of regional parties. 28 refs., 23 figs., 5 tabs. (Author)

  3. Enhancing mobile learning security

    OpenAIRE

    Shonola, Shaibu Adekunle; Joy, Mike

    2016-01-01

    Mobile devices have been playing vital roles in modern day education delivery as students can access or download learning materials on their smartphones and tablets, they can also install educational apps and study anytime, anywhere. The need to provide adequate security for portable devices being used for learning cannot be underestimated. In this paper, we present a mobile security enhancement app, designed and developed for Android smart mobile devices in order to promote security awarenes...

  4. Analyzing Security-Enhanced Linux Policy Specifications

    National Research Council Canada - National Science Library

    Archer, Myla

    2003-01-01

    NSA's Security-Enhanced (SE) Linux enhances Linux by providing a specification language for security policies and a Flask-like architecture with a security server for enforcing policies defined in the language...

  5. Wide Area Security Region Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin; Gronquist, James; Du, Pengwei; Nguyen, Tony B.; Burns, J. W.

    2010-03-31

    This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of system parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed

  6. Options for Enhancing Nordic–Baltic Defence and Security Cooperation

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.; Kristensen, Kristian Søby; Schaub Jr, Gary John

    is challenged to respond, particularly in the areas of defence and security. This report begins with the regional demand for enhanced defence and security cooperation. This was the background for a workshop that was held at the Centre for Military Studies in March 2017 consisting of 25 regional experts, all...

  7. Threats to economic security of the region

    Directory of Open Access Journals (Sweden)

    Y. A. Salikov

    2017-01-01

    Full Text Available Various aspects of economic security are in sight of the researchers for more than two decades. Today in the economic literature widely presents the conceptual aspects of economic safety of the state. Theoretical and methodological foundations of the study of this multifaceted problem lies in the researches of many domestic and foreign scientists, which are the basic levels of economic security. Among the priority levels include, in our view, the regional level (meso-level and actual problems of economic security studied to date lack detail. Economic development regions of the country has its own specifics, which is projected to the achieving of regional and national economic security. The article summarizes the approaches to definition of essence of the category “economic security of the region” and was given its author’s interpretation, considers the reasons of appearance and development of crisis situations causing threats to the economic security of the region. Given that the prevention of threats and reduction of their consequences is the basis of regional economic security, the article identifies the main threats to economic security, as well as the peculiarities of their manifestations (for example, the most significant threats to economic security of the Voronezh region, as well as the proposed activities in support of regional economic security and stated objectives of regional economic policy, the solution of which is aimed at ensuring the economic security of the region. In addition, it is proved that the actual problems of economic security must be constantly in sight of the regional leadership and find its solution in government documents and policy programmes promising socio-economic development of the region.

  8. Enhancing Parliamentary Oversight for Effective Security Sector ...

    African Journals Online (AJOL)

    2015-06-09

    Jun 9, 2015 ... security forces continued to serve the interests of the ruling elites rather than the security requirement of the people (Bendix .... Benjamin Adeniran Aluko. Enhancing Parliamentary Oversight for Effective Security Sector Reform in Democratic Nigeria. 4. Accountability;. 5. Public trust;. 6. Local ownership;. 7.

  9. Security Inequalities in North America: Reassessing Regional Security Complex Theory

    Directory of Open Access Journals (Sweden)

    Richard Kilroy

    2017-12-01

    Full Text Available This article re-evaluates earlier work done by the authors on Regional Security Complex Theory (RSCT in North America, using sectoral analysis initially developed by Buzan and Waever, but also adding the variables of institutions, identity, and interests. These variables are assessed qualitatively in the contemporary context on how they currently impress upon the process of securitization within sectoral relations between Canada, Mexico, and the United States. The article reviews the movement from bilateral security relations between these states to the development of a trilateral response to regional security challenges post- 9/11. It further addresses the present period and what appears to be a security process derailed by recent political changes and security inequalities, heightened by the election of Donald Trump in 2016. The article argues that while these three states initially evinced a convergence of regional security interests after 9/11, which did create new institutional responses, under the current conditions, divergence in political interests and security inequalities have reduced the explanatory power of RSCT in North America. Relations between states in North American are becoming less characterized by the role of institutions and interests and more by identity politics in the region.

  10. Cooperative monitoring of regional security agreements

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L. [Sandia National Labs., Albuquerque, NM (United States). Nonproliferation and Arms Control Analysis Dept.

    1996-11-01

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations. Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  11. Strategy to Enhance International Supply Chain Security

    National Research Council Canada - National Science Library

    2007-01-01

    .... at 1901, 1903, October 13, 2006) which require the development of a strategic plan to enhance the security of the international supply chain, including protocols for the expeditious resumption of the flow of trade following...

  12. Study on Enhancing nuclear security cooperation in Northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jounghoon; Heo, Chul [Korea Institute of Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening.

  13. Cooperative monitoring of regional security agreements

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L.

    1995-08-01

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities: (1) the demilitarization of the Sinai region between Israel and Egypt in the 1970s; (2) the 1991 quadripartite agreement for monitoring nuclear facilities among Brazil, Argentina, The Argentine-Brazilian Agency for Accounting and Control of Nuclear Materials and the International Atomic Energy Agency; and (3) a bilateral Open Skies agreement between Hungary and Romania in 1991. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations.Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  14. An Enhanced Vigenere Cipher For Data Security

    Directory of Open Access Journals (Sweden)

    Aized Amin Soofi

    2015-08-01

    Full Text Available In todays world the amount of data that is exchanged has increased in the last few years so securing the information has become a crucial task. Cryptography is an art of converting plain text message into unreadable message. Encryption algorithms play an important role in information security systems. Encryption is considered as one of the most powerful tool for secure transmission of data over the communication network. Vigenere technique is an example of polyalphabetic stream cipher it has various limitations such as Kasiski and Friedman attack to find the length of encryption key. In this paper an enhanced version of traditional vigenere cipher has been proposed that eliminates the chances of Kaisiski and Friedman attack. Proposed technique also provides better security against cryptanalysis and pattern prediction.

  15. Modeling Security-Enhanced Linux Policy Specifications for Analysis (Preprint)

    National Research Council Canada - National Science Library

    Archer, Myla; Leonard, Elizabeth; Pradella, Matteo

    2003-01-01

    Security-Enhanced (SE) Linux is a modification of Linux initially released by NSA in January 2001 that provides a language for specifying Linux security policies and, as in the Flask architecture, a security server...

  16. Meeting the Challenges of Regional Security

    Science.gov (United States)

    1994-02-01

    34indicted." The "battlefields" are far more likely to be urban/suburban/industrial area., rather than deserts , jungles, or hedge rows, and the "targets...The British provided Middle East desert -experienced NCOs to U.S. units deployed to the Persian Gulf in DESERT SHIELD.) RSA units might also augment...regional security efforts, if thay can be demonstrated to be practical and useful. The U.N. forces’ purGuit of the Somalian "warlord" Aideed is a case in

  17. Security enhanced memory for quantum state.

    Science.gov (United States)

    Mukai, Tetsuya

    2017-07-27

    Security enhancement is important in terms of both classical and quantum information. The recent development of a quantum storage device is noteworthy, and a coherence time of one second or longer has been demonstrated. On the other hand, although the encryption of a quantum bit or quantum memory has been proposed theoretically, no experiment has yet been carried out. Here we report the demonstration of a quantum memory with an encryption function that is realized by scrambling and retrieving the recorded quantum phase. We developed two independent Ramsey interferometers on an atomic ensemble trapped below a persistent supercurrent atom chip. By operating the two interferometers with random phases, the quantum phase recorded by a pulse of the first interferometer was modulated by the second interferometer pulse. The scrambled quantum phase was restored by employing another pulse of the second interferometer with a specific time delay. This technique paves way for improving the security of quantum information technology.

  18. Extending U.S. Theater Missile Defense to Northeast Asia: Ramifications for Regional Security

    National Research Council Canada - National Science Library

    Attenweiler, Steven

    2001-01-01

    ... ambitions at a relatively acceptable cost. This thesis shows that the introduction of a layered missile defense capability will serve to enhance regional security for the United States and its allies by raising...

  19. Security-Enhanced Push Button Configuration for Home Smart Control.

    Science.gov (United States)

    Han, Junghee; Park, Taejoon

    2017-06-08

    With the emergence of smart and converged home services, the need for the secure and easy interplay of various devices has been increased. Push Button Configuration (PBC) is one of the technologies proposed for easy set-up of a secure session between IT and consumer devices. Although the Wi-Fi Direct specification explicitly states that all devices must support the PBC method, its applicability is very limited. This is because the security vulnerability of PBC can be maliciously exploited so that attackers can make illegitimate sessions with consumer devices. To address this problem, this paper proposes a novel Security-enhanced PBC (SePBC) scheme with which we can uncover suspicious or malicious devices. The proposed mechanism has several unique features. First, we develop a secure handshake distance measurement protocol by preventing an adversary sitting outside the region from maliciously manipulating its distance to be fake. Second, it is compatible with the original Wi-Fi PBC without introducing a brand-new methodology. Finally, SePBC uses lightweight operations without CPU-intensive cryptography computation and employs inexpensive H/W. Moreover, it needs to incur little overhead when there is no attack. This paper also designs and implements the proposed SePBC in the real world. Our experimental results and analysis show that the proposed SePBC scheme effectively defeats attacks on PBC while minimizing the modification of the original PBC equipment.

  20. Microsoft Windows Server 2003 security enhancements and new features

    OpenAIRE

    Montehermoso, Ronald Centeno

    2004-01-01

    Approved for public release; distribution is unlimited. The purpose of this thesis is to discuss the new features and enhancements of Windows Server 2003. Windows NT and Windows 2000 were known to have numerous security vulnerabilities; hence Microsoft focused on improving security by making Windows Server 2003 "secure by design, secure by default, secure in deployment." This thesis examines the differences between the five unique editions of the Windows Server 2003 family. Some of the pro...

  1. Specificity and structure of regional security control information support problem

    OpenAIRE

    Masloboev A. V.; Putilov V. A.

    2015-01-01

    The paper deals with system analysis of problems of regional economy information security and methods for their solutions at various stages of the crisis situation life-cycle. Specificity and structure of control problems of regional security in the economy as an object of information support have been considered. A set of decision-making information support problems occurred at the strategic, tactical and operational levels of regional security management has been defined. The information su...

  2. Security-Enhanced Autonomous Network Management for Space Networking Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Intelligent Automation Inc. (IAI) proposes an innovative Security-Enhanced Autonomous Network Management (SEANM) scheme for reliable communication in space...

  3. Specificity and structure of regional security control information support problem

    Directory of Open Access Journals (Sweden)

    Masloboev A. V.

    2015-09-01

    Full Text Available The paper deals with system analysis of problems of regional economy information security and methods for their solutions at various stages of the crisis situation life-cycle. Specificity and structure of control problems of regional security in the economy as an object of information support have been considered. A set of decision-making information support problems occurred at the strategic, tactical and operational levels of regional security management has been defined. The information support problem-solving unified methodological and instrumental framework of regional security has been proposed

  4. Multinational Corporation as a Regional Economic Security Network

    National Research Council Canada - National Science Library

    Aliona DANILIUC

    2016-01-01

    This paper is about multinational enterprises and regional security economic, summarizes and synthesizes different strands of literature, to present conclusions on the potential role of multinational...

  5. German Energy Security and Its Implications on Regional Security

    Science.gov (United States)

    2016-12-01

    capitalized on the high levels of dependence and energy isolation of these Eastern European countries by engaging in price-discrimination and other...Nord Stream 2 natural gas pipeline project between Russia and Germany, the decision to phase out nuclear energy , and European Union (EU) and German... energy , renewable energy , European Union 15. NUMBER OF PAGES 105 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18

  6. Formal Verification of Security Properties of Privacy Enhanced Mail

    Science.gov (United States)

    1998-06-01

    AFRL-IF-RS-TR-1998-99 Final Technical Report June 1998 FORMAL VERIFICATION OF SECURITY PROPERTIES OF PRIVACY ENHANCED MAIL Syracuse University...AND DATES COVERED Final Jun 96 - Jul 97 4. TITLE AND SUBTITLE FORMAL VERIFICATION OF SECURITY PROPERTIES OF PRIVACY ENHANCED MAIL 6. AUTHOR

  7. PREDICT: Privacy and Security Enhancing Dynamic Information Monitoring

    Science.gov (United States)

    2015-08-03

    AFRL-OSR-VA-TR-2015-0217 PREDICT Privacy and Security Enhancing Dynamic Information Monitoring VAIDY S SUNDERAM EMORY UNIVERSITY Final Report 08/03...TITLE AND SUBTITLE PREDICT: Privacy and Security Enhancing Dynamic Information Monitoring 5a. CONTRACT NUMBER 5b. GRANT NUMBER FA9550-12-1-0240 5c...SUPPLEMENTARY NOTES 14. ABSTRACT The PREDICT project incorporates security and privacy in DDDAS systems to deliver provable guarantees of privacy and

  8. INTRODUCTION: DESERTIFICATION AND SECURITY - PERSPECTIVES FOR THE MEDITERRANEAN REGION

    Science.gov (United States)

    This book focuses on two basic concepts: security and desertification in the Mediterranean Region and their linkages. It emerged from a single meeting of the "Workshop on Desertification in the Mediterranean Region. A Security Issue" held in Valencia, Spain on 2-5 December 2003...

  9. Security-Enhanced Autonomous Network Management

    Science.gov (United States)

    Zeng, Hui

    2015-01-01

    Ensuring reliable communication in next-generation space networks requires a novel network management system to support greater levels of autonomy and greater awareness of the environment and assets. Intelligent Automation, Inc., has developed a security-enhanced autonomous network management (SEANM) approach for space networks through cross-layer negotiation and network monitoring, analysis, and adaptation. The underlying technology is bundle-based delay/disruption-tolerant networking (DTN). The SEANM scheme allows a system to adaptively reconfigure its network elements based on awareness of network conditions, policies, and mission requirements. Although SEANM is generically applicable to any radio network, for validation purposes it has been prototyped and evaluated on two specific networks: a commercial off-the-shelf hardware test-bed using Institute of Electrical Engineers (IEEE) 802.11 Wi-Fi devices and a military hardware test-bed using AN/PRC-154 Rifleman Radio platforms. Testing has demonstrated that SEANM provides autonomous network management resulting in reliable communications in delay/disruptive-prone environments.

  10. A novel security information and event management system for enhancing cyber security in a hydroelectric dam.

    OpenAIRE

    Matteucci, Ilaria; Di Sarno, Cesario; Garofalo, Alessia; Vallini, Marco

    2016-01-01

    Security information and event management (SIEM) systems are increasingly used to cope with the security challenges involved in critical infrastructure protection. However, these systems have several limitations. This paper describes an enhanced security information and event management system that (i) resolves conflicts between security policies; (ii) discovers unauthorized network data paths and appropriately reconfigures network devices; and (iii) provides an intrusion- and fault-tolerant ...

  11. Security-Enhanced Fast Mobile IPv6 Handover

    Science.gov (United States)

    Park, Chang-Seop

    Motivated by the fact that the existing FMIPv6 security scheme has several weaknesses in terms of security and efficiency, we propose a security-enhanced fast mobile IPv6 in this letter. Based on the concept of a secret key-based CGA (Cryptographically Generated Address), we show how to establish a new security association between the MN and AR (Access Router) whenever a handover occurs. We also show that the proposed scheme is robust against several types of security attacks feasible with the existing scheme. Our scheme is more efficient in that it requires fewer public key operations.

  12. Private military and security companies policy in Africa: regional ...

    African Journals Online (AJOL)

    The purpose of this article is to explain the policy stasis around private security regulation in Africa. Africa is one of the largest theatres of private military and security company operations in the world. Yet, there is still no new regional convention or policy on their regulation. Previous studies focused on Western efforts to ...

  13. Security Sector Reform in the Arab Region | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Researchers will undertake a review of security sector reform research and lessons learned relevant to the Arab region. They will conduct a public opinion survey on attitudes and understanding of the security sector. And, they will convene an expert workshop to plan future work. The project will be led by the Arab Reform ...

  14. Regionalism, Security and Cooperation in Oceania

    Science.gov (United States)

    2015-06-01

    region, places New Zealand with Australia alongside the regional periphery pow- ers of France, United Kingdom, and the United States. Geography, culture ...has been quietly criticized for lacking a more nuanced appreciation of the cultural and political context. As former New Zealand diplomat Gerald...the United States. Geog- raphy, culture and historical linkages therefore serve to situate New Zealand in the region and on its periphery. In

  15. Enhancing Parliamentary Oversight for Effective Security Sector ...

    African Journals Online (AJOL)

    The provision of the most essential public good – security in accordance with the will of the people is very germane to the consolidation of democratic governance. Though, the Nigerian state is set to inaugurate her 8th National Assembly on 9th June, 2015, the capacity of the nation's parliamentary body (National Assembly) ...

  16. Exploring the Future of Security in the Caribbean: a Regional Security Partnership?

    Science.gov (United States)

    2007-12-14

    include the Southern Common Market (MERCOSUR), the Caribbean Community (CARICOM), the North American Free Trade Agreement ( NAFTA ), the Andean Community...an improved security environment will trump ideological differences. The continued diplomatic efforts at the regional and international levels to

  17. Demographic aspects of social security in region

    Directory of Open Access Journals (Sweden)

    Alla Gennad'evna Leont'eva

    2012-06-01

    Full Text Available This paper presents a situational analysis of the level of life safety in the field of demographic regions of the Ural Federal District. The analysis is based on data from the Federal Statistics and covers the period 2000-2010. We have developed a system of indicators for evaluating safety in the demographic sphere. We set the main threats to the social and economic stability in the regions. The system of thresholds includes three blocks: the reproduction of the population, marriage and family relationships and health. We have presented a quantitative description of the main threats. Identified priority areas of social protection, providing increased stability of the regional socio-economic development, reducing the likelihood of social conflicts and improve the demographic situation.

  18. Multinational Corporation as a Regional Economic Security Network

    Directory of Open Access Journals (Sweden)

    Aliona DANILIUC

    2016-12-01

    Full Text Available This paper is about multinational enterprises and regional security economic, summarizes and synthesizes different strands of literature, to present conclusions on the potential role of multinational enterprises in regional economic security in the EU, Ukraine, Moldova. The circumstances under which 'developmental' MNE subsidiaries may emerge in host regions are reviewed and possible routes to cluster formation and the generation of dynamic comparative advantage are explored. Policy issues are discussed, emphasizing the importance of investment in infrastructure, education and other public goods.

  19. Food and nutrition security in the Hindu Kush Himalayan region.

    Science.gov (United States)

    Rasul, Golam; Hussain, Abid; Mahapatra, Bidhubhusan; Dangol, Narendra

    2018-01-01

    The status of food and nutrition security and its underlying factors in the Hindu-Kush Himalayan (HKH) region is investigated. In this region, one third to a half of children (Food habits in the HKH region are changing. This has led to a deterioration in traditional mountain food systems with a decline in agrobiodiversity. Factors such as high poverty and low dietary energy intakes, a lack of hygienic environments, inadequate nutritional knowledge, and climate change and environmental degradation are also influencing food and nutrition security in the HKH region. To achieve sustainable food and nutrition security in the mountains, this study suggests a multi-sectoral integrated approach with consideration of nutritional aspects in all development processes dealing with economic, social, agricultural and public health issues. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.

  20. Toward a Regional Security Architecture for the Horn of Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Toward a Regional Security Architecture for the Horn of Africa - Phase II. The Horn of Africa region has endured decades of destruction and human suffering due to long and interrelated wars. Moreover, conflict in one country tends to affect its neighbours, mainly through the flow of refugees and weapons. Building on work ...

  1. MULTILEVEL RECURRENT MODEL FOR HIERARCHICAL CONTROL OF COMPLEX REGIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    Andrey V. Masloboev

    2014-11-01

    Full Text Available Subject of research. The research goal and scope are development of methods and software for mathematical and computer modeling of the regional security information support systems as multilevel hierarchical systems. Such systems are characterized by loosely formalization, multiple-aspect of descendent system processes and their interconnectivity, high level dynamics and uncertainty. The research methodology is based on functional-target approach and principles of multilevel hierarchical system theory. The work considers analysis and structural-algorithmic synthesis problem-solving of the multilevel computer-aided systems intended for management and decision-making information support in the field of regional security. Main results. A hierarchical control multilevel model of regional socio-economic system complex security has been developed. The model is based on functional-target approach and provides both formal statement and solving, and practical implementation of the automated information system structure and control algorithms synthesis problems of regional security management optimal in terms of specified criteria. An approach for intralevel and interlevel coordination problem-solving in the multilevel hierarchical systems has been proposed on the basis of model application. The coordination is provided at the expense of interconnection requirements satisfaction between the functioning quality indexes (objective functions, which are optimized by the different elements of multilevel systems. That gives the possibility for sufficient coherence reaching of the local decisions, being made on the different control levels, under decentralized decision-making and external environment high dynamics. Recurrent model application provides security control mathematical models formation of regional socioeconomic systems, functioning under uncertainty. Practical relevance. The model implementation makes it possible to automate synthesis realization of

  2. Danish Interests in Regional Security Institutions in East Africa

    DEFF Research Database (Denmark)

    Nordby, Johannes Riber; Jacobsen, Katja

    2013-01-01

    For the past decade, peace and security in East Africa have gained increasing focus internationally. The region has experienced armed conflicts, civil wars, rebellion, drought and famine. Yet, at the same time, there is an emerging ambition among a number of African states to handle security issues...... on the continent independently. Such ambitions have fostered a variety of military capacity building programmes supported by external donors. The present report explores how up until now Denmark has sought to contribute to strengthening political and military security in East Africa. This has mainly been done...

  3. ENHANCING INCOME GENERATION AND NUTRITION SECURITY ...

    African Journals Online (AJOL)

    This will enable them to produce snail both for income and improvement of household nutrition. Also, it will enhance the nutritional status of the pregnant and nursing mothers. Therefore government and non-governmental organization working on improvement of agricultural production should consider not only the financial ...

  4. Cooperative monitoring and its role in regional security

    Energy Technology Data Exchange (ETDEWEB)

    Biringer, K.; Olsen, J.; Lincoln, R.; Wehling, F. [and others

    1997-03-01

    Cooperative monitoring systems can play an important part in promoting the implementation of regional cooperative security agreements. These agreements advance the national security interests of the United States in a post Cold War environment. Regional issues as widely varying as nuclear nonproliferation, trade and environmental pollution can be the source of tensions which may escalate to armed conflict which could have global implications. The Office of National Security Policy Analysis at the US Department of Energy (DOE) has an interest in seeking ways to promote regional cooperation that can reduce the threats posed by regional conflict. DOE technologies and technical expertise can contribute to developing solutions to a wide variety of these international problems. Much of this DOE expertise has been developed in support of the US nuclear weapons and arms control missions. It is now being made available to other agencies and foreign governments in their search for regional security and cooperation. This report presents two examples of interest to DOE in which monitoring technologies could be employed to promote cooperation through experimentation. The two scenarios include nuclear transparency in Northeast Asia and environmental restoration in the Black Sea. Both offer the potential for the use of technology to promote regional cooperation. The issues associated with both of these monitoring applications are presented along with examples of appropriate monitoring technologies, potential experiments and potential DOE contributions to the scenarios.

  5. Challenges and opportunities for more integrated regional food security policy in the Caribbean Community

    Directory of Open Access Journals (Sweden)

    Kristen Lowitt

    2016-01-01

    Full Text Available The Caribbean Community (CARICOM has recognized regional integration as an important development strategy for addressing the unique vulnerabilities of its member small island developing states (SIDS. Food security in the Caribbean is a fundamental social and ecological challenge in which the dynamics of regional integration are increasingly playing out. CARICOM members have subsequently identified a number of shared food security problems and have endorsed regional goals and approaches to address them; however, progress towards solutions has been slow. Recognizing that evidence-based studies on the potential factors limiting sustained progress are lacking, we undertook a comparative policy analysis to understand better the various approaches and framings of food security at national and regional levels with a view to assessing coherence. We identify considerable divergence in how regional and local policy institutions frame and approach food security problems in CARICOM and then identify ways through which the policy integration objectives for enhanced regional food security might be progressed, with a particular focus on social learning.

  6. Food and health considerations in Asia-Pacific regional security.

    Science.gov (United States)

    McKay, John

    2009-01-01

    Recent dramatic increases in food prices in much of the world have caused much concern, and have even resulted in some public protests and riots. This is easy to understand given the large percentages of incomes that the poor devote to food purchases. Many commentators have predicted that food supplies in the Asia-Pacific region will become much more limited in the future as the result of population growth, the rapid growth of cities, new food demands by a growing middle class, the impacts of climate change, and the growth of a global food industry. But will these possible shortages of food result in pressures that will destabilise the security situation in the region? Recent work of the whole concept of security has resulted in some redefinition of the term to include issues of human security, but it could also be argued that severe strains on the human security situation could even result in increased instability in the more traditional kind of security regime. The extreme case of North Korea is used as an example of how this might happen. But we really do not know if such dangers are real ones for the region as a whole, and it is suggested that much more research is needed in this area. The whole concept of resilience has been used in some studies elsewhere and this may be useful starting point for new work in this area.

  7. Water, energy, and food security in the Asia Pacific region

    Directory of Open Access Journals (Sweden)

    Makoto Taniguchi

    2017-06-01

    Full Text Available Security measures of three resources; water, energy and food are analyzed for thirty two countries in the Asia Pacific region which are faced to Pacific Ocean, in terms of amounts of the resource, self-production, and diversity of sources of each resource. Diversity for all the three resources is also analyzed using surface water and groundwater for water sources; hydro power, geothermal power, solar, and biomass for energy; and cereals, vegetable, fruit, meat, and fish for food. We see high diversity of sources of water in the US and the Philippines, and a low diversity of sources of food in the US, Canada, and Indonesia. These security measures including water security show new hydrological insight for Asia-Pacific region.

  8. Redefining Maritime Security Threats in the Eastern Indian Ocean Region.

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Arjun [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    This occasional paper analyzes the general security issues and trends relating to maritime trafficking of radiological and nuclear material using small vessels, minor ports, and unchecked areas of coastline existing in the Eastern Indian Ocean Region today. By the Eastern Indian Ocean Region is meant the area starting from the tip of the Indian peninsula in the west to the Straits of Malacca in the east. It lays focus on the potential sources of nuclear or radiological material that may be trafficked here. It further undertakes a study of the terrorist groups active in the region as well as the multinational or national interdiction organizations that have been created to counter maritime threats. It also seeks to discern the various technologies for detecting materials of concern available in the area. Finally, it ascertains possible methods and technologies to improve the maritime security system in the region.

  9. The Ukraine factor in international security: regional and global levels

    Directory of Open Access Journals (Sweden)

    K P Kurylev

    2014-12-01

    Full Text Available The article examines the factors that determine the importance of Ukraine as a country which inner development may strengthen and stabilize or weaken and destabilize the international security at a regional and global levels. The author analyzed Ukraine's national interests and geopolitical aspirations of its neighbors - Russia, NATO and the EU, their rivalry for influence over Ukraine.

  10. Crafting an African security architecture: Addressing regional peace ...

    African Journals Online (AJOL)

    architecture (APSA), focusing on the root causes of the conflicts and the milestones that the African Union has ... region, apart from the structural weakness of the African state. Case studies of Chad, the Democratic ... interest in and support for the continent's peace and security architecture. Several factors that make Africa a ...

  11. United States security strategy for the East Asia-Pacific region

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-12-31

    The three years since release of the last East Asia Strategy Report (EASR) have produced important development in the security environment of the Asia-Pacific region. The 1998 EASR outlines a multifaceted regional security strategy, including: maintenance of comprehensive US engagement, including not only the presence of approximately 100,000 US military personnel in Asia but also a variety of other public and private interaction with the region; continued enhancement of the alliance relationships with Japan, Korea, Australia, Thailand and the Philippines; comprehensive engagement with China to build the foundation for a long-term relationship based on cooperation and mutual interest; broadening of cooperation with the nations of Southeast Asia on security and confidence building; expansion of regional cooperation with Russia; support for the development of security pluralism, including expansion of multilateral, minilateral and bilateral dialogue in the region; promotion of democracy; stemming and countering proliferation of weapons of mass destruction (WMD): and increased attention to terrorism, environmental degradation, emerging infectious diseases, drug trafficking and other transnational challenges as critical elements of `comprehensive security.`

  12. Politics of North Korean refugees and regional security implications

    OpenAIRE

    Chang, Jacqueline Danielle

    2009-01-01

    This is the English version of Jacqueline D. Chang's June 2009 Masters Thesis, Politics of North Korean refugees and regional security implication. A Hangul translation version may be found here: http://hdl.handle.net/10945/43808 The North Korean refugee issue is a challenge to regional stability. In addition to humanitarian concerns, a mass flow of refugees would have enormous impact on operations of the Republic of Korea's military and the U.S. forces stationed in Korea and Japan. Reg...

  13. Windows Vista Kernel-Mode: Functions, Security Enhancements and Flaws

    OpenAIRE

    Mohammed D. ABDULMALIK; Shafi’i M. ABDULHAMID

    2008-01-01

    Microsoft has made substantial enhancements to the kernel of the Microsoft Windows Vista operating system. Kernel improvements are significant because the kernel provides low-level operating system functions, including thread scheduling, interrupt and exception dispatching, multiprocessor synchronization, and a set of routines and basic objects.This paper describes some of the kernel security enhancements for 64-bit edition of Windows Vista. We also point out some weakness areas (flaws) that ...

  14. Enhanced Security for Online Exams Using Group Cryptography

    Science.gov (United States)

    Jung, I. Y.; Yeom, H. Y.

    2009-01-01

    While development of the Internet has contributed to the spread of online education, online exams have not been widely adopted. An online exam is defined here as one that takes place over the insecure Internet, and where no proctor is in the same location as the examinees. This paper proposes an enhanced secure online exam management environment…

  15. Enhancing security of DICOM images during storage and ...

    Indian Academy of Sciences (India)

    S¯adhan¯a Vol. 36, Part 4, August 2011, pp. 515–523. c Indian Academy of Sciences. Enhancing security of DICOM images during storage and transmission in distributed environment. A LAVANYA. ∗ and V NATARAJAN. Department of Instrumentation Engineering, Madras Institute of Technology,. Chennai 600 044, India.

  16. utilising agricultural waste to enhance food security and conserve ...

    African Journals Online (AJOL)

    Sabiiti

    UTILISING AGRICULTURAL WASTE TO ENHANCE FOOD SECURITY. AND CONSERVE THE ENVIRONMENT. Sabiiti EN. 1. *. Elly Sabiiti. *Corresponding author email: esabiiti@agric.mak.ac.ug. 1. Department of Agricultural Production, School of Agricultural Sciences, College of. Agricultural and Environmental Sciences ...

  17. Еcological security of environment in Zhytomyr region

    Directory of Open Access Journals (Sweden)

    I.М. Kovalevska

    2016-03-01

    Full Text Available The article is aiming at the study of environmental hazards in Zhytomir region. Its main objective is to identify the set of adverse factors affecting the state of danger and compose a necessary starting material for the prediction of possible negative consequences, their nature and extent. The matter of special importance for the study of the phenomenon of security is the security classification. First of all, the forms (system of security in relation to the forces and processes of natural, social and technical character should be distinguished. They can be defined as systems of geo-bio-physical, social and technical security. The classification of security can be determined in many ways, for example, in relation to the object of security; in relation to the subject of security; according to the problem indication; according to the functional indication. Security is a distinctive characteristic and prerequisite of life, progressive development and viability of real-world objects. The methodology of its evaluation is based on the states of the essence of natural and anthropogenic environmental pollution, the standard requirements for the quality of environmental objects and standards of acceptable contamination. The assessment of ecological security of the environment is the quantitative measure of parameters of environmental pollution dangers, threats and risks of natural character as well as the state of anthropogenic security. This assessment is carried out according to the methods and ways to measure environmental parameters. For this purpose it is important to know the factors of danger and the system of indicators that characterizes all natural and environmental phenomena and processes of geo-ecological dangers, natural environmental conditions, ecological condition. The system of natural and industrial environmental indicators consists of the indicators which characterize all phenomena and processes of geo-ecological dangers of natural

  18. The Arab Uprisings and Euro-Mediterranean Security: The Regional Security Agenda of the European Union

    Directory of Open Access Journals (Sweden)

    Schima Viktoria Labitsch

    2014-12-01

    Full Text Available The 2010 Arab uprisings led to profound changes in the political landscape of the Southern Mediterranean, and came at a time of staggering Euro-Mediterranean relations. With prevailing turmoil and violence in Europe’s closest proximity, the Euromed relationship – heavily dominated by security objectives and concerns in the past – is facing new social, political and economic challenges. This work analyses what challenges have made it onto the security agenda of the European Union in response to the uprisings in Tunisia, Libya and Egypt between December 2010 and 2013. It does so by analysing the discourse of three institutions: the European Commission, the European Council and the Council of Ministers. Accordingly, it argues that security in the Euro-Mediterranean context may be analysed in the framework of the wider constructivist Copenhagen school of security studies, treating threats as politically constructed in the process of securitization. It emphasizes the different degrees of institutional involvement in framing the regional security agenda, and the vast application of security logic to migration and mobility as well as its absence in areas of biological and chemical weapons, extremism and weapons of mass destruction. This work’s final argument is that whilst the overall level of securitization throughout the three years remains low and partially inconsistent with the security priorities before 2010, the EU exhibited a particularly strong regional focus on Libya as well as a thematic one on migration and external borders.

  19. The African Standby Force and Regional Security Integration

    DEFF Research Database (Denmark)

    Mandrup, Thomas

    2015-01-01

    the challenges facing the region? The regional enmities between the states seem to be widespread, deep-rooted and of a nearly chronic nature. In June 2015 the African Union and its member-states announced that they expected the five regionally based standby brigades to be fully operational by December 2015....... The readiness is to be tested at a continental field exercise, Amani Africa 11 to take place in South Africa October 2015. (Defence Web, 2015) The article will start by mapping out the security dynamics and architecture in East Africa, including its membership circles and priorities. The article...

  20. The Dynamics of Security in the Asia-Pacific Region,

    Science.gov (United States)

    1996-01-01

    spreading faster in Asia than elsewhere. Thailand has a major epidemic among the heterosexual population . Projections suggest that deaths from AIDS could...CRM 95-172 / January 1996 The Dynamics of Security in the Asia -Pacific Region M. Lyall Breckon • Thomas J. Hirschfeld Cleared for Public Release... Control and Distribution Section at 703-824-2942 Contents Summary 1 Key trends 2 Implications for the Navy 4 Introduction ’ Background

  1. Security Enhancement for Data Migration in the Cloud

    Directory of Open Access Journals (Sweden)

    Jean Raphael Ngnie Sighom

    2017-06-01

    Full Text Available In today’s society, cloud computing has significantly impacted nearly every section of our lives and business structures. Cloud computing is, without any doubt, one of the strategic directions for many companies and the most dominating infrastructure for enterprises as long as end users. Instead of buying IT equipment (hardware and/or software and managing it themselves, many organizations today prefer to buy services from IT service providers. The number of service providers increase dramatically and the cloud is becoming the tools of choice for more cloud storage services. However, as more personal information and data are moved to the cloud, into social media sites, DropBox, Baidu WangPan, etc., data security and privacy issues are questioned. Daily, academia and industry seek to find an efficient way to secure data migration in the cloud. Various solution approaches and encryption techniques have been implemented. In this work, we will discuss some of these approaches and evaluate the popular ones in order to find the elements that affect system performance. Finally, we will propose a model that enhances data security and privacy by combining Advanced Encryption Standard-256, Information Dispersal Algorithms and Secure Hash Algorithm-512. Our protocol achieves provable security assessments and fast execution times for medium thresholds.

  2. Microsoft Windows Server 2003: Security Enhancements and New Features

    National Research Council Canada - National Science Library

    Montehermoso, Ronald

    2004-01-01

    .... Windows NT and Windows 2000 were known to have numerous security vulnerabilities; hence Microsoft focused on improving security by making Windows Server 2003 secure by design, secure by default, secure in deployment...

  3. THE STRATEGIC IMPORTANCE OF INVESTMENT COMPONENT OF ECONOMIC SECURITY FOR REGIONS OF UKRAINIAN POLISSYA

    Directory of Open Access Journals (Sweden)

    M. Pitsyk

    2016-08-01

    Full Text Available In the article the economic security of the Ukrainian Polissya regions is investigated. The partical indices of integral index of economic security namely investment, innovation, finance, foreign trade, food, social, demographic security are defined. The hypothesis of a significant impact of investment on economic security of Ukrainian Polissya regions are established and proven by analyzing the dynamics of investment and economic security. The conclusion is that the state of economic security for most regions of Ukrainian Polissya is uneven and low, but the impact of investment on the level of economic security of the studied regions is extremely high and has strategic importance.

  4. Windows Vista Kernel-Mode: Functions, Security Enhancements and Flaws

    Directory of Open Access Journals (Sweden)

    Mohammed D. ABDULMALIK

    2008-06-01

    Full Text Available Microsoft has made substantial enhancements to the kernel of the Microsoft Windows Vista operating system. Kernel improvements are significant because the kernel provides low-level operating system functions, including thread scheduling, interrupt and exception dispatching, multiprocessor synchronization, and a set of routines and basic objects.This paper describes some of the kernel security enhancements for 64-bit edition of Windows Vista. We also point out some weakness areas (flaws that can be attacked by malicious leading to compromising the kernel.

  5. Enhancing Māori food security using traditional kai.

    Science.gov (United States)

    McKerchar, Christina; Bowers, Sharron; Heta, Craig; Signal, Louise; Matoe, Leonie

    2015-09-01

    Lack of food security is one of the major nutrition issues facing Māori today. Loss of traditional kai (food) gathering places and practices following colonisation and urbanisation has impacted negatively on food security for Māori. This paper explores the role of Māori in enhancing Māori food security through revitalising traditional kai. A narrative literature review of peer reviewed and grey literature on revitalising traditional kai for Māori was conducted. The focus was on two areas: increasing the availability of traditional kai to Māori households (such as through replenishing fish stocks, and gardening projects) and increasing the financial means available to Māori households to purchase food (by economic development of traditional kai industries and employment creation). A range of activities to improve food security for Māori by revitalising traditional kai was identified in the literature. Māori are now significant players in New Zealand's fishing industry, and are developing their horticultural resources. Gardening initiatives have also grown considerably in Māori communities. Enabling factors included: the return of traditional kai resources by the Crown, and successful pursuit by Māori of the legal rights to develop them; development of Māori models of governance; government policy around Māori economic development and healthy eating; and Māori leadership on the issue. Barriers to revitalising traditional kai that remain to be addressed include: tensions between Government and Māori goals and models of resource management; economic pressures resulting in severely depleted fishing stocks; and pollution of marine and freshwater fish. Revitalising traditional kai has considerable potential to improve food security for Māori, both directly in terms of food supply and by providing income, and warrants policy and practical support. These findings have implications for other indigenous cultures who are struggling to be food secure. © The

  6. Application of the Concept of Intrusion Tolerant System for Evaluating Cyber Security Enhancements

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Chanyoung; Seong, Poong Hyun [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    One of the major problems is that nuclear industry is in very early stage in dealing with cyber security issues. It is because that cyber security has received less attention compared to other safety problems. In addition, late adoption of digital I and C systems has resulted in lower level of cyber security advancements in nuclear industry than ones in other industries. For the cyber security of NPP I and C systems, many regulatory documents, guides and standards were already published. These documents include cyber security plans, methods for cyber security assessments and comprehensive set of security controls. However, methods which can help assess how much security is improved if a specific security control is applied are not included in these documents. Hence, NPP I and C system designers may encounter difficulties when trying to apply security controls with limited structure and cost. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. The extent of cyber security improvement caused by security enhancement was defined as reduction ratio of the failure probability to secure the system from cyber-attack as Eq.1. The concept of 'intrusion tolerant system' was applied to not only prevent cyber-attacks but also limit the extent of damage in this study. For applying the concept of intrusion tolerant system to NPP, the event tree was constructed with some assumptions. Cyber security improvement caused by cyber security enhancement can be estimated as Eq.3. By comparing current system to the enhanced system, it is

  7. USign--a security enhanced electronic consent model.

    Science.gov (United States)

    Li, Yanyan; Xie, Mengjun; Bian, Jiang

    2014-01-01

    Electronic consent becomes increasingly popular in the healthcare sector given the many benefits it provides. However, security concerns, e.g., how to verify the identity of a person who is remotely accessing the electronic consent system in a secure and user-friendly manner, also arise along with the popularity of electronic consent. Unfortunately, existing electronic consent systems do not pay sufficient attention to those issues. They mainly rely on conventional password based authentication to verify the identity of an electronic consent user, which is far from being sufficient given that identity theft threat is real and significant in reality. In this paper, we present a security enhanced electronic consent model called USign. USign enhances the identity protection and authentication for electronic consent systems by leveraging handwritten signatures everyone is familiar with and mobile computing technologies that are becoming ubiquitous. We developed a prototype of USign and conducted preliminary evaluation on accuracy and usability of signature verification. Our experimental results show the feasibility of the proposed model.

  8. Hydrologic variability in dryland regions: impacts on ecosystem dynamics and food security.

    Science.gov (United States)

    D'Odorico, Paolo; Bhattachan, Abinash

    2012-11-19

    Research on ecosystem and societal response to global environmental change typically considers the effects of shifts in mean climate conditions. There is, however, some evidence of ongoing changes also in the variance of hydrologic and climate fluctuations. A relatively high interannual variability is a distinctive feature of the hydrologic regime of dryland regions, particularly at the desert margins. Hydrologic variability has an important impact on ecosystem dynamics, food security and societal reliance on ecosystem services in water-limited environments. Here, we investigate some of the current patterns of hydrologic variability in drylands around the world and review the major effects of hydrologic fluctuations on ecosystem resilience, maintenance of biodiversity and food security. We show that random hydrologic fluctuations may enhance the resilience of dryland ecosystems by obliterating bistable deterministic behaviours and threshold-like responses to external drivers. Moreover, by increasing biodiversity and the associated ecosystem redundancy, hydrologic variability can indirectly enhance post-disturbance recovery, i.e. ecosystem resilience.

  9. On the Perception of National Security Issues at Regional Level

    Directory of Open Access Journals (Sweden)

    Ponedelkov Aleksandr Vasilyevich

    2015-12-01

    Full Text Available The article explores the issue on the perception of the concept “national security” areas, models and methods of its maintenance by the population. The author uses materials of the sociological survey conducted by the Laboratory of problems of increasing the efficiency of state and municipal management of the South-Russian Institute of Management – branch of the Russian Presidential Academy of National Economy and Public Administration. The survey was carried out with the participation of leading experts in various aspects of national security, representing 27 Russian higher educational institutions and research centers in Moscow, Astrakhan, Barnaul, Belgorod, Dushanbe, Krasnodar, Nizhny Novgorod, Omsk, Pyatigorsk, Rostov-on-Don, Saint Petersburg, Syktyvkar, Sochi, Ufa. It is noted that as a priority political governance model that implements the basic concept of national security, respondents identified a democratic model. Most respondents believe that a unified security model in the Russian regions is ineffective, and such model should be developed taking into account the specificity of each subject. The study showed that the public’s attention to the issue of national security is not sustainable, as determined by situational factors. It is proved that the motives of anxiety formed in the Russian public mind are not sustainable, and situational. Respondents see the economic cooperation more effective incentive to maintain national interests than by force. Estimation of the population of the priority issues of security shows that most respondents appreciate the organization of work to ensure the safety and anti-terrorism security in the sphere of national relations. The findings give grounds to assert that the focus of public attention to the problem of national security does not yet occupy the leading positions. To a greater extent, respondents focused on the issues of public safety, reducing threats and risks in their daily lives

  10. FORWARD: DESERTIFICATION IN THE MEDITERRANEAN REGION: A SECURITY ISSUE

    Science.gov (United States)

    The Workshop focused on two basic concepts: security and desertification and their linkages. Since the end of the Cold War, traditional security concepts based on national sovereignty and territorial security have increasingly been brought under review. Currently, a broader defin...

  11. Enhancing security, information privacy on users registration and login

    OpenAIRE

    Kimambo, Elisante

    2015-01-01

    The thesis is aiming to enhance the registration and login security and raising privacy and terms awareness on client side of the web application. The technological driven world has completely changed the way we interact one another for instance the use of social media has become such important and integral part of everything we do in life. This is because in today’s world, social media has deep influence on how people do things and acting in certain ways. The issue of whether social me...

  12. Enhancing energy security in Malayia: the challenges towards sustainable environment

    Science.gov (United States)

    Sahid, E. J. M.; Siang, C. Ch; Peng, L. Y.

    2013-06-01

    Energy is known as one of the essential ingredients for economic development and security of energy supply is crucial in ensuring continuous economic development of a country. Malaysia's proven domestic oil reserves are estimated to last for another 25 years, while that of gas for another 39 years as of 2011. Despite the depleting indigenous energy resources, the primary energy demand has continued to grow robustly, at an annual rate of 6.3 percent per year from 1990 to 2010, while the primary energy import has grown 7.2% per year and the primary energy export has grown at a slower rate of 1.9% per year. This worrying trend is further compounded by the faster rate of primary oil import averaging 10.5% per year while the primary energy export has shrink at a rate of 1.4% per year. This paper has identified two main concerns namely overdependence on fossil fuel and increasing energy import dependency in creating a precarious position towards energy self-sufficiency. The study will analyse the energy security of the country and explore possible options and challenges in enhancing the energy supply security toward sustainable environment.

  13. Security Enhancement of Wireless Sensor Networks Using Signal Intervals.

    Science.gov (United States)

    Moon, Jaegeun; Jung, Im Y; Yoo, Jaesoo

    2017-04-02

    Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN) have a security issue. In one pairing process during Bluetooth communication, which is known as simple secure pairing (SSP), the devices are required to specify I/O capability or user interference to prevent man-in-the-middle (MITM) attacks. This study proposes an enhanced SSP in which a nonce to be transferred is converted to a corresponding signal interval. The quantization level, which is used to interpret physical signal intervals, is renewed at every connection by the transferred nonce and applied to the next nonce exchange so that the same signal intervals can represent different numbers. Even if attackers eavesdrop on the signals, they cannot understand what is being transferred because they cannot determine the quantization level. Furthermore, the proposed model does not require exchanging passkeys as data, and the devices are secure in the case of using a fixed PIN. Subsequently, the new quantization level is calculated automatically whenever the same devices attempt to connect with each other. Therefore, the pairing process can be protected from MITM attacks and be convenient for users.

  14. Security Enhancement of Wireless Sensor Networks Using Signal Intervals

    Directory of Open Access Journals (Sweden)

    Jaegeun Moon

    2017-04-01

    Full Text Available Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN have a security issue. In one pairing process during Bluetooth communication, which is known as simple secure pairing (SSP, the devices are required to specify I/O capability or user interference to prevent man-in-the-middle (MITM attacks. This study proposes an enhanced SSP in which a nonce to be transferred is converted to a corresponding signal interval. The quantization level, which is used to interpret physical signal intervals, is renewed at every connection by the transferred nonce and applied to the next nonce exchange so that the same signal intervals can represent different numbers. Even if attackers eavesdrop on the signals, they cannot understand what is being transferred because they cannot determine the quantization level. Furthermore, the proposed model does not require exchanging passkeys as data, and the devices are secure in the case of using a fixed PIN. Subsequently, the new quantization level is calculated automatically whenever the same devices attempt to connect with each other. Therefore, the pairing process can be protected from MITM attacks and be convenient for users.

  15. Security Enhancement of Wireless Sensor Networks Using Signal Intervals

    Science.gov (United States)

    Moon, Jaegeun; Jung, Im Y.; Yoo, Jaesoo

    2017-01-01

    Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN) have a security issue. In one pairing process during Bluetooth communication, which is known as simple secure pairing (SSP), the devices are required to specify I/O capability or user interference to prevent man-in-the-middle (MITM) attacks. This study proposes an enhanced SSP in which a nonce to be transferred is converted to a corresponding signal interval. The quantization level, which is used to interpret physical signal intervals, is renewed at every connection by the transferred nonce and applied to the next nonce exchange so that the same signal intervals can represent different numbers. Even if attackers eavesdrop on the signals, they cannot understand what is being transferred because they cannot determine the quantization level. Furthermore, the proposed model does not require exchanging passkeys as data, and the devices are secure in the case of using a fixed PIN. Subsequently, the new quantization level is calculated automatically whenever the same devices attempt to connect with each other. Therefore, the pairing process can be protected from MITM attacks and be convenient for users. PMID:28368341

  16. Adult Education as a Means of Enhancing Food Security in Nigeria ...

    African Journals Online (AJOL)

    It looks at the concept of food security, importance of food security to the people, causes of food insecurity, consequences of food insecurity and government's efforts in ensuring food security in Nigeria. The role of Adult Education programmes for the enhancement of Food Security such as improving awareness through ...

  17. The enhancement of security in healthcare information systems.

    Science.gov (United States)

    Liu, Chia-Hui; Chung, Yu-Fang; Chen, Tzer-Shyong; Wang, Sheng-De

    2012-06-01

    With the progress and the development of information technology, the internal data in medical organizations have become computerized and are further established the medical information system. Moreover, the use of the Internet enhances the information communication as well as affects the development of the medical information system that a lot of medical information is transmitted with the Internet. Since there is a network within another network, when all networks are connected together, they will form the "Internet". For this reason, the Internet is considered as a high-risk and public environment which is easily destroyed and invaded so that a relevant protection is acquired. Besides, the data in the medical network system are confidential that it is necessary to protect the personal privacy, such as electronic patient records, medical confidential information, and authorization-controlled data in the hospital. As a consequence, a medical network system is considered as a network requiring high security that excellent protections and managerial strategies are inevitable to prevent illegal events and external attacks from happening. This study proposes secure medical managerial strategies being applied to the network environment of the medical organization information system so as to avoid the external or internal information security events, allow the medical system to work smoothly and safely that not only benefits the patients, but also allows the doctors to use it more conveniently, and further promote the overall medical quality. The objectives could be achieved by preventing from illegal invasion or medical information being stolen, protecting the completeness and security of medical information, avoiding the managerial mistakes of the internal information system in medical organizations, and providing the highly-reliable medical information system.

  18. A case for avoiding security-enhanced HTTP tools to improve security for Web-based applications

    Energy Technology Data Exchange (ETDEWEB)

    Wood, B.

    1996-03-01

    This paper describes some of the general weaknesses of the current popular Hypertext Transmission Protocol (HTTP) security standards and products in an effort to show that these standards are not appealing for many applications. The author will then show how one can treat HTTP browsers and servers as untrusted elements in the network so that one can rely on other mechanisms to achieve better overall security than can be attained through today`s security-enhanced HTTP tools.

  19. Security-Enhanced Push Button Configuration for Home Smart Control †

    Science.gov (United States)

    Han, Junghee; Park, Taejoon

    2017-01-01

    With the emergence of smart and converged home services, the need for the secure and easy interplay of various devices has been increased. Push Button Configuration (PBC) is one of the technologies proposed for easy set-up of a secure session between IT and consumer devices. Although the Wi-Fi Direct specification explicitly states that all devices must support the PBC method, its applicability is very limited. This is because the security vulnerability of PBC can be maliciously exploited so that attackers can make illegitimate sessions with consumer devices. To address this problem, this paper proposes a novel Security-enhanced PBC (SePBC) scheme with which we can uncover suspicious or malicious devices. The proposed mechanism has several unique features. First, we develop a secure handshake distance measurement protocol by preventing an adversary sitting outside the region from maliciously manipulating its distance to be fake. Second, it is compatible with the original Wi-Fi PBC without introducing a brand-new methodology. Finally, SePBC uses lightweight operations without CPU-intensive cryptography computation and employs inexpensive H/W. Moreover, it needs to incur little overhead when there is no attack. This paper also designs and implements the proposed SePBC in the real world. Our experimental results and analysis show that the proposed SePBC scheme effectively defeats attacks on PBC while minimizing the modification of the original PBC equipment. PMID:28594370

  20. G8 Regional Security Governance through Sanctions and Force

    Directory of Open Access Journals (Sweden)

    John Kirton

    2014-11-01

    Full Text Available Why do the Group of Eight (G8 members approve its members’ use of material sanctions in some regional conflicts but military force in others?2 As an informal security institution composed of major democratic powers from North America, Europe and Asia, the G8 has often chosen sanctions, notably on Iran in 1980, Afghanistan in 1980, Sudan in 2004, North Korea in 2006, and Syria in 2011. It has increasingly chosen military force, notably in Iraq in 1990, Kosovo in 1999, the USSR over Afghanistan in 2001, Libya in 2011, and Mali in 2013. Yet the G8’s choice, initiation, commitment, compliance, implementation and effectiveness of both sanctions and force has varied. Force was chosen and used effectively only in the post cold war period, primarily where the target was close to southern Europe. A high relative-capability predominance of G8 members over the target country strongly produces the G8’s choice of force, but a high, direct, deadly threat from the target state to G8 countries does not. Geographic proximity and the connectivity coming from the former colonial relationship between G8 members and the target country only weakly cause the G8 to choose force. Support from the most relevant regional organization – the North Atlantic Treaty Organization – and support from the United Nations in the form of an authorizing UN Security Council or General Assembly resolution have a strong, positive effect on the G8’s choice of force. Accompanying accountability mechanisms from the G8 itself have a variable impact, as leaders’ iteration of the issue at subsequent summits does not increase compliance with G8 commitments on force-related cases, but their foreign ministers’ follow up does to a substantial degree.

  1. Secure and privacy enhanced gait authentication on smart phone.

    Science.gov (United States)

    Hoang, Thang; Choi, Deokjai

    2014-01-01

    Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a new biometric sample in the authentication phase. In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. Gait signals are acquired by using an inertial sensor named accelerometer in the mobile device and error correcting codes are adopted to deal with the natural variation of gait measurements. We evaluate our proposed system on a dataset consisting of gait samples of 34 volunteers. We achieved the lowest false acceptance rate (FAR) and false rejection rate (FRR) of 3.92% and 11.76%, respectively, in terms of key length of 50 bits.

  2. Secure and Privacy Enhanced Gait Authentication on Smart Phone

    Directory of Open Access Journals (Sweden)

    Thang Hoang

    2014-01-01

    Full Text Available Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a new biometric sample in the authentication phase. In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. Gait signals are acquired by using an inertial sensor named accelerometer in the mobile device and error correcting codes are adopted to deal with the natural variation of gait measurements. We evaluate our proposed system on a dataset consisting of gait samples of 34 volunteers. We achieved the lowest false acceptance rate (FAR and false rejection rate (FRR of 3.92% and 11.76%, respectively, in terms of key length of 50 bits.

  3. Considerations to Enhance the Florida Domestic Security Strategic Plan

    Science.gov (United States)

    2011-03-01

    State Homeland Security Strategy (Nebraska Emergency Mangement Agency, 2009) • Vermont Homeland Security Strategy (Vermont Department of Public... Mangement Agency. (2009). Nebraska 2009 state homeland security strategy. Retrieved August 19, 2010, from http://www.nema.ne.gov/content/home_news/2009

  4. Enhancing passenger safety and security in Ghana: Appraising ...

    African Journals Online (AJOL)

    There are increasing calls for regular monitoring and evaluation of safety and security strategies of public transport (PT) operators, especially in developing countries where PT safety and security concerns abound. In respect of this, this study examined the passenger safety and security interventions of PT operators in ...

  5. Water management and food security in vulnerable regions of China ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2014-06-23

    Jun 23, 2014 ... Securing food and water in Pakistan's vulnerable Indus River basin. The Indus River flows through the heart of Pakistan, weaving past mountains, forest, and desert to arrive at an impressive delta. View moreSecuring food and water in Pakistan's vulnerable Indus River basin ...

  6. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Crawford,C.; de Boer,G.; De Castro, K; Landers, Ph.D., J; Rogers, E

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." This paper will describe some of the key elements of a comprehensive, sustainable nuclear security culture enhancement program and how implementation can mitigate the insider threat.

  7. Enhanced Security-Constrained OPF With Distributed Battery Energy Storage

    Energy Technology Data Exchange (ETDEWEB)

    Wen, YF; Guo, CX; Kirschen, DS; Dong, SF

    2015-01-01

    This paper discusses how fast-response distributed battery energy storage could be used to implement post-contingency corrective control actions. Immediately after a contingency, the injections of distributed batteries could be adjusted to alleviate overloads and reduce flows below their short-term emergency rating. This ensures that the post-contingency system remains stable until the operator has redispatched the generation. Implementing this form of corrective control would allow operators to take advantage of the difference between the short-and long-term ratings of the lines and would therefore increase the available transmission capacity. This problem is formulated as a two-stage, enhanced security-constrained OPF problem, in which the first-stage optimizes the pre-contingency generation dispatch, while the second-stage minimizes the corrective actions for each contingency. Case studies based on a six-bus test system and on the RTS 96 demonstrate that the proposed method provides effective corrective actions and can guarantee operational reliability and economy.

  8. Novel Approaches to Enhance Mobile WiMAX Security

    Directory of Open Access Journals (Sweden)

    Taeshik Shon

    2010-01-01

    Full Text Available The IEEE 802.16 Working Group on Broadband Wireless Access Standards released IEEE 802.16-2004 which is a standardized technology for supporting broadband and wireless communication with fixed and nomadic access. After the IEEE 802.16-2004 standard, a new advanced and revised standard was released as the IEEE 802.16e-2005 amendment which is foundation of Mobile WiMAX network supporting handover and roaming capabilities. In the area of security aspects, compared to IEEE 802.16-2004, IEEE 802.16e, called Mobile WiMAX, adopts improved security architecture—PKMv2 which includes EAP authentication, AES-based authenticated encryption, and CMAC or HMAC message protection. However, there is no guarantee that PKMv2-based Mobile WiMAX network will not have security flaws. In this paper, we investigate the current Mobile WiMAX security architecture focusing mainly on pointing out new security vulnerabilities such as a disclosure of security context in network entry, a lack of secure communication in network domain, and a necessity of efficient handover supporting mutual authentication. Based on the investigation results, we propose a novel Mobile WiMAX security architecture, called RObust and Secure MobilE WiMAX (ROSMEX, to prevent the new security vulnerabilities.

  9. Stretching the Limits? Strengths and Pitfalls of South Atlantic Security Regionalism

    National Research Council Canada - National Science Library

    Pedro Seabra

    2017-01-01

    In the broader context of regional studies, the South Atlantic comes across as a singular, yet still understudied case study for the formation, evolution, and regression of security regionalism dynamics...

  10. A study on an information security system of a regional collaborative medical platform.

    Science.gov (United States)

    Zhao, Junping; Peng, Kun; Leng, Jinchang; Sun, Xiaowei; Zhang, Zhenjiang; Xue, Wanguo; Ren, Lianzhong

    2010-01-01

    The objective of this study was to share the experience of building an information security system for a regional collaborative medical platform (RCMP) and discuss the lessons learned from practical projects. Safety measures are analyzed from the perspective of system engineering. We present the essential requirements, critical architectures, and policies for system security of regional collaborative medical platforms.

  11. The Impact of Regional Higher Education Spaces on the Security of International Students

    Science.gov (United States)

    Forbes-Mewett, Helen

    2016-01-01

    The security of international students in regional higher education spaces in Australia has been overlooked. Contingency theory provides the framework for this case study to explore the organisational structure and support services relevant to a regional higher education space and how this impacts the security of international students. In-depth…

  12. The ASEAN Political-Security Community: Enhancing Defense Cooperation

    Science.gov (United States)

    2015-12-01

    impact of a domestic security issue in one country may spill over into others and create 36 “The...rebellions and separatist movements halted their activities. The countries still had to face the security impact of the China’s territorial claim in the...from becoming overpopulated —by moving Javanese to low-density islands: Kalimantan, Sumatera, Papua, and Sulawesi. 58 Collins, Security and Southeast

  13. The Domestic, Regional and Global Security Stakes in Kazakhstan

    Science.gov (United States)

    2004-12-01

    Focus on investment in good governance; • Promoting growth, poverty alleviation, environmental conservation and control of population growth...hurts global security, is weak control over the proliferation of weapons, weapons technology and expertise in Central Asia . Therefore, the United...

  14. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Rogers,E.; deBoer,G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  15. Enhanced Usage of Keys Obtained by Physical, Unconditionally Secure Distributions

    Science.gov (United States)

    Kish, Laszlo B.; Granqvist, Claes-Göran

    2015-04-01

    Unconditionally secure physical key distribution schemes are very slow, and it is practically impossible to use a one-time-pad based cipher to guarantee unconditional security for the encryption of data because using the key bits more than once gives out statistical information, for example via the known-plain-text-attack or by utilizing known components of the protocol and language statistics. Here, we outline a protocol that reduces this speed problem and allows almost-one-time-pad based communication with an unconditionally secure physical key of finite length. The physical, unconditionally secure key is not used for data encryption but is employed in order to generate and share a new software-based key without any known-plain-text component. The software-only-based key distribution is then changed from computationally secure to unconditionally secure, because the communicated key-exchange data (algorithm parameters, one-way functions of random numbers, etc.) are encrypted in an unconditionally secure way with a one-time-pad. For practical applications, this combined physical/software key distribution based communication looks favorable compared to the software-only and physical-only key distribution based communication whenever the speed of the physical key distribution is much lower than that of the software-based key distribution. A mathematical security proof of this new scheme remains an open problem.

  16. Ensuring Food Security Through Enhancing Microbiological Food Safety

    Science.gov (United States)

    Mikš-Krajnik, Marta; Yuk, Hyun-Gyun; Kumar, Amit; Yang, Yishan; Zheng, Qianwang; Kim, Min-Jeong; Ghate, Vinayak; Yuan, Wenqian; Pang, Xinyi

    2015-10-01

    Food safety and food security are interrelated concepts with a profound impact on the quality of human life. Food security describes the overall availability of food at different levels from global to individual household. While, food safety focuses on handling, preparation and storage of foods in order to prevent foodborne illnesses. This review focuses on innovative thermal and non-thermal technologies in the area of food processing as the means to ensure food security through improving food safety with emphasis on the reduction and control of microbiological risks. The antimicrobial efficiency and mechanism of new technologies to extend the shelf life of food product were also discussed.

  17. Evaluation the Role of Securities Market in Increasing the Regional Budget Revenues

    Directory of Open Access Journals (Sweden)

    Aleksandr Yemelyanovich Miller

    2015-09-01

    Full Text Available In the article, the relevant problem of increasing the regional budget revenues is investigated. The subject matter of the research is the securities market as a mechanism for the redistribution of financial resources. The purpose of the research is justification of the effective scheme feasible in the current environment of the interaction of the securities market and the regional budget. In the study of the above-mentioned subject, the hypothesis of a close relationship between state and non-state finance system was taken as a basis. The theoretical principle of the research supports the theory of the stock market; to achieve the purpose, the institutionally-functional approach to the study of state finances is applied. As the result of the research, possible common grounds of the securities market and the regional financial system are identified; the reserve of improving efficiency of the securities market in the Western Siberia regions are revealed; the model reflecting the dependence of tax revenues from the pace of regional economic development is constructed; promising areas for development of the securities market for the benefit of the regional economy and regional financial system are formulated; the possible effect from the development of regional securities market on regional budget revenues is estimated. The results mentioned above are recommended to be apllied when developing regional financial policies and programmes of region socio-economic development. A long-term stimulation of the growth in incomes of regional budgets is a very complex process, but with the proper elaboration of organizational issues, the implementation of the proposed scheme for interaction of the securities market and the regional financial system is capable to provide a steady increase in tax revenue in the short term and alleviate the problem of financing costs of the regional budget.

  18. Enhancement of Network Security Techniques using Quantum Cryptography

    OpenAIRE

    Navleen Kaur; Dr. Amardeep Singh,; Sarabpreet Singh

    2011-01-01

    Quantum cryptography uses the law of quantum physics for unconditionally secure data communications. This is a main achievement because the cryptography currently in use, known asconventional cryptography, relies completely on the hardness of a mathematical equation. The advances in quantum computing has threatened the computational security of classical cryptography, which in theory can efficiently compute the hard mathematical problems classical cryptography relies on. This paper makes a co...

  19. Security regionalism and flaws of externally forged peace in Sudan ...

    African Journals Online (AJOL)

    of promoting security with economic cooperation for increasing stability and development. ..... control of Nile waters after a possible secession of southern Sudan, and Libya's interest in extending its influence in ..... However, Garang's death in a helicopter accident in July 2005 exposed the vulnerability of the CPA relying on ...

  20. Security Sector Reform in the Arab Region | CRDI - Centre de ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    In the wake of 9-11, both the United States and the G-8 have launched initiatives aimed at reforming governance in the Middle East. Governance reform is impossible in most Arab states, however, without addressing the sensitive issue of security sector reform. And, due to its sensitivity, there is virtually no discussion in the ...

  1. Indicators of economic security of the region: a risk-based approach to assessing and rating

    Science.gov (United States)

    Karanina, Elena; Loginov, Dmitri

    2017-10-01

    The article presents the results of research of theoretical and methodical problems of strategy development for economic security of a particular region, justified by the composition of risk factors. The analysis of those risk factors is performed. The threshold values of indicators of economic security of regions were determined using the methods of socioeconomic statistics. The authors concluded that in modern Russian conditions it is necessary to pay great attention to the analysis of the composition and level of indicators of economic security of the region and, based on the materials of this analysis, to formulate more accurate decisions concerning the strategy of socio-economic development.

  2. Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2015-07-01

    Full Text Available Information technology (IT security has become a major concern due to the growing demand for information and massive development of client/server applications for various types of applications running on modern IT infrastructure. How has security been taken into account and which paradigms are necessary to minimize security issues while increasing efficiency, reducing the influence on transmissions, ensuring protocol independency and achieving substantial performance? We have found cryptography to be an absolute security mechanism for client/server architectures, and in this study, a new security design was developed with the MODBUS protocol, which is considered to offer phenomenal performance for future development and enhancement of real IT infrastructure. This study is also considered to be a complete development because security is tested in almost all ways of MODBUS communication. The computed measurements are evaluated to validate the overall development, and the results indicate a substantial improvement in security that is differentiated from conventional methods.

  3. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    Science.gov (United States)

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  4. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Paramasivan

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  5. Social Milieu Oriented Routing: A New Dimension to Enhance Network Security in WSNs

    National Research Council Canada - National Science Library

    Liu, Lianggui; Chen, Li; Jia, Huiling

    2016-01-01

    In large-scale wireless sensor networks (WSNs), in order to enhance network security, it is crucial for a trustor node to perform social milieu oriented routing to a target a trustee node to carry out trust evaluation...

  6. Regional Peace and Security Co-Operation Under the ...

    African Journals Online (AJOL)

    Three main factors are discussed: 1) domestic politics of the member countries influencing the posture, policies and decisions of member states in relation to regional politics and the regional organization; 2) intra state conflicts of member states and absence of a common ground among them on the regional cooperation; ...

  7. Developing a Public Key Infrastructure for a secure regional e-Health environment.

    Science.gov (United States)

    Pangalos, G; Mavridis, I; Ilioudis, C; Georgiadis, C

    2002-01-01

    Internet technologies provide an attractive infrastructure for efficient and low cost communications in regional health information networks. The advantages provided by the Internet come however with a significantly greater element of risk to the confidentiality and integrity of information. This is because the Internet has been designed primarily to optimize information sharing and interoperability, not security. The main objective of this paper is to propose the exploitation of public-key cryptography techniques to provide adequate security to enable secure healthcare Internet applications. Public-key cryptography techniques can provide the needed security infrastructure in regional health networks. In the regional health-care security framework presented in this paper, we propose the use of state-of-art Public Key Infrastructure (PKI) technology. Such on e-Health PKI consists of regional certification authorities that are implemented within the central hospitals of each region and provide their services to the rest of the healthcare establishments of the same region. Significant experience in this area has been gained from the implementation of the PKI@AUTH project. The developed PKI infrastructure already successfully provides its security services to the AHEPA university hospital. The same infrastructure is designed to easily support a number of hospitals participating in a regional health information network.

  8. Enhancing MISP with Fast Mobile IPv6 Security

    Directory of Open Access Journals (Sweden)

    Ilsun You

    2011-01-01

    Full Text Available The Mobile Broadband Association has developed the MIS and MISAUTH protocols as link-layer fast authentication protocols. A combination of MIS and MISAUTH protocols, called as MISP, provides secure and fast connection for a wireless access network, but it has been reported that MISP creates a weak session key and suffers from a denial-of-service attack. In addition, a transaction with an authentication server that is required for every authentication is considered as a delay factor during handovers. In this paper, we present an improvement of MISP that utilizes the fast handover approach of Fast Mobile IPv6 and minimizes an involvement of the authentication server while eliminating identified security drawbacks of MISP. The formal security analysis is performed to verify the correctness of the proposed scheme. Moreover, the handover performance of the proposed scheme is compared with an existing scheme.

  9. Enhanced security services for enabling pan-European healthcare networks.

    Science.gov (United States)

    Blobel, B; Pharow, P; Engel, K

    2001-01-01

    Establishing the Shared Care environment, communication and co-operation between healthcare establishments involved must be provided in a trustworthy way. This challenge is even more important for health networks using the Internet. In that context, services assuring both communication security and application security must be provided. Especially in the e-health environment, additionally to identity-related services certifying data or properties of principals, trustworthiness or authorisation for objects, components and functions must be established by Trusted Third Parties (TTP). Within the European Commission's Information Society Technologies (IST) Programme, the HARP project provides the "HARP Cross-Security Platform (HCSP)" needed in the open Web environment of pan-European networks. The solutions are under implementation and evaluation in the German ONCONET enabling a trustworthy framework for both health professionals and patients as well as supporting clinical studies.

  10. Physical enhanced security strategy implementation in WDM PON

    Science.gov (United States)

    Bai, K. Kalyani; Ashik T., J.; Kachare, Nitin; Kumar, D. Sriram

    2017-06-01

    The enormous growth in data traffic in optical networks has raised the requirement of broadband access networks. Passive Optical Networks (PON) is capable of solving the power, bandwidth and cost problems. Time Division Multiplexed PON (TDM PON) uses a point to multipoint design which is currently being used for data transmission that initiated the requirement of maintaining customer's security in the downstream direction. These security impairments trigger the need of scrutiny for fault monitoring and eavesdropping in PONs. This paper demonstrates the Wavelength Division Multiplexed PONs (WDM-PON) using scrambling and fault monitoring to provide security which is absent in TDM passive optical networks. Results have been validated at 10 Gbps data rate using OPTISYSTEM12 simulation tool.

  11. Solar-powered drip irrigation enhances food security in the Sudano–Sahel

    Science.gov (United States)

    Burney, Jennifer; Woltering, Lennart; Burke, Marshall; Naylor, Rosamond; Pasternak, Dov

    2010-01-01

    Meeting the food needs of Africa’s growing population over the next half-century will require technologies that significantly improve rural livelihoods at minimal environmental cost. These technologies will likely be distinct from those of the Green Revolution, which had relatively little impact in sub-Saharan Africa; consequently, few such interventions have been rigorously evaluated. This paper analyzes solar-powered drip irrigation as a strategy for enhancing food security in the rural Sudano–Sahel region of West Africa. Using a matched-pair comparison of villages in northern Benin (two treatment villages, two comparison villages), and household survey and field-level data through the first year of harvest in those villages, we find that solar-powered drip irrigation significantly augments both household income and nutritional intake, particularly during the dry season, and is cost effective compared to alternative technologies. PMID:20080616

  12. FORMATION OF THE MECHANISMS OF FOOD SECURITY AT THE REGIONAL LEVEL

    Directory of Open Access Journals (Sweden)

    Alla Uzhva

    2016-11-01

    Full Text Available An important challenge today is to strengthen food security and improve people's lives through increasing competitive products. The crucial vector of forming food security is activities of agricultural business, which are directly responsible to the people for providing sufficient high-quality food. In terms of the desire of Ukraine to integrate as a full partner in the European and world community, the problem of food security is of special significance. The need for food security of Ukraine requires maintaining an appropriate level of food self-sufficiency, which involves the use of state support for domestic agricultural producers and measures of import controls to protect own producers from foreign competition. Subject. The combination of theoretical, methodological approaches and organizational measures to create mechanisms in order to ensure food security at regional level. Methods. Methods of comparison, analysis, theoretical and logical synthesis, graphical method are used. The methodological basis is a comprehensive research method. Purpose. The purpose of the research is to substantiate the need to develop mechanisms to ensure food security of regions in transition to the concept of sustainable development. Results. It is established that the priorities of sustainable development of the agricultural sector in the region are the formation of food security, at the same time, a set of principles is defined that ensure sustainable development of regions; food security indicators are formed for the people of the region. Components of mechanisms are proposed, which regulate food security of regions and contribute to provision of the population with quality products in sufficient quantity. It is found that the basis for monitoring food security in the region and development of mechanisms to ensure it is the reproduction approach that will help to reveal the totality of processes of “production-distributionexchange- consumption” in the

  13. VIRTUAL COGNITIVE CENTERS AS INTELLIGENT SYSTEMS FOR MANAGEMENT INFORMATION SUPPORT OF REGIONAL SECURITY

    OpenAIRE

    A. V. Masloboev

    2014-01-01

    The paper deals with engineering problems and application perspectives of virtual cognitive centers as intelligent systems for information support of interagency activities in the field of complex security management of regional development. A research prototype of virtual cognitive center for regional security management in crisis situations, implemented as hybrid cloud service based on IaaS architectural framework with the usage of multi-agent and web-service technologies has been developed...

  14. Nuclear power in Northern Russia: A case study on future energy security in the Murmansk region

    Energy Technology Data Exchange (ETDEWEB)

    Kinnunen, Miia [Haemeenkatu 7 D, 33100 Tampere (Finland)]. E-mail: miia.kinnunen@tse.fi; Korppoo, Anna [Haemeenkatu 7 D, 33100 Tampere (Finland); Imperial College London, Centre for Environmental Policy, RSM Building, Prince Consort Road, London SW7 2BP (United Kingdom)

    2007-05-15

    The economy of the Murmansk region in Russia is based on energy intensive industry, mainly metallurgies, and consequently, the region is highly dependant on the ageing Kola nuclear power plant. This interdependence together with other weaknesses in the regional energy system creates threats to the energy supply security of the region. This paper analyses the internal and external threats influencing the region and presents potential solutions. Scenarios further illustrate possible future paths these potential solutions could deliver by the year 2025.

  15. Managing climatic risks for enhanced food security: Key information capabilities

    NARCIS (Netherlands)

    Balaghi, R.; Badjeck, M.C.; Bakari, D.; Pauw, de E.D.; Wit, de A.J.W.; Defourny, P.; Donato, S.; Gommes, R.; Jlibene, M.; Ravelo, A.C.; Sivakumar, M.V.K.; Telahigue, N.; Tychon, B.

    2010-01-01

    Food security is expected to face increasing challenges from climatic risks that are more and more exacerbated by climate change, especially in the developing world. This document lists some of the main capabilities that have been recently developed, especially in the area of operational

  16. Animal rights and welfare advocacy for enhanced food security in ...

    African Journals Online (AJOL)

    The tropical conditions of the Nigerian environment favours domestic and wild animal production. It, therefore, not only offers ample investment opportunities in the livestock sub-sector of the economy, but also guarantees food security for the nation. This study examined basic animal welfare rights, and ascertained selected ...

  17. Biometric Enhancement of Home and Office Security to Reduce ...

    African Journals Online (AJOL)

    Insecurity is posing national threat in Nigeria today. You do not know who your next door neighbor is, because of security challenges in the country. Indiscriminate killing of innocent people, kidnapping, fraud by unknown person is becoming a worrisome national problem. The question is how do we minimize this menace?

  18. Secure and Privacy Enhanced Gait Authentication on Smart Phone

    OpenAIRE

    Thang Hoang; Deokjai Choi

    2014-01-01

    Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a ...

  19. Enhancing China’s Energy Security: Determining Influential Factors ad Effective Strategic Measures

    DEFF Research Database (Denmark)

    Ren, Jingzheng; Sovacool, Benjamin, K.

    2014-01-01

    This study investigates the most influential factors affecting China’s energy security. It also identifies the most effective strategic measures for enhancing it. Fuzzy AHP has been used to determine weights for ranking the importance of Chinese energy security factors, and it has also been used...... to determine the priorities of the strategic measures with respect to enhancing those same factors. The study argues that a low proportion of renewable energy penetration is the most severe factor threatening China’s energy security, and that conducting research and development on energy technologies...... and improving energy efficiency is the most salient, positive, and necessary strategic measure....

  20. Enhanced ATM Security using Biometric Authentication and Wavelet Based AES

    Directory of Open Access Journals (Sweden)

    Sreedharan Ajish

    2016-01-01

    Full Text Available The traditional ATM terminal customer recognition systems rely only on bank cards, passwords and such identity verification methods are not perfect and functions are too single. Biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. This paper presents a highly secured ATM banking system using biometric authentication and wavelet based Advanced Encryption Standard (AES algorithm. Two levels of security are provided in this proposed design. Firstly we consider the security level at the client side by providing biometric authentication scheme along with a password of 4-digit long. Biometric authentication is achieved by considering the fingerprint image of the client. Secondly we ensure a secured communication link between the client machine to the bank server using an optimized energy efficient and wavelet based AES processor. The fingerprint image is the data for encryption process and 4-digit long password is the symmetric key for the encryption process. The performance of ATM machine depends on ultra-high-speed encryption, very low power consumption, and algorithmic integrity. To get a low power consuming and ultra-high speed encryption at the ATM machine, an optimized and wavelet based AES algorithm is proposed. In this system biometric and cryptography techniques are used together for personal identity authentication to improve the security level. The design of the wavelet based AES processor is simulated and the design of the energy efficient AES processor is simulated in Quartus-II software. Simulation results ensure its proper functionality. A comparison among other research works proves its superiority.

  1. Regional Integration and Food security in Eastern Africa | Alusa ...

    African Journals Online (AJOL)

    are dependant on food intervention for their daily food requirement needs. Although food insecurity in the region is often attributed to natural disasters such as recurrent droughts, inappropriate policies that have failed to address the region's problems within the context of an increasingly globalized economy have also ...

  2. Armament Escalation and Regional Security in the Middle East ...

    African Journals Online (AJOL)

    It argues that the insecurity in the Middle East particularly arise as a result of the alteration of the regional military balance, destruction as a result of covert means and as a result of defense mechanism which has consistently endangered the lives and properties of the inhabitants of the Region. The paper concludes that ...

  3. An Enhanced Erasure Code-Based Security Mechanism for Cloud Storage

    Directory of Open Access Journals (Sweden)

    Wenfeng Wang

    2014-01-01

    Full Text Available Cloud computing offers a wide range of luxuries, such as high performance, rapid elasticity, on-demand self-service, and low cost. However, data security continues to be a significant impediment in the promotion and popularization of cloud computing. To address the problem of data leakage caused by unreliable service providers and external cyber attacks, an enhanced erasure code-based security mechanism is proposed and elaborated in terms of four aspects: data encoding, data transmission, data placement, and data reconstruction, which ensure data security throughout the whole traversing into cloud storage. Based on the mechanism, we implement a secure cloud storage system (SCSS. The key design issues, including data division, construction of generator matrix, data encoding, fragment naming, and data decoding, are also described in detail. Finally, we conduct an analysis of data availability and security and performance evaluation. Experimental results and analysis demonstrate that SCSS achieves high availability, strong security, and excellent performance.

  4. Autonomous Voltage Security Regions to Prevent Cascading Trip Faults in Wind Turbine Generators

    DEFF Research Database (Denmark)

    Niu, Tao; Guo, Qinglai; Sun, Hongbin

    2016-01-01

    Cascading trip faults in large-scale wind power centralized integration areas bring new challenges to the secure operation of power systems. In order to deal with the complexity of voltage security regions and the computation difficulty, this paper proposes an autonomous voltage security region...... (AVSR) for each wind farm and the point of common coupling (PCC) substation, whose voltage can be controlled in a decoupled way. The computation of the AVSR can be completed using a stepwise search method exchanging voltage and power information between the control center and the wind farms. At each...... wind farm, an AVSR is determined to guarantee the normal operation of each wind turbine generator (WTG), while in the control center, each region is designed in order to guarantee secure operation both under normal conditions and after an N-1 contingency. A real system in Northern China was used...

  5. Brazilian Policy and the Creation of a Regional Security Complex in the South Atlantic: Pax Brasiliana?

    Directory of Open Access Journals (Sweden)

    Beatriz Rodrigues Bessa Mattos

    Full Text Available Abstract Over the past five years, the South Atlantic region has become a central element of Brazilian security policy, with Brazil actively supporting the notion of a trans-oceanic security consciousness involving African littoral states. It has invested in diplomatic initiatives such as the Zone of Peace and Cooperation of the South Atlantic (ZPCSA, or ZOPACAS, and extensive military co-operation with West African states such as São Tomé e Príncipe, Namibia and Cape Verde. Its internal security and defence policy documents have repeatedly been updated to reflect this dimension, and now provide the foundation for advancing these initiatives. This policy thrust is directed at securing Brazil’s offshore oil assets, and limiting the influence of what it has termed ‘extra-regional powers’ such as the P-5. This article highlights these initiatives and reviews the prospects for this policy by examining the plausibility of the South Atlantic region as a regional security complex in the sense coined by Buzan and Wæver. The analysis is based on the role of geographical and linguistic proximity in international relations, and the impact of multilateral bodies on building support for a regional approach to security governance.

  6. Security enhanced BioEncoding for protecting iris codes

    Science.gov (United States)

    Ouda, Osama; Tsumura, Norimichi; Nakaguchi, Toshiya

    2011-06-01

    Improving the security of biometric template protection techniques is a key prerequisite for the widespread deployment of biometric technologies. BioEncoding is a recently proposed template protection scheme, based on the concept of cancelable biometrics, for protecting biometric templates represented as binary strings such as iris codes. The main advantage of BioEncoding over other template protection schemes is that it does not require user-specific keys and/or tokens during verification. Besides, it satisfies all the requirements of the cancelable biometrics construct without deteriorating the matching accuracy. However, although it has been shown that BioEncoding is secure enough against simple brute-force search attacks, the security of BioEncoded templates against more smart attacks, such as record multiplicity attacks, has not been sufficiently investigated. In this paper, a rigorous security analysis of BioEncoding is presented. Firstly, resistance of BioEncoded templates against brute-force attacks is revisited thoroughly. Secondly, we show that although the cancelable transformation employed in BioEncoding might be non-invertible for a single protected template, the original iris code could be inverted by correlating several templates used in different applications but created from the same iris. Accordingly, we propose an important modification to the BioEncoding transformation process in order to hinder attackers from exploiting this type of attacks. The effectiveness of adopting the suggested modification is validated and its impact on the matching accuracy is investigated empirically using CASIA-IrisV3-Interval dataset. Experimental results confirm the efficacy of the proposed approach and show that it preserves the matching accuracy of the unprotected iris recognition system.

  7. Security Enhancement Using Mutual Authentication in Existing CDMA Systems

    OpenAIRE

    L. Krishna Bharathi; Gnanou Florence Sudha

    2010-01-01

    Even though CDMA2000 wireless networks are being widely deployed as a cellular digital standard around the world, it has some hidden vulnerabilities concerned with security issues. The existing CDMA systems use authentication mechanism by CAVE (Cellular Authentication and Voice Encryption) algorithm. This authentication method has several disadvantages. Only one way authentication is provided, that is, only a base station authenticates a subscriber. And, CAVE algorithm is prone to cryptograph...

  8. Problems and Tools for the Detection of Threats to Personnel Security in the Region

    Directory of Open Access Journals (Sweden)

    Natalia Victorovna Kuznetsova

    2016-12-01

    Full Text Available The investigation of threats negatively affecting the state and the development of human resources as well as the varieties of security threats is of particular importance in the theory and practice of personnel security measures. The purpose of the article is to identify and classify the ideas of the main threats to personnel security of the region (the research is carried out on the example of the Irkutsk region. On the basis of the content analysis of Russian regulatory legal acts and scientific publications, external and internal threats to personnel security of the region are highlighted. As a result, the list of threats to personnel security of the region consisting of 37 stands is composed. The political, economic, demographic, social, technical and technological, ecological, legal, ethnocultural forms of threats are demonstrated. The authors came to the conclusion that the internal threats to personnel security of the region (first of all socio-economic are dominant. An assessment of the urgency and relevance of the threats to the personnel security of the region is given. With the use of the technology of the hierarchical factorial analysis, the types of threats (factors of the lowest level were identified and their influence on the general level of the urgency of personnel security threats (a factor of the highest level is estimated. It is revealed that legal threats, as well as threats caused by the low labour potential of the region, have the most significant impact on the estimation of the urgency of threats. The study applies the following analysis methods — a content analysis, the analysis of linear and cross-distribution, hierarchical factor and correlation analysis. The analysis is based on the data of the expert survey conducted in the Irkutsk region (2015. To determine the relationship (coherence of the expert evaluations, the Kendall’s coefficient of concordance is calculated. The received results can be used for studying

  9. A Food in Health Security (FIHS) platform in the Asia-Pacific Region: the way forward.

    Science.gov (United States)

    Wahlqvist, Mark L; Keatinge, John Donough H; Butler, Colin D; Friel, Sharon; McKay, John; Easdown, Warwick; Kuo, Ken N; Huang, Ching-jang; Pan, Wen-Harn; Yang, Ray-Yu; Lee, Meei-Shyuan; Chang, Hsing-Yi; Chiu, Ya-Wen; Jaron, Dov; Krawinkel, Michael; Barlow, Snow; Walsh, Greg; Chiang, Tung-liang; Huang, Po-Chao; Li, Duo

    2009-01-01

    The advent of multiple global crises, especially those of climate change, economics, energy, water, food and health evident in 2008, is of considerable moment to those who are suffering their consequences and for those with responsibility and interest in the systems affected. A coalition of parties in the Asia Pacific Region who work in the food and health systems met in August, 2009 in Taiwan and instigated a Food in Health Security (FIHS) Network which might join with other like-minded networks in and beyond the region. Sustainable health has many dimensions, among which food and nutrition is often neglected; there is a wide spectrum of nutritionally-related disorders. Malnutrition remains the global concern for agricultural research and development scientists and linkage with the health sector is key to progress. The disconnect between agricultural and health sectors negatively impacts consumer nutrition and health. Ethical and equity affect food and health systems. Food and health security is attainable only when the underlying social inequities are addressed; it is an ethical issue as reflected in the UN Universal declaration of Human Rights which includes the right to food for health and well-being. Food and health security are part of the larger security agenda and merit corresponding attention. Policy recommendations with immediacy are greater investment in combined food and health research; an Asia Pacific security agenda which emphasizes planetary, human, health and food security as relevant to traditional defence security; and community and household security measures which include maternal literacy, communication technology and entrepreneurial opportunity.

  10. State regulation as a tool for improving the economic security of the regions

    Directory of Open Access Journals (Sweden)

    Yu. M. Sokolinskaya

    2017-01-01

    Full Text Available Providing economic security for the development of regions, increasing their competitiveness, risk-free and sustainable activities are the main tasks of the regional program of social and economic development, which occupies a special place in the system of instruments for public management of these processes. The program of social and economic development is a unique strategy of the region aimed at security and optimization of the spatial structure and relations between the center and the regions in order to ensure economic security and growth by maximizing the effective use of existing internal and external factors. The institutional influence of the state in order to improve the economic security of regions and enterprises occurs palliatively when the business of the region is supported in direct – subsidies, and more often indirectly – compliance with the laws and regulations of the Russian Federation and the region, on the principles of institutional and market synergies. Adaptation of enterprises in the region to the market is difficult, when specific socio-organizational, economic, technical and technological, scientific, information activities in their interrelations function in the field of Russian laws. The search for ways to improve the economic security of the Russian Federation, regions and enterprises takes place in the context of global integration through the improvement of the mechanism of state regulation. An important task of the current stage of economic security of the country and regions is the construction of a system of its institutional organization that would be able to balance the levers of government with the opportunities of private enterprises, provide a quality level of providing the business with protection from terrorism, predation, financial risks, legal competition etc.

  11. Economic Evaluation of the Information Security Levels Achieved by Electric Energy Providers in North Arctic Region

    Science.gov (United States)

    Sushko, O. P.; Kaznin, A. A.; Babkin, A. V.; Bogdanov, D. A.

    2017-10-01

    The study we are conducting involves the analysis of information security levels achieved by energy providers operating in the North Arctic Region. We look into whether the energy providers’ current information security levels meet reliability standards and determine what further actions may be needed for upgrading information security in the context of the digital transformation that the world community is undergoing. When developing the information security systems for electric energy providers or selecting the protection means for them, we are governed by the fact that the assets to be protected are process technologies. While information security risk can be assessed using different methods, the evaluation of the economic damage from these risks appears to be a difficult task. The most probable and harmful risks we have identified when evaluating the electric energy providers’ information security will be used by us as variables. To provide the evaluation, it is necessary to calculate the costs relating to elimination of the risks identified. The final stage of the study will involve the development of an operation algorithm for the North Arctic Region’s energy provider’s business information protection security system – a set of information security services, and security software and hardware.

  12. FOOD SECURITY IN THE VOLGOGRAD REGION AND DIRECTIONS OF ITS IMPROVEMENT

    Directory of Open Access Journals (Sweden)

    Maksim Pridachuk

    2018-01-01

    Full Text Available Ensuring food security at the national and regional levels is considered as the main factor of economic safety of the country and improvement of the level and life quality of the population. The Volgograd region is an industrial-agrarian region, 78 % of which is represented by agricultural lands. The analysis of food security shows that over the past five years a greater number of agricultural products grew in volume production. The level of food security in terms of food self-sufficiency in most cases is at a high level. The Volgograd region provides such products as cereal, potatoes, vegetables, melon food, eggs. A significant problem for the region is the lack of availability of meat products. Consumption of some foodstuff by the population of the Volgograd region has decreased. According to the analysis of food security of the Volgograd region, it can be concluded that during 2011-2015 the region was characterized by a high level of it. Among all kinds of products that are produced at the territory of the Volgograd region, meat products have the worst dynamics in terms of production volumes. The authors recommend to create the meat cluster which would include agricultural enterprises, educational and research institutions, business entities and infrastructure objects. The purpose of creating this cluster consists in the cooperation between its elements and the reduction of effectiveness through innovation in production.

  13. Good Manufacturing Practices (GMP) / Good Laboratory Practices (GLP) Review and Applicability for Chemical Security Enhancements

    Energy Technology Data Exchange (ETDEWEB)

    Iveson, Steven W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). International Chemical Security Threat Reduction

    2014-11-01

    Global chemical security has been enhanced through the determined use and integration of both voluntary and legislated standards. Many popular standards contain components that specifically detail requirements for the security of materials, facilities and other vital assets. In this document we examine the roll of quality management standards and how they affect the security culture within the institutions that adopt these standards in order to conduct business within the international market place. Good manufacturing practices and good laboratory practices are two of a number of quality management systems that have been adopted as law in many nations. These standards are designed to protect the quality of drugs, medicines, foods and analytical test results in order to provide the world-wide consumer with safe and affective products for consumption. These standards provide no established security protocols and yet manage to increase the security of chemicals, materials, facilities and the supply chain via the effective and complete control over the manufacturing, the global supply chains and testing processes. We discuss the means through which these systems enhance security and how nations can further improve these systems with additional regulations that deal specifically with security in the realm of these management systems. We conclude with a discussion of new technologies that may cause disruption within the industries covered by these standards and how these issues might be addressed in order to maintain or increase the level of security within the industries and nations that have adopted these standards.

  14. Enhanced way of securing automated teller machine to track the misusers using secure monitor tracking analysis

    Science.gov (United States)

    Sadhasivam, Jayakumar; Alamelu, M.; Radhika, R.; Ramya, S.; Dharani, K.; Jayavel, Senthil

    2017-11-01

    Now a days the people's attraction towards Automated Teller Machine(ATM) has been increasing even in rural areas. As of now the security provided by all the bank is ATM pin number. Hackers know the way to easily identify the pin number and withdraw money if they haven stolen the ATM card. Also, the Automated Teller Machine is broken and the money is stolen. To overcome these disadvantages, we propose an approach “Automated Secure Tracking System” to secure and tracking the changes in ATM. In this approach, while creating the bank account, the bank should scan the iris known (a part or movement of our eye) and fingerprint of the customer. The scanning can be done with the position of the eye movements and fingerprints identified with the shortest measurements. When the card is swiped then ATM should request the pin, scan the iris and recognize the fingerprint and then allow the customer to withdraw money. If somebody tries to break the ATM an alert message is given to the nearby police station and the ATM shutter is automatically closed. This helps in avoiding the hackers who withdraw money by stealing the ATM card and also helps the government in identifying the criminals easily.

  15. China’s Space Capabilities and Their Regional Security Implications

    Science.gov (United States)

    2011-03-18

    technology export controls imposed by the U.S. and other Western powers. More importantly, with increased space capability and sophistication, China is...U.S. congress and other international non-proliferation organizations extremely cautious about its export of dual-purpose space technology to Iran...highlights its aims as: “to explore outer space, and enhance understanding of the Earth and the cosmos ; to utilize outer space for peaceful

  16. Enhancing the security of LTE networks against jamming attacks

    National Research Council Canada - National Science Library

    Jover, Roger Piqueras; Lackey, Joshua; Raghavan, Arvind

    2014-01-01

    The long-term evolution (LTE) is the newly adopted technology to offer enhanced capacity and coverage for current mobility networks, which experience a constant traffic increase and skyrocketing bandwidth demands...

  17. Toward a Regional Security Architecture for the Horn of Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Horn of Africa region has endured decades of destruction and human suffering due to long and interrelated wars. Moreover, conflict in one country tends to affect its neighbours, mainly through the flow of refugees and weapons. Building on work carried out during Phase I (100913), researchers will analyze the ...

  18. VIRTUAL COGNITIVE CENTERS AS INTELLIGENT SYSTEMS FOR MANAGEMENT INFORMATION SUPPORT OF REGIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    A. V. Masloboev

    2014-03-01

    Full Text Available The paper deals with engineering problems and application perspectives of virtual cognitive centers as intelligent systems for information support of interagency activities in the field of complex security management of regional development. A research prototype of virtual cognitive center for regional security management in crisis situations, implemented as hybrid cloud service based on IaaS architectural framework with the usage of multi-agent and web-service technologies has been developed. Virtual cognitive center is a training simulator software system and is intended for solving on the basis of distributed simulation such problems as: strategic planning and forecasting of risk-sustainable development of regional socioeconomic systems, agents of management interaction specification synthesis for regional components security in different crisis situations within the planning stage of joint anti-crisis actions.

  19. American Policy in the Persian Gulf Region: Peace, Security, and the Spread of Democracy

    National Research Council Canada - National Science Library

    Fox, Darin J

    2008-01-01

    To achieve lasting security in the Arabian Gulf region, U.S. policy, though currently focused on Iraq, must engage Saudi Arabia and Iran with all of its instruments of national power to encourage the spread of democracy within the region...

  20. The emerging architecture of a regional security complex in the Lake ...

    African Journals Online (AJOL)

    This article explores the emerging regional security architecture to fight terrorism and insurgency in the Lake Chad Basin (LCB). It diagnoses the evolution of the Lake Chad Basin Commission (LCBC) as a sub-regional organization that unites Chad, Cameroon, Niger and Nigeria. In particular, the article critically investigates ...

  1. Privacy-Enhancing Security Protocol in LTE Initial Attack

    Directory of Open Access Journals (Sweden)

    Uijin Jang

    2014-12-01

    Full Text Available Long-Term Evolution (LTE is a fourth-generation mobile communication technology implemented throughout the world. It is the communication means of smartphones that send and receive all of the private date of individuals. M2M, IOT, etc., are the base technologies of mobile communication that will be used in the future cyber world. However, identification parameters, such as International Mobile Subscriber Identity (IMSI, Radio Network Temporary Identities (RNTI, etc., in the initial attach section for accessing the LTE network are presented with the vulnerability of being exposed as clear text. Such vulnerability does not end in a mere identification parameter, but can lead to a secondary attack using the identification parameter, such as replication of the smartphone, illegal use of the mobile communication network, etc. This paper proposes a security protocol to safely transmit identification parameters in different cases of the initial attach. The proposed security protocol solves the exposed vulnerability by encrypting the parameters in transmission. Using an OPNET simulator, it is shown that the average rate of delay and processing ratio are efficient in comparison to the existing process.

  2. The China Factor in Regional Security Cooperation: The ASEAN Regional Forum and the Shanghai Cooperation Organization

    Directory of Open Access Journals (Sweden)

    Alfred Gerstl

    2008-01-01

    Full Text Available This article argues that regional security cooperation in South-East Asia, mainly promoted by the Association of Southeast Asian Nations (ASEAN, is a response to China´s economic rise. Although China is not regarded as a military challenge, Beijing’s ascension threatens to undermine the regional balance of power. The emerging insecurities threaten the stability of the regimes whose power is based on output legitimacy. Cooperation, the thesis states, can reduce these uncertainties. Yet, whereas collaboration in the ASEAN Regional Forum (ARF offers Beijing incentives for the strengthening of its “enlightened” multilateralism, regional cooperation in the Shanghai Cooperation Organization (SCO will not change China’s behaviour. The reason is that this cooperation is based on Realpolitik motives. Offensive Realism seems therefore well suited to analyse the Central Asian power relations. Even though the dimension of cooperation has not been included in John Mearsheimer’s approach, this article demonstrates that it can conceptually be integrated into offensive Realism without contradicting its core theses. For this, however, its adherents must accept two assumptions: First, that the domestic political logic – in case of Beijing the output legitimacy of the Communist Party – must be integrated. Second, that there exists no automatism in international politics. Otherwise one would have to speak of the tragic of offensive Realism: Policies, based on this perception, does not offer China sufficient incentives to further pursue multilateralism. ----- In diesem Aufsatz wird argumentiert, dass die regionale sicherheitspolitische Integration in SüdostundNordostasien, primär von der südostasiatischen Staatengemeinschaft ASEAN vorangetrieben, eine Reaktion auf Chinas wirtschaftlichen Aufstieg verkörpert. Dieser droht das regionale Kräftegleichgewicht zu untergraben, wodurch er Unsicherheiten weckt und damit eine Gefahr für die auf Stabilit

  3. Power system security enhancement with unified power flow controller under multi-event contingency conditions

    Directory of Open Access Journals (Sweden)

    S. Ravindra

    2017-03-01

    Full Text Available Power system security analysis plays key role in enhancing the system security and to avoid the system collapse condition. In this paper, a novel severity function is formulated using transmission line loadings and bus voltage magnitude deviations. The proposed severity function and generation fuel cost objectives are analyzed under transmission line(s and/or generator(s contingency conditions. The system security under contingency conditions is analyzed using optimal power flow problem. An improved teaching learning based optimization (ITLBO algorithm has been presented. To enhance the system security under contingency conditions in the presence of unified power flow controller (UPFC, it is necessary to identify an optimal location to install this device. Voltage source based power injection model of UPFC, incorporation procedure and optimal location identification strategy based on line overload sensitivity indexes are proposed. The entire proposed methodology is tested on standard IEEE-30 bus test system with supporting numerical and graphical results.

  4. The Arctic Region: A Requirement for New Security Architecture?

    Science.gov (United States)

    2013-03-01

    Council as the only circumpolar body and the leading political body for Arctic issues38. Norway also intends to step up its efforts to focus attention on...5711 14. ABSTRACT Global interest in the Arctic will inevitably increase even more in the coming years. International interest in the Arctic will...to manage. This requires a solid, effective regional and global cooperation that constantly adapts to new opportunities and conditions. The Arctic

  5. The Caspian Sea regionalism in a globalized world: Energy security and regional trajectories of Azerbaijan and Iran

    Science.gov (United States)

    Hedjazi, Babak

    2007-12-01

    This dissertation is fundamentally about the formation of new regional spaces in Central Eurasia viewed from a dynamic, comparative and historical approach. Analyzing the global-local economic and political interactions and their consequences on resource rich countries of the Caspian Sea enable us to reframe security as a central element of the new global order. In this respect, the dissertation examines how two particular states, Azerbaijan and Iran, respond to the changing global security environment and optimize their capacity to absorb or control change. Here, security as I conceive is multidimensional and engages various social, political and economic domains. My research is articulated along three hypotheses regarding the formation of a new regional space and its consequences on territorial polarization and interstate rivalry. These hypotheses, respectively and cumulatively, elucidate global and domestic contexts of regional space formation, regional strategic and discursive trajectories, and regional tensions of global/local interactions. In order to empirically test these hypotheses, a series of thirty interviews were conducted by the author with local and foreign business representatives, civilian and government representatives, and corroborated by economic data collected from the International Energy Agency. The findings of the research validate the primary assumption of the dissertation that Azerbaijan and Iran have chosen the regional scale to address discrepancies between their aspired place in the new world order and the reality of their power and international status. Extending the argument for structural scarcity of oil towards contenders, this dissertation concludes that the Caspian oil has become a fundamental element of the regional discourse. The mismatch between the rhetoric of sovereign rights and energy security on one side and the reality of regional countries' powerlessness and their need to reach international markets on the other side are

  6. Enhancing Earth Observation Capacity in the Himalayan Region

    Science.gov (United States)

    Shrestha, B. R.

    2012-12-01

    Earth observations bear special significance in the Himalayan Region owing to the fact that routine data collections are often hampered by highly inaccessible terrain and harsh climatic conditions. The ongoing rapid environmental changes have further emphasized its relevance and use for informed decision-making. The International Center for Integrated Mountain Development (ICIMOD), with a regional mandate is promoting the use of earth observations in line with the GEOSS societal benefit areas. ICIMOD has a proven track record to utilize earth observations notably in the areas of understanding glaciers and snow dynamics, disaster risk preparedness and emergency response, carbon estimation for community forestry user groups, land cover change assessment, agriculture monitoring and food security analysis among others. This paper presents the challenges and lessons learned as a part of capacity building of ICIMOD to utilize earth observations with the primary objectives to empower its member countries and foster regional cooperation. As a part of capacity building, ICIMOD continues to make its efforts to augment as a regional resource center on earth observation and geospatial applications for sustainable mountain development. Capacity building possesses multitude of challenges in the region: the complex geo-political reality with differentiated capacities of member states, poorer institutional and technical infrastructure; addressing the needs for multiple user and target groups; integration with different thematic disciplines; and high resources intensity and sustainability. A capacity building framework was developed based on detailed needs assessment with a regional approach and strategy to enhance capability of ICIMOD and its network of national partners. A specialized one-week training course and curriculum have been designed for different thematic areas to impart knowledge and skills that include development practitioners, professionals, researchers and

  7. Can security-enhancing interventions overcome psychological barriers to responsiveness in couple relationships?

    Science.gov (United States)

    Mikulincer, Mario; Shaver, Phillip R; Sahdra, Baljinder K; Bar-On, Naama

    2013-01-01

    Recent studies have shown that both dispositional and experimentally enhanced attachment security facilitate compassion and altruism. Here we report findings from a laboratory experiment, replicated in two countries (Israel and the United States), testing the hypotheses that (a) increased security (accomplished through subliminal priming) fosters caregiving behavior toward a romantic partner who discloses a personal problem, and (b) this increased security overcomes barriers to responsiveness induced by mental depletion. We gathered data on participants' attachment insecurities, randomly assigned them to one of four mental depletion (yes, no) and priming (security, neutral) conditions, and coded their behavior in an interaction with their romantic partner who was disclosing a personal problem. Dispositional attachment insecurities and manipulated mental depletion adversely affected caregiving, but security priming overrode the detrimental effects of both mental depletion and attachment insecurity in both Israel and the United States.

  8. The Impact of the Soviet Military Presence in the Arctic Region on Norwegian Security Policies

    Science.gov (United States)

    1990-01-01

    Furlong , a Norwegian Defense expert, wrote in International Defense Review in 1979: "Senior NATO commanders and intelligence officers in the Baltic...Defense. 21 R.D.M. Furlong , "The Threat to Northern Europe", International Defense Review, vol 4, (1979): 518. 22 Sjaastad, "Security Problems on the...Objectives in the Arctic region can be broken down into three categories; political, economic and security. Writing in 1988, Stephen Meyer listed the

  9. Prospect Theory for Enhanced Cyber-Physical Security of Drone Delivery Systems: A Network Interdiction Game

    OpenAIRE

    Sanjab, Anibal; Saad, Walid; Başar, Tamer

    2017-01-01

    The use of unmanned aerial vehicles (UAVs) as delivery systems of online goods is rapidly becoming a global norm, as corroborated by Amazon's "Prime Air" and Google's "Project Wing" projects. However, the real-world deployment of such drone delivery systems faces many cyber-physical security challenges. In this paper, a novel mathematical framework for analyzing and enhancing the security of drone delivery systems is introduced. In this regard, a zero-sum network interdiction game is formulat...

  10. Security Enhanced EMV-Based Mobile Payment Protocol

    Directory of Open Access Journals (Sweden)

    Ming-Hour Yang

    2014-01-01

    Full Text Available Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant’s reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer’s credits for risk control, and users can have online-equivalent credits in offline transactions.

  11. Security enhanced EMV-based mobile payment protocol.

    Science.gov (United States)

    Yang, Ming-Hour

    2014-01-01

    Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant's reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer's credits for risk control, and users can have online-equivalent credits in offline transactions.

  12. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    Directory of Open Access Journals (Sweden)

    Feng Tao

    2017-01-01

    Full Text Available Tor (The Second Onion Router is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was used to prevent the behaviors of attackers from inserting controlled nodes and conspiring to make DDos attacks. The integrated security of Tor system was enhanced in our scheme. In addition we have proved the scheme.

  13. Ethnic Separatism in Pakistan as a Threat to Regional Security

    Directory of Open Access Journals (Sweden)

    Adam Isaevich Khahkhanov

    2015-12-01

    Full Text Available At present ethnic separatism is shown in various regions practically on all continents and it is the same serious call of the international stability and safety, as religious extremism and drugs. Ethnic separatism is shown and in the Southern Asia, particularly, in India, Pakistan, Sri - Lanka, leading to terrorism acts and a numerous death. The author analyzes sources and the reasons of ethnic separatism in Pakistan. Author marks that the basis for statehood of Pakistan while independence declaration was not ethnic, but cultural and religious factors, which already contained potential separatism. Article tells us about modern manifestation of ethnic separatism in Pakistan. In particular, the author describes sources, the reasons and manifestations of separatism of Pushtuns and Beludzhy. According to the author, separatism of Beludzhy and Pushtuns is the specific danger not only to integrity of Pakistan. This can lead in the long term to disintegration of the state that is fraught with serious consequences for stability and safety not only for the Southern Asia, but also for other regions nearby Russia.

  14. Science and Technology to Advance Regional Security in the Middle East and Central Asia

    Energy Technology Data Exchange (ETDEWEB)

    Tompson, A F B; Richardson, J H; Ragaini, R C; Knapp, R B; Rosenberg, N D; Smith, D K; Ball, D Y

    2002-10-09

    This paper is concerned with the promotion and advancement of regional security in the Middle East and Central Asia through the development of bilateral and multilateral cooperation on targeted scientific and technical projects. It is widely recognized that increasing tensions and instability in many parts of the world emphasize--or reemphasize--a need to seek and promote regional security in these areas. At the Lawrence Livermore National Laboratory (LLNL), a national security research facility operated for the US Department of Energy, we are pursuing an effort to use science and technology as a ''low risk'' means of engagement in regions of strategic importance to the United States. In particular, we are developing collaborations and cooperative projects among (and between) national laboratory scientists in the US and our various counterparts in the countries of interest.

  15. ENVIRONMENTAL SECURITY IN THE REGION IN THE SERVICE OF SUSTAINABLE DEVELOPMENT OF LOCAL SPATIAL

    Directory of Open Access Journals (Sweden)

    Ljiljana Stošić Mihajlović

    2016-04-01

    Full Text Available A fundamental prerequisite for the existence, growth and development of each social community is environmental safety. In modern conditions of environmental degradation as a global process, it is bound to increase social stratification, ethnic and even religious conflict, conflict and intolerance that threatens the safety of society. It is a notorious fact that the world of Simply is no longer in a position to deal with new shocks. The financial crisis has reduced global economic resilience, while geopolitical tensions and increased social concerns point to the fact that the state and society less able than ever to cope with global challenges, among which is the primary problem of environmental security. In modern countries, political, security and other interests of the citizens' day-to-day modeling, transform, get the content, in accordance with the general civilization changes. In this connection, sustainable local spatial development is crucial conditioned ecological without security region and aims to achieve a balance between current consumption of natural resources and the ability of the system to maintain the level at which future generations will be able to use them. The work represents a contribution to the achievement of environmental security as a new, modern forms of security, and originated from the need to once again draw attention to the evident environmental degradation as an integral part of human security. Ecological security of the region protects the basic components of the environment and determinants of the local spatial development. In fact, safety in the field of protection and preservation of the environment is one of the most important factors Security Council shall contemporary world. In doing so, it is important to emphasize, however, that environmental security has no borders and is a global problem, a task and an obligation.

  16. COORDINATION IN MULTILEVEL NETWORK-CENTRIC CONTROL SYSTEMS OF REGIONAL SECURITY: APPROACH AND FORMAL MODEL

    Directory of Open Access Journals (Sweden)

    A. V. Masloboev

    2015-01-01

    Full Text Available The paper deals with development of methods and tools for mathematical and computer modeling of the multilevel network-centric control systems of regional security. This research is carried out under development strategy implementation of the Arctic zone of the Russian Federation and national safeguarding for the period before 2020 in the Murmansk region territory. Creation of unified interdepartmental multilevel computer-aided system is proposed intended for decision-making information support and socio-economic security monitoring of the Arctic regions of Russia. The distinctive features of the investigated system class are openness, self-organization, decentralization of management functions and decision-making, weak hierarchy in the decision-making circuit and goal generation capability inside itself. Research techniques include functional-target approach, mathematical apparatus of multilevel hierarchical system theory and principles of network-centric control of distributed systems with pro-active components and variable structure. The work considers network-centric management local decisions coordination problem-solving within the multilevel distributed systems intended for information support of regional security. The coordination problem-solving approach and problem formalization in the multilevel network-centric control systems of regional security have been proposed based on developed multilevel recurrent hierarchical model of regional socio-economic system complex security. The model provides coordination of regional security indexes, optimized by the different elements of multilevel control systems, subject to decentralized decision-making. The model specificity consists in application of functional-target technology and mathematical apparatus of multilevel hierarchical system theory for coordination procedures implementation of the network-centric management local decisions. The work-out and research results can find further

  17. [Social security and labor absenteeism in a regional health service].

    Science.gov (United States)

    Soto Caro, Ariel; Herrera Cofré, Roberto; Fuentes Solís, Rodrigo

    2015-08-01

    Absenteism can generate important economic costs. To analyze the determinants of the time off work for sick leaves granted to workers of a regional health service. Information about 2033 individuals, working at a health service, that were granted at least one sick leave during 2012, was analyzed. Personal identification was censored. Special emphasis was given to the type of health insurance system of the workers (public or private). Workers ascribed to the Chilean public health insurance system (FONASA) had 11 days more off work than their counterparts ascribed to private health insurance systems. A higher amount of time off work was observed among older subjects and women. Age, gender and the type of health insurance system influence the number of day off work due to sick leaves.

  18. Enhancing Nutrition Security via India's National Food Security Act: Using an Axe instead of a Scalpel?

    Science.gov (United States)

    Desai, Sonalde; Vanneman, Reeve

    2015-08-05

    In September 2013, India passed a historic National Food Security Act. This paper examines the potential impact of the two central pillars of this act - expansion of the Public Distribution System and strengthening of the Integrated Child Development Schemes - on child nutrition. Using new data from the India Human Development Survey of 2011-12, this paper shows that access to subsidized grains via PDS is not related to improved child nutrition, and while ICDS seems to be related to lower child undernutrition, it has a limited reach in spite of the universalization of the program. The paper suggests that a tiered strategy in dealing with child undernutrition that starts with the identification of undernourished children and districts and follows through with different strategies for dealing with severe, acute malnutrition, followed by a focus on moderate malnutrition, could be more effective than the existing focus on cereal distribution rooted in the NFSA.

  19. Algorithm and Indicators of Evaluation of Agrarian Policy Efficiency in the Sphere of Food Security of the Region

    Directory of Open Access Journals (Sweden)

    Elena Nikolaevna Antamoshkina

    2015-12-01

    Full Text Available The article substantiates the author’s method of analysis of the regional food security and its approbation on the example of the Southern Federal District. The author’s goal was to develop a comprehensive universal method of analysis of the regional food security. To achieve this goal the following steps were required: to develop a system of indicators to measure food security at the regional level; to define criteria for assessing regional food security; to synthesize model analysis and evaluation of food security in the region. The paper presents an algorithm for the phased application of methodology for assessing regional food security. The recommended indicators and criteria for assessing regional food security are consistent with the parameters defined by the Doctrine of food security in Russia, and take into account the requirements of the WTO. The proposed method was tested on data from the largest regions of the Southern Federal District, which allowed a comparison of the level of food security in the regions of the spatial and temporal perspective. Comparison was made on the basis of an integrated assessment of the level of food security in the regions. The theoretical significance consists in the meaningful complement to research models and tools for analysis of food security at the regional level of the economy in terms of justification of indicators and criteria for assessing food security in the region in terms of Russia’s participation in the WTO. The practical significance is in developing and testing the proposed method based on an assessment of indicators of food security in SFD.

  20. Mechanisms for training security inspectors to enhance human performance

    Energy Technology Data Exchange (ETDEWEB)

    Burkhalter, H.E.; Sessions, J.C.

    1988-01-01

    The Department of Energy (DOE) has established qualification standards for protective force personnel employed at nuclear facilities (10 CFR Part 1046 (Federal Register)). Training mechanisms used at Los Alamos to enhance human performance in meeting DOE standards include, but are not limited to, the following: for cardio-respiratory training, they utilize distance running, interval training, sprint training, pacing, indoor aerobics and circuit training; for muscular strength, free weights, weight machines, light hand weights, grip strength conditioners, and calistenics are employed; for muscular endurance, participants do high repetitions (15 - 40) using dumbbells, flex weights, resistive rubber bands, benches, and calisthenics; for flexibility, each training session devotes specific times to stretch the muscles involved for a particular activity. These training mechanisms with specific protocols can enhance human performance.

  1. A novel water poverty index model for evaluation of Chinese regional water security

    Science.gov (United States)

    Gong, L.; Jin, C. L.; Li, Y. X.; Zhou, Z. L.

    2017-08-01

    This study proposed an improved Water Poverty Index (WPI) model employed in evaluating Chinese regional water security. Firstly, the Chinese WPI index system was constructed, in which the indicators were obtained according to China River reality. A new mathematical model was then established for WPI values calculation on the basis of Center for Ecology and Hydrology (CEH) model. Furthermore, this new model was applied in Shiyanghe River (located in western China). It turned out that the Chinese index system could clearly reflect the indicators threatening security of river water and the Chinese WPI model is feasible. This work has also developed a Water Security Degree (WSD) standard which is able to be regarded as a scientific basis for further water resources utilization and water security warning mechanism formulation.

  2. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  3. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks

    Science.gov (United States)

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-01-01

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al’s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration. PMID:28335572

  4. SECTOR-SPECIFIC STRUCTURE OF THE REGIONAL ECONOMY AS A FACTOR OF ELEVATION OF RISKS TO ITS ECONOMIC SECURITY

    Directory of Open Access Journals (Sweden)

    Rostislav BILYK

    2016-07-01

    Full Text Available The article analyzes a sector-specific specialization of the regional economy in Ukraine. It also reveals possibility and conditions of transformation of a sector-specific specialization of the region and risks to its economic security. The article suggests an assessment of influence of a sector-specific specialization on occurrence of threats to the economic security of the region.

  5. Using digital watermarking to enhance security in wireless medical image transmission.

    Science.gov (United States)

    Giakoumaki, Aggeliki; Perakis, Konstantinos; Banitsas, Konstantinos; Giokas, Konstantinos; Tachakra, Sapal; Koutsouris, Dimitris

    2010-04-01

    During the last few years, wireless networks have been increasingly used both inside hospitals and in patients' homes to transmit medical information. In general, wireless networks suffer from decreased security. However, digital watermarking can be used to secure medical information. In this study, we focused on combining wireless transmission and digital watermarking technologies to better secure the transmission of medical images within and outside the hospital. We utilized an integrated system comprising the wireless network and the digital watermarking module to conduct a series of tests. The test results were evaluated by medical consultants. They concluded that the images suffered no visible quality degradation and maintained their diagnostic integrity. The proposed integrated system presented reasonable stability, and its performance was comparable to that of a fixed network. This system can enhance security during the transmission of medical images through a wireless channel.

  6. The Migration Crisis from the East-Central European Perspective: Challenges for Regional Security

    Directory of Open Access Journals (Sweden)

    Renata Podgórzańska

    2017-12-01

    Full Text Available Nowadays, the common denominator of involvement of the EastCentral Europe in the international arena, and above all, the premise determining community of interest expressed in the European Union is the migration crisis. Despite the different circumstances of activity in the context of the migration crisis, states in the region express similar opinions on the consequences of immigration for security in the region. Above all, they emphasise the implications of immigration for the internal security of states. Given the complex nature of migration, this article focuses on the phenomenon of immigration in the EU, determining the causes of the escalation of the influx of immigrants and, above all, identifying the consequences for the security of states of East-Central Europe.

  7. Optimal placement of FACTS controller scheme for enhancement of power system security in Indian scenario

    Directory of Open Access Journals (Sweden)

    Imran Khan

    2015-09-01

    Full Text Available This paper presents a FACTS operation scheme to enhance the power system security. Three main generic types of FACTS devices are introduced. Line overloads are solved by controlling active power of series compensators and low voltages are solved by controlling reactive power of shunt compensators, respectively. Especially, the combined series-shunt compensators such as UPFC are applied to solve both line congestions and low voltages simultaneously. Two kinds of indices that indicate the security level related to line flow and bus voltage is utilized in this paper. They are iteratively minimized to determine operating points of the devices for security enhancement. The sensitivity vectors of the indices are derived to determine the direction of minimum. The proposed algorithm is verified on the IEEE 14-bus system with FACTS devices in a normal condition and in a line-faulted contingency.

  8. Security enhanced optical encryption system by random phase key and permutation key.

    Science.gov (United States)

    He, Mingzhao; Tan, Qiaofeng; Cao, Liangcai; He, Qingsheng; Jin, Guofan

    2009-12-07

    Conventional double random phase encoding (DRPE) encrypts plaintext to white noise-like ciphertext which may attract attention of eavesdroppers, and recent research reported that DRPE is vulnerable to various attacks. Here we propose a security enhanced optical encryption system that can hide the existence of secret information by watermarking. The plaintext is encrypted using iterative fractional Fourier transform with random phase key, and ciphertext is randomly permuted with permutation key before watermarking. Cryptanalysis shows that linearity of the security system has been broken and the permutation key prevent the attacker from accessing the ciphertext in various attacks. A series of simulations have shown the effectiveness of this system and the security strength is enhanced for invisibility, nonlinearity and resistance against attacks.

  9. Economic security of regions in the context of Russia's WTO accession

    Directory of Open Access Journals (Sweden)

    Sergey Mikhaylovich Kadochnikov

    2012-06-01

    Full Text Available This paper deals with economic security of Russian regions in the light of the country's entry into the World Trade Organization. Different approaches to defining regionaleconomicsecurity, an assessment ofcompetitiveness of Russian regions in comparison with the regions of Europe on selected indicators of competitiveness are presented. The paper considers the determinants of competitiveness of the region through various theoretical concepts. Based on a review of empirical and theoretical literature, the tools and ways of increasing the economic security are identified: diversification of export basket in designated areas, encouraging the formation and development of industrial clusters, attraction of foreign investments that generate positive externalities and leading to increased competitiveness of domestic companies.

  10. Co-ordination and integration of social security in the SADC region ...

    African Journals Online (AJOL)

    The contribution highlights the sheer extent of the inadequate social protection provisioning in the SADC region and the apparent failure of domestic social security measures to address poverty alleviation meaningfully and to bring about the social inclusion and participation of large numbers and significant categories of ...

  11. Regionalizing Food Security? Imperatives, Intersections and Contestations in a Post-9/11 World

    Science.gov (United States)

    Hinrichs, C. Clare

    2013-01-01

    In the early 21st century, food security has become an urgent public concern, arguably more entangled with social, political and environmental problems at multiple scales now than in the past. This paper examines approaches to food system change emphasizing regionalization, rather than either localization or globalization, to consider framings of…

  12. East Asia’s energy needs: The impact on security and guidelines for regional governance

    Directory of Open Access Journals (Sweden)

    Pablo Pareja Alcaraz

    2010-04-01

    Full Text Available The last three decades have witnessed a spectacular (and not easily sustainable increase in the global demand for energy. This trend has a particular significance in East Asia owing to its heavy industrialisation, which is promoting intense regional growth, on top of the already delicate balance of security in the region and the traditional refusal by the region’s states to delegate power and management to supranational bodies. The aim of this article is to analyse the impact of East Asia’s energy needs on security and on the instruments of order and governance that have been developed in the region up until the present time. Thus, the article is divided into two parts; the first analyses East Asia’s energy programme and its most significant features: 1 a high dependence on oil imports from other regions, especially the Middle East; 2 a persistence of high dependency on pollutant fossil fuels; and 3 a high degree of energy insecurity. Meanwhile, the second part assesses the impact of energy on regional relations in different areas of security and guidelines for regional government: 1 the securitisation of energy and of the environment; 2 the reactivation of certain maritime conflicts; 3 the transformation of certain threats, and conventional and non-conventional challenges to regional security; 4 the rise of non-state actors (mainly environmental businesses and NGOs in East Asia’s international relations; 5 the maintaining of bilateralism and the promotion of multilateral initiatives; and 6 the emergence of new extra-regional geopolitical links and balances.

  13. COORDINATION IN MULTILEVEL NETWORK-CENTRIC CONTROL SYSTEMS OF REGIONAL SECURITY: APPROACH AND FORMAL MODEL

    OpenAIRE

    A. V. Masloboev; V. A. Putilov; A. V. Sioutine

    2015-01-01

    The paper deals with development of methods and tools for mathematical and computer modeling of the multilevel network-centric control systems of regional security. This research is carried out under development strategy implementation of the Arctic zone of the Russian Federation and national safeguarding for the period before 2020 in the Murmansk region territory. Creation of unified interdepartmental multilevel computer-aided system is proposed intended for decision-making information suppo...

  14. PACFEST 2004 : enabling technologies for maritime security in the Pacific region.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Whitley, John B.; Chellis, Craig (Pacific Disaster Center, Kihei, HI)

    2005-06-01

    In October of 2003 experts involved in various aspects of homeland security from the Pacific region met to engage in a free-wheeling discussion and brainstorming (a 'fest') on the role that technology could play in winning the war on terrorism in the Pacific region. The result was a concise and relatively thorough definition of the terrorism problem in the Pacific region, emphasizing the issues unique to Island nations in the Pacific setting, along with an action plan for developing working demonstrations of advanced technological solutions to these issues. Since PacFest 2003, the maritime dimensions of the international security environment have garnered increased attention and interest. To this end, PacFest 2004 sought to identify gaps and enabling technologies for maritime domain awareness and responsive decision-making in the Asia-Pacific region. The PacFest 2004 participants concluded that the technologies and basic information building blocks exist to create a system that would enable the Pacific region government and private organizations to effectively collaborate and share their capabilities and information concerning maritime security. The proposed solution summarized in this report integrates national environments in real time, thereby enabling effective prevention and first response to natural and terrorist induced disasters through better use of national and regional investments in people, infrastructure, systems, processes and standards.

  15. Improved food availability for food security in Asia-Pacific region.

    Science.gov (United States)

    Yang, Ray-Yu; Hanson, Peter M

    2009-01-01

    Food security requires that all people can access sufficient food for a healthy life. Enough food is produced to feed the global population, but more than 1.02 billion people are malnourished. Malnutrition and chronic food insecurity are widespread in some countries of the Asia-Pacific region; as much as 20 to 60 percent of the region's population lacks sufficient food to meet their minimum energy requirement. Food security greatly depends on food availability, although this alone is not sufficient to secure satisfactory nutritional status. Food security at the national level requires an effective framework of food, health, and economic systems coupled with awareness and consideration of environmental conditions. To improve food availability and security in the short term, lower income countries should focus on increasing productivity in the food system to generate higher incomes for workers on-farm and off-farm in the food chain. Over the long term, sustainable and small-scale farming based on ecologically viable systems should be the emphasis for agricultural development. Nutrition and health sectors should help promote food-based approaches that lead to diversification of crops, balanced diets, and ultimately better health.

  16. Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes

    Directory of Open Access Journals (Sweden)

    Qinghe Du

    2018-01-01

    Full Text Available The Internet of Things (IoT is expected to accommodate every object which exists in this world or likely to exist in the near future. The enormous scale of the objects is challenged by big security concerns, especially for common information dissemination via multicast services, where the reliability assurance for multiple multicast users at the cost of increasing redundancy and/or retransmissions also benefits eavesdroppers in successfully decoding the overheard signals. The objective of this work is to address the security challenge present in IoT multicast applications. Specifically, with the presence of the eavesdropper, an adaptive fountain code design is proposed in this paper to enhance the security for multicast in IoT. The main novel features of the proposed scheme include two folds: (i dynamical encoding scheme which can effectively decrease intercept probability at the eavesdropper; (ii increasing the transmission efficiency compared with the conventional nondynamical design. The analysis and simulation results show that the proposed scheme can effectively enhance information security while achieving higher transmission efficiency with a little accredited complexity, thus facilitating the secured wireless multicast transmissions over IoT.

  17. Identifying regional key eco-space to maintain ecological security using GIS.

    Science.gov (United States)

    Xie, Hualin; Yao, Guanrong; Wang, Peng

    2014-02-28

    Ecological security and environmental sustainability are the foundations of sustainable development. With the acceleration of urbanization, increasing human activities have promoted greater impacts on the eco-spaces that maintain ecological security. Regional key eco-space has become the primary need to maintain environmental sustainability and can offer society with continued ecosystem services. In this paper, considering the security of water resources, biodiversity conservation, disaster avoidance and protection and natural recreation, an integrated index of eco-space importance was established and a method for identifying key eco-space was created using GIS, with Lanzhou City, China as a case study. The results show that the area of core eco-space in the Lanzhou City is approximately 50,908.7 hm(2), accounting for 40% of the region's total area. These areas mainly consist of geological hazard protection zones and the core zones of regional river systems, wetlands, nature reserves, forest parks and scenic spots. The results of this study provide some guidance for the management of ecological security, ecological restoration and environmental sustainability.

  18. Enhancing maternal sensitivity and infant attachment security with video feedback: an exploratory study in Italy.

    Science.gov (United States)

    Cassibba, Rosalinda; Castoro, Germana; Costantino, Elisabetta; Sette, Giovanna; Van Ijzendoorn, Marinus H

    2015-01-01

    This study aims to explore whether a short-term and attachment-based video-feedback intervention, the Video-Feedback Intervention to Promote Positive Parenting With Discussions on the Representational Level (VIPP-R; F. Juffer, M.J. Bakermans-Kranenburg, & M.H. van IJzendoorn, 2008), might be effective in enhancing maternal sensitivity and in promoting infants' attachment security in an Italian sample of dyads with primiparous mothers. Moreover, we explore whether the effectiveness of VIPP-R might be different for parents with insecure attachment representations who might be most in need of preventive intervention, as compared to parents who already have a more balanced and secure state of mind. Thirty-two infants (40% female) and their mothers participated in the study. The sample was divided into an intervention group (n = 16) and a comparison group (n = 16). At 6 and 13 months of age, the Adult Attachment Interview (AAI; M. Main, N. Kaplan, & J. Cassidy, 1985) was administered. Moreover, a 30-min mother-infant play situation was videotaped and coded for maternal sensitivity with the Emotional Availability Scales (Z. Biringen, J. Robinson, & R.N. Emde, 2000). At 13 months of age, the Strange Situation Procedure (M.D.S. Ainsworth, M.D. Blehar, E. Waters, & S. Wall, 1978) was used to assess the security of mother-infant attachment. Results revealed a significant interaction effect between intervention and AAI security for infant attachment security; moreover, main effects of AAI security and intervention for maternal sensitivity were found. The VIPP-R appears effective in enhancing maternal sensitivity and infant attachment security, although only mothers with an insecure attachment representation may benefit from the intervention. © 2014 Michigan Association for Infant Mental Health.

  19. SecMAS: Security Enhanced Monitoring and Analysis Systems for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ding Chao

    2016-01-01

    Full Text Available The monitoring, control, and security guarantee for the communication in the wireless sensor networks (WSNs are currently treated as three independent issues and addressed separately through specialized tools. However, most cases of WSNs applications requires the network administrator change the network configuration in a very short time to response to the change of observed phenomenon with security guarantee. To meet this requirement, we propose a security enhanced monitoring and control platform named SecMAS for WSNs, which provides the real-time visualization about network states and online reconfiguration of the network properties and behaviours in a resource-efficient way. Besides, basic cryptographic primitives and part of the anomaly detection functionalities are implemented in SecMAS to enabling the secure communication in WSNs. Furthermore, we conduct experiments to evaluate the performance of SecMAS in terms of the latency, throughput, communication overhead, and the security capacity. The experimental results demonstrate that the SecMAS system achieves stable, efficient and secure data collection with lightweight quick-response network control.

  20. A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform

    Directory of Open Access Journals (Sweden)

    Srinivas Koppu

    2017-01-01

    Full Text Available An enhanced secure image chaotic cryptosystem has been proposed based on hybrid CMT-Lanczos algorithm. We have achieved fast encryption and decryption along with privacy of images. The pseudorandom generator has been used along with Lanczos algorithm to generate root characteristics and eigenvectors. Using hybrid CMT image, pixels are shuffled to accomplish excellent randomness. Compared with existing methods, the proposed method had more robustness to various attacks: brute-force attack, known cipher plaintext, chosen-plaintext, security key space, key sensitivity, correlation analysis and information entropy, and differential attacks. Simulation results show that the proposed methods give better result in protecting images with low-time complexity.

  1. Digital watermarking in telemedicine applications--towards enhanced data security and accessibility.

    Science.gov (United States)

    Giakoumaki, Aggeliki L; Perakis, Konstantinos; Tagaris, Anastassios; Koutsouris, Dimitris

    2006-01-01

    Implementing telemedical solutions has become a trend amongst the various research teams at an international level. Yet, contemporary information access and distribution technologies raise critical issues that urgently need to be addressed, especially those related to security. The paper suggests the use of watermarking in telemedical applications in order to enhance security of the transmitted sensitive medical data, familiarizes the users with a telemedical system and a watermarking module that have already been developed, and proposes an architecture that will enable the integration of the two systems, taking into account a variety of use cases and application scenarios.

  2. Trustworthy reconfigurable systems enhancing the security capabilities of reconfigurable hardware architectures

    CERN Document Server

    Feller, Thomas

    2014-01-01

    ?Thomas Feller sheds some light on trust anchor architectures fortrustworthy reconfigurable systems. He is presenting novel concepts enhancing the security capabilities of reconfigurable hardware.Almost invisible to the user, many computer systems are embedded into everyday artifacts, such as cars, ATMs, and pacemakers. The significant growth of this market segment within the recent years enforced a rethinking with respect to the security properties and the trustworthiness of these systems. The trustworthiness of a system in general equates to the integrity of its system components. Hardware-b

  3. PREDICTION OF THE LIKELIHOOD OF HOUSEHOLDS FOOD SECURITY IN THE LAKE VICTORIA REGION OF KENYA

    Directory of Open Access Journals (Sweden)

    Peter Nyamuhanga Mwita

    2011-06-01

    Full Text Available This paper considers the modeling and prediction of  households food security status using a sample of households in the  Lake Victoria region of Kenya. A priori expected food security  factors and their measurements are given. A binary logistic regression model  derived was fitted to thirteen priori expected factors. Analysis of the marginal effects revealed that effecting the use of the seven significant determinants: farmland size, per capita aggregate production, household size, gender of household head, use of fertilizer, use of pesticide/herbicide and education of household head,  increase the likelihood of a household being food secure. Finally, interpretations  of   predicted conditional probabilities, following improvement of significant determinants,  are given.

  4. Household food security and adequacy of child diet in the food insecure region north in Ghana.

    Science.gov (United States)

    Agbadi, Pascal; Urke, Helga Bjørnøy; Mittelmark, Maurice B

    2017-01-01

    Adequate diet is of crucial importance for healthy child development. In food insecure areas of the world, the provision of adequate child diet is threatened in the many households that sometimes experience having no food at all to eat (household food insecurity). In the context of food insecure northern Ghana, this study investigated the relationship between level of household food security and achievement of recommended child diet as measured by WHO Infant and Young Child Feeding Indicators. Using data from households and 6-23 month old children in the 2012 Feed the Future baseline survey (n = 871), descriptive analyses assessed the prevalence of minimum meal frequency; minimum dietary diversity, and minimum acceptable diet. Logistic regression analysis was used to examine the association of minimum acceptable diet with household food security, while accounting for the effects of child sex and age, maternal -age, -dietary diversity, -literacy and -education, household size, region, and urban-rural setting. Household food security was assessed with the Household Hunger Scale developed by USAID's Food and Nutrition Technical Assistance Project. Forty-nine percent of children received minimum recommended meal frequency, 31% received minimum dietary diversity, and 17% of the children received minimum acceptable diet. Sixty-four percent of the children lived in food secure households, and they were significantly more likely than children in food insecure households to receive recommended minimum acceptable diet [O.R = 0.53; 95% CI: 0.35, 0.82]. However, in 80% of food secure households, children did not receive a minimal acceptable diet by WHO standards. Children living in food secure households were more likely than others to receive a minimum acceptable diet. Yet living in a food secure household was no guarantee of child dietary adequacy, since eight of 10 children in food secure households received less than a minimum acceptable diet. The results call for research

  5. On Issue of Algorithm Forming for Assessing Investment Attractiveness of Region Through Its Technospheric Security

    Science.gov (United States)

    Filimonova, L. A.; Skvortsova, N. K.

    2017-11-01

    The article examines the problematic aspects of assessing the investment attractiveness of a region associated with the consideration of methodological issues that require refinement from the point of view of its technospheric security. Such issues include the formation of a sound system of indicators for the assessment of man-made risk which has a particular impact on the level of investment attractiveness of the region. In the context of the instability of the economic situation in Russia, the problem of man-made risks assessing in the context of the regional investment attractiveness based on an integrated approach and taking into account such principles as flexibility, adaptability, innovative orientation has not only lost its relevance but was also transformed into one of the most important conditions for ensuring the effective management of all spheres of the regional activities. The article poses the classical problem of making decisions on the results of the assessment of the investment attractiveness of the region in a matrix format evaluating the utility function. The authors of the article recommended a universal risk assessment model with its subsequent synthesis into technospheric security for the comprehensive assessment of regional investment attractiveness. The principal distinguishing feature of the study results are the schemes for manipulation in the evaluation activity associated with the selection of the optimality criteria groups and models for their study. These iterations make it possible to substantiate the choice of the solution for preserving the technospheric security of the region, a field of compromises or an “ideal” solution to the problem of the regional investment attractiveness loss.

  6. Isolated user security enhancement in optical code division multiple access network against eavesdropping

    Science.gov (United States)

    Jyoti, Vishav; Kaler, Rajinder Singh

    2012-09-01

    A novel virtual user system is modeled for enhancing the security of an optical code division multiple access (OCDMA) network. Although the OCDMA system implementing code shift keying (CSK) is secure against a conventional power detector, it is susceptible to differential eavesdropping. An analytical framework is developed for the CSK-OCDMA system to show eavesdropper's code interception performance for a single transmitting user in the presence of a virtual user. It is shown that the eavesdropper's probability of correct bit interception decreases from 7.1×10-1 to 1.85×10-5 with the inclusion of the virtual user. Furthermore, the results confirm that the proposed virtual user scheme increases the confidentiality of the CSK-OCDMA system and outperforms the conventional OCDMA scheme in terms of security.

  7. Identifying Regional Key Eco-Space to Maintain Ecological Security Using GIS

    Science.gov (United States)

    Xie, Hualin; Yao, Guanrong; Wang, Peng

    2014-01-01

    Ecological security and environmental sustainability are the foundations of sustainable development. With the acceleration of urbanization, increasing human activities have promoted greater impacts on the eco-spaces that maintain ecological security. Regional key eco-space has become the primary need to maintain environmental sustainability and can offer society with continued ecosystem services. In this paper, considering the security of water resources, biodiversity conservation, disaster avoidance and protection and natural recreation, an integrated index of eco-space importance was established and a method for identifying key eco-space was created using GIS, with Lanzhou City, China as a case study. The results show that the area of core eco-space in the Lanzhou City is approximately 50,908.7 hm2, accounting for 40% of the region’s total area. These areas mainly consist of geological hazard protection zones and the core zones of regional river systems, wetlands, nature reserves, forest parks and scenic spots. The results of this study provide some guidance for the management of ecological security, ecological restoration and environmental sustainability. PMID:24590051

  8. Identifying Regional Key Eco-Space to Maintain Ecological Security Using GIS

    Directory of Open Access Journals (Sweden)

    Hualin Xie

    2014-02-01

    Full Text Available Ecological security and environmental sustainability are the foundations of sustainable development. With the acceleration of urbanization, increasing human activities have promoted greater impacts on the eco-spaces that maintain ecological security. Regional key eco-space has become the primary need to maintain environmental sustainability and can offer society with continued ecosystem services. In this paper, considering the security of water resources, biodiversity conservation, disaster avoidance and protection and natural recreation, an integrated index of eco-space importance was established and a method for identifying key eco-space was created using GIS, with Lanzhou City, China as a case study. The results show that the area of core eco-space in the Lanzhou City is approximately 50,908.7 hm2, accounting for 40% of the region’s total area. These areas mainly consist of geological hazard protection zones and the core zones of regional river systems, wetlands, nature reserves, forest parks and scenic spots. The results of this study provide some guidance for the management of ecological security, ecological restoration and environmental sustainability.

  9. Contouring of the gluteal region in women: enhancement and augmentation.

    Science.gov (United States)

    Ali, Ahmed

    2011-09-01

    Techniques for improving the appearance of the gluteal region are important elements in body contouring. In all cultures and communities, this aspect of the physique holds a special place among the elements comprising the ideals of physical beauty. Recent studies described the aesthetics of the gluteal region in terms of shape, volume, and projection. Accumulation of fat at the supragluteal, lower paralumbar, infragluteal, and/or trochanteric areas often disturbs the natural shape of the buttocks. The problem is accentuated by the lack of lateral projection. This study was designed to find a method for contouring of the gluteal region. This method is based on the enhancement of the shape by liposculpture of the areas around the buttocks, and lipoinjection to achieve the volume and projection. Between July 2008 and December 2009, the study included 40 female patients complaining of disfigurement of the gluteal region. With 1 year follow-up period, 36 patients showed high satisfaction with the results. Pre- and postoperative perimeters of the gluteal regions showed good improvement in proportion and projection. The study concluded that liposuction of the areas around the buttocks could enhance the shape of the gluteal region. Lipoinjection could add a balanced shape, size, and projection. A pleasing gluteal appearance could be achieved by the combination of enhancement and augmentation.

  10. Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs

    Science.gov (United States)

    Huang, Changqin; Ma, Ming; Liu, Xiao; Liu, Anfeng; Zuo, Zhengbang

    2017-01-01

    Fog (from core to edge) computing is a newly emerging computing platform, which utilizes a large number of network devices at the edge of a network to provide ubiquitous computing, thus having great development potential. However, the issue of security poses an important challenge for fog computing. In particular, the Internet of Things (IoT) that constitutes the fog computing platform is crucial for preserving the security of a huge number of wireless sensors, which are vulnerable to attack. In this paper, a new unequal probability marking approach is proposed to enhance the security performance of logging and migration traceback (LM) schemes in tree-based wireless sensor networks (WSNs). The main contribution of this paper is to overcome the deficiency of the LM scheme that has a higher network lifetime and large storage space. In the unequal probability marking logging and migration (UPLM) scheme of this paper, different marking probabilities are adopted for different nodes according to their distances to the sink. A large marking probability is assigned to nodes in remote areas (areas at a long distance from the sink), while a small marking probability is applied to nodes in nearby area (areas at a short distance from the sink). This reduces the consumption of storage and energy in addition to enhancing the security performance, lifetime, and storage capacity. Marking information will be migrated to nodes at a longer distance from the sink for increasing the amount of stored marking information, thus enhancing the security performance in the process of migration. The experimental simulation shows that for general tree-based WSNs, the UPLM scheme proposed in this paper can store 1.12–1.28 times the amount of stored marking information that the equal probability marking approach achieves, and has 1.15–1.26 times the storage utilization efficiency compared with other schemes. PMID:28629135

  11. Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs.

    Science.gov (United States)

    Huang, Changqin; Ma, Ming; Liu, Xiao; Liu, Anfeng; Zuo, Zhengbang

    2017-06-17

    Fog (from core to edge) computing is a newly emerging computing platform, which utilizes a large number of network devices at the edge of a network to provide ubiquitous computing, thus having great development potential. However, the issue of security poses an important challenge for fog computing. In particular, the Internet of Things (IoT) that constitutes the fog computing platform is crucial for preserving the security of a huge number of wireless sensors, which are vulnerable to attack. In this paper, a new unequal probability marking approach is proposed to enhance the security performance of logging and migration traceback (LM) schemes in tree-based wireless sensor networks (WSNs). The main contribution of this paper is to overcome the deficiency of the LM scheme that has a higher network lifetime and large storage space. In the unequal probability marking logging and migration (UPLM) scheme of this paper, different marking probabilities are adopted for different nodes according to their distances to the sink. A large marking probability is assigned to nodes in remote areas (areas at a long distance from the sink), while a small marking probability is applied to nodes in nearby area (areas at a short distance from the sink). This reduces the consumption of storage and energy in addition to enhancing the security performance, lifetime, and storage capacity. Marking information will be migrated to nodes at a longer distance from the sink for increasing the amount of stored marking information, thus enhancing the security performance in the process of migration. The experimental simulation shows that for general tree-based WSNs, the UPLM scheme proposed in this paper can store 1.12-1.28 times the amount of stored marking information that the equal probability marking approach achieves, and has 1.15-1.26 times the storage utilization efficiency compared with other schemes.

  12. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-06-10

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  13. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-06-01

    Full Text Available Wireless sensor networks (WSNs consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC for WSNs. However, it turned out that Yeh et al.’s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.’s protocol. However, Shi et al.’s improvement introduces other security weaknesses. In this paper, we show that Shi et al.’s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  14. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Science.gov (United States)

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  15. Physical Layer Built-In Security Analysis and Enhancement Algorithms for CDMA Systems

    Directory of Open Access Journals (Sweden)

    Li Tongtong

    2007-01-01

    Full Text Available Historically developed for secure communication and military use, CDMA has been identified as a major modulation and multiple-access technique for 3G systems and beyond. In addition to the wide bandwidth and low power-spectrum density which make CDMA signals robust to narrowband jamming and easy to be concealed within the noise floor, the physical layer built-in information privacy of CDMA system is provided by pseudorandom scrambling. In this paper, first, security weakness of the operational and proposed CDMA airlink interfaces is analyzed. Second, based on the advanced encryption standard (AES, we propose to enhance the physical layer built-in security of CDMA systems through secure scrambling. Performance analysis demonstrates that while providing significantly improved information privacy, CDMA systems with secure scrambling have comparable computational complexity and overall system performance with that of conventionally scrambled systems. Moreover, it is shown that by scrambling the training sequence and the message sequence separately with two independent scrambling sequences, both information privacy and system performance can be further improved. The proposed scheme can readily be applied to 3G systems and beyond.

  16. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    Science.gov (United States)

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  17. Sleep Enhances Knowledge of Routes and Regions in Spatial Environments

    Science.gov (United States)

    Noack, Hannes; Schick, Wiebke; Mallot, Hanspeter; Born, Jan

    2017-01-01

    Sleep is thought to preferentially consolidate hippocampus-dependent memory, and as such, spatial navigation. Here, we investigated the effects of sleep on route knowledge and explicit and implicit semantic regions in a virtual environment. Sleep, compared with wakefulness, improved route knowledge and also enhanced awareness of the semantic…

  18. Geographic/conceptual delimitation of the «Southern Mediterranean». A Regional Security Complex?

    Directory of Open Access Journals (Sweden)

    Alberto Priego Moreno

    2016-07-01

    Full Text Available This article seeks to analyse how the Mediterranean Area has evolved after the changes occurred with the so-called Arab Springs. The main idea is to focus on the Southern Mediterranean as a dynamic space that expands itself as a result of its internal transformations and subsequent external changes caused by the Arab Spring. We will use the IR theory of the Regional Security Complex as it is considered as the most adaptable to this changing reality.

  19. INDIA’S GROWING INFLUENCE IN STABILIZING REGIONAL SECURITY IN SOUTHEAST ASIA

    Science.gov (United States)

    2016-02-16

    from organized terrorist groups. India is well positioned to assist in the Indian Ocean security concerns and the Indian Navy patrols the region...drinking water crisis due to fire in water distillation plant in Male, Maldives on 04 September 2014, India was the first to respond by sending Indian Air...vehicles (OPV) for Sri Lankan Navy. 64 Indian Space Organization (ISRO) has achieved great heights in satellite launch technology and has launched not

  20. Enhancing Experiment Central Service Reliability: from delivery to security and virtualization

    CERN Document Server

    Donno, Flavia; Buzykaev, Alexey; Saiz Santos, Maria Dolores

    2011-01-01

    The four LHC experiments rely on experiment specific services running on machines mainly located at CERN. Some of these services have been rated by the experiments as very critical: any loss or degradation of performance has a major impact on the experiment's production and analysis activities. It is therefore important to provide a reliable and robust operational environment. In this work we describe the strategy based on service deployment, security and virtualization adopted to enhance the reliability of ATLAS and CMS central services.

  1. Examining the Religious Strands of Islamic Terrorists to Enhance U.S. Security

    Science.gov (United States)

    2012-03-01

    Russia, India, Israel, Nigeria, Jordan and El Salvador. He also served on assignments in Zanzibar and Dar es Salaam , Tanzania. He holds the personal...and have to establish reachable goals and objectives to 16 enhance U.S. security. He stated the following while campaigning for the U.S. Congress ...members of Congress called for “getting tough” with Pakistan, and others suggested a divorce.64 Instead of divorcing, the U.S. must make “building a

  2. Viability of Hydrogen Pathways that Enhance Energy Security: A Comparison of China and Denmark

    DEFF Research Database (Denmark)

    Ren, Jingzheng; Andreasen, Kristian, Peter; Sovacool, Benjamin, K.

    2014-01-01

    When designed and built properly, hydrogen energy systems can enhance energy security through technological diversification and minimizing dependence on foreign imports of energy fuels. However, hydrogen can be produced from different feedstocks according to separate pathways, and these different...... objectives. The results are useful for stakeholders and energy analysts so that they can correctly plan and research the most socially optimal portfolio of hydrogen technologies....

  3. National Security Cutter: Enhanced Oversight Needed to Ensure Problems Discovered during Testing and Operations Are Addressed

    Science.gov (United States)

    2016-01-01

    2013 to 2014, the NSC interdicted nearly 60 percent more pounds of drugs (cocaine and marijuana ) per day compared to the HECs operating during the...and Evaluation 8 Figure 4: National Security Cutter Combat Weapon Systems 15 Figure 5: Wave Height of Different Sea States Compared to the National...is intended to be capable of extended deployments, increased endurance, and enhanced communication and surveillance systems compared to the High

  4. Accounting and Control in Ensuring Economic Security of the Organizations of Perm Region

    Directory of Open Access Journals (Sweden)

    Vyacheslav Valetyevich Epishin

    2016-09-01

    Full Text Available The article deals with the urgent problem concerning the regional development as well as the specific organization, or to the development of an integrated system of economic security of the organization. The article discusses the importance of such an element of economic security (including the financial security as the accounting and control as well as their possible violations. The authors substantiate their position on the relationship of the violations of accounting and control and also the internal theft, other economic crimes and their negative consequences. The analysis of the existing national and foreign sources related to the subject of the study is carried out. The conclusion is made about the lack of modern research devoted to the study of the protective properties of accounting, control and their violations, which condition economic crimes. The methodological tools of the research include dialectic method, systemic analysis, complex sociological methods: the analysis of the legal sources, of statistical information and judicial practice. On the basis of the analysis of criminal cases, financial statements, publications media, the authors made the conclusion about the conditionality of the theft in the organizations as there are the violations of accounting and control, low efficiency of control and auditing, of preventive measures for neutralization of the violations of accounting and control from the services of economic security, accounting offices, auditing and law enforcement services. The recommendations for the optimization of this work are introduced. They can be used by accounting departments, auditing bodies, fiscal authorities at the municipal and regional level and by law enforcement officials. The economic security is necessary for any organizations regardless of their forms of ownership, ranging from government organizations to small kiosks. The difference will only consist in the means and methods.

  5. Status and determinants of small farming households' food security and role of market access in enhancing food security in rural Pakistan.

    Directory of Open Access Journals (Sweden)

    Umar Ijaz Ahmed

    Full Text Available In most of the developing countries, lack of resources and little market accessibility are among the major factors that affect small farming household food security. This study aims to investigate the status of small farming households' food security, and its determinants including the role of market accessibility factors in enhancing food security at household level. In addition, this study also determines the households' perception about different kinds of livelihoods risks. This study is based on a household survey of 576 households conducted through face-to-face interviews using structured interviews in Punjab, Pakistan. Food security status is calculated using dietary intake method. The study findings show that one-fourth of the households are food insecure. The study findings reveal that farm households perceive increase in food prices, crop diseases, lack of irrigation water and increase in health expenses as major livelihood risks. Further, the results of logistic regression show that family size, monthly income, food prices, health expenses and debt are main factors influencing the food security status of rural households. Furthermore, the market accessibility factors (road distance and transportation cost do significantly affect the small farming household food security. The results suggest that local food security can be enhanced by creating off-farm employment opportunities, improved transportation facilities and road infrastructure.

  6. Status and determinants of small farming households' food security and role of market access in enhancing food security in rural Pakistan.

    Science.gov (United States)

    Ahmed, Umar Ijaz; Ying, Liu; Bashir, Muhammad Khalid; Abid, Muhammad; Zulfiqar, Farhad

    2017-01-01

    In most of the developing countries, lack of resources and little market accessibility are among the major factors that affect small farming household food security. This study aims to investigate the status of small farming households' food security, and its determinants including the role of market accessibility factors in enhancing food security at household level. In addition, this study also determines the households' perception about different kinds of livelihoods risks. This study is based on a household survey of 576 households conducted through face-to-face interviews using structured interviews in Punjab, Pakistan. Food security status is calculated using dietary intake method. The study findings show that one-fourth of the households are food insecure. The study findings reveal that farm households perceive increase in food prices, crop diseases, lack of irrigation water and increase in health expenses as major livelihood risks. Further, the results of logistic regression show that family size, monthly income, food prices, health expenses and debt are main factors influencing the food security status of rural households. Furthermore, the market accessibility factors (road distance and transportation cost) do significantly affect the small farming household food security. The results suggest that local food security can be enhanced by creating off-farm employment opportunities, improved transportation facilities and road infrastructure.

  7. The Importance of the Study of Cognitive Performance Enhancement for U.S. National Security.

    Science.gov (United States)

    Malish, Richard G

    2017-08-01

    The American military is embarking on the 'Third Offset'-a strategy designed to produce seismic shifts in the future of warfare. Central to the approach is the conjoining of humans, technology, and machines to deliver a decisive advantage on the battlefield. Because technology will spread rapidly and globally, tactical overmatch will occur when American operators possess a competitive edge in cognition. Investigation of cognitive enhancing therapeutics is not widely articulated as an adjunct to the Third Offset, yet failure to study promising agents could represent a strategic vulnerability. Because of its legacy of research into therapeutic agents to enhance human-machine interplay, the aerospace medical community represents a front-running candidate to perform this work. Notably, there are strong signals emanating from gambling, academic, and video-gaming enterprises that already-developed stimulants and other agents provide cognitive benefits. These agents should be studied not only for reasons of national security, but also because cognitive enhancement may be a necessary step in the evolution of humankind. To illustrate these points, this article will assert that: 1) the need to preserve and enhance physical and cognitive health will become more and more important over the next century; 2) aeromedical specialists are in a position to take the lead in the endeavor to enhance cognition; 3) signals of enhancement of the type useful to both military and medical efforts exist aplenty in today's society; and 4) the aeromedical community should approach human enhancement research deliberately but carefully.Malish RG. The importance of the study of cognitive performance enhancement for U.S. national security. Aerosp Med Hum Perform. 2017; 88(8):773-778.

  8. Secured operating regions of Slotted ALOHA in the presence of interfering signals from other networks and DoS attacking signals

    Directory of Open Access Journals (Sweden)

    Jahangir H. Sarker

    2011-07-01

    Full Text Available It is expected that many networks will be providing services at a time in near future and those will also produce different interfering signals for the current Slotted ALOHA based systems. A random packet destruction Denial of Service (DoS attacking signal can shut down the Slotted ALOHA based networks easily. Therefore, to keep up the services of Slotted ALOHA based systems by enhancing the secured operating regions in the presence of the interfering signals from other wireless systems and DoS attacking signals is an important issue and is investigated in this paper. We have presented four different techniques for secured operating regions enhancements of Slotted ALOHA protocol. Results show that the interfering signals from other wireless systems and the DoS attacking signals can produce similar detrimental effect on Slotted ALOHA. However, the most detrimental effect can be produced, if an artificial DoS attack can be launched using extra false packets arrival from the original network. All four proposed secured operating regions enhancement techniques are easy to implement and have the ability to prevent the shutdown of the Slotted ALOHA based networks.

  9. Security of Small States, Problems of the States of the South Asian Region and Bangladesh’s Options for Security,

    Science.gov (United States)

    1988-03-10

    from concentration of power and a tendency to stem the growth of an alternative leadership base, there is a tendency to identify regime security with...state security resulting in obvious distortion in conceptualisation of national security. The nation’s search for a stable political system suffers...withstand the test of crisis- management . o In most cases, seeds of nationalism and nationalistic feelings remain dormant and forces of divisiveness

  10. Significance of the internal locking mechanism for loop security enhancement in the arthroscopic knot.

    Science.gov (United States)

    Kim, S H; Ha, K I; Kim, S H; Kim, J S

    2001-10-01

    Secure tissue fixation of an arthroscopic knot depends on the security of the initial loop and additional locking half-hitches. The purpose of this report is to evaluate the loop and knot security relative to the internal locking mechanism of arthroscopic slip knot. This is an experimental study designed for knot and loop security on a material testing system. The measurements were carried out in a blinded fashion in which the tester was not aware of the type of knot being tested. Five configurations of arthroscopic knots (overhand throw, Duncan loop, Revo knot, Tennessee slider, and SMC knot) were created around a 5-mm diameter metal bar using a No. 2 braided suture. For each knot configuration, 10 knots were tested for displacement at cyclic loading, load to clinical failure (3-mm displacement), ultimate failure load, and mode of failure on the servo-hydraulic material testing system (MTS 858 MiniBionix test system; MTS, Minneapolis, MN). A 1-way analysis of variance was used to determine the statistical difference in displacement at cyclic loading, load to clinical failure, and ultimate failure load between each knot configuration. In the cyclic loading test, the average displacement of all knots was clinically insignificant, with the average being less than 0.24 mm. The overhand throw had the worst characteristic in the load to failure test. The other 4 knots had an optimal load to failure. The SMC knot, which has an internal locking mechanism, had good loop and knot security in the load to clinical failure and ultimate failure load (P <.05). The SMC and the Revo knots failed by knot breakage (material failure) whereas the other knots failed by knot slippage (loop failure). The internal locking mechanism flips the post strand to convert the loop strand into a new post strand while rerouting the original post strand around a new post. An arthroscopic knot with an internal locking mechanism can enhance loop security.

  11. The Glory of Intelligence: China’s Smart Power and the Implications for Security in the Asia-Pacific Region

    Directory of Open Access Journals (Sweden)

    Sergey Mikhnevich

    2016-03-01

    Full Text Available This article considers the interconnection between the institutional change in the sphere of security and China’s smart power in the Asia-Pacific region. It explores the practical dimension of China’s smart power in the region after the Cold War, and analyzes the multilateral interaction on security issues in the Association of the Southeast Asia Nations (ASEAN. The appropriate mechanisms in which all the major actors participate are the basis and essence of the macro regional security architecture. This article identifies the links between China’s smart power and the macro regional security institutionalization. It begins by describing the ideological dimension of Chinese foreign policy since the establishment of the People’s Republic. It considers the main theoretical concept constituting China’s international strategy and its economical methods of spreading soft power in the Asia-Pacific region. It goes on to analyze the process of multilateral interaction in macro regional security after the Cold War, recognizing that despite the promotion of cooperation in non-traditional security issues there are still challenges for China, the United States and ASEAN in the realm of traditional security. Moreover, the effective and efficient use of smart power in the ASEAN mechanisms helps China counteract the efforts of other countries in the region to limit its politics. The article concludes that regional multilateral security institutions have reached their limit of effectiveness due to their design and the politics of the main actors. To sustain an acceptable level of security in the region, all participants need to develop new institutions or radically reorganize the existing ones.

  12. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    Science.gov (United States)

    You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  13. Security enhanced optical one-time password authentication method by using digital holography

    Science.gov (United States)

    Gil, Sang Keun; Jeon, Seok Hee; Jeong, Jong Rae

    2015-03-01

    We propose a new optical one-time password(OTP) authentication method by using digital holography, which enhances security strength in the cryptosystem compared to the conventional electronic OTP method. In this paper, a challenge-response optical OTP authentication based on two-factor authentication is presented by 2-step quadrature phase-shifting digital holography using orthogonal polarization, and two-way authentication is also performed using the challenge-response handshake in both directions. The ID (identification), PW (password) and OTP information are encrypted with a shared key by applying phase-shifting digital holography, and these encrypted information are verified each other by the shared key. Because the encrypted digital holograms which are transmitted to the other party are expressed as random distribution, it guards against a replay attack and results in higher security level. Optically, encrypted digital hologram in our method is Fourier transform hologram and is recorded on CCD with 256 gray-level quantized intensities. The proposed method has an advantage that it does not need a time-synchronized OTP and can be applied to various security services. Computer experiments show that the proposed method is suitable for high secure OTP authentication.

  14. Security of water, energy, and food nexus in the Asia-Pacific region

    Science.gov (United States)

    Taniguchi, M.; Endo, A.; Fujii, M.; Shoji, J.; Baba, K.; Gurdak, J. J.; Allen, D. M.; Siringan, F. P.; Delinom, R.

    2014-12-01

    Water, energy, and food are the most important and fundamental resources for human beings and society. Demands for these resources are escalating rapidly because of increases in populations and changes in lifestyles. Therefore intensive demand for those resources makes conflicts between resources. Securities of water, energy, and food are treated separately, however they should be considered as one integrated matter, because water-energy-food are connected and it makes nexus and tradeoff. Security in terms of self-production, diversity of alternatives, and variability are evaluated for water, energy and food for thirty two countries in the Asia-Pacific region. The water and energy nexus includes water consumption for the cooling of power plant systems, water use for hydro power generation, and energy consumption for water allocation and pumping. The water and food nexus consists of water consumption for agriculture and aquaculture. The energy and food nexus includes energy consumption for food production and biomass for energy. Analyses of 11 countries within the Asia- Pacific region show that energy consumption for fish is the largest among foods in Japan, Philippines, and Peru, while energy consumption for cereals is the largest among foods in Canada, US, Indonesia, and others. Water consumption for different types of food and energy are also analyzed, including nexus ratio to total water consumption. The water-energy-food nexus at a local level in the Asia Pacific region are examined by the Research Institute for Humanity and Nature project "Human environmental security in Asia Pacific Ring of Fire". Themes including geothermal power plants for energy development and hot springs as water, shale gas for energy development and water consumption/contamination, aquaculture for food and water contamination are used to evaluate the water-energy-food nexus in the Asia-Pacific region.

  15. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-01-01

    Full Text Available An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.

  16. Nuclear installations in the baltic sea region and the stake holders cooperation: a crucial step towards energy security, environmental sustainability and political stability in the region

    Energy Technology Data Exchange (ETDEWEB)

    Zakaria, M.; Mandere, N.; Olsson, L. [Lund Univ., Centre for Sustainability Studies (LUCSUS) (Sweden)

    2006-07-01

    Radiation hazards are trans-boundary. The prevention of accidents must be managed locally. But the awareness, preparedness, and the responsibilities in the case of emergencies must be managed at the local and regional level, and must rely on close interaction between the local and regional levels. The Baltic Sea Region contains over 40 nuclear reactors contributing to energy security, but also posing a potential threat to human, environmental, and political security. The aim of this paper is to integrate the four fields of security: health, environment, energy, and political by analysing awareness, preparedness responsibility and decision making related to nuclear installations. With increasing political, economical, cultural and physical (in term of energy infrastructure) integration, the region needs to take a comprehensive approach to create adequate structure for managing risks and thereby promote security. (authors)

  17. Challenges of transfrontier conservation areas: Natural resources nationalism, security and regionalism in the southern African development community region

    Directory of Open Access Journals (Sweden)

    Oswell Rusinga

    2012-12-01

    Full Text Available Transfrontier Conservation Areas (TFCAs initiatives in the Southern African Development Community (SADC region offer hope for providing a mechanism for resolving political tensions and conflicts which are not only related to environmental issues but to security concerns as well. The geopolitical implications of TFCAs in the SADC region cannot be overemphasised with regard to international relations and regional integration. The SADS region is characterised by histories of contested military balance of power and geopolitical rivalries which have a potential to degenerate into military confrontation. Although there is a strong belief in multilateral co-operation among SADC member countries, most of them often engage the international community at the bilateral level. Moreover, there is disharmony in constitutional applications of the rule of law, respect of human rights and good governance. However, TFCAs initiatives in Southern Africa have been seen as offering an opportunity to heal the wounds of pre- and post-independence wars of destabilisation through the encouragement of inter-state collaboration and co-operation by giving governments an opportunity for mutual action on issues of common interest.

  18. Pastoralists at War: Violence and Security in the Kenya-Sudan-Uganda Border Region

    Directory of Open Access Journals (Sweden)

    Jonah Leff

    2009-12-01

    Full Text Available The majority of those living in the border region of Kenya, Sudan, and Uganda are pastoralists, whose livelihoods are dictated by the upkeep and size of their herds. Harsh environmental conditions force pastoralists to migrate in search of water and pasturelands during the dry season. With limited access to water and competing rights to land, intertribal conflict arises when pastoralists from one tribe enter the territory of another. The increased availability of small arms in the region from past wars increasingly makes ordinary clashes fatal. Governments in the region have responded with heavy-handed coercive disarmament operations. These have led to distrust and subsequent violent clashes between communities and security providers. This report reviews the scale, consequences of, and responses to the many pastoral conflicts, utilizing methodological tools such as key informant interviews, retrospective analysis, and a thorough review of available literature.

  19. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Directory of Open Access Journals (Sweden)

    Dongwoo Kang

    Full Text Available The Proxy Mobile IPv6 (PMIPv6 is a network-based mobility management protocol that allows a Mobile Node(MN connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG. As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  20. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Science.gov (United States)

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  1. Enhanced Secure Trusted AODV (ESTA Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Dilraj Singh

    2015-09-01

    Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

  2. Improving food security on the basis of integration processes in the agroindustrial complex of the region

    Directory of Open Access Journals (Sweden)

    O. G. Stukalo

    2016-01-01

    Full Text Available The article considers ways of improving food security in the region. Food production, necessary for the existence of mankind, and the level and quality of nutrition characterize the degree of socio-economic development, health and life expectancy of the person. Extreme importance and many unresolved issues related to ensuring food security in the meat subcomplex are doing highly relevant research questions related to the development of integration formations. In regions where integrated economic entities it is necessary to state financial and material (starting help them operate more efficiently. It is important that controls were not carried out functions of economic management and promoted it within its own competence. In the Voronezh region with the aim of providing stable meat raw material has been implemented the investment project creation of the tribal enterprise for the breeding and fattening of beef cattle at the production sites of Zarechnoe, OOO, with a capacity of 30,000 heads of cattle. Commissioning which made it possible to complete creation in the Voronezh region meat cluster. Existing integration ties in the meat sub-complex are formed is not yet on a mutually advantageous basis and, in practice, infringe on economic interests of agricultural producers. In order to ensure further development and improve the efficiency of specialized and cooperative groups, namely in production, processing and realization of meat products it is expedient to establish at the regional level, the formation of agricultural holding type in the Voronezh region. The particular relevance of the project becomes due to the current shortage of animal protein, growth in the import of raw materials and products and is aimed at the development of domestic production by maximizing the use of reserves local resources to importsubstituting technologies.

  3. Results of a project on development of agro-forestry systems for food security in Carrefour region, Republic of Haiti

    Directory of Open Access Journals (Sweden)

    Furio Massolino

    2011-11-01

    Full Text Available Haity has a notable problem of food security, 48% of people have not sufficient food availability, food prices has doubled from 1980 and 1990 and further increased 5 times between 1991 and 2000. Water availability and quality is another problems to be added to food insufficiency. Food deficiency is mitigated by natural food resources in rural areas where many different species are cultivated together but it can be extreme in the towns. Agricultural systems are not efficient and, at the same time, enhance soil and genetic erosion. A development project has been implemented to increase food security over the long term in the geographical area of Carrefour rural area, this comprises a research aimed to increase national food production introducing complex agro-forestry systems. The project has investigated problems and solutions, actions have been started to increase food production, including agronomic training of local farmers, organization of small farmers including legal protection on land tenure, introduction of low input modern agroforestry systems that can diversify food production through the year and reduce soil and genetic erosion. After these results, an intervention project has been approved and funded by EU, then delayed due to the recent civil war, finally it is giving positive results now. The same approach used for this project can be spread in the rest of the Republic of Haiti and, hopefully, to other world regions that have similar problems.

  4. Enhanced cold-season warming in semi-arid regions

    Directory of Open Access Journals (Sweden)

    J. Huang

    2012-06-01

    Full Text Available This study examined surface air temperature trends over global land from 1901–2009. It is found that the warming trend was particularly enhanced, in the boreal cold season (November to March over semi-arid regions (with precipitation of 200–600 mm yr−1 showing a temperature increase of 1.53 °C as compared to the global annual mean temperature increase of 1.13 °C over land. In mid-latitude semi-arid areas of Europe, Asia, and North America, temperatures in the cold season increased by 1.41, 2.42, and 1.5 °C, respectively. The semi-arid regions contribute 44.46% to global annual-mean land-surface temperature trend. The mid-latitude semi-arid regions in the Northern Hemisphere contribute by 27.0% of the total, with the mid-latitude semi-arid areas in Europe, Asia, and North America accounting for 6.29%, 13.81%, and 6.85%, respectively. Such enhanced semi-arid warming (ESAW imply drier and warmer trend of these regions.

  5. Iran's Relations to the East: Nonproliferation and Regional Security in a Changing Southwest Asia

    Energy Technology Data Exchange (ETDEWEB)

    Tehsin, Muhammad [Quaid-I-Azam Univ., Islamabad (Pakistan)

    2014-11-01

    This study attempts to answer the following questions: would a successful JPOA result in nuclear nonproliferation and regional security in Southwest Asia; and could the Middle East and South Asia work together to contain the threat of Salafi jihadism?

  6. Development of a strategic plan for food security and safety in the Inuvialuit Settlement Region, Canada.

    Science.gov (United States)

    Fillion, Myriam; Laird, Brian; Douglas, Vasiliki; Van Pelt, Linda; Archie, Diane; Chan, Hing Man

    2014-01-01

    Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR), Northwest Territories (NWT), Canada. A qualitative study using group discussions during a workshop. A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS) and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a) capacity building within communities; (b) promotion of the use of traditional foods to address food security; (c) research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d) and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. The results of the planning workshop provide a blueprint for future research and intervention projects.

  7. Security in the Baltic region as a Projection of Global Confrontation between Russia and the USA

    Directory of Open Access Journals (Sweden)

    Vadim Volovoj

    2017-03-01

    Full Text Available This article considers the problem of security in the Baltic region, namely, that of Poland and the Baltics. The authors rely on the works of Karl Deutsch, Emanuel Adler, on Michael Barnett’s theory of security communities and Barry Buzan’s re­gional security complex theory, address Steven Mann’s controlled chaos theory and the concept of Intermarium. Their starting assumption is that the situation in the Baltic depends largely on the politics of external powers — Russia and the United States, — being a projection of their global geopolitical confrontation. The US strategy thus becomes a major part of the equation. The authors believe that since the end of the second Iraq war the American elite has been divided along ideological lines into adherents of the chaos theory and traditionalists thinking in terms of sharing control with the other centres of global power. The US strategy in the Baltic region does not seek an open military conflict with Russia. On the contrary, the US strives to preserve the current level of confrontation between Russia and the EU, convincing the latter of the reality of the Russian threat. Countries that traditionally support confrontation with Russia, Poland and the Bal­tics, serve as a conduit for Washington strategy in Europe and a cordon sanitaire. This function is implemented through the Intermarium project meant to separate Russia from the EU. The four countries are rather active in this area, striving to attain the status of the US principal partners in the region and Europe in general. To retaliate, Moscow does everything within its power to ‘separate’ Brussels from Washington, yet the US influence is still very strong in Europe.

  8. Unpacking Terrorism, Revolution and Insurgency in Yemen: Real and Imagined Threats to Regional Security

    OpenAIRE

    Alexandra Lewis

    2013-01-01

    Recent months have seen a seeming escalation in the international threat posed by Al Qaeda in the Arabian Peninsula (AQAP), a terrorist network that has taken Yemen as its regional base of operations. In light of recent attacks, and resulting embassy closures, Yemen is a rising priority in the Western-led War on Terror. However, this has resulted in a side-lining of other security threats in Yemen, which may cause serious challenges to the authority of the Yemeni Government. In reality, the r...

  9. «Cross-border Environmental Peace» as the Interaction of Regional Norms and Local Power: Lessons from Cross-Regional Analysis of Water Security Debates

    OpenAIRE

    Koff, Harlan

    2016-01-01

    This article contends that notions of «peace» and «justice» in cross-border water management vary in different world regions. Moreover, it argues that «peace» and «justice» can be explained by analyzing the interaction between «regional» interpretations and implementation of water security norms and local cross-border power structures. «Regional water security» is defined as the normative commitment to provide necessary water resources to communities within world regions. «Power,» which is de...

  10. Food security and regional agricultural market: Economic analysis and development prospects

    Directory of Open Access Journals (Sweden)

    Lescheva Marina

    2014-01-01

    Full Text Available The analysis of dynamics and current state of an agrifood market is conducted on the case of the agrarian region of Stavropol Krai. The research objective is to analyse development factors and tendencies of the regional agrifood market; to assess the import dependency rate of selected product sectors; to investigate the perspective directions of domestic market saturation. The research subject is a system of economic relations, directed on the establishment and development of the agricultural commodities and food market, and a range of special economic measures for insurance of the food security in the Russian Federation. The analysis includes the market capacity and level of self-sufficiency in the Stavropol Krai, which are defined by basic foodstuffs. It is found that people's needs in food are covered insufficiently. It is revealed that Stavropol Krai is an active player on both inter-regional and international markets, with the substantial amounts of counter deliveries. Agricultural raw commodities of low added value predominate in export, while processed ones of higher added value - in imports. Food processing industry of the region is underdeveloped, however, it has substantial reserves for development. The major protection measures of domestic food market are defined in the paper: diversification of agricultural production, and industrial and logistics infrastructure development of the regional agrarian market. The results can be used by regional government authorities in improving of the domestic food market regulations.

  11. An approach for physical layer security enhancement and PAPR reduction in OFDM-PON

    Science.gov (United States)

    Chen, Junxin; Zhu, Zhi-liang

    2017-07-01

    This work develops a solution for simultaneous physical layer security enhancement and peak-to-average power ratio (PAPR) reduction for orthogonal frequency division multiplexing passive optical network (OFDM-PON) systems. The encryption is carried out within the subcarriers with the help of three-dimensional (3-D) chaotic cat map. Experimental results demonstrate that the OFDM-PON system under the protection of the proposed technique is high sensitive to the secret key, invalid optical network units cannot obtain any useful information from the ciphertext. Besides, the PAPR of the OFDM symbols has also been significantly reduced, and hence the system is more robust against various nonlinear disturbances.

  12. Contrast-Enhanced Ultrasound Imaging Based on Bubble Region Detection

    Directory of Open Access Journals (Sweden)

    Yurong Huang

    2017-10-01

    Full Text Available The study of ultrasound contrast agent imaging (USCAI based on plane waves has recently attracted increasing attention. A series of USCAI techniques have been developed to improve the imaging quality. Most of the existing methods enhance the contrast-to-tissue ratio (CTR using the time-frequency spectrum differences between the tissue and ultrasound contrast agent (UCA region. In this paper, a new USCAI method based on bubble region detection was proposed, in which the frequency difference as well as the dissimilarity of tissue and UCA in the spatial domain was taken into account. A bubble wavelet based on the Doinikov model was firstly constructed. Bubble wavelet transformation (BWT was then applied to strengthen the UCA region and weaken the tissue region. The bubble region was thereafter detected by using the combination of eigenvalue and eigenspace-based coherence factor (ESBCF. The phantom and rabbit in vivo experiment results suggested that our method was capable of suppressing the background interference and strengthening the information of UCA. For the phantom experiment, the imaging CTR was improved by 10.1 dB compared with plane wave imaging based on delay-and-sum (DAS and by 4.2 dB over imaging based on BWT on average. Furthermore, for the rabbit kidney experiment, the corresponding improvements were 18.0 dB and 3.4 dB, respectively.

  13. Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems

    Science.gov (United States)

    Tang, Wan; Chen, Min; Ni, Jin; Yang, Ximin

    2011-01-01

    The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system. PMID:22163983

  14. Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems

    Directory of Open Access Journals (Sweden)

    Ximin Yang

    2011-06-01

    Full Text Available The traditional Radio Frequency Identification (RFID system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.

  15. Security enhancement mechanism based on contextual authentication and role analysis for 2G-RFID systems.

    Science.gov (United States)

    Tang, Wan; Chen, Min; Ni, Jin; Yang, Ximin

    2011-01-01

    The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.

  16. Neoindustrialization as a factor in improving economic security of old-industrial regions

    Directory of Open Access Journals (Sweden)

    Ol’ga Aleksandrovna Romanova

    2012-06-01

    Full Text Available This paper proves that the paradigm of the world of the XXIcentury is neoindustrialization on the basis of alternativestrategic goals of the global economy associated with the formation of post-industrial society and financialization neoindustrialization. A systematic proposal for the driving forces and mechanisms for its implementation is suggested. It is shown that target-oriented approach can be successfully used at the regional level as a mechanism for economic neoindustrialization of an old-industrial region. Conceptual approach to developing comprehensive program of industrial development in the industrial region that implements the ideas of neoindustrialization in relation to industry of Sverdlovsk region is presented. It was found that the regional technology platform can be an effective tool for combining the interests of territorial and sectoral development. It is proved that the idea of neoindustrialization can be realized only as a result of wise industrial policy and road map formation for the movement to an entirely new high-tech based industrial development. In the process of forming, the problem of neoindustrialization of a «pure» market as a factor in increasing the economic security is actualized.

  17. Armenian-Georgian Relations in the context of Regional Security in Transcaucasia

    Directory of Open Access Journals (Sweden)

    Nare Gareginova Galoyan

    2015-12-01

    Full Text Available The article is devoted to the formation of foreign policy priorities of the Republic of Armenia and Georgia, and related processes in the South Caucasus in the 1990s. We consider their impact on the development of the Armenian-Georgian relations. The author draws attention to the key importance of the period, when the newly independent state, along with numerous internal problems, make decisions on matters of foreign policy. Also analyzes the factors of internal nature, affecting the bilateral relations in the framework of regional security. The author draws attention to the fact that the implementation of the military-political and economic projects there was a factor of manipulation on the part of the States concerned, that would lead to the division of the region into zones of influence. Special emphasis is placed also on the Georgian-Turkish relations in the region. In the military sphere, not only Georgia, but also aroused the interest of the Republic of Armenia from Turkey. This was due to the military presence of Russia in the region. Tbilisi integration into European and Euro-Atlantic organizations is a priority in its foreign policy, whereas in Armenia priority as previously considered Russia. Despite the differences in foreign policy, both countries understand and accept the importance of good neighborly relations in the region, which formed the basis of the bilateral cooperation between Georgia and the Republic of Armenia.

  18. Energy and water tradeoffs in enhancing food security. A selective international assessment

    Energy Technology Data Exchange (ETDEWEB)

    Mushtaq, Shahbaz; Maraseni, Tek Narayan; Maroulis, Jerry [Australian Centre for Sustainable Catchments, University of Southern Queensland, Toowoomba, Qld 4350 (Australia); Hafeez, Mohsin [International Centre of Water for Food Security, Charles Sturt University, Wagga Wagga, NSW 2678 (Australia)

    2009-09-15

    Rice is the major staple food in most Asian countries. However, with rapidly growing populations, sustained high productivity and yields through improving water productivity is critically important. Increasingly complex energy-agriculture relationships require an in-depth understanding of water and energy tradeoffs. This study contributes to energy and food policies by analysing the complex energy, water and economics dynamics across a selection of major rice growing countries. The results show that tradeoffs exist between yield and energy inputs with high yield attributed to higher levels of energy input. The selected developed countries show higher energy productivity, relative to all other energy inputs, compared to the selected developing counties, owing to enhanced mechanisation, on-farm technology and improved farm management. Among all countries, China has the highest water productivity due to water-saving irrigation practices. These practices offer opportunities for developed and developing countries to increase water productivity at the same time taking advantage of economic and energy benefits of reduced pumping. Sustained production from agriculture is vital to food security. Improved irrigation practices can offset environmental footprints in the short run but their large-scale implementation remains an issue. In the long run, investments are needed to buffer the negative impacts of food production on the environment. Investments to boost water productivity and improved energy use efficiency in crop production are two pathways to reduce energy dependency, enhanced natural resource sustainability and ensuring future food security. (author)

  19. Energy and water tradeoffs in enhancing food security: A selective international assessment

    Energy Technology Data Exchange (ETDEWEB)

    Mushtaq, Shahbaz [Australian Centre for Sustainable Catchments, University of Southern Queensland, Toowoomba, Qld 4350 (Australia)], E-mail: mushtaqs@usq.edu.au; Maraseni, Tek Narayan; Maroulis, Jerry [Australian Centre for Sustainable Catchments, University of Southern Queensland, Toowoomba, Qld 4350 (Australia); Hafeez, Mohsin [International Centre of Water for Food Security, Charles Sturt University, Wagga Wagga, NSW 2678 (Australia)

    2009-09-15

    Rice is the major staple food in most Asian countries. However, with rapidly growing populations, sustained high productivity and yields through improving water productivity is critically important. Increasingly complex energy-agriculture relationships require an in-depth understanding of water and energy tradeoffs. This study contributes to energy and food policies by analysing the complex energy, water and economics dynamics across a selection of major rice growing countries. The results show that tradeoffs exist between yield and energy inputs with high yield attributed to higher levels of energy input. The selected developed countries show higher energy productivity, relative to all other energy inputs, compared to the selected developing counties, owing to enhanced mechanisation, on-farm technology and improved farm management. Among all countries, China has the highest water productivity due to water-saving irrigation practices. These practices offer opportunities for developed and developing countries to increase water productivity at the same time taking advantage of economic and energy benefits of reduced pumping. Sustained production from agriculture is vital to food security. Improved irrigation practices can offset environmental footprints in the short run but their large-scale implementation remains an issue. In the long run, investments are needed to buffer the negative impacts of food production on the environment. Investments to boost water productivity and improved energy use efficiency in crop production are two pathways to reduce energy dependency, enhanced natural resource sustainability and ensuring future food security.

  20. Energy security and competition over energy resources in Iran and Caucasus region

    Directory of Open Access Journals (Sweden)

    Shahrouz Abolhosseini

    2017-03-01

    Full Text Available Energy security as a dominant factor in international stability is of great importance for major economies. The global energy market with its current level of supply and demand relies on energy sources in the Middle East, Caucasus, Central Asia and Russia. After the Fukushima disaster nuclear powers in Europe view renewable energy sources as a serious alternative. Europe’s energy vulnerability has deteriorated due to the Russia-Ukraine conflict. However, renewable energy sources are not large enough to replace nuclear power completely. This trend will continue with climbing demand especially in the natural gas sector as clean energy. In this research, Caucasus and Iran are considered the main sources and routes for energy transmission to the global market, including Europe. Caucasus plays a key role in bridging Europe and Asia. Also, Iran is an alternative for energy transmission to Europe after lifted sanctions. As part of the European active supply diversification policy Iran has capacity to reduce Europe’s energy dependency on Russia. However, changes in US new administration America First Policy is harmful for the EUs energy security. Caucasus aims to catch a large share of the European energy market since the Baku-Tbilisi-Ceyhan pipeline has started operations and Iran is also trying to expand its market to become a sustainable source of energy for major consumers. Therefore, Iran and Caucasus are considered reliable energy suppliers for Europe. In this regard, we analyze the best motivation for changing the direction new suppliers’ energy policies towards Europe and suggest alternative solutions to compete with rival countries in order to enhance energy security.

  1. Development of a strategic plan for food security and safety in the Inuvialuit Settlement Region, Canada

    Directory of Open Access Journals (Sweden)

    Myriam Fillion

    2014-08-01

    Full Text Available Background: Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. Objectives: To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR, Northwest Territories (NWT, Canada. Design: A qualitative study using group discussions during a workshop. Methods: A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. Results: The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a capacity building within communities; (b promotion of the use of traditional foods to address food security; (c research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. Conclusions: The results of the planning workshop provide a blueprint for future research and intervention projects.

  2. An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1.

    Science.gov (United States)

    Kiah, M L Mat; Nabi, Mohamed S; Zaidan, B B; Zaidan, A A

    2013-10-01

    This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.

  3. Mangroves Enhance Reef Fish Abundance at the Caribbean Regional Scale.

    Directory of Open Access Journals (Sweden)

    Joseph E Serafy

    Full Text Available Several studies conducted at the scale of islands, or small sections of continental coastlines, have suggested that mangrove habitats serve to enhance fish abundances on coral reefs, mainly by providing nursery grounds for several ontogenetically-migrating species. However, evidence of such enhancement at a regional scale has not been reported, and recently, some researchers have questioned the mangrove-reef subsidy effect. In the present study, using two different regression approaches, we pursued two questions related to mangrove-reef connectivity at the Caribbean regional scale: (1 Are reef fish abundances limited by mangrove forest area?; and (2 Are mean reef fish abundances proportional to mangrove forest area after taking human population density and latitude into account? Specifically, we tested for Caribbean-wide mangrove forest area effects on the abundances of 12 reef fishes that have been previously characterized as "mangrove-dependent". Analyzed were data from an ongoing, long-term (20-year citizen-scientist fish monitoring program; coastal human population censuses; and several wetland forest information sources. Quantile regression results supported the notion that mangrove forest area limits the abundance of eight of the 12 fishes examined. Linear mixed-effects regression results, which considered potential human (fishing and habitat degradation and latitudinal influences, suggested that average reef fish densities of at least six of the 12 focal fishes were directly proportional to mangrove forest area. Recent work questioning the mangrove-reef fish subsidy effect likely reflects a failure to: (1 focus analyses on species that use mangroves as nurseries, (2 consider more than the mean fish abundance response to mangrove forest extent; and/or (3 quantitatively account for potentially confounding human impacts, such as fishing pressure and habitat degradation. Our study is the first to demonstrate at a large regional scale (i

  4. Unpacking Terrorism, Revolution and Insurgency in Yemen: Real and Imagined Threats to Regional Security

    Directory of Open Access Journals (Sweden)

    Alexandra Lewis

    2013-10-01

    Full Text Available Recent months have seen a seeming escalation in the international threat posed by Al Qaeda in the Arabian Peninsula (AQAP, a terrorist network that has taken Yemen as its regional base of operations. In light of recent attacks, and resulting embassy closures, Yemen is a rising priority in the Western-led War on Terror. However, this has resulted in a side-lining of other security threats in Yemen, which may cause serious challenges to the authority of the Yemeni Government. In reality, the role of AQAP has been heavily manipulated throughout Yemen’s contemporary history: this was most evident during the 2011 Arab Spring, when both sides in the conflict claimed that Al Qaeda operatives were working with members of the other. Two years later, the true nature of the AQAP threat in Yemen is rarely questioned by external observers, yet remains largely shrouded in mystery. There is a need for more critical approaches to the AQAP challenges, which take the broader context of Yemeni security into account.

  5. A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks

    Science.gov (United States)

    Adnan, Ali Idarous; Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad

    2017-01-01

    Due to the lack of dependency for routing initiation and an inadequate allocated sextant on responding messages, the secure geographic routing protocols for Wireless Sensor Networks (WSNs) have attracted considerable attention. However, the existing protocols are more likely to drop packets when legitimate nodes fail to respond to the routing initiation messages while attackers in the allocated sextant manage to respond. Furthermore, these protocols are designed with inefficient collection window and inadequate verification criteria which may lead to a high number of attacker selections. To prevent the failure to find an appropriate relay node and undesirable packet retransmission, this paper presents Secure Region-Based Geographic Routing Protocol (SRBGR) to increase the probability of selecting the appropriate relay node. By extending the allocated sextant and applying different message contention priorities more legitimate nodes can be admitted in the routing process. Moreover, the paper also proposed the bound collection window for a sufficient collection time and verification cost for both attacker identification and isolation. Extensive simulation experiments have been performed to evaluate the performance of the proposed protocol in comparison with other existing protocols. The results demonstrate that SRBGR increases network performance in terms of the packet delivery ratio and isolates attacks such as Sybil and Black hole. PMID:28121992

  6. A Secure Region-Based Geographic Routing Protocol (SRBGR) for Wireless Sensor Networks.

    Science.gov (United States)

    Adnan, Ali Idarous; Hanapi, Zurina Mohd; Othman, Mohamed; Zukarnain, Zuriati Ahmad

    2017-01-01

    Due to the lack of dependency for routing initiation and an inadequate allocated sextant on responding messages, the secure geographic routing protocols for Wireless Sensor Networks (WSNs) have attracted considerable attention. However, the existing protocols are more likely to drop packets when legitimate nodes fail to respond to the routing initiation messages while attackers in the allocated sextant manage to respond. Furthermore, these protocols are designed with inefficient collection window and inadequate verification criteria which may lead to a high number of attacker selections. To prevent the failure to find an appropriate relay node and undesirable packet retransmission, this paper presents Secure Region-Based Geographic Routing Protocol (SRBGR) to increase the probability of selecting the appropriate relay node. By extending the allocated sextant and applying different message contention priorities more legitimate nodes can be admitted in the routing process. Moreover, the paper also proposed the bound collection window for a sufficient collection time and verification cost for both attacker identification and isolation. Extensive simulation experiments have been performed to evaluate the performance of the proposed protocol in comparison with other existing protocols. The results demonstrate that SRBGR increases network performance in terms of the packet delivery ratio and isolates attacks such as Sybil and Black hole.

  7. An assessment of the effectiveness of fuel cycle technologies for the national energy security enhancement in the electricity sector

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Jun [Department of Nuclear and Quantum Engineering, KAIST, 335 Gwahangno, Yuseong-gu, Daejeon 305-701 (Korea, Republic of)], E-mail: hjkim@kaeri.re.kr; Jun, Eunju; Chang, Soon Heung [Department of Nuclear and Quantum Engineering, KAIST, 335 Gwahangno, Yuseong-gu, Daejeon 305-701 (Korea, Republic of); Kim, Won Joon [Business Economics Program and Center for Science-based Entrepreneurship, KAIST, 335 Gwahangno, Yuseong-gu, Daejeon 305-701 (Korea, Republic of)

    2009-05-15

    Energy security, in the 21st century, draws significant attention in most countries worldwide, because the national security and sustainable development depend largely on energy security. The anticipated fossil energy depletion and the instability of their supply drive many countries to consider nuclear energy as their alternative energy source for the enhancement of their national energy security. In this study, indicators measuring the level of energy security in the electric power sector are developed and applied for the assessment of the effectiveness of four electric power system schemes which deploy different nuclear fuel cycle technologies, with consideration for the diversification of the energy markets and the vulnerability to economic disruption. Results show that the contribution of the closed fuel cycle scheme is larger than the once-through fuel cycle scheme in the perspective of energy security. In addition, the completely closed fuel cycle with the spent fuel recycling enhances the national energy security to the maximum extent compared to all other fuel cycle schemes. Since a completely closed fuel cycle is hardly affected by the uranium price changes, this scheme is found to be the most favorable scheme, ensuring the stable profit of utilities and stabilizing the electricity tariff. In addition, the completely closed fuel cycle scheme provides the best enhancement of national energy security with respect to energy supply, under reasonable price conditions. The indicators developed in this study can be utilized as a useful instrument for the measurement of the level of the energy security, especially by the countries importing energy resources for the generation of electric power.

  8. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce.

    Science.gov (United States)

    Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita

    2014-05-01

    Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.

  9. A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiang Zhou

    2014-04-01

    Full Text Available Data aggregation is an important technique for reducing the energy consumption of sensor nodes in wireless sensor networks (WSNs. However, compromised aggregators may forge false values as the aggregated results of their child nodes in order to conduct stealthy attacks or steal other nodes’ privacy. This paper proposes a Secure-Enhanced Data Aggregation based on Elliptic Curve Cryptography (SEDA-ECC. The design of SEDA-ECC is based on the principles of privacy homomorphic encryption (PH and divide-and-conquer. An aggregation tree disjoint method is first adopted to divide the tree into three subtrees of similar sizes, and a PH-based aggregation is performed in each subtree to generate an aggregated subtree result. Then the forged result can be identified by the base station (BS by comparing the aggregated count value. Finally, the aggregated result can be calculated by the BS according to the remaining results that have not been forged. Extensive analysis and simulations show that SEDA-ECC can achieve the highest security level on the aggregated result with appropriate energy consumption compared with other asymmetric schemes.

  10. Genetic engineering of crops: a ray of hope for enhanced food security.

    Science.gov (United States)

    Gill, Sarvajeet Singh; Gill, Ritu; Tuteja, Renu; Tuteja, Narendra

    2014-01-01

    Crop improvement has been a basic and essential chase since organized cultivation of crops began thousands of years ago. Abiotic stresses as a whole are regarded as the crucial factors restricting the plant species to reach their full genetic potential to deliver desired productivity. The changing global climatic conditions are making them worse and pointing toward food insecurity. Agriculture biotechnology or genetic engineering has allowed us to look into and understand the complex nature of abiotic stresses and measures to improve the crop productivity under adverse conditions. Various candidate genes have been identified and transformed in model plants as well as agriculturally important crop plants to develop abiotic stress-tolerant plants for crop improvement. The views presented here are an attempt toward realizing the potential of genetic engineering for improving crops to better tolerate abiotic stresses in the era of climate change, which is now essential for global food security. There is great urgency in speeding up crop improvement programs that can use modern biotechnological tools in addition to current breeding practices for providing enhanced food security.

  11. Image Encryption Using Stream Cipher Based on Nonlinear Combination Generator with Enhanced Security

    Directory of Open Access Journals (Sweden)

    Belmeguenaï Aîssa

    2013-03-01

    Full Text Available The images are very largely used in our daily life; the security of their transfer became necessary. In this work a novel image encryption scheme using stream cipher algorithm based on nonlinear combination generator is developed. The main contribution of this work is to enhance the security of encrypted image. The proposed scheme is based on the use the several linear feedback shifts registers whose feedback polynomials are primitive and of degrees are all pairwise coprimes combined by resilient function whose resiliency order, algebraic degree and nonlinearity attain Siegenthaler’s and Sarkar, al.’s bounds. This proposed scheme is simple and highly efficient. In order to evaluate performance, the proposed algorithm was measured through a series of tests. These tests included visual test and histogram analysis, key space analysis, correlation coefficient analysis, image entropy, key sensitivity analysis, noise analysis, Berlekamp-Massey attack, correlation attack and algebraic attack. Experimental results demonstrate the proposed system is highly key sensitive, highly resistance to the noises and shows a good resistance against brute-force, statistical attacks, Berlekamp-Massey attack, correlation attack, algebraic attack and a robust system which makes it a potential candidate for encryption of image.

  12. Enhancing Heart-Beat-Based Security for mHealth Applications

    NARCIS (Netherlands)

    Seepers, Robert M; Strydis, Christos; Sourdis, Ioannis; De Zeeuw, Chris I

    In heart-beat-based security, a security key is derived from the time difference between consecutive heart beats (the inter-pulse interval, IPI), which may, subsequently, be used to enable secure communication. While heart-beat-based security holds promise in mobile health (mHealth) applications,

  13. Available transfer capability evaluation and enhancement using various FACTS controllers: Special focus on system security

    Directory of Open Access Journals (Sweden)

    M. Venkateswara Rao

    2016-03-01

    Full Text Available Nowadays, because of the deregulation of the power industry the continuous increase of the load increases the necessity of calculation of available transfer capability (ATC of a system to analyze the system security. With this calculation, the scheduling of generator can be decided to decrease the system severity. Further, constructing new transmission lines, new substations are very cost effective to meet the increasing load and to increase the transfer capability. Hence, an alternative way to increase the transfer capability is use of flexible ac transmission system (FACTS controllers. In this paper, SSSC, STACOM and UPFC are considered to show the effect of these controllers in enhancing system ATC. For this, a novel current based modeling and optimal location strategy of these controllers are presented. The proposed methodology is tested on standard IEEE-30 bus and IEEE-57 bus test systems with supporting numerical and graphical results.

  14. A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.

    Science.gov (United States)

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Li, Fagen

    2016-01-01

    Patient medication safety is an important issue in patient medication systems. In order to prevent medication errors, integrating Radio Frequency Identification (RFID) technology into automated patient medication systems is required in hospitals. Based on RFID technology, such systems can provide medical evidence for patients' prescriptions and medicine doses, etc. Due to the mutual authentication between the medication server and the tag, RFID authentication scheme is the best choice for automated patient medication systems. In this paper, we present a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety. Our scheme can achieve security requirements and overcome various attacks existing in other schemes. In addition, our scheme has better performance in terms of computational cost and communication overhead. Therefore, the proposed scheme is well suitable for patient medication systems.

  15. Challenges to the South Caucasus regional security aftermath of Russian–Georgian conflict: Hegemonic stability or new partnership?

    Directory of Open Access Journals (Sweden)

    Kornely K. Kakachia

    2011-01-01

    And the question is now how to handle this delicate situation in a strategically and geopolitically important region. So by controlling Georgia (in case Russia reaches abovementioned aims, Russia actually will be able to cut off Central Asia and Caspian resources. It means Russia would be able to isolate and cut off Azerbaijan and Central Asian countries and it will significantly strengthen its energy monopoly over Europe with all results coming out from that fact. So it’s about major shift in the energy policy and major shift in geopolitics based on this energy policy and Russian energy monopoly. The August war in Georgia demonstrated some risks associated with the functioning of the transit energy corridor in the southern Caucasus. It also demonstrated the need for broader security guarantees for a region that is vital to European and global energy security. Paper deals with economic damage inflicted by the Russo-Georgian war in South Caucasus and its implications for regional security.

  16. National Security Crisis Decision-Making: The Role of Regional Combatant Commander

    National Research Council Canada - National Science Library

    Williams, Sean C

    2007-01-01

    The successful management of the Cuban Missile Crisis of 1962 set an unfortunate precedent for crisis management and national security crisis decision-making that persists into the contemporary security environment...

  17. Soil health as a factor of ensuring food security (the case of the Asia-Pacific Region)

    Science.gov (United States)

    Kravchenko, Alla; Nesterova, Olga; Tregubova, Valentina; Semal, Viktoriia; Derbentseva, Alla; Purtova, Lyudmila; Kostenkov, Nikolay; Tyurina, Elena; Glotova, Elena; Sergeeva, Olesya; Korshenko, Ekaterina

    2016-04-01

    Soil health as a factor of ensuring food security (the case of the Asia-Pacific Region) Food security is a complex issue of both international and national levels. The food embargo on imported products has defined the preservation and regeneration of soils as a priority task in ensuring the food security of the Russian Federation. Soils are a finite, non-renewable resource and their preservation is extremely important for the national food security. Food production is the major function of soils; production of high-quality foods, rich in nutrients, is possible only in healthy soils. Therefore, a healthy and fertile soil is the most important factor in ensuring the food security and improved subsistence. By 2050, in order to meet the demand for food, the global agricultural production has to increase by 60%, and almost by 100% in the developing countries. In many countries and subregions of the Asia-Pacific Region, the population growth rates outrun the rates of food production. The possibilities of incorporating new lands into agricultural activities and providing their irrigation are also limited. In the context of expanding cooperation with the Asia-Pacific neighbors, Russia can make its contribution into improving the food security of the region. Russia has vast territories that could be used for crops farming; a substantial part of these lands have not been farmed yet. Hence, in the Russian Far East, production of grain crops can be increased by incorporating the unused territories into agricultural activities. Therefore, the Russian Far East is a unique site for creating a crops farming territory. And the preservation and regeneration of soils will provide for the production growth and ensure the food security of Russia and the Asia-Pacific region.

  18. The role and impact of the small states diplomacy on regional and international security

    Directory of Open Access Journals (Sweden)

    Dr.Sc. Bejtush Gashi

    2016-07-01

    Full Text Available History has proved that the safety for small countries has never been secure, however this has been more emphasized during the Cold War Period through the rivalry of the superpowers, ideological conflicts, as well as the clashes between their geopolitical and geostrategic interests. For the Superpowers it is very easy to manipulate with these countries' economic and military aspect. They can't handle a conflict with their strengths, while the only way is diplomatic war to avoid or decrease the danger of conflict. To avoid insecurity, which for the small countries in the international relationships is bigger than for the big countries, the only safety alternative is their association in the international institutions. To face the regional and global challenges of safety, the Western Balkan countries have only one strategic solution, that is the integration in the Euro-Atlantic structures. The membership institutionalizes the relations between the small countries with those regional in the economic and safety field, as well as it sets the frames of the behavior with which the weak are protected from the eventual misuse from the most powerful ones. Small countries should concentrate in the creation of the professional and trained forces which can be easily mobilized in case of any crisis and they should also be affordable in the economic aspect.

  19. Enhancing Nutrition Security via India's National Food Security Act: Using an Axe instead of a Scalpel?§

    OpenAIRE

    DESAI, SONALDE; Vanneman, Reeve

    2015-01-01

    In September 2013, India passed a historic National Food Security Act. This paper examines the potential impact of the two central pillars of this act - expansion of the Public Distribution System and strengthening of the Integrated Child Development Schemes – on child nutrition. Using new data from the India Human Development Survey of 2011-12, this paper shows that access to subsidized grains via PDS is not related to improved child nutrition, and while ICDS seems to be related to lower chi...

  20. Primary care in an unstable security, humanitarian, economic and political context: the Kurdistan Region of Iraq.

    Science.gov (United States)

    Shukor, Ali R; Klazinga, Niek S; Kringos, Dionne S

    2017-08-23

    This study presents a descriptive synthesis of Kurdistan Region of Iraq's (KRI) primary care system, which is undergoing comprehensive primary care reforms within the context of a cross-cutting structural economic adjustment program and protracted security, humanitarian, economic and political crises. The descriptive analysis used a framework operationalizing Starfield's classic primary care model for health services research. A scoping review was performed using relevant sources, and expert consultations were conducted for completing and validating data. The descriptive analysis presents a complex narrative of a primary care system undergoing classical developmental processes of transitioning middle-income countries. The system is simultaneously under tremendous pressure to adapt to the continuously changing, complex and resource-intensive needs of sub-populations exhibiting varying morbidity patterns, within the context of protracted security, humanitarian, economic, and political crises. Despite exhibiting significant resilience in the face of the ongoing crises, the continued influx of IDPs and Syrian refugees, coupled with extremely limited resources and weak governance at policy, organizational and clinical levels threaten the sustainability of KRI's public primary care system. Diverse trajectories to the strengthening and development of primary care are underway by local and international actors, notably the World Bank, RAND Corporation, UN organizations and USAID, focusing on varying imperatives related to the protracted humanitarian and economic crises. The convergence, interaction and outcomes of the diverse initiatives and policy approaches in relation to the development of KRI's primary care system are complex and highly uncertain. A common vision of primary care is required to align resources, initiatives and policies, and to enable synergy between all local and international actors involved in the developmental and humanitarian response. Further

  1. «Cross-border Environmental Peace» as the Interaction of Regional Norms and Local Power: Lessons from Cross-Regional Analysis of Water Security Debates

    Directory of Open Access Journals (Sweden)

    Harlan Koff

    2017-01-01

    Full Text Available This article contends that notions of «peace» and «justice» in cross-border water management vary in different world regions. Moreover, it argues that «peace» and «justice» can be explained by analyzing the interaction between «regional» interpretations and implementation of water security norms and local cross-border power structures. «Regional water security» is defined as the normative commitment to provide necessary water resources to communities within world regions. «Power,» which is defined traditionally as «the ability of actors to obtain their objectives despite opposition» is viewed as a function of political entrepreneurialism and opportunity structures. This article derives from a review of the pertinent literatures on «water security» and «water justice,» the two elements of «water peace» as well as scholarship on cross-border water management in different world regions. It discusses water governance within the framework of cross-border politics and comparative regional integration. It also includes analysis of the policy documents and websites of seventeen regional organizations as well as interviews with key actors and local experts on water management in specific cross-border case studies. The article is divided into five sections. Following this introduction, part two examines «water security» and «water justice» in international affairs. Part III then discusses «power» in cross-border water governance debates and addresses the transnational face of water security discussions. Part IV presents a comparative examination of cross-border «water justice» in selected world regions which is followed by theoretical considerations that are addressed in part V, the conclusion. In general, the article emphasizes the need to promote comparative cross-regional research on cross-border water governance in order to examine how «peace,» «security» and «justice» are framed in debates over water resources. 

  2. Optimizing Land and Water Use at the Local Level to Enhance Global Food Security through Virtual Resources Trade in the World

    Science.gov (United States)

    Cai, X.; Zhang, X.; Zhu, T.

    2014-12-01

    Global food security is constrained by local and regional land and water availability, as well as other agricultural input limitations and inappropriate national and global regulations. In a theoretical context, this study assumes that optimal water and land uses in local food production to maximize food security and social welfare at the global level can be driven by global trade. It follows the context of "virtual resources trade", i.e., utilizing international trade of agricultural commodities to reduce dependency on local resources, and achieves land and water savings in the world. An optimization model based on the partial equilibrium of agriculture is developed for the analysis, including local commodity production and land and water resources constraints, demand by country, and global food market. Through the model, the marginal values (MVs) of social welfare for water and land at the level of so-called food production units (i.e., sub-basins with similar agricultural production conditions) are derived and mapped in the world. In this personation, we will introduce the model structure, explain the meaning of MVs at the local level and their distribution around the world, and discuss the policy implications for global communities to enhance global food security. In particular, we will examine the economic values of water and land under different world targets of food security (e.g., number of malnourished population or children in a future year). In addition, we will also discuss the opportunities on data to improve such global modeling exercises.

  3. Mapping of functional regions of murine retrovirus long terminal repeat enhancers: Enhancer domains interact and are not independent in their contributions to enhancer activity

    Energy Technology Data Exchange (ETDEWEB)

    Hollon, T.; Yoshimura, F.K. (Univ. of Washington, Seattle (USA))

    1989-08-01

    The authors have used deletion and recombinant long terminal repeat (LTR) mutants to examine enhancer activity differences between LTRs of the nonpathogenic Akv and the thymus lymphomagenic MCF13 murine retroviruses. Deletion mutant analysis revealed that major control regions for MCF13 and Akv LTR enhancer activity were similar but not identical. For both LTRs, major control regions were distinctly different in a murine T-cell and a fibroblast cell line. Recombinant enhancer analysis showed that LTRs could be divided into three regions capable of altering the level of enhancer activity through cooperative or antagonistic interaction. The contribution of each region to enhancer activity was dependent on its context with respect to the other regions. LTR enhancer function in different cell types appears to be the result of the interaction of enhancer modular elements.

  4. Thymidylate synthase enhancer region: Novel allele in Indians.

    Science.gov (United States)

    Dhawan, Dipali; Padh, Harish

    2017-02-01

    Thymidylate synthase (TS) is the major target for fluoropyrimidine drugs like 5-Fluorouracil (5-FU). There are polymorphic tandem repeats in the TYMS gene enhancer region (TSER). The number of tandem repeats varies in different populations. The aim of this study was to determine the frequencies of the TSER tandem repeats (rs34743033) and compare the observed frequencies with those of other populations. This study genotyped 350 healthy individuals by Polymerase Chain Reaction (PCR). A novel allele *1 (only a single repeat) was observed in four individuals, the individuals were heterozygous (TSER*1/*2) for TYMS. Another variant rs2853542 affecting the expression of Thymidylate synthase was also analysed. The observed genotype frequencies were compared with frequencies observed in other populations for understanding differences between various population groups. There was a statistically significant difference between Indians and Chinese, Kenyans, Ghanians, African-Americans, Americans of European Ancestry, British, Hungarians, Turkish, Australians and Brazilians. This study identified a novel single repeat in the TYMS gene which might have an impact on the expression of this gene, which needs to be confirmed by functional studies.

  5. Physical and Cross-Layer Security Enhancement and Resource Allocation for Wireless Networks

    Science.gov (United States)

    Bashar, Muhammad Shafi Al

    2011-01-01

    In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…

  6. Unraveling the nexus between water and food security in Latin America and the Caribbean: regional and global implications

    Science.gov (United States)

    Willaarts, Barbara; Garrido, Alberto; Soriano, Barbara; De Stefano, Lucia; López Gunn, Elena; Aldaya, Maite; Martínez-Santos, Pedro; Llamas, Ramon

    2014-05-01

    Latin American and the Caribbean (LAC) is a water and land abundant region, and plays a key role in meeting global food and water security. During the last decade, LAC has experience a rapid socio-economic growth, largely sustained by its competitive advantage in the production and exports of agricultural and mining products and by the high commodity prices in the global market. This study seeks to quantify the contribution of LAC's agriculture to global food and water security, i.e. virtual water trade, and evaluate the environmental and societal implications for regional development. Results show that between 2000 and 2011, LAC has increase its agricultural production 27%, and it now accounts for nearly 18% of the global agricultural market. As a result, the agricultural water footprint (WF) of LAC was augmented 65%; and yet, nearly 19% to 44% of the actual agricultural WF - depending on the countries - is virtual water exported to third countries. In fact, almost 50% of the increase in global virtual water trade during the last decade, corresponds to LAC. Such global contribution has significant implications for regional water and food security. From an environmental perspective, crop expansion (mostly rain-fed) resulted in the deforestation of nearly 1 million km2, turning this region into the second most important deforestation hotspots worldwide. This land clearing is having large impacts of ecosystem services, e.g. carbon sequestration, water quality or biodiversity conservation. From a socio-economic perspective, increasing agricultural production has improved regional food security indicators, although one every seven children is still stunted in LAC and nearly 10% of the population remains undernourished. Dietary shifts and socio-cultural factors also lag behind the growing problem of malnutrition in the region, i.e. overweight and obesity. Improvements of water access and sanitation, have had a positive impact on food security indicators, especially

  7. Eastern Canadian crude oil supply and its implications for regional energy security

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Larry [Energy Research Group, Electrical and Computer Engineering, Dalhousie University, Halifax, Nova Scotia (Canada)

    2010-06-15

    Canada has been blessed with immense energy resources; however, their distribution is not uniform. One such example is crude oil, which is found primarily in western Canada. Eastern Canada, consisting of the six eastern-most provinces (Newfoundland and Labrador, New Brunswick, Nova Scotia, Ontario, Prince Edward Island, and Quebec), produce limited quantities of crude oil, most of which is exported to the United States. Ideally, western Canadian crude oil would meet the demands of eastern Canada; however, the North American Free Trade Agreement (NAFTA) and the absence of oil pipelines means that eastern Canada increasingly relies on supplies of crude oil from a small number of oil exporting countries, many with declining production. This paper examines crude oil production, supply, and its refining in eastern Canada. It shows that crude production in the region has reached its peak and that increasing global competition for crude oil will affect energy security in eastern Canada, either through price increases or supply shortages, or both. (author)

  8. Infrastructure Security of the Ural Regions: Assessment Technique and Diagnostic Results

    Directory of Open Access Journals (Sweden)

    Pavel Arkadyevich Pykhov

    2015-09-01

    Full Text Available This article examines the infrastructure as one of the important elements of the economic system. Authors have considered the stages of formation of this concept in the scientific world, the ideas of a number of scientists on a role and place of infrastructure in the economic system are given. Short genesis of approaches to the description of infrastructure and to assignment of its functions to certain branches is created. The paper emphasized the importance of strengthening the infrastructural support to the transition of the economy to the machine mode of production. Two main methodological approaches describing the nature and content of infrastructure are allocated: branch-wise and functional. The author's technique of the assessment of infrastructure security of territories at the regional level is offered. A basis of this technique is the allocation of the set of special indicators which values allow to see the level of development of separate elements of infrastructure. Indicative analysis, which is the basis of the methods, allows to judge any phenomenon by comparing the current observed values with the previously accepted threshold levels. This comparison allows one to classify the observations on the scale of "norm-pre-crisis-crisis". The essential advantage of this method is the normalization of indicators, i.e. their reduction to one comparable conditional size. It allows to receive the assessment on certain blocks of indicators and a complex assessment on all set in general. Authors have allocated four basic elements of infrastructure, such as transport, communications and telecommunications, utilities and health care availability. In total, the technique includes 21 indicators. The results of approbatory calculations with the author's method have revealed shortcomings in the infrastructure development of the Ural region. The article is a brief analysis of the data with the accents on the individual indicators and areas.

  9. The Impact of Water Scarcity on Egyptian National Security and on Regional Security in the Nile River Basin

    Science.gov (United States)

    2012-06-08

    who helped me with the formatting of the thesis. To my wife Azza Ismael and my two kids Ali and Hazem for their love and support. Azza has stood by...between Nile Basin countries, and to coordinate their common international and regional issues. The members of INDIGO included Egypt, Sudan, Uganda

  10. Precipitation variability on global pasturelands may affect food security in livestock-dependent regions

    Science.gov (United States)

    Sloat, L.; Gerber, J. S.; Samberg, L. H.; Smith, W. K.; West, P. C.; Herrero, M.; Brendan, P.; Cecile, G.; Katharina, W.; Smith, W. K.

    2016-12-01

    The need to feed an increasing number of people while maintaining biodiversity and ecosystem services is one of the key challenges currently facing humanity. Livestock systems are likely to be a crucial piece of this puzzle, as urbanization and changing diets in much of the world lead to increases in global meat consumption. This predicted increase in global demand for livestock products will challenge the ability of pastures and rangelands to maintain or increase their productivity. The majority of people that depend on animal production for food security do so through grazing and herding on natural rangelands, and these systems make a significant contribution to global production of meat and milk. The vegetation dynamics of natural forage are highly dependent on climate, and subject to disruption with changes in climate and climate variability. Precipitation heterogeneity has been linked to the ecosystem dynamics of grazing lands through impacts on livestock carrying capacity and grassland degradation potential. Additionally, changes in precipitation variability are linked to the increased incidence of extreme events (e.g. droughts, floods) that negatively impact food production and food security. Here, we use the inter-annual coefficient of variation (CV) of precipitation as a metric to assess climate risk on global pastures. Comparisons of global satellite measures of vegetation greenness to climate reveal that the CV of precipitation is negatively related to mean annual NDVI, such that areas with low year-to-year precipitation variability have the highest measures of vegetation greenness, and vice versa. Furthermore, areas with high CV of precipitation support lower livestock densities and produce less meat. A sliding window analysis of changes in CV of precipitation over the last century shows that, overall, precipitation variability is increasing in global pasture areas, although global maps reveal a patchwork of both positive and negative changes. We use

  11. Human Security: A Thematic Guidance Note for Regional and National Human Development Report Teams

    NARCIS (Netherlands)

    O.A. Gómez (Oscar); D.R. Gasper (Des)

    2013-01-01

    textabstractAbstract Many important aspects of human development relate also to people’s security: loosely defined as people’s freedom from fear and freedom from want in a broad sense. Applying a human security approach offers an opportunity to analyse many issues in an informative way.

  12. Northeast Asia Regional Security and the United States Military: Context, Presence, and Roles

    Science.gov (United States)

    2002-11-01

    The Diplomatic Role of Non-Weaponized Programs. Rosalind R. Reynolds, January 1996 8. Five Minutes Past Midnight: The Clear and Present Danger...Director Colonel Franklin Wolf Chief, National Security Policy Division USAF INSTITUTE FOR NATIONAL SECURITY STUDIES Dr James M. Smith

  13. Strategic Forum. August 2013. The Rebalance to Asia: U.S.-China Relations and Regional Security

    Science.gov (United States)

    2013-08-01

    dynamism is central to American economic and strategic interests” and that the United States has an opportunity to help build “a more mature security...ing a temporary ban on exports of rare earth elements to Japan and import restrictions on Philippine bananas .12 China also took a tough line on its

  14. Enhancing the Security Cooperation Marine Air Ground Task Force to Satisfy the Needs of the Uncertain Global Security Environment

    Science.gov (United States)

    2009-06-12

    additional civil-military operation capabilities such as enhanced engineering, additional medical and dental support, and transportation tailored for...Quarterly, 95-98. Barnett , Thomas P.M. 2005. The Pentagon’s New Map: Blueprint for Action. New York City: G.P. Putnam’s Sons. ———. 2004. The

  15. Social Milieu Oriented Routing: A New Dimension to Enhance Network Security in WSNs.

    Science.gov (United States)

    Liu, Lianggui; Chen, Li; Jia, Huiling

    2016-02-19

    In large-scale wireless sensor networks (WSNs), in order to enhance network security, it is crucial for a trustor node to perform social milieu oriented routing to a target a trustee node to carry out trust evaluation. This challenging social milieu oriented routing with more than one end-to-end Quality of Trust (QoT) constraint has proved to be NP-complete. Heuristic algorithms with polynomial and pseudo-polynomial-time complexities are often used to deal with this challenging problem. However, existing solutions cannot guarantee the efficiency of searching; that is, they can hardly avoid obtaining partial optimal solutions during a searching process. Quantum annealing (QA) uses delocalization and tunneling to avoid falling into local minima without sacrificing execution time. This has been proven a promising way to many optimization problems in recently published literatures. In this paper, for the first time, with the help of a novel approach, that is, configuration path-integral Monte Carlo (CPIMC) simulations, a QA-based optimal social trust path (QA_OSTP) selection algorithm is applied to the extraction of the optimal social trust path in large-scale WSNs. Extensive experiments have been conducted, and the experiment results demonstrate that QA_OSTP outperforms its heuristic opponents.

  16. Social Milieu Oriented Routing: A New Dimension to Enhance Network Security in WSNs

    Directory of Open Access Journals (Sweden)

    Lianggui Liu

    2016-02-01

    Full Text Available In large-scale wireless sensor networks (WSNs, in order to enhance network security, it is crucial for a trustor node to perform social milieu oriented routing to a target a trustee node to carry out trust evaluation. This challenging social milieu oriented routing with more than one end-to-end Quality of Trust (QoT constraint has proved to be NP-complete. Heuristic algorithms with polynomial and pseudo-polynomial-time complexities are often used to deal with this challenging problem. However, existing solutions cannot guarantee the efficiency of searching; that is, they can hardly avoid obtaining partial optimal solutions during a searching process. Quantum annealing (QA uses delocalization and tunneling to avoid falling into local minima without sacrificing execution time. This has been proven a promising way to many optimization problems in recently published literatures. In this paper, for the first time, with the help of a novel approach, that is, configuration path-integral Monte Carlo (CPIMC simulations, a QA-based optimal social trust path (QA_OSTP selection algorithm is applied to the extraction of the optimal social trust path in large-scale WSNs. Extensive experiments have been conducted, and the experiment results demonstrate that QA_OSTP outperforms its heuristic opponents.

  17. Using RFID to Enhance Security in Off-Site Data Storage

    Science.gov (United States)

    Lopez-Carmona, Miguel A.; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R.

    2010-01-01

    Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention. PMID:22163638

  18. Using RFID to enhance security in off-site data storage.

    Science.gov (United States)

    Lopez-Carmona, Miguel A; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2010-01-01

    Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system's benefits in terms of efficiency and failure prevention.

  19. Enhance Energy-efficiency and Security of IoT using Hardware-oriented Approaches

    OpenAIRE

    XU, TENG

    2017-01-01

    The rapid growth of Internet of things (IoT) including mobile phones, portable devices, and remote sensor network systems have imposed both conceptually and technically new challenges. Among them, the most demanding requirements for the widespread realization of many IoT visions are security and low power. In terms of security, IoT applications include tasks that are rarely addressed before such as trusted sensing, secure computation and communication, privacy, and data right management. Thes...

  20. Enhanced Stochastic Methodology for Combined Architecture of E-Commerce and Security Networks

    OpenAIRE

    Song-Kyoo Kim

    2009-01-01

    This paper deals with network architecture which is a combination of electronic commerce and security systems in the typical Internet ecosystems. The e-commerce model that is typically known as online shopping can be considered as a multichannel queueing system. In the other hand, stochastic security system is designed for improving the reliability and availability of the e-commerce system. The security system in this paper deals with a complex system that consists of main unreliable servers,...

  1. ANALYSIS OF FOOD SECURITY STATUS OF FARMING HOUSEHOLDS IN THE FOREST BELT OF THE CENTRAL REGION OF GHANA

    Directory of Open Access Journals (Sweden)

    John K.M. Kuwornu

    2013-01-01

    Full Text Available The study seeks to examine the Food Security Status of Farming Households in the Forest Belt of the Central Region of Ghana. A multistage sampling technique was used to select the respondents that were interviewed. In all 134 farming households were interviewed but 120 were selected for analysis after removing the questionnaires which were not properly administered. The households were selected from eight communities in two districts. Food consumption data of 851 individuals in 120 households were used for the analysis. The study reveals that the majority of the farming households (60% were found to be food insecure. Further, the Binary Logit Model results reveal that an increase in household's income, having access to credit as well as increase in the quantity of own farm production improve the food security status of farming households in the Forest Belt of the Central Region of Ghana. However, holding all other factors constant, increases in non-working member of households worsens the food security status of farming households. Most of the food insecurity coping strategies adopted by household's are not severe and can only be used to avert the impact of food insecurity on a temporal basis. These results have policy implications for Food Security Status of Farming Households in developing countries.

  2. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2016-01-01

    Full Text Available Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3 design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.

  3. Food safety security: a new concept for enhancing food safety measures.

    Science.gov (United States)

    Iyengar, Venkatesh; Elmadfa, Ibrahim

    2012-06-01

    The food safety security (FSS) concept is perceived as an early warning system for minimizing food safety (FS) breaches, and it functions in conjunction with existing FS measures. Essentially, the function of FS and FSS measures can be visualized in two parts: (i) the FS preventive measures as actions taken at the stem level, and (ii) the FSS interventions as actions taken at the root level, to enhance the impact of the implemented safety steps. In practice, along with FS, FSS also draws its support from (i) legislative directives and regulatory measures for enforcing verifiable, timely, and effective compliance; (ii) measurement systems in place for sustained quality assurance; and (iii) shared responsibility to ensure cohesion among all the stakeholders namely, policy makers, regulators, food producers, processors and distributors, and consumers. However, the functional framework of FSS differs from that of FS by way of: (i) retooling the vulnerable segments of the preventive features of existing FS measures; (ii) fine-tuning response systems to efficiently preempt the FS breaches; (iii) building a long-term nutrient and toxicant surveillance network based on validated measurement systems functioning in real time; (iv) focusing on crisp, clear, and correct communication that resonates among all the stakeholders; and (v) developing inter-disciplinary human resources to meet ever-increasing FS challenges. Important determinants of FSS include: (i) strengthening international dialogue for refining regulatory reforms and addressing emerging risks; (ii) developing innovative and strategic action points for intervention {in addition to Hazard Analysis and Critical Control Points (HACCP) procedures]; and (iii) introducing additional science-based tools such as metrology-based measurement systems.

  4. Augmented Performance Environment for Enhancing Interagency Coordination in Stability, Security, Transition, and Reconstruction (SSTR) Operations: Phase 2

    Science.gov (United States)

    2010-12-01

    criminals. Criminals support bridge construction because bridges will facilitate smuggling into and out of Qataghan’s interior. Roads would not address the...construction  Priority Option #2: Equally prioritize bridge and road construction  Priority Option #3: Prioritize road over bridge construction 34...bird colonel) to prioritize bridges. The task force commander feels strongly that bridge construction will enhance security by reducing the need

  5. The AgMIP Coordinated Global and Regional Assessments (CGRA) of Climate Change Impacts on Agriculture and Food Security

    Science.gov (United States)

    Ruane, Alex; Rosenzweig, Cynthia; Elliott, Joshua; Antle, John

    2015-01-01

    The Agricultural Model Intercomparison and Improvement Project (AgMIP) has been working since 2010 to construct a protocol-based framework enabling regional assessments (led by regional experts and modelers) that can provide consistent inputs to global economic and integrated assessment models. These global models can then relay important global-level information that drive regional decision-making and outcomes throughout an interconnected agricultural system. AgMIPs community of nearly 800 climate, crop, livestock, economics, and IT experts has improved the state-of-the-art through model intercomparisons, validation exercises, regional integrated assessments, and the launch of AgMIP programs on all six arable continents. AgMIP is now launching Coordinated Global and Regional Assessments (CGRA) of climate change impacts on agriculture and food security to link global and regional crop and economic models using a protocol-based framework. The CGRA protocols are being developed to utilize historical observations, climate projections, and RCPsSSPs from CMIP5 (and potentially CMIP6), and will examine stakeholder-driven agricultural development and adaptation scenarios to provide cutting-edge assessments of climate changes impact on agriculture and food security. These protocols will build on the foundation of established protocols from AgMIPs 30+ activities, and will emphasize the use of multiple models, scenarios, and scales to enable an accurate assessment of related uncertainties. The CGRA is also designed to provide the outputs necessary to feed into integrated assessment models (IAMs), nutrition and food security assessments, nitrogen and carbon cycle models, and additional impact-sector assessments (e.g., water resources, land-use, biomes, urban areas). This presentation will describe the current status of CGRA planning and initial prototype experiments to demonstrate key aspects of the protocols before wider implementation ahead of the IPCC Sixth Assessment

  6. The AgMIP Coordinated Global and Regional Assessments (CGRA) of Climate Change Impacts on Agriculture and Food Security

    Science.gov (United States)

    Ruane, A. C.; Rosenzweig, C.; Antle, J. M.; Elliott, J. W.

    2015-12-01

    The Agricultural Model Intercomparison and Improvement Project (AgMIP) has been working since 2010 to construct a protocol-based framework enabling regional assessments (led by regional experts and modelers) that can provide consistent inputs to global economic and integrated assessment models. These global models can then relay important global-level information that drive regional decision-making and outcomes throughout an interconnected agricultural system. AgMIP's community of nearly 800 climate, crop, livestock, economics, and IT experts has improved the state-of-the-art through model intercomparisons, validation exercises, regional integrated assessments, and the launch of AgMIP programs on all six arable continents. AgMIP is now launching Coordinated Global and Regional Assessments (CGRA) of climate change impacts on agriculture and food security to link global and regional crop and economic models using a protocol-based framework. The CGRA protocols are being developed to utilize historical observations, climate projections, and RCPs/SSPs from CMIP5 (and potentially CMIP6), and will examine stakeholder-driven agricultural development and adaptation scenarios to provide cutting-edge assessments of climate change's impact on agriculture and food security. These protocols will build on the foundation of established protocols from AgMIP's 30+ activities, and will emphasize the use of multiple models, scenarios, and scales to enable an accurate assessment of related uncertainties. The CGRA is also designed to provide the outputs necessary to feed into integrated assessment models (IAMs), nutrition and food security assessments, nitrogen and carbon cycle models, and additional impact-sector assessments (e.g., water resources, land-use, biomes, urban areas). This presentation will describe the current status of CGRA planning and initial prototype experiments to demonstrate key aspects of the protocols before wider implementation ahead of the IPCC Sixth Assessment

  7. Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges.

    Science.gov (United States)

    Curiac, Daniel-Ioan

    2016-04-07

    Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues.

  8. Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges

    Directory of Open Access Journals (Sweden)

    Daniel-Ioan Curiac

    2016-04-01

    Full Text Available Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues.

  9. UN Security Council Practice and Regional Arrangements: Procedure, Legitimacy and International Justice

    DEFF Research Database (Denmark)

    Cullen, Miriam

    2015-01-01

    When the United Nations Security Council first met in January 1946, it was unable to reach agreement on rules of procedure to govern its operation. Instead, “provisional” rules were adopted in anticipation of further negotiation at a later date. The same provisional rules govern the Council’s work...... to act ‘in conformity with the principles of justice and international law’ as stipulated in the very first provision of the United Nations Charter. Scholarship to date has largely ignored the procedural context of Security Council decisions, notwithstanding it provides the very structure within which...... today, but provide only the skeletal framework of its contemporary practice. From the early 1990s, the Council increasingly implemented informal working methods to expedite its decision-making. This paper will critically examine the tension between the procedural practice of the Security Council...

  10. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    Science.gov (United States)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  11. Enhancing Data Security and Access Control in Cloud Environment using Modified Attribute Based Encryption Mechanism

    National Research Council Canada - National Science Library

    Apurva R Naik; Lalit B Damahe

    2016-01-01

    .... File sharing and distribution are the frequently used services provided by cloud service providers, although these facilities reduce cost of data sharing but at the same time data security and access...

  12. An efficient forward-secure group certificate digital signature scheme to enhance EMR authentication process.

    Science.gov (United States)

    Yu, Yao-Chang; Hou, Ting-Wei

    2014-05-01

    The frequently used digital signature algorithms, such as RSA and the Digital Signature Algorithm (DSA), lack forward-secure function. The result is that, when private keys are renewed, trustworthiness is lost. In other words, electronic medical records (EMRs) signed by revoked private keys are no longer trusted. This significant security threat stands in the way of EMR adoption. This paper proposes an efficient forward-secure group certificate digital signature scheme that is based on Shamir's (t,n) threshold scheme and Schnorr's digital signature scheme to ensure trustworthiness is maintained when private keys are renewed and to increase the efficiency of EMRs' authentication processes in terms of number of certificates, number of keys, forward-secure ability and searching time.

  13. Enhancing food security in Northern Ghana through smallholder small ruminant production and marketing

    NARCIS (Netherlands)

    Amankwah, K.

    2013-01-01

      Key words Livestock markets, technical and institutional constraints, innovation systems, veterinary services; smallholder farmers; structural adjustment, scaling out, co-learning, supplementary feeding,  herd growth, food security, positive deviants,

  14. Towards Designing a Biometric Measure for Enhancing ATM Security in Nigeria E-Banking System

    OpenAIRE

    Ibidapo; Akinyemi, O.; Omogbadegun, Zaccheous O.; Oyelami, Olufemi M.

    2011-01-01

    Security measures at banks can play a critical, contributory role in preventing attacks on customers. These measures are of paramount importance when considering vulnerabilities and causation in civil litigation. Banks must meet certain standards in order to ensure a safe and secure banking environment for their customers. This paper focuses on vulnerabilities and the increasing wave of criminal activities occurring at Automated Teller Machines (ATMs) where quick cash is the prime target for ...

  15. Curbing cyber-crime and Enhancing e-commerce security with Digital Forensics

    OpenAIRE

    Fianyi, Israel

    2016-01-01

    The explosion in the e-commerce industry which has been necessitated by the growth and advance expansion of Information technology and its related facilities in recent years have been met with adverse security issues consequently affecting the industry and the entire online activities. This paper exams the prevailing security threats e-commerce is facing which is predominantly known as cyber-crime and how computer related technology and facilities such as digital forensics tools can be adopte...

  16. AN ENHANCED REMOTE AUTHENTICATION SCHEME USING SECURE KEY EXCHANGE PROTOCOL WITH PLATFORM INTEGRITY ATTESTATION

    OpenAIRE

    Fazli Bin Mat Nor; Kamarularifin Abd Jalil; Jamalul-lail Ab Manan

    2011-01-01

    Most remote authentication schemes use key exchange protocol to provide secure communication over an untrusted network. The protocol enables remote client and host to authenticate each other and communicate securely with prearranged shared secret key or server secret key. Many remote services environment such as online banking and electronic commerce are dependent on remote authentication schemes to validate user legitimacy in order to fulfill the authentication process. Unfortunately, these ...

  17. Using RFID to Enhance Security in Off-Site Data Storage

    Directory of Open Access Journals (Sweden)

    Enrique de la Hoz

    2010-08-01

    Full Text Available Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention.

  18. Model, Characterization, and Analysis of Steady-State Security Region in AC/DC Power System with a Large Amount of Renewable Energy

    Directory of Open Access Journals (Sweden)

    Zhong Chen

    2017-08-01

    Full Text Available A conventional steady-state power flow security check only implements point-by-point assessment, which cannot provide a security margin for system operation. The concept of a steady-state security region is proposed to effectively tackle this problem. Considering that the commissioning of the increasing number of HVDC (High Voltage Direct Current and the fluctuation of renewable energy have significantly affected the operation and control of a conventional AC system, the definition of the steady-state security region of the AC/DC power system is proposed in this paper based on the AC/DC power flow calculation model including LCC/VSC (Line Commutated Converter/Voltage Sourced Converter-HVDC transmission and various AC/DC constraints, and hence the application of the security region is extended. In order to ensure that the proposed security region can accurately provide global security information of the power system under the fluctuations of renewable energy, this paper presents four methods (i.e., a screening method of effective boundary surfaces, a fitting method of boundary surfaces, a safety judging method, and a calculation method of distances and corrected distance between the steady-state operating point and the effective boundary surfaces based on the relation analysis between the steady-state security region geometry and constraints. Also, the physical meaning and probability analysis of the corrected distance are presented. Finally, a case study is demonstrated to test the feasibility of the proposed methods.

  19. The Future of Gulf Security in a Region of Dramatic Change: Mutual Equities and Enduring Relationships

    Science.gov (United States)

    2011-06-20

    program? The moderator set the stage by explaining that recent U.S. polices in the Middle East for dealing with Arab uprisings have exacerbated Arab...widespread disenchantment with and anxi - ety about the reliability of the United States as a security partner—feelings exacerbated by the United States

  20. From food production to food security: developing interdisciplinary, regional-level research

    NARCIS (Netherlands)

    Ingram, J.S.I.

    2011-01-01

    Food security is a condition whereby “all people, at all times, have physical and economic access to sufficient, safe, and nutritious food to meet their dietary needs and food preferences for an active and healthy life” (FAO World Food Summit, 1996). Globally, food production has kept

  1. Global Energy Security and Its Geopolitical Impediments: The Case of the Caspian Region

    NARCIS (Netherlands)

    Amineh, M.P.; Houweling, H.

    2007-01-01

    This article discusses the global geopolitics of energy security in the post-Cold War environment. Energy companies headquartered in western countries have long history of accessing energy resources beyond borders through invasion of the host by their home state, followed by domination and the

  2. Enhanced ULF electromagnetic activity detected by DEMETER above seismogenic regions

    CERN Document Server

    Athanasiou, M; David, C; Anagnostopoulos, G

    2013-01-01

    In this paper we present results of a comparison between ultra low frequency (ULF) electromagnetic (EM) radiation, recorded by an electric field instrument (ICE) onboard the satellite DEMETER in the topside ionosphere, and the seismicity of regions with high and lower seiismic activity. In particular we evaluated the energy variations of the ULF Ez-electric field component during a period of four years (2006-2009), in order to examine check the possible relation of ULF EM radiation with seismogenic regions located in central America, Indonesia, Eastern Mediterranean Basin and Greece. As a tool of evaluating the ULF Ez energy variations we used Singular Spectrum Analysis (SSA) techniques. The results of our analysis clearly show a significant increase of the ULF EM energy emmited from regions of highest seismic activity at the tectonic plates boundaries. We interpret these results as suggesting that the highest ULF EM energy detected in the topside ionosphere is originated from seismic processes within Earth's...

  3. Enhancing Heart-Beat-Based Security for mHealth Applications.

    Science.gov (United States)

    Seepers, Robert M; Strydis, Christos; Sourdis, Ioannis; De Zeeuw, Chris I

    2017-01-01

    In heart-beat-based security, a security key is derived from the time difference between consecutive heart beats (the inter-pulse interval, IPI), which may, subsequently, be used to enable secure communication. While heart-beat-based security holds promise in mobile health (mHealth) applications, there currently exists no work that provides a detailed characterization of the delivered security in a real system. In this paper, we evaluate the strength of IPI-based security keys in the context of entity authentication. We investigate several aspects that should be considered in practice, including subjects with reduced heart-rate variability (HRV), different sensor-sampling frequencies, intersensor variability (i.e., how accurate each entity may measure heart beats) as well as average and worst-case-authentication time. Contrary to the current state of the art, our evaluation demonstrates that authentication using multiple, less-entropic keys may actually increase the key strength by reducing the effects of intersensor variability. Moreover, we find that the maximal key strength of a 60-bit key varies between 29.2 bits and only 5.7 bits, depending on the subject's HRV. To improve security, we introduce the inter-multi-pulse interval (ImPI), a novel method of extracting entropy from the heart by considering the time difference between nonconsecutive heart beats. Given the same authentication time, using the ImPI for key generation increases key strength by up to 3.4 × (+19.2 bits) for subjects with limited HRV, at the cost of an extended key-generation time of 4.8 × (+45 s).

  4. SECURITY RISKS, MYTHS IN A TRANSITIONING SUB-NATIONAL REGIONAL ECONOMY (CROSS RIVER STATE AND IMAGINATIVE GEOGRAPHIES OF NIGERIA

    Directory of Open Access Journals (Sweden)

    J. K. UKWAYI

    2015-03-01

    Full Text Available The emergence of an “international community” through accumulation of perceived risks that contrasts with those risks (of considerably lower levels of seriousness compared to those perceived constitutes one of the interesting (or intriguing subjects of risks and disaster studies surrounding the 9/11 era. The constructions of “imaginative geographies”, have frequently been biased in the practices that underlie the mapping of the foreign places tend to put-down the affected regions in their “paintings” for the global community. The latter are subsequently “demonized” in their ratings of competence for participating in world trade, tourism, travel, among other social/cultural, and economic and political activities. The objective of this article is to highlight how the exaggeration of risks (contrasted to actually existing/lived risks, practices that are frequently associated with such adverse “imaginative geographies” poses sub-national regional development dilemma in Nigeria’s Niger Delta. We trace the roots of adverse “imaginative geographies” of Nigeria to the Abacha dictatorship (1993-1997. Then we highlight the mixed characteristics of the Niger Delta conditions during the “return of positive image recapture” by Nigeria’s federal government (re-democratisation of the Fourth Republic, 1999-present, re-branding campaigns; as well as adverse conditions present. Most significantly, we show that despite these adversities, a combination of favorable geographical size, differentiation, sub-national regional security programme formulation and management taking aims at diversification have created “large oases” of peace and security in Cross River State, a part of the Niger Delta that has been completely unscathed by insurgencies of the nearby sub-national region and further away national origin. Apart from identifying sub-national regions qualifying for delisting from “adverse imaginative geographies” due to

  5. THE CHINA’S ENERGY SECURITY IN THE ASIA-PACIFIC REGION IN THE 21ST CENTURY

    Directory of Open Access Journals (Sweden)

    Evgeniy Sergeevich Krasantsov

    2013-10-01

    Full Text Available The main objective of this article was to determine the level of the Chinese energy security that was built up for last several decades. In order to reach the set aim the author figured the current condition of the energy sector within the leading states of the Asia-Pacific Region and compared it with a similar condition ofChina. The condition’s characteristics included the following: Chinese energy balance, oil production, import and consumption, energy efficiency, CO2 emissions, electricity amount produced by using the renewable energy sources (hydropower, wind energy, sun energy and nuclear energy. In addition the authorities’ plans for the expansion of the mentioned renewable and nuclear energy production were as well discovered. The probable threats of the energy security and possible obstacles for the extensive means of sustaining the country’s energy security were also brought up.Statistical, comparative and analytical methods were applied in the process of the current research. As a result the PRC was found to be at a threshold to energetic crisis. In order to avoid the scenario two innovative methods were proposed as the means of avoiding the possible future crisis and sustaining energy security.The research results can be applied in determining the domestic and foreign policy of China as well as the foreign policies of the PRC’s energetic partners both within the Asia-Pacific Region and beyond its borders. DOI: http://dx.doi.org/10.12731/2218-7405-2013-7-39

  6. Fuzzy Chance-constrained Programming Based Security Information Optimization for Low Probability of Identification Enhancement in Radar Network Systems

    Directory of Open Access Journals (Sweden)

    C. G. Shi

    2015-04-01

    Full Text Available In this paper, the problem of low probability of identification (LPID improvement for radar network systems is investigated. Firstly, the security information is derived to evaluate the LPID performance for radar network. Then, without any prior knowledge of hostile intercept receiver, a novel fuzzy chance-constrained programming (FCCP based security information optimization scheme is presented to achieve enhanced LPID performance in radar network systems, which focuses on minimizing the achievable mutual information (MI at interceptor, while the attainable MI outage probability at radar network is enforced to be greater than a specified confidence level. Regarding to the complexity and uncertainty of electromagnetic environment in the modern battlefield, the trapezoidal fuzzy number is used to describe the threshold of achievable MI at radar network based on the credibility theory. Finally, the FCCP model is transformed to a crisp equivalent form with the property of trapezoidal fuzzy number. Numerical simulation results demonstrating the performance of the proposed strategy are provided.

  7. Multidimensional assessment of food security and environmental sustainability: A vulnerability framework for the Mediterranean region

    OpenAIRE

    PROSPERI, Paolo; Allen, Thomas; PADILLA, Martine; Peri, Luri; Cogill, Bruce

    2013-01-01

    Recurrent food crises and climate change, along with habitat loss and pollution, have put food security and environmental sustainability at the top of the political agenda. Analyses of the dynamic linkages between food consumption patterns and environmental concerns have recently received considerable attention from the international and scientiï¬c community. Using the lens of a wide sustainability concept, this paper aims at developing a multidimensional framework for evaluating sustainabili...

  8. Ad-Hoc Sensor Networks for Maritime Interdiction Operations and Regional Security

    Science.gov (United States)

    2012-09-01

    15 Figure 6. Multi-hop relay in a network (Image from Nomadic Technologies website...the militia in Somalia ), or individual crews refuse to comply with international law and threaten security and peace, not only in a particular...difficult. An example is a smart buoy node in a sea area: the lifetime of that node depends on the battery life or fuel cell, thus the minimization of

  9. U.S.-China Partnership: Building Regional Synergy for Stability and Security of the Korean Peninsula

    Science.gov (United States)

    2013-03-01

    arduous history of human struggle and conquest by invaders, particularly in the modern era . Subsequent to its victory in the Russo-Japanese War, 1904-05...its international position by capitalizing on economic opportunities. Hence, “under the leadership of President Vladimir Putin , Russia is eager to...Classical Realism ” theory whereby there is a constant struggle for power and security, leading to the attitude that in order to win, someone else must

  10. Information Theoretically Secure, Enhanced Johnson Noise Based Key Distribution over the Smart Grid with Switched Filters

    Science.gov (United States)

    2013-01-01

    We introduce a protocol with a reconfigurable filter system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like)-Noise secure key distribution system. The protocol is valid for one-dimensional radial networks (chain-like power line) which are typical of the electricity distribution network between the utility and the customer. The speed of the protocol (the number of steps needed) versus grid size is analyzed. When properly generalized, such a system has the potential to achieve unconditionally secure key distribution over the smart power grid of arbitrary geometrical dimensions. PMID:23936164

  11. Information theoretically secure, enhanced Johnson noise based key distribution over the smart grid with switched filters.

    Directory of Open Access Journals (Sweden)

    Elias Gonzalez

    Full Text Available We introduce a protocol with a reconfigurable filter system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like-Noise secure key distribution system. The protocol is valid for one-dimensional radial networks (chain-like power line which are typical of the electricity distribution network between the utility and the customer. The speed of the protocol (the number of steps needed versus grid size is analyzed. When properly generalized, such a system has the potential to achieve unconditionally secure key distribution over the smart power grid of arbitrary geometrical dimensions.

  12. Can the use of the Leggett-Garg inequality enhance security of the BB84 protocol?

    Science.gov (United States)

    Shenoy H., Akshata; Aravinda, S.; Srikanth, R.; Home, Dipankar

    2017-08-01

    Prima facie, there are good reasons to answer in the negative the question posed in the title: the Bennett-Brassard 1984 (BB84) protocol is provably secure subject to the assumption of trusted devices, while the Leggett-Garg-type inequality (LGI) does not seem to be readily adaptable to the device independent (DI) or semi-DI scenario. Nevertheless, interestingly, here we identify a specific device attack, which has been shown to render the standard BB84 protocol completely insecure, but against which our formulated LGI-assisted BB84 protocol (based on an appropriate form of LGI) is secure.

  13. Extensions and Enhancements to “the Secure Remote Update Protocol”

    Directory of Open Access Journals (Sweden)

    Andrew John Poulter

    2017-09-01

    Full Text Available This paper builds on previous work introducing the Secure Remote Update Protocol (SRUP, a secure communications protocol for Command and Control applications in the Internet of Things, built on top of MQTT. This paper builds on the original protocol and introduces a number of additional message types: adding additional capabilities to the protocol. We also discuss the difficulty of proving that a physical device has an identity corresponding to a logical device on the network and propose a mechanism to overcome this within the protocol.

  14. Information theoretically secure, enhanced Johnson noise based key distribution over the smart grid with switched filters.

    Science.gov (United States)

    Gonzalez, Elias; Kish, Laszlo B; Balog, Robert S; Enjeti, Prasad

    2013-01-01

    We introduce a protocol with a reconfigurable filter system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like)-Noise secure key distribution system. The protocol is valid for one-dimensional radial networks (chain-like power line) which are typical of the electricity distribution network between the utility and the customer. The speed of the protocol (the number of steps needed) versus grid size is analyzed. When properly generalized, such a system has the potential to achieve unconditionally secure key distribution over the smart power grid of arbitrary geometrical dimensions.

  15. Fish farming as an innovative strategy for promoting food security in drought risk regions of Zimbabwe

    Directory of Open Access Journals (Sweden)

    Elvin Shava

    2017-01-01

    Full Text Available This article examines the implementation of fish farming as an innovative and economic strategy for promoting food security and dietary diversities among vulnerable households in drought risk areas of Zimbabwe. The declining climatic conditions and lack of economic opportunities in Mwenezi district of Zimbabwe attracted the attention of three nongovernmental organisations (NGOs to implement fish farming as an innovative mechanism to stimulate food security and generate employment in the district. The article used a qualitative research approach that includes semi-structured interviews and secondary data. The purposive sampling technique was adopted to interview participants in Mwenezi district who were involved in fish farming to assess and explore the experiences and benefits they derive from such development projects. Results for the article revealed that fish farming was well embraced by local communities as it led to improvements in food security, household income and employment regeneration. The local government including traditional leadership (Chiefs and Headmen’s supported the NGO activities as they benefited local communities. The article concludes that although fish farming was instrumental in regenerating employment, some participants still fail to participate because of laziness and desire to maintain dependency syndrome. The article recommends the NGOs to launch awareness campaigns in rural communities and increase networking with the donor community which is fundamental in attracting sustainable funding. The government can also promote fish farming in vulnerable rural communities by providing funding and capacity building programmes.

  16. Enhanced Warming with Atmospheric Blocking over European Region during Winter

    Science.gov (United States)

    Ji, M.; Huang, J.; He, Y.

    2013-12-01

    A 62-yr (1948-2009) atmospheric blocking climatology over European region during winter is presented. The blocking activity in the European region shows a downward long-term trend. The relationship between blocking index and teleconnection patterns (TCPs) are examined. The statistical result shows the SCAND and the EA patterns can significant effect the blocking, approximately 40% of the blocking frequency variation can be explained by these two patterns. The frequency of European blocking is sensitive to the phase of the SCAND and EA. The average number of blocking days is 46 days during the positive phase of the SCAND which is twice higher than during the negative phase (18). During the negative phase of the EA, the average number of blocking days is 32, which is 54% greater during the negative phase of the EA than during the positive phase (21). The duration of the European blocking is also sensitive to the phase of the SCAND, but isn't sensitive for the EA. The 500 hPa geopotential height composite analysis also shows an evidence of a statistical relationship between the TCPs and blocking, showing that the positive (negative) phase of the SCAND (EA) provides the right conditions for the formation and sustenance of blocking activity over the European region. However, the blocking centers are located at Scandinavia and the Urals with positive of the SCAND and Siberia with negative of the EA. Finally, the downstream surface air temperature (SAT) impact associated with European winter blocking is discussed. The result shows that the SAT of Eurasian continent is significant different between high blocking index winters and low blocking index winters.

  17. Enhanced regional brain metabolic responses to benzodiazepines in cocaine abusers

    Energy Technology Data Exchange (ETDEWEB)

    Volkow, N.D.; Wang, G.J.; Fowler, J.S. [Brookhaven National Lab., Upton, NY (United States)] [and others

    1997-05-01

    While dopamine (DA) appears to be crucial for cocaine reinforcement, its involvement in cocaine addiction is much less clear. Using PET we have shown persistent reductions in striatal DA D2 receptors (which arc predominantly located on GABA cells) in cocaine abusers. This finding coupled to GABA`s role as an effector for DA led us to investigate if there were GABAergic abnormalities in cocaine abusers. In this study we measured regional brain metabolic responses to lorazepam, to indirectly assess GABA function (benzodiazepines facilitate GABAergic neurotransmission). Methods: The experimental subjects consisted of 12 active cocaine abusers and 32 age matched controls. Each subject underwent two PET FDG scans obtained within 1 week of each other. The first FDG scan was obtained after administration of placebo (3 cc of saline solution) given 40-50 minutes prior to FDG; and the second after administration of lorazepam (30 {mu}g/kg) given 40-50 minutes prior to FDG. The subjects were blind to the drugs received. Results: Lorazepam-induced sleepiness was significantly greater in abusers than in controls (p<0.001). Lorazepam-induced decreases in brain glucose metabolism were significantly larger in cocaine abusers than in controls. Whereas in controls whole brain metabolism decreased 13{+-}7 %, in cocaine abusers it decreased 21{+-}13 % (p < 0.05). Lorazepam-induced decrements in regional metabolism were significantly larger in striatum (p < 0.0 1), thalamus (p < 0.01) and cerebellum (p < 0.005) of cocaine abusers than of controls (ANOVA diagnosis by condition (placebo versus lorazepam) interaction effect). The only brain region for which the absolute metabolic changes-induced by lorazepam in cocaine abusers were equivalent to those in controls was the orbitofrontal cortex. These results document an accentuated sensitivity to benzodiazepines in cocaine abusers which is compatible with disrupted GABAergic function in these patients.

  18. Autologous fat grafting for cosmetic enhancement of the perioral region.

    Science.gov (United States)

    Glasgold, Mark; Lam, Samuel M; Glasgold, Robert

    2007-11-01

    The role of volume loss in the progression of facial aging is widely accepted as an important cause. The aging appearance of the perioral region and lower face is significantly affected by this volume loss, which contributes to the development of labiomental folds, the loss of definition of the jawline, and worsening of skin texture, among other manifestations. Autologous fat transfer can effectively replace this lost volume and contribute to any facial rejuvenation plan. Fat can replace larger volumes than off-the-shelf fillers and provides a potentially permanent solution.

  19. Maritime Co-operation among South Atlantic Countries and Repercussions for the Regional Community of Security Practice

    Directory of Open Access Journals (Sweden)

    Sabrina Evangelista Medeiros

    Full Text Available Abstract This paper aims to examine the importance of co-operation for maritime security in the South Atlantic, focusing on the relationship between the national and sub-regional institutions that have leveraged this process, especially those from Brazil. For this purpose, the diagnosis addresses the debates around the contemporary roles of the navy and the importance of international co-operation for its mission accomplishment, highlighting the tasks judged as subsidiary, among them being that of maritime traffic control. The alignment of these co-operative activities with foreign policy and national defence projects can be seen through the navy’s participation in multilateral co-operation projects involving South America, particularly the Co-ordination for the South Atlantic Maritime Area (CAMAS. The research detects the existence of a particular model of a community of security practice in which national and sub-regional institutions have been generating an important maritime co-operative system, which is more stable than in other areas of co-operation in the same region.

  20. Power allocation and cooperative jamming for enhancing physical layer security in opportunistic relay networks in the presence of interference

    KAUST Repository

    Abd El-Malek, Ahmed H.

    2017-04-18

    In this paper, the impact of cochannel interference on the secrecy performance of dual-hop decode-and-forward relaying is investigated. In particular, the outage and intercept probabilities are obtained for the opportunistic relay selection (ORS) model in the presence of nonidentical interfering signals under a single/multiple passive eavesdropper(s) attack. Moreover, the proposed work enhances physical layer security performance of ORS model using cooperative jamming (CJ) techniques. Therefore, new closed-form expressions are derived for the intercept and outage probabilities of the CJ-ORS model in the presence of interference over Rayleigh fading channels. Moreover, the analyses are generalized to the case of multiple eavesdroppers where closed-form expressions are derived for the intercept probability. To reveal more insights on the proposed work secrecy performance, asymptotic closed-form expressions for the intercept and outage probabilities are obtained. Using these asymptotic expressions, a power allocation optimization problem is formulated and solved for enhancing the system security. The derived analytical formulas herein are supported by numerical and simulation results to clarify the main contributions of the paper. The results show that, although the cochannel interference increases the system outage probability, it might improve the system secrecy performance. Moreover, the proposed CJ-ORS model is shown to enhance the system secrecy performance compared to ORS model.

  1. Secure open cloud in data transmission using reference pattern and identity with enhanced remote privacy checking

    Science.gov (United States)

    Vijay Singh, Ran; Agilandeeswari, L.

    2017-11-01

    To handle the large amount of client’s data in open cloud lots of security issues need to be address. Client’s privacy should not be known to other group members without data owner’s valid permission. Sometime clients are fended to have accessing with open cloud servers due to some restrictions. To overcome the security issues and these restrictions related to storing, data sharing in an inter domain network and privacy checking, we propose a model in this paper which is based on an identity based cryptography in data transmission and intermediate entity which have client’s reference with identity that will take control handling of data transmission in an open cloud environment and an extended remote privacy checking technique which will work at admin side. On behalf of data owner’s authority this proposed model will give best options to have secure cryptography in data transmission and remote privacy checking either as private or public or instructed. The hardness of Computational Diffie–Hellman assumption algorithm for key exchange makes this proposed model more secure than existing models which are being used for public cloud environment.

  2. Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

    Science.gov (United States)

    Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful

    2017-09-01

    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.

  3. West Africa’s Efforts to Build Regional Security: An Analysis of Past ECOWAS Interventions to Determine what is Needed to Increase its Peacekeeping Capabilities

    Science.gov (United States)

    2010-06-11

    ECOMOG shortfalls as a peacekeeping force predestined a chaotic regional security outcome. From a Senegalese prospective, Mané success after Senegalese...the Ivorian crisis was the most fearful. From a regional standpoint, the predominant economic role of Côte d’Ivoire in the region predestined a

  4. Histological change and microcirculation in the contrast-enhancement region of cerebral infarction. An experimental study

    Energy Technology Data Exchange (ETDEWEB)

    Morimoto, Tetsuya; Takemura, Kiyoshi; Sakaki, Toshisuke; Hori, Yutaka (Nara National Hospital, Nara (Japan)); Yokoyama, Kazuhiro

    1983-08-01

    The purpose of this experiment is to reveal the microcirculation and blood-brain barrier by comparison with the histological findings in the contrast-enhancement region. The microcirculation is studied by carbon perfusion, and the function of the blood-brain barrier is studied by the intravenous administration of fluorescein. According to the carbon perfusion, carbon filling is impaired in the ischemic region of cerebral infarction. However, partially in the ischemic region, there is a good carbon-filling zone, called the carbon deposit, which indicates that the microcirculation develops better in this part of the ischemic region during the contrast-enhancement stage. From the histological point of view, the contrast-enhancement region contains capillaries and phagocytes and has a spongy appearance, an extravasation of red cells, and cavity formations. The density of capillaries might play the most important role in the microcirculation and the function of the blood-brain barrier. The fluorescein stain indicates the extent of the abnormally increased permeability of the capillaries. During the contrast-enhancement stage, the fluorescein stain is found not only in the contrast-enhacement region, but also in the surrounding zone around the contrast-enhancement region. There is an ischemic histological change, shown by the spongy appearance in this surrounding zone with the fluorescein stain. On a CT scan, this surrounding zone is seen as a normodensity area in most experimental models. These results indicate that, during the stage of the contrast-enhancement of cerebral infarction, a histologically evidenced ischemic area is detected not only as a contrast-enhancement region but also as a normodensity area around the contrast-enhancement region.

  5. Management Innovations as a Condition of Competitive, Sustainable and Secure Development of the Region

    Directory of Open Access Journals (Sweden)

    Nikolay Prokofyevich Ivanov

    2016-03-01

    Full Text Available In the article within the comparative analysis the author reveals the tendencies of functioning of an economic complex in a number of regions of the South of Russia in recent years; describes the potential of modernization of economy of the Stavropol region; substantiates the influence of organizational and administrative innovations on activity and efficiency of using territorial management of institutes of economic development in practice. The author of the present research proves that realization of administrative capacity of bodies of the regional power of the Stavropol region is mainly connected with the development of production sector of the region, as well as with the monitoring and management of regional economy become the basic elements of creating the diversified, effective and competitive environment focused on creation in the region of the industrial complexes which yield the final products. The article emphasizes that organizational and administrative innovations are mostly directed on the activization of the process of regional innovative system formation, the search of more effective forms of interaction with vertically integrated companies (mega-corporations operating on the territory of the region which investment resources need to be involved in the process of modernization and restructuring of a regional economic complex.

  6. Speech Enhancement with Natural Sounding Residual Noise Based on Connected Time-Frequency Speech Presence Regions

    Directory of Open Access Journals (Sweden)

    Sørensen Karsten Vandborg

    2005-01-01

    Full Text Available We propose time-frequency domain methods for noise estimation and speech enhancement. A speech presence detection method is used to find connected time-frequency regions of speech presence. These regions are used by a noise estimation method and both the speech presence decisions and the noise estimate are used in the speech enhancement method. Different attenuation rules are applied to regions with and without speech presence to achieve enhanced speech with natural sounding attenuated background noise. The proposed speech enhancement method has a computational complexity, which makes it feasible for application in hearing aids. An informal listening test shows that the proposed speech enhancement method has significantly higher mean opinion scores than minimum mean-square error log-spectral amplitude (MMSE-LSA and decision-directed MMSE-LSA.

  7. CMC Participation in the Regional Centre for Strategic Studies (RCSS) Workshop: Defense, Technology and Cooperative Security in South Asia

    Energy Technology Data Exchange (ETDEWEB)

    Biringer, K.L.; Olsen, J.

    1998-11-01

    As an ongoing part of the collaborative efforts between the Cooperative Monitoring Center (CMC) at Sandia National Laboratories, the United States Arms Control and Disarmament Agency (ACDA), and U.S. Department of Energy (DOE), staff from the CMC served as faculty in conducting a workshop in Shanghai, China. Sponsor of the workshop was the Regional Centre for Strategic Studies (RCSS) based in Colombo, Sri Lanka. The workshop included participants from throughout South Asia and China. The CMC presented four sessions related to the role of monitoring technologies in promoting regional security and building confidence among nations. Participation in these workshops supports U.S. efforts to further regional cooperation and promote arms control, nonproliferation and other cooperative securily measures and supplements efforts funded by DOE and ACDA over the past four years. The RCSS Shanghai meeting permitted a continued CMC involvement in regionally conducted training for anew generation of leaders in government, the military, and academia throughout South Asia and China. Nuclear issues are clearly a dominant South Asian concern since the nuclear tests of May 1998. However, there remains a strong interest in identifying opportunities for increased trade and reduced tensions in other areas. The RCSS and other regional organizations are enthusiastic about continued CMC involvement in future regional courses.

  8. The United States and the Asia-Pacific Region: Security Strategy for the Obama Administration

    Science.gov (United States)

    2009-02-01

    popular culture, regional tourism , and sub-regional communications, have created a new atmosphere in which cooperative approaches to a wide range...has been conspicuously absent in recent foreign policy debates, and this divisiveness hampers the formulation and execution of American foreign

  9. Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing

    Directory of Open Access Journals (Sweden)

    James (Jong Hyuk Park

    2016-09-01

    Full Text Available Entropy is a basic and important concept in information theory. It is also often used as a measure of the unpredictability of a cryptographic key in cryptography research areas. Ubiquitous computing (Ubi-comp has emerged rapidly as an exciting new paradigm. In this special issue, we mainly selected and discussed papers related with ore theories based on the graph theory to solve computational problems on cryptography and security, practical technologies; applications and services for Ubi-comp including secure encryption techniques, identity and authentication; credential cloning attacks and countermeasures; switching generator with resistance against the algebraic and side channel attacks; entropy-based network anomaly detection; applied cryptography using chaos function, information hiding and watermark, secret sharing, message authentication, detection and modeling of cyber attacks with Petri Nets, and quantum flows for secret key distribution, etc.

  10. Enhancing Unity of Effort in Homeland Defense, Homeland Security, and Civil Support Through Interdisciplinary Education

    Science.gov (United States)

    2010-03-01

    Parameters, Winter 1998, 39–50. Walt Disney Pictures. (2004) Miracle. Burbank, CA. Wormuth, C. E., & Witkowsky, A. (2008). Managing the Next...defense, homeland security, and civil support. In 2004, Disney produced a movie entitled Miracle that portrayed the story of the 1980 hockey team...perspective that the players have finally set aside their differences and internal competitions to form a true team. These quotes from a movie Disney

  11. Convective Enhancement of Icing Roughness Elements in Stagnation Region Flows

    Science.gov (United States)

    Hughes, Michael T.; McClain, Stephen T.; Vargas, Mario; Broeren, Andy

    2015-01-01

    To improve existing ice accretion simulation codes, more data regarding ice roughness and its effects on convective heat transfer are required. To build on existing research on this topic, this study used the Vertical Icing Studies Tunnel (VIST) at NASA Glenn Research to model realistic ice roughness in the stagnation region of a NACA 0012 airfoil. Using the VIST, a test plate representing the leading 2% chord of the airfoil was subjected to flows of 7.62 m/s (25 ft/s), 12.19 m/s (40 ft/s), and 16.76 m/s (55 ft/s). The test plate was fitted with 3 surfaces, each with a different representation of ice roughness: 1) a control surface with no ice roughness, 2) a surface with ice roughness with element height scaled by 10x and streamwise rough zone width from the stagnation point scaled by 10x, and 3) a surface with ice roughness with element height scaled by 10x and streamwise rough zone width from the stagnation point scaled by 25x. Temperature data from the tests were recorded using an infrared camera and thermocouples imbedded in the test plate. From the temperature data, a convective heat transfer coefficient map was created for each case. Additional testing was also performed to validate the VIST's flow quality. These tests included five-hole probe and hot-wire probe velocity traces to provide flow visualization and to study boundary layer formation on the various test surfaces. The knowledge gained during the experiments will help improve ice accretion codes by providing heat transfer coefficient validation data and by providing flow visualization data helping understand current and future experiments performed in the VIST.

  12. A sequential-move game for enhancing safety and security cooperation within chemical clusters.

    Science.gov (United States)

    Pavlova, Yulia; Reniers, Genserik

    2011-02-15

    The present paper provides a game theoretic analysis of strategic cooperation on safety and security among chemical companies within a chemical industrial cluster. We suggest a two-stage sequential move game between adjacent chemical plants and the so-called Multi-Plant Council (MPC). The MPC is considered in the game as a leader player who makes the first move, and the individual chemical companies are the followers. The MPC's objective is to achieve full cooperation among players through establishing a subsidy system at minimum expense. The rest of the players rationally react to the subsidies proposed by the MPC and play Nash equilibrium. We show that such a case of conflict between safety and security, and social cooperation, belongs to the 'coordination with assurance' class of games, and we explore the role of cluster governance (fulfilled by the MPC) in achieving a full cooperative outcome in domino effects prevention negotiations. The paper proposes an algorithm that can be used by the MPC to develop the subsidy system. Furthermore, a stepwise plan to improve cross-company safety and security management in a chemical industrial cluster is suggested and an illustrative example is provided. Copyright © 2010 Elsevier B.V. All rights reserved.

  13. Enhancement of security for free space optics based on reconfigurable chaotic technique

    Science.gov (United States)

    Abdulameer, Lwaa F.; Jignesh, Jokhakar D.; Sripati, U.; Kulkarni, Murlidhar

    2013-01-01

    Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator "reconfigurable tent map". As synchronization between transmitter and receiver is essential for the correct operation of such schemes, we have also attempted to determine parameters such as auto- and cross-correlation that determine the ease with which synchronization between transmitter and receiver can be achieved. It is demonstrated that cross correlation is very close to zero and auto-correlation is 􀟜-like. The overall system is implemented in the MATLAB Simulink DSP Builder.

  14. Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique

    Directory of Open Access Journals (Sweden)

    Nithya Chidambaram

    2016-01-01

    Full Text Available With the rapid rise of the Internet and electronics in people’s life, the data related to it has also undergone a mammoth increase in magnitude. The data which is stored in the cloud can be sensitive and at times needs a proper file storage system with a tough security algorithm. Whereas cloud is an open shareable elastic environment, it needs impenetrable and airtight security. This paper deals with furnishing a secure storage system for the above-mentioned purpose in the cloud. To become eligible to store data a user has to register with the cloud database. This prevents unauthorized access. The files stored in the cloud are encrypted with RSA algorithm and digital fingerprint for the same has been generated through MD5 message digest before storage. The RSA provides unreadability of data to anyone without the private key. MD5 makes it impossible for any changes on data to go unnoticed. After the application of RSA and MD5 before storage, the data becomes resistant to access or modifications by any third party and to intruders of cloud storage system. This application is tested in Amazon Elastic Compute Cloud Web Services.

  15. Perilous Human Security in South Asia: Are There Ways Out?

    Science.gov (United States)

    2011-03-21

    parliamentary 17 elections. This approach might help in involving some dedicated and honest people in politics. Overpopulation is at the core of most of...underway in India and Pakistan also. Avoiding such projects in future will definitely enhance human security. Regional Initiatives. Regional...initiatives on fighting against the threats to human security can definitely complement or multiply individual country efforts. Unfortunately, the

  16. Ecosystem Management: Tomorrow’s Approach to Enhancing Food Security under a Changing Climate

    Directory of Open Access Journals (Sweden)

    Mike Rivington

    2011-06-01

    Full Text Available This paper argues that a sustainable ecosystem management approach is vital to ensure the delivery of essential ‘life support’ ecosystem services and must be mainstreamed into societal conscience, political thinking and economic processes. Feeding the world at a time of climate change, environmental degradation, increasing human population and demand for finite resources requires sustainable ecosystem management and equitable governance. Ecosystem degradation undermines food production and the availability of clean water, hence threatening human health, livelihoods and ultimately societal stability. Degradation also increases the vulnerability of populations to the consequences of natural disasters and climate change impacts. With 10 million people dying from hunger each year, the linkages between ecosystems and food security are important to recognize. Though we all depend on ecosystems for our food and water, about seventy per cent of the estimated 1.1 billion people in poverty around the world live in rural areas and depend directly on the productivity of ecosystems for their livelihoods. Healthy ecosystems provide a diverse range of food sources and support entire agricultural systems, but their value to food security and sustainable livelihoods are often undervalued or ignored. There is an urgent need for increased financial investment for integrating ecosystem management with food security and poverty alleviation priorities. As the world’s leaders worked towards a new international climate change agenda in Cancun, Mexico, 29 November–10 December 2010 (UNFCCC COP16, it was clear that without a deep and decisive post-2012 agreement and major concerted effort to reduce the food crisis, the Millennium Development Goals will not be attained. Political commitment at the highest level will be needed to raise the profile of ecosystems on the global food agenda. It is recommended that full recognition and promotion be given of the linkages

  17. A knowledge-based framework for image enhancement in aviation security.

    Science.gov (United States)

    Singh, Maneesha; Singh, Sameer; Partridge, Derek

    2004-12-01

    The main aim of this paper is to present a knowledge-based framework for automatically selecting the best image enhancement algorithm from several available on a per image basis in the context of X-ray images of airport luggage. The approach detailed involves a system that learns to map image features that represent its viewability to one or more chosen enhancement algorithms. Viewability measures have been developed to provide an automatic check on the quality of the enhanced image, i.e., is it really enhanced? The choice is based on ground-truth information generated by human X-ray screening experts. Such a system, for a new image, predicts the best-suited enhancement algorithm. Our research details the various characteristics of the knowledge-based system and shows extensive results on real images.

  18. The novel approach to enhance seed security: dual anti-counterfeiting methods applied on tobacco pelleted seeds.

    Directory of Open Access Journals (Sweden)

    Yajing Guan

    Full Text Available Seed security is of prime importance for agriculture. To protect true seeds from being faked, more secure dual anti-counterfeiting technologies for tobacco (Nicotiana tabacum L. pelleted seed were developed in this paper. Fluorescein (FR, rhodamine B (RB, and magnetic powder (MP were used as anti-counterfeiting labels. According to their different properties and the special seed pelleting process, four dual-labeling treatments were conducted for two tobacco varieties, MS Yunyan85 (MSYY85 and Honghua Dajinyuan (HHDJY. Then the seed germination and seedling growth status were investigated, and the fluorescence in cracked pellets and developing seedlings was observed under different excitation lights. The results showed that FR, RB, and MP had no negative effects on the germination, seedling growth, and MDA content of the pelleted seeds, and even some treatments significantly enhanced seedling dry weight, vigor index, and shoot height in MS YY85, and increased SOD activity and chlorophyll content in HHDJY as compared to the control. In addition, the cotyledon tip of seedlings treated with FR and MP together represented bright green fluorescence under illumination of blue light (478 nm. And the seedling cotyledon vein treated with RB and MP together showed red fluorescence under green light (546 nm. All seeds pelleted with magnetic powder of proper concentration could be attracted by a magnet. Thus, it indicated that those new dual-labeling methods that fluorescent compound and magnetic powder simultaneously applied in the same seed pellets definitely improved anti-counterfeiting technology and enhanced the seed security. This technology will ensure that high quality seed will be used in the crop production.

  19. Enhanced frequency upconversion in Ho3+/Yb3+/Li+:YMoO4 nanophosphors for photonic and security ink applications

    Science.gov (United States)

    Mondal, Manisha; Kumar Rai, Vineet; Srivastava, Chandan; Sarkar, Suman; Akash, R.

    2016-12-01

    The YMoO4 nanophosphors codoped with Ho3+/Yb3+/Li+ ions synthesized by the chemical coprecipitation method have been structurally characterized by using X-Ray Diffraction (XRD), Field Emission Scanning Electron Microscopy (FESEM), and Transmission Electron Microscopy (TEM) techniques. The TEM bright field imaging shows that the developed nanophosphors are crystalline in nature with particle size ˜45 nm. The upconversion (UC) emission spectra upon excitation at 980 nm of the nanophosphors at low pump power (security ink, and novel devices for displays in the low and high pump power region.

  20. Achieve a Better Understanding of Cloud and Precipitation Processes for the Promotion of Water Security in Arid and Semi-Arid Regions

    Science.gov (United States)

    Farrah, S.; Al Yazidi, O.

    2016-12-01

    The UAE Research Program for Rain Enhancement Science (UAEREP) is an international research initiative designed to advance the science and technology of rain enhancement. It comes from an understanding of the needs of countries suffering from scarcity of fresh water, and its will to support innovation globally. The Program focuses on the following topics: Climate change, Climate modelling, Climatology, Atmospheric physics, Atmospheric dynamics, Weather modification, Cloud physics, Cloud dynamics, Cloud seeding, Weather radars, Dust modelling, Aerosol physics , Aerosol chemistry, Aerosol/cloud interactions, Water resources, Physics, Numerical modelling, Material science, Nanotechnology, Meteorology, Hydrology, Hydrogeology, Rocket technology, Laser technology, Water sustainability, Remote sensing, Environmental sciences... In 2015, three research teams from Japan, Germany and the UAE led by Prof. Masataka Murakami, Volker Wulfmeyer and Linda Zou have been respectively awarded. Together, they are addressing the issue of water security through innovative ideas: algorithms and sensors, land cover modification, and nanotechnologies to accelerate condensation. These three projects are undergoing now with extensive research and progresses. This session will be an opportunity to present their latest results as well as to detail the evolution of research in rain enhancement. In 2016 indeed, the Program saw a remarkable increase in participation, with 91 pre-proposals from 398 scientists, researchers and technologists affiliated to 180 institutes from 45 countries. The projects submitted are now focusing on modelling to predict weather, autonomous vehicles, rocket technology, lasers or new seeding materials… The science of rain enhancement offers considerable potential in terms of research, development and innovation. Though cloud seeding has been pursued since the late 1940s, it has been viewed as a relatively marginal field of interest for scientists. This benign neglect

  1. Cryptographic salting for security enhancement of double random phase encryption schemes

    Science.gov (United States)

    Velez Zea, Alejandro; Fredy Barrera, John; Torroba, Roberto

    2017-10-01

    Security in optical encryption techniques is a subject of great importance, especially in light of recent reports of successful attacks. We propose a new procedure to reinforce the ciphertexts generated in double random phase encrypting experimental setups. This ciphertext is protected by multiplexing with a ‘salt’ ciphertext coded with the same setup. We present an experimental implementation of the ‘salting’ technique. Thereafter, we analyze the resistance of the ‘salted’ ciphertext under some of the commonly known attacks reported in the literature, demonstrating the validity of our proposal.

  2. Practical recommendations for strengthening national and regional laboratory networks in Africa in the Global Health Security era.

    Science.gov (United States)

    Best, Michele; Sakande, Jean

    2016-01-01

    The role of national health laboratories in support of public health response has expanded beyond laboratory testing to include a number of other core functions such as emergency response, training and outreach, communications, laboratory-based surveillance and data management. These functions can only be accomplished by an efficient and resilient national laboratory network that includes public health, reference, clinical and other laboratories. It is a primary responsibility of the national health laboratory in the Ministry of Health to develop and maintain the national laboratory network in the country. In this article, we present practical recommendations based on 17 years of network development experience for the development of effective national laboratory networks. These recommendations and examples of current laboratory networks, are provided to facilitate laboratory network development in other states. The development of resilient, integrated laboratory networks will enhance each state's public health system and is critical to the development of a robust national laboratory response network to meet global health security threats.

  3. Supporting reputation based trust management enhancing security layer for cloud service models

    Science.gov (United States)

    Karthiga, R.; Vanitha, M.; Sumaiya Thaseen, I.; Mangaiyarkarasi, R.

    2017-11-01

    In the existing system trust between cloud providers and consumers is inadequate to establish the service level agreement though the consumer’s response is good cause to assess the overall reliability of cloud services. Investigators recognized the significance of trust can be managed and security can be provided based on feedback collected from participant. In this work a face recognition system that helps to identify the user effectively. So we use an image comparison algorithm where the user face is captured during registration time and get stored in database. With that original image we compare it with the sample image that is already stored in database. If both the image get matched then the users are identified effectively. When the confidential data are subcontracted to the cloud, data holders will become worried about the confidentiality of their data in the cloud. Encrypting the data before subcontracting has been regarded as the important resources of keeping user data privacy beside the cloud server. So in order to keep the data secure we use an AES algorithm. Symmetric-key algorithms practice a shared key concept, keeping data secret requires keeping this key secret. So only the user with private key can decrypt data.

  4. Hunting at the Abun Regional Marine Protected Areas: A Link Between Wildmeat and Food Security

    Directory of Open Access Journals (Sweden)

    FREDDY PATTISELANNO

    2014-12-01

    Full Text Available Native Papuans are relied on hunting for subsistence purposes and significantly contributed to traditional cultures. However, in Papua information on hunting is limited and largely restricted to anthropological setting with most observations were done on the forest sites in lowland and highland landscapes. This study focuses on the contribution of hunting on food security along the coastal forests at the Bird's Head Peninsula. Do people live near coastal sites mostly rely on marine resources as protein source? We gathered data on hunting by the majority of Karon ethnic group in the Abun district of Tambrauw Regency at the Bird's Head Peninsula of Papua, Indonesia. We used information from in-depth interviews with hunters and households meal survey at four villages of Abun: Waibem, Wau, Warmandi and Saubeba. Reasons for hunting were varies among respondents but mostly conducted for trade. Six species of mammals and three birds were commonly hunted by using six different hunting techniques. Wild pig and rusa deer were the major targets in hunting to meet the demand of meat for both trading and household consumption. Meals containing wildmeat was the most consumed meal, greater than meals containing fish, animal products and vegetables, and noodles.

  5. Meteorological tools in support to the railway security system on the Calabria region

    Science.gov (United States)

    Laviola, Sante; Gabriele, Salvatore; Iovine, Giulio; Baldini, Luca; Chiravalloti, Francesco; Federico, Stefano; Miglietta, Marcello Mario; Milani, Lisa; Procopio, Antonio; Roberto, Nicoletta; Tiesi, Alessandro; Agostino, Mario; Niccoli, Raffaele; Stassi, Sergio; Rago, Valeria

    2017-04-01

    RAMSES (RAilway Meteorological SEcurity System) is a pilot project co-funded by the Italian Railway Company - RFI S.p.A. and conceived for the mitigation of the hydrological risk along the Calabria railways. RAMSES aims at improving the forecast of very short life-cycle convection systems, responsible of intense and localized rainfalls affecting small catchment areas, which are often underestimated by the numerical weather models and even non-adequately detected by the network of sparse raingauges. The RAMSES operational design is based on a synergistic and integrated architecture, providing a series of information able to identify the most active convective cells and monitoring their evolution in terms of vertical structure, rain intensity and geo-hydrological effects at ground (debris flow, landslides, collapses of bridges, erosion of the ballast). The RAMSES meteorological component is designed to identify and track the short-term evolution (15-60 min) of convective cells, by means of imaging techniques based on dual-polarization weather radar and Meteosat data. In support of this quasi-real time analysis, the numerical model WRF provides the weather forecast at 3-6 hours range by ingesting, through the assimilation system LAPS, the observational data (rain gauges, ground weather stations, radar, satellites) in order to improve the initial condition. Finally, the hydraulic flow modeling is used to assess the ground effects in terms of landslide susceptibility, rainfall-runoff intensity, debris impact on the drainage network and evaluate of risk along the railway track.

  6. Drought risk assessment of food security in a regional climate model perspective

    Science.gov (United States)

    Calmanti, Sandro; Yohannes Gelassie, Tinebeb; Syroka, Joanna; Nikulin, Grigory; Jones, Colin

    2013-04-01

    We test the potential added value of high-resolution dynamical downscalings of climate simulations for impact studies in the sector of food-security. We use the risk assessment platform - Africa RiskView (ARV) - developed by the office of Climate and Disaster Risk Solutions of WFP as the underlying impact model. As a test, retrospective case, we consider the ERA-Interim reanalysis and three downscalings performed by Swedish Meteorological and Hydrological Institute (SMHI) at three different horizontal resolutions (44Km, 22Km and 11 km). Aim is to compare the outcome of the impact model under different climate forcings with a unique historical record of humanitarian interventions maintained by WFP. The analysis shows a consistent picture in which coarser donwscalings imply a downgrading of the predicting skills of the impact model with respect to the driving glabal scale data. Some skill is recovered at intermediate horizontal resolution and finally the 11-Km resolution downscaling shows a predicting skill that is in line with that of the rainfall observations is routinely adopted at WFP for monitoring and early warning. Building on the calibration described above, we perform a climate change stress test using model simulation included in the CORDEX database.

  7. Hunting at the Abun Regional Marine Protected Areas: A Link Between Wildmeat and Food Security

    Directory of Open Access Journals (Sweden)

    FREDDY PATTISELANNO

    2014-12-01

    Full Text Available Native Papuans are relied on hunting for subsistence purposes and significantly contributed to traditional cultures. However, in Papua information on hunting is limited and largely restricted to anthropological setting with most observations were done on the forest sites in lowland and highland landscapes. This study focuses on the contribution of hunting on food security along the coastal forests at the Bird’s Head Peninsula. Do people live near coastal sites mostly rely on marine resources as protein source? We gathered data on hunting by the majority of Karon ethnic group in the Abun district of Tambrauw Regency at the Bird’s Head Peninsula of Papua, Indonesia. We used information from in-depth interviews with hunters and households meal survey at four villages of Abun: Waibem, Wau, Warmandi and Saubeba. Reasons for hunting were varies among respondents but mostly conducted for trade. Six species of mammals and three birds were commonly hunted by using six different hunting techniques. Wild pig and rusa deer were the major targets in hunting to meet the demand of meat for both trading and household consumption. Meals containing wildmeat was the most consumed meal, greater than meals containing fish, animal products and vegetables, and noodles.

  8. Regional growth and energy supply: Is there an energy security issue?

    Energy Technology Data Exchange (ETDEWEB)

    Roop, J.M.; Freund, K.A.; Godoy-Kain, P.; Gu, A.Y.; Johnson, A.K.; Paananen, O.H.; Woodruff, M.G.

    1996-12-01

    This study examines how the growth of the developing world might affect energy markets in the future. Based on recent growth trends, world energy demand could reasonably be expected to grow from about 350 Exajoules (EJ: 1.0E18=0.95 Quad) to nearly 1025 EJ by the year 2020, nearly 3x current consumption estimates. Introduction of more energy-efficient technologies could reduce this growth by about 17% to 830 EJ. But one cannot rely exclusively on current trends to forecast future energy demand. The growth of the developing world will interact with supply to affect prices, which in turn will mitigate the growth of demand, and growth rates of energy use will be much more modes. Under the Business as Usual scenario, energy demand will grow to 835 EJ by 2020, and this could be reduced a further 15% to 714 EJ through the adoption of more energy efficient technologies. Fuel prices based on model results are analyzed. Energy security implications of rapid growth in the developing world are considered and found to be of likely little significance.

  9. Development of Beet Sugar Production in Ryazan Region in the Context of Ensuring Food Security

    Directory of Open Access Journals (Sweden)

    Mansurov Ruslan Evgenyevich

    2014-12-01

    Full Text Available The article presents the results of the research on the current state of the beet sugar subcomplex of Ryazan region in the context of the need of improving its efficiency. The study let the author determine that currently the beet sugar subcomplex of Ryazan region does not ensure domestic demand in sand sugar. However, there are reserves of providing more efficient use of soil and climate capacity as well as the productivity potential of the region. When applying the technology of field beet piling, the period of sugar production at sugar factories may be extended up to 200 days. At this, up to 51 thousand tons of sand sugar can be produced. This amount will completely cover the annual demand for sugar in Ryazan region. In order to further study the feasibility of this approach, zoning was carried out and let allocate the zones of beet seeding. As a result, it was determined that a number of areas are far removed from the place of treatment, and in terms of transportation costs minimization the sugar beet cultivation in these areas is not rational. As an alternative, the author proposes to consider the possibility of building a new sugar factory in Ryazhsky district with the processing capacity of 1,000 tons of sugar beet per day. Taking this into account, the recommended acreage of sugar beet by districts and zones of raw material supply were obtained through corresponding calculations.

  10. Economic separatism in the European Union member states as a factor of regional security

    Directory of Open Access Journals (Sweden)

    A A Shakhina

    2014-12-01

    Full Text Available The article is devoted to the examination of the economic separatism problem in the European Union member states. It considers specific of the regional separatist movements as exemplified by the conflicts in Scotland, Catalonia, Bavaria, Flanders. Various points of view on the relevance of the budgetary separatism for the European integration process are given in the article.

  11. CONTRIBUTIONS AND ROMANIAN OPTIONS TO STRENGTHEN SECURITY FOR SOUTH EASTERN EUROPE IN REGIONAL BILATERAL/TRILATERAL ARRANGEMENTS IN THE BLACK SEA AREA

    Directory of Open Access Journals (Sweden)

    Florin-Eduard GROSARU

    2013-01-01

    Full Text Available Regional cooperation to improve security and stability materializes in the existence of many bi or trilateral intergovernmental relations in the initiation and development of regional initiatives and organizations. All these actions provide an opportunity to identify and develop viable assessment procedures of the strategic environment, risks and threats to security and stability in the area, and to the identification of appropriate tools of crisis management. At the same time, a viable regional cooperation boosts the states of the South-East Europe area to have significant contribution to resolving tension, crisis or potential conflict that manifests in the area.

  12. Assessing food security in water scarce regions by Life Cycle Analysis: a case study in the Gaza strip

    Science.gov (United States)

    Recanati, Francesca; Castelletti, Andrea; Melià, Paco; Dotelli, Giovanni

    2013-04-01

    Food security is a major issue in Palestine for both political and physical reasons, with direct effects on the local population living conditions: the nutritional level of people in Gaza is classified by FAO as "insecure". As most of the protein supply comes from irrigated agricultural production and aquaculture, freshwater availability is a limiting factor to food security, and the primary reason for frequent conflicts among food production processes (e.g. aquaculture, land livestock or different types of crops). In this study we use Life Cycle Analysis to assess the environmental impacts associated to all the stages of water-based protein production (from agriculture and aquaculture) in the Gaza strip under different agricultural scenarios and hydroclimatic variability. As reported in several recent studies, LCA seems to be an appropriate methodology to analyze agricultural systems and assess associated food security in different socio-economic contexts. However, we argue that the inherently linear and static nature of LCA might prove inadequate to tackle with the complex interaction between water cycle variability and the food production system in water-scarce regions of underdeveloped countries. Lack of sufficient and reliable data to characterize the water cycle is a further source of uncertainty affecting the robustness of the analysis. We investigate pros and cons of LCA and LCA-based option planning in an average size farm in Gaza strip, where farming and aquaculture are family-based and integrated by reuse of fish breeding water for irrigation. Different technological solutions (drip irrigation system, greenhouses etc.) are evaluated to improve protein supply and reduce the pressure on freshwater, particularly during droughts. But this use of technology represent also a contribution in increasing sustainability in agricultural processes, and therefore in economy, of Gaza Strip (reduction in chemical fertilizers and pesticides etc.).

  13. Spatio-Temporal Simulation and Analysis of Regional Ecological Security Based on Lstm

    Science.gov (United States)

    Gong, C.; Qi, L.; Heming, L.; Karimian, H.; Yuqin, M.

    2017-10-01

    Region is a complicated system, where human, nature and society interact and influence. Quantitative modeling and simulation of ecology in the region are the key to realize the strategy of regional sustainable development. Traditional machine learning methods have made some achievements in the modeling of regional ecosystems, but it is difficult to determine the learning characteristics and to realize spatio-temporal simulation. Deep learning does not need prior identification of training characteristics, have excellent feature learning ability, can improve the accuracy of model prediction, so the use of deep learning model has a significant advantage. Therefore, we use net primary productivity (NPP), atmospheric optical depth (AOD), moderate-resolution imaging spectrometer (MODIS), Normalized Difference Vegetation Index (NDVI), landcover and population data, and use LSTM to do spatio-temporal simulation. We conduct spatial analysis and driving force analysis. The conclusions are as follows: the ecological deficit of northwestern Henan and urban communities such as Zhengzhou is higher. The reason of former lies in the weak land productivity of the Loess Plateau, the irrational crop cultivation mode. The latter lies in the high consumption of resources in the large urban agglomeration; The positive trend of Henan ecological development from 2013 is mainly due to the effective environmental protection policy in the 12th five-year plan; The main driver of the sustained ecological deficit growth of Henan in 2004-2013 is high-speed urbanization, increasing population and goods consumption. This article provides relevant basic scientific support and reference for the regional ecological scientific management and construction.

  14. The EU's Policies of Security of Energy Supply towards the Middle East and Caspian Region. Major Power Politics? Chapter 19

    Energy Technology Data Exchange (ETDEWEB)

    Hoogeveen, F.; Perlot, W. [Clingendael International Energy Programme CIEP, Den Haag (Netherlands)

    2007-07-01

    Vast reserves of fossil fuels make the Greater Middle East (GME) region the centre of attention in terms of security of supply considerations of all major energy-consuming countries, most notably of the United States (US), China, India, and of the European Union (EU). Although energy security is on the EU's agenda, the supranational nature of the EU inhibits to pursue an external energy security policy in the same way as other consuming countries. Its power, mandate, and in many ways preparedness to execute a common foreign policy towards the GME, let alone as specific as a common foreign energy strategy, are limited. This chapter seeks to answer the questions of what role the EU wants to play in the GME region in relation to objectives of energy security, what role it can play in this respect, and whether the EU's Middle East politics can be regarded as major power politics.

  15. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  16. Regional, national and international security requirements for the transport of nuclear cargo by sea

    Energy Technology Data Exchange (ETDEWEB)

    Booker, P.A.; Barnwell, I. [Marine Operations, BNFL International Transport and British Nuclear Group Security (United Kingdom)

    2004-07-01

    Since the beginning of the nuclear age in the 1940's, the world has focused on the immense possibilities of nuclear power with both its destructive and productive capabilities. The civil nuclear industry in the UK, as in most nuclear weapons states, grew from the military facilities built in the post war years under the political climate of the Cold War. In the early years of the industry, civil and defence nuclear facilities were inextricably linked both in public perceptions and the regulatory infrastructure under which they operated. The nuclear arms race and the spread of communism overshadowed people's perceptions of there being two separate uses of nuclear material. This was a double edged sword which initially allowed the industry to develop largely unhindered by public concerns but latterly meant the industry could not break away from its roots and to many is still perceived as a dangerous and destructive force. Regulatory frameworks governing all aspects of the industry have developed both nationally and internationally driven by valid public concerns, political agendas and an international consensus that the unregulated use of nuclear material has catastrophic possibilities on an international scale. With the internationalisation of the civil nuclear industry and the costs associated with developing facilities to fully support each stage of the fuel cycle, from enrichment, fuel manufacturing, reprocessing and waste remediation, it became inevitable that a transport infrastructure would develop to make best use of the facilities. Regulations, both national and international are implicit in ensuring the security of nuclear material in transit. Due to the physical size of many of the irradiated fuel packages and implications of the changes to transport safety regulations, international transports of nuclear material, other than within mainland Europe, is predominantly carried out by sea.

  17. A Security Enhanced Timestamp-Based Password Authentication Scheme Using Smart Cards

    Science.gov (United States)

    Pathan, A.-S. K.; Hong, C. S.

    2007-11-01

    With the recent proliferation of distributed systems and networking, remote authentication has become a crucial task in many networking applications. Various schemes have been proposed so far for the two-party remote authentication; however, some of them have been proved to be insecure. In this paper, we propose an efficient timestamp-based password authentication scheme using smart cards. We show various types of forgery attacks against a previously proposed timestamp-based password authentication scheme and improve that scheme to ensure robust security for the remote authentication process, keeping all the advantages that were present in that scheme. Our scheme successfully defends the attacks that could be launched against other related previous schemes. We present a detailed cryptanalysis of previously proposed Shen et. al scheme and an analysis of the improved scheme to show its improvements and efficiency.

  18. The Soviet Region, The Environment, and U.S. National Security

    Science.gov (United States)

    1992-04-01

    on relatively obscure for many years. The magnitude of the environmental degradation in the Soviet region is unimaginable and the consequences in... the environmental issue will make the task even more difficult. 4 THE ENVIRONMENT - AN INTERNATIONAL ISSUE An environmental pollution aspect which...USSR and the Committee on Forestry paid no attention. This article can be credited with beginning the environmental awareness of the Soviet populace

  19. Challenges in the regional agenda of citizden security and transnational organized crime

    OpenAIRE

    Luz i Álvarez, Daniel

    2014-01-01

    Latin America and the Caribbean is one of the regions with the highest rates of violence and crime in the world, situation that affects the effective exercise of human rights and becomes a serious obstacle for socioeconomic development. However, citizen secutrity should not be seen solely as a reduction in crime rates, but as the result of a policy that is oriented towards a comprehensive strategy. This strategy should include improving the quality of life of the population; Community action ...

  20. Regionalizing East Mediterranean Gas: Energy Security, Stability, and the U.S. Role

    Science.gov (United States)

    2014-12-01

    carrot for the pursuit of specific outcomes of any negotia- tions between the two...efforts in this direction ever more important. Cyprus’s natu- ral gas development offers a powerful carrot for new and intensified regional talks and the...Lovelace, Jr. Director of Research Dr. Steven K. Metz Authors Ms. Laura El-Katiri Dr. Mohammed El-Katiri Editor for Production Dr. James G. Pierce Publications Assistant Ms. Rita A. Rummel ***** Composition Mrs. Jennifer E. Nevil

  1. Evaluating the Impact of the Department of Defense Regional Centers for Security Studies

    Science.gov (United States)

    2014-01-01

    United States, one that it runs jointly with the Africa Center ( Madagascar ), and two that it runs jointly with the Marshall Center and the Africa Center...Pacific region are yet ready to engage in even informal discussions on the controversy regarding disputed islands in the South China Sea, one of the... island states of the Caribbean16 and Oceania) or because their relative wealth would require them to pay to participate and, like some of the Persian

  2. Geo-Regional Security and Transformation After the Balkan's Wars and Kosova Independence

    Directory of Open Access Journals (Sweden)

    Dr.Sc. Gjon Boriqi

    2014-02-01

    Full Text Available During the '90-ies the wars in the former territories of what was called Yugoslavia marked the end of a century plenty of wars and local armed conflicts. More than 140 million people died because of wars in the XX century. The war of Kosova was the last one in that century. The beginning of the XXI century stressed the necessity for a new way of thinking nationally, regionally and globally. The Balkans were often considered as a gun powder territory. All the Balkans states, someone more and someone less, have problems with each other. History was and remained very passionate within the Balkan countries. The case of Kosova is possibly the most sensitive in all this framework. After the proclamation of independence on February 17 2008, the concerns were high within the region and a new question was questioned: would the map of the Balkan peninsula change again to form another "Kosovo"? This article would give some details about the geopolitical situation in the Balkans focusing on Kosova and would try to establish e new way of making politics and diplomacy though deterrence and not offence. We will try to overpass history but without neglecting it, but by learning from its mistakes in order to bring a better Peace-Building aspect for the Balkan region.

  3. Equity, food security and health equity in the Asia Pacific region.

    Science.gov (United States)

    Friel, Sharon; Baker, Phillip I

    2009-01-01

    What, and how much, people eat is a response to their socio-political, socio-economic, socio-environmental and socio-cultural environments. Good nutrition is central to good health. Globally, health has improved for many but not for everyone equally. That food and nutrition-related health is unequally distributed is a marker of societal failure. For some individuals, communities and even nations, it is a matter of not having enough food, of being unable to afford food and there being little nutritious food readily available. For others there is an over abundance of food but its nutritional quality is compromised, access to healthy food is poor and cost of food is high relative to other commodities. Human development and poverty reduction in the Asia Pacific region cannot be achieved without improving nutrition in an equitable way. There is no biological reason for the scale of difference in health, including diet-related health that is observed in the Asia Pacific region. That it exists is unethical and inequitable. Asymmetric economic growth, unequal improvements in daily living conditions, unequal distribution of technical developments and suppression of human rights have seen health inequities perpetuate and worsen, particularly over the last three decades. Addressing diet-related health inequities requires attention to the underlying structural drivers and inequities in conditions of daily living that disempower individuals, social groups and even nations from the pursuit of good nutrition and health. These are matters of economic and social policy at the global, regional and national level.

  4. The Model of Gas Supply Capacity Simulation In Regional Energy Security Framework: Policy Studies PT. X Cirebon Area

    Science.gov (United States)

    Nuryadin; Ronny Rahman Nitibaskara, Tb; Herdiansyah, Herdis; Sari, Ravita

    2017-10-01

    The needs of energy are increasing every year. The unavailability of energy will cause economic losses and weaken energy security. To overcome the availability of gas supply in the future, planning are cruacially needed. Therefore, it is necessary to approach the system, so that the process of gas distribution is running properly. In this research, system dynamic method will be used to measure how much supply capacity planning is needed until 2050, with parameters of demand in industrial, household and commercial sectors. From the model obtained PT.X Cirebon area in 2031 was not able to meet the needs of gas customers in the Cirebon region, as well as with Businnes as usual scenario, the ratio of gas fulfillment only until 2027. The implementation of the national energy policy that is the use of NRE as government intervention in the model is produced up to 2035 PT.X Cirebon area is still able to supply the gas needs of its customers.

  5. Investigating the Influence of Regional Stress on Fault and Fracture Permeability at Pahute Mesa, Nevada National Security Site

    Energy Technology Data Exchange (ETDEWEB)

    Reeves, Donald M. [Desert Research Inst. (DRI), Reno, NV (United States); Smith, Kenneth D. [Univ. of Nevada, Reno, NV (United States); Parashar, Rishi [Desert Research Inst. (DRI), Reno, NV (United States); Collins, Cheryl [Desert Research Inst. (DRI), Las Vegas, NV (United States); Heintz, Kevin M. [Desert Research Inst. (DRI), Las Vegas, NV (United States)

    2017-05-24

    Regional stress may exert considerable control on the permeability and hydraulic function (i.e., barrier to and/or conduit for fluid flow) of faults and fractures at Pahute Mesa, Nevada National Security Site (NNSS). In-situ measurements of the stress field are sparse in this area, and short period earthquake focal mechanisms are used to delineate principal horizontal stress orientations. Stress field inversion solutions to earthquake focal mechanisms indicate that Pahute Mesa is located within a transtensional faulting regime, represented by oblique slip on steeply dipping normal fault structures, with maximum horizontal stress ranging from N29°E to N63°E and average of N42°E. Average horizontal stress directions are in general agreement with large diameter borehole breakouts from Pahute Mesa analyzed in this study and with stress measurements from other locations on the NNSS.

  6. International cooperation for the development of consistent and stable transportation regulations to promote and enhance safety and security

    Energy Technology Data Exchange (ETDEWEB)

    Strosnider, J. [US Nuclear Regulatory Commission, Washington, DC (United States)

    2004-07-01

    International commerce of radioactive materials crosses national boundaries, linking separate regulatory institutions with a common purpose and making it necessary for these institutions to work together in order to achieve common safety goals in a manner that does not place an undue burden on industry and commerce. Widespread and increasing use of radioactive materials across the world has led to increases in the transport of radioactive materials. The demand for consistency in the oversight of international transport has also increased to prevent unnecessary delays and costs associated with incongruent or redundant regulatory requirements by the various countries through which radioactive material is transported. The International Atomic Energy Agency (IAEA) is the authority for international regulation of transportation of radioactive materials responsible for promulgation of regulations and guidance for the establishment of acceptable methods of transportation for the international community. As such, the IAEA is seen as the focal point for consensus building between its Member States to develop consistency in transportation regulations and reviews and to ensure the safe and secure transport of radioactive material. International cooperation is also needed to ensure stability in our regulatory processes. Changes to transportation regulations should be based on an anticipated safety benefit supported by risk information and insights gained from continuing experience, evaluation, and research studies. If we keep safety as the principle basis for regulatory changes, regulatory stability will be enhanced. Finally, as we endeavour to maintain consistency and stability in our international regulations, we must be mindful of the new security challenges that lay before the international community as a result of a changing terrorist environment. Terrorism is a problem of global concern that also requires international cooperation and support, as we look for ways to

  7. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    Full Text Available According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-governmental organisations, communities, and individual citizens. This has immediate bearing on the everyday security reality of the Czech Republic. In international context, the “security frontier” of the Czech Republic is expanding, e.g. through the country’s involvement in UN and NATO security missions in conflict-ridden regions of Europe and the world. The country also helps enhance the internal security of the European Union, whose strength depends on its Member States’ willingness to “harmonise” the pursuit of their respective national security interests. This approach is especially important with regard to the principal security threats Europe faces and will continue to face in the future: terrorism and organised crime. It is vital that the Czech Republic have a well-working security system capable of responding effectively to a broad range of threats. This requirement applies first and foremost to the Police, the Fire and Rescue Service, and intelligence services. Unfortunately, with the present effectiveness of the Czech security system, much remains wishful thinking and, due to the lack of a comprehensive framework, a comparatively low level of protection against emergencies exists. Fight against crime is hampered by inefficient operation of the Police and judiciary. A thorough analysis of the aforementioned problems could provide basis for a broader public debate over the priorities and goals of Czech security policy, which should

  8. Enhanced secure strategy for electro-optic chaotic systems with delayed dynamics by using fractional Fourier transformation.

    Science.gov (United States)

    Cheng, Mengfan; Deng, Lei; Li, Hao; Liu, Deming

    2014-03-10

    We propose a scheme whereby a time domain fractional Fourier transform (FRFT) is used to post process the optical chaotic carrier generated by an electro-optic oscillator. The time delay signature of the delay dynamics is successfully masked by the FRFT when some conditions are satisfied. Meanwhile the dimension space of the physical parameters is increased. Pseudo random binary sequence (PRBS) with low bit rate (hundreds of Mbps) is introduced to control the parameters of the FRFT. The chaotic optical carrier, FRFT parameters and the PRBS are covered by each other so that the eavesdropper has to search the whole key space to crack the system. The scheme allows enhancing the security of communication systems based on delay dynamics without modifying the chaotic source. In this way, the design of chaos based communication systems can be implemented in a modular manner.

  9. Electronic Health Records: An Enhanced Security Paradigm to Preserve Patient's Privacy

    Science.gov (United States)

    Slamanig, Daniel; Stingl, Christian

    In recent years, demographic change and increasing treatment costs demand the adoption of more cost efficient, highly qualitative and integrated health care processes. The rapid growth and availability of the Internet facilitate the development of eHealth services and especially of electronic health records (EHRs) which are promising solutions to meet the aforementioned requirements. Considering actual web-based EHR systems, patient-centric and patient moderated approaches are widely deployed. Besides, there is an emerging market of so called personal health record platforms, e.g. Google Health. Both concepts provide a central and web-based access to highly sensitive medical data. Additionally, the fact that these systems may be hosted by not fully trustworthy providers necessitates to thoroughly consider privacy issues. In this paper we define security and privacy objectives that play an important role in context of web-based EHRs. Furthermore, we discuss deployed solutions as well as concepts proposed in the literature with respect to this objectives and point out several weaknesses. Finally, we introduce a system which overcomes the drawbacks of existing solutions by considering an holistic approach to preserve patient's privacy and discuss the applied methods.

  10. Security Enhancement of Knowledge-based User Authentication through Keystroke Dynamics

    Directory of Open Access Journals (Sweden)

    Roy Soumen

    2016-01-01

    Full Text Available Keystroke Dynamics is a behavioural biometrics characteristic in Biometric science, which solve the issues in user identification or verification. In Knowledge-based user authentication technique, we compromise with PIN or password which is unsafe due to different type of attacks. It is good to choose password with the combination of upper and lower case letter with some digits and symbols, but which is very hard to remember or generally we forget to distinguish those passwords for different access control systems. Our system not only takes the users’ entered texts but their typing style is also account for. In our experiment, we have not taken hard password type texts, we have chosen some daily used words where users are habituated and comfortable at typing and we obtained the consisting typing pattern. Different distance-based and data mining algorithms we have applied on collected typing pattern and obtained impressive results. As per our experiment, if we use keystroke dynamics in existing knowledge based user authentication system with minimum of five daily used common texts then it increases the security level up to 97.6% to 98.2% (if we remove some of the irrelevant feature sets.

  11. Quinoa for Marginal Environments: Toward Future Food and Nutritional Security in MENA and Central Asia Regions.

    Science.gov (United States)

    Choukr-Allah, Redouane; Rao, Nanduri K; Hirich, Abdelaziz; Shahid, Mohammad; Alshankiti, Abdullah; Toderich, Kristina; Gill, Shagufta; Butt, Khalil Ur Rahman

    2016-01-01

    Quinoa is recognized as a crop of great value in terms of tolerance to abiotic stresses and there is growing interest to introduce it in marginal agricultural production systems worldwide. Also, quinoa is one of the most nutritious food crops currently known and the nutritive properties of the crop are seen as a mean to fight malnutrition globally. Various quinoa cultivars have been screened for tolerance to salinity, water-use efficiency and nutritional quality and the positive attributes found in them have created even wider global interest in its cultivation. This paper summarizes 15 years of studies on assessing the potential for introducing the crop in a few countries of the Middle East and North Africa (MENA) and Central Asia regions and describes the key constraints for scaling-up the production under marginal growing conditions in the newly introduced countries.

  12. Quinoa for marginal environments: Towards future food and nutritional security in MENA and Central Asia regions

    Directory of Open Access Journals (Sweden)

    Redouane eChoukr-allah

    2016-03-01

    Full Text Available Quinoa is recognized as a crop of great value in terms of tolerance to abiotic stresses and there is growing interest to introduce it in marginal agricultural production systems worldwide. Also, quinoa is one of the most nutritious food crops currently known and the nutritive properties of the crop are seen as a means to fight malnutrition globally. Various quinoa cultivars have been screened for tolerance to salinity, water-use efficiency and nutritional quality and the positive attributes found in them have created even wider global interest in its cultivation. This paper summarizes 15 years of studies on assessing the potential for introducing the crop in a few countries of the Middle East and North Africa (MENA and Central Asia regions and describes the key constraints for scaling-up the production under marginal growing conditions in the newly introduced countries.

  13. Switch recombination and somatic hypermutation are controlled by the heavy chain 3' enhancer region.

    Science.gov (United States)

    Dunnick, Wesley A; Collins, John T; Shi, Jian; Westfield, Gerwin; Fontaine, Clinton; Hakimpour, Paul; Papavasiliou, F Nina

    2009-11-23

    Both class switch recombination (CSR) and somatic hypermutation (SHM) require transcription and the trans-acting factor activation-induced cytidine deaminase (AID), and must be up-regulated during antigen-dependent differentiation of B lymphocytes. To test the role of the heavy chain 3' enhancers in both CSR and SHM, we used a BAC transgene of the entire heavy chain constant region locus. Using Cre-loxP recombination to delete a 28-kb region that contains the four known 3' heavy chain enhancers, we isolated lines of BAC transgenic mice with an intact heavy chain locus and paired lines in the same chromosomal insertion site lacking the 3' enhancers. Intact heavy chain transgenes undergo CSR to all heavy chain genes and mutate their transgenic VDJ exon. In paired transgenes lacking the 3' enhancer region, CSR to most heavy chain genes is reduced to approximately 1% of the levels for intact heavy chain loci; SHM is also reduced. Finally, we find that in B cells with a transgene lacking the 3' enhancers, interchromosomal recombination between the transgenic VDJ exon and the endogenous heavy chain C genes is more easily detected than CSR within the transgene.

  14. Switch recombination and somatic hypermutation are controlled by the heavy chain 3′ enhancer region

    Science.gov (United States)

    Collins, John T.; Shi, Jian; Westfield, Gerwin; Fontaine, Clinton; Hakimpour, Paul

    2009-01-01

    Both class switch recombination (CSR) and somatic hypermutation (SHM) require transcription and the trans-acting factor activation-induced cytidine deaminase (AID), and must be up-regulated during antigen-dependent differentiation of B lymphocytes. To test the role of the heavy chain 3′ enhancers in both CSR and SHM, we used a BAC transgene of the entire heavy chain constant region locus. Using Cre-loxP recombination to delete a 28-kb region that contains the four known 3′ heavy chain enhancers, we isolated lines of BAC transgenic mice with an intact heavy chain locus and paired lines in the same chromosomal insertion site lacking the 3′ enhancers. Intact heavy chain transgenes undergo CSR to all heavy chain genes and mutate their transgenic VDJ exon. In paired transgenes lacking the 3′ enhancer region, CSR to most heavy chain genes is reduced to ∼1% of the levels for intact heavy chain loci; SHM is also reduced. Finally, we find that in B cells with a transgene lacking the 3′ enhancers, interchromosomal recombination between the transgenic VDJ exon and the endogenous heavy chain C genes is more easily detected than CSR within the transgene. PMID:19887393

  15. Triple Helix Model as an Efficient Mechanism of Food Security Provision in Regional Economic Entities and the Economic System as a Whole

    Directory of Open Access Journals (Sweden)

    Mihail N. Dudin

    2014-08-01

    Full Text Available The leading countries of the world consider food security the important condition of internal political and social-economic stability of the state and its external independence. The topic of the article is crucial due to the fact that the problem of food security is rather complicated and multilevel and should be considered at different interrelated hierarchical levels. In this context the efficient model of food security is the result of the permanent dialogue between the representatives of the state government, business entities, social organizations and scientific institutions. The article justifies the fact that the model of innovation development, known as ‘the triple helix model’ should be applied at the modern stage of economic development as an efficient tool for the food security provision, which can be implemented in the activity of regional economic entities and the whole economic system of the Russian Federation.

  16. Water Security, Climate Forcings and Public Health Impacts in Emerging Regions

    Science.gov (United States)

    Serman, E. A.; Akanda, A. S.; Craver, V.; Boving, T. B.

    2014-12-01

    Our world is rapidly urbanizing, with more than 80% of world's population is expected to be living in a city by the end of the century. A majority of these nations are rapidly urbanizing due to massive rural-to-urban migratory trends, with rapid development of unplanned urban settlements, or slums, with lack of adequate water or sanitation facilities and other municipal amenities. With global environmental change, natural disasters will expose millions more to drought, floods, and disease epidemics, and existing vulnerabilities will worsen. At the same time, rapid urbanization and fast changing land-use leads to widespread damage of infrastructure by stormwater, especially in lowlands and economically poor areas. The factor that consistently stands out among different cities from both the developed and the developing worlds is that the slums are typically the most vulnerable to water related natural hazards and climatic threats, such as water scarcity and quality issues in drought conditions, or water and sanitation breakdown and stormwater contamination problems. Onsite or decentralized water, wastewater and stormwater treatment as well as point-of-use water treatment options can be an economic, safe, and reliable alternative to conventional large-scale treatment especially, in urban fringes as well as rural areas. These systems can be designed to fit communities in terms of their economic, cultural, environmental, and demographic resources. As part of this study, we develop a database of urban water quality and quantity indices such as with urban land-use, water usage, climate, and socio-economic characteristics in various emerging regions in the world. We analyze past and current data to identify and quantify long-term trends and the impacts of large-scale climatic and anthropogenic changes on urban hydrology and health impacts. We specifically focus on five major cities from distinct groups of countries and geographies: Providence, RI, USA from the developed

  17. Automated secured cost effective key refreshing technique to enhance WiMAX privacy key management

    Science.gov (United States)

    Sridevi, B.; Sivaranjani, S.; Rajaram, S.

    2013-01-01

    In all walks of life the way of communication is transformed by the rapid growth of wireless communication and its pervasive use. A wireless network which is fixed and richer in bandwidth is specified as IEEE 802.16, promoted and launched by an industrial forum is termed as Worldwide Interoperability for Microwave Access (WiMAX). This technology enables seamless delivery of wireless broadband service for fixed and/or mobile users. The obscurity is the long delay which occurs during the handoff management in every network. Mobile WiMAX employs an authenticated key management protocol as a part of handoff management in which the Base Station (BS) controls the distribution of keying material to the Mobile Station (MS). The protocol employed is Privacy Key Management Version 2- Extensible Authentication Protocol (PKMV2-EAP) which is responsible for the normal and periodical authorization of MSs, reauthorization as well as key refreshing. Authorization key (AK) and Traffic Encryption key (TEK) plays a vital role in key exchange. When the lifetime of key expires, MS has to request for a new key to BS which in turn leads to repetition of authorization, authentication as well as key exchange. To avoid service interruption during reauthorization , two active keys are transmitted at the same time by BS to MS. The consequences of existing work are hefty amount of bandwidth utilization, time consumption and large storage. It is also endured by Man in the Middle attack and Impersonation due to lack of security in key exchange. This paper designs an automatic mutual refreshing of keys to minimize bandwidth utilization, key storage and time consumption by proposing Previous key and Iteration based Key Refreshing Function (PKIBKRF). By integrating PKIBKRF in key generation, the simulation results indicate that 21.8% of the bandwidth and storage of keys are reduced and PKMV2 mutual authentication time is reduced by 66.67%. The proposed work is simulated with Qualnet model and

  18. Fast-Valving of Large Steam Turbine Units as a Means of Power System Security Enhancement

    Directory of Open Access Journals (Sweden)

    Bogdan Sobczak

    2014-03-01

    Full Text Available Fast-valving assists in maintaining system stability following a severe transmission system fault by reducing the turbine mechanical power. Fast-valving consists in rapid closing and opening of steam valves in an adequate manner to reduce the generator accelerating power following the recognition of a severe fault. FV can be an effective and economical method of meeting the performance requirements of a power system in the presence of an increase in wind and solar generation in the power system, newly connected large thermal units and delaying of building new transmission lines. The principle of fast-valving and advantages of applying this technique in large steam turbine units was presented in the paper. Effectiveness of fast-valving in enhancing the stability of the Polish Power Grid was analyzed. The feasibility study of fast-valving application in the 560 MW unit in Kozienice Power Station (EW SA was discussed.

  19. How Academies use science to enhance global security and well-being.

    Science.gov (United States)

    Boright, John

    2017-01-01

    Science academies were originally created to facilitate science communication and later to recognize excellence. But in the last 20 years some 150 academies of science, engineering,and medicine around the world have united to cooperate in contributing to human welfare, by: 1. Providing evidence-based inputs to national, regional, and global policies addressing human needs, and 2. Conducting cooperative programs to increase the capacity of academies to provide such advice, and to better connect academies to publics and to policy makers. Examples: At the global level, 112 academies of science produce brief common statements on major global issues. They have also created an organization to provide in-depth reports on major issues such as a transition to sustainable energy systems, boosting agricultural productivity in Africa, and a guide to responsible conduct in the global research enterprise. Regional networks of those academies, in Africa, the Americas, Asia, and Europe conduct program on topics such as water, energy, engagement of women in science, and science education. They also help and mentor new academies.

  20. Efficient Hybrid Watermarking Scheme for Security and Transmission Bit Rate Enhancement of 3D Color-Plus-Depth Video Communication

    Science.gov (United States)

    El-Shafai, W.; El-Rabaie, S.; El-Halawany, M.; Abd El-Samie, F. E.

    2018-03-01

    Three-Dimensional Video-plus-Depth (3DV + D) comprises diverse video streams captured by different cameras around an object. Therefore, there is a great need to fulfill efficient compression to transmit and store the 3DV + D content in compressed form to attain future resource bounds whilst preserving a decisive reception quality. Also, the security of the transmitted 3DV + D is a critical issue for protecting its copyright content. This paper proposes an efficient hybrid watermarking scheme for securing the 3DV + D transmission, which is the homomorphic transform based Singular Value Decomposition (SVD) in Discrete Wavelet Transform (DWT) domain. The objective of the proposed watermarking scheme is to increase the immunity of the watermarked 3DV + D to attacks and achieve adequate perceptual quality. Moreover, the proposed watermarking scheme reduces the transmission-bandwidth requirements for transmitting the color-plus-depth 3DV over limited-bandwidth wireless networks through embedding the depth frames into the color frames of the transmitted 3DV + D. Thus, it saves the transmission bit rate and subsequently it enhances the channel bandwidth-efficiency. The performance of the proposed watermarking scheme is compared with those of the state-of-the-art hybrid watermarking schemes. The comparisons depend on both the subjective visual results and the objective results; the Peak Signal-to-Noise Ratio (PSNR) of the watermarked frames and the Normalized Correlation (NC) of the extracted watermark frames. Extensive simulation results on standard 3DV + D sequences have been conducted in the presence of attacks. The obtained results confirm that the proposed hybrid watermarking scheme is robust in the presence of attacks. It achieves not only very good perceptual quality with appreciated PSNR values and saving in the transmission bit rate, but also high correlation coefficient values in the presence of attacks compared to the existing hybrid watermarking schemes.

  1. Enhancing the cyber-security of smart grids with applications to synchrophasor data

    Science.gov (United States)

    Pal, Seemita

    In the power grids, Supervisory Control and Data Acquisition (SCADA) systems are used as part of the Energy Management System (EMS) for enabling grid monitoring, control and protection. In recent times, with the ongoing installation of thousands of Phasor Measurement Units (PMUs), system operators are becoming increasingly reliant on PMU-generated synchrophasor measurements for executing wide-area monitoring and real-time control. The availability of PMU data facilitates dynamic state estimation of the system, thus improving the efficiency and resiliency of the grid. Since the SCADA and PMU data are used to make critical control decisions including actuation of physical systems, the timely availability and integrity of this networked data is of paramount importance. Absence or wrong control actions can potentially lead to disruption of operations, monetary loss, damage to equipments or surroundings or even blackout. This has posed new challenges to information security especially in this age of ever-increasing cyber-attacks. In this thesis, potential cyber-attacks on smart grids are presented and effective and implementable schemes are proposed for detecting them. The focus is mainly on three kinds of cyber-attacks and their detection: (i) gray-hole attacks on synchrophasor systems, (ii) PMU data manipulation attacks and (iii) data integrity attacks on SCADA systems. In the case of gray-hole attacks, also known as packet-drop attacks, the adversary may arbitrarily drop PMU data packets as they traverse the network, resulting in unavailability of time-sensitive data for the various critical power system applications. The fundamental challenge is to distinguish packets dropped by the adversary from those that occur naturally due to network congestion.The proposed gray-hole attack detection technique is based on exploiting the inherent timing information in the GPS time-stamped PMU data packets and using the temporal trends of the latencies to classify the cause of

  2. Enhancement of bone shadow region using local phase-based ultrasound transmission maps.

    Science.gov (United States)

    Hacihaliloglu, Ilker

    2017-06-01

    Ultrasound is increasingly being employed in different orthopedic procedures as an imaging modality for real-time guidance. Nevertheless, low signal-to-noise-ratio and different imaging artifacts continue to hamper the success of ultrasound-based procedures. Bone shadow region is an important feature indicating the presence of bone/tissue interface in the acquired ultrasound data. Enhancement and automatic detection of this region could improve the sensitivity of ultrasound for imaging bone and result in improved guidance for various orthopedic procedures. In this work, a method is introduced for the enhancement of bone shadow regions from B-mode ultrasound data. The method is based on the combination of three different image phase features: local phase tensor, local weighted mean phase angle, and local phase energy. The combined local phase image features are used as an input to an [Formula: see text] norm-based contextual regularization method which emphasizes uncertainty in the shadow regions. The enhanced bone shadow images are automatically segmented and compared against expert segmentation. Qualitative and quantitative validation was performed on 100 in vivo US scans obtained from five subjects by scanning femur and vertebrae bones. Validation against expert segmentation achieved a mean dice similarity coefficient of 0.88. The encouraging results obtained in this initial study suggest that the proposed method is promising enough for further evaluation. The calculated bone shadow maps could be incorporated into different ultrasound bone segmentation and registration approaches as an additional feature.

  3. Development of transport mechanical engineering as the condition of maintenance of social and economic security of region

    Directory of Open Access Journals (Sweden)

    Vsevolod Petrovich Babushkin

    2012-12-01

    Full Text Available In the article, the transport role in the decision of problems of innovative and scientifically-technological development of territory is defined. Dependence of quality, completeness and timeliness of granting of transport services on replenishment and updating of park of locomotives, cars, i.e. from a level of development of domestic transport mechanical engineering is shown. The basic problems of development given branches –low competitiveness of made production are revealed. The basic accent in the course of such analysis is made on research of competitive possibilities of the enterprises of railway mechanical engineering of Sverdlovsk area. Such enterprises play the increasing role, become points of development of region’s economy and maintenance of its social and economic safety. The cooperation communications, which have developed in an industrial complex of Sverdlovsk area on the basis of development of modern manufacture on building of electric locomotives, have allowed to generate in region cluster railway mechanical engineering. The structure cluster is shown, development prospects, the estimation of its influence on the economy of Sverdlovsk area and maintenance of its social and economic security is given

  4. Determining the Potential Role of Regional Stress on Preferential Flow and Transport at Pahute Mesa, Nevada National Security Site

    Science.gov (United States)

    Reeves, D. M.; Smith, K. D.; Parashar, R.; Kevin, H. M.

    2016-12-01

    Pahute Mesa is a structurally complex region on the Nevada National Security Site consisting of multiple calderas and faults associated with Basin and Range tectonics. Ground water flows primarily through fractured volcanic rocks in a northeast to southwest direction. Kilometer-scale tritium and plutonium migration from the Benham underground test suggests ground water velocities on the order of 50 m/yr. Regional stress may exert considerable control on the hydraulic properties of large faults and smaller fractures at Pahute Mesa. In-situ measurements of the stress field are sparse, and short period earthquake focal mechanisms are used in this study to delineate principal horizontal stress orientations. Overall, event depths and short period mechanisms in the Pahute Mesa area are often poorly constrained. Stress field inversion solutions from the earthquake focal mechanism data indicate that Pahute Mesa is within a transtensional faulting regime with a maximum horizontal stress direction ranging from N29°E to N63°E with an average of N42°E. This maximum horizontal stress trend is supported by breakout data from large diameter boreholes. A computer code that incorporates stress field inversion solutions is used to compute dilation and slip tendency metrics for digitized fault and caldera structural margin segments according to both average and space-varying horizontal stress directions. Faults with the highest dilation trend NE-SW for both average and space-varying stress field solutions, and are lowest for NW-SE structures. The distribution of slip tendency is similar with maximum values below that required for a critically stressed designation. This implies that the resolution of normal stress acting on fault planes in Pahute Mesa may play a larger role on fault permeability than shear stress within the modern stress field. Inflow locations along boreholes and a series of large-scale aquifer tests are currently being analyzed to investigate potential

  5. Cold storage enhances the efficacy and margin of security in postharvest irradiation treatments against fruit flies (Diptera: Tephritidae).

    Science.gov (United States)

    Follett, Peter A; Snook, Kirsten

    2013-10-01

    Cold storage is used to preserve fruit quality after harvest during transportation in marketing channels. Low temperature can be a stressor for insects that reduces survivorship, and cold storage may contribute to the efficacy of postharvest quarantine treatments such as irradiation against quarantine insect pests. The combined effect of irradiation and cold storage was examined in a radiation-tolerant fruit fly, Bactrocera cucurbitae Coquillet (melon fly), and a radiation-intolerant fruit fly, Ceratitis capitata (Wiedemann) (Mediterranean fruit fly) (Diptera: Tephritidae). Third instars on diet or in papaya were treated with a sublethal radiation dose of 30 Gy and stored at 4 or 11 degrees C for 3-13 d and held for adult emergence. For both fruit fly species, survival of third instars to the adult stage generally decreased with increasing cold storage duration at 4 or 11 degrees C in diet or papaya. Survivorship differences were highly significant for the effects of substrate (diet > papaya), temperature (11 > 4 degrees C),and irradiation (0 > 30 Gy). Few Mediterranean fruit flies survived in any cold storage treatment after receiving a radiation dose of 30 Gy. No melon fly larvae survived to the adult stage after irradiation and 11 d cold storage at 4 or 11 degrees C in papayas. Cold storage enhances the efficacy and widens the margin of security in postharvest irradiation treatments. Potentially irradiation and cold storage can be used in combination to reduce the irradiation exposure requirements of quarantine treatments.

  6. Weaving Indigenous Agricultural Knowledge with Formal Education to Enhance Community Food Security: School Competition as a Pedagogical Space in Rural Anchetty, India

    Science.gov (United States)

    Shukla, Shailesh; Barkman, Janna; Patel, Kirit

    2017-01-01

    Like many socially and economically disadvantaged farming communities around the world, the Anchetty region of Tamil Nadu, India, has been experiencing serious food security challenges mainly due to the loss of traditional foods such as small millets and associated crops (SMAC) and associated indigenous agricultural knowledge (IAK). Drawing on…

  7. Bat Accelerated Regions Identify a Bat Forelimb Specific Enhancer in the HoxD Locus.

    Directory of Open Access Journals (Sweden)

    Betty M Booker

    2016-03-01

    Full Text Available The molecular events leading to the development of the bat wing remain largely unknown, and are thought to be caused, in part, by changes in gene expression during limb development. These expression changes could be instigated by variations in gene regulatory enhancers. Here, we used a comparative genomics approach to identify regions that evolved rapidly in the bat ancestor, but are highly conserved in other vertebrates. We discovered 166 bat accelerated regions (BARs that overlap H3K27ac and p300 ChIP-seq peaks in developing mouse limbs. Using a mouse enhancer assay, we show that five Myotis lucifugus BARs drive gene expression in the developing mouse limb, with the majority showing differential enhancer activity compared to the mouse orthologous BAR sequences. These include BAR116, which is located telomeric to the HoxD cluster and had robust forelimb expression for the M. lucifugus sequence and no activity for the mouse sequence at embryonic day 12.5. Developing limb expression analysis of Hoxd10-Hoxd13 in Miniopterus natalensis bats showed a high-forelimb weak-hindlimb expression for Hoxd10-Hoxd11, similar to the expression trend observed for M. lucifugus BAR116 in mice, suggesting that it could be involved in the regulation of the bat HoxD complex. Combined, our results highlight novel regulatory regions that could be instrumental for the morphological differences leading to the development of the bat wing.

  8. Enhanced Performance of Brain Tumor Classification via Tumor Region Augmentation and Partition.

    Directory of Open Access Journals (Sweden)

    Jun Cheng

    Full Text Available Automatic classification of tissue types of region of interest (ROI plays an important role in computer-aided diagnosis. In the current study, we focus on the classification of three types of brain tumors (i.e., meningioma, glioma, and pituitary tumor in T1-weighted contrast-enhanced MRI (CE-MRI images. Spatial pyramid matching (SPM, which splits the image into increasingly fine rectangular subregions and computes histograms of local features from each subregion, exhibits excellent results for natural scene classification. However, this approach is not applicable for brain tumors, because of the great variations in tumor shape and size. In this paper, we propose a method to enhance the classification performance. First, the augmented tumor region via image dilation is used as the ROI instead of the original tumor region because tumor surrounding tissues can also offer important clues for tumor types. Second, the augmented tumor region is split into increasingly fine ring-form subregions. We evaluate the efficacy of the proposed method on a large dataset with three feature extraction methods, namely, intensity histogram, gray level co-occurrence matrix (GLCM, and bag-of-words (BoW model. Compared with using tumor region as ROI, using augmented tumor region as ROI improves the accuracies to 82.31% from 71.39%, 84.75% from 78.18%, and 88.19% from 83.54% for intensity histogram, GLCM, and BoW model, respectively. In addition to region augmentation, ring-form partition can further improve the accuracies up to 87.54%, 89.72%, and 91.28%. These experimental results demonstrate that the proposed method is feasible and effective for the classification of brain tumors in T1-weighted CE-MRI.

  9. PMSE strength during enhanced D region electron densities: Faraday rotation and absorption effects at VHF frequencies

    Science.gov (United States)

    Chau, Jorge L.; Röttger, Jürgen; Rapp, Markus

    2014-10-01

    In this paper we study the effects of absorption and Faraday rotation on measurements of polar mesosphere summer echoes (PMSE). We found that such effects can produce significant reduction of signal-to-noise ratio (SNR) when the D region electron densities (Ne) are enhanced, and VHF radar systems with linearly polarized antennas are used. In particular we study the expected effects during the strong solar proton event (SPE) of July 2000, also known as the Bastille day flare event. During this event, a strong anti-correlation between the PMSE SNR and the D-region Ne was found over three VHF radar sites at high latitudes: Andøya, Kiruna, and Svalbard. This anti-correlation has been explained (a) in terms of transport effects due to strong electric fields associated to the SPE and (b) due to a limited amount of aerosol particles as compared to the amount of D-region electrons. Our calculations using the Ne profiles used by previous researchers explain most, if not all, of the observed SNR reduction in both time (around the SPE peak) and altitude. This systematic effect, particularly the Faraday rotation, should be recognized and tested, and possibly avoided (e.g., using circular polarization), in future observations during the incoming solar maximum period, to contribute to the understanding of PMSE during enhanced D region Ne.

  10. A promising limited angular computed tomography reconstruction via segmentation based regional enhancement and total variation minimization

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Wenkun; Zhang, Hanming; Li, Lei; Wang, Linyuan; Cai, Ailong; Li, Zhongguo; Yan, Bin, E-mail: ybspace@hotmail.com [National Digital Switching System Engineering and Technological Research Center, Zhengzhou, Henan 450002 (China)

    2016-08-15

    X-ray computed tomography (CT) is a powerful and common inspection technique used for the industrial non-destructive testing. However, large-sized and heavily absorbing objects cause the formation of artifacts because of either the lack of specimen penetration in specific directions or the acquisition of data from only a limited angular range of views. Although the sparse optimization-based methods, such as the total variation (TV) minimization method, can suppress artifacts to some extent, reconstructing the images such that they converge to accurate values remains difficult because of the deficiency in continuous angular data and inconsistency in the projections. To address this problem, we use the idea of regional enhancement of the true values and suppression of the illusory artifacts outside the region to develop an efficient iterative algorithm. This algorithm is based on the combination of regional enhancement of the true values and TV minimization for the limited angular reconstruction. In this algorithm, the segmentation approach is introduced to distinguish the regions of different image knowledge and generate the support mask of the image. A new regularization term, which contains the support knowledge to enhance the true values of the image, is incorporated into the objective function. Then, the proposed optimization model is solved by variable splitting and the alternating direction method efficiently. A compensation approach is also designed to extract useful information from the initial projections and thus reduce false segmentation result and correct the segmentation support and the segmented image. The results obtained from comparing both simulation studies and real CT data set reconstructions indicate that the proposed algorithm generates a more accurate image than do the other reconstruction methods. The experimental results show that this algorithm can produce high-quality reconstructed images for the limited angular reconstruction and suppress

  11. Securing health through food systems: an initiative of the nutrition consortium of the National Health Research Institutes in Taiwan and Asia Pacific regional partners as a network.

    Science.gov (United States)

    Wahlqvist, Mark L; Kuo, Ken N

    2009-01-01

    There are growing concerns about the health impacts of climate change with ecosystem degradation and global warming, finite reserves of non-renewable energy, water shortages in food-producing regions, limits to contemporary agriculture with its dependence on exhaustible petrochemical nitrogen and rock phosphate fertilizers, and failure of the global financial system. To date, health security has meant attention to safe environments especially water, sanitation and waste disposal; and access to health care and its affordability. Its dependency on food security (safety, sufficiency, sustainability, and satisfaction which requires diversity and quality) has been under-estimated because the current and imminent risks have increased and extended to more populations, because these may be less tractable and because the nature, extent and dynamics of nutritionally-related health are better appreciated. As a step towards more collaborative food and health systems, the National Health Research Institutes in Taiwan has created an interdisciplinary Nutrition Consortium (NC) with research and policy agendas. The NC held a food in Health Security (FIHS) in the Asia Pacific region roundtable in conjunction with the World Vegetable Center based in Tainan, supported by the National Science Council and Academia Sinica in Taiwan and the Australian Academies of Science and of Science Technology and Engineering, August 2-5th 2009 in Taiwan. A FIHS Network is being established to further the initiative. It should form part of the broader Human Security agenda.

  12. Do performance and image enhancing drug users in regional Queensland experience difficulty accessing health services?

    Science.gov (United States)

    Dunn, Matthew; Henshaw, Richard; McKay, Fiona H

    2016-07-01

    To understand health service access and needs of people who use performance and image enhancing drugs (PIED) in regional Queensland. Semi-structured interviews were conducted with 21 people (n = 19 men) who reported the use of a range of PIEDs, including anabolic-androgenic steroids, human chorionic gonadotropin, growth hormone, clenbuterol, tamoxifen, insulin and peptides. Participants reported accessing a range of services, including needle and syringe programs and pharmacies, for sterile injecting equipment. While PIEDs users attributed some stigma to needle and syringe programs, they were seen as an important service for injecting equipment. Participants reported receiving either positive care from health-care providers, such as general practitioners (GP), or having negative experiences due to the stigma attached with PIED use. Few participants reported disclosing their PIED use to their GP not only because of the concerns that their GP would no longer see them but also because they felt their GP was not knowledgeable about these substances. Participants in the study reported no difficulty in accessing health services based on living in a regional area, with their concern focused more upon how they were viewed and treated by service staff. [Dunn M, Henshaw R, Mckay F. H. Do performance and image enhancing drug users in regional Queensland experience difficulty accessing health services? Drug Alcohol Rev 2016;35:377-382]. © 2015 Australasian Professional Society on Alcohol and other Drugs.

  13. First observation of low-energy {\\gamma}-ray enhancement in the rare-earth region

    CERN Document Server

    Simon, A; Larsen, A C; Beausang, C W; Humby, P; Burke, J T; Casperson, R J; Hughes, R O; Ross, T J; Allmond, J M; Chyzh, R; Dag, M; Koglin, J; McCleskey, E; McCleskey, M; Ota, S; Saastamoinen, A

    2016-01-01

    The {\\gamma}-ray strength function and level density in the quasi-continuum of 151,153Sm have been measured using BGO shielded Ge clover detectors of the STARLiTeR system. The Compton shields allow for an extraction of the {\\gamma} strength down to unprecedentedly low {\\gamma} energies of about 500 keV. For the first time an enhanced low- energy {\\gamma}-ray strength has been observed in the rare-earth region. In addition, for the first time both the upbend and the well known scissors resonance have been observed simultaneously for the same nucleus. Hauser-Feshbach calculations show that this strength enhancement at low {\\gamma} energies could have an impact of 2-3 orders of magnitude on the (n,{\\gamma}) reaction rates for the r-process nucleosynthesis.

  14. Transboundary Collaborations to Enhance Wildfire Suppression in Protected Areas of the Black Sea Region

    Directory of Open Access Journals (Sweden)

    G. N. Zaimes

    2016-05-01

    Full Text Available For the most effective and efficient management of certain natural resources (e.g. protected areas and disasters (e.g. wildfires transboundary approaches are needed. In addition in the management of protected areas, the role of wildfire should be incorporated, something that was ignored in the past and led to catastrophic wildfires. The Black Sea is a region that wildfires in the protected areas are expected to increase. This has to do with the abandonment of rural areas and the higher temperatures, especially during summer, due to climate change. Interesting is also the fact that some countries of the region have extensive experience while other do not have neither the experience nor the necessary infrastructures to face large wildfires. A transboundary collaboration would be very beneficial to the countries with limited experiences and capacities to suppress wildfires. The objective of this study is to be proactive by developing innovative tools to help suppress wildfires and enhancing the knowledge on wildfires and protected areas. The innovative tools included 4 different research activities and products. Firstly, an online Digital Geodatabase for the six pilot areas was developed. Next forest fire fuels and maps were developed while a forest fire behavior model was run to create the overall fire risk maps for the pilot areas. To estimate water resources and watershed streamflows the hydrologic model SWAT was validated and calibrated for the pilot areas. The final activities included a multi-criteria decision analysis to select the optimal location of the water reservoirs and the use of spatial analyst to provide the optimal routes to reach reservoirs by the fire vehicles. To enhance the responsible agency personnel along with stakeholders knowledge of the region, a Neighborhood Network with regular quarterly meetings was established. Participants for all six project countries were present in the meetings. Overall, new tool that will enhance

  15. Dynamic model of minimax control over economic security state of the region in the presence of risks

    Directory of Open Access Journals (Sweden)

    Andrey Fedorovich Shorikov

    2012-06-01

    Full Text Available Investigation and solution of management of economic security state in the region (MESSR requires development of a dynamic economic-mathematical model that takes into account the presence of control actions, uncontrolled parameters (risk modeling errors, etc. and availability of information deficit. At the same time, the existing approaches to solving such problems are based primarily on static models and the use of stochastic modeling of the device, which is required for the application of knowledge of the probability characteristics of the main model parameters and special conditions for the realization of the process. We should note that to use the apparatus of stochastic modeling, very strict conditions are required, which in practice are usually not feasible in advance In this paper, we propose to use a deterministic approach for modeling and solving the original problem in the form of a dynamic programming problem of minimax control (optimization of a guaranteed result MESSR at the determined point of time, taking into account the availability of risks of deterministic and stochastic nature (combined risks model. At thesametime, under therisks in thesocial and economic system we understand thefactors that negatively catastrophically affect the results of the reviewed processes inside it. For an effective use, a technique of prediction and assessment of time rows and stochastic risks in MESSR optimization process is presented, which can serve as a basis for the development of appropriate computer software. To solve the problem of program minimax control MESSR in the presence of risks, we propose a method which is reduced to the realization of a finite number of solutions of linear and convex mathematical programming and discrete optimization problem. The proposed method makes it possible to develop efficient numerical procedures to implement computer simulation of the dynamics of the problem, build program minimax control and gain optimal

  16. Cocaine abstinence following chronic treatment alters cerebral metabolism in dopaminergic reward regions. Bromocriptine enhances recovery

    Energy Technology Data Exchange (ETDEWEB)

    Clow, D.W.; Hammer, R.P. Jr. (Univ. of Hawaii School of Medicine, Honolulu (USA))

    1991-01-01

    2-(14C)deoxyglucose autoradiography was used to determine local cerebral glucose utilization (lCGU) in rats following chronic cocaine treatment and subsequent abstinence. lCGU was examined in 43 discrete brain regions in animals which had received daily injections of cocaine for 14 days (10 mg/kg) followed by 3 days of saline or bromocriptine (10 mg/kg) treatment. Cocaine abstinence following chronic treatment significantly reduced lCGU in several regions including mesocorticolimbic structures such as ventral tegmental area, medial prefrontal cortex, and nucleus accumbens (NAc). Within the NAc, however, only the rostral pole showed significant reduction. In contrast, when bromocriptine treatment accompanied abstinence, lCGU was no longer reduced in mesocorticolimbic and most other regions, implying that metabolic recovery was enhanced by bromocriptine treatment during early abstinence following chronic cocaine treatment. These data suggest that cerebral metabolism is decreased during cocaine abstinence following chronic treatment in critical brain regions, and that this alteration can be prevented by treatment with direct-acting dopamine agonists such as bromocriptine.

  17. Transition region of TEC enhancement phenomena during geomagnetically disturbed periods at mid-latitudes

    Directory of Open Access Journals (Sweden)

    K. Unnikrishnan

    2005-12-01

    Full Text Available Large-scale TEC perturbations/enhancements observed during the day sectors of major storm periods, 12-13 February 2000, 23 September 1999, 29 October 2003, and 21 November 2003, were studied using a high resolution GPS network over Japan. TEC enhancements described in the present study have large magnitudes (≥25×1016 electrons/m2 compared to the quiet-time values and long periods (≥120 min. The sequential manner of development and the propagation of these perturbations show that they are initiated at the northern region and propagate towards the southern region of Japan, with velocities >350 m/s. On 12 February 2000, remarkably high values of TEC and background content are observed at the southern region, compared to the north, because of the poleward expansion of the equatorial anomaly crest, which is characterized by strong latitudinal gradients near 35° N (26° N geomagnetically. When the TEC enhancements, initiating at the north, propagate through the region 39-34° N (30-25° N geomagnetically, they undergo transitions characterized by a severe decrease in amplitude of TEC enhancements. This may be due to their interaction with the higher background content of the expanded anomaly crest. However, at the low-latitude region, below 34° N, an increase in TEC is manifested as an enhanced ionization pattern (EIP. This could be due to the prompt penetration of the eastward electric field, which is evident from high values of the southward Interplanetary Magnetic Field component (IMF Bz and AE index. The TEC perturbations observed on the other storm days also exhibit similar transitions, characterized by a decreasing magnitude of the perturbation component, at the region around 39-34° N. In addition to this, on the other storm days, at the low-latitude region, below 34° N, an increase in TEC (EIP feature also indicates the repeatability of the above scenario. It is found that, the latitude and time at which the decrease in magnitude

  18. Transition region of TEC enhancement phenomena during geomagnetically disturbed periods at mid-latitudes

    Directory of Open Access Journals (Sweden)

    K. Unnikrishnan

    2005-12-01

    Full Text Available Large-scale TEC perturbations/enhancements observed during the day sectors of major storm periods, 12-13 February 2000, 23 September 1999, 29 October 2003, and 21 November 2003, were studied using a high resolution GPS network over Japan. TEC enhancements described in the present study have large magnitudes (≥25×1016 electrons/m2 compared to the quiet-time values and long periods (≥120 min. The sequential manner of development and the propagation of these perturbations show that they are initiated at the northern region and propagate towards the southern region of Japan, with velocities >350 m/s. On 12 February 2000, remarkably high values of TEC and background content are observed at the southern region, compared to the north, because of the poleward expansion of the equatorial anomaly crest, which is characterized by strong latitudinal gradients near 35° N (26° N geomagnetically. When the TEC enhancements, initiating at the north, propagate through the region 39-34° N (30-25° N geomagnetically, they undergo transitions characterized by a severe decrease in amplitude of TEC enhancements. This may be due to their interaction with the higher background content of the expanded anomaly crest. However, at the low-latitude region, below 34° N, an increase in TEC is manifested as an enhanced ionization pattern (EIP. This could be due to the prompt penetration of the eastward electric field, which is evident from high values of the southward Interplanetary Magnetic Field component (IMF Bz and AE index. The TEC perturbations observed on the other storm days also exhibit similar transitions, characterized by a decreasing magnitude of the perturbation component, at the region around 39-34° N. In addition to this, on the other storm days, at the low-latitude region, below 34° N, an increase in TEC (EIP feature also indicates the repeatability of the above scenario. It is found that, the latitude and

  19. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  20. Investment Processes in the Industrial Region: Current Status and Prospects of Enhancing

    Directory of Open Access Journals (Sweden)

    Kumaneeva Mariya Konstantinovna

    2014-12-01

    Full Text Available The trends and direction of investment processes are the most important features of regional development. In modern conditions we observe the grave shortage of investment resources in the priority areas of industrialization. Despite the overall increase of investment volume, the investments in the production of high-tech products which have key value for the acceleration of industrialization continue to decline steadily. This process reveals itself urgently in the industrial regions of Russia. According to expert estimates, about two-thirds of investment savings are spent on the development of the mining sector. Under these conditions, the degradation of industrial structure is enhanced, the “scattering” of investment resources takes place as well as the increase of deficit in the industries which are the most priority and perspective for the development of the country. Therefore, the study of the efficiency of investment processes in the industrial region, as well as the existing models of investing in fixed assets represents an urgent task. The article describes the groups of economic sectors in Kemerovo region in terms of investments efficiency and the type of their financing. The results of the research showed that the nominal increase in the investments flow into the region’s economy does not always lead to a real investment increase. Otherwise speaking, under the inflationary pressures we can observe the actual effect of different scale for different sectors of regional economy. The author reveals that the lowest efficiency of investment in fixed assets is typical for the sectors of Kemerovo region’s economy, where the investment activity is determined by the existing public and regional policy. The articles contains the directions of investment processes intensification for the sectors of the Kemerovo region’s economy, taking into account the strategic development priorities and revealed efficiency of investments in fixed assets.

  1. Generating WS-SecurityPolicy documents via security model transformation

    DEFF Research Database (Denmark)

    Jensen, Meiko

    2009-01-01

    When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable security definition compared to manually crafting the security realizations afterwards. In this paper, we outline an appropriate...... security model definition and transformation approach, targeting the WS-SecurityPolicy and WS-BPEL specifications, in order to enable a Web-Service-based secure business process development....

  2. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  3. Food for Work Program and its Implications on Food Security: A Critical Review with a Practical Example from the Amhara Region, Ethiopia

    Directory of Open Access Journals (Sweden)

    Ashenafi Gedamu

    2006-10-01

    Full Text Available A systematic evaluation of food-for-work (FFW programs in Ethiopia is seriously lacking. Most of the few available reports indicate that these programs have reached very few achievements in terms of food security and reduction of poverty at large. As expressed by Holden et al. (2005, FFW programs are commonly aimed to produce or maintain potentially valuable public goods necessary to stimulate productivity and thus income growth. Natural resources management, like rural road construction, erosion control and afforestation of degraded lands can be mentioned as valuable measures which could stimulate productivity and agricultural growth. The poverty reduction and food security impact of food or cash for work activities are larger if they offer not only seasonal job opportunities to the rural community but also long term employment possibilities. This is more likely if the projects are regionally dispersed and combined with basic education. In the Ethiopian context, it was always questionable if the continuous boom in food aid (regardless of cash or food for work purposes was the solution for the long standing food insecurity and poverty crises in the country. The study discusses the efficiency of FFW programs that aimed to reduce rural poverty and ensure food security on the one hand, and the impact of the food aid on resource and time allocation of the participating households for own food production on the other. The study is based on a field research conducted at a FFW program project, in the Amhara region, Ethiopia run by the German Agency for Technical Cooperation (GTZ with the view of improving food security in the Amhara region, Ethiopia. A household theoretical model is used to analyze the sample data, whether FFW program may indeed reduce household food insecurity and/or has some crowding-out effects on labour allocation of participating households for own field production.

  4. Organic matter and water addition enhance soil respiration in an arid region.

    Directory of Open Access Journals (Sweden)

    Liming Lai

    Full Text Available Climate change is generally predicted to increase net primary production, which could lead to additional C input to soil. In arid central Asia, precipitation has increased and is predicted to increase further. To assess the combined effects of these changes on soil CO2 efflux in arid land, a two factorial manipulation experiment in the shrubland of an arid region in northwest China was conducted. The experiment used a nested design with fresh organic matter and water as the two controlled parameters. It was found that both fresh organic matter and water enhanced soil respiration, and there was a synergistic effect of these two treatments on soil respiration increase. Water addition not only enhanced soil C emission, but also regulated soil C sequestration by fresh organic matter addition. The results indicated that the soil CO2 flux of the shrubland is likely to increase with climate change, and precipitation played a dominant role in regulating soil C balance in the shrubland of an arid region.

  5. Geodiversity action plans for the enhancement of geoheritage in the Piemonte region (north-western Italy

    Directory of Open Access Journals (Sweden)

    Elena Ferrero

    2012-07-01

    Full Text Available A geoethical approach to geodiversity allows better understanding of the value of abiotic nature and enhances its conservation and development. Our basic assumption is that even during an economical crisis, geoheritage sites can serve both public and private interests. A set of nine strategic geothematic areas were chosen to represent the geodiversity of the Piemonte region, north-western Italy, each of which is characterized by great potential for scientific studies, enhancement of public understanding of science, recreational activities, and economic support to the local communities. Specialized research teams individuated critical aspects to advance our knowledge of the geological history of the Piemonte region, through climate and environmental changes, natural hazards, soil processes, and georesources. The scientific concepts and techniques were coupled with geodiffusion actions and products: not only geosites, but also museum collections, evidence of mining and quarrying activities, science exhibitions, and nature trails. The preliminary results have allowed action plans to be developed with local partners, to assess the geoheritage management requirements. A series of investigations were carried out to improve the visual representation of the geological processes and the evolutionary scenarios. Further outcomes of the project will include didactic tools for educators, schools, and the public in general.

  6. The image enhancement and region of interest extraction of lobster-eye X-ray dangerous material inspection system

    Science.gov (United States)

    Zhan, Qi; Wang, Xin; Mu, Baozhong; Xu, Jie; Xie, Qing; Li, Yaran; Chen, Yifan; He, Yanan

    2016-10-01

    Dangerous materials inspection is an important technique to confirm dangerous materials crimes. It has significant impact on the prohibition of dangerous materials-related crimes and the spread of dangerous materials. Lobster-Eye Optical Imaging System is a kind of dangerous materials detection device which mainly takes advantage of backscatter X-ray. The strength of the system is its applicability to access only one side of an object, and to detect dangerous materials without disturbing the surroundings of the target material. The device uses Compton scattered x-rays to create computerized outlines of suspected objects during security detection process. Due to the grid structure of the bionic object glass, which imitate the eye of a lobster, grids contribute to the main image noise during the imaging process. At the same time, when used to inspect structured or dense materials, the image is plagued by superposition artifacts and limited by attenuation and noise. With the goal of achieving high quality images which could be used for dangerous materials detection and further analysis, we developed effective image process methods applied to the system. The first aspect of the image process is the denoising and enhancing edge contrast process, during the process, we apply deconvolution algorithm to remove the grids and other noises. After image processing, we achieve high signal-to-noise ratio image. The second part is to reconstruct image from low dose X-ray exposure condition. We developed a kind of interpolation method to achieve the goal. The last aspect is the region of interest (ROI) extraction process, which could be used to help identifying dangerous materials mixed with complex backgrounds. The methods demonstrated in the paper have the potential to improve the sensitivity and quality of x-ray backscatter system imaging.

  7. Naturally enhanced ion-line spectra around the equatorial 150-km region

    Directory of Open Access Journals (Sweden)

    J. L. Chau

    2009-03-01

    Full Text Available For many years strong radar echoes coming from 140–170 km altitudes at low latitudes have been associated to the existence of field-aligned irregularities (FAIs (the so called 150-km echoes. In this work, we present frequency spectra as well as angular distribution of 150-km echoes. When the 150-km region is observed with beams perpendicular to the magnetic field (B the observed radar spectra are very narrow with spectral widths between 3–12 m/s. On the other hand, when few-degrees off-perpendicular beams are used, the radar spectra are wide with spectral widths comparable to those expected from ion-acoustic waves at these altitudes (>1000 m/s. Moreover the off-perpendicular spectral width increases with increasing altitude. The strength of the received echoes is one to two orders of magnitude stronger than the expected level of waves in thermal equilibrium at these altitudes. Such enhancement is not due to an increase in electron density. Except for the enhancement in power, the spectra characteristics of off-perpendicular and perpendicular echoes are in reasonable agreement with expected incoherent scatter spectra at these angles and altitudes. 150-km echoes are usually observed in narrow layers (2 to 5. Bistatic common volume observations as well as observations made few kilometers apart show that, for most of the layers, there is very high correlation on power fluctuations without a noticeable time separation between simultaneous echoes observed with Off-perpendicular and Perpendicular beams. However, in one of the central layers, the echoes are the strongest in the perpendicular beam and absent or very weak in the off-perpendicular beams, suggesting that they are generated by a plasma instability. Our results indicate that most echoes around 150-km region are not as aspect sensitive as originally thought, and they come from waves that have been enhanced above waves in thermal equilibrium.

  8. IASI-derived NH3 enhancement ratios relative to CO for the tropical biomass burning regions

    Science.gov (United States)

    Whitburn, Simon; Van Damme, Martin; Clarisse, Lieven; Hurtmans, Daniel; Clerbaux, Cathy; Coheur, Pierre-François

    2017-10-01

    Vegetation fires are a major source of ammonia (NH3) in the atmosphere. Their emissions are mainly estimated using bottom-up approaches that rely on uncertain emission factors. In this study, we derive new biome-specific NH3 enhancement ratios relative to carbon monoxide (CO), ERNH3 / CO (directly related to the emission factors), from the measurements of the IASI sounder onboard the Metop-A satellite. This is achieved for large tropical regions and for an 8-year period (2008-2015). We find substantial differences in the ERNH3 / CO ratios between the biomes studied, with calculated values ranging from 7 × 10-3 to 23 × 10-3. For evergreen broadleaf forest these are typically 50-75 % higher than for woody savanna and savanna biomes. This variability is attributed to differences in fuel types and size and is in line with previous studies. The analysis of the spatial and temporal distribution of the ERNH3 / CO ratio also reveals a (sometimes large) within-biome variability. On a regional level, woody savanna shows, for example, a mean ERNH3 / CO ratio for the region of Africa south of the Equator that is 40-75 % lower than in the other five regions studied, probably reflecting regional differences in fuel type and burning conditions. The same variability is also observed on a yearly basis, with a peak in the ERNH3 / CO ratio observed for the year 2010 for all biomes. These results highlight the need for the development of dynamic emission factors that take into better account local variations in fuel type and fire conditions. We also compare the IASI-derived ERNH3 / CO ratio with values reported in the literature, usually calculated from ground-based or airborne measurements. We find general good agreement in the referenced ERNH3 / CO ratio except for cropland, for which the ERNH3 / CO ratio shows an underestimation of about 2-2.5 times.

  9. Satellite-Enhanced Regional Downscaling for Applied Studies: Extreme Precipitation Events in Southeastern South America

    Science.gov (United States)

    Nunes, A.; Gomes, G.; Ivanov, V. Y.

    2016-12-01

    Frequently found in southeastern South America during the warm season from October through May, strong and localized precipitation maxima are usually associated with the presence of mesoscale convective complexes (MCCs) travelling across the region. Flashfloods and landslides can be caused by these extremes in precipitation, with damages to the local communities. Heavily populated, southeastern South America hosts many agricultural activities and hydroelectric production. It encompasses one of the most important river basins in South America, the La Plata River Basin. Therefore, insufficient precipitation is equally prejudicial to the region socio-economic activities. MCCs are originated in the warm season of many regions of the world, however South American MCCs are related to the most severe thunderstorms, and have significantly contributed to the precipitation regime. We used the hourly outputs of Satellite-enhanced Regional Downscaling for Applied Studies (SRDAS), developed at the Federal University of Rio de Janeiro in Brazil, in the analysis of the dynamics and physical characteristics of MCCs in South America. SRDAS is the 25-km resolution downscaling of a global reanalysis available from January 1998 through December 2010. The Regional Spectral Model is the SRDAS atmospheric component and assimilates satellite-based precipitation estimates from the NOAA/Climate Prediction Center MORPHing technique global precipitation analyses. In this study, the SRDAS atmospheric and land-surface variables, global reanalysis products, infrared satellite imagery, and the physical retrievals from the Atmospheric Infrared Sounder (AIRS), on board of the NASA's Aqua satellite, were used in the evaluation of the MCCs developed in southeastern South America from 2008 and 2010. Low-level circulations and vertical profiles were analyzed together to establish the relevance of the moisture transport in connection with the upper-troposphere dynamics to the development of those MCCs.

  10. Cholinergic enhancement increases regional cerebral blood flow to the posterior cingulate cortex in mild Alzheimer's disease.

    Science.gov (United States)

    Iizuka, Tomomichi; Kameyama, Masashi

    2017-06-01

    The brain region that shows reductions in regional cerebral blood flow (rCBF) earliest is the posterior cingulate cortex (PCC), which is thought to have a relationship with cognitive function. We made a hypothesis that the PCC hypoperfusion is a result of cholinergic dysfunction and can be restored by cholinergic enhancement. This present longitudinal study aimed to detect the restoration of PCC rCBF in response to donepezil, an acetylcholine esterase inhibitor. We evaluated rCBF changes in the PCC, precuneus and anterior cingulate cortex using perfusion single-photon emission computed tomography (SPECT), statistical analysis and region of interest analysis, prospectively. We allocated 36 patients with mild AD to either the responder or non-responder groups based on changes in Mini-Mental State Examination scores. The patients were followed up for 18 months. The PCC rCBF significantly increased in responders after 6 months of donepezil therapy. Statistical maps at baseline showed a typical decreased pattern of mild AD and obvious rCBF restoration in the bilateral PCC at 6 months in responders. Changes in Mini-Mental State Examination scores and the AD assessment scale cognitive scores significantly correlated with rCBF changes in the PCC of responders. Cholinergic enhancement restored PCC rCBF under the three conditions of mild AD, responders and short follow-up interval, and that increase correlated with improved cognitive function. These findings support our hypothesis that PCC rCBF reflects cholinergic function in AD patients. Geriatr Gerontol Int 2017; 17: 951-958. © 2016 The Authors. Geriatrics & Gerontology International published by John Wiley & Sons Australia, Ltd on behalf of Japan Geriatrics Society.

  11. Aviation and Health: A Key Nexus for the US Air Force’s Regional Security-Building Efforts

    Science.gov (United States)

    2015-06-01

    I. Ubiera, USAF, BSC, AFMSA/SG3XI. National Military Strategy and Security Cooperation A confluence of fiscal challenges, lessons learned from...lines of structured communication to estab- lish initial concepts and then modify them as needed. Maximum efficacy calls for intercultural —and often...46, http://www.coe-dmha.org/shared/pdf/lessons - learned /CFEYolandaAAR_HiResSingle4.pdf. 27. Chiu et al., Lessons from Civil-Military Disaster

  12. A Decade of Experience: Which Network Structures Maximize Fire Service Capacity for Homeland Security Incidents in Metropolitan Regions?

    Science.gov (United States)

    2011-12-01

    the benefit of involving participants beyond the traditional coalitions and the need to seek innovative , non-traditional solutions to catastrophic...across the United States, and the foundation is nestled in the emergency management framework that evolved from our efforts to secure the homeland as a...American Review of Public Administration 38(3): 286–306. 54 Chenoweth E., & Clark S. (2009). All terrorism is local; Resources, nestled

  13. Matrix attachment regions (MARs) enhance transformation frequencies and reduce variance of transgene expression in barley

    DEFF Research Database (Denmark)

    Petersen, K.; Leah, R.; Knudsen, S.

    2002-01-01

    Nuclear matrix attachment regions (MARs) are defined as genomic DNA sequences, located at the physical boundaries of chromatin loops. They are suggested to play a role in the cis unfolding and folding of the chromatin fibre associated with the regulation of gene transcription. Inclusion of MARs...... in transgene cassettes enhances their expression and reduces position-effect variations in the transgenic host. The present study is the first to investigate the influence of MAR sequences on transformation frequencies and transgene expression in barley, which is highly relevant to the future improvement...... of this crop by biotechnology. Two plant MAR sequences were tested both for their ability to bind to the nuclear matrix of barley leaf nuclei and to regulate the expression of a reporter gene in transgenic barley. Competitive in vitro MAR binding assays with the 520 bp P1-MAR from soybean and the 516 bp TBS...

  14. Enhanced

    Directory of Open Access Journals (Sweden)

    Martin I. Bayala

    2014-06-01

    Full Text Available Land Surface Temperature (LST is a key parameter in the energy balance model. However, the spatial resolution of the retrieved LST from sensors with high temporal resolution is not accurate enough to be used in local-scale studies. To explore the LST–Normalised Difference Vegetation Index relationship potential and obtain thermal images with high spatial resolution, six enhanced image sharpening techniques were assessed: the disaggregation procedure for radiometric surface temperatures (TsHARP, the Dry Edge Quadratic Function, the Difference of Edges (Ts∗DL and three models supported by the relationship of surface temperature and water stress of vegetation (Normalised Difference Water Index, Normalised Difference Infrared Index and Soil wetness index. Energy Balance Station data and in situ measurements were used to validate the enhanced LST images over a mixed agricultural landscape in the sub-humid Pampean Region of Argentina (PRA, during 2006–2010. Landsat Thematic Mapper (TM and Moderate Resolution Imaging Spectroradiometer (EOS-MODIS thermal datasets were assessed for different spatial resolutions (e.g., 960, 720 and 240 m and the performances were compared with global and local TsHARP procedures. Results suggest that the Ts∗DL technique is the most adequate for simulating LST to high spatial resolution over the heterogeneous landscape of a sub-humid region, showing an average root mean square error of less than 1 K.

  15. INVESTMENT ACTIVITY OF AGRIBUSINESS IN THE AGROINDUSTRIAL COMPLEX REGION, AS ONE OF THE ELEMENTS OF THE FINANCIAL SECURITY OF THE AGRO-INDUSTRIAL COMPLEX OF THE STATE

    Directory of Open Access Journals (Sweden)

    Olga Nikolaevna Uglitskikh

    2015-09-01

    Full Text Available The developed economic-political situation around of Russia, specifies an indispensability of support of agricultural commodity producers as from their financial well-being, investment activity the financial security of agrarian and industrial complex of the state depends. Limitation of own financial resources at agrarians does not allow them to realize independently conceived projects. Studying of questions of formation and functioning of investment activity in agriculture of Stavropol Territory and an assessment of investment projects offered to reali-zation, have allowed to analyse investment activity of agrarian and industrial complex of region up to the introduction of Russia into WTO and in conditions of its membership. By results of the lead assessment the administrative areas of region showing the greatest investment activity, threats of a financial security of agrarian and industrial complex of region not putting by the activity have been revealed. It is drawn a conclusion on influence West-American sanctions on financial without-danger agra-rian and industrial complex of the state and the responsibility сельхозтоваропроизводителей about delivery of agricultural production in necessary volume and import substitution.

  16. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  17. Environment and security in the South China Sea region : the role of experts, non-governmental actors and governments in regime building processes

    OpenAIRE

    Næss, Tom

    1999-01-01

    Background: The Spratly islands in the South China Sea are today the focal point of a territorial dispute that represents a serious threat to the regional security in Southeast Asia. Six governments - China, Vietnam, Taiwan, the Philippines, Malaysia and Brunei - have laid claims to all or some of the more than 230 islets, reefs and shoals in the Spratly area. The Peoples Republic of China (PRC) is a key player in the South China Sea conflict. However, the South China Sea is not jus...

  18. Ways to enhance the economic turnover of fruit and berry production in the region

    Directory of Open Access Journals (Sweden)

    Vladimir Efimovich Rokhchin

    2014-09-01

    Full Text Available Enhancement of the regions’ self-sufficiency in handling their socio-economic development ssues predetermines their increasing importance in the search for new sources of economic growth and improvement of the quality of life, an important characteristic of which is nutrition, including the consumption of fruit and berries. This issue is particularly relevant for the European North of Russia, where the development of its own fruit and berry production is constrained by climatic conditions. These territories can find a source of economic growth in the formation of the fruit and berry market with a significant potential for development based on the resources of wild fruits and berries that the northern regions are rich in. The article describes the main spheres of functioning of the fruit and berry market in the northern regions through the development of integrated network structures that promote integration of fruit and berry production and processing, as well as support on the part of the authorities in creating appropriate conditions for the normal functioning of the market

  19. An enhanced trend surface analysis equation for regional-residual separation of gravity data

    Science.gov (United States)

    Obasi, A. I.; Onwuemesi, A. G.; Romanus, O. M.

    2016-12-01

    Trend surface analysis is a geological term for a mathematical technique which separates a given map set into a regional component and a local component. This work has extended the steps for the derivation of the constants in the trend surface analysis equation from the popularly known matrix and simultaneous form to a more simplified and easily achievable format. To achieve this, matrix inversion was applied to the existing equations and the outcome was tested for suitability using a large volume of gravity data set acquired from the Anambra Basin, south-eastern Nigeria. Tabulation of the field data set was done using the Microsoft Excel spread sheet, while gravity maps were generated from the data set using Oasis Montaj software. A comparison of the residual gravity map produced using the new equations with its software derived counterpart has shown that the former has a higher enhancing capacity than the latter. This equation has shown strong suitability for application in the separation of gravity data sets into their regional and residual components.

  20. AgriSense-STARS: Advancing Methods of Agricultural Monitoring for Food Security in Smallholder Regions - the Case for Tanzania

    Science.gov (United States)

    Dempewolf, J.; Becker-Reshef, I.; Nakalembe, C. L.; Tumbo, S.; Maurice, S.; Mbilinyi, B.; Ntikha, O.; Hansen, M.; Justice, C. J.; Adusei, B.; Kongo, V.

    2015-12-01

    In-season monitoring of crop conditions provides critical information for agricultural policy and decision making and most importantly for food security planning and management. Nationwide agricultural monitoring in countries dominated by smallholder farming systems, generally relies on extensive networks of field data collectors. In Tanzania, extension agents make up this network and report on conditions across the country, approaching a "near-census". Data is collected on paper which is resource and time intensive, as well as prone to errors. Data quality is ambiguous and there is a general lack of clear and functional feedback loops between farmers, extension agents, analysts and decision makers. Moreover, the data are not spatially explicit, limiting the usefulness for analysis and quality of policy outcomes. Despite significant advances in remote sensing and information communication technologies (ICT) for monitoring agriculture, the full potential of these new tools is yet to be realized in Tanzania. Their use is constrained by the lack of resources, skills and infrastructure to access and process these data. The use of ICT technologies for data collection, processing and analysis is equally limited. The AgriSense-STARS project is developing and testing a system for national-scale in-season monitoring of smallholder agriculture using a combination of three main tools, 1) GLAM-East Africa, an automated MODIS satellite image processing system, 2) field data collection using GeoODK and unmanned aerial vehicles (UAVs), and 3) the Tanzania Crop Monitor, a collaborative online portal for data management and reporting. These tools are developed and applied in Tanzania through the National Food Security Division of the Ministry of Agriculture, Food Security and Cooperatives (MAFC) within a statistically representative sampling framework (area frame) that ensures data quality, representability and resource efficiency.

  1. The Use of Fuzzy Cognitive Modelling to Manage Information Security Audit of Information Portals of Regional Executive Authorities

    Science.gov (United States)

    Rytov, M. Yu; Leksikov, E. V.; Sakalo, V. I.; Kovalev, P. A.

    2017-01-01

    At the moment the domestic policy of the Russian Federation is being formed in difficult conditions of a foreign policy situation. The regional policy is built on the platform of alignment of social and economic development indices. To maintain the activity of regional social and economic systems is important for the management system of executive authorities (EA), including regional ones. To ensure feasibility of public administration, it is necessary to have vitally active social and economic systems.

  2. Surveillance of Arthropod-Borne Viruses and Their Vectors in the Mediterranean and Black Sea Regions Within the MediLabSecure Network.

    Science.gov (United States)

    Failloux, Anna-Bella; Bouattour, Ali; Faraj, Chafika; Gunay, Filiz; Haddad, Nabil; Harrat, Zoubir; Jancheska, Elizabeta; Kanani, Khalil; Kenawy, Mohamed Amin; Kota, Majlinda; Pajovic, Igor; Paronyan, Lusine; Petric, Dusan; Sarih, Mhammed; Sawalha, Samir; Shaibi, Taher; Sherifi, Kurtesh; Sulesco, Tatiana; Velo, Enkelejda; Gaayeb, Lobna; Victoir, Kathleen; Robert, Vincent

    2017-01-01

    Arboviruses, viruses transmitted by arthropods such as mosquitoes, ticks, sandflies, and fleas are a significant threat to public health because of their epidemic and zoonotic potential. The geographical distribution of mosquito-borne diseases such as West Nile (WN), Rift Valley fever (RVF), Dengue, Chikungunya, and Zika has expanded over the last decades. Countries of the Mediterranean and Black Sea regions are not spared. Outbreaks of WN are repeatedly reported in the Mediterranean basin. Human cases of RVF were reported at the southern borders of the Maghreb region. For this reason, establishing the basis for the research to understand the potential for the future emergence of these and other arboviruses and their expansion into new geographic areas became a public health priority. In this context, the European network "MediLabSecure" gathering laboratories in 19 non-EU countries from the Mediterranean and Black Sea regions seeks to improve the surveillance (of animals, humans, and vectors) by reinforcing capacity building and harmonizing national surveillance systems to address this important human and veterinary health issue. The aim of this review is to give an exhaustive overview of arboviruses and their vectors in the region. The data presented underline the importance of surveillance in the implementation of more adapted control strategies to combat vector-borne diseases. Partner laboratories within the MediLabSecure network present a wide range of infrastructures and have benefited from different training programs. Although reporting of arboviral presence is not carried out in a systematic manner, the expansion of the area where arboviruses are present cannot be disputed. This reinforces the need for increasing surveillance capacity building in this region to prevent future emergences.

  3. Arctic Security

    DEFF Research Database (Denmark)

    Wang, Nils

    2013-01-01

    The inclusion of China, India, Japan, Singapore and Italy as permanent observers in the Arctic Council has increased the international status of this forum significantly. This chapter aims to explain the background for the increased international interest in the Arctic region through an analysis...... of the general security situation and to identify both the explicit and the implicit agendas of the primary state actors. The region contains all the ingredients for confrontation and conflict but the economical potential for all the parties concerned creates a general interest in dialogue and cooperation...

  4. Enhancing the NFLs Counter-Terrorism Efforts: Is the Leagues Security Scheme Able to Effectively Thwart Terrorist Attacks

    Science.gov (United States)

    2016-09-01

    Programming Network FAA Federal Aviation Administration FBI Federal Bureau of Investigation FBO Football Banning Order FIG Field Intelligence Group FY...DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) The National Football League (NFL) has become the unofficial national pastime in the United...secure major-league regular season football games and their tailgates effectively and in a manner that does not scare away the fan base

  5. Implementation of Phased Array Antenna Technology Providing a Wireless Local Area Network to Enhance Port Security and Maritime Interdiction Operations

    Science.gov (United States)

    2009-09-01

    10/100 Base T Ports SECURITY Static and Dynamic WEP Encryption 40- and 104-bit (RC4) Encryption WPA 802.1x – EAP-TLS, EAP-TTLS, PEAP, TKIP... Encryption Standard BOQ Bachelor Officer Quarters C2 Command and Control C4ISR Command, Control, Communications, Computers, Intelligence, Surveillance...information and traffic exchanged over the VPN tunnel is encrypted . VPN software encrypts and decrypts the data transmitted between clients and must

  6. Regional Trade in Food Staples : Prospects for Stimulating Agricultural Growth and Moderation Food Security Crises in Eastern and Southern Africa

    OpenAIRE

    World Bank

    2008-01-01

    This report focuses on growing trade in food staples in the Southern and Eastern African region of Africa as one of the largest growth opportunities available to African farmers. This paper examines the impact of regional trade in food staples, both for maintaining farmer incentives in surplus food production zones and for moderating price spikes in deficit areas. The paper begins by ident...

  7. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  8. Transforming Security Screening With Biometrics

    National Research Council Canada - National Science Library

    Hearnsberger, Brian J

    2003-01-01

    ... and identity theft to dramatically improve physical security. Today, biometric technology could be implemented to transform physical security by enhancing screening procedures currently in use at U.S...

  9. Inter and intrastate conflicts nexus: The Colombian Peace process, as a means to prevent interstate conflicts in South America and rethink regional security

    Directory of Open Access Journals (Sweden)

    Sandra Montoya

    2017-05-01

    Full Text Available The Colombian internal conflict case provides useful scenarios, realities and dynamics for nourishing the debate between those who treat internal and interstate conflicts as disconnected or totally independent phenomena and those who argue the frequent links between them. This policy paper is situated in the latter school of thought, and from that angle I shall argue the usefulness of perceiving the nexus between intrastate and interstate conflicts, and its applicability to the Colombian internal conflict. The paper highlights the importance of taking into account the strong nexus in order to prevent international disputes that put regional security at risk; it also suggests that the current Colombian peace process represents an historic opportunity for Colombia –and a great challenge for the Colombian society– while at the same time being an opportunity for thinking about a shared future in the South America region, which challenges the Colombian state and its performance at the international level.

  10. Numerical Simulation of Inter-basin Groundwater Flow into Northern Yucca Flat, Nevada National Security Site, Using the Death Valley Regional Flow System Model

    Energy Technology Data Exchange (ETDEWEB)

    Pohlmann Karl,Ye Ming

    2012-03-01

    Models of groundwater flow for the Yucca Flat area of the Nevada National Security Site (NNSS) are under development by the U.S. Department of Energy (DOE) for corrective action investigations of the Yucca Flat-Climax Mine Corrective Action Unit (CAU). One important aspect of these models is the quantity of inter-basin groundwater flow from regional systems to the north. This component of flow, together with its uncertainty, must be properly accounted for in the CAU flow models to provide a defensible regional framework for calculations of radionuclide transport that will support determinations of the Yucca Flat-Climax Mine contaminant boundary. Because characterizing flow boundary conditions in northern Yucca Flat requires evaluation to a higher level of detail than the scale of the Yucca Flat-Climax Mine CAU model can efficiently provide, a study more focused on this aspect of the model was required.

  11. A Genetic Variant in the Distal Enhancer Region of the Human Renin Gene Affects Renin Expression.

    Science.gov (United States)

    Makino, Yasukazu; Konoshita, Tadashi; Omori, Atsuhito; Maegawa, Nobuhiro; Nakaya, Takahiro; Ichikawa, Mai; Yamamoto, Katsushi; Wakahara, Shigeyuki; Ishizuka, Tamotsu; Onoe, Tamehito; Nakamura, Hiroyuki

    2015-01-01

    The high heritability of plasma renin activity was confirmed in recent investigations. A variation located near the strong enhancer of the human renin gene (REN), C-5312T, has been shown to have different transcription activity levels depending on its allele: the 5312T allele shows transcription levels that are 45% greater than those of the 5312C allele. The purpose of this study was to confirm the hypothesis that variations in the enhancer region of the REN gene are involved in regulating renal expression of renin. Sixty-four subjects with biopsy-proven renal diseases were included in this study (male/female: 35/29, age 41.9 ± 20.9 years, SBP/DBP 123.1 ± 23.7/73.4 ± 14.8 mmHg, s-Cr 0.93 ± 0.63 mg/dl). A genetic variant of REN, C-5312T, was assayed by PCR-RFLP and the TaqMan method. Total RNAs from a small part of the renal cortex were reverse-transcribed and amplified for REN and GAPDH with a real-time PCR system. Logarithmically transformed expression values of the relative ratio of REN to GAPDH (10-3) were as follows (mean ± SE): CC (26 cases), 0.016 ± 0.005; CT (33 cases), 0.047 ± 0.021 (p = 0.41 vs. CC); TT (5 cases), 0.198 ± 0.194 (p = 0.011 vs. CC, p renin gene have an effect on the expression levels of renin in renal tissue; this observation is in good accordance with the results of the transcriptional assay.

  12. Modelling of optical emissions enhanced by the HF pumping of the ionospheric F-region

    Directory of Open Access Journals (Sweden)

    T. Sergienko

    2012-05-01

    Full Text Available Strong enhancement of the optical emissions with excitation threshold from 1.96 eV (630.0 nm from O(1D up to 18.75 eV (427.8 nm from N2+(1NG have been observed during experiments of the ionosphere modification by high power HF radio waves. Analysis of the optical emission ratios showed clearly that a significant part of the ionospheric electrons have to be accelerated to energies above 30 eV and more in the region where the HF radio wave effectively interacts with the ionospheric plasma. The Monte-Carlo model of electron transport and the optical emission model were used to study the dependence of the optical emission intensity on the acceleration electron parameters. We obtained the following results from analysis of the enhanced intensities of the four optical emissions (630.0, 557.7, 844.6 and 427.8 nm observed in the EISCAT heating experiment on 10 March 2002. The 630.0 emission with an excitation threshold of 1.96 eV is formed predominately by the thermal electrons, where the accelerated electrons play a minor role in the excitation of this emission. In order to explain the experimentally observed intensity ratios, the accelerated electrons must gain energies of more than 60 eV. For accelerated electrons with a power law energy dependence, the efficiency of the optical emission excitation depends on the exponent defining the shape of the electron spectra. However, an agreement with the observed emission intensities is achieved for exponent values not less than zero. Moreover, increasing the exponent to higher values does not affect the emission intensity ratios.

  13. Tensions of network security and collaborative work practice: understanding a single sign-on deployment in a regional hospital.

    Science.gov (United States)

    Heckle, Rosa R; Lutters, Wayne G

    2011-08-01

    Healthcare providers and their IT staff, working in an effort to balance appropriate accessibility with stricter security mandates, are considering the use of a single network sign-on approach for authentication and password management. Single sign-on (SSO) promises to improve usability of authentication for multiple-system users, increase compliance, and help curb system maintenance costs. However, complexities are introduced when SSO is placed within a collaborative environment. These complexities include unanticipated workflow implications that introduce greater security vulnerability for the individual user. OBJECTIVES AND METHODOLOGY: In this work, we examine the challenges of implementing a single sign-on authentication technology in a hospital environment. The aim of the study was to document the factors that affected SSO adoption within the context of use. The ultimate goal is to better inform the design of usable authentication systems within collaborative healthcare work sites. The primary data collection techniques used are ethnographically informed - observation, contextual interviews, and document review. The study included a cross-section of individuals from various departments and varying rolls. These participants were a mix of both clinical and administrative staff, as well as the Information Technology group. The field work revealed fundamental mis-matches between the technology and routine work practices that will significantly impact its effective adoption. While single sign-on was effective in the administrative offices, SSO was not a good fit for collaborative areas. The collaborative needs of the clinical staff unearthed tensions in its implementation. An analysis of the findings revealed that the workflow, activities, and physical environment of the clinical areas create increased security vulnerabilities for the individual user. The clinical users were cognizant of these vulnerabilities and this created resistance to the implementation due

  14. Enhanced desorption of cesium from collapsed interlayer regions in vermiculite by hydrothermal treatment with divalent cations

    Energy Technology Data Exchange (ETDEWEB)

    Yin, Xiangbiao, E-mail: yin.x.aa@m.titech.ac.jp [Research Laboratory for Nuclear Reactors, Tokyo Institute of Technology, 2-12-1, Ookayama, Meguro-ku, Tokyo 152-8550 (Japan); Wang, Xinpeng [College of Resources and Metallurgy, Guangxi University, 100 Daxue East Road, Nanning 530004 (China); Wu, Hao; Ohnuki, Toshihiko; Takeshita, Kenji [Research Laboratory for Nuclear Reactors, Tokyo Institute of Technology, 2-12-1, Ookayama, Meguro-ku, Tokyo 152-8550 (Japan)

    2017-03-15

    Highlights: • Desorption of Cs{sup +} fixed in collapsed interlayer region of vermiculite was studied. • Monovalent cations readily induced interlayer collapse inhibiting Cs{sup +} desorption. • Larger hydrous ionic radii of divalent cations greatly prevented Cs{sup +} desorption. • Effect of divalent cation on Cs{sup +} desorption changes depending on thermal treatment. • ∼100% removal of saturated Cs{sup +} was achieved by hydrothermal treatment at 250 °C. - Abstract: Adsorption of cesium (Cs) on phyllosilicates has been intensively investigated because natural soils have strong ability of immobilizing Cs within clay minerals resulting in difficulty of decontamination. The objectives of present study are to clarify how Cs fixation on vermiculite is influenced by structure change caused by Cs sorption at different loading levels and how Cs desorption is affected by various replacing cations induced at different treating temperature. As a result, more than 80% of Cs was readily desorbed from vermiculite with loading amount of 2% saturated Cs (5.49 × 10{sup −3} mmol g{sup −1}) after four cycles of treatment of 0.01 M Mg{sup 2+}/Ca{sup 2+} at room temperature, but less than 20% of Cs was desorbed from saturated vermiculite. These distinct desorption patterns were attributed to inhibition of Cs desorption by interlayer collapse of vermiculite, especially at high Cs loadings. In contrast, elevated temperature significantly facilitated divalent cations to efficiently desorb Cs from collapsed regions. After five cycles of treatment at 250 °C with 0.01 M Mg{sup 2+}, ∼100% removal of saturated Cs was achieved. X-ray diffraction analysis results suggested that Cs desorption was completed through enhanced diffusion of Mg{sup 2+} cations into collapsed interlayer space under hydrothermal condition resulting in subsequent interlayer decollapse and readily release of Cs{sup +}.

  15. Atypical energetic particle events observed prior energetic particle enhancements associated with corotating interaction regions

    Science.gov (United States)

    Khabarova, Olga; Malandraki, Olga; Zank, Gary; Jackson, Bernard; Bisi, Mario; Desai, Mihir; Li, Gang; le Roux, Jakobus; Yu, Hsiu-Shan

    2017-04-01

    Recent studies of mechanisms of particle acceleration in the heliosphere have revealed the importance of the comprehensive analysis of stream-stream interactions as well as the heliospheric current sheet (HCS) - stream interactions that often occur in the solar wind, producing huge magnetic cavities bounded by strong current sheets. Such cavities are usually filled with small-scale magnetic islands that trap and re-accelerate energetic particles (Zank et al. ApJ, 2014, 2015; le Roux et al. ApJ, 2015, 2016; Khabarova et al. ApJ, 2015, 2016). Crossings of these regions are associated with unusual variations in the energetic particle flux up to several MeV/nuc near the Earth's orbit. These energetic particle flux enhancements called "atypical energetic particle events" (AEPEs) are not associated with standard mechanisms of particle acceleration. The analysis of multi-spacecraft measurements of energetic particle flux, plasma and the interplanetary magnetic field shows that AEPEs have a local origin as they are observed by different spacecraft with a time delay corresponding to the solar wind propagation from one spacecraft to another, which is a signature of local particle acceleration in the region embedded in expanding and rotating background solar wind. AEPEs are often observed before the arrival of corotating interaction regions (CIRs) or stream interaction regions (SIRs) to the Earth's orbit. When fast solar wind streams catch up with slow solar wind, SIRs of compressed heated plasma or more regular CIRs are created at the leading edge of the high-speed stream. Since coronal holes are often long-lived structures, the same CIR re-appears often for several consecutive solar rotations. At low heliographic latitudes, such CIRs are typically bounded by forward and reverse waves on their leading and trailing edges, respectively, that steepen into shocks at heliocentric distances beyond 1 AU. Energetic ion increases have been frequently observed in association with CIR

  16. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  17. Meson-Exchange Enhancement of First-Forbidden $\\beta$-Transitions in the Lead Region

    CERN Multimedia

    Delaure, B J P; Severijns, N

    2002-01-01

    Both on-line and off-line low temperature nuclear orientation is used to measure the $\\beta$-asymmetry parameter for the first-forbidden g.s. $\\rightarrow$~g.s. $\\beta$-transitions of $^{205}$Hg, $^{207,209}$Tl, $^{209}$Pb and $^{213}$Bi. From this, the ratio of the rank-zero and the rank-one strengths in these decays can be deduced, with the rank of a $\\beta$-transition being defined as the total angular momentum of the lepton system. Combining this result with the experimental ${ft}$-values yields for the first time a purely experimental determination of the rank-zero contribution in these $\\Delta$ J = 0 first-forbidden transitions. This provides an independent check of the large enhancement (of about 100% over the impulse approximation) of the rank-zero matrix element of $\\gamma_{5} $, caused by meson exchange currents (MEC), which was recently obtained from a comparison of calculated first-forbidden $\\beta$-decay rates with experimentally observed values for nuclei in the lead region (A = 205-212). Measur...

  18. Approaching Regional Coherence

    DEFF Research Database (Denmark)

    Vestenskov, David; Shah, Ali; Kazmi, Atia

    The report contains ideas on enhanced cooperation on both security and economy. It is a particular relevant read for regional political decision makers, institutions, private companies, and researchers that wish to gain insight into the present and future political and economic developments...... of Afghan-Pakistani relations and to the region in general. Military institutions, officers and officials facing deployment in the region as well as universities and scholars with ongoing research and programmes in the region will also benefit from output of the stabilization project that this report...

  19. ENHANCING NETWORK SECURITY USING 'LEARNING-FROM-SIGNALS' AND FRACTIONAL FOURIER TRANSFORM BASED RF-DNA FINGERPRINTS

    Energy Technology Data Exchange (ETDEWEB)

    Buckner, Mark A [ORNL; Bobrek, Miljko [ORNL; Farquhar, Ethan [ORNL; Harmer, Paul K [Air Force Institute of Technology; Temple, Michael A [Air Force Institute of Technology

    2011-01-01

    Wireless Access Points (WAP) remain one of the top 10 network security threats. This research is part of an effort to develop a physical (PHY) layer aware Radio Frequency (RF) air monitoring system with multi-factor authentication to provide a first-line of defense for network security--stopping attackers before they can gain access to critical infrastructure networks through vulnerable WAPs. This paper presents early results on the identification of OFDM-based 802.11a WiFi devices using RF Distinct Native Attribute (RF-DNA) fingerprints produced by the Fractional Fourier Transform (FRFT). These fingerprints are input to a "Learning from Signals" (LFS) classifier which uses hybrid Differential Evolution/Conjugate Gradient (DECG) optimization to determine the optimal features for a low-rank model to be used for future predictions. Results are presented for devices under the most challenging conditions of intra-manufacturer classification, i.e., same-manufacturer, same-model, differing only in serial number. The results of Fractional Fourier Domain (FRFD) RF-DNA fingerprints demonstrate significant improvement over results based on Time Domain (TD), Spectral Domain (SD) and even Wavelet Domain (WD) fingerprints.

  20. African fermented dairy products - Overview of predominant technologically important microorganisms focusing on African Streptococcus infantarius variants and potential future applications for enhanced food safety and security.

    Science.gov (United States)

    Jans, Christoph; Meile, Leo; Kaindi, Dasel Wambua Mulwa; Kogi-Makau, Wambui; Lamuka, Peter; Renault, Pierre; Kreikemeyer, Bernd; Lacroix, Christophe; Hattendorf, Jan; Zinsstag, Jakob; Schelling, Esther; Fokou, Gilbert; Bonfoh, Bassirou

    2017-06-05

    Milk is a major source of nutrients, but can also be a vehicle for zoonotic foodborne diseases, especially when raw milk is consumed. In Africa, poor processing and storage conditions contribute to contamination, outgrowth and transmission of pathogens, which lead to spoilage, reduced food safety and security. Fermentation helps mitigate the impact of poor handling and storage conditions by enhancing shelf life and food safety. Traditionally-fermented sour milk products are culturally accepted and widely distributed in Africa, and rely on product-specific microbiota responsible for aroma, flavor and texture. Knowledge of microbiota and predominant, technologically important microorganisms is critical in developing products with enhanced quality and safety, as well as sustainable interventions for these products, including Africa-specific starter culture development. This narrative review summarizes current knowledge of technologically-important microorganisms of African fermented dairy products (FDP) and raw milk, taking into consideration novel findings and taxonomy when re-analyzing data of 29 publications covering 25 products from 17 African countries. Technologically-important lactic acid bacteria such as Lactococcus lactis and Streptococcus infantarius subsp. infantarius (Sii), Lactobacillus spp. and yeasts predominated in raw milk and FDP across Africa. Re-analysis of data also suggests a much wider distribution of Sii and thus a potentially longer history of use than previously expected. Therefore, evaluating the role and safety of African Sii lineages is important when developing interventions and starter cultures for FDP in Africa to enhance food safety and food security. In-depth functional genomics, epidemiologic investigations and latest identification approaches coupled with stakeholder involvement will be required to evaluate the possibility of African Sii lineages as novel food-grade Streptococcus lineage. Copyright © 2017 The Authors. Published by

  1. Securing biodiversity and ecosystem services in Africa: Notes from the 2015 Satoyama Initiative Regional Workshop in Accra, Ghana

    Directory of Open Access Journals (Sweden)

    Alfred Oteng-Yeboah

    2016-05-01

    Full Text Available The first Satoyama Initiative Regional Workshop in Africa was held in Accra, Ghana, from 10 to 12 August 2015. The objective of the workshop was to contribute to the sustainable development agenda in the region within the scope of biodiversity and ecosystem functioning by strengthening the knowledge base related to the Satoyama Initiative, a global effort ‘to realize societies in harmony with nature’ through the revitalisation and sustainable development of ‘socio-ecological production landscapes and seascapes’. This short report summarises some of the main points arising from the workshop.

  2. Computer-aided detection of bladder mass within non-contrast-enhanced region of CT Urography (CTU)

    Science.gov (United States)

    Cha, Kenny H.; Hadjiiski, Lubomir M.; Chan, Heang-Ping; Caoili, Elaine M.; Cohan, Richard H.; Weizer, Alon; Zhou, Chuan

    2016-03-01

    We are developing a computer-aided detection system for bladder cancer in CT urography (CTU). We have previously developed methods for detection of bladder masses within the contrast-enhanced region of the bladder. In this study, we investigated methods for detection of bladder masses within the non-contrast enhanced region. The bladder was first segmented using a newly developed deep-learning convolutional neural network in combination with level sets. The non-contrast-enhanced region was separated from the contrast-enhanced region with a maximum-intensityprojection- based method. The non-contrast region was smoothed and a gray level threshold was employed to segment the bladder wall and potential masses. The bladder wall was transformed into a straightened thickness profile, which was analyzed to identify lesion candidates as a prescreening step. The lesion candidates were segmented using our autoinitialized cascaded level set (AI-CALS) segmentation method, and 27 morphological features were extracted for each candidate. Stepwise feature selection with simplex optimization and leave-one-case-out resampling were used for training and validation of a false positive (FP) classifier. In each leave-one-case-out cycle, features were selected from the training cases and a linear discriminant analysis (LDA) classifier was designed to merge the selected features into a single score for classification of the left-out test case. A data set of 33 cases with 42 biopsy-proven lesions in the noncontrast enhanced region was collected. During prescreening, the system obtained 83.3% sensitivity at an average of 2.4 FPs/case. After feature extraction and FP reduction by LDA, the system achieved 81.0% sensitivity at 2.0 FPs/case, and 73.8% sensitivity at 1.5 FPs/case.

  3. Computer aided analysis of breast MRI enhancement kinetics using mean shift c lustering and multifeature iterative region of interest selection

    NARCIS (Netherlands)

    Stoutjesdijk, M.J.; Zijp, M.; Hitge-Boetes, C.; Karssemeijer, N.; Barentsz, J.O.; Huisman, H.

    2012-01-01

    PURPOSE: To evaluate automatic characterization of a breast MR lesion by its spatially coherent region of interest (ROI). MATERIALS AND METHODS: The method delineated 247 enhancing lesions using Otsu thresholding after manually placing a sphere. Mean Shift Clustering subdivided each volume, based on

  4. Channel Efficiency with Security Enhancement for Remote Condition Monitoring of Multi Machine System Using Hybrid Huffman Coding

    Science.gov (United States)

    Datta, Jinia; Chowdhuri, Sumana; Bera, Jitendranath

    2016-12-01

    This paper presents a novel scheme of remote condition monitoring of multi machine system where a secured and coded data of induction machine with different parameters is communicated between a state-of-the-art dedicated hardware Units (DHU) installed at the machine terminal and a centralized PC based machine data management (MDM) software. The DHUs are built for acquisition of different parameters from the respective machines, and hence are placed at their nearby panels in order to acquire different parameters cost effectively during their running condition. The MDM software collects these data through a communication channel where all the DHUs are networked using RS485 protocol. Before transmitting, the parameter's related data is modified with the adoption of differential pulse coded modulation (DPCM) and Huffman coding technique. It is further encrypted with a private key where different keys are used for different DHUs. In this way a data security scheme is adopted during its passage through the communication channel in order to avoid any third party attack into the channel. The hybrid mode of DPCM and Huffman coding is chosen to reduce the data packet length. A MATLAB based simulation and its practical implementation using DHUs at three machine terminals (one healthy three phase, one healthy single phase and one faulty three phase machine) proves its efficacy and usefulness for condition based maintenance of multi machine system. The data at the central control room are decrypted and decoded using MDM software. In this work it is observed that Chanel efficiency with respect to different parameter measurements has been increased very much.

  5. Prostate segmentation by feature enhancement using domain knowledge and adaptive region based operations.

    Science.gov (United States)

    Nanayakkara, Nuwan D; Samarabandu, Jagath; Fenster, Aaron

    2006-04-07

    Estimation of prostate location and volume is essential in determining a dose plan for ultrasound-guided brachytherapy, a common prostate cancer treatment. However, manual segmentation is difficult, time consuming and prone to variability. In this paper, we present a semi-automatic discrete dynamic contour (DDC) model based image segmentation algorithm, which effectively combines a multi-resolution model refinement procedure together with the domain knowledge of the image class. The segmentation begins on a low-resolution image by defining a closed DDC model by the user. This contour model is then deformed progressively towards higher resolution images. We use a combination of a domain knowledge based fuzzy inference system (FIS) and a set of adaptive region based operators to enhance the edges of interest and to govern the model refinement using a DDC model. The automatic vertex relocation process, embedded into the algorithm, relocates deviated contour points back onto the actual prostate boundary, eliminating the need of user interaction after initialization. The accuracy of the prostate boundary produced by the proposed algorithm was evaluated by comparing it with a manually outlined contour by an expert observer. We used this algorithm to segment the prostate boundary in 114 2D transrectal ultrasound (TRUS) images of six patients scheduled for brachytherapy. The mean distance between the contours produced by the proposed algorithm and the manual outlines was 2.70 +/- 0.51 pixels (0.54 +/- 0.10 mm). We also showed that the algorithm is insensitive to variations of the initial model and parameter values, thus increasing the accuracy and reproducibility of the resulting boundaries in the presence of noise and artefacts.

  6. Challenges of Regional Collective Security: Economic Community of West African States (ECOWAS) Standby Force: A Case Study

    Science.gov (United States)

    2008-06-13

    trouble spots in the sub-region (Audu, 2006, 22). Erskine examines the experiences of the Organization of African Unity (OAU) in Chad and ECOWAS in...international assistance, the dream of a peaceful Africa will never come true. For this reason, the G8 (Canada, France , Germany, Italy, Japan, Russia, the...Strategic Studies (ACSS). France has followed the United States initiative through a program called Renforcement des Capacités Africaines de Maintien de la

  7. Enabling Others to Win in a Complex World: Maximizing Security Force Assistance Potential in the Regionally Aligned Brigade Combat Team

    Science.gov (United States)

    2015-12-01

    command. The U.S. Army Heritage and Education Center acquires, conserves, and exhibits historical materials for use to support the U.S. Army, educate an...active duty Army.96 Maryland eventually expanded the program to include sister cities , where mayors of 10 towns in Maryland worked with Esto- nian mayors...missions, so it must be smart about how it takes on this task, particularly in region- 55 ally aligned brigades. In order to get better at helping

  8. Aviation security : TSA has completed key activities associated with implementing secure flight, but additional actions are needed to mitigate risks.

    Science.gov (United States)

    2009-05-01

    To enhance aviation security, the Department of Homeland Securitys (DHS) Transportation Security Administration (TSA) developed a programknown as Secure Flightto assume from air carriers the function of matching passenger information against...

  9. Economic-legal Securing of Integrated Territorial Development for Purposes of Housing Construction in the Moscow Region

    Directory of Open Access Journals (Sweden)

    Larionov Arkady

    2017-01-01

    Full Text Available Condition and problems of housing legislation in ensuring of the complex development of the territories in Russia in general and in Moscow region, in particular. Conclusion of expediency of reduction and introduction of moratorium on legislative activity in the housing sector. Proved the necessity of the concentration of intellectual and financial resources of the legislator on the elaboration of organizational-economic mechanisms of realization of already created economic-legal environment of functioning and development of the housing market. Offered measures in the field of improvement of the legislation can stabilize the housing market significantly.

  10. Dynamic Nucleosome-Depleted Regions at Androgen Receptor Enhancers in the Absence of Ligand in Prostate Cancer Cells ▿

    Science.gov (United States)

    Andreu-Vieyra, Claudia; Lai, John; Berman, Benjamin P.; Frenkel, Baruch; Jia, Li; Jones, Peter A.; Coetzee, Gerhard A.

    2011-01-01

    Nucleosome positioning at transcription start sites is known to regulate gene expression by altering DNA accessibility to transcription factors; however, its role at enhancers is poorly understood. We investigated nucleosome positioning at the androgen receptor (AR) enhancers of TMPRSS2, KLK2, and KLK3/PSA in prostate cancer cells. Surprisingly, a population of enhancer modules in androgen-deprived cultures showed nucleosome-depleted regions (NDRs) in all three loci. Under androgen-deprived conditions, NDRs at the TMPRSS2 enhancer were maintained by the pioneer AR transcriptional collaborator GATA-2. Androgen treatment resulted in AR occupancy, an increased number of enhancer modules with NDRs without changes in footprint width, increased levels of histone H3 acetylation (AcH3), and dimethylation (H3K4me2) at nucleosomes flanking the NDRs. Our data suggest that, in the absence of ligand, AR enhancers exist in an equilibrium in which a percentage of modules are occupied by nucleosomes while others display NDRs. We propose that androgen treatment leads to the disruption of the equilibrium toward a nucleosome-depleted state, rather than to enhancer de novo “remodeling.” This allows the recruitment of histone modifiers, chromatin remodelers, and ultimately gene activation. The “receptive” state described here could help explain AR signaling activation under very low ligand concentrations. PMID:21969603

  11. Evidence for RNA synthesis in the intergenic region between enhancer and promoter and its inhibition by insulators in Drosophila melanogaster

    Science.gov (United States)

    Tchurikov, Nickolai A.; Kretova, Olga V.; Moiseeva, Evgenia D.; Sosin, Dmitri V.

    2009-01-01

    Uncovering the nature of communication between enhancers, promoters and insulators is important for understanding the fundamental mechanisms that ensure appropriate gene expression levels. Here we describe an approach employing transient expression of genetic luciferase reporter gene constructs with quantitative RT–PCR analysis of transcription between an enhancer and Hsp70 promoter. We tested genetic constructs containing gypsy and/or Fab7 insulators in different orientations, and an enhancer from copia LTR-retroelement [(enh)copia]. A single gypsy or Fab7 insulator inserted between the promoter and enhancer in any polarity reduced enhancer action. A pair of insulators flanking the gene in any orientation exhibited increased insulation activity. We detected promoter-independent synthesis of non-coding RNA in the intergenic region of the constructs, which was induced by the enhancer in both directions and repressed by a single insulator or a pair of insulators. These results highlight the involvement of RNA-tracking mechanisms in the communications between enhancers and promoters, which are inhibited by insulators. PMID:19022852

  12. Security Expertise

    DEFF Research Database (Denmark)

    and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks......, the collaboration between science, anthropology and the military, transnational terrorism, and the ethical consequences of security expertise. Together they challenge our understanding of how expertise works and what consequences it has for security politics and international relations. This book...... will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general....

  13. THE STRATEGY OF THE STATE CORPORATION DEVELOPMENT – ECONOMIC GROWTH IN REGIONS AND ECONOMY SECURITY IN RUSSIA

    Directory of Open Access Journals (Sweden)

    V. V. Simonova

    2015-01-01

    Full Text Available On June 30, 2015 has come into force the Federal Law of theRussian Federation(№ 488-FL: “On the industrial Policy in theRussian Federation”. The law requires the innovation Production. At the same time, from the whole spectrum of the strategic documents only for the companies with the State participation the innovation development is required. In this sense, the strategies of the State companies embedded into the Strategical Planning System inRussiais important factor of stimulation of innovative development of Russian Economy. The integration of the State companies strategies and regions in innovation development will be the basis for stability in Russian Economy. 

  14. Motion-compensated compressed sensing for dynamic contrast-enhanced MRI using regional spatiotemporal sparsity and region tracking: Block LOw-rank Sparsity with Motion-guidance (BLOSM)

    Science.gov (United States)

    Chen, Xiao; Salerno, Michael; Yang, Yang; Epstein, Frederick H.

    2014-01-01

    Purpose Dynamic contrast-enhanced MRI of the heart is well-suited for acceleration with compressed sensing (CS) due to its spatiotemporal sparsity; however, respiratory motion can degrade sparsity and lead to image artifacts. We sought to develop a motion-compensated CS method for this application. Methods A new method, Block LOw-rank Sparsity with Motion-guidance (BLOSM), was developed to accelerate first-pass cardiac MRI, even in the presence of respiratory motion. This method divides the images into regions, tracks the regions through time, and applies matrix low-rank sparsity to the tracked regions. BLOSM was evaluated using computer simulations and first-pass cardiac datasets from human subjects. Using rate-4 acceleration, BLOSM was compared to other CS methods such as k-t SLR that employs matrix low-rank sparsity applied to the whole image dataset, with and without motion tracking, and to k-t FOCUSS with motion estimation and compensation that employs spatial and temporal-frequency sparsity. Results BLOSM was qualitatively shown to reduce respiratory artifact compared to other methods. Quantitatively, using root mean squared error and the structural similarity index, BLOSM was superior to other methods. Conclusion BLOSM, which exploits regional low rank structure and uses region tracking for motion compensation, provides improved image quality for CS-accelerated first-pass cardiac MRI. PMID:24243528

  15. Colômbia: mais insegurança humana, menos segurança regional Colombia: more human insecurity, less regional security

    Directory of Open Access Journals (Sweden)

    Juan Gabriel Tokatlian

    2002-06-01

    Full Text Available No contexto da grave crise que atravessa a região andina em seu conjunto, o exemplo da Colômbia é o mais dramático e serve potencialmente de modelo de intervenção externa nos assuntos internos de um país do hemisfério. Nesse sentido, analisa-se o tipo de guerra que vive a Colômbia, assim como o chamado novo intervencionismo e as possíveis saídas para o conflito armado no referido país. Trata-se de uma situação complexa e instável em que se misturam e confundem guerra política, violência criminal, demolição do Estado, violação dos direitos humanos e expansão do poderio estadunidense na região. Como decorrência do aumento dos confrontos internos, da persistência da "guerra contra as drogas" e do começo da "guerra contra o terrorismo", a ingerência dos Estados Unidos é cada vez mais eloqüente e preocupante. Enquanto isso, uma América do Sul passiva não parece querer comprometer-se com uma saída viável para um conflito expansivo no coração dos Andes.The Colombian predicament, characterized by foreign intervention in the domestic issues of a country in the Southern hemisphere, can be considered the most dramatic crisis amongst the various crises in the Andes region. The author analyzes the kind of war that exists in Colombia, as well as the so-called new interventionism and the possible solutions of the conflict in that country. It is a very complex and unstable situation in which political war, criminal violence, the destruction of the state, violation of human rights and the expansion of US power are all mixed. The intervention of the US in Colombia as a consequence of growing domestic conflicts, the continuation of the "war against drugs" and the beginning of "the war against terrorism," is increasingly evident and worrying. Meanwhile, a passive South America does not seem to be willing to engage itself in the search for a viable solution to an expanding conflict in the heart of the Andes.

  16. Anatomical region-dependent enhancement of 3-dimensional chondrogenic differentiation of human mesenchymal stem cells by soluble meniscus extracellular matrix.

    Science.gov (United States)

    Rothrauff, Benjamin B; Shimomura, Kazunori; Gottardi, Riccardo; Alexander, Peter G; Tuan, Rocky S

    2017-02-01

    Extracellular matrix (ECM) derived from decellularized tissues has been found to promote tissue neogenesis, most likely mediated by specific biochemical and physical signaling motifs that promote tissue-specific differentiation of progenitor cells. Decellularized ECM has been suggested to be efficacious for the repair of tissue injuries. However, decellularized meniscus contains a dense collagenous structure, which impedes cell seeding and infiltration and is not readily applicable for meniscus repair. In addition, the meniscus consists of two distinct anatomical regions that differ in vascularity and cellular phenotype. The purpose of this study was to explore the region-specific bioactivity of solubilized ECM derived from the inner and outer meniscal regions as determined in 2D and 3D cultures of adult mesenchymal stem cells (MSCs). When added as a medium supplement to 2D cultures of MSCs, urea-extracted fractions of the inner (imECM) and outer meniscal ECM (omECM) enhanced cell proliferation while imECM most strongly upregulated fibrochondrogenic differentiation on the basis of gene expression profiles. When added to 3D cultures of MSCs seeded in photocrosslinked methacrylated gelatin (GelMA) hydrogels, both ECM fractions upregulated chondrogenic differentiation as determined by gene expression and protein analyses, as well as elevated sulfated glycosaminoglycan sGAG content, compared to ECM-free controls. The chondrogenic effect at day 21 was most pronounced with imECM supplementation, but equivalent between ECM groups by day 42. Despite increased cartilage matrix, imECM and omECM constructs possessed compressive moduli similar to controls. In conclusion, soluble meniscal ECM may be considered for use as a tissue-specific reagent to enhance chondrogenesis for MSC-based 3D cartilage tissue engineering. The inner region of the knee meniscus is frequently injured and possesses a poor intrinsic healing capacity. Solubilized extracellular matrix (ECM) derived from

  17. Resilience of cassava (Manihot esculenta Crantz) to salinity: implications for food security in low-lying regions.

    Science.gov (United States)

    Gleadow, Ros; Pegg, Amelia; Blomstedt, Cecilia K

    2016-10-01

    Rising sea levels are threatening agricultural production in coastal regions due to inundation and contamination of groundwater. The development of more salt-tolerant crops is essential. Cassava is an important staple, particularly among poor subsistence farmers. Its tolerance to drought and elevated temperatures make it highly suitable for meeting global food demands in the face of climate change, but its ability to tolerate salt is unknown. Cassava stores nitrogen in the form of cyanogenic glucosides and can cause cyanide poisoning unless correctly processed. Previous research demonstrated that cyanide levels are higher in droughted plants, possibly as a mechanism for increasing resilience to oxidative stress. We determined the tolerance of cassava to salt at two different stages of development, and tested the hypothesis that cyanide toxicity would be higher in salt-stressed plants. Cassava was grown at a range of concentrations of sodium chloride (NaCl) at two growth stages: tuber initiation and tuber expansion. Established plants were able to tolerate 100mM NaCl but in younger plants 40mM was sufficient to retard plant growth severely. Nutrient analysis showed that plants were only able to exclude sodium at low concentrations. The foliar cyanogenic glucoside concentration in young plants increased under moderate salinity stress but was lower in plants grown at high salt. Importantly, there was no significant change in the cyanogenic glucoside concentration in the tubers. We propose that the mechanisms for salinity tolerance are age dependent, and that this can be traced to the relative cost of leaves in young and old plants. © The Author 2016. Published by Oxford University Press on behalf of the Society for Experimental Biology.

  18. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  19. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  20. 5’ and 3’ untranslated regions strongly enhance performance of geminiviral replicons in Nicotiana benthamiana leaves

    Directory of Open Access Journals (Sweden)

    Andrew G. Diamos

    2016-02-01

    Full Text Available We previously reported a recombinant protein production system based on a geminivirus replicon that yields high levels of vaccine antigens and monoclonal antibodies in plants. The bean yellow dwarf virus (BeYDV replicon generates massive amounts of DNA copies, which engage the plant transcription machinery. However, we noticed a disparity between transcript level and protein production, suggesting that mRNAs could be more efficiently utilized. In this study, we systematically evaluated genetic elements from human, viral, and plant sources for their potential to improve the BeYDV system. The tobacco extensin terminator enhanced transcript accumulation and protein production compared to other commonly used terminators, indicating that efficient transcript processing plays an important role in recombinant protein production. Evaluation of human-derived 5’ untranslated regions (UTRs indicated that many provided high levels of protein production, supporting their cross-kingdom function. Among the viral 5’ UTRs tested, we found the greatest enhancement with the tobacco mosaic virus omega leader. An analysis of the 5’ UTRs from the Arabidopsis thaliana and Nicotinana benthamiana photosystem I K genes found that they were highly active when truncated to include only the near upstream region, providing a dramatic enhancement of transgene production that exceeded that of the tobacco mosaic virus omega leader. The tobacco Rb7 matrix attachment region (MAR inserted downstream from the gene of interest provided significant enhancement, which was correlated with a reduction in plant cell death. Evaluation of agrobacterium strains found that EHA105 enhanced protein production and reduced cell death compared to LBA4301 and GV3101. We used these improvements to produce Norwalk virus capsid protein at >20% total soluble protein, corresponding to 1.8mg/g leaf fresh weight, more than twice the highest level ever reported in a plant system. We also produced

  1. Plasmon-Waveguide Resonances with Enhanced Figure of Merit and Their Potential for Anisotropic Biosensing in the Near Infrared Region

    OpenAIRE

    Said Mahajna; Michal Neumann; Ofer Eyal; Atef Shalabney

    2016-01-01

    The TM and TE guided modes in the coupled plasmon-waveguide resonance configuration are investigated in the spectral domain. Here we use the modes dispersion to study their capability for sensing in the near infrared region. It is shown that the spectral widths of the guided modes are, at least, one order of magnitude smaller than the conventional surface plasmon resonance counterpart. The enhanced sensitivity and figure of merit of the guided modes reveal their potential for sensing in the s...

  2. LTE security

    CERN Document Server

    Forsberg, Dan; Moeller, Wolf-Dietrich

    2010-01-01

    Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security substantially extends GSM and 3G security. It also encompasses the architectural aspects, known as SAE, to give a comprehensive resource on the topic. Although the security for SAE/LTE evolved from the security for GSM and 3G, due to different architectural and business requirements of fourth generation systems the SAE/LTE security architecture is substantially different from its predecessors. This book presents in detail the security mechanisms em

  3. Impact of Euro-Canadian agrarian practices: in search of sustainable import-substitution strategies to enhance food security in subarctic Ontario, Canada.

    Science.gov (United States)

    Spiegelaar, Nicole F; Tsuji, Leonard J S

    2013-01-01

    In Canada, food insecurity exists among Aboriginal (Inuit, Metis and First Nations) people living in remote northern communities, in part, because of their reliance on the industrialized, import-based food system. Local food production as a substitute to imports would be an adaptive response, but enhancement of food security via food localization requires reflection on previous failings of conventional agricultural strategies so that informed decisions can be made. In light of potential reintroduction of local food production in remote First Nations communities, we investigated the cultural, social and ecological effects of a 20th century, Euro-Canadian agrarian settlement on the food system of a subarctic First Nation; this will act as the first step in developing a more sustainable local food program and enhancing food security in this community. To investigate the socio-cultural impacts of the Euro-Canadian agrarian initiative on the food system of Fort Albany First Nation, purposive, semi-directive interviews were conducted with elders and other knowledgeable community members. Interview data were placed into themes using inductive analyses. To determine the biophysical impact of the agrarian initiative, soil samples were taken from one site within the cultivated area and from one site in an undisturbed forest area. Soil properties associated with agricultural use and productivity were assessed. To compare the means of a given soil property between the sites, one-tailed t-tests were employed. Vegetative analysis was conducted in both sites to assess disturbance. According to the interviewees, prior to the agrarian initiative, First Nation families harvested wild game and fish, and gathered berries as well as other forms of vegetation for sustenance. With the introduction of the residential school and agrarian initiative, traditional food practices were deemed inadequate, families were forced to work and live in the settlement (becoming less reliant on

  4. Determination of Enhanced Oil Recovery Candidate Fields in the Volga-Ural Oil and Gas Region Territory

    Directory of Open Access Journals (Sweden)

    Mikhail Turbakov

    2015-10-01

    Full Text Available Most of the current Russian oil production comes from mature fields. The application of enhanced oil recovery methods on oil fields increases recovery efficiency. This article presents an analysis of the increased field development efficiency methods of the Volga-Ural oil and gas region, which allows the full and efficient development of last-stage fields with unconventional reserves and production stabilization. The selection of the optimum method for a given field is a complex procedure consisting of many stages, from collecting data about the field, through more advanced data interpretation, to working out a detailed proposal for the most efficient extraction method. In this article the instantaneous and average annual growth above wells average was taken as a performance criterion for enhanced oil recovery methods. Based on the performed analysis, it follows that candidate wells for enhanced oil recovery method use must meet the I group parameters (high values of the remaining recoverable reserves and improved reservoir properties, low water cut, obtained oil rate increase. In order to assess the possible increase in production rate after enhanced oil recovery methods hydrodynamic modeling of radial drilling, acid treatment and water-alternated-gas injection for two oil fields of the Volga-Ural oil and gas region were performed.

  5. Aspect sensitive E- and F-region SPEAR-enhanced incoherent backscatter observed by the EISCAT Svalbard radar

    Directory of Open Access Journals (Sweden)

    R. S. Dhillon

    2009-01-01

    Full Text Available Previous studies of the aspect sensitivity of heater-enhanced incoherent radar backscatter in the high-latitude ionosphere have demonstrated the directional dependence of incoherent scatter signatures corresponding to artificially excited electrostatic waves, together with consistent field-aligned signatures that may be related to the presence of artificial field-aligned irregularities. These earlier high-latitude results have provided motivation for repeating the investigation in the different geophysical conditions that obtain in the polar cap ionosphere. The Space Plasma Exploration by Active Radar (SPEAR facility is located within the polar cap and has provided observations of RF-enhanced ion and plasma line spectra recorded by the EISCAT Svalbard UHF incoherent scatter radar system (ESR, which is collocated with SPEAR. In this paper, we present observations of aspect sensitive E- and F-region SPEAR-induced ion and plasma line enhancements that indicate excitation of both the purely growing mode and the parametric decay instability, together with sporadic E-layer results that may indicate the presence of cavitons. We note consistent enhancements from field-aligned, vertical and also from 5° south of field-aligned. We attribute the prevalence of vertical scatter to the importance of the Spitze region, and of that from field-aligned to possible wave/irregularity coupling.

  6. Observations in equatorial anomaly region of total electron content enhancements and depletions

    Directory of Open Access Journals (Sweden)

    N. Dashora

    2005-10-01

    Full Text Available A GSV 4004A GPS receiver has been operational near the crest of the equatorial anomaly at Udaipur, India for some time now. The receiver provides the line-of-sight total electron content (TEC, the phase and amplitude scintillation index, σφ and S4, respectively. This paper presents the first results on the nighttime TEC depletions associated with the equatorial spread F in the Indian zone. The TEC depletions are found to be very well correlated with the increased S4 index. A new feature of low-latitude TEC is also reported, concerning the observation of isolated and localized TEC enhancements in the nighttime low-latitude ionosphere. The TEC enhancements are not correlated with the S4 index. The TEC enhancements have also been observed along with the TEC depletions. The TEC enhancements have been interpreted as the manifestation of the plasma density enhancements reported by Le et al. (2003.

    Keywords. Ionosphere (Equatorial ionosphere; Ionospheric irregularities

  7. Enhanced absorption of graphene in the visible region by use of plasmonic nanostructures

    DEFF Research Database (Denmark)

    Hashemi, Mahdieh; Farzad, Mahmood Hosseini; Mortensen, N. Asger

    2013-01-01

    Low absorption of graphene in the visible range of the spectrum makes it difficult to uniquely benefit from this material in ultra-fast optoelectronic applications. We numerically propose to utilize patterned metallic nanostructures to increase light absorption in single-layer graphene. Simulation...... results show that excitation of surface plasmon resonances in the metallic nanostructures significantly enhances the local electromagnetic field near the graphene layer, therefore leading to a dramatic enhancement of the absorption in the graphene layer itself. Broadband high optical absorption can...... be realized by engineering the metal nanostructures, while maintaining insensitivity to the incident angle. Our results pave a new and promising way to enhance visible-light absorption in the graphene layer, which is potentially interesting for graphene-based photovoltaics....

  8. Enhancing Physical Layer Security of Multiuser SIMO Mixed RF/FSO Relay Networks with Multi-Eavesdroppers

    KAUST Repository

    El-Malek, Ahmed H. Abd

    2017-02-09

    In this paper, we investigate the secrecy performance of multiuser (MU) single-input multiple-output (SIMO) mixed radio frequency (RF)/free space optical (FSO) relay network with opportunistic user scheduling and multiple eavesdropping attacks. The considered system includes multiple users, one amplify-and-froward (AF) relay, one destination and multiple eavesdroppers. The users are connected with a multi-antenna relay through RF links and the relay is connected with the destination through an FSO link. Maximal ratio combining (MRC) scheme is used at the relay node to combine the received signals at its different antennas. The RF/FSO channels are assumed to follow Nakagami-m/Gamma-Gamma fading models with considering the effect of pointing errors. In particular, we derive closed- form expressions for the exact and asymptotic outage probabilities. The asymptotic outage results are then used to obtain the optimal RF transmission power based on the dominant link between the RF and FSO links. Then, the considered system secrecy performance is investigated in the presence of multi- eavesdroppers where exact closed-form expression for the intercept probability is derived. Finally, a cooperative jamming model is proposed along with power allocation to enhance the system secrecy performance. Monte-Carlo simulations are provided to validate the achieved exact and asymptotic results.

  9. Quantum photonic network and physical layer security.

    Science.gov (United States)

    Sasaki, Masahide; Endo, Hiroyuki; Fujiwara, Mikio; Kitamura, Mitsuo; Ito, Toshiyuki; Shimizu, Ryosuke; Toyoshima, Morio

    2017-08-06

    Quantum communication and quantum cryptography are expected to enhance the transmission rate and the security (confidentiality of data transmission), respectively. We study a new scheme which can potentially bridge an intermediate region covered by these two schemes, which is referred to as quantum photonic network. The basic framework is information theoretically secure communications in a free space optical (FSO) wiretap channel, in which an eavesdropper has physically limited access to the main channel between the legitimate sender and receiver. We first review a theoretical framework to quantify the optimal balance of the transmission efficiency and the security level under power constraint and at finite code length. We then present experimental results on channel characterization based on 10 MHz on-off keying transmission in a 7.8 km terrestrial FSO wiretap channel.This article is part of the themed issue 'Quantum technology for the 21st century'. © 2017 The Author(s).

  10. Quantum photonic network and physical layer security

    Science.gov (United States)

    Sasaki, Masahide; Endo, Hiroyuki; Fujiwara, Mikio; Kitamura, Mitsuo; Ito, Toshiyuki; Shimizu, Ryosuke; Toyoshima, Morio

    2017-06-01

    Quantum communication and quantum cryptography are expected to enhance the transmission rate and the security (confidentiality of data transmission), respectively. We study a new scheme which can potentially bridge an intermediate region covered by these two schemes, which is referred to as quantum photonic network. The basic framework is information theoretically secure communications in a free space optical (FSO) wiretap channel, in which an eavesdropper has physically limited access to the main channel between the legitimate sender and receiver. We first review a theoretical framework to quantify the optimal balance of the transmission efficiency and the security level under power constraint and at finite code length. We then present experimental results on channel characterization based on 10 MHz on-off keying transmission in a 7.8 km terrestrial FSO wiretap channel. This article is part of the themed issue 'Quantum technology for the 21st century'.

  11. Output Force Enhancement of Scratch Drive Actuator in Low-Voltage Region by Using Flexible Joint

    Directory of Open Access Journals (Sweden)

    Shawn CHEN

    2010-04-01

    Full Text Available Here a low-voltage scratch drive actuator (LVSDA is proposed by incorporating flexible joint into the conventional SDA to improve performance in low-voltage region. Experimental results show that, at the same total plate length of 80 mm and width of 65 mm, the proposed LVSDA can be actuated as low as 40 V, much lower than 80 V, the minimum required input voltage of the conventional SDA. From finite element analysis by CosmosWorks, yielding effect is found to be a critical factor. Before yielding, LVSDA can provide better performance than SDA at the same input voltage. However, the yielding stress in flexible joint would limit the achievable maximum output force in high-voltage region. By varying joint length, width, or location, LVSDA is shown to be operated in low-voltage region where the conventional SDA can not be operated, and can still provide comparable performance as SDA in high-voltage region.

  12. Training Working Memory in Childhood Enhances Coupling between Frontoparietal Control Network and Task-Related Regions.

    Science.gov (United States)

    Barnes, Jessica J; Nobre, Anna Christina; Woolrich, Mark W; Baker, Kate; Astle, Duncan E

    2016-08-24

    Working memory is a capacity upon which many everyday tasks depend and which constrains a child's educational progress. We show that a child's working memory can be significantly enhanced by intensive computer-based training, relative to a placebo control intervention, in terms of both standardized assessments of working memory and performance on a working memory task performed in a magnetoencephalography scanner. Neurophysiologically, we identified significantly increased cross-frequency phase amplitude coupling in children who completed training. Following training, the coupling between the upper alpha rhythm (at 16 Hz), recorded in superior frontal and parietal cortex, became significantly coupled with high gamma activity (at ∼90 Hz) in inferior temporal cortex. This altered neural network activity associated with cognitive skill enhancement is consistent with a framework in which slower cortical rhythms enable the dynamic regulation of higher-frequency oscillatory activity related to task-related cognitive processes. Whether we can enhance cognitive abilities through intensive training is one of the most controversial topics of cognitive psychology in recent years. This is particularly controversial in childhood, where aspects of cognition, such as working memory, are closely related to school success and are implicated in numerous developmental disorders. We provide the first neurophysiological account of how working memory training may enhance ability in childhood, using a brain recording technique called magnetoencephalography. We borrowed an analysis approach previously used with intracranial recordings in adults, or more typically in other animal models, called "phase amplitude coupling." Copyright © 2016 Barnes et al.

  13. Evolving Regional Security in the Andean Region

    Science.gov (United States)

    2004-03-19

    Unidas para el Desarrollo (PNUD), Hacia el Objetivo del Milenio de Reducir la Pobreza en América Latina y el Caribe. (Naciones Unidas, February 2003...October 2003. Programa de las Naciones Unidas para el Desarrollo (PNUD), Hacia el Objetivo del Milenio de Reducir la Pobreza en América Latina y el

  14. The resolution of the All-Russia conference “Seismic security of a region and the impact of seismogeological and socioeconomic factors” (Kyzyl, Republic of Tuva, Russian Federation, November 17-18, 2015

    Directory of Open Access Journals (Sweden)

    . . .

    2016-02-01

    Full Text Available This is a brief summary of the All-Russia conference “Seismic security of a region and the impact of seismogeological and socioeconomic factors” held in Kyzyl, Republic of Tuva, Russian Federation on November 17-18, 2015. Also provided is the full text of the resolution adopted at the conference.

  15. INVESTMENT ACTIVITY OF AGRIBUSINESS IN THE AGROINDUSTRIAL COMPLEX REGION, AS ONE OF THE ELEMENTS OF THE FINANCIAL SECURITY OF THE AGRO-INDUSTRIAL COMPLEX OF THE STATE

    National Research Council Canada - National Science Library

    Olga Nikolaevna Uglitskikh; Yuliya Evgenevna Klishina

    2015-01-01

    ... the financial security of agrarian and industrial complex of the state depends. Limitation of own financial resources at agrarians does not allow them to realize independently conceived projects...

  16. Welfare and Social Security in the USSR in the Late 1950s – Early 1980s (on the Material of the Lower Volga Region

    Directory of Open Access Journals (Sweden)

    Gumenyuk Aleksey

    2014-12-01

    Full Text Available This paper is devoted to the analysis of the main directions of the social support for workers in the Lower Volga region in the late 1950s – early 1980s. The special attention is paid to creating the universal system of pension insurance for the Soviet people. The novelty of the study consists in the use of historical and anthropological approach allowing to trace the influence of the change in insurance bodies functioning on the life quality of pensioners and disabled people. The first part of the article is devoted to the period of 1953–1964, and it explores the ways of improving the quality of care of the disabled. The particular attention is paid to the study of the positive and negative results of social bodies’ work at the regional level. The ways of improving the quality of state social support for disabled people in 1965–1985 (the new stage of Soviet reforms is also investigated. The material in the article is organized according to the following scheme: firstly, the author analyzes the basic legislative acts of the State party in the field of social security, and, secondly, he describes the ways and the results of their implementation in the provinces. The author concludes that by Spring of 1985 the total social pension system was established in the country. The evidence proves that this system lacked the individual approach and the interests of some people were often not taken into account. This study is based on the vast set of factual materials from the archives, published sources and periodical press. The various aspects of this problem can be used in educational practice.

  17. Data Security in Biomedicine

    OpenAIRE

    Horňáková, Anna

    2011-01-01

    This thesis analyzes current state of use of biometrics in computer security. It provides an overview of the most commonly used anatomical-physiological and behavioral biometric identification methods. The result of the work will be a new set of methods, which allows reliable identification of the user in the most comfortable way. These new principles of data security will be used to enhance the protection of specialized health record. This will contribute to expansion of generally conceived ...

  18. Regional Security Application and Checkmate!

    Science.gov (United States)

    2000-04-01

    simulation of a limited nuclear exchange between India and Pakistan. This would result in humanitarian assistance conditions extremely different from... Medecins Sans Frontiers (MSF); International Medical Corps (IMC) - Both specialize in providing medical assistance. MSF began in France after the

  19. The SADC as a Security Community

    DEFF Research Database (Denmark)

    Mandrup, Thomas

    2008-01-01

    Collaboration within the area of security was from the outset one of the cornerstones of integration in Africa at both the regional and continental levels. This fitted in well with the regional power in southern Africa, namely South Africa, and its overall foreign-policy ambitions to create......: The objectives of SADC shall be to: a. promote sustainable and equitable economic growth and socioeconomic development that will ensure poverty alleviation with the ultimate objective of its eradication, enhance the standard and quality of life of the people of Southern Africa and support the socially...

  20. The Sea Stacks Project: Enhancing the Use of Regional Literature in Atlantic Canadian Schools

    Directory of Open Access Journals (Sweden)

    Vivian Howard

    2012-06-01

    Full Text Available Research over the past two decades has amply demonstrated the importance of literature to the formation of both regional and national cultural identity, particularly in the face of mass market globalization of children’s book publishing in the 21st century as well as the predominance of non-Canadian content from television, movies, books, magazines and internet media. However, Canadian children appear to have only very limited exposure to Canadian authors and illustrators. In Atlantic Canada, regional Atlantic Canadian authors and illustrators for children receive very limited critical attention, and resources for the study and teaching of Atlantic Canadian children’s literature are few. Print and digital information sources on regional children’s books, publishing, authors and illustrators are scattered and inconsistent in quality and currency. This research project directly addresses these key concerns by summarizing the findings of a survey of Atlantic Canadian teachers on their use of regional books. In response to survey findings, the paper concludes by describing the creation of the Sea Stacks Project an authoritative web-delivered information resource devoted to contemporary Atlantic Canadian literature for children and teens.

  1. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  2. Node security

    CERN Document Server

    Barnes, Dominic

    2013-01-01

    A practical and fast-paced guide that will give you all the information you need to secure your Node applications.If you are a developer who wishes to secure your Node applications, whether you are already using Node Security in production, or are considering using it for your next project, then this book will enable you to ensure security of your applications. An understanding of JavaScript is a prerequisite, and some experience with Node is recommended, though not required.

  3. Can Innovation Enhance Entrepreneurial Activities of a Region? An Analysis Utilizing the Entrepreneurial Remedy Model (EREM).

    OpenAIRE

    Abouzeedan, Adli; Edgar, Boo; Hedner, Thomas

    2010-01-01

    In contrast to the Entrepreneurial Recycling Model (EREC), the Entrepreneurial Remedy Model (EREM) demands an active role of innovation to create an environment where small and medium size companies (SMEs) are developed. The EREM may provide a conceptual platform which may explain why developed regions have succeeded in maintaining a healthy entrepreneurial environment, while the less developed have failed to do that. Further, the Open Innovation concept is brought into the discussion connect...

  4. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  5. The “Picardie en Forme” Network: Federating Regional Health-enhancing Sports Resources

    Science.gov (United States)

    Weissland, Thierry; Passavant, Éric; Allal, Aziz; Amiard, Valérie; Antczak, Boris; Manzo, Julie

    2016-06-08

    Initiated by the Regional Olympic and Sports Committee and the Regional Directorate of Youth, Sports and Social Cohesion, the “Picardie en Forme” network has been working since 2011 in favour of adults of all ages, with chronic noncommunicable or similar diseases, to encourage a gradual return to reassuring and perennial regular physical activity,. A first step consisted of organizing a care pathway based on two principles: inform general practitioners so that they can encourage their patients to be physically active by referring them to the network, develop a range of local sports by accrediting certain clubs with sports instructors who have been trained in the management of this specific population. In 2013, 121 users entered the network at the request of 61 doctors. 48 sports instructors were trained and 20 associations obtained the Picardie en Forme label. Comparison of the results of tests performed on entry in the network and then eight months later shows a general physical reconditioning of users, increasing their motivation and perceived physical value. However, despite these encouraging results, the network has difficulty retaining users, and maintaining the involvement of general practitioners and certain local partners. This article discusses the relevance of initial approaches and describes the changes made to sustain this regional network, which, for the first time, links sport, health and users.

  6. Efficient replication and expression of murine leukemia virus with major deletions in the enhancer region of U3

    DEFF Research Database (Denmark)

    Pedersen, K.; Lovmand, S.; Bonefeld-Jørgensen, Eva Cecilie

    1992-01-01

    The effect of deletions within the enhancer region in the U3 part of the LTR derived from the murine retrovirus Akv was studied. The deletions were stably transmitted through normal virus replication as shown by sequence analysis of cloned polymerase chain reaction product of the cDNA copy...... of the viral RNA. Genetic tagging of the retrovirus with lacO facilitated the analysis. Among the individual mutated LTRs an over 100-fold difference in a transient expression assay was previously detected. This difference was not revealed in studies of viral replication in cell culture, where the expression...

  7. Trithorax dependent changes in chromatin landscape at enhancer and promoter regions drive female puberty.

    Science.gov (United States)

    Toro, Carlos A; Wright, Hollis; Aylwin, Carlos F; Ojeda, Sergio R; Lomniczi, Alejandro

    2018-01-04

    Polycomb group (PcG) proteins control the timing of puberty by repressing the Kiss1 gene in hypothalamic arcuate nucleus (ARC) neurons. Here we identify two members of the Trithorax group (TrxG) of modifiers, mixed-lineage leukemia 1 (MLL1), and 3 (MLL3), as central components of an activating epigenetic machinery that dynamically counteracts PcG repression. Preceding puberty, MLL1 changes the chromatin configuration at the promoters of Kiss1 and Tac3, two genes required for puberty to occur, from repressive to permissive. Concomitantly, MLL3 institutes a chromatin structure that changes the functional status of a Kiss1 enhancer from poised to active. RNAi-mediated, ARC-specific Mll1 knockdown reduced Kiss1 and Tac3 expression, whereas CRISPR-Cas9-directed epigenome silencing of the Kiss1 enhancer selectively reduced Kiss1 activity. Both interventions delay puberty and disrupt reproductive cyclicity. Our results demonstrate that an epigenetic switch from transcriptional repression to activation is crucial to the regulatory mechanism controlling the timing of mammalian puberty.

  8. Plasmon-Waveguide Resonances with Enhanced Figure of Merit and Their Potential for Anisotropic Biosensing in the Near Infrared Region

    Directory of Open Access Journals (Sweden)

    Said Mahajna

    2016-01-01

    Full Text Available The TM and TE guided modes in the coupled plasmon-waveguide resonance configuration are investigated in the spectral domain. Here we use the modes dispersion to study their capability for sensing in the near infrared region. It is shown that the spectral widths of the guided modes are, at least, one order of magnitude smaller than the conventional surface plasmon resonance counterpart. The enhanced sensitivity and figure of merit of the guided modes reveal their potential for sensing in the spectral interrogation method where the traditional configurations are inherently limited. Moreover, the high resolution associated with the narrow resonances and the polarization dependence make these modes very promising for anisotropic biosensing in the spectral interrogation approach. The extremely high figure of merit, large penetration depth, and propagation distance in the near infrared region open the possibility of combining the plasmon-waveguide configuration with absorption spectroscopy techniques for molecular recognition.

  9. Telmisartan in the diabetic murine model of acute myocardial infarction: dual contrast manganese-enhanced and delayed enhancement MRI evaluation of the peri-infarct region.

    Science.gov (United States)

    Toma, Ildiko; Kim, Paul J; Dash, Rajesh; McConnell, Michael V; Nishimura, Dwight; Harnish, Phillip; Yang, Phillip C

    2016-02-05

    A novel MRI technique, employing dual contrast manganese-enhanced MRI (MEMRI) and delayed enhancement MRI (DEMRI), can evaluate the physiologically unstable peri-infarct region. Dual contrast MEMRI-DEMRI enables comprehensive evaluation of telmisartan to salvage the peri-infarct injury to elucidate the underlying mechanism of restoring the ischemic cardiomyopathy in the diabetic mouse model. Dual contrast MEMRI-DEMRI was performed on weeks 1, 2, and 4 following initiation of telmisartan treatment in 24 left anterior descendent artery ligated diabetic mice. The MRI images were analyzed for core infarct, peri-infarct, left ventricular end-diastolic, end-systolic volumes, and the left ventricular ejection fraction (LVEF). Transmission electron microscopy (TEM) and real-time PCR were used for ex vivo analysis of the myocardium. Telmisartan vs. control groups demonstrated significantly improved LVEF at weeks 1, 2, and 4, respectively (33 ± 7 %*** vs. 19 ± 5 %, 29 ± 3 %*** vs. 22 ± 4 %, and 31 ± 2 %*** vs 18 ± 6 %, ***p infarct injury. Telmisartan group significantly salvaged the peri-infarct injury. The myocardial effects were validated by TEM, which confirmed the presence of the injured but viable cardiomyocyte morphology in the peri-infarct region and by flow cytometry of venous blood, which demonstrated significantly increased circulating endothelial progenitor cells (EPCs). The improved cardiac function in ischemic cardiomyopathy of diabetic mice by telmisartan is attributed to the attenuation of the peri-infarct injury by the angiogenic effects of EPCs to salvage the injured cardiomyocytes. Dual-contrast MEMRI-DEMRI technique tracked the therapeutic effects of telmisartan on the injured myocardium longitudinally.

  10. Carbon-Nanotube-Enhanced Thermal Contactor in Low Contact Pressure Region

    Science.gov (United States)

    Tsukamoto, Takashiro; Esashi, Masayoshi; Tanaka, Shuji

    2010-07-01

    We first demonstrated considerable reduction of thermal contact resistance (TCR) of a bending thermal contactor in microscale using carbon nanotubes (CNTs). TCR reduction using CNTs were previously reported with flat contact surface, but the thermal contact surfaces of actual microdevices often bend because of their residual and thermal stress. We evaluated both flat and bending contact surfaces to apply this method for a variety of applications. The TCR reduction is observed not only with a flat contact surface but also a bending surface. A bending micro thermal contactor with a plasma-enhanced chemical vapor deposition (PECVD)-grown 10 µm long “CNT carpet” shows a TCR of ca. 600 mm2 K/W at a contact pressure of 20 kPa, which is about 1/10 to the TCR of the reference contactor without “CNT carpet”. This technique is useful for micro thermal devices such as micro thermal switch.

  11. CONTRACT SYSTEM AS A WAY TO ENHANCE THE EFFICIENCY OF BUDGET SPENDING IN THE ULYANOVSK REGION

    Directory of Open Access Journals (Sweden)

    Elmira Rustamovna Burnasheva

    2014-11-01

    Full Text Available The article investigates the mechanism of implementation of public procurement at the present stage, which is one of the main instruments of state policy of regulation of social and economic development of the country. Described the main stages of the implementation of the procurement of goods, works and services for state and municipal needs, and highlighted the main objectives of inculcation new approaches to the organization of the procurement process in the Russian Federation.The aim of the study was to examine what impact the implementation of the contract system on the effectiveness of budget spending using the health sector in the Ulyanovsk region as an example. In all, the study analyzed the changes in the legislation governing the contract system, identified improvements that should contribute to budget savings and also determined the amount of savings of the budget of the Ulyanovsk region in health care sector on the basis of the procedures performed on the procurement of goods, work and services for state and municipal needs.

  12. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  13. Coupling a regional warning system to a semantic engine on online news for enhancing landslide prediction

    Science.gov (United States)

    Battistini, Alessandro; Rosi, Ascanio; Segoni, Samuele; Catani, Filippo; Casagli, Nicola

    2017-04-01

    Landslide inventories are basic data for large scale landslide modelling, e.g. they are needed to calibrate and validate rainfall thresholds, physically based models and early warning systems. The setting up of landslide inventories with traditional methods (e.g. remote sensing, field surveys and manual retrieval of data from technical reports and local newspapers) is time consuming. The objective of this work is to automatically set up a landslide inventory using a state-of-the art semantic engine based on data mining on online news (Battistini et al., 2013) and to evaluate if the automatically generated inventory can be used to validate a regional scale landslide warning system based on rainfall-thresholds. The semantic engine scanned internet news in real time in a 50 months test period. At the end of the process, an inventory of approximately 900 landslides was set up for the Tuscany region (23,000 km2, Italy). The inventory was compared with the outputs of the regional landslide early warning system based on rainfall thresholds, and a good correspondence was found: e.g. 84% of the events reported in the news is correctly identified by the model. In addition, the cases of not correspondence were forwarded to the rainfall threshold developers, which used these inputs to update some of the thresholds. On the basis of the results obtained, we conclude that automatic validation of landslide models using geolocalized landslide events feedback is possible. The source of data for validation can be obtained directly from the internet channel using an appropriate semantic engine. We also automated the validation procedure, which is based on a comparison between forecasts and reported events. We verified that our approach can be automatically used for a near real time validation of the warning system and for a semi-automatic update of the rainfall thresholds, which could lead to an improvement of the forecasting effectiveness of the warning system. In the near future

  14. Security modeling technique: Visualizing information of security plans

    OpenAIRE

    Ley, D.; Dalinger, E.

    2011-01-01

    Since the terrorist attacks of 11th September 2001 efforts are made to enhance the security standards in maritime shipping. The joint research project VESPER (improving the security of passengers on ferries) funded by the German Federal Ministry of Education and Research (BMBF) addresses among others the investigation of sea- and landside measures and processes. One of the results of the ongoing analysis phase is that the current representation of information in security plans can hardly be u...

  15. Railway infrastructure security

    CERN Document Server

    Sforza, Antonio; Vittorini, Valeria; Pragliola, Concetta

    2015-01-01

    This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railway infrastructure security. Based on analyses by academics, technology providers, and railway operators, it explains how to assess terrorist and criminal threats, design countermeasures, and implement effective security strategies. In so doing, it draws upon a range of experiences from different countries in Europe and beyond. The book is the first to be devoted entirely to this subject. It will serve as a timely reminder of the attractiveness of the railway infrastructure system as a target for criminals and terrorists and, more importantly, as a valuable resource for stakeholders and professionals in the railway security field aiming to develop effective security based on a mix of methodological, technological, and organizational tools. Besides researchers and decision makers in the field, the book will appeal to students interested in critical infrastructur...

  16. Different Regions of Hepatitis B Virus X Protein Are Required for Enhancement of bZip-Mediated Transactivation versus Transrepression

    Science.gov (United States)

    Barnabas, Sangeeta; Andrisani, Ourania M.

    2000-01-01

    The hepatitis B virus X protein (pX) interacts directly with the bZip transactivator CREB and the bZip repressors ICERIIγ and ATF3, increasing their DNA-binding affinity in vitro and their transcriptional efficacy in vivo. However, the mechanism of bZip-pX interaction and of the pX-mediated increase in the bZip transcriptional efficacy remains to be understood. In this study with deletion mutants of pX, we delineated a 67-amino-acid region spanning residues 49 to 115 required for direct CREB, ATF3, and ICER IIγ interaction in vitro and in vivo and increased bZip/CRE binding in vitro. Transient transfections of the pX deletion mutants in AML12 hepatocytes demonstrate that pX49–115 is as effective as the full-length pX in enhancing the ATF3- and ICERIIγ-mediated transrepression. However, this pX region is inactive in increasing the transactivation efficacy of CREB; additional amino acid residues present in pX49–140 are required to mediate the increased transactivation efficacy of CREB in vivo. This requirement for different regions of pX in affecting CREB transactivation suggests that amino acid residues 115 to 140 integrate additional events in effecting pX-mediated transactivation, such as concomitant interactions with select components of the basal transcriptional apparatus. PMID:10590094

  17. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  18. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  19. New PBO GPS Station Construction: Eastern Region Network Enhancements and Multiple-Monument Stability Comparisons

    Science.gov (United States)

    Dittmann, S. T.; Austin, K. E.; Berglund, H. T.; Blume, F.; Feaux, K.; Mann, D.; Mattioli, G. S.; Walls, C. P.

    2013-12-01

    The Plate Boundary Observatory (PBO) network consists of 1100 continuously operating, permanent GPS stations throughout the United States. The majority of this network was constructed using NSF-MREFC funding as part of the EarthScope Project during FY2003-FY2008. Since FY2009, UNAVCO has operated and maintained PBO through a Cooperative Agreement (CA) with NSF. Construction of new, permanent GPS monuments in the PBO network was the result of two change orders to the original PBO O&M CA. Change Order 33 (CO33) allocated funds to construct additional GPS stations at six locations in the Eastern Region of PBO. Three of these locations were designed to replace poorly performing existing GPS monuments in Georgia, Texas and New York. The remaining three new locations were selected to fill in gaps in network coverage in Pennsylvania, Wisconsin and North Dakota. Construction of all six new sites was completed in September 2013. Important scientific goals for CO33 include improvement of the stable North American reference frame, measurement of the vertical signal associated with the Glacial Isostatic Adjustment, and improved constraints on surface deformation and possible earthquakes, which occur in the low-strain tectonic setting of the eastern North American Plate. Change Order 35 (CO35) allocated funds to construct two additional geodetic monuments at five existing PBO stations in order to test and compare the long-term stability of various monument designs under near-identical geologic conditions. Sites were chosen to yield a variety of geographic, hydrologic and geologic conditions, including both fine-grained alluvium and crystalline bedrock. At each location, three different monuments (deep drill braced, short drill braced/driven-braced, mast/pillar) were built with 10 meter spacing, with shared power systems and data telemetry infrastructure. Construction of these multi-monument test locations began in October 2012 and finished in September 2013. See G010- Berglund

  20. ENHANCEMENT OF TERRESTRIAL CARBON SINKS THROUGH RECLAMATION OF ABANDONED MINE LANDS IN THE APPALACHIAN REGION

    Energy Technology Data Exchange (ETDEWEB)

    Gary D. Kronrad

    2002-12-01

    The U.S.D.I. Office of Surface Mining (OSM) estimates that there are approximately 1 million acres of abandoned mine land (AML) in the Appalachian region. AML lands are classified as areas that were inadequately reclaimed or were left unreclaimed prior to the passage of the 1977 Surface Mining Control and Reclamation Act, and where no federal or state laws require any further reclamation responsibility to any company or individual. Reclamation and afforestation of these sites have the potential to provide landowners with cyclical timber revenues, generate environmental benefits to surrounding communities, and sequester carbon in the terrestrial ecosystem. Through a memorandum of understanding, the OSM and the U.S. Department of Energy (DOE) have decided to investigate reclaiming and afforesting these lands for the purpose of mitigating the negative effects of anthropogenic carbon dioxide in the atmosphere. This study determined the carbon sequestration potential of northern red oak (Quercus rubra L.), one of the major reclamation as well as commercial species, planted on West Virginia AML sites. Analyses were conducted to (1) calculate the total number of tons that can be stored, (2) determine the cost per ton to store carbon, and (3) calculate the profitability of managing these forests for timber production alone and for timber production and carbon storage together. The Forest Management Optimizer (FORMOP) was used to simulate growth data on diameter, height, and volume for northern red oak. Variables used in this study included site indices ranging from 40 to 80 (base age 50), thinning frequencies of 0, 1, and 2, thinning percentages of 20, 25, 30, 35, and 40, and a maximum rotation length of 100 years. Real alternative rates of return (ARR) ranging from 0.5% to 12.5% were chosen for the economic analyses. A total of 769,248 thinning and harvesting combinations, net present worths, and soil expectation values were calculated in this study. Results indicate that