WorldWideScience

Sample records for environmental security technology

  1. Nevada National Security Site Environmental Report 2013

    Energy Technology Data Exchange (ETDEWEB)

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  2. Updating energy security and environmental policy: Energy security theories revisited.

    Science.gov (United States)

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  3. Environmental security and sustainable development

    International Nuclear Information System (INIS)

    Kok, M.T.J.

    1996-01-01

    Environmental security has become an important problem area for the social sciences and is becoming a key concept in long-term environmental policy and global environmental change issues. In taking Environmental Security on board, the International Human Dimensions Programme (IHDP) intends to stimulate research on approaches to solve global environmental issues, responses to climate change, food and water security, extreme weather events, etc. Both the Netherlands and Canadian HDP committee have placed environmental security and sustainable development on their national agendas. However, a research agenda for the role of social sciences in environmental security and societal impacts of global change has not been sufficiently elaborated yet, except for economic research on the impacts of climate change. This was the main reason for holding the title workshop. The aims of the workshop were: (1) to define environmental security as a research theme; (2) to explore the research agenda on environmental security for the social sciences; and (3) to establish and reinforce (inter)national research networks in this field. Two papers served as input for the participants of the workshop. First, in the Scoping Report Global Environmental Change and Human Security a brief overview is given of research conducted so far, as well as a working plan for the recently formed ad hoc Working Group on Environmental Security and Global Environmental Change. Secondly, the preliminary results of a programming study on Environmental Security and the societal impacts of climate change are presented. Special attention was given to the involvement of policymakers in the workshop. figs., tabs., 3 appendices, refs

  4. Nevada National Security Site Environmental Report 2011

    International Nuclear Information System (INIS)

    Wills, Cathy

    2012-01-01

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  5. Nevada National Security Site Environmental Report 2011

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  6. Nevada National Security Site Environmental Report 2016

    Energy Technology Data Exchange (ETDEWEB)

    Wills (editor), Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    This Nevada National Security Site Environmental Report (NNSSER) was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2016 at the Nevada National Security Site (NNSS) and its two Nevada-based support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). NNSA/NFO directs the management and operation of the NNSS and six sites across the nation. In addition to the NNSA itself, the six sites include two in Nevada (NLVF and RSL-Nellis) and four in other states (RSL-Andrews in Maryland, Livermore Operations in California, Los Alamos Operations in New Mexico, and Special Technologies Laboratory in California). Los Alamos, Lawrence Livermore, and Sandia National Laboratories are the principal organizations that sponsor and implement the nuclear weapons programs at the NNSS. National Security Technologies, LLC (NSTec), is the current Management and Operating contractor accountable for the successful execution of work and ensuring that work is performed in compliance with environmental regulations. The six sites all provide support to enhance the NNSS as a location for its multiple

  7. Practice brief. Securing wireless technology for healthcare.

    Science.gov (United States)

    Retterer, John; Casto, Brian W

    2004-05-01

    Wireless networking can be a very complex science, requiring an understanding of physics and the electromagnetic spectrum. While the radio theory behind the technology can be challenging, a basic understanding of wireless networking can be sufficient for small-scale deployment. Numerous security mechanisms are available to wireless technologies, making it practical, scalable, and affordable for healthcare organizations. The decision on the selected security model should take into account the needs for additional server hardware and administrative costs. Where wide area network connections exist between cooperative organizations, deployment of a distributed security model can be considered to reduce administrative overhead. The wireless approach chosen should be dynamic and concentrate on the organization's specific environmental needs. Aspects of organizational mission, operations, service level, and budget allotment as well as an organization's risk tolerance are all part of the balance in the decision to deploy wireless technology.

  8. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  9. Nevada National Security Site Environmental Report 2012

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy

    2013-09-11

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is

  10. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  11. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  12. Energy technology evaluation report: Energy security

    Science.gov (United States)

    Koopman, R.; Lamont, A.; Schock, R.

    1992-09-01

    Energy security was identified in the National Energy Strategy (NES) as a major issue for the Department of Energy (DOE). As part of a process designed by the DOE to identify technologies important to implementing the NES, an expert working group was convened to consider which technologies can best contribute to reducing the nation's economic vulnerability to future disruptions of world oil supplies, the working definition of energy security. Other working groups were established to deal with economic growth, environmental quality, and technical foundations. Energy Security working group members were chosen to represent as broad a spectrum of energy supply and end-use technologies as possible and were selected for their established reputations as experienced experts with an ability to be objective. The time available for this evaluation was very short. The group evaluated technologies using criteria taken from the NES which can be summarized for energy security as follows: diversifying sources of world oil supply so as to decrease the increasing monopoly status of the Persian Gulf region; reducing the importance of oil use in the US economy to diminish the impact of future disruptions in oil supply; and increasing the preparedness of the US to deal with oil supply disruptions by having alternatives available at a known price. The result of the first phase of the evaluation process was the identification of technology groups determined to be clearly important for reducing US vulnerability to oil supply disruptions. The important technologies were mostly within the high leverage areas of oil and gas supply and transportation demand but also included hydrogen utilization, biomass, diversion resistant nuclear power, and substitute industrial feedstocks.

  13. New technologies and the search for security: Prospects for a post-cold-war era

    International Nuclear Information System (INIS)

    Brown, G.E. Jr.

    1990-01-01

    Technology alone will not solve our many environmental, economic and military problems. The search for peace and security must be based on a concept of international security that extends beyond the bounds of military concerns and into the realm of environmental and economic matters. In our efforts to understand how science and technology fit within this security context, we should not look simply at emerging technologies, even those that are sustainable and stabilizing, as being the principal candidates for drastic improvements in peace and security on our planet. One must keep in mind that security for as many as one fourth to one half of the world's inhabitants would be revolutionized if they had access to some of the most basic existing technologies of our times. Equitable access to resources and technology is an age-old problem. Today it must be faced on a global basis. It demands creating a new world economic order that combines the best that the capitalist and socialist economies can offer. We must declare today that a secure global society cannot exist which is half in slavery to poverty and deprived of opportunity, and half free to develop its potential and achieve its dreams

  14. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  15. New technologies and the search for security: Prospects for a post-cold-war era

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Jr, G E

    1991-12-31

    Technology alone will not solve our many environmental, economic and military problems. The search for peace and security must be based on a concept of international security that extends beyond the bounds of military concerns and into the realm of environmental and economic matters. In our efforts to understand how science and technology fit within this security context, we should not look simply at emerging technologies, even those that are sustainable and stabilizing, as being the principal candidates for drastic improvements in peace and security on our planet. One must keep in mind that security for as many as one fourth to one half of the world`s inhabitants would be revolutionized if they had access to some of the most basic existing technologies of our times. Equitable access to resources and technology is an age-old problem. Today it must be faced on a global basis. It demands creating a new world economic order that combines the best that the capitalist and socialist economies can offer. We must declare today that a secure global society cannot exist which is half in slavery to poverty and deprived of opportunity, and half free to develop its potential and achieve its dreams

  16. Technology Empowerment: Security Challenges.

    Energy Technology Data Exchange (ETDEWEB)

    Warren, Drake Edward [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backus, George A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Wendell [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nelson, Thomas R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Skocypec, Russell D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-03-01

    Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment will continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.

  17. Security force effectiveness and technology

    International Nuclear Information System (INIS)

    Seaton, M.B.

    1988-01-01

    No one would propose ineffective security forces. Applied technology always has, as its purpose, to increase effectiveness. Evidence exists, however, that poorly conceived or executed technological solutions can actually do more harm than good. The author argues for improved human factor considerations in physical security applied technology -- especially in the area of security console operations

  18. Performance Testing of Homeland Security Technologies in U.S. EPA's Environmental Technology Verification (ETV) Program

    National Research Council Canada - National Science Library

    Kelly, Thomas J; Hofacre, Kent C; Derringer, Tricia L; Riggs, Karen B; Koglin, Eric N

    2004-01-01

    ... (reports and test plans available at www.epa.gov/etv). In the aftermath of the terrorist attacks of September 11, 2001, the ETV approach has also been employed in performance tests of technologies relevant to homeland security (HS...

  19. The Use of Space Technology for Environmental Security, Disaster Rehabilitation and Sustainable Development in Afghanistan and Iraq

    Science.gov (United States)

    Lovett, Kian

    Since the dawn of time, humans have engaged in war. In the last 5,600 years of recorded history 14,600 wars have been waged1. The United Nations has sought to save succeeding generations from the scourge of war and to foster peace. Wars have recently taken place in Afghanistan and Iraq. Both countries are now faced with a range of complex problems. In-depth country assessments reveal significant shortcomings in the areas of water, sanitation, health, security and natural resource management. These are key factors when examining environmental security, sustainable development and trans-boundary problems, all of which are issues relevant to the Middle East and Central Asian states. Space technology can be applied to support the reconstruction and development plans for Afghanistan and Iraq; however, there needs to be an investigation and open discussion of how these resources can best be used. Already, agencies within the United Nations possess considerable expertise in the use of space technologies in the area of disaster management. If this capability is to be used, there will need to be inter-agency coordination, not to mention a further expansion and development of the United Nations role in both Afghanistan and Iraq.

  20. Security technology discussion for emergency command system of nuclear power plant

    International Nuclear Information System (INIS)

    Liu Zhenjun

    2014-01-01

    Nuclear power plant emergency command system can provide valuable data for emergency personnel, such as the unit data, weather data, environmental radiation data. In the course of emergency response, the emergency command system provides decision support to quickly and effectively control and mitigate the consequences of the nuclear accident, to avoid and reduce the dose received by staff and the public, to protect the environment and the public. There are high performance requirements on the security of the system and the data transmission. Based on the previous project and new demand after the Fukushima incident, the security technology design of emergency system in nuclear power plant was discussed. The results show that the introduction of information security technology can effectively ensure the security of emergency systems, and enhance the capacity of nuclear power plant to deal with nuclear accidents. (author)

  1. Emerging environmental technologies and environmental technology policy

    Science.gov (United States)

    Clarke, Leon Edward

    This dissertation explores the role and design of environmental technology policy when environmental innovation is embodied in emerging environmental technologies such as photovoltaic cells or fuel cells. The dissertation consists of three individual studies, all of which use a simplified, general model industry between an emerging environmental technology and an entrenched, more-polluting technology. It clarifies the situations in which environmental technology policy can achieve high welfare and those in which it cannot; and it separates the possible situations an emerging environmental technology might face into four scenarios, each with its own technology policy recommendations. The second study attempts to clarify which of two factors is having a larger limiting effect on private investment in photovoltaics: the failure to internalize the environmental costs of fossil fuel electricity generation or a broad set of innovation market failures that apply to innovation irrespective of environmental concerns. The study indicates that innovation market failures are probably having a significantly larger impact than incomplete internalization. The third study explores the effectiveness of adoption subsidies at encouraging private-sector innovation. The conclusion is that adoption subsidies probably have only a limited effect on long-term, private-sector research. Two important general conclusions of the dissertation are (1) that optimal technology policy should begin with technology-push measures and end with demand-pull measures; and (2) that the technological response to internalization instruments, such as emissions taxes, may be highly nonlinear.

  2. THE ENERGY COMPONENT OF THE ENVIRONMENTAL SECURITY: UKRAINE IN THE MIRROR

    Directory of Open Access Journals (Sweden)

    G. Kharlamova

    2015-03-01

    Full Text Available Energy security is important for any state. It is important for the state’s environment and economy. Ukraine is an energy dependent state, as well as an import-energy dependent one. The paper is devoted to the statistical analyses of Ukrainian energy sector from the position of its world representation. The purpose of this research is on the base of statistical analysis of current internal and external trends in the energy sector of Ukraine to consider possible mechanisms to stimulate and accelerate environmental-friendly energy security of Ukraine. Main objectives: to trace the dynamics of world and Ukrainian main energy indicators in the synergy with the state energy security index; to cluster launched efficiency-targeted energy projects in Ukraine in geoindustry aspect. Analyses of dynamics of energetic vs environmental performance of Ukraine in 2000–2014 world ranks shows that being in low segment of world rankings on aspects of energy and environmental security, Ukraine shows positive tendencies to the improvement, however with slow steps. In order to identify the most promising and most attractive sector of the economy in Ukraine to investors we held grouping of current launching energy-efficient projects in the aspect of industries and sectors where energy-efficient technologies operate. The rank analyses depicted that the most popular among economic sectors for energyefficiency investments are enterprises of agriculture and consumer goods industry, and the most attractive regions of Ukraine for implementation of investments in energy efficient technologies are Ivano-Frankivsk, Luhansk and Kherson oblasts.

  3. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  4. Nevada National Security Site Environmental Report Summary 2016

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    This document is a summary of the full 2016 Nevada National Security Site Environmental Report (NNSSER) prepared by the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/ NFO). This summary provides an abbreviated and more readable version of the full NNSSER. NNSA/NFO prepares the NNSSER to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the Nevada National Security Site (NNSS) to protect the public and the environment from radiation hazards and from potential nonradiological impacts. It is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. The NNSS is currently the nation’s unique site for ongoing national security–related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access as well as by lands that are open to public entry. In 2016, National Security Technologies, LLC (NSTec), was the NNSS Management and Operations Contractor accountable for ensuring work was performed in compliance with environmental regulations. NNSS activities in 2016 continued to be diverse, with the primary goal to ensure that the existing U.S. stockpile of nuclear weapons remains safe and reliable. Other activities included weapons of mass destruction first responder training; the controlled release of hazardous material at the Nonproliferation Test and Evaluation Complex (NPTEC); remediation of legacy contamination sites; characterization of waste destined for the Waste Isolation Pilot Plant in Carlsbad, New Mexico, or the Idaho National Laboratory in Idaho Falls, Idaho; disposal of low-level and mixed low-level radioactive waste; and environmental research. Facilities and

  5. National Security Technology Incubator Evaluation Process

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  6. Smart Card Security; Technology and Adoption

    OpenAIRE

    Hamed Taherdoost; Shamsul Sahibuddin; Neda Jalaliyoon

    2011-01-01

    Newly, smart card technology are being used in a number of ways around the world, on the otherhand, security has become significant in information technology, especially in those applicationinvolving data sharing and transactions through the internet. Furthermore, researches ininformation technology acceptance have identified the security as one of the factor that caninfluence on smart card adoption. This research is chiefly to study the security principals of smartcard and assess the securit...

  7. Theoretical Aspects of Analysis of International Environmental Security

    Directory of Open Access Journals (Sweden)

    Juliya A. Rusakova

    2015-01-01

    Full Text Available Abstract: International environmental security is a very hot contemporary issue of world politics, which in a large part defines the future of our environment. Dealing with this issue is of outmost importance since its failure will render all other issues and challenges as negligible. The article examines the theoretical aspects of solving the problem of environmental security. In particular, it analyzes the problem of negative social externalities, and the related concept of "tragedy of the commons." These problems create a fundamental obstacle to the implementation of environmental security at the global level. Traditionally, the problem of externalities in the environmental field have been approached economically, states and their manufacturers were to pay for the externalities in the form of additional taxes. However, experience shows that the economic tools of dealing with environmental security are not effective. The author suggests alternative non-economic approaches: strengthening and developing the system of permanent institutions of international negotiations on environmental security and promotion of environmental awareness. Solving the acute environmental problems is impossible without a change of the political philosophy of the ruling elites in most states.

  8. HEMISPHERIC CENTER FOR ENVIRONMENTAL TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    M.A. Ebadian

    1999-04-30

    The final data package has been completed for the Mississippi State University, DIAL FTP Wall Depth Removal Characterization Technology. The package has been sent to DIAL for comments. Work is progressing on completing the transfer of glove boxes and tanks from Rocky Flats to FIU-HCET for the purpose of performing size reduction technology assessments. Vendors are being identified and security measures are being put in place to meet the High Risk Property criteria required by Rocky Flats. The FIU-HCET Technology Assessment Program has been included as one of 11 verification programs across the US and Canada described in the Interstate Technology Regulatory Cooperation (ITRC) document, ''Multi-state Evaluation of Elements Important to the Verification of Remediation Technologies'', dated January 1999. FIU-HCET will also participate in a panel discussion on technology verification programs at the International Environmental Technology Expo '99.

  9. Marine data security based on blockchain technology

    Science.gov (United States)

    Yang, Zhao; Xie, Weiwei; Huang, Lei; Wei, Zhiqiang

    2018-03-01

    With the development of marine observation technology and network technology, the volume of marine data growing rapidly. This brings new challenges for data storage and transmission. How to protect data security of marine big data has become an urgent problem. The traditional information security methods’ characteristic is centralization. These technologies cannot provide whole process protection, e.g., data storage, data management and application of data. The blockchain technology is a novel technology, which can keep the data security and reliability by using decentralized methodology. It has aroused wide interest in the financial field. In this paper, we describe the concept, characteristics and key technologies of blockchain technology and introduce it into the field of marine data security.

  10. Human resource development program for nuclear safety and security in Tokyo Institute of Technology

    International Nuclear Information System (INIS)

    Han, Chi Young; Sagara, Hiroshi; Nagasaka, Hideo

    2014-01-01

    The Academy for Global Nuclear Safety and Security Agent was established at Tokyo Institute of Technology in 2011, to develop global nuclear human resources in the field of 3S (Safety, Security, and Safeguards) as a Program for Leading Graduate Schools supported by MEXT (Ministry of Education, Culture, Sports, Science and Technology). New courses of nuclear safety and security were developed in addition to the existing nuclear engineering program; 1) Environmental Dynamics of Radioactive Nuclides; Numerical simulation of the environmental dispersion of radioactive materials released from hypothetical nuclear accidents and evaluation of the public exposure are performed, by using a computer-based emergency response system, to have students predict the environmental dispersion of radionuclides and radiological consequence by nuclear accidents. 2) Measurement of Environmental Radiation; Students acquire hands-on experiences measuring environmental radiation contamination caused by the nuclear accident in Fukushima with multiple types of radiation detectors. Environmental samples are collected and analyzed for isotope identification and its spatial distribution. 3) Simulation of Severe Nuclear Accidents; The evaluation results of Fukushima accident progression are discussed as well as typical sever accidents that threaten the integrity of reactor vessel. Students simulate BWR (Boiling Water Cooled Reactor) transients, design basis accidents, and severe accidents by using simulators. 4) Nuclear Security Training; Design of physical protection systems, its fundamental physics, and regulatory frameworks are covered and students gain the practical experiences by use of intrusion detection systems at JAEA (Japan Atomic Energy Agency), and by numerical simulation of hydro-dynamics of structure material and nuclear material criticality at the university. (author)

  11. Enterprise security IT security solutions : concepts, practical experiences, technologies

    CERN Document Server

    Fumy, Walter

    2013-01-01

    Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr

  12. Information security foundations, technologies and applications

    CERN Document Server

    Awad, Ali Ismail; Fairhurst, Michael

    2018-01-01

    This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security.

  13. Information technology security system engineering methodology

    Science.gov (United States)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  14. Building secure network by integrated technology

    International Nuclear Information System (INIS)

    An Dehai; Xu Rongsheng; Liu Baoxu

    2000-01-01

    The author introduces a method which can realize the most powerful network security prevention by the network security integrated technologies such as firewall, realtime monitor, network scanner, Web detection and security, etc

  15. Internet security technologies

    CERN Multimedia

    CERN. Geneva

    2003-01-01

    The three pillars of Internet Security are Infrastructure, Applications and People. In this series of lectures we will examine those three pillars and how vital it is for individuals to understand the vulnerabilities of this technology so they can made informed decisions about risks and how they can reduce those risks for themselves and their colleagues.First we will focus on the infrastructure: network; servers; operating systems and all those things that are mostly invisible. Moving up a level, into the visible realm, we discuss the application and see things like buffer overflows, viruses and how as application developers and users we can protect ourselves. Finally, it's all about people. The strongest security technology in the world is easily defeated if people don't understand their role in the whole system.

  16. Facing global environmental change. Environmental, human, energy, food, health and water security concepts

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); AFES-Press, Mosbach (Germany); Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Cuernavaca, MOR (MX). Centro Regional de Investigaciones Multidiscipinarias (CRIM); United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); Grin, John [Amsterdam Univ. (Netherlands). Amsterdam School for Social Science Research; Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Kameri-Mbote, Patricia [Nairobi Univ. (Kenya). School of Law; International Environmental Law Research Centre, Nairobi (Kenya); Behera, Navnita Chadha [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Tunis-Carthage Univ., Hammam-Chatt (Tunisia); Krummenacher, Heinz (eds.) [swisspeace, Bern (Switzerland). FAST International

    2009-07-01

    This policy-focused, global and multidisciplinary security handbook on Facing Global Environmental Change addresses new security threats of the 21st century posed by climate change, desertification, water stress, population growth and urbanization. These security dangers and concerns lead to migration, crises and conflicts. They are on the agenda of the UN, OECD, OSCE, NATO and EU. In 100 chapters, 132 authors from 49 countries analyze the global debate on environmental, human and gender, energy, food, livelihood, health and water security concepts and policy problems. In 10 parts they discuss the context and the securitization of global environmental change and of extreme natural and societal outcomes. They suggest a new research programme to move from knowledge to action, from reactive to proactive policies and to explore the opportunities of environ-mental cooperation for a new peace policy. (orig.)

  17. Nevada National Security Site Environmental Report 2012 Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy A

    2013-09-11

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  18. Nevada National Security Site Environmental Report 2016, Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2016 (prepared by National Security Technologies, LLC [NSTec], 2017). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological settings and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  19. Nevada National Security Site Environmental Report 2013 Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    Wills, C.

    2014-09-09

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  20. Technological challenges for boosting coal production with environmental sustainability.

    Science.gov (United States)

    Ghose, Mrinal K

    2009-07-01

    The global energy requirement has grown at a phenomenon rate and the consumption of primary energy sources has been a very high positive growth. This paper focuses on the consumption of different primary energy sources and it identifies that coal will continue to remain as the prime energy source in foreseeable future. It examines the energy requirement perspective for India and demand of coal as the prime energy source. Economic development and poverty alleviation depend on securing affordable energy sources and Indian coal mining industry offers a bright future for the country's energy security, provided the industry is allowed to develop by supportive government policies and adopts latest technologies for mining. It is an irony that in-spite of having a plentiful reserves, India is not able to jack up coal production to meet its current and future demand. It discusses the strategies to be adopted for growth and meeting the coal demand. But such energy are very much concerned with environmental degradation and must be driven by contemporary managerial acumen addressing environmental and social challenges effectively The paper highlights the emissions of greenhouse gases due to burning of fossil fuels and environmental consequences of global warming and sea-level rise. Technological solutions for environment friendly coal mining and environmental laws for the abatement of environmental degradation are discussed in this paper.

  1. The DOE safeguards and security technology development program

    International Nuclear Information System (INIS)

    Cherry, R.C.; Wheelock, A.J.

    1991-01-01

    This paper reports that strategic planning for safeguards and security within the Department of Energy emphasizes the contributions of advanced technologies to the achievement of Departmental protection program goals. The Safeguards and Security Technology Development Program provides state-of-the-art technologies, systems and technical services in support of the policies and programmatic requirements for the protection of Departmental assets. The Program encompasses research and development in physical security, nuclear material control and accountability, information security and personnel security, and the integration of these disciplines in advanced applications. Technology development tasks serve goals that range from the maintenance of an effective technology base to the development, testing and evaluation of applications to meet field needs. A variety of factors, from the evolving threat to reconfiguration of the DOE complex and the technical requirements of new facilities, are expected to influence safeguards and security technology requirements and development efforts. Implementation of the Program is based on the systematic identification, prioritization and alignment of technology development tasks and needs. Initiatives currently underway are aimed at enhancing technology development project management. Increased management attention is also being placed on efforts to promote the benefits of the Program through technology transfer and interagency liaison

  2. (Environmental technology)

    Energy Technology Data Exchange (ETDEWEB)

    Boston, H.L.

    1990-10-12

    The traveler participated in a conference on environmental technology in Paris, sponsored by the US Embassy-Paris, US Environmental Protection Agency (EPA), the French Environmental Ministry, and others. The traveler sat on a panel for environmental aspects of energy technology and made a presentation on the potential contributions of Oak Ridge National Laboratory (ORNL) to a planned French-American Environmental Technologies Institute in Chattanooga, Tennessee, and Evry, France. This institute would provide opportunities for international cooperation on environmental issues and technology transfer related to environmental protection, monitoring, and restoration at US Department of Energy (DOE) facilities. The traveler also attended the Fourth International Conference on Environmental Contamination in Barcelona. Conference topics included environmental chemistry, land disposal of wastes, treatment of toxic wastes, micropollutants, trace organics, artificial radionuclides in the environment, and the use biomonitoring and biosystems for environmental assessment. The traveler presented a paper on The Fate of Radionuclides in Sewage Sludge Applied to Land.'' Those findings corresponded well with results from studies addressing the fate of fallout radionuclides from the Chernobyl nuclear accident. There was an exchange of new information on a number of topics of interest to DOE waste management and environmental restoration needs.

  3. Nuclear energy technology transfer: the security barriers

    International Nuclear Information System (INIS)

    Rinne, R.L.

    1975-08-01

    The problems presented by security considerations to the transfer of nuclear energy technology are examined. In the case of fusion, the national security barrier associated with the laser and E-beam approaches is discussed; for fission, the international security requirements, due to the possibility of the theft or diversion of special nuclear materials or sabotage of nuclear facilities, are highlighted. The paper outlines the nuclear fuel cycle and terrorist threat, examples of security barriers, and the current approaches to transferring technology. (auth)

  4. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  5. Making Technology Work for Campus Security

    Science.gov (United States)

    Floreno, Jeff; Keil, Brad

    2010-01-01

    The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…

  6. Survey of network and information security technology

    International Nuclear Information System (INIS)

    Liu Baoxu; Wang Xiaozhen

    2007-01-01

    With the rapidly development of the computer network technology and informationize working of our Country, Network and Information Security issues becomes the focal point problem that people shows solicitude for. On the basis analysing security threat and challenge of network information and their developing trend. This paper briefly analyses and discusses the main relatively study direction and content about the theory, technology and practice of Network and Information Security. (authors)

  7. Managing nutrient for both food security and environmental sustainability in China: an experiment for the world

    Directory of Open Access Journals (Sweden)

    Fusuo ZHANG, Zhenling CUI, Weifeng ZHANG

    2014-02-01

    Full Text Available The challenges of how to simultaneously ensure global food security, improve nitrogen use efficiency (NUE and protect the environment have received increasing attention. However, the dominant agricultural paradigm still considers high yield and reducing environmental impacts to be in conflict with one another. Here we examine a Three-Step-Strategy of past 20 years to produce more with less in China, showing that tremendous progress has been made to reduce N fertilizer input without sacrificing crop yield. The first step is to use technology for in-season root-zone nutrient management to significantly increase NUE. The second is to use technology for integrated nutrient management to increase both yield and NUE by 15%—20%. The third step is to use technology for integrated soil-crop system management to increase yield and NUE by 30%—50% simultaneously. These advances can thus be considered an effective agricultural paradigm to ensure food security, while increasing NUE and improving environmental quality.

  8. Cyber security evaluation of II&C technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Laboratory (INL), Idaho Falls, ID (United States)

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  9. 75 FR 28275 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-05-20

    ...: The Homeland Security Science and Technology Advisory Committee met on April 20, 2010 from 8:30 a.m... and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410, Washington... for the Under Secretary of Homeland Security for Science and Technology. The Homeland Security Science...

  10. Use of Persuasive Technology to Change End-Users- IT Security Aware Behaviour: A Pilot Study

    OpenAIRE

    Ai Cheo Yeo; Md. Mahbubur Rahim; Yin Ying Ren

    2008-01-01

    Persuasive technology has been applied in marketing, health, environmental conservation, safety and other domains and is found to be quite effective in changing people-s attitude and behaviours. This research extends the application domains of persuasive technology to information security awareness and uses a theory-driven approach to evaluate the effectiveness of a web-based program developed based on the principles of persuasive technology to improve the information sec...

  11. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  12. Engineering Principles for Information Technology Security (A Baseline for Achieving Security)

    National Research Council Canada - National Science Library

    Stoneburner, Gary

    2001-01-01

    The purpose of the Engineering Principles for Information Technology (IT) Security (HP-ITS) is to present a list of system-level security principles to he considered in the design, development, and operation of an information system...

  13. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  14. An evaluation of the ecological and environmental security on China's terrestrial ecosystems.

    Science.gov (United States)

    Zhang, Hongqi; Xu, Erqi

    2017-04-11

    With rapid economic growth, industrialization, and urbanization, various ecological and environmental problems occur, which threaten and undermine the sustainable development and domestic survival of China. On the national scale, our progress remains in a state of qualitative or semi-quantitative evaluation, lacking a quantitative evaluation and a spatial visualization of ecological and environmental security. This study collected 14 indictors of water, land, air, and biodiversity securities to compile a spatial evaluation of ecological and environmental security in terrestrial ecosystems of China. With area-weighted normalization and scaling transformations, the veto aggregation (focusing on the limit indicator) and balanced aggregation (measuring balanced performance among different indicators) methods were used to aggregate security evaluation indicators. Results showed that water, land, air, and biodiversity securities presented different spatial distributions. A relatively serious ecological and environmental security crisis was found in China, but presented an obviously spatial variation of security evaluation scores. Hotspot areas at the danger level, which are scattered throughout the entirety of the country, were identified. The spatial diversities and causes of ecological and environmental problems in different regions were analyzed. Spatial integration of regional development and proposals for improving the ecological and environmental security were put forward.

  15. How 21st century droughts affect food and environmental security

    Science.gov (United States)

    Kogan, Felix

    The first 13th years of the 21st century has begun with a series of widespread, long and intensive droughts around the world. Extreme and severe-to-extreme intensity droughts covered 2-6% and 7-16% of the world land, respectively, affecting environment, economies and humans. These droughts reduced agricultural production, leading to food shortages, human health deterioration, poverty, regional disturbances, population migration and death. This presentation is a travelogue of the 21st century global and regional droughts during the warmest years of the past 100 years. These droughts were identified and monitored with the NOAA operational space technology, called Vegetation Health (VH), which has the longest period of observation and provide good data quality. The VH method was used for assessment of vegetation condition or health, including drought early detection and monitoring. The VH method is based on operational satellites data estimating both land surface greenness (NDVI) and thermal conditions. The 21st century droughts in the USA, Russia, Australia Argentina, Brazil, China, India and other principal grain producing countries were intensive, long, covered large areas and caused huge losses in agricultural production, which affected food and environmental security and led to food riots in some countries. This presentation investigate how droughts affect food and environmental security, if they can be detected earlier, how to monitor their area, intensity, duration and impacts and also their dynamics during the climate warming era with satellite-based vegetation health technology.

  16. 75 FR 18516 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-04-12

    ...; notice of closed Federal Advisory Committee meeting SUMMARY: The Homeland Security Science and Technology.... DATES: The Homeland Security Science and Technology Advisory Committee will meet April 20, 2010 from 8...: Ms. Tiwanda Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray...

  17. 75 FR 2555 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-01-15

    ... Technology Advisory Committee will meet January 26-28, 2010, at the Department of Homeland Security, 1120..., Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410...

  18. 75 FR 39955 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-07-13

    ... Homeland Security Science and Technology Advisory Committee meeting will be open to the public on July 20th... Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Protection programs in Science & Technology and updates on homeland security sensitive Federally Funded...

  19. Safeguards and security deficiencies fulfilled through technology development

    International Nuclear Information System (INIS)

    Smoot, W.

    1996-01-01

    The Office of Safeguards and Security (OSS) sponsors research and development activities based on identified field and headquarters customer requirements. Annually, a formal solicitation of safeguards and security user needs is conducted. Currently, there are over 300 valid safeguards and security deficiencies that have been identified. These user needs serve as the basis for formulating the OSS Technology Development Program (TDP). Due to budget constraints, the TDP can only address approximately 47% of these needs in FY 1996. This paper will discuss, in a general sense, the current deficiencies and how the TDP is responding to each. Specifically, the paper will highlight technologies in the areas of Material Control and Accounting, Physical Security, and Information Security. A brief discussion of unfulfilled user requirements will also be presented as a catalyst for leveraging available or developing technologies from other similar programs or from private industry

  20. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  1. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  2. Nevada National Security Site Environmental Report 2011 Summary

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed

    2012-09-12

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  3. Nevada National Security Site Environmental Report 2011 Summary

    International Nuclear Information System (INIS)

    Wills, Cathy

    2012-01-01

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  4. 48 CFR 2452.239-71 - Information Technology Virus Security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...

  5. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  6. Combining overt and covert anti-counterfeiting technologies for securities

    Science.gov (United States)

    Uematsu, Tsuyoshi

    2006-02-01

    The National Printing Bureau of Japan has been developing new anti-counterfeiting technologies as a banknote printer. Some of our technologies have already been effectively introduced into Japan's new banknote series. Anti-counterfeiting technologies can be applied not only to banknotes but also to other security documents depending on desired features. In this presentation, I will introduce three of our newly developed overt and covert security techniques, which are intended for document security and brand protection, as well as banknotes. "Metallic View" is mainly for offset printing. "Copy Check" (micro-structural lines involving luminescence) is for plate making technology. "ImageSwitch" is for a new security solution which has unlimited printing applications. All three techniques create "latent images" (some of which may be better known as "carrier screen images") that are useful in preventing counterfeiting. While each of the techniques is effective by itself, all are more effective when applied together. Combining these techniques could make all security documents harder to copy using IT scanners, and provide cost-effective anti-counterfeiting solutions for all security users.

  7. 76 FR 78009 - Information Collection; Implementation of Information Technology Security Provision

    Science.gov (United States)

    2011-12-15

    ...] Information Collection; Implementation of Information Technology Security Provision AGENCY: General Services... collection requirement regarding Implementation of Information Technology Security Provision. Public comments... Information Collection 3090- 0294, Implementation of Information Technology Security Provision, by any of the...

  8. Secure Data Exchange in Environmental Health Monitoring System through Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Amang Sudarsono

    2016-04-01

    Full Text Available Recently, disseminating latest sensory information regarding the status of environmental health in the surroundings of human life is one of very important circumstances which must be known by everyone. These circumstances should be accessible at anytime and anywhere by everyone through any type of end-user devices, both fixed and mobile devices, i.e., Desktop PCs, Laptop PCs, and Smartphones. Wireless Sensor Network (WSN is one of the networks which deals with data sensors distribution from sensor nodes to the gateway node toward a Data Center Server. However, there is a big possibility for many adversaries to intercept and even manipulate data sensors crossing the network. Hence, a secure data sensor exchange in the system would be strongly desirable. In this research, we propose an environmental health conditions monitoring system through WSN and its implementation with considering secure data sensor exchange within the network and secure data sensor access. This work may contribute to support a part of smart cities and take in part the Internet of Thing (IoT technology. In our proposed system, we collect some environmental health information such as temperature, humidity, luminosity, noise, carbon monoxide (CO and carbon dioxide (CO2 from sensor nodes. We keep the confidentiality and integrity of transmitted data sensors propagating through IEEE802.15.4-based communication toward a gateway node. Further, the collected data sensors in the gateway are synchronized to the Data Center Server through a secure TCP/IP connection for permanently storing. At anytime and anywhere, only legitimated users who successfully pass-through an attribute-based authentication system are able to access the data sensors.

  9. Review of the model of technological pragmatism considering privacy and security

    Directory of Open Access Journals (Sweden)

    Kovačević-Lepojević Marina M.

    2013-01-01

    Full Text Available The model of technological pragmatism assumes awareness that technological development involves both benefits and dangers. Most modern security technologies represent citizens' mass surveillance tools, which can lead to compromising a significant amount of personal data due to the lack of institutional monitoring and control. On the other hand, people are interested in improving crime control and reducing the fear of potential victimization which this framework provides as a rational justification for the apparent loss of privacy, personal rights and freedoms. Citizens' perception on the categories of security and privacy, and their balancing, can provide the necessary guidelines to regulate the application of security technologies in the actual context. The aim of this paper is to analyze the attitudes of students at the University of Belgrade (N = 269 toward the application of security technology and identification of the key dimensions. On the basis of the relevant research the authors have formed assumptions about the following dimensions: security, privacy, trust in institutions and concern about the misuse of security technology. The Prise Questionnaire on Security Technology and Privacy was used for data collection. Factor analysis abstracted eight factors which together account for 58% of variance, with the highest loading of the four factors that are identified as security, privacy, trust and concern. The authors propose a model of technological pragmatism considering security and privacy. The data also showed that students are willing to change their privacy for the purpose of improving security and vice versa.

  10. New Technology's Surprising Security Threats. Building Digital Libraries

    Science.gov (United States)

    Huwe, Terence

    2005-01-01

    In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…

  11. Restricted access processor - An application of computer security technology

    Science.gov (United States)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  12. Aerospace Communications Security Technologies Demonstrated

    Science.gov (United States)

    Griner, James H.; Martzaklis, Konstantinos S.

    2003-01-01

    In light of the events of September 11, 2001, NASA senior management requested an investigation of technologies and concepts to enhance aviation security. The investigation was to focus on near-term technologies that could be demonstrated within 90 days and implemented in less than 2 years. In response to this request, an internal NASA Glenn Research Center Communications, Navigation, and Surveillance Aviation Security Tiger Team was assembled. The 2-year plan developed by the team included an investigation of multiple aviation security concepts, multiple aircraft platforms, and extensively leveraged datalink communications technologies. It incorporated industry partners from NASA's Graphical Weather-in-the-Cockpit research, which is within NASA's Aviation Safety Program. Two concepts from the plan were selected for demonstration: remote "black box," and cockpit/cabin surveillance. The remote "black box" concept involves real-time downlinking of aircraft parameters for remote monitoring and archiving of aircraft data, which would assure access to the data following the loss or inaccessibility of an aircraft. The cockpit/cabin surveillance concept involves remote audio and/or visual surveillance of cockpit and cabin activity, which would allow immediate response to any security breach and would serve as a possible deterrent to such breaches. The datalink selected for the demonstrations was VDL Mode 2 (VHF digital link), the first digital datalink for air-ground communications designed for aircraft use. VDL Mode 2 is beginning to be implemented through the deployment of ground stations and aircraft avionics installations, with the goal of being operational in 2 years. The first demonstration was performed December 3, 2001, onboard the LearJet 25 at Glenn. NASA worked with Honeywell, Inc., for the broadcast VDL Mode 2 datalink capability and with actual Boeing 757 aircraft data. This demonstration used a cockpitmounted camera for video surveillance and a coupling to

  13. On the Horizon: New Advances in Security Technology

    Science.gov (United States)

    Gamble, Cheryl

    2005-01-01

    The worlds of security and technology have been on an intersecting course since the first published account of the use of fingerprint identification made news in 1880 (although unpublished reports suggest its use as early as 1858). In the three and one half years since the September 11 attacks, technological advances across the security field have…

  14. Environmental science and technology

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-07-01

    The environmental Science and Technology Program was structured based on the continuous growth of environmental activities on areas related to nuclear programs at IPEN. The program comprehends five main areas: Environmental analysis: Chemical technology; Polymer technology nucleus: Chemical and Isotope characterization and Analytical Chemistry for the Nuclear Fuel Cycle samples.

  15. The research of network database security technology based on web service

    Science.gov (United States)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  16. Environmental and security challenges of nuclear plants

    International Nuclear Information System (INIS)

    Omar, A.S.

    2014-01-01

    The world population increase, the acceleration of global requirement for development and the need to expand energy production, have led to the depletion of natural resources. The international efforts are increasing to get clean, safe and economical energy sources . The electricity generated from nuclear energy considers less polluting and high economic competitiveness as well as reliability and efficiency. The nuclear power plants projects face significant challenges, especially after two major accidents, in Chernobyl 1986 and Fukushima 2011 including the fears of radiation effects, nuclear waste management and nuclear proliferation issues, as well as the lack of public acceptance. So those bodies interested in operating nuclear power plants work to increase nuclear safety standards, review the nuclear facilities safety, know the strict application of laws, seek to prove the economic competitiveness, maintain environmental security, assist in the nonproliferation regime and gain public acceptance. This article discusses the most important environmental and security challenges of nuclear power plants. It highlights the importance of the peaceful uses of nuclear energy as a source of sustainable development and environmental security. It also offers a number of recommendations to support the Arab countries trend towards the inclusion of nuclear energy option within their national programs to generate electricity. (author)

  17. Physical security technologies for weapons complex reconfiguration facilities

    International Nuclear Information System (INIS)

    Jaeger, C.D.

    1994-01-01

    Sandia National Laboratories was a member of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S ampersand S) team providing assistance to the Department of Energy's (DOE) Office of Weapons Complex Reconfiguration. The physical security systems in the new and upgraded facilities being considered for the WCR had to meet DOE orders and other requirements set forth in the WCR Programmatic Design Criteria (PDC), incorporate the latest physical security technologies using proven state-of-the-art systems and meet fundamental security principles. The outcome was to avoid costly retrofits and provide effective and comprehensive protection against current and projected threats with minimal impact on operations, costs and schedule. Physical security requirements for WCR facilities include: (1) reducing S ampersand S life-cycle costs, (2) where feasible automating S ampersand S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, (3) increasing the amount of delay to outsider adversary attack, (4) compartmentalizing the facility to minimize the number of personnel requiring access to critical areas and (5) having reliable and maintainable systems. To be most effective against threats physical security must be integrated with facility operations, safety and other S ampersand S activities, such as material control and accountability, nuclear measurements and computer and information security. This paper will discuss the S ampersand S issues, requirements, technology opportunities and needs. Physical security technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed

  18. Globalization and environmental challenges. Reconceptualizing security in the 21{sup st} century

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Mexico City (MX). Centro Regional de Investigaciones Multidisciplinarias (CRIM); Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Grin, John [Amsterdam Univ. (Netherlands). Dept. of Political Science; Dunay, Pal [Geneva Centre for Security Policy (Switzerland); Chadha Behera, Navnita [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Univ. of Tunis-Carthage, Hammam-Chatt (Tunisia); Kameri-Mbote, Patricia [Nairobi Univ. (Kenya), Dept. of Private Law; Liotta, P.H. (eds.) [Salve Regina Univ., Newport, RI (United States). Pell Center for International Relations and Public Policy

    2008-07-01

    Put quite simply, the twin impacts of globalization and environmental degradation pose new security dangers and concerns. In this comprehensive new work on global security thinking, 91 authors from five continents and many disciplines, from science and practice, assess the worldwide reassessment of the meaning of security triggered by the end of the Cold War and globalization, as well as the multifarious impacts of global environmental change in the early 21st century. Chapters address the theoretical, philosophical, ethical and religious and spatial context of security. They analyze the relationship between security, peace, development and environment. The authors move on to review the rethinking of security in international law, economics and political science, as well as in the key political, military and economic milieux. The book also examines the environmental security dimension and the adaptation of the institutional security concepts of the UN, EU and NATO, and analyzes the effect of change on regional security. Finally, it posits alternative security futures and draws conclusions for future research and action. (orig.)

  19. Safety and Security Interface Technology Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-05-01

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security

  20. Information Security: Past, Present and Future - Impact of Developments in Information Technology on Security

    NARCIS (Netherlands)

    Overbeek, P.L.

    1991-01-01

    The development of information security is addressed in relation to the development of information technology. The leading question is: how has information security developed itself so far, and how should it progress to address tomorrow's security needs. An overwiew is given of the use of

  1. Environmental security in North-West Russia

    International Nuclear Information System (INIS)

    Bjerke, S.

    1999-01-01

    The arms race and military security during the Cold War cost trillions of dollars. It has been claimed that the processes of disarmament, and the large-scale conversion from military to civilian production that is now under way, will be equally costly. This includes the cost of environmental clean up and other measures to deal with the environmental legacy of the Cold War. Norway strongly supports a holistic approach to environmental issues. The armed forces and military industry must also adapt to environmental demands and adopt the principles of modern environmental management. Our own defence forces have for some time been basing their choice of equipment partly on modern environmental criteria and are taking steps to remedy previous environmental damage. Field training and exercises are subject to stringent environmental restrictions. All along the former East-West divide the scope of military activity has been dramatically reduced. The time has come to focus more attention on military or arms-related environmental issues

  2. New technology for food systems and security.

    Science.gov (United States)

    Yau, N J Newton

    2009-01-01

    In addition to product trade, technology trade has become one of the alternatives for globalization action around the world. Although not all technologies employed on the technology trade platform are innovative technologies, the data base of international technology trade still is a good indicator for observing innovative technologies around world. The technology trade data base from Sinew Consulting Group (SCG) Ltd. was employed as an example to lead the discussion on security or safety issues that may be caused by these innovative technologies. More technologies related to processing, functional ingredients and quality control technology of food were found in the data base of international technology trade platform. The review was conducted by categorizing technologies into the following subcategories in terms of safety and security issues: (1) agricultural materials/ingredients, (2) processing/engineering, (3) additives, (4) packaging/logistics, (5) functional ingredients, (6) miscellaneous (include detection technology). The author discusses examples listed for each subcategory, including GMO technology, nanotechnology, Chinese medicine based functional ingredients, as well as several innovative technologies. Currently, generation of innovative technology advance at a greater pace due to cross-area research and development activities. At the same time, more attention needs to be placed on the employment of these innovative technologies.

  3. Integrating energy and environmental goals. Investment needs and technology options

    International Nuclear Information System (INIS)

    2004-04-01

    Economic and population growth will continue to drive an expansion of the global energy market. The Earth's energy resources are undoubtedly adequate to meet rising demand for at least the next three decades. But the projected increases in energy consumption and market developments raise serious concerns about the security of energy supplies, investment in energy infrastructure, the threat of environmental damage caused by energy use and the uneven access of the world's population to modern energy. The first two sections of this background paper provide an outlook for energy demand and emissions over the next thirty years, based on findings in the IEA's World Energy Outlook 2002. Section four presents projections for global investment needs from the latest WEO publication, the World Energy Investment Outlook 2003. For both the energy and investment outlooks, an alternative scenario for OECD countries is examined. The scenarios describe a world in which environmental and energy supply security concerns will continue to plague policy makers. Clearly, changes in power generation, automotive engines and fuel technologies will be required to change trends in energy demand and emissions over the next thirty years and beyond. Improvements in energy efficiency will also play a fundamental role. A number of technologies offer the long term potential to diversify the energy sector away from its present heavy reliance on fossil fuels. Based on various IEA studies, section five evaluates those technologies that offer the potential to reduce emissions, including renewable energy, fossil-fuel use with CO2 capture and storage, nuclear, hydrogen, biofuels and efficient energy end use. No single technology can meet the challenge by itself. Different regions and countries will require different combinations of technologies to best serve their needs and best exploit their indigenous resources. Developing countries, in particular, will face far greater challenges in the years ahead

  4. Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.

    2004-01-01

    The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and

  5. The Threat of Security: Hindering Technology Integration in the Classroom

    Science.gov (United States)

    Robinson, LeAnne K.; Brown, Abbie; Green, Tim

    2007-01-01

    For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…

  6. Surviving security how to integrate people, process, and technology

    CERN Document Server

    Andress, Amanda

    2003-01-01

    WHY DO I NEED SECURITY? Introduction The Importance of an Effective Security Infrastructure People, Process, and Technology What Are You Protecting Against? Types of Attacks Types of Attackers Security as a Competitive Advantage Choosing a Solution Finding Security Employees The Layered Approach UNDERSTANDING REQUIREMENTS AND RISK What Is Risk? Embracing Risk Information Security Risk Assessment Assessing Risk Insurance SECURITY POLICIES AND PROCEDURES Internal Focus Is Key Security Awareness and Education Policy Life Cycle Developing Policies Components of a Security Policy Sample Security Po

  7. Strategic Environmental Research and Development Project FY 1994: Assessing national remote sensing technologies for use in US Department of Energy Environmental Restoration Activities, Oak Ridge Solid Waste Storage Area 4 case study

    International Nuclear Information System (INIS)

    King, A.L.; Smyre, J.L.; Evers, T.K.

    1995-02-01

    During FY 1994, the Oak Ridge Environmental Restoration (ER) Remote Sensing Program teamed with members of the Oak Ridge National Security Program Office (NSPO), the Environmental Research Institute of Michigan (ERIM) under contract to the National Exploitation Laboratory (NEL), the Oak Ridge Waste Area Group 4 (WAG 4) ER Program, and the US Department of Energy (DOE), Offices of Technology Development, Nonproliferation and National Security, and Environmental Restoration, to conduct a test and demonstration of the uses of national remote sensing technologies at DOE hazardous waste sites located in Oak Ridge, Tennessee. Objectives of the Oak Ridge study were to determine if national remote sensing technologies are useful in conducting prescreening, characterization, and/or monitoring activities to expedite the clean-up process at hazardous waste sites and to cut clean-up costs wherever possible. This project was sponsored by the Strategic Environmental Research and Development Project (SERDP)

  8. Physical security technology base programs for physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-01-01

    Sandia National Laboratories is the US Department of Energy's lead laboratory for physical security research and development (R and D). In support of this mission, Sandia has maintained for several years an R and D program in each of the following technology areas: Intrusion Detection, Entry Control, CCTV Assessment, Access Delay, Alarm Display, and Guard Equipment and Training. The purpose of the technology base programs is to maintain cognizance of the capabilities of the commercial market, identify improvements and transfer technology to industry and facilities. The output of these programs supports the development of new equipment and advanced system concepts, demonstrations of proof-of-principles and system implementation. This paper will review the status of current developments and discuss trends in new technologies which are being explored for future applications, i.e., artificial intelligence, expert systems, robotics, and more automated systems

  9. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  10. Nuclear material facilities - security systems and technology R and D trends

    International Nuclear Information System (INIS)

    Ellis, D.; Steele, B.

    2002-01-01

    Full text: In the US, physical security research and development (R and D) during the 1970s and 1980s created a body of technology and systems engineering that largely defined the industry for several decades. However, despite today's terrorists threats and risks, the overall funding of new and innovative physical security solutions is relatively very small. Such factors constraining physical security R and D include the expansion of overall security responsibilities, the emphasis on programmatic and business performance, in addition to evolving (mis)perceptions that 'the problem has been solved' or that 'anyone can do security'. Underlying these factors, the lack of robust standards and certifications has limited the development and application of physical security products, systems, and services. The research and development of new security technologies must be evaluated against very demanding constraints - including costs/benefits, emerging threats, and policies. Going forward, the goal will be to create a more comprehensive approach to physical security of nuclear material facilities that matches evolving threats and that will complement the transition to an integrated security/operations management environment. Such a management model evaluates the additional value of increasing security alternatives in addition to determining trade-offs between the programmatic mission and security issues. Correspondingly, more explicit and strategically useful measures must be developed to determine importance that, in turn, will influence security-related R and D efforts. The research and development of security technologies should be based upon identified needs and requirements resulting from a systematic analysis of the threat and other conditions. In particular, security technologies and systems must be evaluated in terms of current and long-term impacts. Such needs are (will be) diverse and will depend upon sustained research investments in a broad range of technologies

  11. Environmental technology foresight : New horizons for technology management

    NARCIS (Netherlands)

    Den Hond, Frank; Groenewegen, Peter

    1996-01-01

    Decision-making in corporate technology management and government technology policy is increasingly influenced by the environmental impact of technologies. Technology foresight (TF) and environmental impact assessment (EIA) are analyzed with regard to the roles they can play in developing long-term

  12. Scanning technology with multi-slice helical CT in security inspection domain

    International Nuclear Information System (INIS)

    Wang Jue; Wang Fuquan; Jiang Zenghui

    2008-01-01

    The paper analyzes the technology conditions of security inspection in home and abroad, and expatiates technology of spiral CT and how to define CT value etc, with studying on the key technology of spiral CT scanning way (X-RAY, detector, technology of pulley etc) and mutual relation. By comparing the present products of security inspection, the conclusion was drawn that it is inevitable to develop the tendency of security inspection area with the checking and discerning the substance by using the technology of multi-layer spiral CT. (authors)

  13. The application of data encryption technology in computer network communication security

    Science.gov (United States)

    Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.

  14. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  15. Review: Security in Wireless Technologies in Business

    Science.gov (United States)

    Sattarova, F. Y.; Kim, Tai-Hoon

    Wireless technology seems to be everywhere now - but it is still relatively in its infancy. New standards and protocols continue to emerge and problems and bugs are discovered. Nevertheless, wireless networks make many things much more convenient and it appears that wireless networks are here to stay. The differences and similarities of wireless and wired security, the new threats brought by mobility, the security of networks and devices and effects of security, or lack of it are shortly discussed in this review paper.

  16. Safety and Security Interface Technology Initiative

    International Nuclear Information System (INIS)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-01-01

    Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. ''Supporting Excellence in Operations Through Safety Analysis'', (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is ''Safeguards/Security Integration with Safety''. This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ''tool box'' of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated

  17. Assessing security technology's impact: old tools for new problems.

    Science.gov (United States)

    Kreissl, Reinhard

    2014-09-01

    The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.

  18. ENVIRONMENTAL INNOVATIVE BUSINESS SOLUTIONS AS A STRATEGIC FACTOR OF ECONOMIC SECURITY ISSUES

    Directory of Open Access Journals (Sweden)

    A. S. Senin

    2016-01-01

    Full Text Available The relevance of this work lies in the fact that it attempts to disclose the key theoretical and practical issues of economic security solutions, taking into account the problems of global transformations taking place in the global economy. As part of the article we have been studied various aspects that characterize global economic, environmental trends that will shape the future of modern civilization. The article also addresses the problem of exit from the raw model of the economy, the formation of economic mechanisms that take into account environmental costs, proposed internalization of environmental externalities.The purpose/goal. The purpose of this article and its main task is to systematize the areas of environmentally oriented development of economic entities, as well as the determination of the list of key provisions of environmental policies, which will ensure the further socio-economic development of Russia in line with the green economy.Methods. In this article, based on content analysis of theoretical and empirical basic conceptual provisions of economic security were formulated in the context of eco-oriented production, the transition to which world civilization is currently implementing. It was concluded that the economic, energy, environmental and social issues of sustainable development of modern civilization is directly linked, so the transition to ecooriented production is possible, firstly, it provided aggressive reduction of production and wasteful use of traditional hydrocarbon resources, and, secondly, on the condition of rational replacement of traditional energy sources with renewable energy.Results. This article outlines the basic solutions that can be used to provide environmentally responsible operation and development of Russian business and corporate structures. Also offered in the basic decisions that are to be included in the national environmental policy as a major incentive for the further transition to a

  19. Positioning of a Peaceful Use of Nuclear Technology in National Security Aspects

    International Nuclear Information System (INIS)

    Kim, Hyun Jun; Chang, Moon Hee; Kim, Hark Rho; Lee, Young Joon; Lee, Sang Heon

    2012-01-01

    Many cases have shown that a peaceful use of nuclear technology should play an important role in national securities such as energy, economic and science and technology securities, etc. It would be interesting to know what the positioning of the peaceful use of nuclear technology is in the national security aspects. In this paper, a positioning of nuclear power on various national security components is intended by using a positioning process that has been widely used for marketing. Findings can be used for directing further R and Ds to develop nuclear power technology

  20. Positioning of a Peaceful Use of Nuclear Technology in National Security Aspects

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Jun; Chang, Moon Hee; Kim, Hark Rho; Lee, Young Joon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Lee, Sang Heon [Korea National Defense University, Goyang (Korea, Republic of)

    2012-05-15

    Many cases have shown that a peaceful use of nuclear technology should play an important role in national securities such as energy, economic and science and technology securities, etc. It would be interesting to know what the positioning of the peaceful use of nuclear technology is in the national security aspects. In this paper, a positioning of nuclear power on various national security components is intended by using a positioning process that has been widely used for marketing. Findings can be used for directing further R and Ds to develop nuclear power technology

  1. U.S. ENVIRONMENTAL PROTECTION AGENCY (EPA) ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: ARSENIC MONITORING TECHNOLOGIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency Environmental Technology Verification (ETV) program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This technology ...

  2. 48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...

  3. 48 CFR 1252.239-71 - Information technology security plan and accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...

  4. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  5. Environmental Policy and Technological Change

    International Nuclear Information System (INIS)

    Jaffe, Adam B.; Newell, Richard G.; Stavins, Robert N.

    2002-01-01

    The relationship between technological change and environmental policy has received increasing attention from scholars and policy makers alike over the past ten years. This is partly because the environmental impacts of social activity are significantly affected by technological change, and partly because environmental policy interventions themselves create new constraints and incentives that affect the process of technological developments. Our central purpose in this article is to provide environmental economists with a useful guide to research on technological change and the analytical tools that can be used to explore further the interaction between technology and the environment. In Part 1 of the article, we provide an overview of analytical frameworks for investigating the economics of technological change, highlighting key issues for the researcher. In Part 2, we turn our attention to theoretical analysis of the effects of environmental policy on technological change, and in Part 3, we focus on issues related to the empirical analysis of technology innovation and diffusion. Finally, we conclude in Part 4 with some additional suggestions for research

  6. Security Problems of Mobile Technologies

    Directory of Open Access Journals (Sweden)

    A. G. Beltov

    2012-09-01

    Full Text Available The article provides an overview of security problems which exist in the mobile devices. The main technologies aimed to protect the phones from various types of attacks are considered. The authors justify the necessity of developing new improved tools and methods to ensure the safety of such devices.

  7. Environmental technology verification methods

    CSIR Research Space (South Africa)

    Szewczuk, S

    2016-03-01

    Full Text Available Environmental Technology Verification (ETV) is a tool that has been developed in the United States of America, Europe and many other countries around the world to help innovative environmental technologies reach the market. Claims about...

  8. Ecological and Economic Problems of Environmental Security

    Directory of Open Access Journals (Sweden)

    Mashchenko Maryna A.

    2018-03-01

    Full Text Available The article is aimed at defining a common mechanism for assessing the ecological and economic threats and ecological losses on the basis of a long-term study to ensure the environmental security of the State. The necessity of a new approach to the State regulation through achievement of environmental security is displayed, that will allow to reduce tensions of the ecological-economic problems in Ukraine. For implementation of this approach, a general mechanism for estimation of ecological-economic threats and ecological losses is provided, which is carried out through formation of an integral costs system. The costs system is presented in the article in the form of an in-depth mechanism for estimating the ecological-economic threats on the example of ecological impacts. Structuring and preparation of the costs system for applied researches is the next stage of this prolonged research.

  9. The effects of environmental resource and security on aggressive behavior.

    Science.gov (United States)

    Ng, Henry Kin Shing; Chow, Tak Sang

    2017-05-01

    Exposure to different environments has been reported to change aggressive behavior, but previous research did not consider the underlying elements that caused such an effect. Based on previous work on environmental perception, we examined the role of environmental resource and security in altering aggression level. In three experiments, participants were exposed to environments that varied in resource (High vs. Low) and security (High vs. Low) levels, after which aggression was measured. The environments were presented through visual priming (Experiments 1-2) and a first-person gameplay (Experiment 3). We observed a consistent resource-security interaction effect on aggression, operationalized as the level of noise blast (Experiment 1) and number of unpleasant pictures (Experiments 2-3) delivered to strangers by the participants. High resource levels associated with higher aggression in insecure conditions, but lower aggression in secure conditions. The findings suggest that the adaptive value of aggression varies under different environmental constraints. Implications are discussed in terms of the effects of adverse environments on aggression, and the nature's effects on social behavior. Aggr. Behav. 43:304-314, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  10. Environmental science and technology

    International Nuclear Information System (INIS)

    2014-01-01

    The Program on Environmental Science and Technology developed at the Chemical and Environmental Technology Center comprehends environmental chemistry (water, soil and atmospheric chemistry), clean technologies (desulfurization of diesel and oil, biodegradable polymers and structural modification of polymers, recycling, pyrolysis of dangerous chemicals by molten salt technology), nanotechnology (magnetic nanoparticles, dendrimers, nano biomarkers, catalysts) and chemical characterization of nuclear fuel and nuclear fuel cycle waste (chemical and isotopic characterization). The Chemical and Environmental Technology Center was established in 1995, as an evolution of the former Department of Chemistry Engineering (1970). The program on environment science and technology was structured as consequence of the continuous growth of environmental activities on areas related to nuclear programs of IPEN. Moreover, it was an answer to the society concerning the climate changes and biodiversity preservation. All activities of research and development, services, supervision of graduate and under graduated students and courses performance at the center were related to the development, improvement and establishment of new technologies. The highlights of this period (2011 - 2013) were: - Development and use of modern analytical technology for the characterization of persistent pollutants and endocrine disrupters (metals, PAHA’s, PCBs, Pesticides, hormones, surfactants, plasticizer and human pharmaceuticals) in order to evaluate water quality and/or sediments; - Atmospheric chemistry and greenhouse gases: Evaluating an estimation of surface trace gas fluxes from aircraft measurements above the Amazon; - Cooperation with SABESP (Water and Sewage Company) and CETESB (State Environment Agency) in program for the development of public policies; - Studies and development in biodegradable polymers, polyolefins and advanced methods for polymer and rubber recycling and re-use; - Studies

  11. Environmental science and technology

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2014-07-01

    The Program on Environmental Science and Technology developed at the Chemical and Environmental Technology Center comprehends environmental chemistry (water, soil and atmospheric chemistry), clean technologies (desulfurization of diesel and oil, biodegradable polymers and structural modification of polymers, recycling, pyrolysis of dangerous chemicals by molten salt technology), nanotechnology (magnetic nanoparticles, dendrimers, nano biomarkers, catalysts) and chemical characterization of nuclear fuel and nuclear fuel cycle waste (chemical and isotopic characterization). The Chemical and Environmental Technology Center was established in 1995, as an evolution of the former Department of Chemistry Engineering (1970). The program on environment science and technology was structured as consequence of the continuous growth of environmental activities on areas related to nuclear programs of IPEN. Moreover, it was an answer to the society concerning the climate changes and biodiversity preservation. All activities of research and development, services, supervision of graduate and under graduated students and courses performance at the center were related to the development, improvement and establishment of new technologies. The highlights of this period (2011 - 2013) were: - Development and use of modern analytical technology for the characterization of persistent pollutants and endocrine disrupters (metals, PAHA’s, PCBs, Pesticides, hormones, surfactants, plasticizer and human pharmaceuticals) in order to evaluate water quality and/or sediments; - Atmospheric chemistry and greenhouse gases: Evaluating an estimation of surface trace gas fluxes from aircraft measurements above the Amazon; - Cooperation with SABESP (Water and Sewage Company) and CETESB (State Environment Agency) in program for the development of public policies; - Studies and development in biodegradable polymers, polyolefins and advanced methods for polymer and rubber recycling and re-use; - Studies

  12. Factors Influencing the Adoption of Biometric Security Technologies by Decision Making Information Technology and Security Managers

    OpenAIRE

    Lease, David R.

    2005-01-01

    The research conducted under this study offers an understanding of the reasons why information technology (IT) and/or information assurance (IA) managers choose to recommend or not to recommend particular technologies, specifically biometric security, to their organizations. A review of the relevant literature provided the foundation to develop a set of research questions and factors for this research effort. The research questions became the basis of the study’s stated hypotheses for examini...

  13. Marketing Plan for the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  14. Environmental Science and Technology

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    The Program on Environmental Science and Technology comprehends environmental chemistry (water, soil and atmospheric chemistry), clean technologies (desulfurization of diesel and oil, biodegradable polymers and structural modification of polymers, recycling, pyrolysis of dangerous chemicals by molten salt technology), nanotechnology (magnetic nanoparticles, dendrimers, nano biomarkers, catalyzers) and chemical characterization of nuclear fuel and nuclear fuel cycle waste (chemical and isotopic characterization)

  15. Denial technology, the neglected security element

    International Nuclear Information System (INIS)

    Mauney, C.H.

    1982-01-01

    Even though there has been an increased concern over providing adequate security during the past decade, and even though some aspects of existing security systems have been enhanced during this period, much remains to be done to provide that balance which is so necessary to have all elements function as an effective unit. The area that primarily has been neglected is the delay element - the part of the system which makes possible the needed time for the security force to respond after an intrustion is detected and prior to the adversary attaining his desired goal. The purpose of this paper is to address the vulnerabilities of a security system which exist without the proper delay elements and to suggest how current technology can provide, through the use of activated barriers, that needed delay time to bring the system into balance. Security managers desire reliability and effectiveness; plant managers require safety, non-interference with operations, cost considerate capability, and aesthetic application - these characteristics will be addressed in the context of providing the required delay. This paper, hopefully, will set the stage for dialogue between developer and user, yielding a mutally acceptable approach to balanced security protection

  16. Encouraging environmentally strategic technologies

    International Nuclear Information System (INIS)

    Heaton, G.R.

    1994-01-01

    Having moved beyond its initial absorption with controlling new technology, environmental policy today must focus more strongly on promoting the development and adoption of new technologies. World Resource Institute's (WRI) ongoing study of 'environmentally strategic technology' is addressed to this fundamental policy issue. The study proposes criteria for identifying such technology, offers a specific list, suggests the kinds of public policy changes necessary to encourage their development and finally presents a comparison of critical technology lists (from the White House, the European Community, Japan and the US Department of Defense). (TEC)

  17. Center for Coastline Security Technology, Year-2

    National Research Council Canada - National Science Library

    Glegg, Stewart; Glenn, William; Furht, Borko; Beaujean, P. P; Frisk, G; Schock, S; VonEllenrieder, K; Ananthakrishnan, P; An, E; Granata, R

    2007-01-01

    ...), the Imaging Technology Center, the Department of Computer Science and Engineering, and the University Consortium for Intermodal Transportation Safety and Security at Florida Atlantic University...

  18. Technological Criteria Technology-Environmental under a Systemic Approach: Chemistry Technology Transfer

    Directory of Open Access Journals (Sweden)

    Durán-García Martín Enrique

    2014-07-01

    Full Text Available Currently the transfer of chemical technology is a process that contributes to the technology policy of a country, an industry or an organization in general chemistry. This process requires the application of clear criteria for the proper development of the complex interrelations in the transfer of chemical technology. A group of criteria that are present, are those related to environmental technology which intrinsically define the technology and its impact to the environment. Therefore, the transfer of chemical technology requires technological-environmental criteria defining, in conjunction with other criteria, an adequate process for the selection, acquisition and incorporation of technology in a holistic perspective, so it provides feasible solutions the chemical industry in pursuit of their goals. Then the criterion becomes a benchmark for assessing an appropriate technology transfer process. We performed a theoretical analysis of the technological and environmental criteria, proposing thirty-six (36 technological-environmental criteria interrelated under a systemic approach in the process of transfer of chemical technology, focused on a methodological cycle first run, based primarily on the research-action method. Future research is expected to make a refinement of the criteria from the formulation and validation of metrics so that necessary adjustments are made to optimize the process of transfer of chemical technology.

  19. Modern Quantum Technologies of Information Security

    OpenAIRE

    Korchenko, Oleksandr; Vasiliu, Yevhen; Gnatyuk, Sergiy

    2010-01-01

    In this paper, the systematisation and classification of modern quantum technologies of information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of the quantum technologies used is given. A qualitative analysis of the advantages and disadvantages of concrete quantum protocols is made. The current status of the problem of practical quantum cryptography use in telecommunication networks is consider...

  20. Environmental security: The problems of Northwestern Russia

    International Nuclear Information System (INIS)

    Yablokov, A.V.

    1999-01-01

    The review of main existing environmental problems of North-West Russia covers the radioactive pollution, atmospheric pollution, destroying of the tundra and forest ecosystems, inland and water pollution, consequences of space activities. This region includes: Karelia and Komi republics; Yamalo-Nenetzk autonomous region; Murmansk; Leningrad and Vologda regions; White Sea; Southern and eastern parts of Barents Sea; eastern part of Kara Sea; and eastern part of the Baltic (Finnish Bay). The environmental situation in northwestern Russia is extremely unsafe. The fundamental reason for this situation is Soviet over-militarization in the past. There is an urgent need now to tackle the international environmental security in the Arctic and Scandinavian regions at least in two fields: 1. The existing radioactive pollution (mostly connected with military activities), and even more dangerous - the potential radioactive pollution of the Arctic and Scandinavia. 2. Atmospheric pollution (long distance transportation of pollutant, mostly sulphur dioxide and heavy metals, from melting factories on Kola Peninsula). Several other problems relating to the environmental security of the region (among them deforestation, oil/gas pollution of the ocean, development of the diamond industry) need international attention in the nearest future. It is unrealistic to think that Russia alone can overcome these long-standing problems in the foreseeable future: we need international support for this. But foreign money for solving our environmental problems is not the solution, firstly, because for environmental restoration and recovery Russia needs much more than the international community can allocate; secondly, because there is much money inside Russia (every month, during 1993-1996, up to two billions US dollars were flowing out from Russia to western banks). To utilize this money in a proper way, we drastically need international help to awaken the Russian public environmental awareness

  1. The Western Environmental Technology Office (WETO), Butte, Montana, technology summary

    International Nuclear Information System (INIS)

    1994-09-01

    This document has been prepared by the DOE Environmental Management (EM) Office of Technology Development (OTD) to highlight its research, development, demonstration, testing, and evaluation activities funded through the Western Environmental Technology Office (WETO) in Butte, Montana. Technologies and processes described have the potential to enhance DOE's cleanup and waste management efforts, as well as improve US industry's competitiveness in global environmental markets. WETO's environmental technology research and testing activities focus on the recovery of useable resources from waste. Environmental technology development and commercialization activities will focus on mine cleanup, waste treatment, resource recovery, and water resource management. Since the site has no record of radioactive material use and no history of environmental contamination/remediation activities, DOE-EM can concentrate on performing developmental and demonstration activities without the demands of regulatory requirements and schedules. Thus, WETO will serve as a national resource for the development of new and innovative environmental technologies

  2. Safeguards and Security Technology Development Directory. FY 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-06-01

    The Safeguards and Security Technology Development Directory is published annually by the Office of Safeguards and Security (OSS) of the US Department of Energy (DOE), and is Intended to inform recipients of the full scope of the OSS R&D program. It is distributed for use by DOE headquarters personnel, DOE program offices, DOE field offices, DOE operating contractors, national laboratories, other federal agencies, and foreign governments. Chapters 1 through 7 of the Directory provide general information regarding the Technology Development Program, including the mission, program description, organizational roles and responsibilities, technology development lifecycle, requirements analysis, program formulation, the task selection process, technology development infrastructure, technology transfer activities, and current research and development tasks. These chapters are followed by a series of appendices which contain more specific information on aspects of the Program. Appendix A is a summary of major technology development accomplishments made during FY 1992. Appendix B lists S&S technology development reports issued during FY 1992 which reflect work accomplished through the OSS Technology Development Program and other relevant activities outside the Program. Finally, Appendix C summarizes the individual task statements which comprise the FY 1993 Technology Development Program.

  3. Fuel Cycle Technologies 2014 Achievement Report

    Energy Technology Data Exchange (ETDEWEB)

    Hong, Bonnie C. [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-01-01

    The Fuel Cycle Technologies (FCT) program supports the Department of Energy’s (DOE’s) mission to: “Enhance U.S. security and economic growth through transformative science, technology innovation, and market solutions to meet our energy, nuclear security, and environmental challenges.” Goal 1 of DOE’s Strategic Plan is to innovate energy technologies that enhance U.S. economic growth and job creation, energy security, and environmental quality. FCT does this by investing in advanced technologies that could transform the nuclear fuel cycle in the decades to come. Goal 2 of DOE’s Strategic Plan is to strengthen national security by strengthening key science, technology, and engineering capabilities. FCT does this by working closely with the National Nuclear Security Administration and the U.S Department of State to develop advanced technologies that support the Nation’s nuclear nonproliferation goals.

  4. Coping with global environmental change, disasters and security: threats, challenges, vulnerabilities and risks

    NARCIS (Netherlands)

    Brauch, H.G.; Oswald Spring, Ú.; Mesjasz, C.; Grin, J.; Kameri-Mbote, P.; Chourou, B.; Dunay, P.; Birkmann, J.

    2011-01-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10

  5. Infrared: A Key Technology for Security Systems

    OpenAIRE

    Corsi, Carlo

    2012-01-01

    Infrared science and technology has been, since the first applications, mainly dedicated to security and surveillance especially in military field, besides specialized techniques in thermal imaging for medical diagnostic and building structures and recently in energy savings and aerospace context. Till recently the security applications were mainly based on thermal imaging as surveillance and warning military systems. In all these applications the advent of room temperature, more reliable due...

  6. The Western Environmental Technology Office (WETO), Butte, Montana, technology summary

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    This document has been prepared by the DOE Environmental Management (EM) Office of Technology Development (OTD) to highlight its research, development, demonstration, testing, and evaluation activities funded through the Western Environmental Technology Office (WETO) in Butte, Montana. Technologies and processes described have the potential to enhance DOE`s cleanup and waste management efforts, as well as improve US industry`s competitiveness in global environmental markets. WETO`s environmental technology research and testing activities focus on the recovery of useable resources from waste. Environmental technology development and commercialization activities will focus on mine cleanup, waste treatment, resource recovery, and water resource management. Since the site has no record of radioactive material use and no history of environmental contamination/remediation activities, DOE-EM can concentrate on performing developmental and demonstration activities without the demands of regulatory requirements and schedules. Thus, WETO will serve as a national resource for the development of new and innovative environmental technologies.

  7. Coping with global environmental change, disasters and security. Threats, challenges, vulnerabilities and risks

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; UNU-EHS, Bonn (DE). College of Associated Scientists and Advisors (CASA); Oswald Spring, Ursula [National Univ. of Mexico, Cuernavaca (MX). Regional Multidisciplinary Research Centre (CRIM); Mesjasz, Czeslaw [Cracow Univ. of Exonomics (Poland). Faculty of Management; Grin, John [Amsterdam Univ. (Netherlands). Dept. of Political Science; Dutch Knowledge network for Systems Innovations and Transitions (KSI), Amsterdam (Netherlands); Kameri-Mbote, Patricia [Strathmore Univ., Nairobi (Kenya). Dept. of Law; International Environmental Law Research Centre, Nairobi (Kenya); Chourou, Bechir [Univ. of Tunis-Carthage, Hammam-Chatt (Tunisia); Dunay, Pal [Geneva Centre for Security Policy (Switzerland). International Training Course in Security Policy; Birkmann, Joern (eds.) [United Nations Univ. (UNU), Bonn (DE). Inst. for Environment and Human Security (EHS)

    2011-07-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10 parts concepts of military and political hard security and economic, social, environmental soft security with a regional focus on the Near East, North and Sub-Sahara Africa and Asia and on hazards in urban centres. The major focus is on coping with global environmental change: climate change, desertification, water, food and health and with hazards and strategies on social vulnerability and resilience building and scientific, international, regional and national political strategies, policies and measures including early warning of conflicts and hazards. The book proposes a political geo-ecology and discusses a 'Fourth Green Revolution' for the Anthropocene era of earth history. (orig.)

  8. Survey of current technologies of security management for distributed information systems; Bunsangata joho system no security iji kanri hoshiki no genjo

    Energy Technology Data Exchange (ETDEWEB)

    Matsui, S [Central Research Institute of Electric Power Industry, Tokyo (Japan)

    1997-05-01

    The latest situation of the security management for a distributed information system was examined and systematically summarized to indicate the management design in future. This paper describes the threat of the distributed information system to security, the risk for confidentiality, integrity, and availability due to the threat, and the measures to be taken. The basic technology of security management is classified into the `user certification to prevent an incorrect access` and the `encipherment to prevent data from being used incorrectly.` The technology for certification has been almost completed. It can be securely done using an expendable password or IC card system. In Internet, multiple enciphering technologies for constructing a virtual private network that can secure the almost the same security as for a private network can be used. In an electronic mail, the enciphering technology can also be used easily. The tool that manages the security of very many servers, clients, and networks is in the initial stage. 16 refs., 1 fig., 5 tabs.

  9. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-27

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... Security Challenges; Accelerating Innovation Through Systems Analysis; and Leveraging Industry for Impact... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0053] Homeland Security Science and...

  10. ENVIRONMENTAL SECURITY IN THE REGION IN THE SERVICE OF SUSTAINABLE DEVELOPMENT OF LOCAL SPATIAL

    Directory of Open Access Journals (Sweden)

    Ljiljana Stošić Mihajlović

    2016-04-01

    Full Text Available A fundamental prerequisite for the existence, growth and development of each social community is environmental safety. In modern conditions of environmental degradation as a global process, it is bound to increase social stratification, ethnic and even religious conflict, conflict and intolerance that threatens the safety of society. It is a notorious fact that the world of Simply is no longer in a position to deal with new shocks. The financial crisis has reduced global economic resilience, while geopolitical tensions and increased social concerns point to the fact that the state and society less able than ever to cope with global challenges, among which is the primary problem of environmental security. In modern countries, political, security and other interests of the citizens' day-to-day modeling, transform, get the content, in accordance with the general civilization changes. In this connection, sustainable local spatial development is crucial conditioned ecological without security region and aims to achieve a balance between current consumption of natural resources and the ability of the system to maintain the level at which future generations will be able to use them. The work represents a contribution to the achievement of environmental security as a new, modern forms of security, and originated from the need to once again draw attention to the evident environmental degradation as an integral part of human security. Ecological security of the region protects the basic components of the environment and determinants of the local spatial development. In fact, safety in the field of protection and preservation of the environment is one of the most important factors Security Council shall contemporary world. In doing so, it is important to emphasize, however, that environmental security has no borders and is a global problem, a task and an obligation.

  11. Evolution of Biotechnology and Information Technology and Its Impact on Human Security

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2015-01-01

    Full Text Available Abstract: The development of post-industrial society initiates profound economic, technological and cultural change in the way of life of all mankind. The revolutionary breakthroughs in the field of new technologies such as biotechnology and information technology are reflected in all spheres of human activity, directly affecting the human security. The article analyzes the consequences of widespread usage biotechnology and information technology in the foreign policy practice on the basis of the human security theory. The detailed description of the main directions of the use of biometric technology in the foreign policy and consular practices is provided, the challenges and threats to information security associated with biometrics are analyzed, arising from widespread biotechnology are the main challenges and threats to as well as human security threats arising at the present stage of development and application of these technologies. Human security threats associated with the use of biotechnology are placed in the broader context of global trends in scientific and technological development. The recommendations are formulated in the field of foreign policy and international cooperation, which would neutralize new threats to international and personal safety arising at the present stage of development of biotechnology. The authors conclude that in order to ensure ethical regulation of new technologies that address issues of human security, it is necessary to organize multi-stakeholder partnerships at national and international level with the participation of states, representatives of civil society, business and the research community.

  12. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: GREEN BUILDING TECHNOLOGIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techno...

  13. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-11-07

    ... Technology, such as new developments in systems engineering, cyber-security, knowledge management and how... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0071] Homeland Security Science and... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Science and...

  14. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  15. New trends in science and technology implications for international peace and security

    International Nuclear Information System (INIS)

    1991-01-01

    In December 1988, the General Assembly requested the Secretary-General to follow future scientific and technological developments, especially those with potential military applications, and to evaluate their impact on international security. In resolution 43/77 A it also requested the Secretary-General to report to it at its forty-fifth session. The broad fields in which scientific and technological developments are taking place were identified as: information technology, biotechnology, materials technology, nuclear technology and space technology. These assessments were discussed by a wider group of experts at a high-level conference on ''New trends in science and technology: implications for international peace and security'', held in April 1990 in the city of Sendai, Japan. The Conference, which was attended by nearly 100 participants from over 20 countries, addressed issues of technological change and global security, new technologies and the search for security in the post-cold-war era, and national policy-making and international diplomacy in an era of rapid technological change. General approaches to technology assessment and technology trends in selected areas were also discussed. The positions taken by Member States on the subject of establishing a mechanism for technology assessment were also taken into account. The highlights of the report are summarized

  16. The Department of Energy's safeguards and security technology development program

    International Nuclear Information System (INIS)

    Smith, G.D.; Pocratsky, C.A.

    1995-01-01

    The US DOE has had a program that develops technologies to protect sensitive nuclear weapons facilities for more than thirty years. The mission of the program is overwhelmingly diverse, as it must be to protect an array of assets such as nuclear weapons, special nuclear material in various forms, components of nuclear weapons, and classified nuclear weapons design information. Considering that the nuclear weapons complex consists of dozens of facilities that are scattered all over the US, the technology development mission is very challenging. Complicating matters further is the ever uncertain future of the DOE. Some examples of dramatic Departmental mission changes that directly impact their security technology development program are given. A few development efforts are highlighted as examples of efforts currently being sponsored. They are: automated sensor testing devices to help reduce the requirement for personnel to enter vaults containing highly radioactive nuclear materials; a vehicle inspection portal to screen vehicles for hidden passengers, nuclear material, explosives, and other contraband; non-lead and short-range ammunition as an environmentally safe alternative to lead ammunition; a complex-wide visitor access control system to allow all DOE employees to travel to all sites with a commonly recognized credential; automated nuclear material monitoring technologies to provide assurance that material in storage has not been tampered with; laser radar as a potential solution to early warning deficiencies throughout the Department; performance testing standards for many security products to include an automated and consistent standard for assessing the quality of video; low temperature pyrotechnic smoke as a possible adversary delay mechanism; modular vaults to provide temporary protection for nuclear material during D and D activities, and a protection approach for restricted passage areas such as the volume above a tiled ceiling or within a crawl space

  17. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  18. The Center for Environmental Technology Innovative Technology Screening Process

    International Nuclear Information System (INIS)

    Bertrand, C.M.

    1995-02-01

    The Center for Environmental Technology's (CET) mission is to provide a fully integrated system for accelerated evaluation, development, commercialization, and public acceptance of creative environmental solutions which match the foremost demands in today's environmentally sensitive world. In short, CET will create a means to provide quick, effective solutions for environmental needs. To meet this mission objective, CET has created a unique and innovative approach to eliminating the usual barriers in developing and testing environmental technologies. The approach paves the way for these emerging, cutting-edge technologies by coordinating environmental restoration and waste management activities of industry, universities, and the government to: efficiently and effectively transfer technology to these users, provide market-driven, cost-effective technology programs to the public and DOE, and aid in developing innovative ideas by initiating efforts between DOE facilities and private industry. The central part to this mission is selecting and evaluating specific innovative technologies for demonstration and application at United States Department of Energy (DOE) installations. The methodology and criteria used for this selection, which is called the CET Innovative Technology Screening Process, is the subject of this paper. The selection criteria used for the screening process were modeled after other DOE technology transfer programs and were further developed by CET's Technology Screening and Evaluation Board (TSEB). The process benefits both CET and the proposing vendors by providing objective selection procedures based on predefined criteria. The selection process ensures a rapid response to proposing vendors, all technologies will have the opportunity to enter the selection process, and all technologies are evaluated on the same scale and with identical criteria

  19. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-03-04

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... HSSTAC input on how to improve that collaboration. --Cyber Security and the evolution of the Cyber... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0014] Homeland Security Science and...

  20. U.S. ENVIRONMENTAL PROTECTION AGENCY (EPA) ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: ARSENIC TREATMENT TECHNOLOGIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techn...

  1. Secure messaging via the cloud and mobile devices: data security issues emerge with new technologies.

    Science.gov (United States)

    Prestigiacomo, Jennifer

    2011-05-01

    The secure messaging space is alive with new innovations that are moving the industry forward. Key in this space is the push toward moving secure messaging to the cloud and pushing it out to mobile devices. Among the examples are solutions that allow physicians to receive encrypted email on mobile devices, as well as ones that allow doctors to securely text-message each other to coordinate care. However, the security issues around these emerging technologies in this very active space must be further explored.

  2. 75 FR 3948 - Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc...

    Science.gov (United States)

    2010-01-25

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc., Biosys, Inc., Bolder Technologies Corp., Boyds Wheels, Inc... securities of Biometrics Security Technology, Inc. because it has not filed any periodic reports since...

  3. Capitalization of Defense Technology Security Administration Equipment

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    ... $5.2 million in the Equipment in Use account on its trial balance. Starting with FY 1996, Defense Technology Security Administration financial data will be included in consolidated DoD financial statements...

  4. Information and technology: Improving food security in Uganda ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2014-06-23

    Jun 23, 2014 ... Information and technology: Improving food security in Uganda ... knowledge to make decisions about planting, harvesting, and managing livestock, but ... to be effective for minimizing risks and increasing agricultural productivity. ... In time, this network of information – made possible by digital technology ...

  5. Environmental science and technology

    Energy Technology Data Exchange (ETDEWEB)

    Manahan, S.E. [Univ. of Missouri, Columbia, MO (United States)

    1998-12-31

    This complete survey of modern environmental science covers the four traditional spheres of the environment: water, air, earth, and life, and introduces a fifth sphere -- the anthrosphere -- which the author defines as the sphere of human activities, especially technology, that affect the earth. The book discusses how technology can be used in a manner that minimizes environmental disruption.

  6. Corporate environmental management and information technology

    DEFF Research Database (Denmark)

    Rikhardsson, Pall M.

    2001-01-01

    software, the Internet, computer networks, telecommunications devices, etc. Information technology also has an impact on how companies perform environmental management. This paper looks at the relations between corporate environmental management and information technology. First it presents a framework...... for mapping information technology. Using this framework it focuses on the use of information technology in corporate environmental management, describes the market for standard environmental management information systems and implementation experiences from one large international company.......Information technology has changed, is changing and will continue to change the face of business as we further enter the Information Society. Today it would be difficult for a company to function effectively without the aid of various information technologies such as accounting software, production...

  7. Hydrocomplexity: Addressing water security and emergent environmental risks

    Science.gov (United States)

    Kumar, Praveen

    2015-07-01

    Water security and emergent environmental risks are among the most significant societal concerns. They are highly interlinked to other global risks such as those related to climate, human health, food, human migration, biodiversity loss, urban sustainability, etc. Emergent risks result from the confluence of unanticipated interactions from evolving interdependencies between complex systems, such as those embedded in the water cycle. They are associated with the novelty of dynamical possibilities that have significant potential consequences to human and ecological systems, and not with probabilities based on historical precedence. To ensure water security we need to be able to anticipate the likelihood of risk possibilities as they present the prospect of the most impact through cascade of vulnerabilities. They arise due to a confluence of nonstationary drivers that include growing population, climate change, demographic shifts, urban growth, and economic expansion, among others, which create novel interdependencies leading to a potential of cascading network effects. Hydrocomplexity aims to address water security and emergent risks through the development of science, methods, and practices with the potential to foster a "Blue Revolution" akin to the Green revolution for food security. It blends both hard infrastructure based solution with soft knowledge driven solutions to increase the range of planning and design, management, mitigation and adaptation strategies. It provides a conceptual and synthetic framework to enable us to integrate discovery science and engineering, observational and information science, computational and communication systems, and social and institutional approaches to address consequential water and environmental challenges.

  8. Technology Strategy for 'Environmental Technology for the Future'; Technology Target Areas; TTA1 - environmental technology for the future

    Energy Technology Data Exchange (ETDEWEB)

    2007-07-01

    The OG21 Technology Target Area 1 (TTA 1) group has produced a strategy for 'Environmental Technology for the Future'. A key aim of this work is to ensure that the operators on the Norwegian Continental Shelf (NCS) remain in a leading position with respect to environmental performance, while contributing to optimised resource recovery and value creation. This strategy focuses on environmental technology, which includes hardware, methods, software and knowledge. The TTA 1 group has agreed on a common vision: 'Norwegian oil and gas activities shall be leading in environmental performance, and Norway shall have the world leading knowledge and technology cluster within environmental technologies to support the zero harmful impact goals of the oil and gas industry.' Priorities have been made with emphasis on gaps that are considered most important to close and that will benefit from public research and development funding either for initialisation (primarily via the Petromaks and Climit programs) or acceleration (via Petromaks / Climit and particularly Demo 2000 where demonstration or piloting is required). The priorities aim to avoid technology gaps that are expected to be closed adequately through existing projects / programs or which are covered in other TTA strategies. The priority areas as identified are: Environmental impact and risk identification / quantification for new areas: Make quality assured environmental baseline data available on the web. Develop competence necessary to quantify and monitor the risks and risk reductions to the marine environment in new area ecosystems; Carbon capture and storage: Quantify environmental risks and waste management issues associated with bi-products from carbon capture processes and storage solutions. Develop and demonstrate effective carbon storage risk management, monitoring and mitigation technologies. Develop more cost and energy efficient power-from-shore solutions to reduce / eliminate CO{sub 2

  9. Women's Environmental Literacy As Social Capital In Environmental Management For Environmental Security of Urban Area

    Science.gov (United States)

    Asteria, Donna; Herdiansyah, Herdis; Wayan Agus Apriana, I.

    2016-02-01

    This study is about experience of women's role in environmental management to raise environmental security and form of women's emancipation movement. Environmental concerns conducted by residents of urban women who become environmental activists based on environmental literacy. Because of that, women's experience in interacting with both physic and social environment have differences in managing the environment including managing household waste by applying the principles of the 3Rs (reduce, reuse, recycle) and their persuasive efforts on their communities. This is the key to achieving sustainable development by anticipating environmental problem and preserving the environment. This study is conducted qualitative research method and its type is descriptive-explanative. The result of this study is environmental literacy of women activist on pro-environment action in their community that has achieved spiritual environmental literacy. Environmental literacy may differ due to internal and external condition of each individual. Pro-environment activities conducted as a form of responsibility of environmental concern such as eco-management, educational, and economic action, by persuading residents to proactively and consistently continue to do environmental management and develop a sense of community in shaping the networks of environmental concern in local context for global effect.

  10. Nevada National Security Site Environmental Report 2010

    Energy Technology Data Exchange (ETDEWEB)

    C. Wills, ed.

    2011-09-13

    This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2010 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  11. Security and privacy issues with health care information technology.

    Science.gov (United States)

    Meingast, Marci; Roosta, Tanya; Sastry, Shankar

    2006-01-01

    The face of health care is changing as new technologies are being incorporated into the existing infrastructure. Electronic patient records and sensor networks for in-home patient monitoring are at the current forefront of new technologies. Paper-based patient records are being put in electronic format enabling patients to access their records via the Internet. Remote patient monitoring is becoming more feasible as specialized sensors can be placed inside homes. The combination of these technologies will improve the quality of health care by making it more personalized and reducing costs and medical errors. While there are benefits to technologies, associated privacy and security issues need to be analyzed to make these systems socially acceptable. In this paper we explore the privacy and security implications of these next-generation health care technologies. We describe existing methods for handling issues as well as discussing which issues need further consideration.

  12. Corporate Environmental Management and Information Technology

    DEFF Research Database (Denmark)

    Rikhardsson, Pall M.

    2000-01-01

    software, the internet, computer networks, telecommunications devices, etc. Information technology also has an impact on how companies perform environmental management. This paper explores the relations between environmental management and information technology in general terms. It offers a classification...... framework for the use of information technology in corporate environmental management (CEM), describes the market for standard environmental management information systems solutions, what main functionalities are available and what main trends are visible.......Information technology has changed, is changing and will continue to change the face of business as we further enter the Information Society. Today it would be difficult for a company to function effectively without the aid of various information technologies such as accounting software, production...

  13. Security training with interactive laser-video-disk technology

    International Nuclear Information System (INIS)

    Wilson, D.

    1988-01-01

    DOE, through its contractor EG and G Energy Measurements, Inc., has developed a state-of-the-art interactive-video system for use at the Department of Energy's Central Training Academy. Called the Security Training and Evaluation Shooting System (STRESS), the computer-driven decision shooting system employs the latest is laservideo-disk technology. STRESS is designed to provide realistic and stressful training for security inspectors employed by the DOE and its contractors. The system uses wide-screen video projection, sophisticated scenario-branching technology, and customized video scenarios especially designed for the DOE. Firing a weapon that has been modified to shoot ''laser bullets,'' and wearing a special vest that detects ''hits'': the security inspector encounters adversaries on the wide screen who can shoot or be shot by the inspector in scenarios that demand fast decisions. Based on those decisions, the computer provides instantaneous branching to different scenes, giving the inspector confrontational training with the realism and variability of real life

  14. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  15. European workshop on technologies for environmental protection

    Energy Technology Data Exchange (ETDEWEB)

    Buesing, J H; Pippich, B [eds.

    1996-12-31

    Current European research activities in the field of environmental technologies are discussed under the following headings: photocatalysis; emission abatement - catalytic processes (mainly NO{sub x} reduction catalysts for vehicles and industrial boilers); emission abatement - biological and chemical processes; biological wastewater treatment; chemical and physical wastewater treatment; integrated wastewater treatment; environmental technologies in pulp and paper industry; environmental technologies in surface treatment; selected examples of `clean technologies`; environmental technologies in ceramic and cement industry and policy and strategies.

  16. Discussion on the Technology and Method of Computer Network Security Management

    Science.gov (United States)

    Zhou, Jianlei

    2017-09-01

    With the rapid development of information technology, the application of computer network technology has penetrated all aspects of society, changed people's way of life work to a certain extent, brought great convenience to people. But computer network technology is not a panacea, it can promote the function of social development, but also can cause damage to the community and the country. Due to computer network’ openness, easiness of sharing and other characteristics, it had a very negative impact on the computer network security, especially the loopholes in the technical aspects can cause damage on the network information. Based on this, this paper will do a brief analysis on the computer network security management problems and security measures.

  17. WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THREATS AND ITS COUNTERMEASURES

    OpenAIRE

    Ranjit Panigrahi; Kalpana Sharma; M.K. Ghose

    2013-01-01

    Wireless Sensor Network (WSN) has a huge range of applications such as battlefield, surveillance, emergency rescue operation and smart home technology etc. Apart from its inherent constraints such as limited memory and energy resources, when deployed in hostile environmental conditions, the sensor nodes are vulnerable to physical capture and other security constraints. These constraints put security as a major challenge for the researchers in the field of computer networking. T...

  18. Soils and food security | Nortcliff | Nigerian Journal of Technological ...

    African Journals Online (AJOL)

    A threat impacting on food security strongly in Africa is nutrient mining where insufficient nutrients are returned to the soil after crop production. The impacts of global change on food security and the potential impacts of global markets for food and land are also briefly discussed. Nigerian Journal of Technological Research ...

  19. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  20. The Search for Security Technology Funding.

    Science.gov (United States)

    Fickes, Michael

    2003-01-01

    Explains that although it is difficult to find money to pay for school security technology, there are places to look. For example, the Department of Education has a list serve that summarizes various funding opportunities. There is also a Federal Register list serve and a site put out by the Department of Justice. A sidebar presents three…

  1. Environmental security benefits arising from Russian/Norwegian/US cooperation in the high Arctic

    International Nuclear Information System (INIS)

    Dyer, R.S.

    1997-01-01

    Past practices associated with the civilian and military use of nuclear power in NW Russia present large environmental security risks of international concern. These risks arise from a variety of practices associated with weapons production, testing, power production and waste management. The threats presented by these activities are multimedia in nature, span political boundaries and cannot be simply or inexpensively remediated. Today, cooperative efforts are being undertaken to improve environmental security by remediating existing and potential emission sources. Initial efforts focused on the upgrade and expansion of the Murmansk Low-level Liquid Waste Treatment Facility, Murmansk, Russia. This facility handles wastes generated during the decommissioning of Russian Nuclear Navy submarines and from the operation of the Russian commercial nuclear-powered icebreaker fleet. This upgraded facility is now being constructed and is expected to be completed by March 1998. Completion of this facility will result in the cessation of any future dumping of liquid radioactive wastes into the Barents and Kara Seas. Another large environmental security risk is the LEPSE. The LEPSE is a ship docked in Murmansk, Russia, that contains ∼650 spent fuel elements as well as other solid and liquid wastes from Russian nuclear vessels. International efforts are now being mounted to remove the spent and damaged fuel from this ship, including the safe removal and storage/disposal of the fuel elements. This paper will summarize the environmental security problems presented by these different sources and the likely environmental security benefits associated with their remediation. 5 refs., 1 fig., 1 tab

  2. Three Essays on Information Technology Security Management in Organizations

    Science.gov (United States)

    Gupta, Manish

    2011-01-01

    Increasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to…

  3. Trends in Global Agricultural Land Use: Implications for Environmental Health and Food Security.

    Science.gov (United States)

    Ramankutty, Navin; Mehrabi, Zia; Waha, Katharina; Jarvis, Larissa; Kremen, Claire; Herrero, Mario; Rieseberg, Loren H

    2018-04-29

    The eighteenth-century Malthusian prediction of population growth outstripping food production has not yet come to bear. Unprecedented agricultural land expansions since 1700, and technological innovations that began in the 1930s, have enabled more calorie production per capita than was ever available before in history. This remarkable success, however, has come at a great cost. Agriculture is a major cause of global environmental degradation. Malnutrition persists among large sections of the population, and a new epidemic of obesity is on the rise. We review both the successes and failures of the global food system, addressing ongoing debates on pathways to environmental health and food security. To deal with these challenges, a new coordinated research program blending modern breeding with agro-ecological methods is needed. We call on plant biologists to lead this effort and help steer humanity toward a safe operating space for agriculture.

  4. An environmental assessment system for environmental technologies

    DEFF Research Database (Denmark)

    Clavreul, Julie; Baumeister, Hubert; Christensen, Thomas Højlund

    2014-01-01

    A new model for the environmental assessment of environmental technologies, EASETECH, has been developed. The primary aim of EASETECH is to perform life-cycle assessment (LCA) of complex systems handling heterogeneous material flows. The objectives of this paper are to describe the EASETECH...

  5. Environmental management technology demonstration and commercialization

    International Nuclear Information System (INIS)

    Daly, D.J.; Erickson, T.A.; Groenewold, G.H.

    1995-01-01

    The Energy ampersand Environmental Research Center (EERC), a contract-supported organization focused on technology research, development, demonstration, and commercialization (RDD ampersand C), is entering its second year of a Cooperative Agreement with the U.S. Department of Energy (DOE) Morgantown Energy Technology Center (METC) to facilitate the development, demonstration, and commercialization of innovative environmental management (EM) technologies in support of the activities of DOE's Office of Environmental Science and Technology (EM-50) under DOE's EM Program. This paper reviews the concept and approach of the program under the METC-EERC EM Cooperative Agreement and profiles the role the program is playing in the commercialization of five EM technologies

  6. Environmental management technology demonstration and commercialization

    Energy Technology Data Exchange (ETDEWEB)

    Daly, D.J.; Erickson, T.A.; Groenewold, G.H. [Energy & Environmental Research Center, Grand Forks, ND (United States)] [and others

    1995-10-01

    The Energy & Environmental Research Center (EERC), a contract-supported organization focused on technology research, development, demonstration, and commercialization (RDD&C), is entering its second year of a Cooperative Agreement with the U.S. Department of Energy (DOE) Morgantown Energy Technology Center (METC) to facilitate the development, demonstration, and commercialization of innovative environmental management (EM) technologies in support of the activities of DOE`s Office of Environmental Science and Technology (EM-50) under DOE`s EM Program. This paper reviews the concept and approach of the program under the METC-EERC EM Cooperative Agreement and profiles the role the program is playing in the commercialization of five EM technologies.

  7. Machine Learning Technologies Translates Vigilant Surveillance Satellite Big Data into Predictive Alerts for Environmental Stressors

    Science.gov (United States)

    Johnson, S. P.; Rohrer, M. E.

    2017-12-01

    The application of scientific research pertaining to satellite imaging and data processing has facilitated the development of dynamic methodologies and tools that utilize nanosatellites and analytical platforms to address the increasing scope, scale, and intensity of emerging environmental threats to national security. While the use of remotely sensed data to monitor the environment at local and global scales is not a novel proposition, the application of advances in nanosatellites and analytical platforms are capable of overcoming the data availability and accessibility barriers that have historically impeded the timely detection, identification, and monitoring of these stressors. Commercial and university-based applications of these technologies were used to identify and evaluate their capacity as security-motivated environmental monitoring tools. Presently, nanosatellites can provide consumers with 1-meter resolution imaging, frequent revisits, and customizable tasking, allowing users to define an appropriate temporal scale for high resolution data collection that meets their operational needs. Analytical platforms are capable of ingesting increasingly large and diverse volumes of data, delivering complex analyses in the form of interpretation-ready data products and solutions. The synchronous advancement of these technologies creates the capability of analytical platforms to deliver interpretable products from persistently collected high-resolution data that meet varying temporal and geographic scale requirements. In terms of emerging environmental threats, these advances translate into customizable and flexible tools that can respond to and accommodate the evolving nature of environmental stressors. This presentation will demonstrate the capability of nanosatellites and analytical platforms to provide timely, relevant, and actionable information that enables environmental analysts and stakeholders to make informed decisions regarding the prevention

  8. Competitive Technologies for National Security: Review and Recommendations

    National Research Council Canada - National Science Library

    Carafano, James J; Gudgel, Andew; Kochems, Alane

    2008-01-01

    .... Innovation will always be a national security wild card. New technologies may unleash or accelerate social and cultural changes that affect how nations protect themselves on battlefields and behind the scenes...

  9. Reducing security risk using data loss prevention technology.

    Science.gov (United States)

    Beeskow, John

    2015-11-01

    Data loss/leakage protection (DLP) technology seeks to improve data security by answering three fundamental questions: > Where are confidential data stored? > Who is accessing the information? > How are data being handled?

  10. After Globalization Future Security in a Technology Rich World

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin,T J

    2001-08-17

    Over the course of the year 2000, five workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats to international security in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. The participants included US national leaders and experts from the Department of Energy National Laboratories; the Department of Defense: Army, Navy, Air Force, Office of the Secretary of Defense, Defense Threat Reduction Agency, and Defense Advanced Research Projects Agency; the Department of State, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. The threats ranged from local/regional to global, from intentional to unintended to natural, from merely economic to massively destructive, and from individual and group to state actions. We were not concerned in this exercise with defining responses to the threats, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be executed or countered. At the concluding review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and national responsibility, and discussed the workshop findings to determine what is most certain or uncertain, and what might be needed to resolve our uncertainties. This paper summarizes the consenses and

  11. A study of the security technology and a new security model for WiFi network

    Science.gov (United States)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  12. Using Science Driven Technologies for the Defense and Security Applications

    Science.gov (United States)

    Habib, Shahid; Zukor, Dorthy; Ambrose, Stephen D.

    2004-01-01

    For the past three decades, Earth science remote sensing technologies have been providing enormous amounts of useful data and information in broadening our understanding of our home planet as a system. This research, as it has expanded our learning process, has also generated additional questions. This has further resulted in establishing new science requirements, which have culminated in defining and pushing the state-of-the-art technology needs. NASA s Earth science program has deployed 18 highly complex satellites, with a total of 80 sensors, so far and is in a process of defining and launching multiple observing systems in the next decade. Due to the heightened security alert of the nation, researchers and technologists are paying serious attention to the use of these science driven technologies for dual use. In other words, how such sophisticated observing and measuring systems can be used in detecting multiple types of security concerns with a substantial lead time so that the appropriate law enforcement agencies can take adequate steps to defuse any potential risky scenarios. This paper examines numerous NASA technologies such as laser/lidar systems, microwave and millimeter wave technologies, optical observing systems, high performance computational techniques for rapid analyses, and imaging products that can have a tremendous pay off for security applications.

  13. Technology needs assessment for DOE environmental restoration programs

    International Nuclear Information System (INIS)

    Duray, J.R.; Carlson, T.J.; Carpenter, C.E.; Cummins, L.E.; Daub, G.J.

    1992-01-01

    The 'Technology Needs Assessment Final Report' describes current and planned environmental restoration activity, identifies technologies intended to be used or under consideration, and ranks technology deficiencies in the U.S. Department of Energy's environmental restoration program. Included in the ranking are treatment technologies, characterization technologies, and non-technology issues that affect environmental restoration. Data used for the assessment was gathered during interviews in the spring of 1991 with DOE site personnel responsible for the environmental restoration work. (author)

  14. Maritime energy and security: Synergistic maximization or necessary tradeoffs?

    International Nuclear Information System (INIS)

    Nyman, Elizabeth

    2017-01-01

    Offshore energy is big business. The traditional source of maritime energy, offshore petroleum and gas, has been on the rise since a reliable method of extraction was discovered in the mid-20th century. Lately, it has been joined by offshore wind and tidal power as alternative “green” sources of maritime energy. Yet all of this has implications for maritime environmental regimes as well, as maritime energy extraction/generation can have a negative effect on the ocean environment. This paper considers two major questions surrounding maritime energy and environmental concerns. First, how and why do these two concerns, maritime energy and environmental protection, play against each other? Second, how can states both secure their energy and environmental securities in the maritime domain? Maximizing maritime energy output necessitates some environmental costs and vice versa, but these costs vary with the type of offshore energy technology used and with the extent to which states are willing to expend effort to protect both environmental and energy security. - Highlights: • Security is a complicated concept with several facets including energy and environmental issues. • Offshore energy contributes to energy supply but can have environmental and monitoring costs. • Understanding the contribution of offshore energy to security depends on which security facet is deemed most important.

  15. Technology integration project: Environmental Restoration Technologies Department Sandia National Laboratories

    International Nuclear Information System (INIS)

    Williams, C.V.; Burford, T.D.

    1996-08-01

    Sandia National Laboratories Environmental Restoration Technologies Department is developing environmental restoration technologies through funding form the US Department of Energy's (DOE's) Office of Science and Technology. Initially, this technology development has been through the Mixed Waste Landfill Integrated Demonstration (MWLID). It is currently being developed through the Contaminant Plume containment and Remediation Focus Area, the Landfill Stabilization Focus Area, and the Characterization, Monitoring, and Sensor Cross-Cutting Program. This Technology Integration Project (TIP) was responsible for transferring MWLID-developed technologies for routine use by environmental restoration groups throughout the DOE complex and commercializing these technologies to the private sector. The MWLID's technology transfer/commercialization successes were achieved by involving private industry in development, demonstration, and technology transfer/commercialization activities; gathering and disseminating information about MWLID activities and technologies; and promoting stakeholder and regulatory involvement. From FY91 through FY95, 30 Technical Task Plans (TTPs) were funded. From these TTPs, the MWLID can claim 15 technology transfer/commercialization successes. Another seven technology transfer/commercialization successes are expected. With the changeover to the focus areas, the TIP continued the technology transfer/commercialization efforts begun under the MWLID

  16. Technology integration project: Environmental Restoration Technologies Department Sandia National Laboratories

    Energy Technology Data Exchange (ETDEWEB)

    Williams, C.V.; Burford, T.D. [Sandia National Labs., Albuquerque, NM (United States). Environmental Restoration Technologies; Allen, C.A. [Tech Reps, Inc., Albuquerque, NM (United States)

    1996-08-01

    Sandia National Laboratories Environmental Restoration Technologies Department is developing environmental restoration technologies through funding form the US Department of Energy`s (DOE`s) Office of Science and Technology. Initially, this technology development has been through the Mixed Waste Landfill Integrated Demonstration (MWLID). It is currently being developed through the Contaminant Plume containment and Remediation Focus Area, the Landfill Stabilization Focus Area, and the Characterization, Monitoring, and Sensor Cross-Cutting Program. This Technology Integration Project (TIP) was responsible for transferring MWLID-developed technologies for routine use by environmental restoration groups throughout the DOE complex and commercializing these technologies to the private sector. The MWLID`s technology transfer/commercialization successes were achieved by involving private industry in development, demonstration, and technology transfer/commercialization activities; gathering and disseminating information about MWLID activities and technologies; and promoting stakeholder and regulatory involvement. From FY91 through FY95, 30 Technical Task Plans (TTPs) were funded. From these TTPs, the MWLID can claim 15 technology transfer/commercialization successes. Another seven technology transfer/commercialization successes are expected. With the changeover to the focus areas, the TIP continued the technology transfer/commercialization efforts begun under the MWLID.

  17. The Political Economy of Carbon Securities and Environmental Policy

    DEFF Research Database (Denmark)

    Polborn, Sarah

    The costs of the current suboptimal carbon abatement policy are likely in the range of 3 to 6 trillion 2005 US dollars. Using methods from the political economy of environmental policy, the paper develops a new carbon abatement policy instrument, carbon securities. A carbon security entitles its...... owner to a ?xed proportion of ex ante unknown total emissions. This creates an additional group of stakeholders on the side of the issue that has traditionally been underrepresented. The advantages over existing systems include an equilibrium carbon price closer to the social optimum, a more predictable...

  18. Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security.

    Science.gov (United States)

    Pavone, Vincenzo; Esposti, Sara Degli

    2012-07-01

    As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.

  19. 78 FR 41954 - TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher...

    Science.gov (United States)

    2013-07-12

    ... Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business Technology Solutions Central Security Services Plymouth, Minnesota; TA- W-82,634C, Prudential Global Business Technology Solutions Central Security Services Scottsdale, Arizona; TA-W-82,634D...

  20. Technology diffusion, product differentiation and environmental subsidies

    Energy Technology Data Exchange (ETDEWEB)

    McGinty, M. [Univ. of Wisconsin, Milwaukee, WI (United States). Dept. of Economics; Vries, F.P. de [Univ. of Groningen (Netherlands). Dept. of Law and Economics

    2007-07-01

    Technological change is often seen as the promising device that will mitigate or solve environmental problems. Policy intervention that spurs the development, adoption and diffusion of new, environmentally benign technologies therefore holds great appear for environmental authorities. Policymakers have various instruments at their disposal to affect technological diffusion, ranging from direct regulation (command-and-control strategies) to market-based instruments, such as taxes, subsidies and tradable pollution permits. This paper examines environmental subsidies as a technology diffusion policy. The authors apply evolutionary game theory to explore the relationship between subsidies for clean technology, the diffusion of that technology and the degree of product differentiation in an imperfectly competitive market. They show that the subsidy succeeds in reducing environmental damage only when the substitution effect (the reduction in pollution associated with the clean technology) exceeds the output effect (the extent that the subsidy increases output). When the substitution effect does dominate, environmental damage decreases monotonically during the diffusion process. The extent of diffusion (the degree to which clean technolgy replaces dirty) and the likelihood that the substitution effect will dominate both decrease with the extent of product differentiation. Finally, the subsidy for clean technology will spill over to the remaining dirty producers increasing their profit as well.

  1. 78 FR 56263 - HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc...

    Science.gov (United States)

    2013-09-12

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc., SLM Holdings, Inc., Spring Creek Healthcare Systems... securities of Security Intelligence Technologies, Inc. because it has not filed any periodic reports since...

  2. Global environmental technologies in the future

    International Nuclear Information System (INIS)

    Takahashi, M.

    1994-01-01

    This paper outlines the activities of New Energy and industrial Technology Development Organization's (NEDO) 'Research and Development of Industrial Technology' projects which are related to global environmental technologies. Then, it describes four new material programs and two biotechnology ones, and presents a list of a few environmentally-friendly technologies. These national projects are carried out by private companies which are consigned by NEDO in conformity with MITI's fundamental Research and Development policy. (TEC)

  3. Technology scale and supply chains in a secure, affordable and low carbon energy transition

    International Nuclear Information System (INIS)

    Hoggett, Richard

    2014-01-01

    Highlights: • Energy systems need to decarbonise, provide security and remain affordable. • There is uncertainty over which technologies will best enable this to happen. • A strategy to deal with uncertainty is to assess a technologies ability to show resilience, flexibility and adaptability. • Scale is important and smaller scale technologies are like to display the above characteristics. • Smaller scale technologies are therefore more likely to enable a sustainable, secure, and affordable energy transition. - Abstract: This research explores the relationship between technology scale, energy security and decarbonisation within the UK energy system. There is considerable uncertainty about how best to deliver on these goals for energy policy, but a focus on supply chains and their resilience can provide useful insights into the problems uncertainty causes. Technology scale is central to this, and through an analysis of the supply chains of nuclear power and solar photovoltaics, it is suggested that smaller scale technologies are more likely to support and enable a secure, low carbon energy transition. This is because their supply chains are less complex, show more flexibility and adaptability, and can quickly respond to changes within an energy system, and as such they are more resilient than large scale technologies. These characteristics are likely to become increasingly important in a rapidly changing energy system, and prioritising those technologies that demonstrate resilience, flexibility and adaptability will better enable a transition that is rapid, sustainable, secure and affordable

  4. THE ENVIRONMENTAL TECHNOLOGIES ACCEPTANCE (ETA) PROGRAM

    International Nuclear Information System (INIS)

    Behr-Andres, Christina B.

    2001-01-01

    The Environmental Technologies Acceptance (ETA) Program at the Energy and Environmental Research Center (EERC) is intended to advance the development, commercial acceptance, and timely deployment of selected private sector technologies for the cleanup of sites in the nuclear defense complex as well as the greater market. As shown in Table 1, this cooperative agreement funded by the National Energy Technology Laboratory (NETL) consists of three tasks: Technology Selection, Technology Development, and Technology Verification. As currently conceived, the ETA will address the needs of as many technologies as appropriate under its current 3-year term. This report covers activities during the first 6 months of the 3-year ETA program

  5. 78 FR 45255 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-07-26

    ..., cyber-security, knowledge management and how best to leverage related technologies funded by other... INFORMATION CONTACT: Mary Hanson, HSSTAC Executive Director, Science and Technology Directorate, Department of... Technology Advisory Committee (HSSTAC) ACTION: Notice of Federal Advisory Committee charter renewal. SUMMARY...

  6. Environmental security as related to scale mismatches of disturbance patterns in a panarchy of social-ecological landscapes

    Science.gov (United States)

    Giovanni Zurlini; Irene Petrosillo; Nicola Zaccarelli; Kurt Riitters

    2008-01-01

    Environmental security, as the opposite of environmental fragility (vulnerability), is multilayered, multi-scale and complex, existing in both the objective realm of biophysics and society, and the subjective realm of individual human perception. For ecological risk assessments (ERAs), the relevant objects of environmental security are social-ecological landscapes (...

  7. Diagnosing water security in the rural North with an environmental security framework.

    Science.gov (United States)

    Penn, Henry J F; Loring, Philip A; Schnabel, William E

    2017-09-01

    This study explores the nature of water security challenges in rural Alaska, using a framework for environmental security that entails four interrelated concepts: availability, access, utility, and stability of water resources. Many researchers and professionals agree that water insecurity is a problem in rural Alaska, although the scale and nature of the problem is contested. Some academics have argued that the problem is systemic, and rooted in an approach to water security by the state that prioritizes economic concerns over public health concerns. Health practitioners and state agencies, on the other hand, contend that much progress has been made, and that nearly all rural households have access to safe drinking water, though many are still lacking 'modern' in-home water service. Here, we draw on a synthesis of ethnographic research alongside data from state agencies to show that the persistent water insecurity problems in rural Alaska are not a problem of access to or availability of clean water, or a lack of 'modern' infrastructure, but instead are rooted in complex human dimensions of water resources management, including the political legacies of state and federal community development schemes that did not fully account for local needs and challenges. The diagnostic approach we implement here helps to identify solutions to these challenges, which accordingly focus on place-based needs and empowering local actors. The framework likewise proves to be broadly applicable to exploring water security concerns elsewhere in the world. Copyright © 2017 Elsevier Ltd. All rights reserved.

  8. Clean fuel technology for world energy security

    Energy Technology Data Exchange (ETDEWEB)

    Sunjay, Sunjay

    2010-09-15

    Clean fuel technology is the integral part of geoengineering and green engineering with a view to global warming mitigation. Optimal utilization of natural resources coal and integration of coal & associated fuels with hydrocarbon exploration and development activities is pertinent task before geoscientist with evergreen energy vision with a view to energy security & sustainable development. Value added technologies Coal gasification,underground coal gasification & surface coal gasification converts solid coal into a gas that can be used for power generation, chemical production, as well as the option of being converted into liquid fuels.

  9. High-Performance Secure Database Access Technologies for HEP Grids

    Energy Technology Data Exchange (ETDEWEB)

    Matthew Vranicar; John Weicher

    2006-04-17

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the

  10. High-Performance Secure Database Access Technologies for HEP Grids

    International Nuclear Information System (INIS)

    Vranicar, Matthew; Weicher, John

    2006-01-01

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist's computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that 'Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications'. There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure

  11. HEMISPHERIC CENTER FOR ENVIRONMENTAL TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    M.A. Ebadian

    1999-10-31

    The Deactivation and Decommissioning (D&D) Technology Assessment Program (TAP) was developed to provide detailed, comparable data for environmental technologies and to disseminate this data to D&D professionals in a manner that will facilitate the review and selection of technologies to perform decontamination and decommissioning. The objectives for this project include the following: Determine technology needs through review of the Site Technology Coordination Group (STCG) information and other applicable websites and needs databases; Perform a detailed review of industries that perform similar activities as those required in D&D operations to identify additional technologies; Define the technology assessment program for characterization and waste management problem sets; Define the data management program for characterization, dismantlement, and waste management problem sets; Evaluate baseline and innovative technologies under standard test conditions at Florida International University's Hemispheric Center for Environmental Technology (FIU-HCET) and other locations and collect data in the areas of performance, cost, health and safety, operations and maintenance, and primary and secondary waste generation; Continue to locate, verify, and incorporate technology performance data from other sources into the multimedia information system; and Develop the conceptual design for a dismantlement technology decision analysis tool for dismantlement technologies.

  12. Political measures for promoting environmental technology

    International Nuclear Information System (INIS)

    2006-01-01

    Environmental technology can contribute to solving many environmental challenges and to industrial development. Measures to support the development and use of such technologies can be regulatory, economic or administrative, and usually one needs to use a combination of different measures in order to reach both a better environment and industrial development. For industrial development other measures than those administered by environmental authorities will be of importance. The environmental authorities therefore need to acquire knowledge about these measures and the bodies administering them, and develop an operative cooperation with these actors

  13. Information security becoming a priority for utilities

    Energy Technology Data Exchange (ETDEWEB)

    Nicolaides, S. [Numerex, Atlanta, GA (United States)

    2009-10-15

    As part of North America's national critical infrastructure, utilities are finding themselves at the forefront of a security issue. In October 2007, a leading security service provider reported a 90 per cent increase in the number of hackers attempting to attack its utility clients in just one year. Utilities are vulnerable to cyber attacks that could disrupt power production and the transmission system. This article discussed the need for intelligent technologies in securely enabling resource management and operational efficiency of the utilities market. It discussed the unique security challenges that utilities face at a time of greater regulatory activity, heightened environmental concerns, tighter data security requirements and an increasing need for remote monitoring and control. A new tool has emerged for cyber security in the form of an international standard that may offer a strong guideline to work toward 11 security domains. These include security policy; organization of information security; asset management; human resources security; physical and environmental security; communications and operations management; access control; information systems acquisition; development and maintenance; information security incident management; business continuity management; and compliance. 2 figs.

  14. Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model

    Science.gov (United States)

    Kassa, Woldeloul

    2016-01-01

    Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…

  15. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - PORTABLE GAS CHROMATOGRAPH ELECTRONIC SENSOR TECHNOLOGY MODEL 4100

    Science.gov (United States)

    The U.S. Environmental Protection Agency, through the Environmental Technology Verification Program, is working to accelerate the acceptance and use of innovative technologies that improve the way the United States manages its environmental problems. As part of this program, the...

  16. The Western Environmental Technology Office (WETO), Butte, Montana. Technology summary (Revised)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    This document has been prepared by the US Department of Energy`s (DOE`s) Office of Environmental Management (EM) Office of Science and Technology (OST) to highlight its research, development, demonstration, testing, and evaluation (RDDT&E) activities funded through the Western environmental Technology Office (WETO) in Butte, Montana. Technologies and processes described in this document have the potential to enhance DOE`s cleanup and waste management efforts, as well as improve US industry`s competitiveness in global environmental markets. The information presented in this document has been assembled from recently produced OST documents that highlight technology development activities within each of the OST program elements and Focus Areas. This document presents one in a series for each of DOE`s Operations Office and Energy Technology Centers.

  17. The Western Environmental Technology Office (WETO), Butte, Montana. Technology summary (Revised)

    International Nuclear Information System (INIS)

    1996-03-01

    This document has been prepared by the US Department of Energy's (DOE's) Office of Environmental Management (EM) Office of Science and Technology (OST) to highlight its research, development, demonstration, testing, and evaluation (RDDT ampersand E) activities funded through the Western environmental Technology Office (WETO) in Butte, Montana. Technologies and processes described in this document have the potential to enhance DOE's cleanup and waste management efforts, as well as improve US industry's competitiveness in global environmental markets. The information presented in this document has been assembled from recently produced OST documents that highlight technology development activities within each of the OST program elements and Focus Areas. This document presents one in a series for each of DOE's Operations Office and Energy Technology Centers

  18. Development of IT-based Cyber Security Technology for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Hong, S. B.; Lee, J. C.; Choi, Y. S.; Choi, Y. R.; Cho, J. W.; Jung, C. E.; Jeong, K. I.; Park, B.; Koo, I. S.

    2009-11-01

    Development and enlargement of the high speed communication network make it possible the user to access online information easily. It generates changing offline activities to online in the economics, expansion of cultural interchanges and convenient life. But it also causes misuse, wiretapping, forgery and alteration of the information via illegal invasion(virus, hacking), and these are derived from the open network characteristic, weakness of the securities of the TCP/IP protocol and information systems. The security of individual and the national foundation facility(industry and government) can be threatened because of these problems, and theses can be used as a instrument of cyber-war. Many cyber security technologies have been developed to corp with the cyber threat. One of the most important national facility is the nuclear power plant and the necessity of the cyber security for the digital I and C of it have been proposed since middle of the 2000. KINS announced the regulation of the cyber security for the digital I and C of the nuclear power plant in 2007. The main concept of the cyber security for it is similar to the IT field that is treated as a leader of the cyber security. Because of the difference of the characteristics between the IT field and the nuclear industry, applying the cyber security technologies developed and used in the IT field to the nuclear industry has some critical constraints. We will analyze these problems and propose a cyber security method based on cryptograph and authentication for the I and C communication network in this report

  19. Development of IT-based Cyber Security Technology for Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Hong, S. B.; Lee, J. C.; Choi, Y. S.; Choi, Y. R.; Cho, J. W.; Jung, C. E.; Jeong, K. I.; Park, B.; Koo, I. S

    2009-11-15

    Development and enlargement of the high speed communication network make it possible the user to access online information easily. It generates changing offline activities to online in the economics, expansion of cultural interchanges and convenient life. But it also causes misuse, wiretapping, forgery and alteration of the information via illegal invasion(virus, hacking), and these are derived from the open network characteristic, weakness of the securities of the TCP/IP protocol and information systems. The security of individual and the national foundation facility(industry and government) can be threatened because of these problems, and theses can be used as a instrument of cyber-war. Many cyber security technologies have been developed to corp with the cyber threat. One of the most important national facility is the nuclear power plant and the necessity of the cyber security for the digital I and C of it have been proposed since middle of the 2000. KINS announced the regulation of the cyber security for the digital I and C of the nuclear power plant in 2007. The main concept of the cyber security for it is similar to the IT field that is treated as a leader of the cyber security. Because of the difference of the characteristics between the IT field and the nuclear industry, applying the cyber security technologies developed and used in the IT field to the nuclear industry has some critical constraints. We will analyze these problems and propose a cyber security method based on cryptograph and authentication for the I and C communication network in this report.

  20. A Survey On Biometric Security Technologies From Cloud Computing Perspective

    Directory of Open Access Journals (Sweden)

    Shivashish Ratnam

    2015-08-01

    Full Text Available Cloud computing is one of the rising technologies that takes set of connections users to the next level. Cloud is a technology where resources are paid as per usage rather than owned. One of the major challenges in this technology is Security. Biometric systems provide the answer to ensure that the rendered services are accessed only by a legal user or an authorized user and no one else. Biometric systems recognize users based on behavioral or physiological characteristics. The advantages of such systems over traditional validation methods such as passwords and IDs are well known and hence biometric systems are progressively gaining ground in terms of usage. This paper brings about a new replica of a security system where in users have to offer multiple biometric finger prints during Enrollment for a service. These templates are stored at the cloud providers section. The users are authenticated based on these finger print designed templates which have to be provided in the order of arbitrary numbers or imaginary numbers that are generated every time continuously. Both finger prints templates and images are present and they provided every time duration are encrypted or modified for enhanced security.

  1. Heterogeneous technologies, strategic groups and environmental efficiency technology gaps for European countries

    International Nuclear Information System (INIS)

    Kounetas, Konstantinos

    2015-01-01

    This paper measures technology (TG) and environmental efficiency technology gaps (EETGs) in 25 European countries over two distinct periods 2002 and 2008 examining the possible effect of adopted environmental regulations and the Kyoto protocol commitments on environmental efficiency technology gaps. However, the introduction of the metafrontier in our analysis puts into our discussion the role of heterogeneous technologies and its effect on the above-mentioned measures. Employing a directional distance function, we investigate whether there is an actual difference, in terms of environmental efficiency and efficiency performance, among European countries considering the technological frontiers under which they operate. The construction of individual frontiers has been realized employing a large number of variables that are highly correlated with countries' learning and absorbing capacity, new technological knowledge and using economic theory and classical frontier discrimination like developed vs. developing, North vs. South and participation in the Eurozone or not. The overall results indicate a crucial role of heterogeneous technologies for technology gaps in both periods. Moreover, a significant decrease for both measures, although in different percent, has been recorded emphasizing the key role of knowledge spillovers. -- Highlights: •We estimate technology gaps (TGs) for 25 EU countries in two distinct periods. •We estimate environmental efficiency technology gaps (EETGs). •We consider countries' technological capabilities with R&D, innovation and eco-innovation. •We test the effect of different frontier constitutions on TGs-EETGs. •We denote the specific role of knowledge spillovers

  2. Cooperative monitoring and its role in regional security

    Energy Technology Data Exchange (ETDEWEB)

    Biringer, K.; Olsen, J.; Lincoln, R.; Wehling, F. [and others

    1997-03-01

    Cooperative monitoring systems can play an important part in promoting the implementation of regional cooperative security agreements. These agreements advance the national security interests of the United States in a post Cold War environment. Regional issues as widely varying as nuclear nonproliferation, trade and environmental pollution can be the source of tensions which may escalate to armed conflict which could have global implications. The Office of National Security Policy Analysis at the US Department of Energy (DOE) has an interest in seeking ways to promote regional cooperation that can reduce the threats posed by regional conflict. DOE technologies and technical expertise can contribute to developing solutions to a wide variety of these international problems. Much of this DOE expertise has been developed in support of the US nuclear weapons and arms control missions. It is now being made available to other agencies and foreign governments in their search for regional security and cooperation. This report presents two examples of interest to DOE in which monitoring technologies could be employed to promote cooperation through experimentation. The two scenarios include nuclear transparency in Northeast Asia and environmental restoration in the Black Sea. Both offer the potential for the use of technology to promote regional cooperation. The issues associated with both of these monitoring applications are presented along with examples of appropriate monitoring technologies, potential experiments and potential DOE contributions to the scenarios.

  3. Development of environmental radiation control technology

    International Nuclear Information System (INIS)

    Kim, Ingyu; Kim, Enhan; Keum, Dongkwon

    2012-04-01

    To develop the comprehensive environmental radiation management technology, - An urban atmospheric dispersion model and decision-aiding model have been developed. - The technologies for assessing the radiation impact to non-human biota and the environmental medium contamination have developed. - The analytical techniques of the indicator radionuclides related to decommissioning of nuclear facilities and nuclear waste repository have been developed. - The national environmental radiation impact has been assessed, and the optimum management system of natural radiation has been established

  4. Reform of the National Security Science and Technology Enterprise

    National Research Council Canada - National Science Library

    Berry, William; Coffey, Timothy; DeYoung, Donald; Kadtke, James; Loeb, Cheryl

    2008-01-01

    A strong science and technology (S&T) program has been vitally important to American national security since World War II and has to date given the United States a strategic advantage over competitors...

  5. Development of decontamination, decommissioning and environmental restoration technology

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Byung Jik; Kwon, H S; Kim, G N. and others

    1999-03-01

    Through the project of 'Development of decontamination, decommissioning and environmental restoration technology', the followings were studied. 1. Development of decontamination and repair technology for nuclear fuel cycle facilities 2. Development of dismantling technology 3. Development of environmental restoration technology. (author)

  6. Development of decontamination, decommissioning and environmental restoration technology

    International Nuclear Information System (INIS)

    Lee, Byung Jik; Kwon, H. S.; Kim, G. N. and others

    1999-03-01

    Through the project of D evelopment of decontamination, decommissioning and environmental restoration technology , the followings were studied. 1. Development of decontamination and repair technology for nuclear fuel cycle facilities 2. Development of dismantling technology 3. Development of environmental restoration technology. (author)

  7. The impact of medical technology on sense of security in the palliative home care setting.

    Science.gov (United States)

    Munck, Berit; Sandgren, Anna

    2017-03-02

    The increase in the use of medical devices in palliative home care requires that patients and next-of-kin feel secure. Therefore, the aim was to describe medical technology's impact on the sense of security for patients, next-of-kin and district nurses. Deductive content analysis was conducted on data from three previous studies, using the theoretical framework 'palliative home care as a secure base'. The use of medical technology was shown to have an impact on the sense of security for all involved. A sense of control was promoted by trust in staff and their competence in managing the technology, which was linked to continuity. Inner peace and being in comfort implied effective symptom relief facilitated by pain pumps and being relieved of responsibility. Health care professionals need to have practical knowledge about medical technology, but at the same time have an awareness of how to create and maintain a sense of security.

  8. Technological Criteria Technology-Environmental under a Systemic Approach: Chemistry Technology Transfer

    OpenAIRE

    Durán-García Martín Enrique

    2014-01-01

    Currently the transfer of chemical technology is a process that contributes to the technology policy of a country, an industry or an organization in general chemistry. This process requires the application of clear criteria for the proper development of the complex interrelations in the transfer of chemical technology. A group of criteria that are present, are those related to environmental technology which intrinsically define the technology and its impact to the environment. Therefore, the ...

  9. Development of decontamination, decommissioning and environmental restoration technology

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Byung Jik; Kwon, H. S.; Kim, G. N. and others

    1999-03-01

    Through the project of 'Development of decontamination, decommissioning and environmental restoration technology', the followings were studied. 1. Development of decontamination and repair technology for nuclear fuel cycle facilities 2. Development of dismantling technology 3. Development of environmental restoration technology. (author)

  10. 76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-31

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0357] Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast Guard, DHS. ACTION: Notice of request for comments... Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection...

  11. 75 FR 18482 - Environmental Technologies Trade Advisory Committee (ETTAC)

    Science.gov (United States)

    2010-04-12

    ... DEPARTMENT OF COMMERCE Environmental Technologies Trade Advisory Committee (ETTAC) AGENCY... Environmental Technologies Trade Advisory Committee (ETTAC) will hold its quarterly meeting to discuss environmental technologies trade liberalization, industry competitiveness issues, and general Committee...

  12. 76 FR 45645 - 10-Day Notice of Proposed Information Collection: Technology Security/Clearance Plans, Screening...

    Science.gov (United States)

    2011-07-29

    ...: Technology Security/Clearance Plans, Screening Records, and Non-Disclosure Agreements ACTION: Notice of... Information Collection: Technology Security/ Clearance Plans, Screening Records, and Non-Disclosure Agreements...: None. Respondents: Business and Nonprofit Organizations, Foreign Governments. Estimated Number of...

  13. Technology development and transfer in environmental management

    International Nuclear Information System (INIS)

    Katz, J.; Karnovitz, A.; Yarbrough, M.

    1994-01-01

    Federal efforts to develop and employ the innovative technologies needed to clean up contaminated facilities would greatly benefit from a greater degree of interaction and integration with the energies and resources of the private sector. Yet there are numerous institutional, economic, and regulatory obstacles to the transfer and commercialization of environmental restoration and waste management technologies. These obstacles discourage private sector involvement and investment in Federal efforts to develop and use innovative technologies. A further effect is to impede market development even where private sector interest is high. Lowering these market barriers will facilitate the commercialization of innovative environmental cleanup technologies and expedite the cleanup of contaminated Federal and private facilities. This paper identifies the major barriers to transfer and commercialization of innovative technologies and suggests possible strategies to overcome them. Emphasis is placed on issues particularly relevant to the Department of Energy's Environmental Restoration and Waste Management (EM) program, but which are applicable to other Federal agencies confronting complex environmental cleanup problems

  14. 75 FR 52716 - Environmental Technologies Trade Advisory Committee (ETTAC)

    Science.gov (United States)

    2010-08-27

    ... DEPARTMENT OF COMMERCE Environmental Technologies Trade Advisory Committee (ETTAC) AGENCY... Environmental Technologies Trade Advisory Committee (ETTAC) will hold its quarterly meeting to discuss environmental technologies industry competitiveness issues, the National Export Initiative, and general...

  15. Comparing energy technology alternatives from an environmental perspective

    International Nuclear Information System (INIS)

    House, P.W.; Coleman, J.A.; Shull, R.D.; Matheny, R.W.; Hock, J.C.

    1981-02-01

    A number of individuals and organizations advocate the use of comparative, formal analysis to determine which are the safest methods for producing and using energy. Some have suggested that the findings of such analyses should be the basis upon which final decisions are made about whether to actually deploy energy technologies. Some of those who support formal comparative analysis are in a position to shape the policy debate on energy and environment. An opposing viewpoint is presented, arguing that for technical reasons, analysis can provide no definitive or rationally credible answers to the question of overall safety. Analysis has not and cannot determine the sum total of damage to human welfare and ecological communities from energy technologies. Analysis has produced estimates of particular types of damage; however, it is impossible to make such estimates comparable and commensurate across different classes of technologies and environmental effects. As a result of the deficiencies, comparative analysis connot form the basis of a credible, viable energy policy. Yet, without formal comparative analysis, how can health, safety, and the natural environment be protected. This paper proposes a method for improving the Nation's approach to this problem. The proposal essentially is that health and the environment should be considered as constraints on the deployment of energy technologies, constraints that are embodied in Government regulations. Whichever technologies can function within these constraints should then compete among themselves. This competition should be based on market factors like cost and efficiency and on political factors like national security and the questions of equity

  16. 75 FR 1590 - Environmental Technologies Trade Advisory Committee (ETTAC)

    Science.gov (United States)

    2010-01-12

    ... DEPARTMENT OF COMMERCE Environmental Technologies Trade Advisory Committee (ETTAC) AGENCY... Environmental Technologies Trade Advisory Committee (ETTAC) will hold its first plenary meeting of 2010 to discuss environmental technologies trade liberalization, industry competitiveness issues, and general...

  17. 48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible for...

  18. ATBU Journal of Environmental Technology

    African Journals Online (AJOL)

    The journal of environmental technology is devoted to the publication of papers ... research results of both the natural; the technological; and the built environment. ... Assessment of multipath and shadowing effects on UHF band in built-up ...

  19. Satellite Technology Contribution to Water and Food Security

    Science.gov (United States)

    Brown, Molly E.

    2010-01-01

    This slide presentation reviews the issue of supplies of food, the relationship to food security, the ability of all people to attain sufficient food for an active and healthy life, and the ability to use satellite technology and remote sensing to assist with planning and act as an early warning system.

  20. Nuclear waste disposal: technology and environmental hazards

    International Nuclear Information System (INIS)

    Hare, F.K.; Aikin, A.M.

    1980-01-01

    The subject is discussed under the headings: introduction; the nature and origin of wastes (fuel cycles; character of wastes; mining and milling operations; middle stages; irradiated fuel; reprocessing (waste generation); reactor wastes); disposal techniques and disposal of reprocessing wastes; siting of repositories; potential environmental impacts (impacts after emplacement in a rock repository; catastrophic effects; dispersion processes (by migrating ground water); thermal effects; future security; environmental survey, monitoring and modelling); conclusion. (U.K.)

  1. 48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 3052.204-70 Section 3052.204-70 Federal Acquisition Regulations... for unclassified information technology resources. As prescribed in (HSAR) 48 CFR 3004.470-3, insert a clause substantially the same as follows: Security Requirements for Unclassified Information Technology...

  2. Partnership for Environmental Technology Education

    International Nuclear Information System (INIS)

    Dickinson, Paul R.; Fosse, Richard

    1992-01-01

    The need for broad cooperative effort directed toward the enhancement of science and mathematics education, including environmental science and technology has been recognized as a national priority by government, industry, and the academic community alike. In an effort to address this need, the Partnership for Environmental Technology Education (PETE) has been established in the five western states of Arizona, California, Hawaii, Nevada and Utah. PETE'S overall objectives are to link the technical resources of the DOE, ERA, and NASA Laboratories and private industry with participating community colleges to assist in the development and presentation of curricula for training environmental-Hazardous Materials Technicians and to encourage more transfer students to pursue studies in environmental science at four-year institutions. The program is co-sponsored by DOE and EPA. DoD participation is proposed. PETE is being evaluated by its sponsors as a regional pilot with potential for extension nationally. (author)

  3. Environmental characteristics of clean coal technologies

    International Nuclear Information System (INIS)

    Bossart, S.J.

    1992-01-01

    The Department of Energy's (DOE) Clean Coal Technology (CCT) Program is aimed at demonstrating the commercial readiness of advanced coal-based technologies. A major goal of the CCT program is to introduce into the US energy marketplace those coal-based power generation technologies that have superior economic and environmental performance over the current suite of commercial coal-based power generation technologies. The commercialization of CCTs will provide the electric utility industry with technology options for replacing aging power plants and meeting future growth in electricity demand. This paper discusses the environmental advantages of two CCTs used for electric power generation: pressurized fluidized-bed combustion (PFBC) and integrated gasification combined-cycle (IGCC). These CCTs are suitable for repowering existing power plants or for grassroots construction. Due to their high efficiency and advanced environmental control systems, they emit less sulfur dioxide (SO 2 ), nitrogen oxides (NO x ), particulate matter, and carbon dioxide (CO 2 ) than a state-of-the-art, pulverized coal power plant with flue gas desulfurization (PC/FGD)

  4. Critical materialism: science, technology, and environmental sustainability.

    Science.gov (United States)

    York, Richard; Clark, Brett

    2010-01-01

    There are widely divergent views on how science and technology are connected to environmental problems. A view commonly held among natural scientists and policy makers is that environmental problems are primarily technical problems that can be solved via the development and implementation of technological innovations. This technologically optimistic view tends to ignore power relationships in society and the political-economic order that drives environmental degradation. An opposed view, common among postmodernist and poststructuralist scholars, is that the emergence of the scientific worldview is one of the fundamental causes of human oppression. This postmodernist view rejects scientific epistemology and often is associated with an anti-realist stance, which ultimately serves to deny the reality of environmental problems, thus (unintentionally) abetting right-wing efforts to scuttle environmental protection. We argue that both the technologically optimistic and the postmodernist views are misguided, and both undermine our ability to address environmental crises. We advocate the adoption of a critical materialist stance, which recognizes the importance of natural science for helping us to understand the world while also recognizing the social embeddedness of the scientific establishment and the need to challenge the manipulation of science by the elite.

  5. Security of the electricity supply. The area of conflict between profitability and environmental compatibility

    International Nuclear Information System (INIS)

    Praktiknjo, Aaron

    2013-01-01

    The scope of the book is on the one hand support for the power industry defining investment and sales strategies that intend optimum supply security in the view of the customer and on the other hand the information for energy and environmental politicians demonstrating the conflict of objectives. The following issues are covered: technical and organizational aspects of electricity supply, theoretical background of the security of electricity supply, security of supply for economic sections, security of electricity supply for private households: theoretical microeconomic approach, security of electricity supply for private households: method of defined preferences, security of electricity supply in the context of climate protection and nuclear phase-out.

  6. Environmental and process monitoring technologies

    International Nuclear Information System (INIS)

    Vo-Dinh, Tuan

    1993-01-01

    The objective of this conference was to provide a multidisciplinary forum dealing with state-of-the-art methods and instrumentation for environmental and process monitoring. In the last few years, important advances have been made in improving existing analytical methods and developing new techniques for trace detection of chemicals. These monitoring technologies are a topic of great interest for environmental and industrial control in a wide spectrum of areas. Sensitive detection, selective characterization, and cost-effective analysis are among the most important challenges facing monitoring technologies. This conference integrating interdisciplinary research and development was aimed to present the most recent advances and applications in the important areas of environmental and process monitoring. Separate abstracts have been prepared for 34 papers for inclusion in the appropriate data bases

  7. Overview of emerging environmental technologies

    International Nuclear Information System (INIS)

    Olson, D.C.

    2000-01-01

    DOD is executing environmental restoration projects in accordance with compliance regulations from many federal agencies. With the passage of amendments to the Superfund law in 1986 that stated a preference for treatment instead of disposal, demand developed for alternative methods that provided more permanent and less costly solutions for dealing with contaminated materials. The Army files environmental impact statements on major programs and specific projects that are currently affecting, or have the potential to affect the environment. Personnel conducting those studies may find it helpful to learn about current environmental assessment methods and the outcomes of previous environmental studies. The Army currently spends almost 2.4% of its total budget on environmental programs. As the future budget picture continues to decline, new technologies offer the potential to provide a lower cost means of achieving the same level of environmental protection. This paper will provide an overview of environmental restoration planning and procedures, discuss information capabilities available on the Internet, provide summaries of recent technological literature and field studies; and identifies areas of informational 'gaps'. It concludes by urging closer ties between industry and the Army, as well as the need to pursue new and innovative techniques to solve old problems. (author)

  8. GENERAL ENVIRONMENTAL CORPORATION; CURE ELECTROCOAGULATION TECHNOLOGY: INNOVATIVE TECHNOLOGY EVALUATION REPORT

    Science.gov (United States)

    The CURE electrocoagulation technology was demonstrated under the Superfund Innovative Technology Evaluation (SITE) program at the U.S. Department of Energy (DOE) Rocky Flats Environmental Technology Site (RFETS), where water from the solar evaporation ponds (SEPs) was contaminat...

  9. The Savannah River environmental technology field test platform

    International Nuclear Information System (INIS)

    Rossabi, J.; Riha, B.D.

    1995-01-01

    The principal goal in the development of new technologies for environmental monitoring and characterization is transferring them to organizations and individuals for use in site assessment and compliance monitoring. The Savannah River technology Center (SRTC) has been developing a program to rigorously field test promising environmental technologies that have not undergone EPA equivalency testing. The infrastructure and staff expertise developed as part of the activities of the Savannah River Integrated Demonstration Program allows field testing of technologies without the difficulties of providing remote field support. By providing a well-characterized site and a well-developed infrastructure, technologies are tested in actual field scenarios to determine their appropriate applications in environmental characterization and monitoring activities. The field tests provide regulatory organizations, potential industrial partners, and potential users with the opportunity to evaluate the technology's performance and its utility for implementation in environmental characterization and monitoring programs. This program has resulted in the successful implementation of several new technologies

  10. Threats or threads: from usable security to secure experience

    DEFF Research Database (Denmark)

    Bødker, Susanne; Mathiasen, Niels Raabjerg

    2008-01-01

    While the domain of security dependent technologies brings new challenges to HCI research it seems that the results and breakthroughs of HCI have not been used in design of security dependent technologies. With exceptions, work in the research field of usable security may be criticized for focusing...... mainly on adjusting user behavior to behave securely. With our background in newer HCI perspectives we address secure interaction from the perspective of security technology as experience. We analyze a number of collected user stories to understand what happens when everyday users encounter security...... dependent technologies. We apply McCarthy & Wright's [12] experience framework to the security domain and our collected stories. We point out that there are significant differences between being secure and having a secure experience, and conclude that classical usable security, focus on people's immediate...

  11. Overcoming regulatory barriers: DOE environmental technology development program

    International Nuclear Information System (INIS)

    Kurtyka, B.M.; Clodfelter-Schumack, K.; Evans, T.T.

    1995-01-01

    The potential to improve environmental conditions via compliance or restoration is directly related to the ability to produce and apply innovative technological solutions. However, numerous organizations, including the US General Accounting Office (GAO), the EPA National Advisory Council for Environmental Policy and Technology (NACEPT), the DOE Environmental Management Advisory Board (EMAB), and the National Science and Technology Council (NSTC) have determined that significant regulatory barriers exist that inhibit the development and application of these technologies. They have noted the need for improved efforts in identifying and rectifying these barriers for the purpose of improving the technology development process, providing innovative alternatives, and enhancing the likelihood of technology acceptance by all. These barriers include, among others, regulator and user bias against ''unknown/unproven'' technologies; multi-level/multi-media permit disincentives; potential liability of developers and users for failed implementation; wrongly defined or inadequate data quality objectives: and lack of customer understanding and input. The ultimate goal of technology development is the utilization of technologies. This paper will present information on a number of regulatory barriers hindering DOE's environmental technology development program and describe DOE efforts to address these barriers

  12. Nuclear science, technology and innovation in Canada - securing the future

    Energy Technology Data Exchange (ETDEWEB)

    Walker, R.S. [Atomic Energy of Canada Limited, Chalk River, ON (Canada)

    2014-07-01

    As a Tier 1 Nuclear Nation, Canada has a rich and proud history of achievement in nuclear Science, Technology and Innovation (ST&I) -- from commercializing the CANDU power system around the world, advancing fuel technology and nuclear safety, to protecting human health through nuclear medicine and cancer therapy technology. Today, the nuclear industry in Canada is actively working to secure its promising, long-term place in the world and is embracing the change necessary to fulfill the enormous potential for good of nuclear technology. For its part, the Canadian Government is taking a bold new public policy approach to nuclear ST&I, by restructuring its large, multi-faceted AECL Nuclear Laboratories. Through the restructuring, AECL, as Canada's premier nuclear science and technology organization, will be better positioned for success via an incentivized 'Government-owned-Contractor-operated', private-sector management model. The aim of this new approach is to enhance and grow high-value nuclear innovation for the marketplace, strengthen the competitiveness of Canada's nuclear sector, and reduce costs to the Government of Canada with time. This approach will play a key role in ensuring a bright future for the Canadian Nuclear Industry domestically and globally as it launches its 25-year Vision and Action Plan, where one of the priority action areas is support for a strong, forward-looking, nuclear ST&I agenda. As the new model for the Nuclear Laboratories is moved forward by the Government, with the support of AECL and industry, Canada's nuclear expertise and knowledge continue to be expanded and deepened through the work of the Laboratories' ten Centres of Excellence, where AECL's fundamental approach is guided by the reality that ST&I is needed in all aspects of the nuclear cycle, including decommissioning, waste management and environmental protection. (author)

  13. Assessment of the Technological Changes Impact on the Sustainability of State Security System of Ukraine

    Directory of Open Access Journals (Sweden)

    Olexandr Yemelyanov

    2018-04-01

    Full Text Available Currently, the governments of many countries are facing with a lack of funds for financing programs for social protection of population. Among the causes of this problem, we can indicate the high unemployment rate, which, among other things, is due to implementation of labor-saving technologies. The purpose of this work is to study the impact of technological changes on the sustainability of the state social security system in Ukraine. The general approaches to the assessment of the stability of the state social security system are described. The simulation of the effect of economically efficient technological changes on the company’s income and expenses was carried out. Some patterns of such changes are established. The group of productive technological changes types is presented. The model is developed, and an indicator of the impact estimation of efficiently effective technological changes on the stability of the state social security system is proposed. The analysis of the main indicators of the state social security system functioning of Ukraine is carried out. The dynamics of indicators characterizing the labor market of Ukraine is analyzed. The influence of changes in labor productivity on costs and profits by industries of Ukraine is estimated. The evaluation of the impact of economically efficient technological changes in the industries of Ukraine on the stability of its state social security system is carried out. The different state authorities can use the obtained results for developing measures to manage the sustainability of the state social security system.

  14. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  15. Environmental issues affecting clean coal technology deployment

    Energy Technology Data Exchange (ETDEWEB)

    Miller, M.J. [Electric Power Research Inst., Palo Alto, CA (United States)

    1997-12-31

    The author outlines what he considers to be the key environmental issues affecting Clean Coal Technology (CCT) deployment both in the US and internationally. Since the international issues are difficult to characterize given different environmental drivers in various countries and regions, the primary focus of his remarks is on US deployment. However, he makes some general remarks, particularly regarding the environmental issues in developing vs. developed countries and how these issues may affect CCT deployment. Further, how environment affects deployment depends on which particular type of clean coal technology one is addressing. It is not the author`s intention to mention many specific technologies other than to use them for the purposes of example. He generally categorizes CCTs into four groups since environment is likely to affect deployment for each category somewhat differently. These four categories are: Precombustion technologies such as coal cleaning; Combustion technologies such as low NOx burners; Postcombustion technologies such as FGD systems and postcombustion NOx control; and New generation technologies such as gasification and fluidized bed combustion.

  16. Driving forces and barriers for environmental technology development

    International Nuclear Information System (INIS)

    2005-01-01

    Driving forces and barriers behind development and usage of environmental technology is discussed, and also whether there are certain characteristics related to environmental innovations compared to other innovations in general. The development of environmental technology is in principle dominated by the same drivers and barriers as any other technology, but the order and strength of the various factors may be different. This examination as well as other empirical studies shows that regulations play a greater part for environmental technology than 'pure market forces'. To many participants it is important to be one step ahead of the regulations, i.e. the expected regulations are equally important as the factual ones in driving the technology development. Players in the business community express that it is important that the authorities cooperate with them when introducing new regulations. This will increase acceptance for the regulations and facilitate the necessary adjustments. The most important barrier in the development and use of the technologies studied is probably the lack of demand

  17. ATBU Journal of Environmental Technology: Editorial Policies

    African Journals Online (AJOL)

    Focus and Scope. The journal of environmental technology is devoted to the publication of papers which advance knowledge of practical and theoretical issues of the environmental technology. Selection of papers for publication is based on their relevance, clarity, topicality and individuality; the extent to which they advance ...

  18. PACFEST 2004 : enabling technologies for maritime security in the Pacific region.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Whitley, John B.; Chellis, Craig (Pacific Disaster Center, Kihei, HI)

    2005-06-01

    In October of 2003 experts involved in various aspects of homeland security from the Pacific region met to engage in a free-wheeling discussion and brainstorming (a 'fest') on the role that technology could play in winning the war on terrorism in the Pacific region. The result was a concise and relatively thorough definition of the terrorism problem in the Pacific region, emphasizing the issues unique to Island nations in the Pacific setting, along with an action plan for developing working demonstrations of advanced technological solutions to these issues. Since PacFest 2003, the maritime dimensions of the international security environment have garnered increased attention and interest. To this end, PacFest 2004 sought to identify gaps and enabling technologies for maritime domain awareness and responsive decision-making in the Asia-Pacific region. The PacFest 2004 participants concluded that the technologies and basic information building blocks exist to create a system that would enable the Pacific region government and private organizations to effectively collaborate and share their capabilities and information concerning maritime security. The proposed solution summarized in this report integrates national environments in real time, thereby enabling effective prevention and first response to natural and terrorist induced disasters through better use of national and regional investments in people, infrastructure, systems, processes and standards.

  19. The Western Environmental Technology Office (WETO), Butte, Montana. Technology summary

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    The Western Environmental Technology Office (WETO) is a multi-purpose engineering test facility located in Butte, Montana, and is managed by MSE, Inc. WETO seeks to contribute to environmental research by emphasizing projects to develop heavy metals removal and recovery processes, thermal vitrification systems, and waste minimization/pollution prevention technologies. WETO`s environmental technology research and testing activities focus on the recovery of usable resources from waste. In one of WETO`s areas of focus, groundwater contamination, water from the Berkeley Pit, located near the WETO site, is being used in demonstrations directed toward the recovery of potable water and metal from the heavy metal-bearing water. The Berkeley Pit is part of an inactive copper mine near Butte that was once part of the nation`s largest open-pit mining operation. The Pit contains approximately 25 billion gallons of Berkeley Pit groundwater and surface water containing many dissolved minerals. As part of DOE/OST`s Resource Recovery Project (RRP), technologies are being demonstrated to not only clean the contaminated water but to recover metal values such as copper, zinc, and iron with an estimated gross value of more than $100 million. When recovered, the Berkeley Pit waters could benefit the entire Butte valley with new water resources for fisheries, irrigation, municipal, and industrial use. At WETO, the emphasis is on environmental technology development and commercialization activities, which will focus on mine cleanup, waste treatment, resource recovery, and water resource management.

  20. The Western Environmental Technology Office (WETO), Butte, Montana. Technology summary

    International Nuclear Information System (INIS)

    1996-03-01

    The Western Environmental Technology Office (WETO) is a multi-purpose engineering test facility located in Butte, Montana, and is managed by MSE, Inc. WETO seeks to contribute to environmental research by emphasizing projects to develop heavy metals removal and recovery processes, thermal vitrification systems, and waste minimization/pollution prevention technologies. WETO's environmental technology research and testing activities focus on the recovery of usable resources from waste. In one of WETO's areas of focus, groundwater contamination, water from the Berkeley Pit, located near the WETO site, is being used in demonstrations directed toward the recovery of potable water and metal from the heavy metal-bearing water. The Berkeley Pit is part of an inactive copper mine near Butte that was once part of the nation's largest open-pit mining operation. The Pit contains approximately 25 billion gallons of Berkeley Pit groundwater and surface water containing many dissolved minerals. As part of DOE/OST's Resource Recovery Project (RRP), technologies are being demonstrated to not only clean the contaminated water but to recover metal values such as copper, zinc, and iron with an estimated gross value of more than $100 million. When recovered, the Berkeley Pit waters could benefit the entire Butte valley with new water resources for fisheries, irrigation, municipal, and industrial use. At WETO, the emphasis is on environmental technology development and commercialization activities, which will focus on mine cleanup, waste treatment, resource recovery, and water resource management

  1. Financing investment in environmentally sound technologies: Foreign direct investment versus foreign debt finance

    International Nuclear Information System (INIS)

    Anyangah, Joshua Okeyo

    2010-01-01

    This paper develops a screening model to examine the relationship between alternative sources of private capital and investment in environmentally sound technologies (ESTs). In the model, a polluter (agent) must secure investment funds from the international financial markets in order to upgrade its production and abatement technology. The requisite capital can be obtained via either market loans (debt finance) or foreign direct investment (FDI). Under debt finance, the foreign financier supplies only capital and the relationship between the two parties is more 'arms-length'. By contrast, under FDI, the investor delivers both capital and managerial skills. We use the model to derive the implications of debt finance for optimal investment decisions and compare them to those obtained under FDI. Investment incentives are more pronounced under debt finance. (author)

  2. Implementing Information Security and Its Technology: A LineManagement Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Barletta, William A.

    2005-08-22

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  3. 76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2011-07-13

    ..., cyber-security, knowledge management and how best to leverage related technologies funded by other... Science and Technology Advisory Committee (HSSTAC) ACTION: Committee Management; Notice of Federal... FURTHER INFORMATION CONTACT: Mary Hanson, HSSTAC Executive Director, Science and Technology Directorate...

  4. Environmental Consequences of Pig Slurry Treatment Technologies

    DEFF Research Database (Denmark)

    ten Hoeve, Marieke

    occur during manure storage and after field application. The main emissions are ammonia, nitrous oxide, methane, carbon dioxide, nitrate, phosphorus and odour. Slurry treatment technologies have been and are being developed in order to reduce the environmental impacts of manure. However, it is important...... and excluding biogenic carbon, marine and freshwater eutrophication potential, terrestrial acidification and eutrophication potential, and fossil resource depletion potential. The different types of treatment technologies showed varying environmental profiles, meaning that one type of technology was beneficial...... technology, or co-substrate for anaerobic digestion). With respect to odorous emissions, an LCIA method was developed, but due to a lack of data it proved difficult to include odour in LCA. Regulations appear to have an influence on the environmental impacts of slurry treatment. A decrease in N application...

  5. A Sustainable Technology Contribuiting to the Food Security

    Directory of Open Access Journals (Sweden)

    Dra. Rosa Catalina Bermúdez-Savòn

    2015-11-01

    Full Text Available A sustainable way for food and energetic security in rural and the city regions, is presented with the application of the solid state fermentation for the biotransformation of lignocellulosic by-products and agro-industrial wastes with white-rot fungi. Inamush as advantages of this technology, is showed the cultivation of mushroom Pleurotus spp.on coffee pulp, cedar chip , coconut and cocoa shells, and the influence of it´s mixture (1:1, trough examination of their growth rates and conversion efficacy to fruiting bodies, which cause contamination of soil and water, because of large volumes and difficult management. The use of residues for these cultive was consolidate such as alternative viable for food production, capable to satisfy the protein and nutritive necessity of population in the non-developing countries, besides low cost production, high protein content and obtention in large quantity in short time. In addition to produce complements for animal feet, such as the spent oyster mushroom substrate postcosecha is detoxified, has proteic content and better digestibility than original substrates,and can be used as animal feed or fertilizer, at the same time, was eradicated the problem of environmental contamination of these residues provoking and further contribution at sustainable development of the communities.

  6. Idaho National Engineering and Environmental Laboratory Environmental Technologies Proof-of-Concepts. Final report FY-96

    Energy Technology Data Exchange (ETDEWEB)

    Barrie, S.L.; Carpenter, G.S.; Crockett, A.B. [and others

    1997-04-01

    The Idaho National Engineering and Environmental Laboratory Environmental Technologies Proof-of-Concept Project was initiated for the expedited development of new or conceptual technologies in support of groundwater fate, transport, and remediation; buried waste characterization, retrieval, and treatment; waste minimization/pollution prevention; and spent fuel handling and storage. In Fiscal Year 1996, The Idaho National Engineering and Environmental Laboratory proposed 40 development projects and the Department of Energy funded 15. The projects proved the concepts of the various technologies, and all the technologies contribute to successful environmental management.

  7. Idaho National Engineering and Environmental Laboratory Environmental Technologies Proof-of-Concepts. Final report FY-96

    International Nuclear Information System (INIS)

    Barrie, S.L.; Carpenter, G.S.; Crockett, A.B.

    1997-04-01

    The Idaho National Engineering and Environmental Laboratory Environmental Technologies Proof-of-Concept Project was initiated for the expedited development of new or conceptual technologies in support of groundwater fate, transport, and remediation; buried waste characterization, retrieval, and treatment; waste minimization/pollution prevention; and spent fuel handling and storage. In Fiscal Year 1996, The Idaho National Engineering and Environmental Laboratory proposed 40 development projects and the Department of Energy funded 15. The projects proved the concepts of the various technologies, and all the technologies contribute to successful environmental management

  8. Nevada National Security Site Environmental Report 2011 Attachment A: Site Description

    International Nuclear Information System (INIS)

    Wills, Cathy

    2012-01-01

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2011. Included are subsections that summarize the site's geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site's environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  9. Environmental Decision Making and Information Technology: Issues Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Barg, S.; Fletcher, T.; Mechling, J.; Tonn, B.; Turner, R.

    1999-05-01

    This report presents a summary of the Information Technology and Environmental Decision Making Workshop that was held at Harvard University, October 1-3, 1998. Over sixty participants from across the US took part in discussions that focused on the current practice of using information technology to support environmental decision making and on future considerations of information technology development, information policies, and data quality issues in this area. Current practice is focusing on geographic information systems and visualization tools, Internet applications, and data warehousing. In addition, numerous organizations are developing environmental enterprise systems to integrate environmental information resources. Plaguing these efforts are issues of data quality (and public trust), system design, and organizational change. In the future, much effort needs to focus on building community-based environmental decision-making systems and processes, which will be a challenge given that exactly what needs to be developed is largely unknown and that environmental decision making in this arena has been characterized by a high level of conflict. Experimentation and evaluation are needed to contribute to efficient and effective learning about how best to use information technology to improve environmental decision making.

  10. Factors affecting food security and contribution of modern technologies in food sustainability.

    Science.gov (United States)

    Premanandh, Jagadeesan

    2011-12-01

    The concept of food insecurity is complex and goes beyond the simplistic idea of a country's inability to feed its population. The global food situation is redefined by many driving forces such as population growth, availability of arable lands, water resources, climate change and food availability, accessibility and loss. The combined effect of these factors has undeniably impacted global food production and security. This article reviews the key factors influencing global food insecurity and emphasises the need to adapt science-based technological innovations to address the issue. Although anticipated benefits of modern technologies suggest a level of food production that will sustain the global population, both political will and sufficient investments in modern agriculture are needed to alleviate the food crisis in developing countries. In this globalised era of the 21st century, many determinants of food security are trans-boundary and require multilateral agreements and actions for an effective solution. Food security and hunger alleviation on a global scale are within reach provided that technological innovations are accepted and implemented at all levels. Copyright © 2011 Society of Chemical Industry.

  11. Archives: African Journal of Environmental Science and Technology

    African Journals Online (AJOL)

    Items 1 - 50 of 117 ... Archives: African Journal of Environmental Science and Technology. Journal Home > Archives: African Journal of Environmental Science and Technology. Log in or Register to get access to full text downloads.

  12. 78 FR 21909 - Environmental Technologies Trade Advisory Committee; Public Meeting

    Science.gov (United States)

    2013-04-12

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The teleconference....S. exports of environmental technologies, goods, services, and products. The ETTAC was originally...

  13. 76 FR 66912 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2011-10-28

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The teleconference... expand U.S. exports of environmental technologies, goods, services, and products. The ETTAC was...

  14. After globalization future security in a technology rich world

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin, T J

    2000-02-12

    Over the course of the year 2000, five one-day workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats that might come against the US and its allies in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. In December, an Integration Workshop and Senior Review before national leaders and experts were held. The participants and reviewers were invited from the DOE National Laboratories, the DOD Services, OSD, DTRA, and DARPA, the DOS, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on national security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. We were not concerned in this exercise with defining responses, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be countered. At the concluding Integration Workshop and Senior Panel Review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and responsibility, and discussed the workshop findings to determine what is most certain, and uncertain, and what might be needed to resolve our uncertainties. This document reports the consensus and important variations of both the reviewers and the participants. In all, 45 threats over a wide range of lethality and probability of occurrence were identified. Over 60 enabling technologies were also discussed. These are

  15. Environmental regulation and the export dynamics of energy technologies

    International Nuclear Information System (INIS)

    Costantini, Valeria; Crespi, Francesco

    2008-01-01

    The pollution haven hypothesis affirms that an open market regime will encourage the flow of low-technology polluting industries towards developing countries because of potential comparative advantages related to low environmental standards. In contrast, the hypothesis suggested by Porter and van der Linde claims that innovating firms operate in a dynamic competitive situation which allows global diffusion of environmental-friendly technologies. Environmental regulation may represent a relevant mechanism through which technological change is induced. In this way, countries that are subject to more stringent environmental regulations may become net exporters of environmental technologies. This paper provides new evidence on the evolution of export flows of environmental technologies across different countries for the energy sector. Advanced economies, particularly the European Union, have increasingly focused on the role of energy policies as tools for sustaining the development path. The Kyoto Protocol commitments, together with growing import dependence on energy products, have brought attention to the analysis of innovation processes in this specific sector. The analysis uses a gravity model in order to test the determinants and the transmission channels through which environmental technologies for renewable energies and energy efficiency are exported to advanced and developing countries. Our results are consistent with the Porter and van der Linde hypothesis where environmental regulation represents a significant source of comparative advantages. What strongly emerges is that the stringency of environmental regulation supplemented by the strength of the National Innovation System is a crucial driver of export performance in the field of energy technologies. (author)

  16. Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective

    Science.gov (United States)

    Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha

    2017-07-01

    Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.

  17. 77 FR 35941 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2012-06-15

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... promotion programs; and issues related to innovation in the environmental technology sector. Background: The...

  18. 77 FR 6064 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2012-02-07

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The teleconference... administration of programs to expand U.S. exports of environmental technologies, goods, services, and products...

  19. A Study Of Cyber Security Challenges And Its Emerging Trends On Latest Technologies

    OpenAIRE

    Reddy, G. Nikhita; Reddy, G. J. Ugander

    2014-01-01

    Cyber Security plays an important role in the field of information technology .Securing the information have become one of the biggest challenges in the present day. When ever we think about the cyber security the first thing that comes to our mind is cyber crimes which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cyber crimes. Besides various measures cyber security is still a very big concern to many. This paper ma...

  20. Mobile Technology: The Foundation for an Engaged and Secure Campus Community

    Science.gov (United States)

    Chapel, Edward

    2008-01-01

    Montclair State University, a public New Jersey institution with more than 17,000 students enrolled, has harnessed the cell phone and cellular broadband technology to foster a stronger sense of community and provide students with a safe, secure, and rich learning environment. This paper discusses the potential for new technologies to foster…

  1. SRS environmental technology development field test platform

    International Nuclear Information System (INIS)

    Riha, B.D.; Rossabi, J.; Eddy-Dilek, C.A.

    1995-01-01

    A critical and difficult step in the development and implementation of new technologies for environmental monitoring and characterization is successfully transferring these technologies to industry and government users for routine assessment and compliance activities. The Environmental Sciences Section of the DOE Savannah River Technology Center provides a forum for developers, potential users, and regulatory organizations to evaluate new technologies in comparison with baseline technologies in a well characterized field test bed. The principal objective of this project is to conduct comprehensive, objective field tests of monitoring and characterization technologies that are not currently used in EPA standard methods and evaluate their performance during actual operating conditions against baseline methods. This paper provides an overview of the field test site and a description of some of the technologies demonstrated at the site including their field applications

  2. Environmental control technology in petroleum drilling and production

    International Nuclear Information System (INIS)

    Wojtanowicz, A.K.

    1997-01-01

    Environmental control technology (ECT) is process integrated and relates mainly to pollution prevention and risk assessment. Mechanisms of environmental impact in petroleum drilling, well completion and production, include the generation of waste, induction of toxicity or the creation of pathways for pollutant migration. The identification and evaluation of these mechanisms constitute two parts of the scope of ECT. A third part is the development of new techniques to comply with environmental requirements without prejudicing productivity. The basic concepts of the ECT approach are presented in this chapter. The approach is then used to analyse oilfield drilling and production processes. Environmental control components developed in these technologies are described. These include: the control of the volume and toxicity of drilling fluids; source separation technology in produced water cleaning; subsurface injection of oilfield waste slurries; containment technology in the integrity of petroleum wells; subsurface reduction of produced water; oilfield pit closure technology. (37 figures; 26 tables; 227 references) (UK)

  3. A broadened typology on energy and security

    International Nuclear Information System (INIS)

    Johansson, Bengt

    2013-01-01

    A broadened typology describing the interconnection between energy and security is developed in this paper, with the aim of improving understanding of the relationship between energy and security by applying different research and policy perspectives. One approach involves studying energy as an object exposed to security threats, using concepts such as security of supply or security of demand. Another approach involves studying the role of the energy system as the subject in generating or enhancing insecurity. The latter approach includes studying the conflict-generating potential inherent in the economic value of energy, the risk of accidents and antagonistic attacks to energy infrastructure and the security risks related to the negative environmental impact of the energy system. In order to make a comprehensive analysis of the security consequences of proposed energy policies or strategies, all these aspects should be taken into account to varying degrees. The typology proposed here could be a valuable tool for ensuring that all security aspects have been considered. - Highlights: • The paper presents a broadened typology of energy and security, useful for policy analysis. • The energy system can be an object for security threats and as a subject generating or contributing to insecurity. • Energy as an object for security threats includes the concepts of security of supply and security of demand. • The economic value of energy can contribute to insecurity. • Technological and environmental risks of specific energy systems also provide potential threats to human security

  4. The law as an instrument of technology control and as a basis for technological development

    International Nuclear Information System (INIS)

    Kloepfer, M.

    1998-01-01

    In public debates about German industry's global competitiveness it becomes evident that environmental law and the technology-related law are almost exclusively perceived as systems of law which - for reasons of environmental protection and protection of public health - are setting restraints to technological development. This is a narrow perspective neglecting the functions of the law as an instrument providing legal security and a reliable framework for developments. In a democratic, constitutional state, the environmental law and the technology-related law are instruments providing for protection of the basic, general rights and requirements of technology, and contribute to ensuring general acceptance of technologic development. (orig./CB) [de

  5. Evaluation of Ecological Environment Security in Contiguous Poverty Alleviation Area of Sichuan Province

    Science.gov (United States)

    Xian, W.; Chen, Y.; Chen, J.; Luo, X.; Shao, H.

    2018-04-01

    According to the overall requirements of ecological construction and environmental protection, rely on the national key ecological engineering, strengthen ecological environmental restoration and protection, improve forest cover, control soil erosion, construct important ecological security barrier in poor areas, inhibit poverty alleviation through ecological security in this area from environmental damage to the vicious cycle of poverty. Obviously, the dynamic monitoring of ecological security in contiguous destitute areas of Sichuan province has a policy sense of urgency and practical significance. This paper adopts RS technology and GIS technology to select the Luhe region of Jinchuan county and Ganzi prefecture as the research area, combined with the characteristics of ecological environment in poor areas, the impact factors of ecological environment are determined as land use type, terrain slope, vegetation cover, surface water, soil moisture and other factors. Using the ecological environmental safety assessment model, the ecological environment safety index is calculated. According to the index, the ecological environment safety of the research area is divided into four levels. The ecological environment safety classification map of 1990 in 2009 is obtained. It can be seen that with the human modern life and improve their economic level, the surrounding environment will be destroyed, because the research area ecological environment is now in good, the ecological environment generally tends to be stable. We should keep its ecological security good and improve local economic income. The relationship between ecological environmental security and economic coordinated development in poor areas has very important strategic significance.

  6. Advanced Environmental Monitoring Technologies

    Science.gov (United States)

    Jan, Darrell

    2004-01-01

    Viewgraphs on Advanced Environmental Monitoring Technologies are presented. The topics include: 1) Monitoring & Controlling the Environment; 2) Illustrative Example: Canary 3) Ground-based Commercial Technology; 4) High Capability & Low Mass/Power + Autonomy = Key to Future SpaceFlight; 5) Current Practice: in Flight; 6) Current Practice: Post Flight; 7) Miniature Mass Spectrometer for Planetary Exploration and Long Duration Human Flight; 8) Hardware and Data Acquisition System; 9) 16S rDNA Phylogenetic Tree; and 10) Preview of Porter.

  7. 78 FR 21911 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2013-04-12

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... review the role of the U.S. government in supporting the early adoption of environmental technologies and...

  8. Environmental control technology

    International Nuclear Information System (INIS)

    Anon.

    1985-01-01

    During this report period, Chem Tech identified environmental control technology (ECT) as an area of emphasis for future planning and resource allocation. The Division plans to continue to perform R and D activities in ECT for external sponsors such as the DOE Office of Fossil Energy (DOE/FE), the Electric Power Research Institute (EPRI), and the Environmental Protection Agency (EPA) while striving for recognition as an R and D center for ECT within the Martin Marietta Energy Systems' Complex. Chem Tech has already played supporting roles in this area for the Y-12 Plant and the Oak Ridge Gaseous Diffusion Plant (ORGDP) and is currently expanding its support to organizations within ORNL responsible for environmental matters. Over the long term, the Division hopes to achieve recognition as a center for R and D in ECT within the wider DOE system. Recent initiatives supporting these plans are discussed below

  9. The Danish technology foresight on environmentally friendly agriculture

    DEFF Research Database (Denmark)

    Borch, Kristian

    2013-01-01

    A premise that is necessary for agriculture to develop into an environmentally friendly direction is that research is undertaken into environmentally friendly technologies and methods and how they can be brought into use. There is a need for a prioritised research effort that focuses on those...... without any plan or with some thought. Therefore the National Forest and Nature Agency in Denmark initiated the Green Technological foresight on environmentally friendly agriculture with the aim of examining the agricultural environmental challenges and suggesting technological and structural solutions....... problems which are related to minimising environmental problems affected by the agricultural production’s negative influence on the surroundings, improving animal welfare and finding new ways and products for agriculture. Future directions of agriculture can derive with or without dialogue; it can occur...

  10. 77 FR 14734 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2012-03-13

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... proposed agenda of a meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The... innovation in the environmental technology sector. Background: The ETTAC is mandated by Public Law 103-392...

  11. Validity of information security policy models

    Directory of Open Access Journals (Sweden)

    Joshua Onome Imoniana

    Full Text Available Validity is concerned with establishing evidence for the use of a method to be used with a particular set of population. Thus, when we address the issue of application of security policy models, we are concerned with the implementation of a certain policy, taking into consideration the standards required, through attribution of scores to every item in the research instrument. En today's globalized economic scenarios, the implementation of information security policy, in an information technology environment, is a condition sine qua non for the strategic management process of any organization. Regarding this topic, various studies present evidences that, the responsibility for maintaining a policy rests primarily with the Chief Security Officer. The Chief Security Officer, in doing so, strives to enhance the updating of technologies, in order to meet all-inclusive business continuity planning policies. Therefore, for such policy to be effective, it has to be entirely embraced by the Chief Executive Officer. This study was developed with the purpose of validating specific theoretical models, whose designs were based on literature review, by sampling 10 of the Automobile Industries located in the ABC region of Metropolitan São Paulo City. This sampling was based on the representativeness of such industries, particularly with regards to each one's implementation of information technology in the region. The current study concludes, presenting evidence of the discriminating validity of four key dimensions of the security policy, being such: the Physical Security, the Logical Access Security, the Administrative Security, and the Legal & Environmental Security. On analyzing the Alpha of Crombach structure of these security items, results not only attest that the capacity of those industries to implement security policies is indisputable, but also, the items involved, homogeneously correlate to each other.

  12. 76 FR 5209 - Notice of Availability of the Environmental Assessment for New Low Security Beds

    Science.gov (United States)

    2011-01-28

    ...-security male criminal aliens. In accordance with the National Environmental Policy Act (NEPA) of 1969, the... initiative (known as the Criminal Alien Requirement), the BOP has identified a specific requirement to confine a population of approximately 1,000 low-security adult male inmates that are primarily criminal...

  13. 1992 yearbook of environmental and technology-related law

    International Nuclear Information System (INIS)

    Schroeder, M.

    1992-01-01

    The 1992 and sixth edition of this yearbook contains papers on environmental and technology-related law in the European Communities and the Federal Republic of Germany including among other things information on the latest jurisdiction by the European Court of Justice; insurability of environmental damage; scientific aspects of limit values. There are also treatises on non-German and comparative as well as international environmental and technology- related law which deal among other things with atomic and immission protection law and on harmonization and codification from a general point of view. Finally, some papers report on developments of national and European environmental and technology-related law. Three of the fifteen contributions have been abstracted separately. (HSCH) [de

  14. Armament Technology Facility (ATF)

    Data.gov (United States)

    Federal Laboratory Consortium — The Armament Technology Facility is a 52,000 square foot, secure and environmentally-safe, integrated small arms and cannon caliber design and evaluation facility....

  15. Proceedings of Opportunity '95 -- Environmental technology through small business

    International Nuclear Information System (INIS)

    Kothari, V.P.

    1994-11-01

    The Opportunity '95--Environmental Technology Through Small Business conference was held November 16--17, 1994, at the Morgantown Energy Technology Center (METC) in Morgantown, West Virginia. The overall objective of this conference was to review the latest environmental and waste management technologies being developed under the sponsorship of the Environmental Management--Office of Technology Development (EM-OTD) Program at METC. The focus of this conference was also to address the accomplishments and barriers affecting small businesses, and lay the groundwork for future technology development initiatives and opportunities. Twenty papers were presented in three EM-OTD focus areas: mixed waste characterization, treatment and disposal (6 papers); contaminant plume containment and remediation (6 papers); and facility transitioning, decommissioning and final disposition (8 papers). In addition to the presentations, nine posters of environmental management areas were displayed. A panel discussion was also held on technology development assistance to small businesses. Selected papers are indexed separately for inclusion in the Energy Science and Technology Database

  16. Environmental radiation sensing technologies

    International Nuclear Information System (INIS)

    Nishizawa, Hiroshi; Inomata, Kenji; Tamuro, Masaru; Fujita, Kazuhiko

    2013-01-01

    After the Fukushima nuclear accident, environmental radiation monitoring and radioactivity measurement of contamination of wastes, soils, food and drinking water were needed in accurate and reliable way. Based on radiation sensing technologies and radiation and light coupled analysis method, new environmental radiation measurement system for simple monitoring post without exclusive house and also portable monitoring post for temporary use were developed with low cost. Measurement accuracy was improved by real-time processing of detected pulses and corrected non-linearity of low-energy range by analysis. Environmental performance was upgraded to assure detector gain with compensated against temperature change and aging. Inspection and maintenance were also simplified using touch panel display with standardized application menu and data format. (T. Tanaka)

  17. Food Security, Institutional Framework and Technology: Examining the Nexus in Nigeria Using ARDL Approach.

    Science.gov (United States)

    Osabohien, Romanus; Osabuohien, Evans; Urhie, Ese

    2018-04-01

    Growth in agricultural science and technology is deemed essential for in-creasing agricultural output; reduce the vulnerability of rural poverty and in turn, food security. Food security and growth in agricultural output depends on technological usages, which enhances the pro-ductive capacity of the agricultural sector. The indicators of food security utilised in this study in-clude: dietary energy supply, average value of food production, prevalence of food inadequacy, among others. In this paper, we examined the level of technology and how investment in the agriculture and technology can improve technical know-how in Nigeria with a view to achieving food security. We carried out the analysis on how investment in technology and institutional framework can improve the level of food availability (a key component of food security) in Nigeria using econ-ometric technique based on Autoregressive Distribution Lag (ARDL) framework. The results showed, inter alia, that in Nigeria, there is a high level of food insecurity as a result of low attention on food production occasioned by the pervasive influence of oil that become the major export product. It was noted that the availability of arable land was one of the major factors to increase food production to solve the challenge of food insecurity. Thus, the efforts of reducing the rate of food insecurity are essential in this regards. This can also be achieved, among others, by active interactions between government and farmers, to make contribution to important planning issues that relate to food production in the country and above all, social protection policies should be geared or channelled to agricultural sector to protect farmers who are vulnerable to shocks and avert risks associated with agriculture.

  18. Advanced technologies: Trends and implications for security

    International Nuclear Information System (INIS)

    Shaw, A.

    1990-01-01

    As the world moves towards the close of the twentieth century, three technological trends will strongly influence security. In order of importance they are: first, the increasing globalization of the ability to develop and use high technology, much of which has both civilian and military applications; secondly, the broad dissemination of militarily-relevant technology world-wide; and thirdly, the continued development by the United States and the USSR (and a few other nations) of advanced technology for military applications. The military balance between the super-Powers and their allies has been strongly rooted in advancing military technology. Great changes in technology have resulted in adjustments -mostly in limited aspects such as the armour/ anti-armour balance - but have not caused it to change wildly. This seems likely to remain the case for the foreseeable future. There are arguments that Western technology has been a prime causative factor behind Soviet willingness to engage in negotiations to reduce forces. They claim that fear of the Strategic Defense Initiative is behind progress in the Strategic Arms Reduction Talks, and that perceived Western mastery of the technology for systems combining quick reaction, deep strike and high kill probabilities led the Soviet Union to reassess its potential for a successful land campaign in Europe. If current arms control negotiations are successful, the momentum is maintained, and other political changes take hold, the military balance could be taken to a point where ft would not be very sensitive to technological change. One should be aware that the arms control negotiations are very complex, primarily because of technological issues, and we should not yet bank on it all working out well. If it fails, the military technical competition will heat up again. Even under a strict arms control regime we can expect the competition to continue as each side seeks to develop counters to what ft sees as the other side

  19. Microsoft Technology as an Optimization Tool in Promoting Security and Functionality of the Educational System

    Directory of Open Access Journals (Sweden)

    Jelena Jardas Antonic

    2008-10-01

    Full Text Available Abstract - In the cooperation with the City of Rijeka, the project of analysis of the functional and security situation of information infrastructure has been initiated in 24 schools in the authority of the city. Having completed the multicriteria analysis of the collected data, we have built a model of implementing Microsoft service technologies. The implementation should satisfy the elementary security principles that are required by the security standards today, maximizing functionality of infrastructure and minimizing network administration tasks. Server technology that has been used in this solution is Microsoft Widows 2003 Server R2 and Internet Security and Acceleration Server 2006, as well as the GFI WebMonitor and antivirus.

  20. QuEST: Qualifying Environmentally Sustainable Technologies

    Science.gov (United States)

    Lewis, Pattie

    2012-01-01

    Articles in this issue inlude: (1) Foundation of Technology Evaluation for Environmental Risk Mitigation Principal Center (TEERM) Technology Evaluation is Testing and Qualification, (2) Materials Management and Substitution Efforts, (3 Recycling and Pollution Control Efforts, and (4) Remediation Efforts

  1. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  2. 78 FR 74129 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2013-12-10

    ... for Environmental Policy and Technology AGENCY: Environmental Protection Agency (EPA). ACTION: Notice... Environmental Policy and Technology (NACEPT). NACEPT provides advice to the EPA Administrator on a broad range of environmental policy, technology, and management issues. NACEPT members represent academia...

  3. Nevada National Security Site Environmental Report 2011 Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed.

    2012-09-12

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2011. Included are subsections that summarize the site's geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site's environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  4. SIHTI 2 - Energy and environmental technology

    International Nuclear Information System (INIS)

    Saviharju, K.; Johansson, A.

    1993-01-01

    The programme is divided into system and technology parts. The aim of system studies is to determine, on the basis of lifecycle analyses, long-term environmental-technological aims for various fields (energy, industry) and to find out an optimum strategy for reaching these aims. The analysis will give data on emission reduction costs and on fields, where technical improvements are required, and will determine the limits set by environmental factors for future technical development. Environmental impacts will be discussed from national and economic viewpoints. Technological development is dependent on new ideas. The aim is to indicate possibilities for reducing emissions from energy use of peat and wood, for low-emission production at least on one industrial field (wood-processing industry), to establish emission measuring and control methods, to indicate utilization alternatives for solid matter separated at power plants, and to find out operable alternatives for the energy use of wastes. Other ventures of significance will also be financed: survey of 'new' emissions and development of their measuring and purification methods. The field of the programme will be divided into synergic sub-fields: systematics of emission chains, fields of operation (energy and environment problems in the wood-processing industries), development of flue gas purification technology, measuring and control technology, by-products of power plants, emissions from peat production, etc

  5. Nevada Test Site Environmental Report 2008

    Energy Technology Data Exchange (ETDEWEB)

    Cathy A. Wills

    2009-09-01

    The Nevada Test Site Environmental Report (NTSER) 2008 was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years’ NTSERs are posted on the NNSA/NSO website at http://www.nv.doe.gov/library/publications/aser.aspx.

  6. ASPECT (Airborne Spectral Photometric Environmental Collection Technology) Fact Sheet

    Science.gov (United States)

    This multi-sensor screening tool provides infrared and photographic images with geospatial, chemical, and radiological data within minutes to support emergency responses, home-land security missions, environmental surveys, and climate monitoring missions.

  7. 76 FR 73632 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2011-11-29

    ... and Technology AGENCY: Environmental Protection Agency (EPA). ACTION: Request for Nominations to the National Advisory Council for Environmental Policy and Technology (NACEPT). SUMMARY: The U.S. Environmental... appointment to the National Advisory Council for Environmental Policy and Technology (NACEPT). Vacancies are...

  8. 75 FR 25240 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2010-05-07

    ... ENVIRONMENTAL PROTECTION AGENCY National Advisory Council for Environmental Policy and Technology... for Environmental Policy and Technology (NACEPT). NACEPT provides advice to the EPA Administrator on a broad range of environmental policy, technology, and management issues. NACEPT is a committee of...

  9. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, GROUNDWATER SAMPLING TECHNOLOGIES, GEOPROBE INC., PNEUMATIC BLADDER PUMP GW 1400 SERIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) design efficient processes for conducting has created the Environmental Technology perfofl1lance tests of innovative technologies. Verification Program (E TV) to facilitate the deployment of innovative or improved environmental techn...

  10. 78 FR 47316 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2013-08-05

    ... and Technology AGENCY: Environmental Protection Agency (EPA). ACTION: Request for nominations to the National Advisory Council for Environmental Policy and Technology (NACEPT). SUMMARY: The U.S. Environmental... Environmental Policy and Technology (NACEPT). Vacancies are anticipated to be filled by February, 2014. Sources...

  11. Laser Applications to Chemical, Security, and Environmental Analysis: introduction to the feature issue

    International Nuclear Information System (INIS)

    Dreizler, Andreas; Fried, Alan; Gord, James R.

    2007-01-01

    This Applied Optics feature issue on Laser Applications to Chemical, Security,and Environmental Analysis (LACSEA) highlights papers presented at theLACSEA 2006 Tenth Topical Meeting sponsored by the Optical Society ofAmerica

  12. Laser applications to chemical, security, and environmental analysis: introduction to the feature issue.

    Science.gov (United States)

    Seeger, Thomas; Dreier, Thomas; Chen, Weidong; Kearny, Sean; Kulatilaka, Waruna

    2017-04-10

    This Applied Optics feature issue on laser applications to chemical, security, and environmental analysis (LACSEA) highlights papers presented at the LACSEA 2016 Fifteenth Topical Meeting sponsored by the Optical Society of America.

  13. Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016

    CERN Document Server

    Serrhini, Mohammed; Felgueiras, Carlos

    2017-01-01

    This book contains a selection of articles from The Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016 (EMENA-TSSL'16), held between the 3th and 5th of October at Saidia, Oujda, Morocco. EMENA-TSSL'16 is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges in Information & Communication Technologies, and Security to support Learning. The main topics covered are: A) Online Education; B) Emerging Technologies in Education; C) Artificial Intelligence in Education; D) Gamification and Serious games; E) Network & Web Technologies Applications; F) Online experimentation and Virtual Laboratories; G) Multimedia Systems and Applications; H) Security and Privacy; I) Multimedia, Computer Vision and Image Processing; J) Cloud, Big Data Analytics and Applications; K) Human-Computer Interaction; L) Software Systems, Architectures, Applications and Tools; M) Onli...

  14. Engaging, Designing and Making Digital Technologies

    DEFF Research Database (Denmark)

    Vertesi, Janet; Ribes, David; Forlano, Laura

    2017-01-01

    Science and Technology Studies (STS) is a flourishing interdisciplinary field that examines the transformative power of science and technology to arrange and rearrange contemporary societies. The Handbook of Science and Technology Studies provides a comprehensive and authoritative overview......, agriculture, security, disasters, environmental justice, and climate change....

  15. Environmental Monitoring of Agro-Ecosystem Using Environmental Isotope Tracer Technology

    International Nuclear Information System (INIS)

    Chung, Byung Yeoup; Kim, Jae Sung; Cho, Jae Young

    2004-10-01

    This report has provided the counterparts the knowledge and skills on the use of environmental isotope tracer technology for obtaining valuable information on agricultural non-point pollution source in agro-ecosystem. The contamination from agricultural watersheds has been brought into attention as a potential contaminant of streams and tributaries, since majority of them caused water quality degradation, eutrophication of reservoir and negative effect on agro-environment. To prevent the contamination from these watersheds, it is necessary to find out the source of the contamination. However, accurate contaminants outflows from various types of non-point sources have not yet been elucidated due to the fact that the extent of non-point source contaminants related to uncontrollable climatic events and irrigation conditions may differ greatly from place to place and year to year. The dominant use of isotopes in environmental ecosystem research in the last few decades has been to trace sources of waters and solutes. The environmental isotope tracer technology using stable isotopes such as oxygen, hydrogen, carbon, nitrogen, and sulfur has extensively been used for tracing the fate of environmental pollutants and for identification of environmental pollutants sources in agro-ecosystems

  16. MUSES RT2AE V P/DP: On the Road to Privacy-Friendly Security Technologies in the Workplace

    OpenAIRE

    Van Der Sype, Yung Shin Marleen; Guislain, Jonathan; Seigneur, Jean-Marc; Titi, Xavier

    2016-01-01

    Successful protection of company data assets requires strong technological support. As many security incidents still occur from within, security technologies often include elements to monitor the behaviour of employees. As those security systems are considered as privacy-intrusive, they are hard to align with the privacy and data protection rights of the employees of the company. Even though there is currently no legal obligation for developers to embed privacy and data protection in security...

  17. Environmental science and technology: An overview

    Energy Technology Data Exchange (ETDEWEB)

    1993-01-01

    This report is intended to provide an overview of the scientific and technological effort to meet the environmental goals identified in the Green Plan. The report gives a sense of the range of scientific and technological efforts that are being devoted to issues as diverse as conserving our wildlife and national parks and developing innovative technologies to clean-up polluted sites.

  18. EVALUATION OF ECOLOGICAL ENVIRONMENT SECURITY IN CONTIGUOUS POVERTY ALLEVIATION AREA OF SICHUAN PROVINCE

    Directory of Open Access Journals (Sweden)

    W. Xian

    2018-04-01

    Full Text Available According to the overall requirements of ecological construction and environmental protection, rely on the national key ecological engineering, strengthen ecological environmental restoration and protection, improve forest cover, control soil erosion, construct important ecological security barrier in poor areas, inhibit poverty alleviation through ecological security in this area from environmental damage to the vicious cycle of poverty. Obviously, the dynamic monitoring of ecological security in contiguous destitute areas of Sichuan province has a policy sense of urgency and practical significance. This paper adopts RS technology and GIS technology to select the Luhe region of Jinchuan county and Ganzi prefecture as the research area, combined with the characteristics of ecological environment in poor areas, the impact factors of ecological environment are determined as land use type, terrain slope, vegetation cover, surface water, soil moisture and other factors. Using the ecological environmental safety assessment model, the ecological environment safety index is calculated. According to the index, the ecological environment safety of the research area is divided into four levels. The ecological environment safety classification map of 1990 in 2009 is obtained. It can be seen that with the human modern life and improve their economic level, the surrounding environment will be destroyed, because the research area ecological environment is now in good, the ecological environment generally tends to be stable. We should keep its ecological security good and improve local economic income. The relationship between ecological environmental security and economic coordinated development in poor areas has very important strategic significance.

  19. Audit Teknologiinformasiatas Physical Security Control Dan Logical Security Control Serta Penentuan Kondisi Security Risk Studi Kasus: PT Talc Indonesia

    OpenAIRE

    Inggrid; Arfianti, Rizka I; Utami, Viany

    2009-01-01

    Abstract The fast growth of technology has an impact to the accounting field. This relates to the term of information technology (17) auditing. One of the risI6 of using information technology in business which can be fatal enough i fignored is security risk Security risk can be reduced by security controls which include physical security control and logical security contra Information technology auditing is the process of collecting and evaluating evidence to determine whether or not a co...

  20. 76 FR 77776 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2011-12-14

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... Energy & Environmental Industries (OEEI), International Trade Administration, Room 4053, 1401...

  1. 76 FR 51001 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2011-08-17

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... Energy & Environmental Industries (OEEI), International Trade Administration, Room 4053, 1401...

  2. 77 FR 58356 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2012-09-20

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... Energy & Environmental Industries (OEEI), International Trade Administration, Room 4053, 1401...

  3. 78 FR 4834 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2013-01-23

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... Energy & Environmental Industries (OEEI), International Trade Administration, Room 4053, 1401...

  4. 77 FR 50987 - Environmental Technologies Trade Advisory Committee, Request for Nominations

    Science.gov (United States)

    2012-08-23

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... Commerce. ACTION: Solicitation of Nominations for Membership on the Environmental Technologies Trade...) is requesting nominations for memberships on the Environmental Technologies Trade Advisory Committee...

  5. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  6. The Importance of the Brain Neuro-Programming Technologies in National and Regional Security

    Directory of Open Access Journals (Sweden)

    Vasyl H. Fatkhutdinov

    2018-02-01

    Full Text Available The authors’ understanding of neuro-programming is the result of the impact on the human brain of information and communication technology (including educational one, through which in the human brain the programs of manifestation in the ontogenesis of internal creative potentials are written. This article summarizes the history of the formation of key neuro-programming technologies of the human brain as well as proves that the changes in the society’s worldview are caused by the possibilities and quality of neuro-programming technologies that society uses. Having influence over worldview stereotypes and behaviour set by the society, neuro-programming technologies essentially ensure the national security of any state and the peaceful coexistence of states in the regions and on the planet as a whole. Using historical and philosophical methods, methods of conceptualization, systematization, modeling, etc., the authors have come to the conclusion that the modern world lies in a confrontation of security strategies, in which neuro-programming technologies play a key role.

  7. ENVIRONMENTAL REGULATIONS AND TECHNOLOGY - THE ELECTROPLATING INDUSTRY

    Science.gov (United States)

    This 44-page Technology Transfer Environmental Regulations and Technology publication is an update of a 1980 EPA publication that has been revised to reflect changes in the EPA regulations, as well as in the pollution control technologies that affect the electroplating industry. ...

  8. Technology-based management of environmental organizations using an Environmental Management Information System (EMIS): Design and development

    Science.gov (United States)

    Kouziokas, Georgios N.

    2016-01-01

    The adoption of Information and Communication Technologies (ICT) in environmental management has become a significant demand nowadays with the rapid growth of environmental information. This paper presents a prototype Environmental Management Information System (EMIS) that was developed to provide a systematic way of managing environmental data and human resources of an environmental organization. The system was designed using programming languages, a Database Management System (DBMS) and other technologies and programming tools and combines information from the relational database in order to achieve the principal goals of the environmental organization. The developed application can be used to store and elaborate information regarding: human resources data, environmental projects, observations, reports, data about the protected species, environmental measurements of pollutant factors or other kinds of analytical measurements and also the financial data of the organization. Furthermore, the system supports the visualization of spatial data structures by using geographic information systems (GIS) and web mapping technologies. This paper describes this prototype software application, its structure, its functions and how this system can be utilized to facilitate technology-based environmental management and decision-making process.

  9. Technology management for environmentally sound and sustainable development

    International Nuclear Information System (INIS)

    Zaidi, S.M.J.

    1992-01-01

    With the evolutionary change in the production activities of human societies, the concept of development has also been changing. In the recent years the emphasis has been on the environmentally sound and sustainable development. The environmentally sound and sustainable development can be obtained through judicious use of technology. Technology as a resource transformer has emerged as the most important factor which can constitute to economic growth. But technology is not an independent and autonomous force, it is only an instrument which needs to be used carefully, properly and appropriately which necessitates technology management. (author)

  10. 76 FR 26247 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2011-05-06

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... & Environmental Industries (OEEI), International Trade Administration, Room 4053, 1401 Constitution Ave, NW...

  11. 78 FR 46921 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2013-08-02

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... Hinman, Office of Energy & Environmental Industries (OEEI), International Trade Administration, Room 4053...

  12. A survey of environmental needs and innovative technologies in Germany

    International Nuclear Information System (INIS)

    Voss, C.F.; Roberds, W.J.

    1995-05-01

    The International Technology Program (IT?), formerly the international Technology Exchange Program (ITEP), of the Department of Energy's (DOE's) Office of Environmental Restoration and Waste Management (EM) is responsible for promoting: (1) the import of innovative technologies to better address EM's needs; and (2) the export of US services into foreign markets to enhance US competitiveness. Under this program: (1) the environmental restoration market in Germany was evaluated, including the description of the general types of environmental problems, the environmental regulations, and specific selected contaminated sites; and (2) potentially innovative environmental restoration technologies, either commercially available or under development in Germany, were identified, described and evaluated. It was found that: (1) the environmental restoration market in Germany is very large, on the order of several billion US dollars per year, with a significant portion possibly available to US businesses; and (2) a large number (54) of innovative environmental restoration technologies, which are either commercially available or under development in Germany, may have some benefit to the DOE EM program and should be considered for transfer to the US

  13. Sandia National Laboratories: CRISPR genome-editing technology

    Science.gov (United States)

    Environmental Management System Pollution Prevention History 60 impacts Diversity Locations Facts & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Technology Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  14. Sandia National Laboratories: Microsystems Science & Technology Center

    Science.gov (United States)

    Environmental Management System Pollution Prevention History 60 impacts Diversity Locations Facts & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Technology Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers

  15. The Evolving Relationship Between Technology and National Security in China: Innovation, Defense Transformation, and China’s Place in the Global Technology Order

    Science.gov (United States)

    2016-02-12

    Stockmann, Xiao Qiang. Changing Media, Changing China , New York: Oxford University Press, (01 2011) Dieter Ernst. Indigenous Innovation and...2211 China , science, technology, dual use, defense, security, innovation REPORT DOCUMENTATION PAGE 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 10...ABSTRACT Final Report: The Evolving Relationship Between Technology and National Security in China : Innovation , Defense Transformation, and China’s

  16. Technology and Environmental Education: An Integrated Curriculum

    Science.gov (United States)

    Willis, Jana M.; Weiser, Brenda

    2005-01-01

    Preparing teacher candidates to integrate technology into their future classrooms effectively requires experience in instructional planning that utilizes technology to enhance student learning. Teacher candidates need to work with curriculum that supports a variety of technologies. Using Project Learning Tree and environmental education (EE),…

  17. Scenario and multiple criteria decision analysis for energy and environmental security of military and industrial installations.

    Science.gov (United States)

    Karvetski, Christopher W; Lambert, James H; Linkov, Igor

    2011-04-01

    Military and industrial facilities need secure and reliable power generation. Grid outages can result in cascading infrastructure failures as well as security breaches and should be avoided. Adding redundancy and increasing reliability can require additional environmental, financial, logistical, and other considerations and resources. Uncertain scenarios consisting of emergent environmental conditions, regulatory changes, growth of regional energy demands, and other concerns result in further complications. Decisions on selecting energy alternatives are made on an ad hoc basis. The present work integrates scenario analysis and multiple criteria decision analysis (MCDA) to identify combinations of impactful emergent conditions and to perform a preliminary benefits analysis of energy and environmental security investments for industrial and military installations. Application of a traditional MCDA approach would require significant stakeholder elicitations under multiple uncertain scenarios. The approach proposed in this study develops and iteratively adjusts a scoring function for investment alternatives to find the scenarios with the most significant impacts on installation security. A robust prioritization of investment alternatives can be achieved by integrating stakeholder preferences and focusing modeling and decision-analytical tools on a few key emergent conditions and scenarios. The approach is described and demonstrated for a campus of several dozen interconnected industrial buildings within a major installation. Copyright © 2010 SETAC.

  18. Nano-enabled environmental products and technologies - opportunities and drawbacks

    DEFF Research Database (Denmark)

    Møller Christensen, Frans; Brinch, Anna; Kjølholt, Jesper

    The project aims to investigate the benefits for health and environment that the use of nanomaterials in products and technologies may have. More specifically, the project provides an overview of the most relevant nano-enabled environmental technologies, different types of products and technologies...... on the (Danish) market, as well as products and technologies, which are still in R&D and it will provide a qualitative overview of health and environmental pros and cons of these technologies. The project has focused on technologies applied in: 1) purification of water and wastewater, 2) remediation of soil...

  19. 77 FR 39705 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2012-07-05

    ... and Technology AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of Advisory Committee... meeting of the National Advisory Council for Environmental Policy and Technology (NACEPT). NACEPT provides advice to the EPA Administrator on a broad range of environmental policy, technology, and management...

  20. 76 FR 1431 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2011-01-10

    ... and Technology AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of Meeting. SUMMARY... National Advisory Council for Environmental Policy and Technology (NACEPT). NACEPT provides advice to the EPA Administrator on a broad range of environmental policy, technology, and management issues. NACEPT...

  1. 75 FR 52941 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2010-08-30

    ... and Technology AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of meeting. SUMMARY... National Advisory Council for Environmental Policy and Technology (NACEPT). NACEPT provides advice to the EPA Administrator on a broad range of environmental policy, technology, and management issues. NACEPT...

  2. 76 FR 24481 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2011-05-02

    ... and Technology AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of meeting. SUMMARY... National Advisory Council for Environmental Policy and Technology (NACEPT). NACEPT provides advice to the EPA Administrator on a broad range of environmental policy, technology, and management issues. NACEPT...

  3. 76 FR 68183 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2011-11-03

    ... and Technology AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of meeting. SUMMARY... National Advisory Council for Environmental Policy and Technology (NACEPT). NACEPT provides advice to the EPA Administrator on a broad range of environmental policy, technology, and management issues. NACEPT...

  4. 77 FR 1931 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2012-01-12

    ... and Technology AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of Advisory Committee... meeting of the National Advisory Council for Environmental Policy and Technology (NACEPT). NACEPT provides advice to the EPA Administrator on a broad range of environmental policy, technology, and management...

  5. 75 FR 38810 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2010-07-06

    ... and Technology AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of meeting. SUMMARY... of the National Advisory Council for Environmental Policy and Technology (NACEPT). NACEPT provides advice to the EPA Administrator on a broad range of environmental policy, technology, and management...

  6. 77 FR 3475 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2012-01-24

    ... and Technology AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of advisory committee... teleconference of the National Advisory Council for Environmental Policy and Technology (NACEPT). NACEPT provides advice to the EPA Administrator on a broad range of environmental policy, technology, and management...

  7. 76 FR 37112 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2011-06-24

    ... and Technology AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of meeting. SUMMARY... of the National Advisory Council for Environmental Policy and Technology (NACEPT). NACEPT provides advice to the EPA Administrator on a broad range of environmental policy, technology, and management...

  8. Nevada Test Site Environmental Report 2008 Summary

    Energy Technology Data Exchange (ETDEWEB)

    Cathy A. Wills

    2009-09-01

    The Nevada Test Site Environmental Report (NTSER) 2008 was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years’ NTSERs are posted on the NNSA/NSO website at http://www.nv.doe.gov/library/publications/aser.aspx.

  9. Energy Assurance: Essential Energy Technologies for Climate Protection and Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Boudreaux, Philip R [ORNL; Dean, David Jarvis [ORNL; Fulkerson, William [University of Tennessee, Knoxville (UTK); Gaddis, Abigail [University of Tennessee, Knoxville (UTK); Graham, Robin Lambert [ORNL; Graves, Ronald L [ORNL; Hopson, Dr Janet L [University of Tennessee, Knoxville (UTK); Hughes, Patrick [ORNL; Lapsa, Melissa Voss [ORNL; Mason, Thom [ORNL; Standaert, Robert F [ORNL; Wilbanks, Thomas J [ORNL; Zucker, Alexander [ORNL

    2009-12-01

    We present and apply a new method for analyzing the significance of advanced technology for achieving two important national energy goals: climate protection and energy security. Quantitative metrics for U.S. greenhouse gas emissions in 2050 and oil independence in 2030 are specified, and the impacts of 11 sets of energy technologies are analyzed using a model that employs the Kaya identity and incorporates the uncertainty of technological breakthroughs. The goals examined are a 50% to 80% reduction in CO2 emissions from energy use by 2050 and increased domestic hydrocarbon fuels supply and decreased demand that sum to 11 mmbd by 2030. The latter is intended to insure that the economic costs of oil dependence are not more than 1% of U.S. GDP with 95% probability by 2030. Perhaps the most important implication of the analysis is that meeting both energy goals requires a high probability of success (much greater than even odds) for all 11 technologies. Two technologies appear to be indispensable for accomplishment of both goals: carbon capture and storage, and advanced fossil liquid fuels. For reducing CO2 by more than 50% by 2050, biomass energy and electric drive (fuel cell or battery powered) vehicles also appear to be necessary. Every one of the 11 technologies has a powerful influence on the probability of achieving national energy goals. From the perspective of technology policy, conflict between the CO2 mitigation and energy security is negligible. These general results appear to be robust to a wide range of technology impact estimates; they are substantially unchanged by a Monte Carlo simulation that allows the impacts of technologies to vary by 20%.

  10. Security Transition Program Office 1994 fiscal year work plan WBS 6.11

    International Nuclear Information System (INIS)

    Brogdon, R.C. Jr.

    1993-10-01

    The Security Transition Program Office (STPO) will change the Hanford Safeguards and Security Protection Program from one that supported the national defense program to one that supports environmental restoration and waste management. A Successful Safeguards and Security Protection Program transition will have an industrial security foundation supplemented to protect material interests and information resources. The transition will change the current approaches to protection philosophy to ones that will provide the Hanford Site with the following: consolidation, reduction, and elimination of safeguards and security interests and targets; greater open Site access; maximum application of technology and automation; interpretation of security policies and procedures in light of the Hanford Site's environmental mission; coexistence with other emergency services; streamlined operations; and protection of employees and the public from health, safety, fire, security, and safeguards risks. This report describes the 1994 program objectives, the technical base, schedule baseline, cost, funding, manpower, and the 1993 program workscope

  11. The role of food-security solutions in the protection of natural resources and environment of developing countries.

    Science.gov (United States)

    Lashgarara, Farhad; Mirdamadi, Seyyed Mehdi; Hosseini, Seyyed Jamal Farajollah; Chizari, Mohammad

    2008-10-01

    The majority of the countries of the world, especially developing countries, face environmental problems. Limitations of basic resources (water and soil) and population growth have been the cause of these environmental problems that countries are confronted with. Developing countries have numerous problems, including destruction of forests, vegetable and animal species, and pollution of the environment. Damage to natural resources and the environment can influence the food-security situation. One of the main millennium development goals (MDGs) is protection of the environment and people's health. This cannot obtained unless there is ensured food security. Food security has been defined as a situation when all people, at all times, have physical and economic access to sufficient, safe, and nutritious food needed to maintain a healthy and active life. At the same time, with ensured food security, we can hope to protect the natural resources and environment. The methodology used is descriptive-analytical, and its main purpose is determining the importance and role of food-security solutions in the reduction of environmental hazards and improvement of natural resources and the environmental situation in developing countries. Therefore, some of the most important food-security solutions that can play an important role in this relation were discussed, including conventional research-based technology, biotechnology, information and communication technologies (ICTs), alternative energy sources, and food irradiation.

  12. Information technology - Security techniques - Information security management systems - Requirements

    CERN Document Server

    International Organization for Standardization. Geneva

    2005-01-01

    ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

  13. 77 FR 8859 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2012-02-15

    ... and Technology AGENCY: Environmental Protection Agency (EPA). ACTION: Cancellation and Rescheduling of National Advisory Council for Environmental Policy and Technology (NACEPT) Committee Meeting. SUMMARY: EPA... Environmental Policy and Technology (NACEPT) Meeting to be held at the EPA Potomac Yard Conference Center, One...

  14. ENVIRONMENTAL IMPACT ASSESSMENT OF A HEALTH TECHNOLOGY: A SCOPING REVIEW.

    Science.gov (United States)

    Polisena, Julie; De Angelis, Gino; Kaunelis, David; Gutierrez-Ibarluzea, Iñaki

    2018-06-13

    The Health Technology Expert Review Panel is an advisory body to Canadian Agency for Drugs and Technologies in Health (CADTH) that develops recommendations on health technology assessments (HTAs) for nondrug health technologies using a deliberative framework. The framework spans several domains, including the environmental impact of the health technology(ies). Our research objective was to identify articles on frameworks, methods or case studies on the environmental impact assessment of health technologies. A literature search in major databases and a focused gray literature search were conducted. The main search concepts were HTA and environmental impact/sustainability. Eligible articles were those that described a conceptual framework or methods used to conduct an environmental assessment of health technologies, and case studies on the application of an environmental assessment. From the 1,710 citations identified, thirteen publications were included. Two articles presented a framework to incorporate environmental assessment in HTAs. Other approaches described weight of evidence practices and comprehensive and integrated environmental impact assessments. Central themes derived include transparency and repeatability, integration of components in a framework or of evidence into a single outcome, data availability to ensure the accuracy of findings, and familiarity with the approach used. Each framework and methods presented have different foci related to the ecosystem, health economics, or engineering practices. Their descriptions suggested transparency, repeatability, and the integration of components or of evidence into a single outcome as their main strengths. Our review is an initial step of a larger initiative by CADTH to develop the methods and processes to address the environmental impact question in an HTA.

  15. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  16. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  17. Environmental consequences of new energy technology

    International Nuclear Information System (INIS)

    Svensson, Torbjoern

    1991-09-01

    This report summarises and assesses the environmental consequences associated with new energy technologies, with particular emphasis on their use for space heating supplies in the built environment. In the case of solar heating, it is primarily the processes associated with the production of the necessary materials and ground use requirements that can adversely affect the environment. There is also a certain risk associated with the leakage of heat transfer fluid. For heat stores, problem areas are primarily those associated with heating of the ground, discharge of foreign substances in connection with water treatment and conflicts of other users of ground water. The main adverse effects of heat pumps are their emissions of CFCs, which damage the ozone layer, utilisation of certain types of heat sources and the need to provide primary energy for mechanical drive of the pumps. All three of these new energy technologies are regarded as having less environmental consequences than conventional alternatives, although this assumes a change to less hazardous working media in heat pumps. A mutual comparison of the three technologies indicates that solar heating and heat stores have somewhat better environmental characteristics than heat pumps

  18. Divison of Environmental Control Technology program, 1978

    International Nuclear Information System (INIS)

    1979-06-01

    This report covers Division of Environmental Control Technology projects in progress during FY 1978, within the Office of the Assistant Secretary for Environment, Department of Energy. It is the second in a planned series of annual reports. The Division of Environmental Control Technology (ECT) continues to support the Assistant Secretary for Environment (EV) in discharging two primary responsibilities: (1) under the Environmental Engineering (EE) Program, the independent overview and assessment of environmental control aspects of both the U.S. Department of Energy's (DOE) research, development, and demonstration (RD and D) programs and the Nation's energy policies, and (2) under the Decontamination and Decommissioning Program, the reduction of potential environmental hazards at the radioactively contaminated sites that are presently owned or were formerly used by the Government. This report presents a short summary of objectives, approach, progress and results, future plans, and a reference bibliography for each research, development, or assessment project within the program areas described above

  19. Divison of Environmental Control Technology program, 1978

    Energy Technology Data Exchange (ETDEWEB)

    Mott, William E.

    1979-06-01

    This report covers Division of Environmental Control Technology projects in progress during FY 1978, within the Office of the Assistant Secretary for Environment, Department of Energy. It is the second in a planned series of annual reports. The Division of Environmental Control Technology (ECT) continues to support the Assistant Secretary for Environment (EV) in discharging two primary responsibilities: (1) under the Environmental Engineering (EE) Program, the independent overview and assessment of environmental control aspects of both the U.S. Department of Energy's (DOE) research, development, and demonstration (RD and D) programs and the Nation's energy policies, and (2) under the Decontamination and Decommissioning Program, the reduction of potential environmental hazards at the radioactively contaminated sites that are presently owned or were formerly used by the Government. This report presents a short summary of objectives, approach, progress and results, future plans, and a reference bibliography for each research, development, or assessment project within the program areas described above.

  20. Division of Environmental Control Technology program, 1977

    Energy Technology Data Exchange (ETDEWEB)

    None

    1978-06-01

    Environmental engineering programs are reviewed for the following technologies; coal; petroleum and gas; oil shale; solar; geothermal and energy conservation; nuclear energy; and decontamination and decommissioning. Separate abstracts were prepared for each technology. (MHR)

  1. The Western Environmental Technology Office (WETO) Butte, Montana

    International Nuclear Information System (INIS)

    1994-10-01

    This document has been prepared to highlight the research, development, demonstration, testing and evaluation activities funded through the Western Environmental Technology Office (WETO) in Butte, Montana. Technologies and processes described have the potential to enhance DOE's cleanup and waste management efforts, as well as improve US industry's competitiveness in global environmental markets. This information has been assembled from recently produced Office of Technology Development (OTD) documents which highlight technology development activities within each of the OTD program elements. Projects include: Heavy metals contaminated soil project; In Situ remediation integrated program; Minimum additive waste stabilization program; Resource recovery project; Buried waste integrated demonstration; Mixed waste integrated program; Pollution prevention program; and Mine waste technology program

  2. Bechtel Hanford, Inc. network security plan for the environmental restoration contract

    International Nuclear Information System (INIS)

    McCaffrey, M.B.

    1997-01-01

    As part of the Computer Protection Program, this Network Security Plan identifies the specific security measures used to protect the Bechtel Hanford, Inc. (BHI) enterprise network. The network consists of the communication infrastructure and information systems used by BHI to perform work related to the Environmental Restoration Contract (ERC) at the Hanford Site. It provides electronic communication between the ERC-leased facilities in Richland, Washington and other facilities located on the Hanford Site. Network gateways to other site and offsite networks provide electronic communication with the rest of the Hanford community. The enterprise network is comprised of several individual networks that operate under different conditions and perform different functions. The principal network used by BHI is the Bechtel Local Area Network (BLAN). This document identifies specific security issues surrounding the BLAN and the measures BHI takes to protect it. The other BHI-operated networks are discussed from the perspective of the security impact they have on the BLAN. This plan addresses security for individual and shared computer systems connected to the BHI networks as well as the gateways between other site and external networks. It specifically does not address computer-based information systems that store or process particularly sensitive data, computer systems connected to other site networks (e.g., Hanford Local Area Network), or standalone computers located in ERC facilities

  3. New technology in everyday life - social processes and environmental impact

    DEFF Research Database (Denmark)

    Røpke, Inge

    2001-01-01

    aspect both of changes in everyday life and of the environmental impact of everyday-life activities. Technological change is often seen as an important part of the solutions to environmental problems, however, when technological change is seen from the perspective of everyday life, this image becomes...... more complex. In this paper technological changes are explored from the perspective of consumption and everyday life, and it is argued that environmental impacts arise through the interplay of technology, consumption and everyday life. Firstly, because technological renewals form integral parts...... influence the environment in the long run. The paper points to the need for further studies of the long term interplay between new technologies, everyday life and the environment....

  4. The Design and Implementation of a Low Cost and High Security Smart Home System Based on Wi-Fi and SSL Technologies

    Science.gov (United States)

    Xu, Chong-Yao; Zheng, Xin; Xiong, Xiao-Ming

    2017-02-01

    With the development of Internet of Things (IoT) and the popularity of intelligent mobile terminals, smart home system has come into people’s vision. However, due to the high cost, complex installation and inconvenience, as well as network security issues, smart home system has not been popularized. In this paper, combined with Wi-Fi technology, Android system, cloud server and SSL security protocol, a new set of smart home system is designed, with low cost, easy operation, high security and stability. The system consists of Wi-Fi smart node (WSN), Android client and cloud server. In order to reduce system cost and complexity of the installation, each Wi-Fi transceiver, appliance control logic and data conversion in the WSN is setup by a single chip. In addition, all the data of the WSN can be uploaded to the server through the home router, without having to transit through the gateway. All the appliance status information and environmental information are preserved in the cloud server. Furthermore, to ensure the security of information, the Secure Sockets Layer (SSL) protocol is used in the WSN communication with the server. What’s more, to improve the comfort and simplify the operation, Android client is designed with room pattern to control home appliances more realistic, and more convenient.

  5. Energetic technologies and environmental impact

    International Nuclear Information System (INIS)

    2001-01-01

    This monograph is a collective work by scientist from CIEMAT (Spanish centre for research on energy, environment and technology). By reviewing the central topics of their own work, the authors present a world-wide update of the state of the arts of the different technologies involved in energy production. The chapters fo through the more promising technologies related to the diverse energy sources, from the nuclear to the renewable and chemical a large gamut of energy supply ways is revised. The analysis of the production technologies is accompanied by considerations of the environmental implications, an aspect to wich a whole part of the volume is devoted. The book begins with a foreword by Dr. Felix Yndurain, former General Director of CIEMAT and follows with a general introduction to the main topics, that are presented in three parts, with specific introductions. There is also a closing fourth part that includes some additional activities where more basic and technical developments are included. The first part is devoted to energy of nuclear origin. In two separate sections, fission and fusion technologies are covered. The fission section points towards the present day problems of nuclear plants (ageing, accidents, risk analysis, etc.), reprocessing of the nuclear fuel, radioactive wastes and environmental radioactivity. The fusion section contains a critical account of the present and expected developments of the fusion reactors together with an exposition of the related plasma physics problems. The second part comprises two sections devoted to energy generation of renewable and chemical origin, respectively. Tehcnologies for solar, wind and biomass energies are thoroughly exposed along the renewable energy section whereas the chemical energy section is devoted to the modern technologies of clean fossil fuel combustion and gasification, as well as to the new appealing subject of direct electric generation with fuel cells. The main environmental and social

  6. OCETA: services for environmental companies an technology developers

    Energy Technology Data Exchange (ETDEWEB)

    Buckley, A.; Ozdemir, B. [Ontario Centre for Environmental Technology Advancement, Toronto, ON (Canada)

    1995-12-31

    Services provided by OCETA (Ontario Centre for Environmental Technology Advancement) to Ontario-based developers of environmental technologies, were described. While OCETA is not a granting agency, it is prepared to provide seed funding, in combination with private and government funding for client projects, and is committed to sharing risks and rewards for successful commercialization. The agency is also in a position to provide technology services at agreed discounts and to maximize in-kind contributions in order to extend project funding. Other services that the agency is equipped to provide, are described. These include information services, technology demonstration and assessment, business services, funding identification and sourcing, marketing, partnerships, and export market development.

  7. The Advanced Technology Environmental Education Center Summer Fellows Institute.

    Science.gov (United States)

    Depken, Diane E.; Zeman, Catherine L.; Lensch, Ellen Kabat; Brown, Edward J.

    2002-01-01

    Describes the background, activities, and outcomes of the Advanced Technology Environmental Education Center (ATEEC) and its Summer Fellows Institutes as a model for disciplinary and cross-disciplinary infusion of environmental science and technology content, curriculum, and methods into the classroom. Presents experiences, themes, and activities…

  8. Future implications of China's energy-technology choices

    International Nuclear Information System (INIS)

    Larson, E.D.; Wu Zongxin; DeLaquil, Pat; Chen Wenying; Gao Pengfei

    2003-01-01

    This paper summarizes an assessment of future energy-technology strategies for China that explored the prospects for China to continue its social and economic development while ensuring national energy-supply security and promoting environmental sustainability over the next 50 years. The MARKAL energy-system modeling tool was used to build a model of China's energy system representing all sectors of the economy and including both energy conversion and end-use technologies. Different scenarios for the evolution of the energy system from 1995 to 2050 were explored, enabling insights to be gained into different energy development choices. The analysis indicates a business-as-usual strategy that relies on coal combustion technologies would not be able to meet all environmental and energy security goals. However, an advanced technology strategy emphasizing (1) coal gasification technologies co-producing electricity and clean liquid and gaseous energy carriers (polygeneration), with below-ground storage of some captured CO 2 ; (2) expanded use of renewable energy sources (especially wind and modern biomass); and (3) end-use efficiency would enable China to continue social and economic development through at least the next 50 years while ensuring security of energy supply and improved local and global environmental quality. Surprisingly, even when significant limitations on carbon emissions were stipulated, the model calculated that an advanced energy technology strategy using our technology-cost assumptions would not incur a higher cumulative (1995-2050) total discounted energy system cost than the business-as-usual strategy. To realize such an advanced technology strategy, China will need policies and programs that encourage the development, demonstration and commercialization of advanced clean energy conversion technologies and that support aggressive end-use energy efficiency improvements

  9. What can information technology do for environmental protection?

    International Nuclear Information System (INIS)

    Trauboth, H.

    1987-01-01

    Information technology plays an important role in the accomplishment of an effective environmental protection. Prerequisite for its comprehensive implementation is the legal and economic achievement of closed material cycles for supply and waste discharge in production and consumption as well as in nuclear technology. Modern information processing may be used for the inventory of natural and emission sources, to gain knowledge on the functioning mechanisms of nature, for the planning of a considerate exploitation of natural recources and for the ecology-oriented monitoring and control of industrial plants. The state of the art of the corresponding information technology and new areas of research especially in measurement technology are shown. The breadth of the great opportunities of information technology for environmental protection is discribed. (orig.) [de

  10. Arms and technology transfers: Security and economic considerations among importing and exporting states

    International Nuclear Information System (INIS)

    Lodgaard, S.; Pfaltzgraff, R.L. Jr.

    1995-01-01

    The issues of technology and armament transfers are increasingly at the forefront of problems of international security and disarmament. Three major reasons could explain this. First, the disarmament process has been very successful in the last few years, especially in the field of nuclear, as well chemical and conventional, weapons. Second the disarmament effort underway concerns primarily the old partners of the East-West confrontation. Last, the general context, characterized by the opening and widening of exchanges, the increasingly open and transparent circulation of techniques and material, and the globalization of economic relations, must be taken into account. This report, prepared by UNIDIR comprises the following subjects: General trends in defense related transfers; Political/military factors associated with the diffusion of advanced technology; economic and technological consideration; and facilitation of economic growth/maximization of regional security and stability

  11. Technologies for improved soil carbon management and environmental quality

    Energy Technology Data Exchange (ETDEWEB)

    Reicosky, D.C. [USDA-Agricultural Research Service, Morris, MN (United States)

    1997-12-31

    The objective of this paper is to create an environmental awareness of and to provide insight into the future balance of environment and economic issues in developing new technologies that benefit the farmer, the public, and agricultural product sales. Agricultural impacts of tillage-induced CO{sub 2} losses are addressed along with new and existing technologies to minimize tillage-induced flow of CO{sub 2} to the atmosphere, Emphasis is placed on the carbon cycle and the cost of environmental damage to illustrate the need for improved technologies leading to reduced environmental impacts by business ventures. New technologies and concepts related to methods of tillage and stover management for carbon sequestration with the agricultural production systems are presented. 16 refs., 3 figs.

  12. National Security Science and Technology Initiative: Air Cargo Screening

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; White, Tim [Pacific Northwest National Laboratory (PNNL); Cespedes, Ernesto [Idaho National Laboratory (INL); Bowerman, Biays [Brookhaven National Laboratory (BNL); Bush, John [Battelle

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three

  13. New technologies and emerging threats: personnel security adjudicative guidelines in the age of social networking

    OpenAIRE

    Festa, James P.

    2012-01-01

    Approved for public release; distribution is unlimited Publicized incidents involving espionage or violence by government employees with security clearances have raised concern for the personnel security community. The guidelines used to adjudicate security clearances were last updated in 2005; since that time, significant technological developments, especially in social media and communications, have emerged. This thesis developed a comprehensive list of current Internet behaviors, and us...

  14. 75 FR 70215 - Environmental Technologies Trade Advisory Committee (ETTAC), Request for Nominations

    Science.gov (United States)

    2010-11-17

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade...: Notice of solicitation of nominations for membership on the Environmental Technologies Trade Advisory Committee (ETTAC). SUMMARY: The Environmental Technologies Trade Advisory Committee (ETTAC) was established...

  15. Application of radiation technology for industry and environmental protection

    International Nuclear Information System (INIS)

    Sueo Machi

    1996-01-01

    The world population today is 5.7 billion and increasing by 94 million per year. In order to meet the increasing consumption of food and energy due to the tremendous population growth, unproved technologies which are environmentally friendly, are indispensable. In this context. a number of advanced technologies have been brought about by the LISC of radiation and isotopes. This paper highlights radiation technology, applications in industry, environmental conservation, and agriculture

  16. Energy technologies and the environment: environmental information handbook

    International Nuclear Information System (INIS)

    1981-06-01

    This manual draws together information on the environmental consequences of energy technologies that will be in use in the United States during the next 20 years. We hope it will prove useful to planners, policymakers, legislators, researchers, and environmentalists. The information on environmental issues, control technologies, and energy production and conservation processes should also be a convenient starting point for deeper exploration. Published references are given for the statements, data, and conclusions so that the interested reader can obtain more detailed information where necessary. Environmental aspects of energy technologies are presented in a form suitable for government and public use and are intended to assist decisionmakers, researchers, and the public with basic information and references that can be relied upon through changing policies and changing world energy prices

  17. Proceedings of the 1989 Carnahan conference on security technology

    International Nuclear Information System (INIS)

    DeVore, R.W.

    1989-01-01

    This book contains the proceedings of the 1989 Carnahan conference on security technology and crime countermeasures. Topics covered include: study of methods for the enhancement of classified document control and protection; research and development of a portable microfocus x-ray system capable of providing ultra-high resolution images of improvised explosive devices; and BombCAD - a CAD-based technique for assessing bomb vulnerability and designing and evaluating bomb defense measures

  18. Environmental assessment for the Processing and Environmental Technology Laboratory (PETL)

    International Nuclear Information System (INIS)

    1995-09-01

    The U.S. Department of Energy (DOE) has prepared an environmental assessment (EA) on the proposed Processing and Environmental Technology Laboratory (PETC) at Sandia National Laboratories/New Mexico (SNL/NM). This facility is needed to integrate, consolidate, and enhance the materials science and materials process research and development (R ampersand D) currently in progress at SNL/NM. Based on the analyses in the EA, DOE has determined that the proposed action is not a major Federal action significantly affecting the quality of the human environment within the meaning of the National Environmental Policy Act (NEPA) of 1969. Therefore, an environmental impact statement is not required, and DOE is issuing this Finding of No Significant Impact (FONSI)

  19. Environmental assessment for the Processing and Environmental Technology Laboratory (PETL)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-09-01

    The U.S. Department of Energy (DOE) has prepared an environmental assessment (EA) on the proposed Processing and Environmental Technology Laboratory (PETC) at Sandia National Laboratories/New Mexico (SNL/NM). This facility is needed to integrate, consolidate, and enhance the materials science and materials process research and development (R&D) currently in progress at SNL/NM. Based on the analyses in the EA, DOE has determined that the proposed action is not a major Federal action significantly affecting the quality of the human environment within the meaning of the National Environmental Policy Act (NEPA) of 1969. Therefore, an environmental impact statement is not required, and DOE is issuing this Finding of No Significant Impact (FONSI).

  20. An Evaluation Methodology for the Usability and Security of Cloud-based File Sharing Technologies

    Science.gov (United States)

    2012-09-01

    FISMA, ISO 27001 , FIPS 140-2, and ISO 270001) indicate a cloud-based service’s compliance with industry standard security controls, management and...Information Assurance IEEE Institute of Electrical and Electronics Engineers IT Information Technology ITS Insider Threat Study ISO International...effectively, efficiently and with satisfaction” (International Organization for Standardization [ ISO ], 1998). Alternately, information security

  1. Public policy and clean technology promotion. The synergy between environmental economics and evolutionary economics of technological change

    Energy Technology Data Exchange (ETDEWEB)

    Rio Gonzalez, Pablo del [Universidad de Castilla-La Mancha, Toledo (Spain). Facultad de Ciencias Juridicas y Sociales de Toledo

    2004-07-01

    Obstacles to clean technology development, innovation and diffusion are not only related to the lack of internalisation of environmental externalities in production costs, as defended by traditional environmental economics. Empirical studies show that many other obstacles prevent these technologies from penetrating the market. The relevance of these obstacles differs between sectors, firms and technologies. Consequently, a more focused approach is proposed. By taking a look at the specific, real-world barriers to clean technologies, a policy framework as well as some specific measures that target those barriers are suggested. These instruments are useful and complementary in a policy framework that, in addition to specific instruments, takes into account the influence of the style of regulation and the configuration of actors in the environmental technological change process. This paper proposes a coherent framework integrating environmental policy and technology policy instruments. This is deemed necessary in the technological transition to sustainable development. (author)

  2. ICT security- aspects important for nuclear facilities; Information and Communication Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thunem, Atoosa P-J.

    2005-09-15

    Rapid application growth of complex Information and Communication Technologies (ICT) in every society and state infrastructure as well as industry has revealed vulnerabilities that eventually have given rise to serious security breaches. These vulnerabilities together with the course of the breaches from cause to consequence are gradually about to convince the field experts that ensuring the security of ICT-driven systems is no longer possible by only relying on the fundaments of computer science, IT, or telecommunications. Appropriating knowledge from other disciplines is not only beneficial, but indeed very necessary. At the same time, it is a common observation today that ICT-driven systems are used everywhere, from the nuclear, aviation, commerce and healthcare domains to camera-equipped web-enabled cellular phones. The increasing interdisciplinary and inter-sectoral aspects of ICT security worldwide have been providing updated and useful information to the nuclear domain, as one of the emerging users of ICT-driven systems. Nevertheless, such aspects have also contributed to new and complicated challenges, as ICT security for the nuclear domain is in a much more delicate manner than for any other domains related to the concept of safety, at least from the public standpoint. This report addresses some important aspects of ICT security that need to be considered at nuclear facilities. It deals with ICT security and the relationship between security and safety from a rather different perspective than usually observed and applied. The report especially highlights the influence on the security of ICT-driven systems by all other dependability factors, and on that basis suggests a framework for ICT security profiling, where several security profiles are assumed to be valid and used in parallel for each ICT-driven system, sub-system or unit at nuclear facilities. The report also covers a related research topic of the Halden Project with focus on cyber threats and

  3. Environmental impacts from the solar energy technologies

    International Nuclear Information System (INIS)

    Tsoutsos, Theocharis; Frantzeskaki, Niki; Gekas, Vassilis

    2005-01-01

    Solar energy systems (photovoltaics, solar thermal, solar power) provide significant environmental benefits in comparison to the conventional energy sources, thus contributing, to the sustainable development of human activities. Sometimes however, their wide scale deployment has to face potential negative environmental implications. These potential problems seem to be a strong barrier for a further dissemination of these systems in some consumers. To cope with these problems this paper presents an overview of an Environmental Impact Assessment. We assess the potential environmental intrusions in order to ameliorate them with new technological innovations and good practices in the future power systems. The analysis provides the potential burdens to the environment, which include - during the construction, the installation and the demolition phases, as well as especially in the case of the central solar technologies - noise and visual intrusion, greenhouse gas emissions, water and soil pollution, energy consumption, labour accidents, impact on archaeological sites or on sensitive ecosystems, negative and positive socio-economic effects

  4. The environmental effect of subsidies for clean technologies

    International Nuclear Information System (INIS)

    De Vries, F.P.; Nentjes, A.

    2001-01-01

    Environmental subsidies for clean technology result in a larger diffusion of such technology. However, as a result emissions can increase in imperfect markets for products. When several companies compete each other with clean and dirty technologies, production and emission will rise because of price competition.This effect will be even larger in case subsidies are applied. Therefore, subsidies are not advisable for every market. In this article an evolutionary game theory has been used with respect to the diffusion of environment-friendly innovation of products and the role of environmental policy instruments (in particular subsidies). 7 refs

  5. Final Site-Wide Environmental Impact Statement for the Y-12 National Security Complex

    International Nuclear Information System (INIS)

    2001-01-01

    The National Nuclear Security Administration (NNSA) a separately organized agency within the U.S. Department of Energy (DOE) is responsible for providing the Nation with nuclear weapons and ensuring that those nuclear weapons remain safe, secure, and reliable. As one of the DOE major production facilities, the Y-12 National Security Complex has been DOE's primary site for enriched uranium processing and storage, and one of the manufacturing facilities for maintaining the U.S. nuclear weapons stockpile. In response to the end of the Cold War and changes in the world's political regimes, the emphasis of the U.S. weapons program has shifted dramatically over the past few years from developing and producing new weapons to dismantlement and maintenance of a smaller, enduring stockpile. The ''Stockpile Stewardship and Management Programmatic Environmental Impact Statement'' [SSM PEIS], DOE/EIS-0236, issued in September 1996, evaluated alternatives for maintaining the safety and reliability of the nuclear weapons stockpile without underground nuclear testing or production of new-design weapons. In the SSM PEIS Record of Decision (ROD), DOE decided to maintain the national security missions at the Y-12 National Security Complex, but to downsize Y-12 consistent with reduced requirements. These national security missions include (1) maintaining the capability and capacity to fabricate secondaries, limited life components, and case parts for nuclear response; (2) evaluating components and subsystems returned from the stockpile; (3) storing enriched uranium that is designated for national security purposes; (4) storing depleted uranium and lithium parts; (5) dismantling nuclear weapons secondaries returned from the stockpile; (6) processing uranium and lithium (which includes chemical recovery, purification, and conversion of enriched uranium and lithium to a form suitable for long-term storage and/or further use); and (7) providing support to weapons laboratories. During the

  6. 77 FR 2719 - National Advisory Council for Environmental Policy and Technology; Meeting

    Science.gov (United States)

    2012-01-19

    ... and Technology; Meeting AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of Advisory... a public meeting of the National Advisory Council for Environmental Policy and Technology (NACEPT). NACEPT provides advice to the EPA Administrator on a broad range of environmental policy, technology...

  7. Computer Security: Security operations at CERN (4/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...

  8. New technologies and the search for security: Prospects for a post-cold-war era

    International Nuclear Information System (INIS)

    Petrovsky, V.

    1990-01-01

    New technologies are setting a fast pace in our world. Through science and technology we are able to make our world better, richer and more liveable to everyone. However, the new technologies have brought new mans of destruction and have confronted the world with a real prospect of self destruction. This is one of the main challenges of our age. Greater mutual confidence, openness and, if necessary, checks on how scientific and technological co-operation is used must bring down the existing barriers un the area of technological exchanges. The first results are already evident, for instance in the nuclear field. In our age, science and technology are becoming an inherent element in the comprehensive search for a new, post-confrontational system of peace, security and co-operation. United nations, together with its family of specialized agencies, is called upon to play a major positive role in finding approaches in this area. Scientific and technological progress, especially on the eve of a new millennium in the history of mankind, must serve only to enhance international peace and security and, enable everyone to live a full and worthy life

  9. Report: FISMA - Fiscal Year 2004 Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2004-S-00007, September 30, 2004. This report synopsizes the results of information technology security work the U.S. Environmental Protection Agency’s Office of Inspector General (OIG) performed during Fiscal Year (FY) 2004.

  10. Environmental implications of wireless technologies: news delivery and business meetings.

    Science.gov (United States)

    Toffel, Michael W; Horvath, Arpad

    2004-06-01

    Wireless information technologies are providing new ways to communicate, and are one of several information and communication technologies touted as an opportunity to reduce society's overall environmental impacts. However, rigorous system-wide environmental impact comparisons of these technologies to the traditional applications they may replace have only recently been initiated, and the results have been mixed. In this paper, the environmental effects of two applications of wireless technologies are compared to those of conventional technologies for which they can substitute. First, reading newspaper content on a personal digital assistant (PDA) is compared to the traditional way of reading a newspaper. Second, wireless teleconferencing is compared to business travel. The results show that for both comparisons wireless technologies create lower environmental impacts. Compared to reading a newspaper, receiving the news on a PDA wirelessly results in the release of 32-140 times less CO2, several orders of magnitude less NOx and SOx, and the use of 26-67 times less water. Wireless teleconferencing results in 1-3 orders of magnitude lower CO2, NOx, and SO2 emissions than business travel.

  11. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: DUST SUPPRESSANT PRODUCTS: SYNTECH PRODUCTS CORPORATION'S PETROTAC

    Science.gov (United States)

    Dust suppressant products used to control particulate emissions from unpaved roads are among the technologies evaluated by the Air Pollution Control Technology (APCT) Verification Center, part of the U.S. Environmental Protection Agency's Environmental Technology Verification (ET...

  12. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: DUST SUPPRESSANT PRODUCTS: SYNTECH PRODUCTS CORPORATION'S TECHSUPPRESS

    Science.gov (United States)

    Dust suppressant products used to control particulate emissions from unpaved roads are among the technologies evaluated by the Air Pollution Control Technology (APCT) Verification Center, part of the U.S. Environmental Protection Agency's Environmental Technology Verification (ET...

  13. Addressing China's grand challenge of achieving food security while ensuring environmental sustainability.

    Science.gov (United States)

    Lu, Yonglong; Jenkins, Alan; Ferrier, Robert C; Bailey, Mark; Gordon, Iain J; Song, Shuai; Huang, Jikun; Jia, Shaofeng; Zhang, Fusuo; Liu, Xuejun; Feng, Zhaozhong; Zhang, Zhibin

    2015-02-01

    China's increasingly urbanized and wealthy population is driving a growing and changing demand for food, which might not be met without significant increase in agricultural productivity and sustainable use of natural resources. Given the past relationship between lack of access to affordable food and political instability, food security has to be given a high priority on national political agendas in the context of globalization. The drive for increased food production has had a significant impact on the environment, and the deterioration in ecosystem quality due to historic and current levels of pollution will potentially compromise the food production system in China. We discuss the grand challenges of not only producing more food but also producing it sustainably and without environmental degradation. In addressing these challenges, food production should be considered as part of an environmental system (soil, air, water, and biodiversity) and not independent from it. It is imperative that new ways of meeting the demand for food are developed while safeguarding the natural resources upon which food production is based. We present a holistic approach to both science and policy to ensure future food security while embracing the ambition of achieving environmental sustainability in China. It is a unique opportunity for China to be a role model as a new global player, especially for other emerging economies.

  14. An information technology enabled sustainability test-bed (ITEST) for occupancy detection through an environmental sensing network

    Energy Technology Data Exchange (ETDEWEB)

    Dong, Bing; Lam, Khee Poh; Zhang, Rui; Chiou, Yun-Shang [Center for Building Performance and Diagnostics, Carnegie Mellon University, Pittsburgh, PA 15213 (United States); Andrews, Burton; Hoeynck, Michael; Benitez, Diego [Research and Technology Center, Robert BOSCH LLC, Pittsburgh, PA 15212 (United States)

    2010-07-15

    This paper describes a large-scale wireless and wired environmental sensor network test-bed and its application to occupancy detection in an open-plan office building. Detection of occupant presence has been used extensively in built environments for applications such as demand-controlled ventilation and security; however, the ability to discern the actual number of people in a room is beyond the scope of current sensing techniques. To address this problem, a complex sensor network is deployed in the Robert L. Preger Intelligent Workplace comprising a wireless ambient-sensing system, a wired carbon dioxide sensing system, and a wired indoor air quality sensing system. A wired camera network is implemented as well for establishing true occupancy levels to be used as ground truth information for deriving algorithmic relationships with the environment conditions. To our knowledge, this extensive and diverse ambient-sensing infrastructure of the ITEST setup as well as the continuous data-collection capability is unprecedented. Final results indicate that there are significant correlations between measured environmental conditions and occupancy status. An average of 73% accuracy on the occupancy number detection was achieved by Hidden Markov Models during testing periods. This paper serves as an exploration to the research of ITEST for occupancy detection in offices. In addition, its utility extends to a wide variety of other building technology research areas such as human-centered environmental control, security, energy efficient and sustainable green buildings. (author)

  15. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - TETRATEC PTFE TECHNOLOGIES TETRATEX 8005

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  16. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    International Nuclear Information System (INIS)

    Mendez Cruz, Carmen Margarita; Rochau, Gary E.; Middleton, Bobby; Rodriguez, Salvador B.; Rodriguez, Carmelo; Schleicher, Robert

    2016-01-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)'s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  17. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    Energy Technology Data Exchange (ETDEWEB)

    Mendez Cruz, Carmen Margarita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rochau, Gary E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Middleton, Bobby [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Salvador B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Carmelo [General Atomics, San Diego, CA (United States); Schleicher, Robert [General Atomics, San Diego, CA (United States)

    2016-06-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)’s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  18. [Biofuels, food security and transgenic crops].

    Science.gov (United States)

    Acosta, Orlando; Chaparro-Giraldo, Alejandro

    2009-01-01

    Soaring global food prices are threatening to push more poor people back below the poverty line; this will probably become aggravated by the serious challenge that increasing population and climate changes are posing for food security. There is growing evidence that human activities involving fossil fuel consumption and land use are contributing to greenhouse gas emissions and consequently changing the climate worldwide. The finite nature of fossil fuel reserves is causing concern about energy security and there is a growing interest in the use of renewable energy sources such as biofuels. There is growing concern regarding the fact that biofuels are currently produced from food crops, thereby leading to an undesirable competition for their use as food and feed. Nevertheless, biofuels can be produced from other feedstocks such as lingo-cellulose from perennial grasses, forestry and vegetable waste. Biofuel energy content should not be exceeded by that of the fossil fuel invested in its production to ensure that it is energetically sustainable; however, biofuels must also be economically competitive and environmentally acceptable. Climate change and biofuels are challenging FAO efforts aimed at eradicating hunger worldwide by the next decade. Given that current crops used in biofuel production have not been domesticated for this purpose, transgenic technology can offer an enormous contribution towards improving biofuel crops' environmental and economic performance. The present paper critically presents some relevant relationships between biofuels, food security and transgenic plant technology.

  19. Technology of environmental pollution control, 2nd edition

    International Nuclear Information System (INIS)

    Shaheen, E.I.

    1991-01-01

    The final decade of the 20th century is truly the environmental decade of the century because of the gravity of environmental challenges we are facing. This book covers the environmental spectrum in an attempt to update the reader on new technologies and topics regarding pollution control. Engineers, scientists, plant operators, and students studying the subject of pollution control will use the comprehensive text as a reference for technological advances, regulations, and pollution control. The major disasters witnessed in the last few years, such as the Bhopal gas tragedy, the Chernobyl nuclear disaster, the Exxon Valdez oil spill and the Ashland of tank collapse are described in detail

  20. The Role of Agricultural Technology in Food and Nutritional Security ...

    African Journals Online (AJOL)

    Strengthening of agricultural research and extension. The development and utilization of profitable and environmentally-friendly technology is an essential factor for the transformation of agriculture into a modern sector. The impact of technology can be attained through the revitalization of agricultural research and extension ...

  1. Environmental assessment of solid waste systems and technologies: EASEWASTE

    DEFF Research Database (Denmark)

    Kirkeby, Janus Torsten; Birgisdottir, Harpa; Hansen, Trine Lund

    2006-01-01

    A new model has been developed for evaluating the overall resource consumption and environmental impacts of municipal solid waste management systems by the use of life cycle assessment. The model is named EASEWASTE (Environmental Assessment of Solid Waste Systems and Technologies) and is able...... may not always be the most environmentally friendly. The EASEWASTE model can identify the most environmentally sustainable solution, which may differ among waste materials and regions and can add valuable information about environmental achievements from each process in a solid waste management system....... to compare different waste management strategies, waste treatment methods and waste process technologies. The potential environmental impacts can be traced back to the most important processes and waste fractions that contribute to the relevant impacts. A model like EASEWASTE can be used by waste planners...

  2. Security threads: effective security devices in the past, present, and future

    Science.gov (United States)

    Wolpert, Gary R.

    2002-04-01

    Security threads were first used to secure banknotes in the mid 1800's. The key to their anti-counterfeiting success was the fact that by being embedded in the paper, they became an integral part of the banknote substrate. Today, all major currencies still utilize this effective security feature. Technological developments have allowed security threads to evolve from a feature authenticated by only visual means to devices that incorporate both visual and machine detectable components. When viewed from the perspective of a thread being a carrier of various security technologies and the fact that they can be incorporated into the core substrate of banknotes, documents, labels, packaging and some high valued articles, it is clear that security threads will remain as effective security devices well into the future. This paper discusses a brief historical background of security threads, current visual and machine authentication technologies incorporated into threads today and a look to the future of threads as effective security devices.

  3. Oceans and environmental security: Shared U.S. and Russian perspectives

    International Nuclear Information System (INIS)

    Broadus, J.M.; Vartanov, R.V.

    1994-01-01

    In 1989, the Institute for World Economy and International Relations of the Russian Academy of Sciences and the Marine Policy Center of Woods Hole Oceanographic Institution instituted a joint project to examine environmental security as it applies to the world's oceans. The book is a unified expression of their findings. The book focuses on seven specific concerns, land-based marine pollution, North Pacific fisheries depletion, hazardous materials transport, nuclear contamination, the Arctic Ocean, the Southern Ocean and Antarctica, and the Law of the Sea

  4. Are clean technology and environmental quality conflicting policy goals?

    OpenAIRE

    Brechet, Thierry; Meunier, Guy; Institut National de la Recherche Agronomique UR 1303 Alimentation et Sciences Sociales

    2012-01-01

    In this paper we analyze the effects of an environmental policy on the diffusion of a clean technology in an economy where firms compete on the output market. We show that the share of adopting firms is non-monotonic with the stringency of the environmental policy, and that the adoption of the clean technology may well increase the pollution level. We also compare the effects of an emission tax and tradable pollution permits on welfare, technology adoption, and pollution level. We show that, ...

  5. Are Clean Technology and Environmental Quality Conflicting Policy Goals?

    OpenAIRE

    Thierry Brechet; Guy Meunier

    2012-01-01

    In this paper we analyze the effects of an environmental policy on the diffusion of a clean technology in an economy where firms compete on the output market. We show that the share of adopting firms is non-monotonic with the stringency of the environmental policy, and that the adoption of the clean technology may well increase the pollution level. We also compare the effects of an emission tax and tradable pollution permits on welfare, technology adoption, and pollution level. We show that, ...

  6. Earth Observation for Food Security and Sustainable Agriculture

    Science.gov (United States)

    Bach, Heike; Mauser, Wolfram; Gernot, Klepper

    2016-08-01

    The global and regional potentials of Earth Observation (EO) to contribute to food security and sustainable agriculture in the 2050-timeframe were analysed in the ESA study EO4Food, whose outcome will be presented (www.EO4Food.org). Emphasis was put on the global societal, economic, environmental and technological megatrends that will create demand for food and shape the future societies. They will also constitute the background for developments in EO for food security and sustainable agriculture. The capabilities of EO in this respect were critically reviewed with three perspectives 1) the role of EO science for society, 2) observables from space and 3) development of future science missions.It was concluded that EO can be pivotal for the further development of food security and sustainable agriculture. EO allows to support the whole economic and societal value chain from farmers through food industry to insurance and financial industry in satisfying demands and at the same time to support society in governing sustainable agriculture through verifyable rules and regulations. It has the potential to become the global source of environmental information that is assimilated into sophisticated environmental management models and is used to make agriculture sustainable.

  7. Technology Evaluation for Environmental Risk Mitigation Compendium

    Science.gov (United States)

    Meinhold, A.; Greene, B.; Dussich, J.; Sorkin, A.; Olsen, W.

    2017-01-01

    The Technology Evaluation for Environmental Risk Mitigation (TEERM) Principal Center and its predecessor organization the Acquisition Pollution Prevention Program (AP2) supported the National Aeronautics and Space Administration (NASA) in identifying technology solutions to risks and costs to NASA programs driven by environmental regulations and requirements. TEERM researched the commercial and government marketplace to locate viable and available technologies that met NASAs needs. TEERM focused on addressing environmentally-driven risks of direct concern to NASA programs and facilities, including hazardous materials in NASA operations and materials that became obsolescent because of environmental regulations. TEERM projects aimed to reduce cost; ensure the health and safety of people, assets, and the environment; promote efficiency; and minimize duplication. Major TEERM and AP2 projects focused on waste minimization and hazardous waste treatment, recycling, corrosion prevention and control, solvent and ozone depleting substances substitution, and aqueous based cleaners. In 2017, NASA made the decision to terminate the TEERM Principal Center. This Compendium Report documents TEERM and AP2 project successes. The Compendium Report traces the evolution of TEERM based on evolving risks and requirements for NASA and its relationship to the Space Shuttle Program, the United States Department of Defense, the European Space Agency, and other public and private stakeholders. This Compendium Report also documents project details from Project Summaries and Joint Test Plans and describes project stakeholders and collaborative effort results.

  8. The Use of Technology by Nonformal Environmental Educators

    Science.gov (United States)

    Peffer, Tamara Elizabeth; Bodzin, Alec M.; Smith, Judith Duffield

    2013-01-01

    This study examined the use of instructional and learning technologies by nonformal environmental educators. A 40-question survey was developed to inquire about practitioner demographics, technology use in practice, and beliefs about technology. The survey consisted of multiple choice, open-ended questions, and a Likert-type scale component--the…

  9. Overview: Applicability of U.S. environmental control technologies for Korea

    Energy Technology Data Exchange (ETDEWEB)

    Chun, S.W. [DOE Pittsburgh Energy Technology Center, PA (United States)

    1994-12-31

    A review of the applicability of US environmental control technologies for Korea is presented in outline form. The following topics are discussed: PETC coal research activities, environmental costs, environmental challenges, Clean Air Act requirements, additional regulations for air toxics, clean coal technologies (CCT) approach, CCT help meet environmental challenges, utility options, research goals for advanced power systems, PETC Programs, the NO{sub x} SO process, flue gas cleanup program, air toxics emissions, and retrofit NO{sub x} control for coal-burning boilers.

  10. The research on information security technology for the industrial control system of special equipment

    International Nuclear Information System (INIS)

    Chen Ligang; Liu Hongye; Zhang Wei; Sun Jianying; Lan Peng; Dai Sidan

    2014-01-01

    With the rapid development of information technology in enterprise application, industrial control network and management network is becoming more and more closely linked. Development and application of special equipment control system from the traditional industrial control system, not considered when designing communication security problem mainly, therefore, the industrial control system opened at the same time, isolation control system and the outside was weakened, the safety problems of industrial control system had become more and more serious. The practical application combined with the special equipment control system, analysis and elaboration in view of security problems for the control network, also, provide appropriate security solutions for professional characteristics of industrial control network, design on process control system specially, provide security partition protection scheme, in order to improve security ability of industrial control system information. (authors)

  11. Blockchain Technology: A new secured Electronic Health Record System

    OpenAIRE

    Tamazirt , Lotfi; Alilat , Farid; Agoulmine , Nazim

    2018-01-01

    International audience; Nowadays, health systems are looking for effective ways to manage more patients in a shorter time, and to increase the quality of care through better coordination to provide quick, accurate and non-invasive diagnostics to patients. This paper aims to solve the dependence on trusted third parties by proposing a new management strategy, storage and security in a decentralized network through Blockchain technology. The proposed system also aims to offer a solution to help...

  12. Environmental aspects of battery and fuel cell technologies

    Energy Technology Data Exchange (ETDEWEB)

    1992-10-01

    The PA Consulting Group was commissioned by the Longer Term Studies Unit, Research and Technology Policy Division and Information and Manufacturing Technologies Division, Dept. of Trade and Industry to investigate possible environmental initiatives which might be driven by the European Commission and which could promote interest in alternative energy sources, particularly batteries and fuel cells. Findings confirmed that there is a role for fuel cells in power generation, the most commercially advanced technology being the phosphoric acid fuel cell (PAFC). Development of other systems such as Proton Exchange Membrane technology (PEMFC) and solid oxide fuel cells (SOFC) should also continue. Emissions from fuel cells are lower than those of gas turbines, their main competitors for power generation applications below 100 MW. The study concluded that there is a role for both batteries or fuel cells in powering electric vehicles. Battery powered retrofitted vehicles have an environmental impact comparable to that of internal combustion engine powered vehicles and they could become commercially viable in the context of a carbon tax scenario. Purpose built electric vehicles would be even more attractive. From an environmental viewpoint, fuels cells based on proton membrane membrane technology seemed the best option for powering vehicles if the technical targets could be met.

  13. Environmental aspects of battery and fuel cell technologies

    International Nuclear Information System (INIS)

    1992-10-01

    This report was commissioned by the UK Department of Trade and Industry in order to understand the policy, infrastructural and standards implications of increased use of batteries and fuel cells. In order to meet these requirements, the following areas have been examined: environmental initiatives related to power generation and transport in a pan-European context; the status of alternative technologies, specifically batteries and fuel cells; the market potential of battery and fuel cell based technologies in transport and power generation; environmental life cycle and cost benefit analyses of these technologies; the implications of the use of alternative technologies on the UK infrastructure. Each of these areas is covered briefly in the main body of the report and discussed in greater detail in six appendices. Overall there are 51 figures, 38 tables and 20 references. (UK)

  14. Sustainable integrated farming system: A solution for national food security and sovereignty

    Science.gov (United States)

    Ansar, M.; Fathurrahman

    2018-05-01

    This paper provides a comprehensive review of literature related to food security. The world food crisis is a threat to all countries, including Indonesia. The problem of food security in Indonesia is still happening, particularly, aspects of production and increasingly unbalanced food availability. Due to the increasing rate of population growth, land functional shift, degradation of land resources and water, as well as environmental pollution and climate change. Food production has not been able to meet the needs of the population continuously. Therefore, the food policy paradigm applied in Indonesia must change from food security to food independence. Thus, Indonesia is not dependent on other countries. Food diversification is one of the best policies to be implemented in achieving food independence and anticipating the food crisis. Food diversification utilizes land optimally by developing an integrated farming system. The integrated farming system is an efficient and environmentally agricultural system. It is able to utilize sustainable agriculture development, followed by the development of participatory technology (Participatory Technology Development) which refers to the local wisdom of the community.

  15. Preparation of environmental analyses for synfuel and unconventional gas technologies

    Energy Technology Data Exchange (ETDEWEB)

    Reed, R.M. (ed.)

    1982-09-01

    Government agencies that offer financial incentives to stimulate the commercialization of synfuel and unconventional gas technologies usually require an analysis of environmental impacts resulting from proposed projects. This report reviews potentially significant environmental issues associated with a selection of these technologies and presents guidance for developing information and preparing analyses to address these issues. The technologies considered are western oil shale, tar sand, coal liquefaction and gasification, peat, unconventional gas (western tight gas sands, eastern Devonian gas shales, methane from coal seams, and methane from geopressured aquifers), and fuel ethanol. Potentially significant issues are discussed under the general categories of land use, air quality, water use, water quality, biota, solid waste disposal, socioeconomics, and health and safety. The guidance provided in this report can be applied to preparation and/or review of proposals, environmental reports, environmental assessments, environmental impact statements, and other types of environmental analyses. The amount of detail required for any issue discussed must, by necessity, be determined on a case-by-case basis.

  16. Increased growth in environmental technology; Oekad tillvaext inom miljoeteknik

    Energy Technology Data Exchange (ETDEWEB)

    2011-07-01

    The Swedish Energy Agency has received a government commission, after consultation with the Swedish Agency for Economic and Regional Growth, Swedish Governmental Agency for Innovation Systems (VINNOVA) and other relevant actors. The commission is to develop proposals on how the actions for strengthening collaboration and increased communication between agencies, innovators, entrepreneurs and business angels and venture capitalists among others can be designed in environmental technology with a focus on early commercial stages. The largest part of the environmental technology sector consists of energy related technology

  17. Developing innovative environmental technologies for DOE needs

    International Nuclear Information System (INIS)

    Devgun, J.S.; Sewell, I.O.; DeGregory, J.

    1995-01-01

    Environmental restoration and waste management activities at US Department of Energy (DOE) facilities are diverse and complex. Contamination at DOE sites and facilities includes radionuclides, chlorinated hydrocarbons, volatile organic compounds, non-aqueous phase liquids, and heavy metals, among others. Soil and groundwater contamination are major areas of concern and DOE has focused very significant efforts in these areas. Relevant technology development activities are being conducted at DOE's own national laboratories, as well as through collaborative efforts with other federal agencies and the private sector. These activities span research and development (R ampersand D) of new concepts and techniques to demonstration and commercialization of mature technologies. Since 1990, DOE has also supported R ampersand D of innovative technologies through interagency agreements with US Environmental Protection Agency (EPA), US Department of Defense, the National Science Foundation, and others

  18. Clinicians, security and information technology support services in practice settings--a pilot study.

    Science.gov (United States)

    Fernando, Juanita

    2010-01-01

    This case study of 9 information technology (IT) support staff in 3 Australian (Victoria) public hospitals juxtaposes their experiences at the user-level of eHealth security in the Natural Hospital Environment with that previously reported by 26 medical, nursing and allied healthcare clinicians. IT support responsibilities comprised the entire hospital, of which clinician eHealth security needs were only part. IT staff believed their support tasks were often fragmented while work responsibilities were hampered by resources shortages. They perceived clinicians as an ongoing security risk to private health information. By comparison clinicians believed IT staff would not adequately support the private and secure application of eHealth for patient care. Preliminary data analysis suggests the tension between these cohorts manifests as an eHealth environment where silos of clinical work are disconnected from silos of IT support work. The discipline-based silos hamper health privacy outcomes. Privacy and security policies, especially those influencing the audit process, will benefit by further research of this phenomenon.

  19. Computers, business, and security the new role for security

    CERN Document Server

    Schweitzer, James A

    1987-01-01

    Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs.Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communicat

  20. New flexible origination technology based on electron-beam lithography and its integration into security devices in combination with covert features based on DNA authentication

    Science.gov (United States)

    Drinkwater, John K.; Ryzi, Zbynek; Outwater, Chris S.

    2002-04-01

    Embossed diffractive optically variable devices are becoming increasingly familiar security items on plastic cards, banknotes, security documents and on branded goods and media to protect against counterfeit, protect copyright and to evidence tamper. Equally as this devices become both more widely available there is a pressing requirement for security technology upgrades to keep ahead of technology advances available to potential counterfeiters. This paper describes a new generation electron beam DOVID origination technology particularly suitable for high security applications. Covert marking of security devices is provided using the DNA matrix by creating and verifying unique DNA sequences. This integration of this into practical security features in combination with covert features based on DNA matrix authentication and other more straightforwardly authenticable features to provide multi- technology security solutions will be described.

  1. Development programs of cutting-edge technologies for measurement and detection of nuclear material for safeguards and security

    International Nuclear Information System (INIS)

    Seya, Michio; Wakabayashi, Shuji; Naoi, Yosuke; Ohkubo, Michiaki; Senzaki, Masao

    2011-01-01

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security ('ISCN', hereafter) of Japan Atomic Energy Agency (JAEA) has development programs of cutting-edge technologies for measurement and detection of nuclear materials for nuclear safeguards and security, under the sponsorship of Japanese government (MEXT: Ministry of Education, Culture, Sports, Science and Technology). ISCN started development programs of the following technologies this year. (1) NRF (Nuclear Resonance Fluorescence) NDA technology using laser Compton scattering (LCS) gamma-rays, (2) Alternative to 3 He neutron detection technology using inorganic solid scintillator. ISCN is also going to conduct a demonstration test of a spent fuel Pu-NDA system that is to be developed by LANL (Los Alamos National Laboratory) using very sophisticated neutron measurement technologies, under JAEA/USDOE cooperation agreement. This presentation shows the above programs of ISCN. (author)

  2. PREFACE: 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies

    Science.gov (United States)

    Shuja Syed, Ahmed

    2013-12-01

    The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want

  3. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: EXEL INDUSTRIAL AIRMIX SPRAY GUN

    Science.gov (United States)

    The Environmental Technology Verification Program has partnered with Concurrent Technologies Corp. to verify innovative coatings and coating equipment technologies for reducing air emissions. This report describes the performance of EXEL Industrial's Kremlin Airmix high transfer ...

  4. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  5. Environmental and Financial Evaluation of Passenger Vehicle Technologies in Belgium

    OpenAIRE

    Messagie, Maarten; Lebeau, Kenneth; Coosemans, Thierry; Macharis, Cathy; Mierlo, Joeri van

    2013-01-01

    Vehicles with alternative drive trains are regarded as a promising substitute for conventional cars, considering the growing concern about oil depletion and the environmental impact of our transportation system. However, “clean” technologies will only be viable when they are cost-efficient. In this paper, the environmental impacts and the financial costs of different vehicle technologies are calculated for an average Belgian driver. Environmentally friendly vehicles are compared with conventi...

  6. Environmental restoration/waste management-applied technology semiannual report, January--June 1992

    International Nuclear Information System (INIS)

    Adamson, M.; Kline-Simon, K.

    1992-01-01

    This is the first issue from the Lawrence Livermore National Laboratory of The Environmental Restoration/Waste Management-Applied Technology (ER/WM-AT) Semiannual Report, a continuation of the Advanced Processing Technology (APT) Semiannual Report. The name change reflects the consolidation of the APT Program with the Environmental Restoration and Waste Management Program to form the Environmental Restoration/Waste Management-Applied Technology (ER/WM-AT) Program. The Livermore site mirrors, on a small scale, many of the environmental and waste management problems of the DOE Complex. The six articles in this issue cover incineration- alternative technologies, process development for waste minimization, the proposed Mixed Waste Management Facility, dynamic underground stripping, electrical resistance tomography, and Raman spectroscopy for remote characterization of underground tanks

  7. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, ENVIRONMENTAL DECISION SUPPORT SOFTWARE, UNIVERSITY OF TENNESSEE RESEARCH CORPORATION, SPATIAL ANALYSIS AND DECISION ASSISTANCE (SADA)

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification Program (ETV) to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. The goal of the...

  8. Food safety/food security aspects related to the environmental release of pharmaceuticals.

    Science.gov (United States)

    Brambilla, Gianfranco; Testa, Cecilia

    2014-11-01

    The environmental presence of pharmaceuticals in top soil and in water where extensive animal farming occurs may represent an involuntary source of residues in food that might affect both food safety and food security. We modelled the presence of residues in animal matrices from the inventoried environmental concentration of selected drugs in surface waters (range: 0.1-10μgL(-1)) and agriculture soils (range: 1-100μgkg(-1) dry weight), accounting for animal production parameters (i.e., forages, water intake and milk and egg production) and drug pharmacokinetics. The results indicate that the contamination of tetracyclines in top soil may represent a major issue both for the compliance with maximum residue levels in food (100-300ngg(-1)) and for the claim of organic products. via surface water, animals may be vulnerable to the intake of anabolics and growth-promoting agents, such as 17-beta estradiol and clenbuterol, only under a worst-case scenario. Their identification, which is currently achievable at a pgg(-1) level in animal specimens, is considered proof of illegal treatment and can lead to the prosecution of farmers. The Environmental Quality Standards that have been proposed for priority substances in surface waters may also be considered protective in terms of food security/food safety; however, a broad-spectrum characterisation of drugs within the agriculture context could be envisaged to refine the uncertainties in the risk assessment and for combined intakes. Copyright © 2014 Elsevier Ltd. All rights reserved.

  9. Aviation environmental technology and science

    Institute of Scientific and Technical Information of China (English)

    Zhang Yanzhong

    2008-01-01

    Expatiating on the impact of aviation on the environment and aviation environmental protection projects are ex- pounded, and analyzing on the atmosphere pollution and effects on the aviation noise of aircraft discharge. Researching the approach to control aircraft exhaust pollution and noise pollution, and proposing the technology and management measures to reduce air pollution.

  10. Rethinking energy security in Asia. A non-traditional view of human security

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  11. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  12. Utilizing the right mix of environmental cleanup technologies

    International Nuclear Information System (INIS)

    Whitaker, Wade; Bergren, Chris; Flora, Mary

    2007-01-01

    The Savannah River Site (SRS) is a 310-square-mile United States Department of Energy nuclear facility located along the Savannah River near Aiken, South Carolina. During operations, which started in 1951, hazardous substances (chemicals and radionuclides) were released to the environment. The releases occurred as a result of inadvertent spills and waste disposal in unlined pits and basins which was common practice before environmental regulations existed. The hazardous substances have migrated to the vadose zone and groundwater in many areas of the SRS, resulting in 515 waste units that are required by environmental regulations, to undergo characterization and, if needed, remediation. In the initial years of the SRS environmental cleanup program (early 1990's), the focus was to use common technologies (such as pump and treat, air stripping, excavation and removal) that actively and tangibly removed contamination. Exclusive use of these technologies required continued and significant funding while often failing to meet acceptable clean-up goals and objectives. Recognizing that a more cost-effective approach was needed, SRS implemented new and complementary remediation methods focused on active and passive technologies targeted to solve specific remediation problems. Today, SRS uses technologies such as chemical / pH-adjusting injection, phyto-remediation, underground cutoff walls, dynamic underground stripping, soil fracturing, microbial degradation, baro-balls, electrical resistance heating, soil vapor extraction, and micro-blowers to more effectively treat contamination at lower costs. Additionally, SRS's remediation approach cost effectively maximizes cleanup as SRS works pro-actively with multiple regulatory agencies. Using GIS, video, animation, and graphics, SRS is able to provide an accurate depiction of the evolution of SRS groundwater and vadose zone cleanup activities to convince stakeholders and regulators of the effectiveness of various cleanup

  13. UTILIZING THE RIGHT MIX OF ENVIRONMENTAL CLEANUP TECHNOLOGIES

    International Nuclear Information System (INIS)

    Bergren, C; Wade Whitaker, W; Mary Flora, M

    2007-01-01

    The Savannah River Site (SRS) Figure 1 is a 310-square-mile United States Department of Energy nuclear facility located along the Savannah River near Aiken, South Carolina. During operations, which started in 1951, hazardous substances (chemicals and radionuclides) were released to the environment. The releases occurred as a result of inadvertent spills and waste disposal in unlined pits and basins which was common practice before environmental regulations existed. The hazardous substances have migrated to the vadose zone and groundwater in many areas of the SRS, resulting in 515 waste units that are required by environmental regulations, to undergo characterization and, if needed, remediation. In the initial years of the SRS environmental cleanup program (early 1990s), the focus was to use common technologies (such as pump and treat, air stripping, excavation and removal) that actively and tangibly removed contamination. Exclusive use of these technologies required continued and significant funding while often failing to meet acceptable clean-up goals and objectives. Recognizing that a more cost-effective approach was needed, SRS implemented new and complementary remediation methods focused on active and passive technologies targeted to solve specific remediation problems. Today, SRS uses technologies such as chemical/pH-adjusting injection, phytoremediation, underground cutoff walls, dynamic underground stripping, soil fracturing, microbial degradation, baroballs, electrical resistance heating, soil vapor extraction, and microblowers to more effectively treat contamination at lower costs. Additionally, SRS's remediation approach cost effectively maximizes cleanup as SRS works proactively with multiple regulatory agencies. Using GIS, video, animation, and graphics, SRS is able to provide an accurate depiction of the evolution of SRS groundwater and vadose zone cleanup activities to convince stakeholders and regulators of the effectiveness of various cleanup

  14. Water security-National and global issues

    Science.gov (United States)

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  15. 77 FR 7131 - Addendum to Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2012-02-10

    ... DEPARTMENT OF COMMERCE International Trade Administration Addendum to Environmental Technologies... agenda of a meeting of the Environmental Technologies Trade Advisory Committee (ETTAC) will be changed to... & Environmental Industries, International Trade Administration, Room 4053, 1401 Constitution Avenue NW...

  16. Cost effectiveness studies of environmental technologies: Volume 1

    International Nuclear Information System (INIS)

    Silva, E.M.; Booth, S.R.

    1994-02-01

    This paper examines cost effectiveness studies of environmental technologies including the following: (1) In Situ Air Stripping, (2) Surface Towed Ordinance Locator System, (3) Ditch Witch Horizontal Boring Technology, (4) Direct Sampling Ion Trap Mass Spectrometer, (5) In Situ Vitrification, (6) Site Characterization and Analysis Penetrometer System, (7) In Situ Bioremediation, and (8) SEAMIST Membrane System Technology

  17. FY 1998 survey report on the feasibility study of environmental cooperation in environmental protection technology, system, etc. for spread to developing countries; 1998 nendo kankyo taisaku gijutsu seidonado no tojokoku fukyu ni kakawaru kankyo kyoryoku kanosei chosa hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    The paper arranged the present situation and the problems of environmental cooperation for developing countries, and studied based thereon how to cooperate in environmental protection for developing countries in the future. At the same time, it arranged the problems/subjects posed when environment-related companies in Japan try to transfer environmental technology to developing countries, for the purpose of using them as data in studying possibility of reviewing the environmental cooperation presently conducted. A view on environmental cooperation is that as security of mankind, it is necessary to help developing countries in technology/knowledge/fund. However, a trial calculation indicated that the initial investment of 11.1 trillion yen is needed only for desulfurization and water treatment in China and ASEAN countries. Such a huge amount of money cannot be paid at all even by developed countries. As the support of environmental protection measures, the one also including energy and resource is needed. Further, the support of environmental protection measures should be the one that has the exhibition effect and influential effect, promotes efforts of developing countries' own, and pushes independent environmental measures forward. From this point of view, a study was made on what the details of the environmental cooperation should be like. (NEDO)

  18. Risk, security and technology: governing football supporters in the twenty-first century

    NARCIS (Netherlands)

    Spaaij, R.

    2013-01-01

    This paper critically examines the security and risk management technologies that are being used to conduct and pre-empt the behaviour of football supporters. It is shown how, in the Netherlands, pre-emptive risk management in the governing of football supporters involves a dispersed and fragmented

  19. Technologies for environmental cleanup: Toxic and hazardous waste management

    International Nuclear Information System (INIS)

    Ragaini, R.C.

    1993-12-01

    This is the second in a series of EUROCOURSES conducted under the title, ''Technologies for Environmental Cleanup.'' To date, the series consist of the following courses: 1992, soils and groundwater; 1993, Toxic and Hazardous Waste Management. The 1993 course focuses on recent technological developments in the United States and Europe in the areas of waste management policies and regulations, characterization and monitoring of waste, waste minimization and recycling strategies, thermal treatment technologies, photolytic degradation processes, bioremediation processes, medical waste treatment, waste stabilization processes, catalytic organic destruction technologies, risk analyses, and data bases and information networks. It is intended that this course ill serve as a resource of state-of-the-art technologies and methodologies for the environmental protection manager involved in decisions concerning the management of toxic and hazardous waste

  20. Securing a better future for all: making a difference with nuclear technology

    International Nuclear Information System (INIS)

    Mohamad, Daud; )

    2014-01-01

    The IAEA is an inter-governmental organization and the world's centre of cooperation in the nuclear field. As per its mandate, the IAEA shall seek to accelerate and enlarge the contribution of atomic energy to peace, health and prosperity throughout the world. The IAEA executes its mandate on the basis of three pillars: nuclear verification and security, safety and technology transfer. Nuclear technologies and techniques can offer vital assistance in fighting disease, improving food security and safety, and studying and sustainably managing water resources and the environment. The IAEA's Department of Nuclear Sciences and Applications works to address these critical developmental needs by helping Member States to apply nuclear science and technology more effectively where they have a comparative advantage and can have substantial socio-economic impact. The scale of these needs is growing each day as the world's population and life expectancies increase, as global industry and migration multiply the populations of the world's cities and their demands for resources, and as these trends impact human disease, the availability of safe and sufficient supplies of food and water, the health of our terrestrial and marine ecosystems, and the variability of our climate. These are highly complex challenges, and nuclear science and technology, can make impactful contributions in helping Member States to respond to these challenges

  1. 77 FR 39705 - National Advisory Council for Environmental Policy and Technology; Charter Renewal

    Science.gov (United States)

    2012-07-05

    ... and Technology; Charter Renewal AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. Notice... Advisory Council for Environmental Policy and Technology (NACEPT) is a necessary committee which is in the... environmental policy, technology and management issues. Inquiries may be directed to Mark Joyce, U.S. EPA, (Mail...

  2. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  3. Natural Resources Management and Food Security in the Context of Sustainable Development

    International Nuclear Information System (INIS)

    John, H.

    2011-01-01

    This paper elaborates on the inseparable link between sustain ability of natural resources and food security. A strategic framework that envisages conservation, improvement and sustainable uses of natural resources is proposed which meets the essential requirements for food security. Sustainability has traditionally been accepted as encompassing three dimensions, namely environment, economics and society but it is necessary to widen this approach for a more complete understanding of this term. Environmental degradation curtails ecosystem services, leading to impoverishment of vulnerable communities and insecurity. Food, whether derived from land or sea, is a product of complex environmental linkages, and biodiversity has a pivotal role to play in producing it. Technology, production methods and management requirements are different for food derived from land and sea, but essentially all foodstuffs utilize environmental resources whose sustain ability is crucial for food security. This analysis necessitates consideration of the basic concepts of sustainable development and food security, the strength of the link between these and differences in the patterns of sustainable management of agriculture, fisheries and aquaculture. The growing role of genetically engineered organisms has been included because of the immense possibilities these offer for maximizing food production despite the environmental and ethical concerns raised. (author)

  4. Biofuels. Environment, technology and food security

    International Nuclear Information System (INIS)

    Escobar, Jose C.; Lora, Electo S.; Venturini, Osvaldo J.; Yanez, Edgar E.; Castillo, Edgar F.; Almazan, Oscar

    2009-01-01

    The imminent decline of the world's oil production, its high market prices and environmental impacts have made the production of biofuels to reach unprecedent volumes over the last 10 years. This is why there have been intense debates among international organizations and political leaders in order to discuss the impacts of the biofuel use intensification. Besides assessing the causes of the rise in the demand and production of biofuels, this paper also shows the state of the art of their world's current production. It is also discussed different vegetable raw materials sources and technological paths to produce biofuels, as well as issues regarding production cost and the relation of their economic feasibility with oil international prices. The environmental impacts of programs that encourage biofuel production, farmland land requirements and the impacts on food production are also discussed, considering the life cycle analysis (LCA) as a tool. It is concluded that the rise in the use of biofuels is inevitable and that international cooperation, regulations and certification mechanisms must be established regarding the use of land, the mitigation of environmental and social impacts caused by biofuel production. It is also mandatory to establish appropriate working conditions and decent remuneration for workers of the biofuels production chain. (author)

  5. Systematic, appropriate, and cost-effective application of security technologies in U.S. public schools to reduce crime, violence, and drugs

    Science.gov (United States)

    Green, Mary W.

    1997-01-01

    As problems of violence and crime become more prevalent in our schools, more and more school districts will elect to use security technologies to control these problems. While the desired change in student and community attitudes will require significant systemic change through intense US social programs, security technologies can greatly augment school staff today by providing services similar to having extra adults present. Technologies such as cameras, sensors, drug detection, biometric and personnel identification, lighting, barriers, weapon and explosives detection, anti- graffiti methods, and duress alarms can all be effective, given they are used in appropriate applications, with realistic expectations and an understanding of limitations. Similar to a high-risk government facility, schools must consider a systems approach to security, which includes the use of personnel and procedures as well as security technologies, such that the synergy created by all these elements together contributes more tot he general 'order maintenance' of the facility than could be achieved by separate measures not integrated or related.

  6. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  7. A centralized information management system for environmental science and technology

    Energy Technology Data Exchange (ETDEWEB)

    Namboodiri, K. [Martin Marietta Technical Services, Inc., Bay City, MI (United States)

    1995-12-31

    During the past few decades there have been several serious initiatives focusing on the applications of computational technology towards understanding the diverse fields of environmental research such as environmental monitoring, pollution prevention, and hazardous chemical mitigation. Recently, due to the widespread application of high performance computer technology and the renewed interest of the industrial community in environmental protection, we are witnessing an era of environmental information explosion. In light of these large-scale computer-driven developments, the author identifies a highly desirable initiative for this field, which is solely devoted to a centralized environmental database and information management system. This talk will focus on some design aspects of such an information management system.

  8. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  9. 48 CFR 352.239-72 - Security requirements for Federal information technology resources.

    Science.gov (United States)

    2010-10-01

    ..., Security Self-Assessment Guide for Information Technology Systems and FIPS 200, on an annual basis. (C) HHS... basis, the Contractor shall provide to the Contracting Officer verification that the IT-SP remains valid... Contracting Officer verification that the IT-SC&A remains valid. Evidence of a valid system accreditation...

  10. Bridge to a sustainable future: National environmental technology strategy

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-04-01

    For the past two years the Administration has sought the views of Congress, the states, communities, industry, academia, nongovernmental organizations, and interested citizens on ways to spur the development and use of a new generation of environmental technologies. This document represents the views of thousands of individuals who participated in events around the country to help craft a national environmental technology strategy that will put us on the path to sustainable development.

  11. Green technological foresight on environmental friendly agriculture: Executive summary

    DEFF Research Database (Denmark)

    Borch, K.; Christensen, S.; Jørgensen, U.

    2005-01-01

    Risø and the co-operators have on behalf of the Forest and Nature Agency completed a technological foresight on environmentally friendly agriculture based on green technologies. A technological foresight is a systematic dialogue on how one prepares forfuture challenges, which have not yet manifes...

  12. Proceedings of the 4th Conference on Aerospace Materials, Processes, and Environmental Technology

    Science.gov (United States)

    Griffin, D. E. (Editor); Stanley, D. C. (Editor)

    2001-01-01

    The next millennium challenges us to produce innovative materials, processes, manufacturing, and environmental technologies that meet low-cost aerospace transportation needs while maintaining US leadership. The pursuit of advanced aerospace materials, manufacturing processes, and environmental technologies supports the development of safer, operational, next-generation, reusable, and expendable aeronautical and space vehicle systems. The Aerospace Materials, Processes, and Environmental Technology Conference (AMPET) provided a forum for manufacturing, environmental, materials, and processes engineers, scientists, and managers to describe, review, and critically assess advances in these key technology areas.

  13. Roadmapping or development of future investments in environmental science and technology

    Energy Technology Data Exchange (ETDEWEB)

    Wilburn, D. (Dianne)

    2002-01-01

    This paper will summarize efforts in roadmapping SCFA technical targets, which could be used for selection of future projects. The timely lessons learned and insights will be valuable to other programs desiring to roadmap large amounts of workscope, but unsure how to successfully complete it, by adequately defining a strategy to develop alternatives and core technologies to ensure needed environmental technologies are available and allow delivery of viable alternatives. In early FY02, Los Alamos National Laboratory's Environmental Science and Waste Technology Program Office was working jointly with Idaho National Environmental Engineering Laboratory to define and develop science and technology mini-roadmaps. We were defining and developing these mini-roadmaps to provide direction and guidance for DOE's Environmental Management's (DOE-EM) Subsurface Contaminants Focus Area (SCFA) in their development of target technologies. DOE EM's Strategic Plan for Science and Technology provides guidance for meeting science and technology needs with a view of the desired future and the long-term strategy to attain it. Program and technology mini-roadmapping were to be used to establish priorities, set program and project direction, and identify the high-priority science and technology need areas according to this document. In the past, EM science and technology needs collection is achieved through the DOE Site Technology Coordination Groups (STCG) across the complex. A future system for needs collection has not been defined. However, there is a need for gap analyses and a technical approach for the prioritization of these needs for DOE-EM to be strategic and successful in their technology research, development, demonstration, and deployments. To define the R&D projects needed to solve particular problems and select the project with the largest potential payoff will require analysis for project selection. Mini-roadmaps could be used for setting goals and

  14. Behavioral and physical biometric characteristics modeling used for ITS security improvement

    Directory of Open Access Journals (Sweden)

    Miroslav BAČA

    2009-01-01

    Full Text Available Biometric technologies rely on specific biometric characteristics that are used for recognition. The particular characteristic for a given situation can be described through a serious of descriptive parameters including ease of collecting, permanence, measurably, acceptability, deceptiveness, universality, uniqueness, sample cost, system cost, database size, as well as environmental factors. By using our ontology-based framework for adequacy of biometric systems, we introduce a model for using biometric technologies in ITS. Such technologies increase security, safety and protection of ITS.

  15. Assessment and evaluation of technologies for environmental restoration. Progress report

    Energy Technology Data Exchange (ETDEWEB)

    Uzochukwu, G. A. [North Carolina A and T State Univ., Greensboro, NC (United States)

    2000-06-30

    Nuclear and commercial non-nuclear technologies that have the potential of meeting the environmental restoration objectives of the Department of Energy are being evaluated. A detailed comparison of innovative technologies available will be performed to determine the safest and most economical technology for meeting these objectives. Information derived from this effort will be matched with the multi-objective of the environmental restoration effort to ensure that the best, most economical, and the safest technologies are used in decision making at USDOE-SRS. Technology-related variables will be developed and the resulting data formatted and computerized for multimedia systems. The multimedia system will be made available to technology developers and evaluators to ensure that the safest and most economical technologies are developed for use at SRS and other DOE sites.

  16. Assessment and evaluation of technologies for environmental restoration. Progress report

    International Nuclear Information System (INIS)

    Uzochukwu, G. A.

    2000-01-01

    Nuclear and commercial non-nuclear technologies that have the potential of meeting the environmental restoration objectives of the Department of Energy are being evaluated. A detailed comparison of innovative technologies available will be performed to determine the safest and most economical technology for meeting these objectives. Information derived from this effort will be matched with the multi-objective of the environmental restoration effort to ensure that the best, most economical, and the safest technologies are used in decision making at USDOE-SRS. Technology-related variables will be developed and the resulting data formatted and computerized for multimedia systems. The multimedia system will be made available to technology developers and evaluators to ensure that the safest and most economical technologies are developed for use at SRS and other DOE sites.

  17. Assessment and evaluation of technologies for environmental restoration. Progress report

    International Nuclear Information System (INIS)

    Uzochukwu, G.A.

    1999-01-01

    Nuclear and commercial non-nuclear technologies that have the potential of meeting the environmental restoration objectives of the Department of Energy are being evaluated. A detailed comparison of innovative technologies available will be performed to determine the safest and most economical technology for meeting these objectives. Information derived from this effort will be matched with the multi-objective of the environmental restoration effort to ensure that the best, most economical, and the safest technologies are used in decision making at USDOE-SRS. Technology-related variables will be developed and the resulting data formatted and computerized for multimedia systems. The multimedia system will be made available to technology developers and evaluators to ensure that the safest and most economical technologies are developed for use at SRS and other DOE sites

  18. 78 FR 143 - Desert Mining, Inc., Eagle Broadband, Inc., Endovasc, Inc., Environmental Oil Processing...

    Science.gov (United States)

    2013-01-02

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Desert Mining, Inc., Eagle Broadband, Inc., Endovasc, Inc., Environmental Oil Processing Technology Corp., Falcon Ridge Development, Inc., Fellows... that there is a lack of current and accurate information concerning the securities of Desert Mining...

  19. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT LASER TOUCH AND TECHNOLOGIES, LLC LASER TOUCH MODEL LT-B512

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of Laser Touch model LT-B512 targeting device manufactured by Laser Touch and Technologies, LLC, for manual spray painting operations. The relative transfer efficiency (TE) improved an avera...

  20. Information technology as a tool for the Italian Institute of Social Security (INPS) in the management of social security and civil disability: Pro and cons.

    Science.gov (United States)

    Sammicheli, Michele; Scaglione, Marcella

    2018-01-01

    We examine, from a medical-legal perspective, the pro and cons of the information technology procedures that the Italian Institute of Social Security (INPS) has implemented to manage the provision of social disability assistance, meaning that separate from the payment of pension contributions, being welfare, anchored to an administrative requirement by way of the compulsory payment of a minimum social security contribution.

  1. Forty years of environmentally conscious building technology design

    Directory of Open Access Journals (Sweden)

    Lorenzo Matteoli

    2013-05-01

    Full Text Available This short essay analyzes the environmental approach throughout the history of Architectural Technology, starting from building details up to the present attention to the smart city, land maintenance and urban retrofit, seen as complex research activities, political strategies, design and entrepreneurial actions which have the scope to transform present day urban crusts into organic textures, climatologically consistent, reactive, user-friendly, efficient and with a low environmental impact. The exercise identifies some research and teaching trends for Architectural Technology in order to promote debate and the analysis of the historical perspective and present situation of the discipline.

  2. Acceptance Factors Influencing Adoption of National Institute of Standards and Technology Information Security Standards: A Quantitative Study

    Science.gov (United States)

    Kiriakou, Charles M.

    2012-01-01

    Adoption of a comprehensive information security governance model and security controls is the best option organizations may have to protect their information assets and comply with regulatory requirements. Understanding acceptance factors of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) comprehensive…

  3. New technology in everyday life - social processes and environmental impact

    DEFF Research Database (Denmark)

    Røpke, Inge

    2001-01-01

    In the environmental debate it is increasingly acknowledged that our way of life has profound environmental consequences. Therefore, it becomes ever more important to focus on and to understand how everyday life is formed and how it changes over time. Changing technology constitutes an important...... of several of the dynamic forces behind consumption and thus contribute to the growing quantities of consumption, which counteract the environmental improvements. Secondly, because some of the technological changes are integrated with the processes which change everyday life more profoundly and thus...

  4. Cure electrocoagulation demonstration at Rocky Flats Environmental Technology Site

    International Nuclear Information System (INIS)

    Bridges, J.L.; Jones, J.; Ball, T.

    1996-01-01

    A demonstration of an innovative technology for remediating radionuclide contamination in water took place at the Rocky Flats Environmental Technology Site (RFETS) in Golden, Colorado, during the summer of 1995. The demonstration was part of the U.S. Environmental Protection Agency (EPA) Superfund Innovative Technology Evaluation (SITE) program and was conducted by EPA, the U.S. Department of Energy (DOE), and General Environmental Corporation (GEC). The SITE program encourages the development and demonstration of innovative treatment and monitoring technologies. The purpose of the demonstration was to evaluate the ability of GEC's innovative CURE technology to remove uranium, plutonium, and americium from water taken from the A and B solar evaporation ponds at RFETS. The CURE electrocoagulation process uses an anode and cathode in a patented geometry to remove contaminants, including radionuclides, from wastewater in a continuous flow process. Electrocoagulation has been recognized as a method of removing a variety of contaminants from wastewaters. With the CURE process, GEC has refined the technology and adapted it to hazardous waste cleanup. Bench scale treatability testing conducted in April 1995 indicated 99 percent removal efficiencies were possible for uranium, plutonium-239/240, and americium-241. During the field scale demonstration in August and September 1995, samples were collected from four demonstration runs at RFETS. A removal efficiency of approximately 50 percent was achieved for uranium and nearly 99 percent for plutonium and americium

  5. Cure electrocoagulation demonstration at Rocky Flats Environmental Technology Site

    Energy Technology Data Exchange (ETDEWEB)

    Bridges, J.L.; Jones, J.; Ball, T. [PRC Environmental Management, Inc., Denver, CO (United States)] [and others

    1996-12-31

    A demonstration of an innovative technology for remediating radionuclide contamination in water took place at the Rocky Flats Environmental Technology Site (RFETS) in Golden, Colorado, during the summer of 1995. The demonstration was part of the U.S. Environmental Protection Agency (EPA) Superfund Innovative Technology Evaluation (SITE) program and was conducted by EPA, the U.S. Department of Energy (DOE), and General Environmental Corporation (GEC). The SITE program encourages the development and demonstration of innovative treatment and monitoring technologies. The purpose of the demonstration was to evaluate the ability of GEC`s innovative CURE technology to remove uranium, plutonium, and americium from water taken from the A and B solar evaporation ponds at RFETS. The CURE electrocoagulation process uses an anode and cathode in a patented geometry to remove contaminants, including radionuclides, from wastewater in a continuous flow process. Electrocoagulation has been recognized as a method of removing a variety of contaminants from wastewaters. With the CURE process, GEC has refined the technology and adapted it to hazardous waste cleanup. Bench scale treatability testing conducted in April 1995 indicated 99 percent removal efficiencies were possible for uranium, plutonium-239/240, and americium-241. During the field scale demonstration in August and September 1995, samples were collected from four demonstration runs at RFETS. A removal efficiency of approximately 50 percent was achieved for uranium and nearly 99 percent for plutonium and americium.

  6. Environmental policy and technological development in the Dutch economy

    International Nuclear Information System (INIS)

    Vollebergh, H.; Van Groenendaal, W.; Hofkes, M.; Kemp, R.

    2004-01-01

    An analysis is given of recent insights into technological development and the environment. In particular, attention is paid to the question whether it is possible or not to combine continuous economic development with a release of the environmental burden. In several chapters the authors provide insight and discuss theories with regard to innovation and adoption of new technologies, the concept of transition management and the importance of uncertainty with respect to the decision to invest in environment-friendly techniques or not. Also, much attention is paid to characteristics of the Dutch economy and their consequences for technology and environmental policy and related interactions [nl

  7. “The Thinking Eye” and “The Open Sky:” Developing a Framework of an Environmental View of Security

    Directory of Open Access Journals (Sweden)

    Dr. Helen MARGARITOU-ANDRIANESSI

    2016-07-01

    Full Text Available Discussion of security integration began with discussion of the threatened local time-frame of our existence and preferred forms of behavior. We examine strategic requirements and stances toward environmental security, because the “gestalt thinking and ontology” and the “reflective cast of mind” influence our experience of security procedures in order to evaluate successful modes of interventions in ecosystem, changes in politics and security exchanges. The goal is a multi-criterion optimization problem which we suggest to bring to a single criterion one: to embrace more gestalt relations in order to reproduce the basic elements of the concept of security and common strategies.

  8. Energy technologies and the environment: Environmental information handbook

    Energy Technology Data Exchange (ETDEWEB)

    1988-10-01

    This revision of Energy Technologies and the Environment reflects the changes in energy supply and demand, focus of environmental concern, and emphasis of energy research and development that have occurred since publication of the earlier edition in 1980. The increase in availability of oil and natural gas, at least for the near term, is responsible in part for a reduced emphasis on development of replacement fuels and technologies. Trends in energy development also have been influenced by an increased reliance on private industry initiatives, and a correspondingly reduced government involvement, in demonstrating more developed technologies. Environmental concerns related to acid rain and waste management continue to increase the demand for development of innovative energy systems. The basic criteria for including a technology in this report are that (1) the technology is a major current or potential future energy supply and (2) significant changes in employing or understanding the technology have occurred since publication of the 1980 edition. Coal is seen to be a continuing major source of energy supply, and thus chapters pertaining to the principal coal technologies have been revised from the 1980 edition (those on coal mining and preparation, conventional coal-fired power plants, fluidized-bed combustion, coal gasification, and coal liquefaction) or added as necessary to include emerging technologies (those on oil shale, combined-cycle power plants, coal-liquid mixtures, and fuel cells).

  9. RFID technology for environmental remediation and radioactive waste management

    International Nuclear Information System (INIS)

    Tsai, Hanchung; Liu, Yung Y.; Shuler, James

    2011-01-01

    An advanced Radio Frequency Identification (RFID) system capable of tracking and monitoring a wide range of materials and components - from fissionable stocks to radioactive wastes - has been developed. The system offers a number of advantages, including enhanced safety, security and safeguards, reduced personnel exposure to radiation, and improved inventory control and cost-effectiveness. Using sensors, RFID tags can monitor the state of health of the tracked items and trigger alarms instantly when the normal ranges are violated. Nonvolatile memories in the tags can store sensor data, event records, as well as a contents manifest. Gamma irradiation tests showed that the tag components possess significant radiation resistance. Long-life batteries and smart management circuitries permit the tags to operate for up to 10 years without battery replacement. The tags have a near universal form factor, i.e., they can fit different package types. The read range is up to >100 m with no line-of-sight required. With careful implementation, even a large-size processing or storage facility with a complex configuration can be monitored with a handful of readers in a network. In transportation, by incorporating Global Positioning System (GPS), satellite/cellular communication technology, and secure Internet, situation awareness is assured continuously. The RFID system, when integrated with Geographic Information System (GIS) technology, can promptly provide content- and event-specific information to first responders and emergency management teams in case of incidents. In stand-alone applications, the monitoring and tracking data are contained within the local computer. With a secure Internet, information can be shared within the complex or even globally in real time. As with the deployment of any new technology, overcoming the cultural resistance is part of the developmental process. With a strong institutional support and multiple successful live demonstrations, the cultural

  10. Nevada National Security Site Environmental Report 2010, Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    C. Wills, ed.

    2011-09-13

    Introduction to the Nevada National Security Site Environmental Report 2010. Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  11. The market for environmental efficient technology; Markedet for miljoeeffektiv teknologi

    Energy Technology Data Exchange (ETDEWEB)

    Engbo Rasmussen, Peter; Madsen, Peter G. [COWI (Denmark)

    2006-08-31

    As part of governmental preparation of a Danish action plan for environmental efficient technology, COWI has made an analysis of the global market for technological solutions to important environmental challenges. The analysis focuses on technology for solving environmental challenges connected with climate changes, exploitation of water resources as well as pollution that poses a threat to health including air pollution and chemicals. The Analysis is based on reports made in Denmark, significant export countries, the European Union and different international organizations e.g. OECD and the International Energy Agency. This report presents results of the analysis. Due to the fact that the analysis was completed late in 2005 it is solely based on data and reports known at the time. (BA)

  12. IT Convergence and Security 2012

    CERN Document Server

    Chung, Kyung-Yong

    2013-01-01

    The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.

  13. Supercritical fluid technology for energy and environmental applications

    CERN Document Server

    Anikeev, Vladimir

    2014-01-01

    Supercritical Fluid Technology for Energy and Environmental Applications covers the fundamental principles involved in the preparation and characterization of supercritical fluids (SCFs) used in the energy production and other environmental applications. Energy production from diversified resources - including renewable materials - using clean processes can be accomplished using technologies like SCFs. This book is focused on critical issues scientists and engineers face in applying SCFs to energy production and environmental protection, the innovative solutions they have found, and the challenges they need to overcome. The book also covers the basics of sub- and supercritical fluids, like the thermodynamics of phase and chemical equilibria, mathematical modeling, and process calculations. A supercritical fluid is any substance at a temperature and pressure above its critical point where distinct liquid and gas phases do not exist. At this state the compound demonstrates unique properties, which can be "fine...

  14. The role of Latin America's land and water resources for global food security: environmental trade-offs of future food production pathways.

    Science.gov (United States)

    Flachsbarth, Insa; Willaarts, Bárbara; Xie, Hua; Pitois, Gauthier; Mueller, Nathaniel D; Ringler, Claudia; Garrido, Alberto

    2015-01-01

    One of humanity's major challenges of the 21st century will be meeting future food demands on an increasingly resource constrained-planet. Global food production will have to rise by 70 percent between 2000 and 2050 to meet effective demand which poses major challenges to food production systems. Doing so without compromising environmental integrity is an even greater challenge. This study looks at the interdependencies between land and water resources, agricultural production and environmental outcomes in Latin America and the Caribbean (LAC), an area of growing importance in international agricultural markets. Special emphasis is given to the role of LAC's agriculture for (a) global food security and (b) environmental sustainability. We use the International Model for Policy Analysis of Agricultural Commodities and Trade (IMPACT)-a global dynamic partial equilibrium model of the agricultural sector-to run different future production scenarios, and agricultural trade regimes out to 2050, and assess changes in related environmental indicators. Results indicate that further trade liberalization is crucial for improving food security globally, but that it would also lead to more environmental pressures in some regions across Latin America. Contrasting land expansion versus more intensified agriculture shows that productivity improvements are generally superior to agricultural land expansion, from an economic and environmental point of view. Finally, our analysis shows that there are trade-offs between environmental and food security goals for all agricultural development paths.

  15. Using information technology to measure, monitor and report on environmental performance

    Energy Technology Data Exchange (ETDEWEB)

    Ford, G.

    1999-07-01

    This article provides an overview of the process of environmental performance evaluation (EPE), including a discussion of the rationale and context for EPE as a key component of environmental management and sustainability metrics for businesses around the world. New and emerging developments, such as environmental performance benchmarking and standardized reporting, are highlighted. The ISO 14000 model for EPE and its environmental performance indicators is described. The article then discusses the need for new technology, including the Internet, to meet these new demands, and examines the important role of information technology in creating an efficient and effective system for the EPE process. In this regard, issues such as scaleability, data identification, data collection, reporting, user interface, integration and data warehousing are explored, and examples of the application of information technology to address these issues are provided. The article concludes with a discussion of the need to use emerging information technology to integrate various key types of performance information, including environmental, according to the balanced scorecard model for integrated business sustainability metrics. It concludes that such technology should be used now, even in the absence of global standards for performance metrics, and in spite of the theoretical and practical challenges in doing so, in order to move toward the important goal of achieving comprehensive sustainability metrics.

  16. Sustainability and National Security

    Science.gov (United States)

    2012-01-01

    to U.S. overseas campaigns since the early 1900s. Environmental Security Environmental Security is an element under the larger rubric of Human...oldest seedbank, with a network of research facilities, and well over 300,000 ‘accessions’ of plant genetic material (Sinitsyna 2007b; Roslof

  17. Environmental technology strongholds. A business analysis of cluster creation; Miljoeteknologiske styrkepositioner. En erhvervsanalyse af klyngedannelse

    Energy Technology Data Exchange (ETDEWEB)

    Rosted, J.; Andersen, Torsten; Degn Bertelsen, M. [FORA (Denmark)

    2006-08-31

    Global focus on environmental responsibility has increased interest in new environmental technology solutions, and environmental technologies will see impressive global growth rates in the coming decades. Environmental technologies make important contributions to solving global environmental challenges. But they are only part of the solution. The development of ground-braking environmental technology solutions should go hand in hand with political decisions on binding environmental goals, public environmental regulation and economic incentives that promote an appropriate behaviour among companies and consumers. The environmental technology market is a highly competitive market that focuses on utilising new and emerging technologies. A large number of Danish companies are active participants in the global competition. There are several examples of government institutions taking an active part in the competition. More and more, new environmental technologies are developed in a binding and strategic collaboration involving companies, universities, research laboratories and government authorities. The level of Danish government authority participation is a critical element. However, this is not the focus of this analysis. The purpose of the analysis is to identify environmental technology areas where Denmark potentially could create new strongholds, if strategic and binding collaboration involving companies, knowledge institutions and government authorities is carried out. The actual level of co-operation should be decided among the relevant stake holders. (au)

  18. Innovations in Environmental Monitoring Using Mobile Phone Technology – A Review

    Directory of Open Access Journals (Sweden)

    Matt Aitkenhead

    2014-04-01

    Full Text Available In recent years, the use of mobile phones and tablets for personal communication has increased dramatically, with over 1 billion smartphones out of a total of 5 billion mobile phones worldwide. The infrastructure and technology underlying these devices has improved to a level where it is now possible to integrate sensor technology directly and use them to acquire new data. Given the available resources and the number of technical challenges that have already been overcome, it would seem a natural progression to use mobile communication technology for field-based environmental monitoring. In this work, we review existing technology for acquiring, processing and reporting on environmental data in the field. The objective is to demonstrate whether or not it is possible to use off-the-shelf technology for environmental monitoring. We show several levels at which this challenge is being approached, and discuss examples of technology that have been produced.

  19. A standard methodology for cost-effectiveness analysis of new environmental technologies

    International Nuclear Information System (INIS)

    Booth, S.R.; Trocki, L.K.; Bowling, L.

    1994-01-01

    This paper outlines a methodology that is being applied to assess the cost-effectiveness of new environmental technologies under development by EM-50, DOE. Performance, total system effects, and life-cycle costs are all considered in the methodology to compare new technologies with existing or base-line technologies. An example of performance characterization is given in the paper. Sources of data for cost estimates and technology characterizations also appear in the paper. The Department of Energy (DOE) is facing a massive clean up effort of waste sites that contain hazardous, radioactive, or mixed materials. DOE has recognized that improvements in environmental restoration and waste management methods can potentially save the taxpayers billions of dollars as older, less-effective technologies are displaced. Consequently, DOE has targeted significant funding to search for new technologies and to test and demonstrate them in rapid and cost-effective manner with the goal of applying them quickly to address environmental problems

  20. Information technologies in environmental engineering. Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    Athanasiadis, Ioannis N.; Rizzoli, Andrea E. [Istituto dalle Molle di Studi sull' Intelligenza Artificiale (IDSIA), Manno (Switzerland); Mitkas, Pericles A. [Aristotle Univ. of Thessaloniki (Greece); Marx Gomez, Jorge (eds.) [Oldenburg Univ. (Germany). Abt. Wirtschaftsinformatik

    2009-07-01

    Information technologies have evolved to an enabling science for natural resource management and conservation, environmental engineering, scientific simulation and integrated assessment studies. Computing plays a significant role in every day practices of environmental engineers, natural scientists, economists, and social scientists. The complexity of natural phenomena requires interdisciplinary approaches, where computing science offers the infrastructure for environmental data collection and management, scientific simulations, decision support documentation and reporting. Ecology, environmental engineering and natural resource management comprise an excellent real-world testbed for IT system demonstration, while raising new challenges for computer science. Complexity, uncertainty and scaling issues of natural systems form a demanding application domain for sensor networks and earth observation systems; modelling, simulation and scientific workflows, data management and reporting, decision support and intelligent systems, distributed computing environments, geographical information systems, heterogeneous systems integration, software engineering, accounting systems and control systems. This books offers a collection of papers presented at the 4th International Symposium on Environmental Engineering, held in May 2009, in Thessaloniki, Greece. Recent success stories in ecoinformatics, promising ideas and new challenges are discussed among computer scientists, environmental engineers, economists and social scientists, demonstrating new paradigms for problem solving and decision making. (orig.)

  1. Internet of Things technology-based management methods for environmental specimen banks.

    Science.gov (United States)

    Peng, Lihong; Wang, Qian; Yu, Ang

    2015-02-01

    The establishment and management of environmental specimen banks (ESBs) has long been a problem worldwide. The complexity of specimen environment has made the management of ESB likewise complex. Through an analysis of the development and management of ESBs worldwide and in light of the sophisticated Internet of Things (IOT) technology, this paper presents IOT technology-based ESB management methods. An IOT technology-based ESB management system can significantly facilitate ESB ingress and egress management as well as long-term storage management under quality control. This paper elaborates on the design of IOT technology-based modules, which can be used in ESB management to achieve standardized, smart, information-based ESB management. ESB management has far-reaching implications for environmental management and for research in environmental science.

  2. Environmental management practices, environmental technology portfolio, and environmental commitment: A content analytic approach for U.K. manufacturing firms

    OpenAIRE

    Nath, P; Ramanathan, R

    2016-01-01

    This study investigates how various aspects of environmental management practices EMPs (operational, strategic, and tactical) undertaken by firms influence their environmental technology portfolios ETPs (pollution control and pollution prevention). It also explores the role of environmental commitment of firms on the influence of EMPs on ETPs. This study uses data from content analysis of annual reports, and corporate social responsibility reports available from corporate websites of 76 UK ma...

  3. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  4. Lessons from patents. Using patents to measure technological change in environmental models

    International Nuclear Information System (INIS)

    Popp, David

    2005-01-01

    When studying solutions to long-term environmental problems such as climate change, it is important to consider the role that technological change may play. Nonetheless, to date few economic models of environmental policy explicitly model the link between policy and technological change. There is a growing body of evidence that the incentives offered by prices and environmental regulations have a strong influence on both the creation and adoption of new technologies. In several recent papers, I have used patent data to examine the links between environmental policy and technological change. In addition, I have used the results of this research to calibrate the ENTICE model (for ENdogenous Technological change) of climate change, which links energy-related R and D to changes in the price of carbon. Drawing on my experiences from empirical studies on innovation and from modeling the climate change problem, in this paper I review some of the key lessons from recent empirical work using patents to study environmental innovation and diffusion, and discuss its implications for modeling climate change policy. I conclude by offering suggestions for future research

  5. Geospatial Technology In Environmental Impact Assessments – Retrospective.

    Directory of Open Access Journals (Sweden)

    Goparaju Laxmi

    2015-10-01

    Full Text Available Environmental Impact Assessments are studies conducted to give us an insight into the various impacts caused by an upcoming industry or any developmental activity. It should address various social, economic and environmental issues ensuring that negative impacts are mitigated. In this context, geospatial technology has been used widely in recent times.

  6. Science, Technology, Engineering, and Mathematics (STEM) Education Reform to Enhance Security of the Global Cyberspace

    Science.gov (United States)

    2014-05-01

    towards cloud computing technologies and capabilities demand needs for developing new tools that work in ensemble to handle security challenges. A...programs with the schools and/or hire from their pool of students. Therefore, no real STEM standards exist at the tertiary and beyond levels of education ...successful in cyber operations and network security related jobs much early on into the new STEM education model pipeline. Subjects such as computer

  7. 77 FR 57072 - Proposed Information Collection; Comment Request; National Security and Critical Technology...

    Science.gov (United States)

    2012-09-17

    ..., DC 20230 (or via the Internet at [email protected] ). FOR FURTHER INFORMATION CONTACT: Requests for... techniques or other forms of information technology. Comments submitted in response to this notice will be... DEPARTMENT OF COMMERCE Bureau of Industry and Security Proposed Information Collection; Comment...

  8. Environmental control technology for mining, milling, and refining thorium

    International Nuclear Information System (INIS)

    Weakley, S.A.; Blahnik, D.E.; Young, J.K.; Bloomster, C.H.

    1980-02-01

    The purpose of this report is to evaluate, in terms of cost and effectiveness, the various environmental control technologies that would be used to control the radioactive wastes generated in the mining, milling, and refining of thorium from domestic resources. The technologies, in order to be considered for study, had to reduce the radioactivity in the waste streams to meet Atomic Energy Commission (10 CFR 20) standards for natural thorium's maximum permissible concentration (MPC) in air and water. Further regulatory standards or licensing requirements, either federal, state, or local, were not examined. The availability and cost of producing thorium from domestic resources is addressed in a companion volume. The objectives of this study were: (1) to identify the major waste streams generated during the mining, milling, and refining of reactor-grade thorium oxide from domestic resources; and (2) to determine the cost and levels of control of existing and advanced environmental control technologies for these waste streams. Six potential domestic deposits of thorium oxide, in addition to stockpiled thorium sludges, are discussed in this report. A summary of the location and characteristics of the potential domestic thorium resources and the mining, milling, and refining processes that will be needed to produce reactor-grade thorium oxide is presented in Section 2. The wastes from existing and potential domestic thorium oxide mines, mills, and refineries are identified in Section 3. Section 3 also presents the state-of-the-art technology and the costs associated with controlling the wastes from the mines, mills, and refineries. In Section 4, the available environmental control technologies for mines, mills, and refineries are assessed. Section 5 presents the cost and effectiveness estimates for the various environmental control technologies applicable to the mine, mill, and refinery for each domestic resource

  9. Political measures for promoting environmental technology; Virkemidler for aa fremme miljoeteknologi

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2006-07-01

    Environmental technology can contribute to solving many environmental challenges and to industrial development. Measures to support the development and use of such technologies can be regulatory, economic or administrative, and usually one needs to use a combination of different measures in order to reach both a better environment and industrial development. For industrial development other measures than those administered by environmental authorities will be of importance. The environmental authorities therefore need to acquire knowledge about these measures and the bodies administering them, and develop an operative cooperation with these actors.

  10. Applying environmental externalities to US Clean Coal Technologies for Asia

    International Nuclear Information System (INIS)

    Szpunar, C.B.; Gillette, J.L.

    1993-01-01

    The United States is well positioned to play an expanding role in meeting the energy technology demands of the Asian Pacific Basin, including Indonesia, Thailand, and the Republic of China (ROC-Taiwan). The US Department of Energy Clean Coal Technology (CCT) Demonstration Program provides a proving ground for innovative coal-related technologies that can be applied domestically and abroad. These innovative US CCTs are expected to satisfy increasingly stringent environmental requirements while substantially improving power generation efficiencies. They should also provide distinct advantages over conventional pulverized coal-fired combustors. Finally, they are expected to be competitive with other energy options currently being considered in the region. This paper presents potential technology scenarios for Indonesia, Thailand, and the ROC-Taiwan and considers an environmental cost-benefit approach employing a newly developed method of applying environmental externalities. Results suggest that the economic benefits from increased emission control can indeed be quantified and used in cost-benefit comparisons, and that US CCTs can be very cost effective in reducing emissions

  11. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  12. Environmental support, energy security and economic growth in Japan

    International Nuclear Information System (INIS)

    Gasparatos, Alexandros; Gadda, Tatiana

    2009-01-01

    This study investigates the resource consumption of Japanese society since 1979 and its subsequent effects on the economic output of the nation and the environment. In order to quantify resource appropriation and trends in production and consumption, the concept of emergy synthesis is employed. Our results show a significant increase in the total amount of emergy consumed by 66.9% between 1979 and 2003 which comes hand in hand with an increase in the level of environmental stress by 93.7% (quantified as the environmental loading ratio). On the other hand the emergy required to produce 1 USD of economic output has been gradually decreasing which denotes an increase in the efficiency of the conversion of natural capital into economic output. What is most interesting though is the growing dependence of the Japanese economy on imported emergy, increasingly from developing nations, that severely affects the potential for unhindered economic growth. This can prove to be a big barrier that could affect the resource security of the Japanese economy and render it susceptible to risks associated with access to natural resources which in turn can jeopardise its long-term economic sustainability.

  13. Commercial development of environmental technologies for the automotive industry towards a new model of technological innovation

    Energy Technology Data Exchange (ETDEWEB)

    Clark, W.W. II [Office of Planning and Research, Sacramento, CA (United States); Paolucci, E. [Politecnico di Torino University (Italy). Production and Economics Dept.

    2001-07-01

    Economic importance of environmental issues is increasing, and new technologies are expected to reduce pollution derived both from productive processes and products, with costs that are still unknown. Until now there is still little knowledge concerning the process of technological innovation in this field. What does exist, is outdated due to rapid change in technology. In this paper we analyse the development of Zinc Air Fuel Cells (ZAFC) and their transfer from research laboratories to large mass production. ZAFC are a new environmental technology, proved to have a commercial value, that can be used for building Zero Emission Vehicles (ZEV). Although ZAFC performances are higher than traditional lead-acid batteries ones, difficulties in funding ZAFC engineering and moving them from laboratories to production caused some years delay in their diffusion. On the bases of this paradigmatic case, we argue that existing economic and organizational literature concerning technological innovation is not able to fully explain steps followed in developing environmental technologies. Existing models mainly consider adoption problems as due to market uncertainty, weak appropriability regime, lack of a dominant design, and difficulties in reconfiguring organizational routines. Additionally, the following aspects play a fundamental role in developing environmental technologies, pointing out how technological trajectories depend both on exogenous market conditions and endogenous firm competencies: 1 regulations concerning introduction of ZEV create market demand and business development for new technologies; they impose constraints that can be met only by segmenting transportation market at each stage of technology development; 2 each stage of technology development requires alternative forms of division and coordination of innovative labour; upstream and downstream industries are involved in new forms of inter-firm relationships, causing a reconfiguration of product architecture

  14. The House of Security: Stakeholder Perceptions of Security Assessment and Importance

    OpenAIRE

    Ang, Wee Horng; Deng, Vicki; Lee, Yang; Madnick, Stuart; Mistree, Dinsha; Siegel, Michael; Strong, Diane

    2007-01-01

    In this paper we introduce a methodology for analyzing differences regarding security perceptions within and between stakeholders, and the elements which affect these perceptions. We have designed the €܈ouse of Security€ݬ a security assessment model that provides the basic framework for considering eight different constructs of security: Vulnerability, Accessibility, Confidentiality, Technology Resources for Security, Financial Resources for Security, Business Strategy for Security, Secur...

  15. Information security awareness in small information technology-dependent business organisations

    OpenAIRE

    2015-01-01

    M.A. (Business Management) Small businesses thrive in the developing economy of South Africa and address the important issue of unemployment and poverty that exist in the country. A large number of these business organisations can be found in the province of Gauteng because of the large and diverse economic contribution the province delivers to the economy of South Africa. With the increased use of technology in the small businesses of Gauteng and South Africa, the risks around cyber-secur...

  16. Understanding the Adoption Process of National Security Technology: An Integration of Diffusion of Innovations and Volitional Behavior Theories.

    Science.gov (United States)

    Iles, Irina A; Egnoto, Michael J; Fisher Liu, Brooke; Ackerman, Gary; Roberts, Holly; Smith, Daniel

    2017-11-01

    After the 9/11 terrorist attacks, the U.S. government initiated several national security technology adoption programs. The American public, however, has been skeptical about these initiatives and adoption of national security technologies has been mandated, rather than voluntary. We propose and test a voluntary behavioral intention formation model for the adoption of one type of new security technology: portable radiation detectors. Portable radiation detectors are an efficient way of detecting radiological and nuclear threats and could potentially prevent loss of life and damage to individuals' health. However, their functioning requires that a critical mass of individuals use them on a daily basis. We combine the explanatory advantages of diffusion of innovation with the predictive power of two volitional behavior frameworks: the theory of reasoned action and the health belief model. A large sample survey (N = 1,482) investigated the influence of factors identified in previous diffusion of innovation research on portable radiation detector adoption intention. Results indicated that nonfinancial incentives, as opposed to financial incentives, should be emphasized in persuasive communications aimed at fostering adoption. The research provides a new integration of diffusion of innovation elements with determinants of volitional behavior from persuasion literature, and offers recommendations on effective communication about new security technologies to motivate public adoption and enhance national safety. © 2017 Society for Risk Analysis.

  17. Adopting the Internet of Things technologies in environmental management in South Africa

    CSIR Research Space (South Africa)

    Dlodlo, N

    2012-04-01

    Full Text Available This paper reports on potential applications of IoT technologies that could contribute to sustainable environmental management (EM in South Africa). These technologies have been categorised under environmental quality and protection, natural...

  18. LI-FI TECHNOLOGY AND THE NEW CONCEPT OF DATA TRANSFER SECURITY

    Directory of Open Access Journals (Sweden)

    Ramona DUMITRAȘCU

    2017-05-01

    Full Text Available Li-Fi is a wireless technology that transmits high-speed data using visible light communication (VLC, it can achieve speeds of 224 gigabits per second in the lab. The potential Li-Fi technology can change a lot in virtual word considering it can provide transmission at 1 GB per second - that's 100 times faster than current average Wi-Fi speeds. By flickering the light from a single LED, Li-Fi technology can transmit far more data than a cellular tower, using Visible Light Communication (VLC technology - a medium that uses visible light between 400 and 800 terahertz (THz. It works basically like an incredibly advanced form of Morse code - flicking an LED on and off at extreme speeds and can be used to write and transmit things in binary code. The benefit of Li-Fi over Wi-Fi, other than potentially much faster speeds, is that because light cannot pass through walls, it makes it a whole lot more secure.

  19. On Security Management: Improving Energy Efficiency, Decreasing Negative Environmental Impact, and Reducing Financial Costs for Data Centers

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2015-01-01

    Full Text Available Security management is one of the most significant issues in nowadays data centers. Selection of appropriate security mechanisms and effective energy consumption management together with caring for the environment enforces a profound analysis of the considered system. In this paper, we propose a specialized decision support system with a multilevel, comprehensive analysis scheme. As a result of the extensive use of mathematical methods and statistics, guidelines and indicators returned by the proposed approach facilitate the decision-making process and conserve decision-maker’s time and attention. In the paper we utilized proposed multilevel analysis scheme to manage security-based data flow in the example data center. Determining the most secure, energy-efficient, environmental friendly security mechanisms, we implemented the role-based access control method in Quality of Protection Modeling Language (QoP-ML and evaluated its performance in terms of mentioned factors.

  20. HEMISPHERIC CENTER FOR ENVIRONMENTAL TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    M.A. Ebadian

    1999-03-30

    A vendor was selected for the diamond wire technology demonstration scheduled for this summer at Princeton Plasma Physics Laboratory (PPPL). A team consisting of personnel from FIU-HCET, PPPL, and AEA Technology reviewed the submitted bids. FIU-HCET will contract this vendor. At the SRS Ninth ICT teleconference, the ICT team discussed the status of the following demonstrations: LRAD; x-ray, K-edge; Strippable Coatings; Thermal Spray Vitrification; Cutting/Shearing/Dismantlement/Size Reduction; and Electrets. The LRAD demo is complete, and the x-ray/K-edge, Strippable Coatings, and Electrets demos are ongoing. The Asbestos and Thermal Spray Vitrification demos require more laboratory testing. The Cutting/Shearing/Dismantlement/Size Reduction demo is undergoing procurement. Five FIU-HCET staff members took the 1S0 14000 environmental auditor training course February 22-26, 1999, given by ASC. The test plan for the Facility Dismantlement Technology Assessment is finished and ready for internal review.

  1. Preliminary Strategic Environmental Assessment of the Great Western Development Strategy: Safeguarding Ecological Security for a New Western China

    Science.gov (United States)

    Li, Wei; Liu, Yan-Ju; Yang, Zhifeng

    2012-02-01

    The Great Western Development Strategy (GWDS) is a long term national campaign aimed at boosting development of the western area of China and narrowing the economic gap between the western and the eastern parts of China. The Strategic Environmental Assessment (SEA) procedure was employed to assess the environmental challenges brought about by the western development plans. These plans include five key developmental domains (KDDs): water resource exploitation and use, land utilization, energy generation, tourism development, and ecological restoration and conservation. A combination of methods involving matrix assessment, incorporation of expert judgment and trend analysis was employed to analyze and predict the environmental impacts upon eight selected environmental indicators: water resource availability, soil erosion, soil salinization, forest destruction, land desertification, biological diversity, water quality and air quality. Based on the overall results of the assessment, countermeasures for environmental challenges that emerged were raised as key recommendations to ensure ecological security during the implementation of the GWDS. This paper is intended to introduce a consensus-based process for evaluating the complex, long term pressures on the ecological security of large areas, such as western China, that focuses on the use of combined methods applied at the strategic level.

  2. Exploring the Application of Shared Ledger Technology to Safeguards and other National Security Topics

    Energy Technology Data Exchange (ETDEWEB)

    Frazar, Sarah L.; Winters, Samuel T.; Kreyling, Sean J.; Joslyn, Cliff A.; West, Curtis L.; Schanfein, Mark J.; Sayre, Amanda M.

    2017-07-17

    In 2016, the Office of International Nuclear Safeguards at the National Nuclear Security Administration (NNSA) within the Department of Energy (DOE) commissioned the Pacific Northwest National Laboratory (PNNL) to explore the potential implications of the digital currency bitcoin and its underlying technologies on the safeguards system. The authors found that one category of technologies referred to as Shared Ledger Technology (SLT) offers a spectrum of benefits to the safeguards system. While further research is needed to validate assumptions and findings in the paper, preliminary analysis suggests that both the International Atomic Energy Agency (IAEA) and Member States can use SLT to promote efficient, effective, accurate, and timely reporting, and increase transparency in the safeguards system without sacrificing confidentiality of safeguards data. This increased transparency and involvement of Member States in certain safeguards transactions could lead to increased trust and cooperation among States and the public, which generates a number of benefits. This paper describes these benefits and the analytical framework for assessing SLT applications for specific safeguards problems. The paper will also describe other national security areas where SLT could provide benefits.

  3. New energy technology cope with global environmental problems

    International Nuclear Information System (INIS)

    Tsuchimoto, Tatsuya

    1991-01-01

    At present, the national and private storage of oil is the quantity for about 140 days in total, and it can cope with the temporary fear of oil supply, but if the Gulf War was prolonged, the large effect should be exerted to the energy supply. The reduction of the degree of oil dependence and the increase of the dependence on nonfossil fuel are taken up as the basic idea of the long term energy demand and supply in Japan. Also in the action plan for preventing global warming, the further promotion of energy conservation and the adoption of clean energy were decided to be carried out for decreasing carbon dioxide. In this report, among clean energies, the technology of electric power generation by sun beam, wind force and geotherm is described. The power generation by sun beam has many features, but the energy density is low, and the area for installation becomes large. The cost of power generation is relatively high. The power generation by wind force is superior in its environmental characteristics, and has been already put in practical use in USA and Europe. The problem is the reliability of the system. The geothermal power generation is available also in Japan, and is important for the energy security. The plants of about 270 MW are installed in Japan. (K.I.)

  4. The 10th Anniversary Of Daejeon Environmental Technology Development Center

    International Nuclear Information System (INIS)

    2010-12-01

    This book describes the Daejeon Environment Technology Development Center with pictures for ten years. It also introduces the purpose of the foundation and background of center, structure of the center, main project and role of the center, center logo, current situation of cost of project, research business for 10 years, business supporting the environmental corporate, environment education, public relations activity and vision and prospect of the Daejeon Environmental Technology Development Center.

  5. Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 & STA 2012

    CERN Document Server

    Kim, Jongsung; Zou, Deqing; Lee, Yang

    2012-01-01

    ITCS 2012 and STA 2012 address the various theories and practical applications of information technology convergence, secure and trust computing, and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of ITCS 2012 & STA 2012. In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future.

  6. A Security Audit Framework to Manage Information System Security

    Science.gov (United States)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  7. Security intelligence a practitioner's guide to solving enterprise security challenges

    CERN Document Server

    Li, Qing

    2015-01-01

    Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo

  8. 76 FR 4079 - Information Technology (IT) Security

    Science.gov (United States)

    2011-01-24

    ... Security, consistent with Federal policies for the security of unclassified information and information... Certification Program, and provide a Web site link within a contract clause to a library where contractors can... Security should be addressed through government-wide policies, standards, and requirements. NASA response...

  9. Smart Secure Homes: A Survey of Smart Home Technologies that Sense, Assess, and Respond to Security Threats.

    Science.gov (United States)

    Dahmen, Jessamyn; Cook, Diane J; Wang, Xiaobo; Honglei, Wang

    2017-08-01

    Smart home design has undergone a metamorphosis in recent years. The field has evolved from designing theoretical smart home frameworks and performing scripted tasks in laboratories. Instead, we now find robust smart home technologies that are commonly used by large segments of the population in a variety of settings. Recent smart home applications are focused on activity recognition, health monitoring, and automation. In this paper, we take a look at another important role for smart homes: security. We first explore the numerous ways smart homes can and do provide protection for their residents. Next, we provide a comparative analysis of the alternative tools and research that has been developed for this purpose. We investigate not only existing commercial products that have been introduced but also discuss the numerous research that has been focused on detecting and identifying potential threats. Finally, we close with open challenges and ideas for future research that will keep individuals secure and healthy while in their own homes.

  10. The Savannah River Environmental Technology Field Test Platform: Phase 2

    International Nuclear Information System (INIS)

    Rossabi, J.; Riha, B.D.; Eddy-Dilek, C.A.; Pemberton, B.E.; May, C.P.; Jarosch, T.R.; Looney, B.B.; Raymond, R.

    1995-01-01

    The principal goal in the development of new technologies for environmental monitoring and characterization is transferring them to organizations and individuals for use in site assessment and compliance monitoring. The DOE complex has devised several strategies to facilitate this transfer including joint research projects between private industries and government laboratories or universities (CRADAs) and streamlined licensing procedures. One strategy that has been under-utilized is a planned sequence gradually moving from laboratory development and field demonstration to long term evaluation and onsite use. Industrial partnership and commercial production can be initiated at any step based on the performance, market, user needs, and costs associated with the technology. This approach allows use of the technology by onsite groups for compliance monitoring tasks (e.g. Environmental Restoration and Waste Management), while following parallel research and development organizations the opportunity to evaluate the long term performance and to make modifications or improvements to the technology. This probationary period also provides regulatory organizations, potential industrial partners, and potential users with the opportunity to evaluate the technology's performance and its utility for implementation in environmental characterization and monitoring programs

  11. The Savannah River environmental technology field test platform: Phase II

    International Nuclear Information System (INIS)

    Rossabi, J.; Riha, B.D.; May, C.P.; Pemberton, B.E.; Jarosch, T.R.; Eddy-Dilek, C.A.; Looney, B.B.; Raymond, R.

    1995-01-01

    The principal goal in the development of new technologies for environmental monitoring and characterization is transferring them to organizations and individuals for use in site assessment and compliance monitoring. The DOE complex has devised several strategies to facilitate this transfer including joint research projects between private industries and government laboratories or universities (CRADAs), and streamlined licensing procedures. One strategy that has been under-utilized is a planned sequence gradually moving from laboratory development and field demonstration to long term evaluation and onsite use. Industrial partnership and commercial production can be initiated at any step based on the performance, market, user needs, and costs associated with the technology. The Savannah River Technology Center (SRTC) has been developing a program to rigorously field test promising environmental technologies that have not undergone EPA equivalency testing. The infrastructure and staff expertise developed as part of the activities of the Savannah River Integrated Demonstration Program (i.e., wells, available power, conventional baseline characterization and monitoring equipment, shelter structures) allows field testing of technologies without the difficulties of providing remote field support. By providing a well-characterized site and a well-developed infrastructure, technologies can be tested for long periods of time to determine their appropriate applications in environmental characterization and monitoring activities. Situation specific evaluations of the technology following stringent test plans can be made in comparison with simultaneous baseline methods and historical data. This program is designed to help expedite regulatory approval and technology transfer to manufacturers and the user community

  12. Radiation technology for environmental conservation

    International Nuclear Information System (INIS)

    Machi, Sueo; Tokunaga, Okihiro; Arai, Hidehiko; Hashimoto, Shoji

    1991-01-01

    This paper reviews research and development of radiation technology application for environmental conservation. Our group in cooperation with Ebara Mfg. co., Ltd. first found and studied removals of sulfur dioxide and nitrogen oxides from flue gases by electron beam irradiation. Most of sulfer dioxide and nitrogen oxides are converted to ammonium sulfate and nitrate by radiation with the addition of ammonia. Feasibility studies of this technology by pilot scale experiments have been carried out in Japan, USA and Germany for flue gases from iron-ore sintering furnace and coal fire power station. About 90 % of CO 2 and NO X are removed with 15 kGy. Organic pollutants in wastewater, drinking water and ground water have been found to be reduced by radiation technology. Synergetic effect of radiation and ozone to remove pollutants was also found. Disinfection of water effluent from sewage water treatment plant by radiation instead of using chlorine to avoid formation of chlorinated organic compounds has been studied by our group. Efficient composting of sewage sludge using radiation disinfection followed by fermentation has been developed and produced compost can be used as fertilizer. In conclusion, radiation technology can provide new efficient treatment method for wastes. (author)

  13. Environmental degradation, population displacement and global security: An overview of the issues

    International Nuclear Information System (INIS)

    1992-12-01

    An initial investigation is presented on the interrelationship between environmental degradation and population displacements, in the broader context of how this linkage affects human security. Emphasis is placed on both the causes and effects of population movements, with specific examples drawn from Southeast Asia. Types of migrants, the importance of environmental degradation with respect to other contributing factors, and the effects on origin and destination regions are considered. A key issue is the multi-causality of population displacements and the importance of improving understanding of the issues in order to develop appropriate policies. It is clear from the study that the discussion of environment as a cause or contributing factor to population displacement has, to date, been speculative, and the information provided largely anecdotal. 58 refs., 1 fig., 3 tabs

  14. Advanced coal combustion technologies and their environmental impact

    International Nuclear Information System (INIS)

    Bozicevic, Maja; Feretic, Danilo; Tomsic, Zeljko

    1997-01-01

    Estimations of world energy reserves show that coal will remain the leading primary energy source for electricity production in the foreseeable future. In order to comply with ever stricter environmental regulations and to achieve efficient use of limited energy resources, advanced combustion technologies are being developed. The most promising are the pressurised fluidized bed combustion (PFBC) and the integrated gasification combined cycle (IGCC). By injecting sorbent in the furnace, PFBC removes more than 90 percent of SO 2 in flue gases without additional emission control device. In addition, due to lower combustion temperature, NO x emissions are around 90 percent lower than those from pulverised coal (PC) plant. IGCC plant performance is even more environmentally expectable and its high efficiency is a result of a combined cycle usage. Technical, economic and environmental characteristics of mentioned combustion technologies will be presented in this paper. Comparison of PFBC, IGCC and PC power plants economics and air impact will also be given. (Author)

  15. Environmental control technology activities of the Department of Energy in FY 1977

    International Nuclear Information System (INIS)

    1977-11-01

    The Department of Energy is responsible for the research, development, and demonstration of emerging energy technologies and the promotion of energy conservation. An integral and significant part of that responsibility includes the balancing of energy goals with environmental requirements to protect and enhance the general health, safety, and welfare of the nation. This requires that environmental effects be considered and mitigating measures be taken in all energy processes through incorporation of environmental and safety controls which are developed as an integral part of energy system design. This inventory of environmental control technology activities was initiated by the Administrator, ERDA, prior to the incorporation of that administration within the Department of Energy. This compilation of total Energy Research and Development Administration (ERDA) environmental control technology activities, and associated funding, related to environmental control technology identifies the resources committed by ERDA to demonstrate its objective to protect and enhance the general health, safety, and welfare of the nation in the research, development, and demonstration of energy systems. Only ERDA research, development, and demonstration activities are covered in this report. The compilation for FY 1978 will encompass all of the DOE activities

  16. The Extended Concept of Security and the Czech Security Practice

    OpenAIRE

    Libor Stejskal; Antonín Rašek; Miloš Balabán

    2008-01-01

    According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-govern...

  17. 77 FR 75997 - Environmental Technologies Trade Advisory Committee (ETTAC), Request for Nominations from U.S...

    Science.gov (United States)

    2012-12-26

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... Environmental Technologies Trade Advisory Committee (ETTAC). SUMMARY: This notice sets forth a request for... serve on the Environmental Technologies Trade Advisory Committee (ETTAC). One person will be appointed...

  18. Abandonment: Technological, organisational and environmental challenges

    Energy Technology Data Exchange (ETDEWEB)

    Twomey, B.G. [Reverse Engineering Ltd., (United Kingdom)

    1996-12-31

    The paper deals with the abandonment of offshore wells. Decommissioning of offshore installations is a complex multi-disciplined issue, which raises a number of technical, organisational and environmental challenges. The success of a planned decommissioning operation depends on the development of a clear understanding of the complex blend of drivers which control the decommissioning process and their inter-relationship. Due to the complexity of the inter-relationship between the primary drivers one cannot separate the technological, organisational and environmental issues raised by the decommissioning of offshore installations. The optimal solution will be a compromise between all the decommissioning drivers mentioned in this paper. 5 figs., 3 tabs.

  19. Abandonment: Technological, organisational and environmental challenges

    International Nuclear Information System (INIS)

    Twomey, B.G.

    1996-01-01

    The paper deals with the abandonment of offshore wells. Decommissioning of offshore installations is a complex multi-disciplined issue, which raises a number of technical, organisational and environmental challenges. The success of a planned decommissioning operation depends on the development of a clear understanding of the complex blend of drivers which control the decommissioning process and their inter-relationship. Due to the complexity of the inter-relationship between the primary drivers one cannot separate the technological, organisational and environmental issues raised by the decommissioning of offshore installations. The optimal solution will be a compromise between all the decommissioning drivers mentioned in this paper. 5 figs., 3 tabs

  20. National Institute of Justice (NIJ): improving the effectiveness of law enforcement via homeland security technology improvements (Keynote Address)

    Science.gov (United States)

    Morgan, John S.

    2005-05-01

    Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.