WorldWideScience

Sample records for environmental security technology

  1. Performance Testing of Homeland Security Technologies in U.S. EPA's Environmental Technology Verification (ETV) Program

    National Research Council Canada - National Science Library

    Kelly, Thomas J; Hofacre, Kent C; Derringer, Tricia L; Riggs, Karen B; Koglin, Eric N

    2004-01-01

    ... (reports and test plans available at www.epa.gov/etv). In the aftermath of the terrorist attacks of September 11, 2001, the ETV approach has also been employed in performance tests of technologies relevant to homeland security (HS...

  2. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  3. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  4. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  5. (Environmental technology)

    Energy Technology Data Exchange (ETDEWEB)

    Boston, H.L.

    1990-10-12

    The traveler participated in a conference on environmental technology in Paris, sponsored by the US Embassy-Paris, US Environmental Protection Agency (EPA), the French Environmental Ministry, and others. The traveler sat on a panel for environmental aspects of energy technology and made a presentation on the potential contributions of Oak Ridge National Laboratory (ORNL) to a planned French-American Environmental Technologies Institute in Chattanooga, Tennessee, and Evry, France. This institute would provide opportunities for international cooperation on environmental issues and technology transfer related to environmental protection, monitoring, and restoration at US Department of Energy (DOE) facilities. The traveler also attended the Fourth International Conference on Environmental Contamination in Barcelona. Conference topics included environmental chemistry, land disposal of wastes, treatment of toxic wastes, micropollutants, trace organics, artificial radionuclides in the environment, and the use biomonitoring and biosystems for environmental assessment. The traveler presented a paper on The Fate of Radionuclides in Sewage Sludge Applied to Land.'' Those findings corresponded well with results from studies addressing the fate of fallout radionuclides from the Chernobyl nuclear accident. There was an exchange of new information on a number of topics of interest to DOE waste management and environmental restoration needs.

  6. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  7. Technology Empowerment: Security Challenges.

    Energy Technology Data Exchange (ETDEWEB)

    Warren, Drake Edward [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backus, George A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Wendell [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nelson, Thomas R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Skocypec, Russell D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-03-01

    Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment will continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.

  8. The Use of Space Technology for Environmental Security, Disaster Rehabilitation and Sustainable Development in Afghanistan and Iraq

    Science.gov (United States)

    Lovett, Kian

    Since the dawn of time, humans have engaged in war. In the last 5,600 years of recorded history 14,600 wars have been waged1. The United Nations has sought to save succeeding generations from the scourge of war and to foster peace. Wars have recently taken place in Afghanistan and Iraq. Both countries are now faced with a range of complex problems. In-depth country assessments reveal significant shortcomings in the areas of water, sanitation, health, security and natural resource management. These are key factors when examining environmental security, sustainable development and trans-boundary problems, all of which are issues relevant to the Middle East and Central Asian states. Space technology can be applied to support the reconstruction and development plans for Afghanistan and Iraq; however, there needs to be an investigation and open discussion of how these resources can best be used. Already, agencies within the United Nations possess considerable expertise in the use of space technologies in the area of disaster management. If this capability is to be used, there will need to be inter-agency coordination, not to mention a further expansion and development of the United Nations role in both Afghanistan and Iraq.

  9. Environmental security and sustainable development

    International Nuclear Information System (INIS)

    Kok, M.T.J.

    1996-01-01

    Environmental security has become an important problem area for the social sciences and is becoming a key concept in long-term environmental policy and global environmental change issues. In taking Environmental Security on board, the International Human Dimensions Programme (IHDP) intends to stimulate research on approaches to solve global environmental issues, responses to climate change, food and water security, extreme weather events, etc. Both the Netherlands and Canadian HDP committee have placed environmental security and sustainable development on their national agendas. However, a research agenda for the role of social sciences in environmental security and societal impacts of global change has not been sufficiently elaborated yet, except for economic research on the impacts of climate change. This was the main reason for holding the title workshop. The aims of the workshop were: (1) to define environmental security as a research theme; (2) to explore the research agenda on environmental security for the social sciences; and (3) to establish and reinforce (inter)national research networks in this field. Two papers served as input for the participants of the workshop. First, in the Scoping Report Global Environmental Change and Human Security a brief overview is given of research conducted so far, as well as a working plan for the recently formed ad hoc Working Group on Environmental Security and Global Environmental Change. Secondly, the preliminary results of a programming study on Environmental Security and the societal impacts of climate change are presented. Special attention was given to the involvement of policymakers in the workshop. figs., tabs., 3 appendices, refs

  10. Internet security technologies

    CERN Multimedia

    CERN. Geneva

    2003-01-01

    The three pillars of Internet Security are Infrastructure, Applications and People. In this series of lectures we will examine those three pillars and how vital it is for individuals to understand the vulnerabilities of this technology so they can made informed decisions about risks and how they can reduce those risks for themselves and their colleagues.First we will focus on the infrastructure: network; servers; operating systems and all those things that are mostly invisible. Moving up a level, into the visible realm, we discuss the application and see things like buffer overflows, viruses and how as application developers and users we can protect ourselves. Finally, it's all about people. The strongest security technology in the world is easily defeated if people don't understand their role in the whole system.

  11. Security force effectiveness and technology

    International Nuclear Information System (INIS)

    Seaton, M.B.

    1988-01-01

    No one would propose ineffective security forces. Applied technology always has, as its purpose, to increase effectiveness. Evidence exists, however, that poorly conceived or executed technological solutions can actually do more harm than good. The author argues for improved human factor considerations in physical security applied technology -- especially in the area of security console operations

  12. Nevada National Security Site Environmental Report 2013

    Energy Technology Data Exchange (ETDEWEB)

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.

  13. Nevada National Security Site Environmental Report 2011

    International Nuclear Information System (INIS)

    Wills, Cathy

    2012-01-01

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  14. Nevada National Security Site Environmental Report 2011

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment, Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  15. Information security foundations, technologies and applications

    CERN Document Server

    Awad, Ali Ismail; Fairhurst, Michael

    2018-01-01

    This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security.

  16. Emerging environmental technologies and environmental technology policy

    Science.gov (United States)

    Clarke, Leon Edward

    This dissertation explores the role and design of environmental technology policy when environmental innovation is embodied in emerging environmental technologies such as photovoltaic cells or fuel cells. The dissertation consists of three individual studies, all of which use a simplified, general model industry between an emerging environmental technology and an entrenched, more-polluting technology. It clarifies the situations in which environmental technology policy can achieve high welfare and those in which it cannot; and it separates the possible situations an emerging environmental technology might face into four scenarios, each with its own technology policy recommendations. The second study attempts to clarify which of two factors is having a larger limiting effect on private investment in photovoltaics: the failure to internalize the environmental costs of fossil fuel electricity generation or a broad set of innovation market failures that apply to innovation irrespective of environmental concerns. The study indicates that innovation market failures are probably having a significantly larger impact than incomplete internalization. The third study explores the effectiveness of adoption subsidies at encouraging private-sector innovation. The conclusion is that adoption subsidies probably have only a limited effect on long-term, private-sector research. Two important general conclusions of the dissertation are (1) that optimal technology policy should begin with technology-push measures and end with demand-pull measures; and (2) that the technological response to internalization instruments, such as emissions taxes, may be highly nonlinear.

  17. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  18. Updating energy security and environmental policy: Energy security theories revisited.

    Science.gov (United States)

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  19. Environmental technology verification methods

    CSIR Research Space (South Africa)

    Szewczuk, S

    2016-03-01

    Full Text Available Environmental Technology Verification (ETV) is a tool that has been developed in the United States of America, Europe and many other countries around the world to help innovative environmental technologies reach the market. Claims about...

  20. Nevada National Security Site Environmental Report 2016

    Energy Technology Data Exchange (ETDEWEB)

    Wills (editor), Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    This Nevada National Security Site Environmental Report (NNSSER) was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2016 at the Nevada National Security Site (NNSS) and its two Nevada-based support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). NNSA/NFO directs the management and operation of the NNSS and six sites across the nation. In addition to the NNSA itself, the six sites include two in Nevada (NLVF and RSL-Nellis) and four in other states (RSL-Andrews in Maryland, Livermore Operations in California, Los Alamos Operations in New Mexico, and Special Technologies Laboratory in California). Los Alamos, Lawrence Livermore, and Sandia National Laboratories are the principal organizations that sponsor and implement the nuclear weapons programs at the NNSS. National Security Technologies, LLC (NSTec), is the current Management and Operating contractor accountable for the successful execution of work and ensuring that work is performed in compliance with environmental regulations. The six sites all provide support to enhance the NNSS as a location for its multiple

  1. Environmental science and technology

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-07-01

    The environmental Science and Technology Program was structured based on the continuous growth of environmental activities on areas related to nuclear programs at IPEN. The program comprehends five main areas: Environmental analysis: Chemical technology; Polymer technology nucleus: Chemical and Isotope characterization and Analytical Chemistry for the Nuclear Fuel Cycle samples.

  2. Practice brief. Securing wireless technology for healthcare.

    Science.gov (United States)

    Retterer, John; Casto, Brian W

    2004-05-01

    Wireless networking can be a very complex science, requiring an understanding of physics and the electromagnetic spectrum. While the radio theory behind the technology can be challenging, a basic understanding of wireless networking can be sufficient for small-scale deployment. Numerous security mechanisms are available to wireless technologies, making it practical, scalable, and affordable for healthcare organizations. The decision on the selected security model should take into account the needs for additional server hardware and administrative costs. Where wide area network connections exist between cooperative organizations, deployment of a distributed security model can be considered to reduce administrative overhead. The wireless approach chosen should be dynamic and concentrate on the organization's specific environmental needs. Aspects of organizational mission, operations, service level, and budget allotment as well as an organization's risk tolerance are all part of the balance in the decision to deploy wireless technology.

  3. Nevada National Security Site Environmental Report 2012

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy

    2013-09-11

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2012 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NFO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2012 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR) and the Nevada Test and Training Range (NTTR). Through a Memorandum of Agreement, NNSA/NFO is

  4. Security Problems of Mobile Technologies

    Directory of Open Access Journals (Sweden)

    A. G. Beltov

    2012-09-01

    Full Text Available The article provides an overview of security problems which exist in the mobile devices. The main technologies aimed to protect the phones from various types of attacks are considered. The authors justify the necessity of developing new improved tools and methods to ensure the safety of such devices.

  5. Environmental Science and Technology

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    The Program on Environmental Science and Technology comprehends environmental chemistry (water, soil and atmospheric chemistry), clean technologies (desulfurization of diesel and oil, biodegradable polymers and structural modification of polymers, recycling, pyrolysis of dangerous chemicals by molten salt technology), nanotechnology (magnetic nanoparticles, dendrimers, nano biomarkers, catalyzers) and chemical characterization of nuclear fuel and nuclear fuel cycle waste (chemical and isotopic characterization)

  6. Building secure network by integrated technology

    International Nuclear Information System (INIS)

    An Dehai; Xu Rongsheng; Liu Baoxu

    2000-01-01

    The author introduces a method which can realize the most powerful network security prevention by the network security integrated technologies such as firewall, realtime monitor, network scanner, Web detection and security, etc

  7. HEMISPHERIC CENTER FOR ENVIRONMENTAL TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    M.A. Ebadian

    1999-04-30

    The final data package has been completed for the Mississippi State University, DIAL FTP Wall Depth Removal Characterization Technology. The package has been sent to DIAL for comments. Work is progressing on completing the transfer of glove boxes and tanks from Rocky Flats to FIU-HCET for the purpose of performing size reduction technology assessments. Vendors are being identified and security measures are being put in place to meet the High Risk Property criteria required by Rocky Flats. The FIU-HCET Technology Assessment Program has been included as one of 11 verification programs across the US and Canada described in the Interstate Technology Regulatory Cooperation (ITRC) document, ''Multi-state Evaluation of Elements Important to the Verification of Remediation Technologies'', dated January 1999. FIU-HCET will also participate in a panel discussion on technology verification programs at the International Environmental Technology Expo '99.

  8. Environmental science and technology

    Energy Technology Data Exchange (ETDEWEB)

    Manahan, S.E. [Univ. of Missouri, Columbia, MO (United States)

    1998-12-31

    This complete survey of modern environmental science covers the four traditional spheres of the environment: water, air, earth, and life, and introduces a fifth sphere -- the anthrosphere -- which the author defines as the sphere of human activities, especially technology, that affect the earth. The book discusses how technology can be used in a manner that minimizes environmental disruption.

  9. Encouraging environmentally strategic technologies

    International Nuclear Information System (INIS)

    Heaton, G.R.

    1994-01-01

    Having moved beyond its initial absorption with controlling new technology, environmental policy today must focus more strongly on promoting the development and adoption of new technologies. World Resource Institute's (WRI) ongoing study of 'environmentally strategic technology' is addressed to this fundamental policy issue. The study proposes criteria for identifying such technology, offers a specific list, suggests the kinds of public policy changes necessary to encourage their development and finally presents a comparison of critical technology lists (from the White House, the European Community, Japan and the US Department of Defense). (TEC)

  10. Energy technology evaluation report: Energy security

    Science.gov (United States)

    Koopman, R.; Lamont, A.; Schock, R.

    1992-09-01

    Energy security was identified in the National Energy Strategy (NES) as a major issue for the Department of Energy (DOE). As part of a process designed by the DOE to identify technologies important to implementing the NES, an expert working group was convened to consider which technologies can best contribute to reducing the nation's economic vulnerability to future disruptions of world oil supplies, the working definition of energy security. Other working groups were established to deal with economic growth, environmental quality, and technical foundations. Energy Security working group members were chosen to represent as broad a spectrum of energy supply and end-use technologies as possible and were selected for their established reputations as experienced experts with an ability to be objective. The time available for this evaluation was very short. The group evaluated technologies using criteria taken from the NES which can be summarized for energy security as follows: diversifying sources of world oil supply so as to decrease the increasing monopoly status of the Persian Gulf region; reducing the importance of oil use in the US economy to diminish the impact of future disruptions in oil supply; and increasing the preparedness of the US to deal with oil supply disruptions by having alternatives available at a known price. The result of the first phase of the evaluation process was the identification of technology groups determined to be clearly important for reducing US vulnerability to oil supply disruptions. The important technologies were mostly within the high leverage areas of oil and gas supply and transportation demand but also included hydrogen utilization, biomass, diversion resistant nuclear power, and substitute industrial feedstocks.

  11. Aerospace Communications Security Technologies Demonstrated

    Science.gov (United States)

    Griner, James H.; Martzaklis, Konstantinos S.

    2003-01-01

    In light of the events of September 11, 2001, NASA senior management requested an investigation of technologies and concepts to enhance aviation security. The investigation was to focus on near-term technologies that could be demonstrated within 90 days and implemented in less than 2 years. In response to this request, an internal NASA Glenn Research Center Communications, Navigation, and Surveillance Aviation Security Tiger Team was assembled. The 2-year plan developed by the team included an investigation of multiple aviation security concepts, multiple aircraft platforms, and extensively leveraged datalink communications technologies. It incorporated industry partners from NASA's Graphical Weather-in-the-Cockpit research, which is within NASA's Aviation Safety Program. Two concepts from the plan were selected for demonstration: remote "black box," and cockpit/cabin surveillance. The remote "black box" concept involves real-time downlinking of aircraft parameters for remote monitoring and archiving of aircraft data, which would assure access to the data following the loss or inaccessibility of an aircraft. The cockpit/cabin surveillance concept involves remote audio and/or visual surveillance of cockpit and cabin activity, which would allow immediate response to any security breach and would serve as a possible deterrent to such breaches. The datalink selected for the demonstrations was VDL Mode 2 (VHF digital link), the first digital datalink for air-ground communications designed for aircraft use. VDL Mode 2 is beginning to be implemented through the deployment of ground stations and aircraft avionics installations, with the goal of being operational in 2 years. The first demonstration was performed December 3, 2001, onboard the LearJet 25 at Glenn. NASA worked with Honeywell, Inc., for the broadcast VDL Mode 2 datalink capability and with actual Boeing 757 aircraft data. This demonstration used a cockpitmounted camera for video surveillance and a coupling to

  12. Enterprise security IT security solutions : concepts, practical experiences, technologies

    CERN Document Server

    Fumy, Walter

    2013-01-01

    Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporations and organizations, and presents state-of-the-art concepts and current trends for securing an enterprise.Areas covered include information security management, network and system security, identity and access management (IAM), authentication (including smart card based solutions and biometrics), and security certification. In-depth discussion of relevant technologies and standards (including cr

  13. Information technology security system engineering methodology

    Science.gov (United States)

    Childs, D.

    2003-01-01

    A methodology is described for system engineering security into large information technology systems under development. The methodology is an integration of a risk management process and a generic system development life cycle process. The methodology is to be used by Security System Engineers to effectively engineer and integrate information technology security into a target system as it progresses through the development life cycle. The methodology can also be used to re-engineer security into a legacy system.

  14. Nuclear energy technology transfer: the security barriers

    International Nuclear Information System (INIS)

    Rinne, R.L.

    1975-08-01

    The problems presented by security considerations to the transfer of nuclear energy technology are examined. In the case of fusion, the national security barrier associated with the laser and E-beam approaches is discussed; for fission, the international security requirements, due to the possibility of the theft or diversion of special nuclear materials or sabotage of nuclear facilities, are highlighted. The paper outlines the nuclear fuel cycle and terrorist threat, examples of security barriers, and the current approaches to transferring technology. (auth)

  15. Environmental science and technology

    International Nuclear Information System (INIS)

    2014-01-01

    The Program on Environmental Science and Technology developed at the Chemical and Environmental Technology Center comprehends environmental chemistry (water, soil and atmospheric chemistry), clean technologies (desulfurization of diesel and oil, biodegradable polymers and structural modification of polymers, recycling, pyrolysis of dangerous chemicals by molten salt technology), nanotechnology (magnetic nanoparticles, dendrimers, nano biomarkers, catalysts) and chemical characterization of nuclear fuel and nuclear fuel cycle waste (chemical and isotopic characterization). The Chemical and Environmental Technology Center was established in 1995, as an evolution of the former Department of Chemistry Engineering (1970). The program on environment science and technology was structured as consequence of the continuous growth of environmental activities on areas related to nuclear programs of IPEN. Moreover, it was an answer to the society concerning the climate changes and biodiversity preservation. All activities of research and development, services, supervision of graduate and under graduated students and courses performance at the center were related to the development, improvement and establishment of new technologies. The highlights of this period (2011 - 2013) were: - Development and use of modern analytical technology for the characterization of persistent pollutants and endocrine disrupters (metals, PAHA’s, PCBs, Pesticides, hormones, surfactants, plasticizer and human pharmaceuticals) in order to evaluate water quality and/or sediments; - Atmospheric chemistry and greenhouse gases: Evaluating an estimation of surface trace gas fluxes from aircraft measurements above the Amazon; - Cooperation with SABESP (Water and Sewage Company) and CETESB (State Environment Agency) in program for the development of public policies; - Studies and development in biodegradable polymers, polyolefins and advanced methods for polymer and rubber recycling and re-use; - Studies

  16. Environmental science and technology

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2014-07-01

    The Program on Environmental Science and Technology developed at the Chemical and Environmental Technology Center comprehends environmental chemistry (water, soil and atmospheric chemistry), clean technologies (desulfurization of diesel and oil, biodegradable polymers and structural modification of polymers, recycling, pyrolysis of dangerous chemicals by molten salt technology), nanotechnology (magnetic nanoparticles, dendrimers, nano biomarkers, catalysts) and chemical characterization of nuclear fuel and nuclear fuel cycle waste (chemical and isotopic characterization). The Chemical and Environmental Technology Center was established in 1995, as an evolution of the former Department of Chemistry Engineering (1970). The program on environment science and technology was structured as consequence of the continuous growth of environmental activities on areas related to nuclear programs of IPEN. Moreover, it was an answer to the society concerning the climate changes and biodiversity preservation. All activities of research and development, services, supervision of graduate and under graduated students and courses performance at the center were related to the development, improvement and establishment of new technologies. The highlights of this period (2011 - 2013) were: - Development and use of modern analytical technology for the characterization of persistent pollutants and endocrine disrupters (metals, PAHA’s, PCBs, Pesticides, hormones, surfactants, plasticizer and human pharmaceuticals) in order to evaluate water quality and/or sediments; - Atmospheric chemistry and greenhouse gases: Evaluating an estimation of surface trace gas fluxes from aircraft measurements above the Amazon; - Cooperation with SABESP (Water and Sewage Company) and CETESB (State Environment Agency) in program for the development of public policies; - Studies and development in biodegradable polymers, polyolefins and advanced methods for polymer and rubber recycling and re-use; - Studies

  17. Smart Card Security; Technology and Adoption

    OpenAIRE

    Hamed Taherdoost; Shamsul Sahibuddin; Neda Jalaliyoon

    2011-01-01

    Newly, smart card technology are being used in a number of ways around the world, on the otherhand, security has become significant in information technology, especially in those applicationinvolving data sharing and transactions through the internet. Furthermore, researches ininformation technology acceptance have identified the security as one of the factor that caninfluence on smart card adoption. This research is chiefly to study the security principals of smartcard and assess the securit...

  18. Center for Coastline Security Technology, Year-2

    National Research Council Canada - National Science Library

    Glegg, Stewart; Glenn, William; Furht, Borko; Beaujean, P. P; Frisk, G; Schock, S; VonEllenrieder, K; Ananthakrishnan, P; An, E; Granata, R

    2007-01-01

    ...), the Imaging Technology Center, the Department of Computer Science and Engineering, and the University Consortium for Intermodal Transportation Safety and Security at Florida Atlantic University...

  19. Advanced Environmental Monitoring Technologies

    Science.gov (United States)

    Jan, Darrell

    2004-01-01

    Viewgraphs on Advanced Environmental Monitoring Technologies are presented. The topics include: 1) Monitoring & Controlling the Environment; 2) Illustrative Example: Canary 3) Ground-based Commercial Technology; 4) High Capability & Low Mass/Power + Autonomy = Key to Future SpaceFlight; 5) Current Practice: in Flight; 6) Current Practice: Post Flight; 7) Miniature Mass Spectrometer for Planetary Exploration and Long Duration Human Flight; 8) Hardware and Data Acquisition System; 9) 16S rDNA Phylogenetic Tree; and 10) Preview of Porter.

  20. Making Technology Work for Campus Security

    Science.gov (United States)

    Floreno, Jeff; Keil, Brad

    2010-01-01

    The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…

  1. Survey of network and information security technology

    International Nuclear Information System (INIS)

    Liu Baoxu; Wang Xiaozhen

    2007-01-01

    With the rapidly development of the computer network technology and informationize working of our Country, Network and Information Security issues becomes the focal point problem that people shows solicitude for. On the basis analysing security threat and challenge of network information and their developing trend. This paper briefly analyses and discusses the main relatively study direction and content about the theory, technology and practice of Network and Information Security. (authors)

  2. Marine data security based on blockchain technology

    Science.gov (United States)

    Yang, Zhao; Xie, Weiwei; Huang, Lei; Wei, Zhiqiang

    2018-03-01

    With the development of marine observation technology and network technology, the volume of marine data growing rapidly. This brings new challenges for data storage and transmission. How to protect data security of marine big data has become an urgent problem. The traditional information security methods’ characteristic is centralization. These technologies cannot provide whole process protection, e.g., data storage, data management and application of data. The blockchain technology is a novel technology, which can keep the data security and reliability by using decentralized methodology. It has aroused wide interest in the financial field. In this paper, we describe the concept, characteristics and key technologies of blockchain technology and introduce it into the field of marine data security.

  3. Environmental security and gas exports

    International Nuclear Information System (INIS)

    Bankes, N.

    1996-01-01

    It is argued that Canadian regulatory commissions have systematically rebuffed efforts by environmental groups to review their concerns regarding the cumulative environmental effects of oil and gas exploration and development in western Canada. The concerns include the opening-up of wilderness areas through access roads construction, exploratory drilling, environmental degradation caused by pipeline construction and gas processing plants, and the cumulative effects on air, and water quality, loss of habitat, etc. The author is of the opinion that the decisions have been based on policy considerations and not on law, and in making the decisions the courts ignored policy questions raised by the environmental groups in favor of those advanced by gas interests. Specifically, the author provided a critique of the decision of the Alberta Court of Appeal in the matter of Rocky Mountain Ecosystem Coalition (RMEC) vs. Alberta Energy and Utilities Board (AEUB). He also proposed an appropriate forum and method for considering the issues involved, and a mechanism to ensure that the cumulative effects of ongoing gas exploration do not undermine ecosystem health

  4. Environmental control technology

    International Nuclear Information System (INIS)

    Anon.

    1985-01-01

    During this report period, Chem Tech identified environmental control technology (ECT) as an area of emphasis for future planning and resource allocation. The Division plans to continue to perform R and D activities in ECT for external sponsors such as the DOE Office of Fossil Energy (DOE/FE), the Electric Power Research Institute (EPRI), and the Environmental Protection Agency (EPA) while striving for recognition as an R and D center for ECT within the Martin Marietta Energy Systems' Complex. Chem Tech has already played supporting roles in this area for the Y-12 Plant and the Oak Ridge Gaseous Diffusion Plant (ORGDP) and is currently expanding its support to organizations within ORNL responsible for environmental matters. Over the long term, the Division hopes to achieve recognition as a center for R and D in ECT within the wider DOE system. Recent initiatives supporting these plans are discussed below

  5. Environmental radiation sensing technologies

    International Nuclear Information System (INIS)

    Nishizawa, Hiroshi; Inomata, Kenji; Tamuro, Masaru; Fujita, Kazuhiko

    2013-01-01

    After the Fukushima nuclear accident, environmental radiation monitoring and radioactivity measurement of contamination of wastes, soils, food and drinking water were needed in accurate and reliable way. Based on radiation sensing technologies and radiation and light coupled analysis method, new environmental radiation measurement system for simple monitoring post without exclusive house and also portable monitoring post for temporary use were developed with low cost. Measurement accuracy was improved by real-time processing of detected pulses and corrected non-linearity of low-energy range by analysis. Environmental performance was upgraded to assure detector gain with compensated against temperature change and aging. Inspection and maintenance were also simplified using touch panel display with standardized application menu and data format. (T. Tanaka)

  6. National Security Technology Incubator Evaluation Process

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  7. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  8. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  9. Review: Security in Wireless Technologies in Business

    Science.gov (United States)

    Sattarova, F. Y.; Kim, Tai-Hoon

    Wireless technology seems to be everywhere now - but it is still relatively in its infancy. New standards and protocols continue to emerge and problems and bugs are discovered. Nevertheless, wireless networks make many things much more convenient and it appears that wireless networks are here to stay. The differences and similarities of wireless and wired security, the new threats brought by mobility, the security of networks and devices and effects of security, or lack of it are shortly discussed in this review paper.

  10. Cyber security analytics, technology and automation

    CERN Document Server

    Neittaanmäki, Pekka

    2015-01-01

    Over the last two decades, the Internet and more broadly cyberspace has had a tremendous impact on all parts of society. Governments across the world have started to develop cyber security strategies and to consider cyberspace as an increasingly important international issue. The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation of the cyber security strategy is carried out. The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers. Relevant disciplines for the book are  Telecommunications / Network security, Applied mathematics / Data analysis, Mobile systems / Security, Engineering / Security of critical infrastructure and Military science / Security.

  11. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  12. Capitalization of Defense Technology Security Administration Equipment

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    ... $5.2 million in the Equipment in Use account on its trial balance. Starting with FY 1996, Defense Technology Security Administration financial data will be included in consolidated DoD financial statements...

  13. Emerging Technology for School Security

    Science.gov (United States)

    Doss, Kevin T.

    2012-01-01

    Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…

  14. New technology for food systems and security.

    Science.gov (United States)

    Yau, N J Newton

    2009-01-01

    In addition to product trade, technology trade has become one of the alternatives for globalization action around the world. Although not all technologies employed on the technology trade platform are innovative technologies, the data base of international technology trade still is a good indicator for observing innovative technologies around world. The technology trade data base from Sinew Consulting Group (SCG) Ltd. was employed as an example to lead the discussion on security or safety issues that may be caused by these innovative technologies. More technologies related to processing, functional ingredients and quality control technology of food were found in the data base of international technology trade platform. The review was conducted by categorizing technologies into the following subcategories in terms of safety and security issues: (1) agricultural materials/ingredients, (2) processing/engineering, (3) additives, (4) packaging/logistics, (5) functional ingredients, (6) miscellaneous (include detection technology). The author discusses examples listed for each subcategory, including GMO technology, nanotechnology, Chinese medicine based functional ingredients, as well as several innovative technologies. Currently, generation of innovative technology advance at a greater pace due to cross-area research and development activities. At the same time, more attention needs to be placed on the employment of these innovative technologies.

  15. Environmental security in North-West Russia

    International Nuclear Information System (INIS)

    Bjerke, S.

    1999-01-01

    The arms race and military security during the Cold War cost trillions of dollars. It has been claimed that the processes of disarmament, and the large-scale conversion from military to civilian production that is now under way, will be equally costly. This includes the cost of environmental clean up and other measures to deal with the environmental legacy of the Cold War. Norway strongly supports a holistic approach to environmental issues. The armed forces and military industry must also adapt to environmental demands and adopt the principles of modern environmental management. Our own defence forces have for some time been basing their choice of equipment partly on modern environmental criteria and are taking steps to remedy previous environmental damage. Field training and exercises are subject to stringent environmental restrictions. All along the former East-West divide the scope of military activity has been dramatically reduced. The time has come to focus more attention on military or arms-related environmental issues

  16. Ecological and Economic Problems of Environmental Security

    Directory of Open Access Journals (Sweden)

    Mashchenko Maryna A.

    2018-03-01

    Full Text Available The article is aimed at defining a common mechanism for assessing the ecological and economic threats and ecological losses on the basis of a long-term study to ensure the environmental security of the State. The necessity of a new approach to the State regulation through achievement of environmental security is displayed, that will allow to reduce tensions of the ecological-economic problems in Ukraine. For implementation of this approach, a general mechanism for estimation of ecological-economic threats and ecological losses is provided, which is carried out through formation of an integral costs system. The costs system is presented in the article in the form of an in-depth mechanism for estimating the ecological-economic threats on the example of ecological impacts. Structuring and preparation of the costs system for applied researches is the next stage of this prolonged research.

  17. Environmental and security challenges of nuclear plants

    International Nuclear Information System (INIS)

    Omar, A.S.

    2014-01-01

    The world population increase, the acceleration of global requirement for development and the need to expand energy production, have led to the depletion of natural resources. The international efforts are increasing to get clean, safe and economical energy sources . The electricity generated from nuclear energy considers less polluting and high economic competitiveness as well as reliability and efficiency. The nuclear power plants projects face significant challenges, especially after two major accidents, in Chernobyl 1986 and Fukushima 2011 including the fears of radiation effects, nuclear waste management and nuclear proliferation issues, as well as the lack of public acceptance. So those bodies interested in operating nuclear power plants work to increase nuclear safety standards, review the nuclear facilities safety, know the strict application of laws, seek to prove the economic competitiveness, maintain environmental security, assist in the nonproliferation regime and gain public acceptance. This article discusses the most important environmental and security challenges of nuclear power plants. It highlights the importance of the peaceful uses of nuclear energy as a source of sustainable development and environmental security. It also offers a number of recommendations to support the Arab countries trend towards the inclusion of nuclear energy option within their national programs to generate electricity. (author)

  18. Nevada National Security Site Environmental Report 2010

    Energy Technology Data Exchange (ETDEWEB)

    C. Wills, ed.

    2011-09-13

    This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, “Environment, Safety and Health Reporting.” Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2010 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory–Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.

  19. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  20. Infrared: A Key Technology for Security Systems

    OpenAIRE

    Corsi, Carlo

    2012-01-01

    Infrared science and technology has been, since the first applications, mainly dedicated to security and surveillance especially in military field, besides specialized techniques in thermal imaging for medical diagnostic and building structures and recently in energy savings and aerospace context. Till recently the security applications were mainly based on thermal imaging as surveillance and warning military systems. In all these applications the advent of room temperature, more reliable due...

  1. An environmental assessment system for environmental technologies

    DEFF Research Database (Denmark)

    Clavreul, Julie; Baumeister, Hubert; Christensen, Thomas Højlund

    2014-01-01

    A new model for the environmental assessment of environmental technologies, EASETECH, has been developed. The primary aim of EASETECH is to perform life-cycle assessment (LCA) of complex systems handling heterogeneous material flows. The objectives of this paper are to describe the EASETECH...

  2. Environmental security: The problems of Northwestern Russia

    International Nuclear Information System (INIS)

    Yablokov, A.V.

    1999-01-01

    The review of main existing environmental problems of North-West Russia covers the radioactive pollution, atmospheric pollution, destroying of the tundra and forest ecosystems, inland and water pollution, consequences of space activities. This region includes: Karelia and Komi republics; Yamalo-Nenetzk autonomous region; Murmansk; Leningrad and Vologda regions; White Sea; Southern and eastern parts of Barents Sea; eastern part of Kara Sea; and eastern part of the Baltic (Finnish Bay). The environmental situation in northwestern Russia is extremely unsafe. The fundamental reason for this situation is Soviet over-militarization in the past. There is an urgent need now to tackle the international environmental security in the Arctic and Scandinavian regions at least in two fields: 1. The existing radioactive pollution (mostly connected with military activities), and even more dangerous - the potential radioactive pollution of the Arctic and Scandinavia. 2. Atmospheric pollution (long distance transportation of pollutant, mostly sulphur dioxide and heavy metals, from melting factories on Kola Peninsula). Several other problems relating to the environmental security of the region (among them deforestation, oil/gas pollution of the ocean, development of the diamond industry) need international attention in the nearest future. It is unrealistic to think that Russia alone can overcome these long-standing problems in the foreseeable future: we need international support for this. But foreign money for solving our environmental problems is not the solution, firstly, because for environmental restoration and recovery Russia needs much more than the international community can allocate; secondly, because there is much money inside Russia (every month, during 1993-1996, up to two billions US dollars were flowing out from Russia to western banks). To utilize this money in a proper way, we drastically need international help to awaken the Russian public environmental awareness

  3. Surviving security how to integrate people, process, and technology

    CERN Document Server

    Andress, Amanda

    2003-01-01

    WHY DO I NEED SECURITY? Introduction The Importance of an Effective Security Infrastructure People, Process, and Technology What Are You Protecting Against? Types of Attacks Types of Attackers Security as a Competitive Advantage Choosing a Solution Finding Security Employees The Layered Approach UNDERSTANDING REQUIREMENTS AND RISK What Is Risk? Embracing Risk Information Security Risk Assessment Assessing Risk Insurance SECURITY POLICIES AND PROCEDURES Internal Focus Is Key Security Awareness and Education Policy Life Cycle Developing Policies Components of a Security Policy Sample Security Po

  4. ATBU Journal of Environmental Technology

    African Journals Online (AJOL)

    The journal of environmental technology is devoted to the publication of papers ... research results of both the natural; the technological; and the built environment. ... Assessment of multipath and shadowing effects on UHF band in built-up ...

  5. Physical security technology base programs for physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-01-01

    Sandia National Laboratories is the US Department of Energy's lead laboratory for physical security research and development (R and D). In support of this mission, Sandia has maintained for several years an R and D program in each of the following technology areas: Intrusion Detection, Entry Control, CCTV Assessment, Access Delay, Alarm Display, and Guard Equipment and Training. The purpose of the technology base programs is to maintain cognizance of the capabilities of the commercial market, identify improvements and transfer technology to industry and facilities. The output of these programs supports the development of new equipment and advanced system concepts, demonstrations of proof-of-principles and system implementation. This paper will review the status of current developments and discuss trends in new technologies which are being explored for future applications, i.e., artificial intelligence, expert systems, robotics, and more automated systems

  6. Safety and Security Interface Technology Initiative

    International Nuclear Information System (INIS)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-01-01

    Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. ''Supporting Excellence in Operations Through Safety Analysis'', (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is ''Safeguards/Security Integration with Safety''. This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ''tool box'' of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated

  7. EPA'S ENVIRONMENTAL TECHNOLOGIES

    Science.gov (United States)

    The use of innovative technology is impeded by the lack of independent, credible information as to how the technology performs. Such data is needed by technology buyers and regulatory decision makers to make informed decisions on technologies that represent good financial invest...

  8. Modern Quantum Technologies of Information Security

    OpenAIRE

    Korchenko, Oleksandr; Vasiliu, Yevhen; Gnatyuk, Sergiy

    2010-01-01

    In this paper, the systematisation and classification of modern quantum technologies of information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of the quantum technologies used is given. A qualitative analysis of the advantages and disadvantages of concrete quantum protocols is made. The current status of the problem of practical quantum cryptography use in telecommunication networks is consider...

  9. Environmental Technologies Summary Book

    International Nuclear Information System (INIS)

    2009-02-01

    This book lists the companies and their technology, which have new excellent technology authentication and technology verification. They are as in the following : sewage advanced treatment technology using a three-stage Bio-Ceramic Filtration by Shinwoo engineering.co.kr, Twist Filter by Sungshin engineering.co.kr, Sewage advanced treatment technology using CIMEN-DOC by Taeyeong/CI biotech.co.kr, DeNipho using pump ejector and Bio Green Media by Green Technology.co.kr, Automatic integrated management system using Envi-SIS by Sallasanup.com Kozone.co.kr and Geoworks.co.kr.

  10. 75 FR 28275 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-05-20

    ...: The Homeland Security Science and Technology Advisory Committee met on April 20, 2010 from 8:30 a.m... and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410, Washington... for the Under Secretary of Homeland Security for Science and Technology. The Homeland Security Science...

  11. The Search for Security Technology Funding.

    Science.gov (United States)

    Fickes, Michael

    2003-01-01

    Explains that although it is difficult to find money to pay for school security technology, there are places to look. For example, the Department of Education has a list serve that summarizes various funding opportunities. There is also a Federal Register list serve and a site put out by the Department of Justice. A sidebar presents three…

  12. Denial technology, the neglected security element

    International Nuclear Information System (INIS)

    Mauney, C.H.

    1982-01-01

    Even though there has been an increased concern over providing adequate security during the past decade, and even though some aspects of existing security systems have been enhanced during this period, much remains to be done to provide that balance which is so necessary to have all elements function as an effective unit. The area that primarily has been neglected is the delay element - the part of the system which makes possible the needed time for the security force to respond after an intrustion is detected and prior to the adversary attaining his desired goal. The purpose of this paper is to address the vulnerabilities of a security system which exist without the proper delay elements and to suggest how current technology can provide, through the use of activated barriers, that needed delay time to bring the system into balance. Security managers desire reliability and effectiveness; plant managers require safety, non-interference with operations, cost considerate capability, and aesthetic application - these characteristics will be addressed in the context of providing the required delay. This paper, hopefully, will set the stage for dialogue between developer and user, yielding a mutally acceptable approach to balanced security protection

  13. Safety and Security Interface Technology Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-05-01

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security

  14. Environmental Policy and Technological Change

    International Nuclear Information System (INIS)

    Jaffe, Adam B.; Newell, Richard G.; Stavins, Robert N.

    2002-01-01

    The relationship between technological change and environmental policy has received increasing attention from scholars and policy makers alike over the past ten years. This is partly because the environmental impacts of social activity are significantly affected by technological change, and partly because environmental policy interventions themselves create new constraints and incentives that affect the process of technological developments. Our central purpose in this article is to provide environmental economists with a useful guide to research on technological change and the analytical tools that can be used to explore further the interaction between technology and the environment. In Part 1 of the article, we provide an overview of analytical frameworks for investigating the economics of technological change, highlighting key issues for the researcher. In Part 2, we turn our attention to theoretical analysis of the effects of environmental policy on technological change, and in Part 3, we focus on issues related to the empirical analysis of technology innovation and diffusion. Finally, we conclude in Part 4 with some additional suggestions for research

  15. Clean fuel technology for world energy security

    Energy Technology Data Exchange (ETDEWEB)

    Sunjay, Sunjay

    2010-09-15

    Clean fuel technology is the integral part of geoengineering and green engineering with a view to global warming mitigation. Optimal utilization of natural resources coal and integration of coal & associated fuels with hydrocarbon exploration and development activities is pertinent task before geoscientist with evergreen energy vision with a view to energy security & sustainable development. Value added technologies Coal gasification,underground coal gasification & surface coal gasification converts solid coal into a gas that can be used for power generation, chemical production, as well as the option of being converted into liquid fuels.

  16. Nevada National Security Site Environmental Report Summary 2016

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    This document is a summary of the full 2016 Nevada National Security Site Environmental Report (NNSSER) prepared by the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/ NFO). This summary provides an abbreviated and more readable version of the full NNSSER. NNSA/NFO prepares the NNSSER to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the Nevada National Security Site (NNSS) to protect the public and the environment from radiation hazards and from potential nonradiological impacts. It is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. The NNSS is currently the nation’s unique site for ongoing national security–related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access as well as by lands that are open to public entry. In 2016, National Security Technologies, LLC (NSTec), was the NNSS Management and Operations Contractor accountable for ensuring work was performed in compliance with environmental regulations. NNSS activities in 2016 continued to be diverse, with the primary goal to ensure that the existing U.S. stockpile of nuclear weapons remains safe and reliable. Other activities included weapons of mass destruction first responder training; the controlled release of hazardous material at the Nonproliferation Test and Evaluation Complex (NPTEC); remediation of legacy contamination sites; characterization of waste destined for the Waste Isolation Pilot Plant in Carlsbad, New Mexico, or the Idaho National Laboratory in Idaho Falls, Idaho; disposal of low-level and mixed low-level radioactive waste; and environmental research. Facilities and

  17. Environmental bioremediation technologies

    Energy Technology Data Exchange (ETDEWEB)

    Singh, S.N.; Tripathi, R.D. (eds.) [National Botanical Research Institute, Lucknow (India). Ecotoxicology and Bioremediation

    2007-07-01

    The rapid expansion and increasing sophistication of various industries in the past century has remarkably increased the amount and complexity of toxic waste effluents, which may be bioremediated by suitable plants and microbes, either natural occurring or tailor-made for the specific purpose. This technology is termed as bioremediation. Bioremediation is an eco- friendly, cost-effective and natural technology targeted to remove heavy metals, radionuclides, xenobiotic compounds, organic waste, pesticides etc. from contaminated sites or industrial discharges through biological means. Since this technology is used in in-situ conditions, it does not physically disturb the site unlike conventional methods i.e. chemical or mechanical methods. In this technology, higher plants or microbes are used alone or in combination for phytoextraction of heavy metals from metal contaminated sites. Through microbial interventions, either the metals are immobilized or mobilized through redox conversions at contaminated sites. If mobilized, metal accumulating plants are put in place to accumulate metals in their body. Thereafter, metal-loaded plants are harvested and incinerated to reduce the volume of waste and then disposed off as hazardous materials or used for recovery of precious metals, if possible. In case of immobilization, metals are no longer available to be toxic to organisms. (orig.)

  18. HEMISPHERIC CENTER FOR ENVIRONMENTAL TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    M.A. Ebadian

    1999-10-31

    The Deactivation and Decommissioning (D&D) Technology Assessment Program (TAP) was developed to provide detailed, comparable data for environmental technologies and to disseminate this data to D&D professionals in a manner that will facilitate the review and selection of technologies to perform decontamination and decommissioning. The objectives for this project include the following: Determine technology needs through review of the Site Technology Coordination Group (STCG) information and other applicable websites and needs databases; Perform a detailed review of industries that perform similar activities as those required in D&D operations to identify additional technologies; Define the technology assessment program for characterization and waste management problem sets; Define the data management program for characterization, dismantlement, and waste management problem sets; Evaluate baseline and innovative technologies under standard test conditions at Florida International University's Hemispheric Center for Environmental Technology (FIU-HCET) and other locations and collect data in the areas of performance, cost, health and safety, operations and maintenance, and primary and secondary waste generation; Continue to locate, verify, and incorporate technology performance data from other sources into the multimedia information system; and Develop the conceptual design for a dismantlement technology decision analysis tool for dismantlement technologies.

  19. 75 FR 18516 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-04-12

    ...; notice of closed Federal Advisory Committee meeting SUMMARY: The Homeland Security Science and Technology.... DATES: The Homeland Security Science and Technology Advisory Committee will meet April 20, 2010 from 8...: Ms. Tiwanda Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray...

  20. 75 FR 39955 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-07-13

    ... Homeland Security Science and Technology Advisory Committee meeting will be open to the public on July 20th... Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Protection programs in Science & Technology and updates on homeland security sensitive Federally Funded...

  1. 75 FR 2555 - Homeland Security Science and Technology Advisory Committee

    Science.gov (United States)

    2010-01-15

    ... Technology Advisory Committee will meet January 26-28, 2010, at the Department of Homeland Security, 1120..., Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410... Burse, Science and Technology Directorate, Department of Homeland Security, 245 Murray Lane, Bldg. 410...

  2. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  3. How 21st century droughts affect food and environmental security

    Science.gov (United States)

    Kogan, Felix

    The first 13th years of the 21st century has begun with a series of widespread, long and intensive droughts around the world. Extreme and severe-to-extreme intensity droughts covered 2-6% and 7-16% of the world land, respectively, affecting environment, economies and humans. These droughts reduced agricultural production, leading to food shortages, human health deterioration, poverty, regional disturbances, population migration and death. This presentation is a travelogue of the 21st century global and regional droughts during the warmest years of the past 100 years. These droughts were identified and monitored with the NOAA operational space technology, called Vegetation Health (VH), which has the longest period of observation and provide good data quality. The VH method was used for assessment of vegetation condition or health, including drought early detection and monitoring. The VH method is based on operational satellites data estimating both land surface greenness (NDVI) and thermal conditions. The 21st century droughts in the USA, Russia, Australia Argentina, Brazil, China, India and other principal grain producing countries were intensive, long, covered large areas and caused huge losses in agricultural production, which affected food and environmental security and led to food riots in some countries. This presentation investigate how droughts affect food and environmental security, if they can be detected earlier, how to monitor their area, intensity, duration and impacts and also their dynamics during the climate warming era with satellite-based vegetation health technology.

  4. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  5. Partnership for Environmental Technology Education

    International Nuclear Information System (INIS)

    Dickinson, Paul R.; Fosse, Richard

    1992-01-01

    The need for broad cooperative effort directed toward the enhancement of science and mathematics education, including environmental science and technology has been recognized as a national priority by government, industry, and the academic community alike. In an effort to address this need, the Partnership for Environmental Technology Education (PETE) has been established in the five western states of Arizona, California, Hawaii, Nevada and Utah. PETE'S overall objectives are to link the technical resources of the DOE, ERA, and NASA Laboratories and private industry with participating community colleges to assist in the development and presentation of curricula for training environmental-Hazardous Materials Technicians and to encourage more transfer students to pursue studies in environmental science at four-year institutions. The program is co-sponsored by DOE and EPA. DoD participation is proposed. PETE is being evaluated by its sponsors as a regional pilot with potential for extension nationally. (author)

  6. Advanced technologies: Trends and implications for security

    International Nuclear Information System (INIS)

    Shaw, A.

    1990-01-01

    As the world moves towards the close of the twentieth century, three technological trends will strongly influence security. In order of importance they are: first, the increasing globalization of the ability to develop and use high technology, much of which has both civilian and military applications; secondly, the broad dissemination of militarily-relevant technology world-wide; and thirdly, the continued development by the United States and the USSR (and a few other nations) of advanced technology for military applications. The military balance between the super-Powers and their allies has been strongly rooted in advancing military technology. Great changes in technology have resulted in adjustments -mostly in limited aspects such as the armour/ anti-armour balance - but have not caused it to change wildly. This seems likely to remain the case for the foreseeable future. There are arguments that Western technology has been a prime causative factor behind Soviet willingness to engage in negotiations to reduce forces. They claim that fear of the Strategic Defense Initiative is behind progress in the Strategic Arms Reduction Talks, and that perceived Western mastery of the technology for systems combining quick reaction, deep strike and high kill probabilities led the Soviet Union to reassess its potential for a successful land campaign in Europe. If current arms control negotiations are successful, the momentum is maintained, and other political changes take hold, the military balance could be taken to a point where ft would not be very sensitive to technological change. One should be aware that the arms control negotiations are very complex, primarily because of technological issues, and we should not yet bank on it all working out well. If it fails, the military technical competition will heat up again. Even under a strict arms control regime we can expect the competition to continue as each side seeks to develop counters to what ft sees as the other side

  7. Arctic Energy Resources: Security and Environmental Implications

    Directory of Open Access Journals (Sweden)

    Peter Johnston

    2012-08-01

    Full Text Available n recent years, there has been considerable interest in the Arctic as a source for resources, as a potential zone for commercial shipping, and as a region that might experience conflict due to its strategic importance. With regards to energy resources, some studies suggest that the region contains upwards of 13 percent of global undiscovered oil, 30 percent of undiscovered gas, and multiples more of gas hydrates. The decreasing amount and duration of Arctic ice cover suggests that extraction of these resources will be increasingly commercially viable. Arctic and non-arctic states wish to benefit from the region's resources and the potential circum-polar navigation possibilities. This has led to concerns about the environmental risks of these operations as well as the fear that competition between states for resources might result in conflict. Unresolved offshore boundaries between the Arctic states exacerbate these fears. Yet, the risk of conflict seems overstated considering the bilateral and multilateral steps undertaken by the Arctic states to resolve contentious issues. This article will examine the potential impact of Arctic energy resources on global security as well as the regional environment and examine the actions of concerned states to promote their interests in the region.

  8. Overview of emerging environmental technologies

    International Nuclear Information System (INIS)

    Olson, D.C.

    2000-01-01

    DOD is executing environmental restoration projects in accordance with compliance regulations from many federal agencies. With the passage of amendments to the Superfund law in 1986 that stated a preference for treatment instead of disposal, demand developed for alternative methods that provided more permanent and less costly solutions for dealing with contaminated materials. The Army files environmental impact statements on major programs and specific projects that are currently affecting, or have the potential to affect the environment. Personnel conducting those studies may find it helpful to learn about current environmental assessment methods and the outcomes of previous environmental studies. The Army currently spends almost 2.4% of its total budget on environmental programs. As the future budget picture continues to decline, new technologies offer the potential to provide a lower cost means of achieving the same level of environmental protection. This paper will provide an overview of environmental restoration planning and procedures, discuss information capabilities available on the Internet, provide summaries of recent technological literature and field studies; and identifies areas of informational 'gaps'. It concludes by urging closer ties between industry and the Army, as well as the need to pursue new and innovative techniques to solve old problems. (author)

  9. The Threat of Security: Hindering Technology Integration in the Classroom

    Science.gov (United States)

    Robinson, LeAnne K.; Brown, Abbie; Green, Tim

    2007-01-01

    For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…

  10. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  11. Factors Influencing the Adoption of Biometric Security Technologies by Decision Making Information Technology and Security Managers

    OpenAIRE

    Lease, David R.

    2005-01-01

    The research conducted under this study offers an understanding of the reasons why information technology (IT) and/or information assurance (IA) managers choose to recommend or not to recommend particular technologies, specifically biometric security, to their organizations. A review of the relevant literature provided the foundation to develop a set of research questions and factors for this research effort. The research questions became the basis of the study’s stated hypotheses for examini...

  12. Aviation environmental technology and science

    Institute of Scientific and Technical Information of China (English)

    Zhang Yanzhong

    2008-01-01

    Expatiating on the impact of aviation on the environment and aviation environmental protection projects are ex- pounded, and analyzing on the atmosphere pollution and effects on the aviation noise of aircraft discharge. Researching the approach to control aircraft exhaust pollution and noise pollution, and proposing the technology and management measures to reduce air pollution.

  13. Environmental and process monitoring technologies

    International Nuclear Information System (INIS)

    Vo-Dinh, Tuan

    1993-01-01

    The objective of this conference was to provide a multidisciplinary forum dealing with state-of-the-art methods and instrumentation for environmental and process monitoring. In the last few years, important advances have been made in improving existing analytical methods and developing new techniques for trace detection of chemicals. These monitoring technologies are a topic of great interest for environmental and industrial control in a wide spectrum of areas. Sensitive detection, selective characterization, and cost-effective analysis are among the most important challenges facing monitoring technologies. This conference integrating interdisciplinary research and development was aimed to present the most recent advances and applications in the important areas of environmental and process monitoring. Separate abstracts have been prepared for 34 papers for inclusion in the appropriate data bases

  14. Engineering Principles for Information Technology Security (A Baseline for Achieving Security)

    National Research Council Canada - National Science Library

    Stoneburner, Gary

    2001-01-01

    The purpose of the Engineering Principles for Information Technology (IT) Security (HP-ITS) is to present a list of system-level security principles to he considered in the design, development, and operation of an information system...

  15. Restricted access processor - An application of computer security technology

    Science.gov (United States)

    Mcmahon, E. M.

    1985-01-01

    This paper describes a security guard device that is currently being developed by Computer Sciences Corporation (CSC). The methods used to provide assurance that the system meets its security requirements include the system architecture, a system security evaluation, and the application of formal and informal verification techniques. The combination of state-of-the-art technology and the incorporation of new verification procedures results in a demonstration of the feasibility of computer security technology for operational applications.

  16. Information technology - Security techniques - Information security management systems - Requirements

    CERN Document Server

    International Organization for Standardization. Geneva

    2005-01-01

    ISO/IEC 27001:2005 covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 is designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. ISO/IEC 27001:2005 is intended to be suitable for several different types of use, including the following: use within organizations to formulate security requirements and objectives; use within organizations as a way to ensure that security risks are cost effectively managed; use within organizations to ensure comp...

  17. 48 CFR 2452.239-71 - Information Technology Virus Security.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Information Technology... Provisions and Clauses 2452.239-71 Information Technology Virus Security. As prescribed in 2439.107(b), insert the following clause: Information Technology Virus Security (FEB 2006) (a) The contractor hereby...

  18. European workshop on technologies for environmental protection

    Energy Technology Data Exchange (ETDEWEB)

    Buesing, J H; Pippich, B [eds.

    1996-12-31

    Current European research activities in the field of environmental technologies are discussed under the following headings: photocatalysis; emission abatement - catalytic processes (mainly NO{sub x} reduction catalysts for vehicles and industrial boilers); emission abatement - biological and chemical processes; biological wastewater treatment; chemical and physical wastewater treatment; integrated wastewater treatment; environmental technologies in pulp and paper industry; environmental technologies in surface treatment; selected examples of `clean technologies`; environmental technologies in ceramic and cement industry and policy and strategies.

  19. Theoretical Aspects of Analysis of International Environmental Security

    Directory of Open Access Journals (Sweden)

    Juliya A. Rusakova

    2015-01-01

    Full Text Available Abstract: International environmental security is a very hot contemporary issue of world politics, which in a large part defines the future of our environment. Dealing with this issue is of outmost importance since its failure will render all other issues and challenges as negligible. The article examines the theoretical aspects of solving the problem of environmental security. In particular, it analyzes the problem of negative social externalities, and the related concept of "tragedy of the commons." These problems create a fundamental obstacle to the implementation of environmental security at the global level. Traditionally, the problem of externalities in the environmental field have been approached economically, states and their manufacturers were to pay for the externalities in the form of additional taxes. However, experience shows that the economic tools of dealing with environmental security are not effective. The author suggests alternative non-economic approaches: strengthening and developing the system of permanent institutions of international negotiations on environmental security and promotion of environmental awareness. Solving the acute environmental problems is impossible without a change of the political philosophy of the ruling elites in most states.

  20. HEMISPHERIC CENTER FOR ENVIRONMENTAL TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    M.A. Ebadian

    1999-03-30

    A vendor was selected for the diamond wire technology demonstration scheduled for this summer at Princeton Plasma Physics Laboratory (PPPL). A team consisting of personnel from FIU-HCET, PPPL, and AEA Technology reviewed the submitted bids. FIU-HCET will contract this vendor. At the SRS Ninth ICT teleconference, the ICT team discussed the status of the following demonstrations: LRAD; x-ray, K-edge; Strippable Coatings; Thermal Spray Vitrification; Cutting/Shearing/Dismantlement/Size Reduction; and Electrets. The LRAD demo is complete, and the x-ray/K-edge, Strippable Coatings, and Electrets demos are ongoing. The Asbestos and Thermal Spray Vitrification demos require more laboratory testing. The Cutting/Shearing/Dismantlement/Size Reduction demo is undergoing procurement. Five FIU-HCET staff members took the 1S0 14000 environmental auditor training course February 22-26, 1999, given by ASC. The test plan for the Facility Dismantlement Technology Assessment is finished and ready for internal review.

  1. Information Security: Past, Present and Future - Impact of Developments in Information Technology on Security

    NARCIS (Netherlands)

    Overbeek, P.L.

    1991-01-01

    The development of information security is addressed in relation to the development of information technology. The leading question is: how has information security developed itself so far, and how should it progress to address tomorrow's security needs. An overwiew is given of the use of

  2. Women's Environmental Literacy As Social Capital In Environmental Management For Environmental Security of Urban Area

    Science.gov (United States)

    Asteria, Donna; Herdiansyah, Herdis; Wayan Agus Apriana, I.

    2016-02-01

    This study is about experience of women's role in environmental management to raise environmental security and form of women's emancipation movement. Environmental concerns conducted by residents of urban women who become environmental activists based on environmental literacy. Because of that, women's experience in interacting with both physic and social environment have differences in managing the environment including managing household waste by applying the principles of the 3Rs (reduce, reuse, recycle) and their persuasive efforts on their communities. This is the key to achieving sustainable development by anticipating environmental problem and preserving the environment. This study is conducted qualitative research method and its type is descriptive-explanative. The result of this study is environmental literacy of women activist on pro-environment action in their community that has achieved spiritual environmental literacy. Environmental literacy may differ due to internal and external condition of each individual. Pro-environment activities conducted as a form of responsibility of environmental concern such as eco-management, educational, and economic action, by persuading residents to proactively and consistently continue to do environmental management and develop a sense of community in shaping the networks of environmental concern in local context for global effect.

  3. Center for Coastline Security Technology, Year-2

    Science.gov (United States)

    2007-05-01

    cinematic film industry . For the port security application there are several research issues being addressed under this program, specifically...being the cinematic film industry . For the port security application there are several research issues being addressed under this program...the primary customers being the film industry . For the port security application there are several research issues being addressed under this program

  4. 76 FR 4079 - Information Technology (IT) Security

    Science.gov (United States)

    2011-01-24

    ... Security, consistent with Federal policies for the security of unclassified information and information... Certification Program, and provide a Web site link within a contract clause to a library where contractors can... Security should be addressed through government-wide policies, standards, and requirements. NASA response...

  5. Biofuels. Environment, technology and food security

    International Nuclear Information System (INIS)

    Escobar, Jose C.; Lora, Electo S.; Venturini, Osvaldo J.; Yanez, Edgar E.; Castillo, Edgar F.; Almazan, Oscar

    2009-01-01

    The imminent decline of the world's oil production, its high market prices and environmental impacts have made the production of biofuels to reach unprecedent volumes over the last 10 years. This is why there have been intense debates among international organizations and political leaders in order to discuss the impacts of the biofuel use intensification. Besides assessing the causes of the rise in the demand and production of biofuels, this paper also shows the state of the art of their world's current production. It is also discussed different vegetable raw materials sources and technological paths to produce biofuels, as well as issues regarding production cost and the relation of their economic feasibility with oil international prices. The environmental impacts of programs that encourage biofuel production, farmland land requirements and the impacts on food production are also discussed, considering the life cycle analysis (LCA) as a tool. It is concluded that the rise in the use of biofuels is inevitable and that international cooperation, regulations and certification mechanisms must be established regarding the use of land, the mitigation of environmental and social impacts caused by biofuel production. It is also mandatory to establish appropriate working conditions and decent remuneration for workers of the biofuels production chain. (author)

  6. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: GREEN BUILDING TECHNOLOGIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techno...

  7. Energetic technologies and environmental impact

    International Nuclear Information System (INIS)

    2001-01-01

    This monograph is a collective work by scientist from CIEMAT (Spanish centre for research on energy, environment and technology). By reviewing the central topics of their own work, the authors present a world-wide update of the state of the arts of the different technologies involved in energy production. The chapters fo through the more promising technologies related to the diverse energy sources, from the nuclear to the renewable and chemical a large gamut of energy supply ways is revised. The analysis of the production technologies is accompanied by considerations of the environmental implications, an aspect to wich a whole part of the volume is devoted. The book begins with a foreword by Dr. Felix Yndurain, former General Director of CIEMAT and follows with a general introduction to the main topics, that are presented in three parts, with specific introductions. There is also a closing fourth part that includes some additional activities where more basic and technical developments are included. The first part is devoted to energy of nuclear origin. In two separate sections, fission and fusion technologies are covered. The fission section points towards the present day problems of nuclear plants (ageing, accidents, risk analysis, etc.), reprocessing of the nuclear fuel, radioactive wastes and environmental radioactivity. The fusion section contains a critical account of the present and expected developments of the fusion reactors together with an exposition of the related plasma physics problems. The second part comprises two sections devoted to energy generation of renewable and chemical origin, respectively. Tehcnologies for solar, wind and biomass energies are thoroughly exposed along the renewable energy section whereas the chemical energy section is devoted to the modern technologies of clean fossil fuel combustion and gasification, as well as to the new appealing subject of direct electric generation with fuel cells. The main environmental and social

  8. On the Horizon: New Advances in Security Technology

    Science.gov (United States)

    Gamble, Cheryl

    2005-01-01

    The worlds of security and technology have been on an intersecting course since the first published account of the use of fingerprint identification made news in 1880 (although unpublished reports suggest its use as early as 1858). In the three and one half years since the September 11 attacks, technological advances across the security field have…

  9. New Technology's Surprising Security Threats. Building Digital Libraries

    Science.gov (United States)

    Huwe, Terence

    2005-01-01

    In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…

  10. SIHTI - Energy and environmental technology

    International Nuclear Information System (INIS)

    Estlander, A.; Pietilae, S.

    1993-01-01

    The research and development program SIHTI was carried out during 1991-1992, mainly concentrating on energy and environmental technology. SIHTI focused on examining emissions from various sources of energy in all stages of the production chain. The objective was to create new methods and equipment, with which the environmental drawbacks of energy production can be reduced. Also a development work aiming at reduced traffic emissions was included in the program. Totally the program included 53 projects, which were divided into the following subsections: energy production, traffic, fuel chains and other projects. In the energy production projects the main attention was paid to reduction of sulphur dioxide, nitrogen oxide and particulate emissions. Furthermore waste utilization and possibilities of reducing carbon dioxide emissions were studied. The traffic study was focused on developing of more environmental-friendly liquid fuels. The research of emissions at low ambient temperatures was developed to an international level. Further the use of gases and the rape seed oil ester as traffic fuel was studied in practical tests. In the fuel chain study the emissions from the most important fuel chains were examined all the way from the purchase of the primary energy to the final end product. Methods for further reduction of water discharges from peat production were developed. The other projects were concentrated on modelling development, environmental impact assessment and emission surveys

  11. Technology of environmental pollution control

    International Nuclear Information System (INIS)

    Shaheen, E.I.

    1992-01-01

    This book aims to be a comprehensive reference for technological advances in pollution control and abatement and pollution regulations. The first chapter, 'The dilemma of environmental pollution' summarises pollution legislation in the United States and discusses worldwide interest in pollution abatement. Chapter 2 describes some recent environmental disasters and discusses the major air pollutants and their harmful effects. Chapters 3 and 4 assess the various techniques for air pollution control and water pollution control. Chapter 5 is devoted to oil pollution impact and abatement. Solid waste management and methods of solid waste disposal are discussed in chapter 6, and noise pollution, its harmful effects and its control are dealt within chapter 7. Appendices contain a glossary, a summary of the US Clean Air Act and the US drinking water regulations and reference figures and tables relating to energy and the environment. Individual chapters contain many references

  12. Environmentally-induced displacement and human security

    OpenAIRE

    Terminski, Bogumil

    2012-01-01

    We can distinguish two general causes of internal displacement worldwide: 1. the impact of threats to and ensuing decline in the level of human security below that needed for normal existence in the homeland territory, 2. administrative compulsion to leave the current place of residence. Every year, at least tens of millions of people on all continents are forced to leave their places of residence. The predominant cause is the occurrence of natural disasters, creating the most dynamic categor...

  13. Radiation technology for environmental conservation

    International Nuclear Information System (INIS)

    Machi, Sueo; Tokunaga, Okihiro; Arai, Hidehiko; Hashimoto, Shoji

    1991-01-01

    This paper reviews research and development of radiation technology application for environmental conservation. Our group in cooperation with Ebara Mfg. co., Ltd. first found and studied removals of sulfur dioxide and nitrogen oxides from flue gases by electron beam irradiation. Most of sulfer dioxide and nitrogen oxides are converted to ammonium sulfate and nitrate by radiation with the addition of ammonia. Feasibility studies of this technology by pilot scale experiments have been carried out in Japan, USA and Germany for flue gases from iron-ore sintering furnace and coal fire power station. About 90 % of CO 2 and NO X are removed with 15 kGy. Organic pollutants in wastewater, drinking water and ground water have been found to be reduced by radiation technology. Synergetic effect of radiation and ozone to remove pollutants was also found. Disinfection of water effluent from sewage water treatment plant by radiation instead of using chlorine to avoid formation of chlorinated organic compounds has been studied by our group. Efficient composting of sewage sludge using radiation disinfection followed by fermentation has been developed and produced compost can be used as fertilizer. In conclusion, radiation technology can provide new efficient treatment method for wastes. (author)

  14. Radiation technology for environmental conservation

    Energy Technology Data Exchange (ETDEWEB)

    Machi, Sueo; Tokunaga, Okihiro; Arai, Hidehiko; Hashimoto, Shoji [Japan Atomic Energy Research Inst., Takasaki, Gunma (Japan). Takasaki Radiation Chemistry Research Establishment

    1991-01-01

    This paper reviews research and development of radiation technology application for environmental conservation. Our group in cooperation with Ebara Mfg. co., Ltd. first found and studied removals of sulfur dioxide and nitrogen oxides from flue gases by electron beam irradiation. Most of sulfer dioxide and nitrogen oxides are converted to ammonium sulfate and nitrate by radiation with the addition of ammonia. Feasibility studies of this technology by pilot scale experiments have been carried out in Japan, USA and Germany for flue gases from iron-ore sintering furnace and coal fire power station. About 90 % of CO{sub 2} and NO{sub X} are removed with 15 kGy. Organic pollutants in wastewater, drinking water and ground water have been found to be reduced by radiation technology. Synergetic effect of radiation and ozone to remove pollutants was also found. Disinfection of water effluent from sewage water treatment plant by radiation instead of using chlorine to avoid formation of chlorinated organic compounds has been studied by our group. Efficient composting of sewage sludge using radiation disinfection followed by fermentation has been developed and produced compost can be used as fertilizer. In conclusion, radiation technology can provide new efficient treatment method for wastes. (author).

  15. Environmental technology foresight : New horizons for technology management

    NARCIS (Netherlands)

    Den Hond, Frank; Groenewegen, Peter

    1996-01-01

    Decision-making in corporate technology management and government technology policy is increasingly influenced by the environmental impact of technologies. Technology foresight (TF) and environmental impact assessment (EIA) are analyzed with regard to the roles they can play in developing long-term

  16. GENERAL ENVIRONMENTAL CORPORATION; CURE ELECTROCOAGULATION TECHNOLOGY: INNOVATIVE TECHNOLOGY EVALUATION REPORT

    Science.gov (United States)

    The CURE electrocoagulation technology was demonstrated under the Superfund Innovative Technology Evaluation (SITE) program at the U.S. Department of Energy (DOE) Rocky Flats Environmental Technology Site (RFETS), where water from the solar evaporation ponds (SEPs) was contaminat...

  17. Nuclear Technologies Secure Food For Future

    International Nuclear Information System (INIS)

    2012-01-01

    use of such techniques to protect plants and animals against disease and pests means many more farmers can produce enough food to feed their own families and to sell on markets. Ultimately, fewer people go hungry. The IAEA collaborates with the United Nations Food and Agriculture Organization (FAO) in providing support through a joint division in Vienna. ''While our profile is modest, the size of our footprint is significant,'' said Qu Liang, Director of the Joint FAO/IAEA Division of Nuclear Techniques. ''We are putting the benefits of tried and tested nuclear technologies into the hands of farmers, particularly small producers in poorer countries, to improve their food security and livelihood.'' ''The assistance is driven by advanced technologies,'' Liang added. ''But what we are delivering has to be appropriate to farmers' needs. That means crops that can flourish in changing and often harsher conditions, pest control without a chemical legacy and protection for livestock.'' The Scientific Forum will be opened by the IAEA Director General and ministers from Indonesia, Kenya and Vietnam. FAO Director General Graziano da Silva will deliver a video address. The Forum will address IAEA activities in the fields of food production, food protection and food safety. Each session features a panel of experts who will present and discuss the benefits of nuclear techniques in food and agriculture. A moderator will guide the discussions. (IAEA)

  18. Environmental regulation and technological innovation

    Energy Technology Data Exchange (ETDEWEB)

    Farrell, A.E. [Carnegie Mellon Electricity Industry Center, Pittsburg, PA (United States)

    2002-07-01

    Government policies are a major factor in the determination of structural conditions of competition. The innovative activity comprises the following: invention, adoption, and diffusion. Invention involves research and development activities such as patenting, research and development budgets. The adoption phase is concerned with deployment. As for the diffusion phase, it involves commercialization, and scale-economies. The process of introducing new technologies that are adopted by small numbers of customers in a niche market was explained. Once costs are lowered through experience gained in designing, manufacturing and servicing the new technology, mew applications generally lead to larger markets. Environmental technologies have no early adopters, implying that governments have an important role to play. However, commercial processes are not normally as well known to government as it is to the private sector. The electoral cycle also interferes with long term research and development efforts for technological clusters. A look at sulphur dioxide control at United States power plants illustrated the problem. The author then explained the reasons behind low allowance prices. Low-sulphur western coal was rendered economic in large areas of the United States by rail deregulation. Electricity restructuring was also a factor. The author indicated that binding government regulation must come before adoption and diffusion of emission controls. A summary of recent research was provided, in which the author stated that no single policy instrument was likely to properly stimulate innovative activity. In those cases where both supply and demand are stimulated by government, the technological innovation is greatest. Stringent regulations induce innovation, as do greater flexibility and greater regulatory certainty. Knowledge transfer within the industry is vital. 8 refs., 3 figs.

  19. Promoting Economic Security through Information Technology ...

    African Journals Online (AJOL)

    The problem of economic insecurity is a global threat to national security. In Nigeria today, we have witness a lot of national security issues that risks the continued existence of the country as one indivisible political entity with many calling for disintegration. Hitherto, many terrorist networks have sprang up in many parts of ...

  20. The Department of Energy's safeguards and security technology development program

    International Nuclear Information System (INIS)

    Smith, G.D.; Pocratsky, C.A.

    1995-01-01

    The US DOE has had a program that develops technologies to protect sensitive nuclear weapons facilities for more than thirty years. The mission of the program is overwhelmingly diverse, as it must be to protect an array of assets such as nuclear weapons, special nuclear material in various forms, components of nuclear weapons, and classified nuclear weapons design information. Considering that the nuclear weapons complex consists of dozens of facilities that are scattered all over the US, the technology development mission is very challenging. Complicating matters further is the ever uncertain future of the DOE. Some examples of dramatic Departmental mission changes that directly impact their security technology development program are given. A few development efforts are highlighted as examples of efforts currently being sponsored. They are: automated sensor testing devices to help reduce the requirement for personnel to enter vaults containing highly radioactive nuclear materials; a vehicle inspection portal to screen vehicles for hidden passengers, nuclear material, explosives, and other contraband; non-lead and short-range ammunition as an environmentally safe alternative to lead ammunition; a complex-wide visitor access control system to allow all DOE employees to travel to all sites with a commonly recognized credential; automated nuclear material monitoring technologies to provide assurance that material in storage has not been tampered with; laser radar as a potential solution to early warning deficiencies throughout the Department; performance testing standards for many security products to include an automated and consistent standard for assessing the quality of video; low temperature pyrotechnic smoke as a possible adversary delay mechanism; modular vaults to provide temporary protection for nuclear material during D and D activities, and a protection approach for restricted passage areas such as the volume above a tiled ceiling or within a crawl space

  1. U.S. ENVIRONMENTAL PROTECTION AGENCY (EPA) ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: ARSENIC MONITORING TECHNOLOGIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency Environmental Technology Verification (ETV) program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This technology ...

  2. The DOE safeguards and security technology development program

    International Nuclear Information System (INIS)

    Cherry, R.C.; Wheelock, A.J.

    1991-01-01

    This paper reports that strategic planning for safeguards and security within the Department of Energy emphasizes the contributions of advanced technologies to the achievement of Departmental protection program goals. The Safeguards and Security Technology Development Program provides state-of-the-art technologies, systems and technical services in support of the policies and programmatic requirements for the protection of Departmental assets. The Program encompasses research and development in physical security, nuclear material control and accountability, information security and personnel security, and the integration of these disciplines in advanced applications. Technology development tasks serve goals that range from the maintenance of an effective technology base to the development, testing and evaluation of applications to meet field needs. A variety of factors, from the evolving threat to reconfiguration of the DOE complex and the technical requirements of new facilities, are expected to influence safeguards and security technology requirements and development efforts. Implementation of the Program is based on the systematic identification, prioritization and alignment of technology development tasks and needs. Initiatives currently underway are aimed at enhancing technology development project management. Increased management attention is also being placed on efforts to promote the benefits of the Program through technology transfer and interagency liaison

  3. New technologies and the search for security: Prospects for a post-cold-war era

    International Nuclear Information System (INIS)

    Brown, G.E. Jr.

    1990-01-01

    Technology alone will not solve our many environmental, economic and military problems. The search for peace and security must be based on a concept of international security that extends beyond the bounds of military concerns and into the realm of environmental and economic matters. In our efforts to understand how science and technology fit within this security context, we should not look simply at emerging technologies, even those that are sustainable and stabilizing, as being the principal candidates for drastic improvements in peace and security on our planet. One must keep in mind that security for as many as one fourth to one half of the world's inhabitants would be revolutionized if they had access to some of the most basic existing technologies of our times. Equitable access to resources and technology is an age-old problem. Today it must be faced on a global basis. It demands creating a new world economic order that combines the best that the capitalist and socialist economies can offer. We must declare today that a secure global society cannot exist which is half in slavery to poverty and deprived of opportunity, and half free to develop its potential and achieve its dreams

  4. New technologies and the search for security: Prospects for a post-cold-war era

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Jr, G E

    1991-12-31

    Technology alone will not solve our many environmental, economic and military problems. The search for peace and security must be based on a concept of international security that extends beyond the bounds of military concerns and into the realm of environmental and economic matters. In our efforts to understand how science and technology fit within this security context, we should not look simply at emerging technologies, even those that are sustainable and stabilizing, as being the principal candidates for drastic improvements in peace and security on our planet. One must keep in mind that security for as many as one fourth to one half of the world`s inhabitants would be revolutionized if they had access to some of the most basic existing technologies of our times. Equitable access to resources and technology is an age-old problem. Today it must be faced on a global basis. It demands creating a new world economic order that combines the best that the capitalist and socialist economies can offer. We must declare today that a secure global society cannot exist which is half in slavery to poverty and deprived of opportunity, and half free to develop its potential and achieve its dreams

  5. Use of Persuasive Technology to Change End-Users- IT Security Aware Behaviour: A Pilot Study

    OpenAIRE

    Ai Cheo Yeo; Md. Mahbubur Rahim; Yin Ying Ren

    2008-01-01

    Persuasive technology has been applied in marketing, health, environmental conservation, safety and other domains and is found to be quite effective in changing people-s attitude and behaviours. This research extends the application domains of persuasive technology to information security awareness and uses a theory-driven approach to evaluate the effectiveness of a web-based program developed based on the principles of persuasive technology to improve the information sec...

  6. The Western Environmental Technology Office (WETO), Butte, Montana, technology summary

    International Nuclear Information System (INIS)

    1994-09-01

    This document has been prepared by the DOE Environmental Management (EM) Office of Technology Development (OTD) to highlight its research, development, demonstration, testing, and evaluation activities funded through the Western Environmental Technology Office (WETO) in Butte, Montana. Technologies and processes described have the potential to enhance DOE's cleanup and waste management efforts, as well as improve US industry's competitiveness in global environmental markets. WETO's environmental technology research and testing activities focus on the recovery of useable resources from waste. Environmental technology development and commercialization activities will focus on mine cleanup, waste treatment, resource recovery, and water resource management. Since the site has no record of radioactive material use and no history of environmental contamination/remediation activities, DOE-EM can concentrate on performing developmental and demonstration activities without the demands of regulatory requirements and schedules. Thus, WETO will serve as a national resource for the development of new and innovative environmental technologies

  7. The Western Environmental Technology Office (WETO), Butte, Montana, technology summary

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    This document has been prepared by the DOE Environmental Management (EM) Office of Technology Development (OTD) to highlight its research, development, demonstration, testing, and evaluation activities funded through the Western Environmental Technology Office (WETO) in Butte, Montana. Technologies and processes described have the potential to enhance DOE`s cleanup and waste management efforts, as well as improve US industry`s competitiveness in global environmental markets. WETO`s environmental technology research and testing activities focus on the recovery of useable resources from waste. Environmental technology development and commercialization activities will focus on mine cleanup, waste treatment, resource recovery, and water resource management. Since the site has no record of radioactive material use and no history of environmental contamination/remediation activities, DOE-EM can concentrate on performing developmental and demonstration activities without the demands of regulatory requirements and schedules. Thus, WETO will serve as a national resource for the development of new and innovative environmental technologies.

  8. Safeguards and security deficiencies fulfilled through technology development

    International Nuclear Information System (INIS)

    Smoot, W.

    1996-01-01

    The Office of Safeguards and Security (OSS) sponsors research and development activities based on identified field and headquarters customer requirements. Annually, a formal solicitation of safeguards and security user needs is conducted. Currently, there are over 300 valid safeguards and security deficiencies that have been identified. These user needs serve as the basis for formulating the OSS Technology Development Program (TDP). Due to budget constraints, the TDP can only address approximately 47% of these needs in FY 1996. This paper will discuss, in a general sense, the current deficiencies and how the TDP is responding to each. Specifically, the paper will highlight technologies in the areas of Material Control and Accounting, Physical Security, and Information Security. A brief discussion of unfulfilled user requirements will also be presented as a catalyst for leveraging available or developing technologies from other similar programs or from private industry

  9. Radiation technology for environmental conservation

    International Nuclear Information System (INIS)

    Machi, S.

    1983-01-01

    The use of radiation technology for environmental conservation is becoming increasingly important. Commercial plants for the radiation treatment of sewage sludge to reduce pathogenic micro-organisms have been operating in the Federal Republic of Germany for the past ten years and their technical and economical feasibility has been demonstrated. Irradiation of dried sludge has been developed at the Sandia National Laboratory (USA) using Cs-137, and the construction of a commercial plant is planned in Albuquerque. At the Japan Atomic Energy Research Institute (JAERI), efforts are under way to increase the rate of composting of sludge by radiation. Regarding waste water treatment, a significant synergistic effect of radiation and ozone was found in the reduction of TOC. The construction of a gamma irradiation plant is in the planning stage in Canada, for the disinfection of virus-contaminated waste effluents from the Canadian Animal Disease Research Institute. The treatment of exhaust gases by electron beam has been studied in Japan using a large pilot plant which demonstrated that 90% of SO 2 and 80% of NOsub(x) can be removed from the flue gas of iron ore sintering furnaces. The US Department of Energy is assisting in projects for the further development of this technology for combined removal of SO 2 and NOsub(x) in flue gas from coal burning power stations. (author)

  10. MICROBIAL SURFACTANTS IN ENVIRONMENTAL TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    T. P. Pirog

    2015-08-01

    Full Text Available It was shown literature and own experimental data concerning the use of microbial surface active glycolipids (rhamno-, sophoro- and trehalose lipids and lipopeptides for water and soil purification from oil and other hydrocarbons, removing toxic heavy metals (Cu2+, Cd2+, Ni2+, Pb2+, degradation of complex pollution (oil and other hydrocarbons with heavy metals, and the role of microbial surfactants in phytoremediation processes. The factors that limit the use of microbial surfactants in environmental technologies are discussed. Thus, at certain concentrations biosurfactant can exhibit antimicrobial properties and inhibit microorganisms destructing xenobiotics. Microbial biodegradability of surfactants may also reduce the effectiveness of bioremediation. Development of effective technologies using microbial surfactants should include the following steps: monitoring of contaminated sites to determine the nature of pollution and analysis of the autochthonous microbiota; determining the mode of surfactant introduction (exogenous addition of stimulation of surfactant synthesis by autochthonous microbiota; establishing an optimal concentration of surfactant to prevent exhibition of antimicrobial properties and rapid biodegradation; research both in laboratory and field conditions.

  11. 76 FR 78009 - Information Collection; Implementation of Information Technology Security Provision

    Science.gov (United States)

    2011-12-15

    ...] Information Collection; Implementation of Information Technology Security Provision AGENCY: General Services... collection requirement regarding Implementation of Information Technology Security Provision. Public comments... Information Collection 3090- 0294, Implementation of Information Technology Security Provision, by any of the...

  12. INDUSTRIAL WASTE MANAGEMENT TO IMPROVE ENVIRONMENTAL SECURITY

    Directory of Open Access Journals (Sweden)

    V. A. Perfilov

    2016-01-01

    Full Text Available Aim. Disposal of industrial waste to improve the environmental safety by means of recycling and reusing in the manufacture of building materials.Materials and methods. We made a selection of new optimum compositions of fiber-concretes using industrial carbon black from heat generating productions, glass fibers, plasticizers, activated mixing water produced using an ultrasonic unit.Results. New fiber-reinforced concrete compositions were developed using carbon black as an additive. As a result of the processing of the experimental data, it has been revealed that introduction of carbon black as an additive contributed to the increase of the strength characteristics of nearly all fiber-reinforced concrete compositions. It has been found that microparticles of carbon black accumulate the products of hydration of portlandcement-hydrosilicate calcium on the surface and contribute to the formation of a solid microarming concrete structure.Conclusions. The use of industrial carbon black in fibrous concrete mixture using restructured water improves its rheological properties, reduces its segregation and improves the homogeneity of the concrete. Recycling and re-using carbon black in the production of building materials will improve the environmental ecology.

  13. Soils and food security | Nortcliff | Nigerian Journal of Technological ...

    African Journals Online (AJOL)

    A threat impacting on food security strongly in Africa is nutrient mining where insufficient nutrients are returned to the soil after crop production. The impacts of global change on food security and the potential impacts of global markets for food and land are also briefly discussed. Nigerian Journal of Technological Research ...

  14. Reducing security risk using data loss prevention technology.

    Science.gov (United States)

    Beeskow, John

    2015-11-01

    Data loss/leakage protection (DLP) technology seeks to improve data security by answering three fundamental questions: > Where are confidential data stored? > Who is accessing the information? > How are data being handled?

  15. Reform of the National Security Science and Technology Enterprise

    National Research Council Canada - National Science Library

    Berry, William; Coffey, Timothy; DeYoung, Donald; Kadtke, James; Loeb, Cheryl

    2008-01-01

    A strong science and technology (S&T) program has been vitally important to American national security since World War II and has to date given the United States a strategic advantage over competitors...

  16. Competitive Technologies for National Security: Review and Recommendations

    National Research Council Canada - National Science Library

    Carafano, James J; Gudgel, Andew; Kochems, Alane

    2008-01-01

    .... Innovation will always be a national security wild card. New technologies may unleash or accelerate social and cultural changes that affect how nations protect themselves on battlefields and behind the scenes...

  17. HEMISPHERIC CENTER FOR ENVIRONMENTAL TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    M.A. Ebadian

    1999-09-30

    Co., Inc. was evaluated. A summary of the demonstration will be included in the October monthly report. A Kool-Vest from MicroClimate Systems, Inc. was evaluated during assessment at Beaver, WV from 8/16/99 to 8/17/99. The evaluation was performed in the same manner as the MTR Chemical Protective Suit described above. A summary of the demonstration will be included in the October monthly report. A brochure announcing the new Gateway to Environmental Technology (GET) website was produced by FIU-HCET and is being distributed to the D&D community by FETC-DDFA. The website provides links to the TIS and other decision support systems developed at FIU-HCET.

  18. Nevada National Security Site Environmental Report 2011 Summary

    Energy Technology Data Exchange (ETDEWEB)

    Cathy Wills, ed

    2012-09-12

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  19. Nevada National Security Site Environmental Report 2011 Summary

    International Nuclear Information System (INIS)

    Wills, Cathy

    2012-01-01

    The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO) directs the management and operation of the Nevada National Security Site (NNSS). NNSA/NSO prepares the Nevada National Security Site Environmental Report (NNSSER) to provide the public an understanding of the environmental monitoring and compliance activities that are conducted on the NNSS to protect the public and the environment from radiation hazards and from nonradiological impacts. The NNSSER is a comprehensive report of environmental activities performed at the NNSS and offsite facilities over the previous calendar year. It is prepared annually to meet the requirements and guidelines of the U.S. Department of Energy (DOE) and the information needs of NNSA/NSO stakeholders. This summary provides an abbreviated and more readable version of the NNSSER. It does not contain detailed descriptions or presentations of monitoring designs, data collection methods, data tables, the NNSS environment, or all environmental program activities performed throughout the year. The NNSS is currently the nation's unique site for ongoing national security-related missions and high-risk operations. The NNSS is located about 65 miles northwest of Las Vegas. The approximately 1,360-square-mile site is one of the largest restricted access areas in the United States. It is surrounded by federal installations with strictly controlled access, as well as by lands that are open to public entry.

  20. Nuclear science, technology and innovation in Canada - securing the future

    Energy Technology Data Exchange (ETDEWEB)

    Walker, R.S. [Atomic Energy of Canada Limited, Chalk River, ON (Canada)

    2014-07-01

    As a Tier 1 Nuclear Nation, Canada has a rich and proud history of achievement in nuclear Science, Technology and Innovation (ST&I) -- from commercializing the CANDU power system around the world, advancing fuel technology and nuclear safety, to protecting human health through nuclear medicine and cancer therapy technology. Today, the nuclear industry in Canada is actively working to secure its promising, long-term place in the world and is embracing the change necessary to fulfill the enormous potential for good of nuclear technology. For its part, the Canadian Government is taking a bold new public policy approach to nuclear ST&I, by restructuring its large, multi-faceted AECL Nuclear Laboratories. Through the restructuring, AECL, as Canada's premier nuclear science and technology organization, will be better positioned for success via an incentivized 'Government-owned-Contractor-operated', private-sector management model. The aim of this new approach is to enhance and grow high-value nuclear innovation for the marketplace, strengthen the competitiveness of Canada's nuclear sector, and reduce costs to the Government of Canada with time. This approach will play a key role in ensuring a bright future for the Canadian Nuclear Industry domestically and globally as it launches its 25-year Vision and Action Plan, where one of the priority action areas is support for a strong, forward-looking, nuclear ST&I agenda. As the new model for the Nuclear Laboratories is moved forward by the Government, with the support of AECL and industry, Canada's nuclear expertise and knowledge continue to be expanded and deepened through the work of the Laboratories' ten Centres of Excellence, where AECL's fundamental approach is guided by the reality that ST&I is needed in all aspects of the nuclear cycle, including decommissioning, waste management and environmental protection. (author)

  1. THE ENVIRONMENTAL TECHNOLOGIES ACCEPTANCE (ETA) PROGRAM

    International Nuclear Information System (INIS)

    Behr-Andres, Christina B.

    2001-01-01

    The Environmental Technologies Acceptance (ETA) Program at the Energy and Environmental Research Center (EERC) is intended to advance the development, commercial acceptance, and timely deployment of selected private sector technologies for the cleanup of sites in the nuclear defense complex as well as the greater market. As shown in Table 1, this cooperative agreement funded by the National Energy Technology Laboratory (NETL) consists of three tasks: Technology Selection, Technology Development, and Technology Verification. As currently conceived, the ETA will address the needs of as many technologies as appropriate under its current 3-year term. This report covers activities during the first 6 months of the 3-year ETA program

  2. QuEST: Qualifying Environmentally Sustainable Technologies

    Science.gov (United States)

    Lewis, Pattie

    2012-01-01

    Articles in this issue inlude: (1) Foundation of Technology Evaluation for Environmental Risk Mitigation Principal Center (TEERM) Technology Evaluation is Testing and Qualification, (2) Materials Management and Substitution Efforts, (3 Recycling and Pollution Control Efforts, and (4) Remediation Efforts

  3. Division of Environmental Control Technology program, 1977

    Energy Technology Data Exchange (ETDEWEB)

    None

    1978-06-01

    Environmental engineering programs are reviewed for the following technologies; coal; petroleum and gas; oil shale; solar; geothermal and energy conservation; nuclear energy; and decontamination and decommissioning. Separate abstracts were prepared for each technology. (MHR)

  4. Facing global environmental change. Environmental, human, energy, food, health and water security concepts

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); AFES-Press, Mosbach (Germany); Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Cuernavaca, MOR (MX). Centro Regional de Investigaciones Multidiscipinarias (CRIM); United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); Grin, John [Amsterdam Univ. (Netherlands). Amsterdam School for Social Science Research; Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Kameri-Mbote, Patricia [Nairobi Univ. (Kenya). School of Law; International Environmental Law Research Centre, Nairobi (Kenya); Behera, Navnita Chadha [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Tunis-Carthage Univ., Hammam-Chatt (Tunisia); Krummenacher, Heinz (eds.) [swisspeace, Bern (Switzerland). FAST International

    2009-07-01

    This policy-focused, global and multidisciplinary security handbook on Facing Global Environmental Change addresses new security threats of the 21st century posed by climate change, desertification, water stress, population growth and urbanization. These security dangers and concerns lead to migration, crises and conflicts. They are on the agenda of the UN, OECD, OSCE, NATO and EU. In 100 chapters, 132 authors from 49 countries analyze the global debate on environmental, human and gender, energy, food, livelihood, health and water security concepts and policy problems. In 10 parts they discuss the context and the securitization of global environmental change and of extreme natural and societal outcomes. They suggest a new research programme to move from knowledge to action, from reactive to proactive policies and to explore the opportunities of environ-mental cooperation for a new peace policy. (orig.)

  5. Secure messaging via the cloud and mobile devices: data security issues emerge with new technologies.

    Science.gov (United States)

    Prestigiacomo, Jennifer

    2011-05-01

    The secure messaging space is alive with new innovations that are moving the industry forward. Key in this space is the push toward moving secure messaging to the cloud and pushing it out to mobile devices. Among the examples are solutions that allow physicians to receive encrypted email on mobile devices, as well as ones that allow doctors to securely text-message each other to coordinate care. However, the security issues around these emerging technologies in this very active space must be further explored.

  6. Promoting Economic Security through Information Technology Abstract

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-12-01

    Dec 1, 2013 ... The problem of economic insecurity is a global threat to national security. ... of the country as one indivisible political entity with many calling for disintegration. ..... The integration of ICT in agriculture can .... Table 4.2.7 Respondents by IT on Business propriety and trade .... of production, distribution and.

  7. Physical security technologies for weapons complex reconfiguration facilities

    International Nuclear Information System (INIS)

    Jaeger, C.D.

    1994-01-01

    Sandia National Laboratories was a member of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S ampersand S) team providing assistance to the Department of Energy's (DOE) Office of Weapons Complex Reconfiguration. The physical security systems in the new and upgraded facilities being considered for the WCR had to meet DOE orders and other requirements set forth in the WCR Programmatic Design Criteria (PDC), incorporate the latest physical security technologies using proven state-of-the-art systems and meet fundamental security principles. The outcome was to avoid costly retrofits and provide effective and comprehensive protection against current and projected threats with minimal impact on operations, costs and schedule. Physical security requirements for WCR facilities include: (1) reducing S ampersand S life-cycle costs, (2) where feasible automating S ampersand S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, (3) increasing the amount of delay to outsider adversary attack, (4) compartmentalizing the facility to minimize the number of personnel requiring access to critical areas and (5) having reliable and maintainable systems. To be most effective against threats physical security must be integrated with facility operations, safety and other S ampersand S activities, such as material control and accountability, nuclear measurements and computer and information security. This paper will discuss the S ampersand S issues, requirements, technology opportunities and needs. Physical security technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed

  8. Global environmental technologies in the future

    International Nuclear Information System (INIS)

    Takahashi, M.

    1994-01-01

    This paper outlines the activities of New Energy and industrial Technology Development Organization's (NEDO) 'Research and Development of Industrial Technology' projects which are related to global environmental technologies. Then, it describes four new material programs and two biotechnology ones, and presents a list of a few environmentally-friendly technologies. These national projects are carried out by private companies which are consigned by NEDO in conformity with MITI's fundamental Research and Development policy. (TEC)

  9. Environmental management technology demonstration and commercialization

    International Nuclear Information System (INIS)

    Daly, D.J.; Erickson, T.A.; Groenewold, G.H.

    1995-01-01

    The Energy ampersand Environmental Research Center (EERC), a contract-supported organization focused on technology research, development, demonstration, and commercialization (RDD ampersand C), is entering its second year of a Cooperative Agreement with the U.S. Department of Energy (DOE) Morgantown Energy Technology Center (METC) to facilitate the development, demonstration, and commercialization of innovative environmental management (EM) technologies in support of the activities of DOE's Office of Environmental Science and Technology (EM-50) under DOE's EM Program. This paper reviews the concept and approach of the program under the METC-EERC EM Cooperative Agreement and profiles the role the program is playing in the commercialization of five EM technologies

  10. Assessing security technology's impact: old tools for new problems.

    Science.gov (United States)

    Kreissl, Reinhard

    2014-09-01

    The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.

  11. A study of the security technology and a new security model for WiFi network

    Science.gov (United States)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  12. U.S. ENVIRONMENTAL PROTECTION AGENCY (EPA) ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: ARSENIC TREATMENT TECHNOLOGIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techn...

  13. The effects of environmental resource and security on aggressive behavior.

    Science.gov (United States)

    Ng, Henry Kin Shing; Chow, Tak Sang

    2017-05-01

    Exposure to different environments has been reported to change aggressive behavior, but previous research did not consider the underlying elements that caused such an effect. Based on previous work on environmental perception, we examined the role of environmental resource and security in altering aggression level. In three experiments, participants were exposed to environments that varied in resource (High vs. Low) and security (High vs. Low) levels, after which aggression was measured. The environments were presented through visual priming (Experiments 1-2) and a first-person gameplay (Experiment 3). We observed a consistent resource-security interaction effect on aggression, operationalized as the level of noise blast (Experiment 1) and number of unpleasant pictures (Experiments 2-3) delivered to strangers by the participants. High resource levels associated with higher aggression in insecure conditions, but lower aggression in secure conditions. The findings suggest that the adaptive value of aggression varies under different environmental constraints. Implications are discussed in terms of the effects of adverse environments on aggression, and the nature's effects on social behavior. Aggr. Behav. 43:304-314, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  14. The Political Economy of Carbon Securities and Environmental Policy

    DEFF Research Database (Denmark)

    Polborn, Sarah

    The costs of the current suboptimal carbon abatement policy are likely in the range of 3 to 6 trillion 2005 US dollars. Using methods from the political economy of environmental policy, the paper develops a new carbon abatement policy instrument, carbon securities. A carbon security entitles its...... owner to a ?xed proportion of ex ante unknown total emissions. This creates an additional group of stakeholders on the side of the issue that has traditionally been underrepresented. The advantages over existing systems include an equilibrium carbon price closer to the social optimum, a more predictable...

  15. Security technology discussion for emergency command system of nuclear power plant

    International Nuclear Information System (INIS)

    Liu Zhenjun

    2014-01-01

    Nuclear power plant emergency command system can provide valuable data for emergency personnel, such as the unit data, weather data, environmental radiation data. In the course of emergency response, the emergency command system provides decision support to quickly and effectively control and mitigate the consequences of the nuclear accident, to avoid and reduce the dose received by staff and the public, to protect the environment and the public. There are high performance requirements on the security of the system and the data transmission. Based on the previous project and new demand after the Fukushima incident, the security technology design of emergency system in nuclear power plant was discussed. The results show that the introduction of information security technology can effectively ensure the security of emergency systems, and enhance the capacity of nuclear power plant to deal with nuclear accidents. (author)

  16. ATBU Journal of Environmental Technology: Editorial Policies

    African Journals Online (AJOL)

    Focus and Scope. The journal of environmental technology is devoted to the publication of papers which advance knowledge of practical and theoretical issues of the environmental technology. Selection of papers for publication is based on their relevance, clarity, topicality and individuality; the extent to which they advance ...

  17. Information and technology: Improving food security in Uganda ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2014-06-23

    Jun 23, 2014 ... Information and technology: Improving food security in Uganda ... knowledge to make decisions about planting, harvesting, and managing livestock, but ... to be effective for minimizing risks and increasing agricultural productivity. ... In time, this network of information – made possible by digital technology ...

  18. Three Essays on Information Technology Security Management in Organizations

    Science.gov (United States)

    Gupta, Manish

    2011-01-01

    Increasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to…

  19. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  20. Combining overt and covert anti-counterfeiting technologies for securities

    Science.gov (United States)

    Uematsu, Tsuyoshi

    2006-02-01

    The National Printing Bureau of Japan has been developing new anti-counterfeiting technologies as a banknote printer. Some of our technologies have already been effectively introduced into Japan's new banknote series. Anti-counterfeiting technologies can be applied not only to banknotes but also to other security documents depending on desired features. In this presentation, I will introduce three of our newly developed overt and covert security techniques, which are intended for document security and brand protection, as well as banknotes. "Metallic View" is mainly for offset printing. "Copy Check" (micro-structural lines involving luminescence) is for plate making technology. "ImageSwitch" is for a new security solution which has unlimited printing applications. All three techniques create "latent images" (some of which may be better known as "carrier screen images") that are useful in preventing counterfeiting. While each of the techniques is effective by itself, all are more effective when applied together. Combining these techniques could make all security documents harder to copy using IT scanners, and provide cost-effective anti-counterfeiting solutions for all security users.

  1. Development of environmental radiation control technology

    International Nuclear Information System (INIS)

    Kim, Ingyu; Kim, Enhan; Keum, Dongkwon

    2012-04-01

    To develop the comprehensive environmental radiation management technology, - An urban atmospheric dispersion model and decision-aiding model have been developed. - The technologies for assessing the radiation impact to non-human biota and the environmental medium contamination have developed. - The analytical techniques of the indicator radionuclides related to decommissioning of nuclear facilities and nuclear waste repository have been developed. - The national environmental radiation impact has been assessed, and the optimum management system of natural radiation has been established

  2. Corporate environmental management and information technology

    DEFF Research Database (Denmark)

    Rikhardsson, Pall M.

    2001-01-01

    software, the Internet, computer networks, telecommunications devices, etc. Information technology also has an impact on how companies perform environmental management. This paper looks at the relations between corporate environmental management and information technology. First it presents a framework...... for mapping information technology. Using this framework it focuses on the use of information technology in corporate environmental management, describes the market for standard environmental management information systems and implementation experiences from one large international company.......Information technology has changed, is changing and will continue to change the face of business as we further enter the Information Society. Today it would be difficult for a company to function effectively without the aid of various information technologies such as accounting software, production...

  3. LIEKKI 2 - Combustion technology is environmental technology

    Energy Technology Data Exchange (ETDEWEB)

    Hupa, M. [Aabo Akademi, Turku (Finland)

    1996-12-31

    Finland has wide experience in applications of various combustion technologies and fuels and in supplying energy to industry and municipalities. Furthermore, combustion hardware and equipment are amongst our most important export products. Above all, fluidized bed boilers, recovery boilers for pulp mills and heavy diesel engines and diesel power plants have achieved excellent success in the world markets. Exports of these products alone have amounted to several billions of Finnish marks of annual sales in recent years. Within modern combustion technology, the objective is to control flue gas emissions as far as possible in the process itself, thus doing away with the need for the separate scrubbing of flue gases. To accomplish this it has been necessary to conduct a large amount of research on the details of the chemistry of combustion emissions and the flows in furnaces and engine cylinders. A host of completely new products are being developed for the combustion technology field. The LIEKKI programme has been particularly interested in so-called combined-cycle processes based on pressurized fluidized bed technology

  4. Nuclear waste disposal: technology and environmental hazards

    International Nuclear Information System (INIS)

    Hare, F.K.; Aikin, A.M.

    1980-01-01

    The subject is discussed under the headings: introduction; the nature and origin of wastes (fuel cycles; character of wastes; mining and milling operations; middle stages; irradiated fuel; reprocessing (waste generation); reactor wastes); disposal techniques and disposal of reprocessing wastes; siting of repositories; potential environmental impacts (impacts after emplacement in a rock repository; catastrophic effects; dispersion processes (by migrating ground water); thermal effects; future security; environmental survey, monitoring and modelling); conclusion. (U.K.)

  5. Hydrocomplexity: Addressing water security and emergent environmental risks

    Science.gov (United States)

    Kumar, Praveen

    2015-07-01

    Water security and emergent environmental risks are among the most significant societal concerns. They are highly interlinked to other global risks such as those related to climate, human health, food, human migration, biodiversity loss, urban sustainability, etc. Emergent risks result from the confluence of unanticipated interactions from evolving interdependencies between complex systems, such as those embedded in the water cycle. They are associated with the novelty of dynamical possibilities that have significant potential consequences to human and ecological systems, and not with probabilities based on historical precedence. To ensure water security we need to be able to anticipate the likelihood of risk possibilities as they present the prospect of the most impact through cascade of vulnerabilities. They arise due to a confluence of nonstationary drivers that include growing population, climate change, demographic shifts, urban growth, and economic expansion, among others, which create novel interdependencies leading to a potential of cascading network effects. Hydrocomplexity aims to address water security and emergent risks through the development of science, methods, and practices with the potential to foster a "Blue Revolution" akin to the Green revolution for food security. It blends both hard infrastructure based solution with soft knowledge driven solutions to increase the range of planning and design, management, mitigation and adaptation strategies. It provides a conceptual and synthetic framework to enable us to integrate discovery science and engineering, observational and information science, computational and communication systems, and social and institutional approaches to address consequential water and environmental challenges.

  6. Technology and Environmental Education: An Integrated Curriculum

    Science.gov (United States)

    Willis, Jana M.; Weiser, Brenda

    2005-01-01

    Preparing teacher candidates to integrate technology into their future classrooms effectively requires experience in instructional planning that utilizes technology to enhance student learning. Teacher candidates need to work with curriculum that supports a variety of technologies. Using Project Learning Tree and environmental education (EE),…

  7. ENVIRONMENTAL REGULATIONS AND TECHNOLOGY - THE ELECTROPLATING INDUSTRY

    Science.gov (United States)

    This 44-page Technology Transfer Environmental Regulations and Technology publication is an update of a 1980 EPA publication that has been revised to reflect changes in the EPA regulations, as well as in the pollution control technologies that affect the electroplating industry. ...

  8. Environmental science and technology: An overview

    Energy Technology Data Exchange (ETDEWEB)

    1993-01-01

    This report is intended to provide an overview of the scientific and technological effort to meet the environmental goals identified in the Green Plan. The report gives a sense of the range of scientific and technological efforts that are being devoted to issues as diverse as conserving our wildlife and national parks and developing innovative technologies to clean-up polluted sites.

  9. Technology development and transfer in environmental management

    International Nuclear Information System (INIS)

    Katz, J.; Karnovitz, A.; Yarbrough, M.

    1994-01-01

    Federal efforts to develop and employ the innovative technologies needed to clean up contaminated facilities would greatly benefit from a greater degree of interaction and integration with the energies and resources of the private sector. Yet there are numerous institutional, economic, and regulatory obstacles to the transfer and commercialization of environmental restoration and waste management technologies. These obstacles discourage private sector involvement and investment in Federal efforts to develop and use innovative technologies. A further effect is to impede market development even where private sector interest is high. Lowering these market barriers will facilitate the commercialization of innovative environmental cleanup technologies and expedite the cleanup of contaminated Federal and private facilities. This paper identifies the major barriers to transfer and commercialization of innovative technologies and suggests possible strategies to overcome them. Emphasis is placed on issues particularly relevant to the Department of Energy's Environmental Restoration and Waste Management (EM) program, but which are applicable to other Federal agencies confronting complex environmental cleanup problems

  10. Corporate Environmental Management and Information Technology

    DEFF Research Database (Denmark)

    Rikhardsson, Pall M.

    2000-01-01

    software, the internet, computer networks, telecommunications devices, etc. Information technology also has an impact on how companies perform environmental management. This paper explores the relations between environmental management and information technology in general terms. It offers a classification...... framework for the use of information technology in corporate environmental management (CEM), describes the market for standard environmental management information systems solutions, what main functionalities are available and what main trends are visible.......Information technology has changed, is changing and will continue to change the face of business as we further enter the Information Society. Today it would be difficult for a company to function effectively without the aid of various information technologies such as accounting software, production...

  11. Technology diffusion, product differentiation and environmental subsidies

    Energy Technology Data Exchange (ETDEWEB)

    McGinty, M. [Univ. of Wisconsin, Milwaukee, WI (United States). Dept. of Economics; Vries, F.P. de [Univ. of Groningen (Netherlands). Dept. of Law and Economics

    2007-07-01

    Technological change is often seen as the promising device that will mitigate or solve environmental problems. Policy intervention that spurs the development, adoption and diffusion of new, environmentally benign technologies therefore holds great appear for environmental authorities. Policymakers have various instruments at their disposal to affect technological diffusion, ranging from direct regulation (command-and-control strategies) to market-based instruments, such as taxes, subsidies and tradable pollution permits. This paper examines environmental subsidies as a technology diffusion policy. The authors apply evolutionary game theory to explore the relationship between subsidies for clean technology, the diffusion of that technology and the degree of product differentiation in an imperfectly competitive market. They show that the subsidy succeeds in reducing environmental damage only when the substitution effect (the reduction in pollution associated with the clean technology) exceeds the output effect (the extent that the subsidy increases output). When the substitution effect does dominate, environmental damage decreases monotonically during the diffusion process. The extent of diffusion (the degree to which clean technolgy replaces dirty) and the likelihood that the substitution effect will dominate both decrease with the extent of product differentiation. Finally, the subsidy for clean technology will spill over to the remaining dirty producers increasing their profit as well.

  12. Security and privacy issues with health care information technology.

    Science.gov (United States)

    Meingast, Marci; Roosta, Tanya; Sastry, Shankar

    2006-01-01

    The face of health care is changing as new technologies are being incorporated into the existing infrastructure. Electronic patient records and sensor networks for in-home patient monitoring are at the current forefront of new technologies. Paper-based patient records are being put in electronic format enabling patients to access their records via the Internet. Remote patient monitoring is becoming more feasible as specialized sensors can be placed inside homes. The combination of these technologies will improve the quality of health care by making it more personalized and reducing costs and medical errors. While there are benefits to technologies, associated privacy and security issues need to be analyzed to make these systems socially acceptable. In this paper we explore the privacy and security implications of these next-generation health care technologies. We describe existing methods for handling issues as well as discussing which issues need further consideration.

  13. Managing technological and environmental dynamics

    DEFF Research Database (Denmark)

    Madsen, Henning; Ulhøi, John Parm

    2001-01-01

    The field of MoT cannot continue indefinitely to ignore the importance of the natural environment as a fundamental basis for technological development. This paper will therefore focus on the various linkages between management of technology and sustainable development, discussing both the current...

  14. HEMISPHERIC CENTER FOR ENVIRONMENTAL TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    M.A. Ebadian

    1999-01-31

    FIU-HCET participated in an ICT meeting at Mound during the second week of December and presented a brief videotape of the testing of the Robotic Climber technology. During this meeting, FIU-HCET proposed the TechXtract technology for possible testing at Mound and agreed to develop a five-page proposal for review by team members. FIU-HCET provided assistance to Bartlett Inc. and General Lasertronics Corporation in developing a proposal for a Program Opportunity Notice (PON). The proposal was submitted by these companies on January 5, 1999. The search for new equipment dismantlement technologies is continuing. The following vendors have responded to requests for demonstration: LUMONICS, Laser Solutions technology; CRYO-BEAM, Cryogenic cutting technology; Waterjet Technology Association, Waterjet Cutting technology; and DIAJET, Waterjet Cutting technology. Based on the tasks done in FY98, FIU-HCET is working closely with Numatec Hanford Corporation (NHC) and Pacific Northwest National Laboratory (PNNL) to revise the plan and scope of work of the pipeline plugging project in FY99, which involves activities of lab-scale flow loop experiments and a large-scale demonstration test bed.

  15. Political measures for promoting environmental technology

    International Nuclear Information System (INIS)

    2006-01-01

    Environmental technology can contribute to solving many environmental challenges and to industrial development. Measures to support the development and use of such technologies can be regulatory, economic or administrative, and usually one needs to use a combination of different measures in order to reach both a better environment and industrial development. For industrial development other measures than those administered by environmental authorities will be of importance. The environmental authorities therefore need to acquire knowledge about these measures and the bodies administering them, and develop an operative cooperation with these actors

  16. Technology integration project: Environmental Restoration Technologies Department Sandia National Laboratories

    International Nuclear Information System (INIS)

    Williams, C.V.; Burford, T.D.

    1996-08-01

    Sandia National Laboratories Environmental Restoration Technologies Department is developing environmental restoration technologies through funding form the US Department of Energy's (DOE's) Office of Science and Technology. Initially, this technology development has been through the Mixed Waste Landfill Integrated Demonstration (MWLID). It is currently being developed through the Contaminant Plume containment and Remediation Focus Area, the Landfill Stabilization Focus Area, and the Characterization, Monitoring, and Sensor Cross-Cutting Program. This Technology Integration Project (TIP) was responsible for transferring MWLID-developed technologies for routine use by environmental restoration groups throughout the DOE complex and commercializing these technologies to the private sector. The MWLID's technology transfer/commercialization successes were achieved by involving private industry in development, demonstration, and technology transfer/commercialization activities; gathering and disseminating information about MWLID activities and technologies; and promoting stakeholder and regulatory involvement. From FY91 through FY95, 30 Technical Task Plans (TTPs) were funded. From these TTPs, the MWLID can claim 15 technology transfer/commercialization successes. Another seven technology transfer/commercialization successes are expected. With the changeover to the focus areas, the TIP continued the technology transfer/commercialization efforts begun under the MWLID

  17. Technology integration project: Environmental Restoration Technologies Department Sandia National Laboratories

    Energy Technology Data Exchange (ETDEWEB)

    Williams, C.V.; Burford, T.D. [Sandia National Labs., Albuquerque, NM (United States). Environmental Restoration Technologies; Allen, C.A. [Tech Reps, Inc., Albuquerque, NM (United States)

    1996-08-01

    Sandia National Laboratories Environmental Restoration Technologies Department is developing environmental restoration technologies through funding form the US Department of Energy`s (DOE`s) Office of Science and Technology. Initially, this technology development has been through the Mixed Waste Landfill Integrated Demonstration (MWLID). It is currently being developed through the Contaminant Plume containment and Remediation Focus Area, the Landfill Stabilization Focus Area, and the Characterization, Monitoring, and Sensor Cross-Cutting Program. This Technology Integration Project (TIP) was responsible for transferring MWLID-developed technologies for routine use by environmental restoration groups throughout the DOE complex and commercializing these technologies to the private sector. The MWLID`s technology transfer/commercialization successes were achieved by involving private industry in development, demonstration, and technology transfer/commercialization activities; gathering and disseminating information about MWLID activities and technologies; and promoting stakeholder and regulatory involvement. From FY91 through FY95, 30 Technical Task Plans (TTPs) were funded. From these TTPs, the MWLID can claim 15 technology transfer/commercialization successes. Another seven technology transfer/commercialization successes are expected. With the changeover to the focus areas, the TIP continued the technology transfer/commercialization efforts begun under the MWLID.

  18. A Sustainable Technology Contribuiting to the Food Security

    Directory of Open Access Journals (Sweden)

    Dra. Rosa Catalina Bermúdez-Savòn

    2015-11-01

    Full Text Available A sustainable way for food and energetic security in rural and the city regions, is presented with the application of the solid state fermentation for the biotransformation of lignocellulosic by-products and agro-industrial wastes with white-rot fungi. Inamush as advantages of this technology, is showed the cultivation of mushroom Pleurotus spp.on coffee pulp, cedar chip , coconut and cocoa shells, and the influence of it´s mixture (1:1, trough examination of their growth rates and conversion efficacy to fruiting bodies, which cause contamination of soil and water, because of large volumes and difficult management. The use of residues for these cultive was consolidate such as alternative viable for food production, capable to satisfy the protein and nutritive necessity of population in the non-developing countries, besides low cost production, high protein content and obtention in large quantity in short time. In addition to produce complements for animal feet, such as the spent oyster mushroom substrate postcosecha is detoxified, has proteic content and better digestibility than original substrates,and can be used as animal feed or fertilizer, at the same time, was eradicated the problem of environmental contamination of these residues provoking and further contribution at sustainable development of the communities.

  19. Technological challenges for boosting coal production with environmental sustainability.

    Science.gov (United States)

    Ghose, Mrinal K

    2009-07-01

    The global energy requirement has grown at a phenomenon rate and the consumption of primary energy sources has been a very high positive growth. This paper focuses on the consumption of different primary energy sources and it identifies that coal will continue to remain as the prime energy source in foreseeable future. It examines the energy requirement perspective for India and demand of coal as the prime energy source. Economic development and poverty alleviation depend on securing affordable energy sources and Indian coal mining industry offers a bright future for the country's energy security, provided the industry is allowed to develop by supportive government policies and adopts latest technologies for mining. It is an irony that in-spite of having a plentiful reserves, India is not able to jack up coal production to meet its current and future demand. It discusses the strategies to be adopted for growth and meeting the coal demand. But such energy are very much concerned with environmental degradation and must be driven by contemporary managerial acumen addressing environmental and social challenges effectively The paper highlights the emissions of greenhouse gases due to burning of fossil fuels and environmental consequences of global warming and sea-level rise. Technological solutions for environment friendly coal mining and environmental laws for the abatement of environmental degradation are discussed in this paper.

  20. Cyber security evaluation of II&C technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Laboratory (INL), Idaho Falls, ID (United States)

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  1. SRS environmental technology development field test platform

    International Nuclear Information System (INIS)

    Riha, B.D.; Rossabi, J.; Eddy-Dilek, C.A.

    1995-01-01

    A critical and difficult step in the development and implementation of new technologies for environmental monitoring and characterization is successfully transferring these technologies to industry and government users for routine assessment and compliance activities. The Environmental Sciences Section of the DOE Savannah River Technology Center provides a forum for developers, potential users, and regulatory organizations to evaluate new technologies in comparison with baseline technologies in a well characterized field test bed. The principal objective of this project is to conduct comprehensive, objective field tests of monitoring and characterization technologies that are not currently used in EPA standard methods and evaluate their performance during actual operating conditions against baseline methods. This paper provides an overview of the field test site and a description of some of the technologies demonstrated at the site including their field applications

  2. The Center for Environmental Technology Innovative Technology Screening Process

    International Nuclear Information System (INIS)

    Bertrand, C.M.

    1995-02-01

    The Center for Environmental Technology's (CET) mission is to provide a fully integrated system for accelerated evaluation, development, commercialization, and public acceptance of creative environmental solutions which match the foremost demands in today's environmentally sensitive world. In short, CET will create a means to provide quick, effective solutions for environmental needs. To meet this mission objective, CET has created a unique and innovative approach to eliminating the usual barriers in developing and testing environmental technologies. The approach paves the way for these emerging, cutting-edge technologies by coordinating environmental restoration and waste management activities of industry, universities, and the government to: efficiently and effectively transfer technology to these users, provide market-driven, cost-effective technology programs to the public and DOE, and aid in developing innovative ideas by initiating efforts between DOE facilities and private industry. The central part to this mission is selecting and evaluating specific innovative technologies for demonstration and application at United States Department of Energy (DOE) installations. The methodology and criteria used for this selection, which is called the CET Innovative Technology Screening Process, is the subject of this paper. The selection criteria used for the screening process were modeled after other DOE technology transfer programs and were further developed by CET's Technology Screening and Evaluation Board (TSEB). The process benefits both CET and the proposing vendors by providing objective selection procedures based on predefined criteria. The selection process ensures a rapid response to proposing vendors, all technologies will have the opportunity to enter the selection process, and all technologies are evaluated on the same scale and with identical criteria

  3. Environmental management technology demonstration and commercialization

    Energy Technology Data Exchange (ETDEWEB)

    Daly, D.J.; Erickson, T.A.; Groenewold, G.H. [Energy & Environmental Research Center, Grand Forks, ND (United States)] [and others

    1995-10-01

    The Energy & Environmental Research Center (EERC), a contract-supported organization focused on technology research, development, demonstration, and commercialization (RDD&C), is entering its second year of a Cooperative Agreement with the U.S. Department of Energy (DOE) Morgantown Energy Technology Center (METC) to facilitate the development, demonstration, and commercialization of innovative environmental management (EM) technologies in support of the activities of DOE`s Office of Environmental Science and Technology (EM-50) under DOE`s EM Program. This paper reviews the concept and approach of the program under the METC-EERC EM Cooperative Agreement and profiles the role the program is playing in the commercialization of five EM technologies.

  4. Marketing Plan for the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  5. 75 FR 3948 - Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc...

    Science.gov (United States)

    2010-01-25

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Big Sky Energy Corp., Biomedical Waste Systems, Inc., Biometrics Security Technology, Inc., Biosys, Inc., Bolder Technologies Corp., Boyds Wheels, Inc... securities of Biometrics Security Technology, Inc. because it has not filed any periodic reports since...

  6. Satellite Technology Contribution to Water and Food Security

    Science.gov (United States)

    Brown, Molly E.

    2010-01-01

    This slide presentation reviews the issue of supplies of food, the relationship to food security, the ability of all people to attain sufficient food for an active and healthy life, and the ability to use satellite technology and remote sensing to assist with planning and act as an early warning system.

  7. Safeguards and Security Technology Development Directory. FY 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-06-01

    The Safeguards and Security Technology Development Directory is published annually by the Office of Safeguards and Security (OSS) of the US Department of Energy (DOE), and is Intended to inform recipients of the full scope of the OSS R&D program. It is distributed for use by DOE headquarters personnel, DOE program offices, DOE field offices, DOE operating contractors, national laboratories, other federal agencies, and foreign governments. Chapters 1 through 7 of the Directory provide general information regarding the Technology Development Program, including the mission, program description, organizational roles and responsibilities, technology development lifecycle, requirements analysis, program formulation, the task selection process, technology development infrastructure, technology transfer activities, and current research and development tasks. These chapters are followed by a series of appendices which contain more specific information on aspects of the Program. Appendix A is a summary of major technology development accomplishments made during FY 1992. Appendix B lists S&S technology development reports issued during FY 1992 which reflect work accomplished through the OSS Technology Development Program and other relevant activities outside the Program. Finally, Appendix C summarizes the individual task statements which comprise the FY 1993 Technology Development Program.

  8. Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.

    2004-01-01

    The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and

  9. 78 FR 21909 - Environmental Technologies Trade Advisory Committee; Public Meeting

    Science.gov (United States)

    2013-04-12

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The teleconference....S. exports of environmental technologies, goods, services, and products. The ETTAC was originally...

  10. 77 FR 35941 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2012-06-15

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... promotion programs; and issues related to innovation in the environmental technology sector. Background: The...

  11. 78 FR 21911 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2013-04-12

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... review the role of the U.S. government in supporting the early adoption of environmental technologies and...

  12. 76 FR 66912 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2011-10-28

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The teleconference... expand U.S. exports of environmental technologies, goods, services, and products. The ETTAC was...

  13. 75 FR 18482 - Environmental Technologies Trade Advisory Committee (ETTAC)

    Science.gov (United States)

    2010-04-12

    ... DEPARTMENT OF COMMERCE Environmental Technologies Trade Advisory Committee (ETTAC) AGENCY... Environmental Technologies Trade Advisory Committee (ETTAC) will hold its quarterly meeting to discuss environmental technologies trade liberalization, industry competitiveness issues, and general Committee...

  14. 77 FR 6064 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2012-02-07

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The teleconference... administration of programs to expand U.S. exports of environmental technologies, goods, services, and products...

  15. 75 FR 1590 - Environmental Technologies Trade Advisory Committee (ETTAC)

    Science.gov (United States)

    2010-01-12

    ... DEPARTMENT OF COMMERCE Environmental Technologies Trade Advisory Committee (ETTAC) AGENCY... Environmental Technologies Trade Advisory Committee (ETTAC) will hold its first plenary meeting of 2010 to discuss environmental technologies trade liberalization, industry competitiveness issues, and general...

  16. 75 FR 52716 - Environmental Technologies Trade Advisory Committee (ETTAC)

    Science.gov (United States)

    2010-08-27

    ... DEPARTMENT OF COMMERCE Environmental Technologies Trade Advisory Committee (ETTAC) AGENCY... Environmental Technologies Trade Advisory Committee (ETTAC) will hold its quarterly meeting to discuss environmental technologies industry competitiveness issues, the National Export Initiative, and general...

  17. Spacecraft Environmental Interactions Technology 1983

    Science.gov (United States)

    1985-01-01

    recently acquired a NASA field office within the Technology Lenter; that is staffed by Mr. Wa~ne Hudson. We take our guidance from Air Force...apogee of 4.6 % geocentric and a perigee of 650 )a altitude. The DR-1 Nigh Altitude Plama instrument (DAPI) consists of five electrostatic analyzers

  18. Diagnosing water security in the rural North with an environmental security framework.

    Science.gov (United States)

    Penn, Henry J F; Loring, Philip A; Schnabel, William E

    2017-09-01

    This study explores the nature of water security challenges in rural Alaska, using a framework for environmental security that entails four interrelated concepts: availability, access, utility, and stability of water resources. Many researchers and professionals agree that water insecurity is a problem in rural Alaska, although the scale and nature of the problem is contested. Some academics have argued that the problem is systemic, and rooted in an approach to water security by the state that prioritizes economic concerns over public health concerns. Health practitioners and state agencies, on the other hand, contend that much progress has been made, and that nearly all rural households have access to safe drinking water, though many are still lacking 'modern' in-home water service. Here, we draw on a synthesis of ethnographic research alongside data from state agencies to show that the persistent water insecurity problems in rural Alaska are not a problem of access to or availability of clean water, or a lack of 'modern' infrastructure, but instead are rooted in complex human dimensions of water resources management, including the political legacies of state and federal community development schemes that did not fully account for local needs and challenges. The diagnostic approach we implement here helps to identify solutions to these challenges, which accordingly focus on place-based needs and empowering local actors. The framework likewise proves to be broadly applicable to exploring water security concerns elsewhere in the world. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Third Aerospace Environmental Technology Conference

    Science.gov (United States)

    Whitaker, A. F. (Editor); Cross, D. R. (Editor); Caruso, S. V. (Editor); Clark-Ingram, M. (Editor)

    1999-01-01

    The elimination of CFC's, Halons, TCA, other ozone depleting chemicals, and specific hazardous materials is well underway. The phaseout of these chemicals has mandated changes and new developments in aerospace materials and processes. We are beyond discovery and initiation of these new developments and are now in the implementation phase. This conference provided a forum for materials and processes engineers, scientists, and managers to describe, review, and critically assess the evolving replacement and clean propulsion technologies from the standpoint of their significance, application, impact on aerospace systems, and utilization by the research and development community. The use of these new technologies, their selection and qualification, their implementation, and the needs and plans for further developments are presented.

  20. Environmental Consequences of Pig Slurry Treatment Technologies

    DEFF Research Database (Denmark)

    ten Hoeve, Marieke

    occur during manure storage and after field application. The main emissions are ammonia, nitrous oxide, methane, carbon dioxide, nitrate, phosphorus and odour. Slurry treatment technologies have been and are being developed in order to reduce the environmental impacts of manure. However, it is important...... and excluding biogenic carbon, marine and freshwater eutrophication potential, terrestrial acidification and eutrophication potential, and fossil resource depletion potential. The different types of treatment technologies showed varying environmental profiles, meaning that one type of technology was beneficial...... technology, or co-substrate for anaerobic digestion). With respect to odorous emissions, an LCIA method was developed, but due to a lack of data it proved difficult to include odour in LCA. Regulations appear to have an influence on the environmental impacts of slurry treatment. A decrease in N application...

  1. Divison of Environmental Control Technology program, 1978

    International Nuclear Information System (INIS)

    1979-06-01

    This report covers Division of Environmental Control Technology projects in progress during FY 1978, within the Office of the Assistant Secretary for Environment, Department of Energy. It is the second in a planned series of annual reports. The Division of Environmental Control Technology (ECT) continues to support the Assistant Secretary for Environment (EV) in discharging two primary responsibilities: (1) under the Environmental Engineering (EE) Program, the independent overview and assessment of environmental control aspects of both the U.S. Department of Energy's (DOE) research, development, and demonstration (RD and D) programs and the Nation's energy policies, and (2) under the Decontamination and Decommissioning Program, the reduction of potential environmental hazards at the radioactively contaminated sites that are presently owned or were formerly used by the Government. This report presents a short summary of objectives, approach, progress and results, future plans, and a reference bibliography for each research, development, or assessment project within the program areas described above

  2. Using Science Driven Technologies for the Defense and Security Applications

    Science.gov (United States)

    Habib, Shahid; Zukor, Dorthy; Ambrose, Stephen D.

    2004-01-01

    For the past three decades, Earth science remote sensing technologies have been providing enormous amounts of useful data and information in broadening our understanding of our home planet as a system. This research, as it has expanded our learning process, has also generated additional questions. This has further resulted in establishing new science requirements, which have culminated in defining and pushing the state-of-the-art technology needs. NASA s Earth science program has deployed 18 highly complex satellites, with a total of 80 sensors, so far and is in a process of defining and launching multiple observing systems in the next decade. Due to the heightened security alert of the nation, researchers and technologists are paying serious attention to the use of these science driven technologies for dual use. In other words, how such sophisticated observing and measuring systems can be used in detecting multiple types of security concerns with a substantial lead time so that the appropriate law enforcement agencies can take adequate steps to defuse any potential risky scenarios. This paper examines numerous NASA technologies such as laser/lidar systems, microwave and millimeter wave technologies, optical observing systems, high performance computational techniques for rapid analyses, and imaging products that can have a tremendous pay off for security applications.

  3. Development of decontamination, decommissioning and environmental restoration technology

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Byung Jik; Kwon, H S; Kim, G N. and others

    1999-03-01

    Through the project of 'Development of decontamination, decommissioning and environmental restoration technology', the followings were studied. 1. Development of decontamination and repair technology for nuclear fuel cycle facilities 2. Development of dismantling technology 3. Development of environmental restoration technology. (author)

  4. Human resource development program for nuclear safety and security in Tokyo Institute of Technology

    International Nuclear Information System (INIS)

    Han, Chi Young; Sagara, Hiroshi; Nagasaka, Hideo

    2014-01-01

    The Academy for Global Nuclear Safety and Security Agent was established at Tokyo Institute of Technology in 2011, to develop global nuclear human resources in the field of 3S (Safety, Security, and Safeguards) as a Program for Leading Graduate Schools supported by MEXT (Ministry of Education, Culture, Sports, Science and Technology). New courses of nuclear safety and security were developed in addition to the existing nuclear engineering program; 1) Environmental Dynamics of Radioactive Nuclides; Numerical simulation of the environmental dispersion of radioactive materials released from hypothetical nuclear accidents and evaluation of the public exposure are performed, by using a computer-based emergency response system, to have students predict the environmental dispersion of radionuclides and radiological consequence by nuclear accidents. 2) Measurement of Environmental Radiation; Students acquire hands-on experiences measuring environmental radiation contamination caused by the nuclear accident in Fukushima with multiple types of radiation detectors. Environmental samples are collected and analyzed for isotope identification and its spatial distribution. 3) Simulation of Severe Nuclear Accidents; The evaluation results of Fukushima accident progression are discussed as well as typical sever accidents that threaten the integrity of reactor vessel. Students simulate BWR (Boiling Water Cooled Reactor) transients, design basis accidents, and severe accidents by using simulators. 4) Nuclear Security Training; Design of physical protection systems, its fundamental physics, and regulatory frameworks are covered and students gain the practical experiences by use of intrusion detection systems at JAEA (Japan Atomic Energy Agency), and by numerical simulation of hydro-dynamics of structure material and nuclear material criticality at the university. (author)

  5. ENVIRONMENTAL TECHNOLOGIES IN ROMANIAN IT

    Directory of Open Access Journals (Sweden)

    STEGAROIU CARINA

    2014-12-01

    Full Text Available In Romania, key ICT and environmental legislation was adopted during the EU accession process, in the form of national adaptations of EU directives. There is coherent climate change legislation, a strategy and a detailed implementation plan in place in Romania, although it is lagging behind EU standards in terms of implementation. It is possible for Romania to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings. In this paper, we will focus on two areas pertaining to Romania’s environment policies,

  6. HEMISPHERIC CENTER FOR ENVIRONMENTAL TECHNOLOGY

    Energy Technology Data Exchange (ETDEWEB)

    M.A. Ebadian

    2000-01-31

    The Online Measurement of Decontamination project team received a commitment for a demonstration in May from the Sacramento (California) Municipal Utility District (SMUD) Rancho Seco site. Since this site is a member of the DOE Commercial Utilities Consortium, the demonstration will fulfill the DOE and commercial technology demonstration requirements. Discussion on deployment of the Integrated Vertical and Overhead Decontamination (IVOD) System at Rancho Seco was conducted; date for deployment tentatively scheduled for early spring. Based upon fictional requirements from SRS for a shiny monitor in a high-level waste tank, FIU-HCET developed and delivered a draft slurry monitor design and draft test plan. Experiments measuring slurry settling time for SRS slurry simulant at 10 wt% have been completed on FIU-HCET'S flow loop with SRS dip. The completed design package of the test mockup for evaluating Non-Intrusive Location of Buried Items Technologies was sent to Fluor Fernald and the Operating Engineers National Hazmat Program for review. Comments are due at the end of January. Preliminary experiments to determine size distribution of aerosols generated during metal cutting were performed. A 1/4-inch-thick iron plate was cut using a plasma arc torch, and the size distribution of airborne particles was measured using a multistage impactor. Per request of DOE-Ohio, FIU-HCET participated in a weeklong value engineering study for the characterization, decontamination, and dismantlement of their critical path facility.

  7. The Role of Agricultural Technology in Food and Nutritional Security ...

    African Journals Online (AJOL)

    Strengthening of agricultural research and extension. The development and utilization of profitable and environmentally-friendly technology is an essential factor for the transformation of agriculture into a modern sector. The impact of technology can be attained through the revitalization of agricultural research and extension ...

  8. After Globalization Future Security in a Technology Rich World

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin,T J

    2001-08-17

    Over the course of the year 2000, five workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats to international security in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. The participants included US national leaders and experts from the Department of Energy National Laboratories; the Department of Defense: Army, Navy, Air Force, Office of the Secretary of Defense, Defense Threat Reduction Agency, and Defense Advanced Research Projects Agency; the Department of State, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. The threats ranged from local/regional to global, from intentional to unintended to natural, from merely economic to massively destructive, and from individual and group to state actions. We were not concerned in this exercise with defining responses to the threats, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be executed or countered. At the concluding review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and national responsibility, and discussed the workshop findings to determine what is most certain or uncertain, and what might be needed to resolve our uncertainties. This paper summarizes the consenses and

  9. Critical materialism: science, technology, and environmental sustainability.

    Science.gov (United States)

    York, Richard; Clark, Brett

    2010-01-01

    There are widely divergent views on how science and technology are connected to environmental problems. A view commonly held among natural scientists and policy makers is that environmental problems are primarily technical problems that can be solved via the development and implementation of technological innovations. This technologically optimistic view tends to ignore power relationships in society and the political-economic order that drives environmental degradation. An opposed view, common among postmodernist and poststructuralist scholars, is that the emergence of the scientific worldview is one of the fundamental causes of human oppression. This postmodernist view rejects scientific epistemology and often is associated with an anti-realist stance, which ultimately serves to deny the reality of environmental problems, thus (unintentionally) abetting right-wing efforts to scuttle environmental protection. We argue that both the technologically optimistic and the postmodernist views are misguided, and both undermine our ability to address environmental crises. We advocate the adoption of a critical materialist stance, which recognizes the importance of natural science for helping us to understand the world while also recognizing the social embeddedness of the scientific establishment and the need to challenge the manipulation of science by the elite.

  10. Environmental technology manual. Eisenmann Umwelttechnik

    Energy Technology Data Exchange (ETDEWEB)

    1983-01-01

    One part of the manual is dedicated to the removal of air pollution in the industrial sector, a conspectus of the bases of waste air cleaning is followed by explanations on modern cleaning methods and the pertaining installations. Under the catchword ''practice of waste air cleaning'' solution examples from the most different industrial sectors are presented, hints for planning, operation and maintenance given and some important characteristic data summed up in tables. The chapter on waste water addresses first of all operating personnel from industry and the service sector, providing aids to that group for the solution of waste water problems. A brief conspectus on the bases of waste water treatment is followed by a detailed description of the cleaning methods in use today and the pertaining installations. After practical examples and hints for operating and maintenance of waste water plants, tables on chemicals, pollutants and discharge conditions are given. The technology ''energy from waste material'' concentrates on the utilization of combustible wastes for energy production. The following possibilities are at hand: combustion, pyrolysis, and gasification.

  11. After globalization future security in a technology rich world

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin, T J

    2000-02-12

    Over the course of the year 2000, five one-day workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats that might come against the US and its allies in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. In December, an Integration Workshop and Senior Review before national leaders and experts were held. The participants and reviewers were invited from the DOE National Laboratories, the DOD Services, OSD, DTRA, and DARPA, the DOS, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on national security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. We were not concerned in this exercise with defining responses, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be countered. At the concluding Integration Workshop and Senior Panel Review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and responsibility, and discussed the workshop findings to determine what is most certain, and uncertain, and what might be needed to resolve our uncertainties. This document reports the consensus and important variations of both the reviewers and the participants. In all, 45 threats over a wide range of lethality and probability of occurrence were identified. Over 60 enabling technologies were also discussed. These are

  12. Environmental issues affecting clean coal technology deployment

    Energy Technology Data Exchange (ETDEWEB)

    Miller, M.J. [Electric Power Research Inst., Palo Alto, CA (United States)

    1997-12-31

    The author outlines what he considers to be the key environmental issues affecting Clean Coal Technology (CCT) deployment both in the US and internationally. Since the international issues are difficult to characterize given different environmental drivers in various countries and regions, the primary focus of his remarks is on US deployment. However, he makes some general remarks, particularly regarding the environmental issues in developing vs. developed countries and how these issues may affect CCT deployment. Further, how environment affects deployment depends on which particular type of clean coal technology one is addressing. It is not the author`s intention to mention many specific technologies other than to use them for the purposes of example. He generally categorizes CCTs into four groups since environment is likely to affect deployment for each category somewhat differently. These four categories are: Precombustion technologies such as coal cleaning; Combustion technologies such as low NOx burners; Postcombustion technologies such as FGD systems and postcombustion NOx control; and New generation technologies such as gasification and fluidized bed combustion.

  13. Environmental impacts from the solar energy technologies

    International Nuclear Information System (INIS)

    Tsoutsos, Theocharis; Frantzeskaki, Niki; Gekas, Vassilis

    2005-01-01

    Solar energy systems (photovoltaics, solar thermal, solar power) provide significant environmental benefits in comparison to the conventional energy sources, thus contributing, to the sustainable development of human activities. Sometimes however, their wide scale deployment has to face potential negative environmental implications. These potential problems seem to be a strong barrier for a further dissemination of these systems in some consumers. To cope with these problems this paper presents an overview of an Environmental Impact Assessment. We assess the potential environmental intrusions in order to ameliorate them with new technological innovations and good practices in the future power systems. The analysis provides the potential burdens to the environment, which include - during the construction, the installation and the demolition phases, as well as especially in the case of the central solar technologies - noise and visual intrusion, greenhouse gas emissions, water and soil pollution, energy consumption, labour accidents, impact on archaeological sites or on sensitive ecosystems, negative and positive socio-economic effects

  14. THE ENERGY COMPONENT OF THE ENVIRONMENTAL SECURITY: UKRAINE IN THE MIRROR

    Directory of Open Access Journals (Sweden)

    G. Kharlamova

    2015-03-01

    Full Text Available Energy security is important for any state. It is important for the state’s environment and economy. Ukraine is an energy dependent state, as well as an import-energy dependent one. The paper is devoted to the statistical analyses of Ukrainian energy sector from the position of its world representation. The purpose of this research is on the base of statistical analysis of current internal and external trends in the energy sector of Ukraine to consider possible mechanisms to stimulate and accelerate environmental-friendly energy security of Ukraine. Main objectives: to trace the dynamics of world and Ukrainian main energy indicators in the synergy with the state energy security index; to cluster launched efficiency-targeted energy projects in Ukraine in geoindustry aspect. Analyses of dynamics of energetic vs environmental performance of Ukraine in 2000–2014 world ranks shows that being in low segment of world rankings on aspects of energy and environmental security, Ukraine shows positive tendencies to the improvement, however with slow steps. In order to identify the most promising and most attractive sector of the economy in Ukraine to investors we held grouping of current launching energy-efficient projects in the aspect of industries and sectors where energy-efficient technologies operate. The rank analyses depicted that the most popular among economic sectors for energyefficiency investments are enterprises of agriculture and consumer goods industry, and the most attractive regions of Ukraine for implementation of investments in energy efficient technologies are Ivano-Frankivsk, Luhansk and Kherson oblasts.

  15. Nevada National Security Site Environmental Report 2012 Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy A

    2013-09-11

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  16. Nevada National Security Site Environmental Report 2016, Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    Wills, Cathy [National Security Technologies, LLC. (NSTec), Mercury, NV (United States)

    2017-09-07

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2016 (prepared by National Security Technologies, LLC [NSTec], 2017). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological settings and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  17. Nevada National Security Site Environmental Report 2013 Attachment A: Site Description

    Energy Technology Data Exchange (ETDEWEB)

    Wills, C.

    2014-09-09

    This attachment expands on the general description of the Nevada National Security Site (NNSS) presented in the Introduction to the Nevada National Security Site Environmental Report 2012 (National Security Technologies, LLC [NSTec], 2013). Included are subsections that summarize the site’s geological, hydrological, climatological, and ecological setting and the cultural resources of the NNSS. The subsections are meant to aid the reader in understanding the complex physical and biological environment of the NNSS. An adequate knowledge of the site’s environment is necessary to assess the environmental impacts of new projects, design and implement environmental monitoring activities for current site operations, and assess the impacts of site operations on the public residing in the vicinity of the NNSS. The NNSS environment contributes to several key features of the site that afford protection to the inhabitants of adjacent areas from potential exposure to radioactivity or other contaminants resulting from NNSS operations. These key features include the general remote location of the NNSS, restricted access, extended wind transport times, the great depths to slow-moving groundwater, little or no surface water, and low population density. This attachment complements the annual summary of monitoring program activities and dose assessments presented in the main body of this report.

  18. Integrating energy and environmental goals. Investment needs and technology options

    International Nuclear Information System (INIS)

    2004-04-01

    Economic and population growth will continue to drive an expansion of the global energy market. The Earth's energy resources are undoubtedly adequate to meet rising demand for at least the next three decades. But the projected increases in energy consumption and market developments raise serious concerns about the security of energy supplies, investment in energy infrastructure, the threat of environmental damage caused by energy use and the uneven access of the world's population to modern energy. The first two sections of this background paper provide an outlook for energy demand and emissions over the next thirty years, based on findings in the IEA's World Energy Outlook 2002. Section four presents projections for global investment needs from the latest WEO publication, the World Energy Investment Outlook 2003. For both the energy and investment outlooks, an alternative scenario for OECD countries is examined. The scenarios describe a world in which environmental and energy supply security concerns will continue to plague policy makers. Clearly, changes in power generation, automotive engines and fuel technologies will be required to change trends in energy demand and emissions over the next thirty years and beyond. Improvements in energy efficiency will also play a fundamental role. A number of technologies offer the long term potential to diversify the energy sector away from its present heavy reliance on fossil fuels. Based on various IEA studies, section five evaluates those technologies that offer the potential to reduce emissions, including renewable energy, fossil-fuel use with CO2 capture and storage, nuclear, hydrogen, biofuels and efficient energy end use. No single technology can meet the challenge by itself. Different regions and countries will require different combinations of technologies to best serve their needs and best exploit their indigenous resources. Developing countries, in particular, will face far greater challenges in the years ahead

  19. Blockchain Technology: A new secured Electronic Health Record System

    OpenAIRE

    Tamazirt , Lotfi; Alilat , Farid; Agoulmine , Nazim

    2018-01-01

    International audience; Nowadays, health systems are looking for effective ways to manage more patients in a shorter time, and to increase the quality of care through better coordination to provide quick, accurate and non-invasive diagnostics to patients. This paper aims to solve the dependence on trusted third parties by proposing a new management strategy, storage and security in a decentralized network through Blockchain technology. The proposed system also aims to offer a solution to help...

  20. Proceedings of the 1989 Carnahan conference on security technology

    International Nuclear Information System (INIS)

    DeVore, R.W.

    1989-01-01

    This book contains the proceedings of the 1989 Carnahan conference on security technology and crime countermeasures. Topics covered include: study of methods for the enhancement of classified document control and protection; research and development of a portable microfocus x-ray system capable of providing ultra-high resolution images of improvised explosive devices; and BombCAD - a CAD-based technique for assessing bomb vulnerability and designing and evaluating bomb defense measures

  1. The Western Environmental Technology Office (WETO), Butte, Montana. Technology summary

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    The Western Environmental Technology Office (WETO) is a multi-purpose engineering test facility located in Butte, Montana, and is managed by MSE, Inc. WETO seeks to contribute to environmental research by emphasizing projects to develop heavy metals removal and recovery processes, thermal vitrification systems, and waste minimization/pollution prevention technologies. WETO`s environmental technology research and testing activities focus on the recovery of usable resources from waste. In one of WETO`s areas of focus, groundwater contamination, water from the Berkeley Pit, located near the WETO site, is being used in demonstrations directed toward the recovery of potable water and metal from the heavy metal-bearing water. The Berkeley Pit is part of an inactive copper mine near Butte that was once part of the nation`s largest open-pit mining operation. The Pit contains approximately 25 billion gallons of Berkeley Pit groundwater and surface water containing many dissolved minerals. As part of DOE/OST`s Resource Recovery Project (RRP), technologies are being demonstrated to not only clean the contaminated water but to recover metal values such as copper, zinc, and iron with an estimated gross value of more than $100 million. When recovered, the Berkeley Pit waters could benefit the entire Butte valley with new water resources for fisheries, irrigation, municipal, and industrial use. At WETO, the emphasis is on environmental technology development and commercialization activities, which will focus on mine cleanup, waste treatment, resource recovery, and water resource management.

  2. The Western Environmental Technology Office (WETO), Butte, Montana. Technology summary

    International Nuclear Information System (INIS)

    1996-03-01

    The Western Environmental Technology Office (WETO) is a multi-purpose engineering test facility located in Butte, Montana, and is managed by MSE, Inc. WETO seeks to contribute to environmental research by emphasizing projects to develop heavy metals removal and recovery processes, thermal vitrification systems, and waste minimization/pollution prevention technologies. WETO's environmental technology research and testing activities focus on the recovery of usable resources from waste. In one of WETO's areas of focus, groundwater contamination, water from the Berkeley Pit, located near the WETO site, is being used in demonstrations directed toward the recovery of potable water and metal from the heavy metal-bearing water. The Berkeley Pit is part of an inactive copper mine near Butte that was once part of the nation's largest open-pit mining operation. The Pit contains approximately 25 billion gallons of Berkeley Pit groundwater and surface water containing many dissolved minerals. As part of DOE/OST's Resource Recovery Project (RRP), technologies are being demonstrated to not only clean the contaminated water but to recover metal values such as copper, zinc, and iron with an estimated gross value of more than $100 million. When recovered, the Berkeley Pit waters could benefit the entire Butte valley with new water resources for fisheries, irrigation, municipal, and industrial use. At WETO, the emphasis is on environmental technology development and commercialization activities, which will focus on mine cleanup, waste treatment, resource recovery, and water resource management

  3. 76 FR 45645 - 10-Day Notice of Proposed Information Collection: Technology Security/Clearance Plans, Screening...

    Science.gov (United States)

    2011-07-29

    ...: Technology Security/Clearance Plans, Screening Records, and Non-Disclosure Agreements ACTION: Notice of... Information Collection: Technology Security/ Clearance Plans, Screening Records, and Non-Disclosure Agreements...: None. Respondents: Business and Nonprofit Organizations, Foreign Governments. Estimated Number of...

  4. Environmental assessment for the Processing and Environmental Technology Laboratory (PETL)

    International Nuclear Information System (INIS)

    1995-09-01

    The U.S. Department of Energy (DOE) has prepared an environmental assessment (EA) on the proposed Processing and Environmental Technology Laboratory (PETC) at Sandia National Laboratories/New Mexico (SNL/NM). This facility is needed to integrate, consolidate, and enhance the materials science and materials process research and development (R ampersand D) currently in progress at SNL/NM. Based on the analyses in the EA, DOE has determined that the proposed action is not a major Federal action significantly affecting the quality of the human environment within the meaning of the National Environmental Policy Act (NEPA) of 1969. Therefore, an environmental impact statement is not required, and DOE is issuing this Finding of No Significant Impact (FONSI)

  5. Environmental assessment for the Processing and Environmental Technology Laboratory (PETL)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-09-01

    The U.S. Department of Energy (DOE) has prepared an environmental assessment (EA) on the proposed Processing and Environmental Technology Laboratory (PETC) at Sandia National Laboratories/New Mexico (SNL/NM). This facility is needed to integrate, consolidate, and enhance the materials science and materials process research and development (R&D) currently in progress at SNL/NM. Based on the analyses in the EA, DOE has determined that the proposed action is not a major Federal action significantly affecting the quality of the human environment within the meaning of the National Environmental Policy Act (NEPA) of 1969. Therefore, an environmental impact statement is not required, and DOE is issuing this Finding of No Significant Impact (FONSI).

  6. A Survey On Biometric Security Technologies From Cloud Computing Perspective

    Directory of Open Access Journals (Sweden)

    Shivashish Ratnam

    2015-08-01

    Full Text Available Cloud computing is one of the rising technologies that takes set of connections users to the next level. Cloud is a technology where resources are paid as per usage rather than owned. One of the major challenges in this technology is Security. Biometric systems provide the answer to ensure that the rendered services are accessed only by a legal user or an authorized user and no one else. Biometric systems recognize users based on behavioral or physiological characteristics. The advantages of such systems over traditional validation methods such as passwords and IDs are well known and hence biometric systems are progressively gaining ground in terms of usage. This paper brings about a new replica of a security system where in users have to offer multiple biometric finger prints during Enrollment for a service. These templates are stored at the cloud providers section. The users are authenticated based on these finger print designed templates which have to be provided in the order of arbitrary numbers or imaginary numbers that are generated every time continuously. Both finger prints templates and images are present and they provided every time duration are encrypted or modified for enhanced security.

  7. 76 FR 77776 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2011-12-14

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... Energy & Environmental Industries (OEEI), International Trade Administration, Room 4053, 1401...

  8. 76 FR 51001 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2011-08-17

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... Energy & Environmental Industries (OEEI), International Trade Administration, Room 4053, 1401...

  9. 76 FR 26247 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2011-05-06

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... & Environmental Industries (OEEI), International Trade Administration, Room 4053, 1401 Constitution Ave, NW...

  10. 78 FR 46921 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2013-08-02

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... Hinman, Office of Energy & Environmental Industries (OEEI), International Trade Administration, Room 4053...

  11. 77 FR 58356 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2012-09-20

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... Energy & Environmental Industries (OEEI), International Trade Administration, Room 4053, 1401...

  12. 78 FR 4834 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2013-01-23

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The meeting is... Energy & Environmental Industries (OEEI), International Trade Administration, Room 4053, 1401...

  13. Managing nutrient for both food security and environmental sustainability in China: an experiment for the world

    Directory of Open Access Journals (Sweden)

    Fusuo ZHANG, Zhenling CUI, Weifeng ZHANG

    2014-02-01

    Full Text Available The challenges of how to simultaneously ensure global food security, improve nitrogen use efficiency (NUE and protect the environment have received increasing attention. However, the dominant agricultural paradigm still considers high yield and reducing environmental impacts to be in conflict with one another. Here we examine a Three-Step-Strategy of past 20 years to produce more with less in China, showing that tremendous progress has been made to reduce N fertilizer input without sacrificing crop yield. The first step is to use technology for in-season root-zone nutrient management to significantly increase NUE. The second is to use technology for integrated nutrient management to increase both yield and NUE by 15%—20%. The third step is to use technology for integrated soil-crop system management to increase yield and NUE by 30%—50% simultaneously. These advances can thus be considered an effective agricultural paradigm to ensure food security, while increasing NUE and improving environmental quality.

  14. SIHTI 2 - Energy and environmental technology

    International Nuclear Information System (INIS)

    Saviharju, K.; Johansson, A.

    1993-01-01

    The programme is divided into system and technology parts. The aim of system studies is to determine, on the basis of lifecycle analyses, long-term environmental-technological aims for various fields (energy, industry) and to find out an optimum strategy for reaching these aims. The analysis will give data on emission reduction costs and on fields, where technical improvements are required, and will determine the limits set by environmental factors for future technical development. Environmental impacts will be discussed from national and economic viewpoints. Technological development is dependent on new ideas. The aim is to indicate possibilities for reducing emissions from energy use of peat and wood, for low-emission production at least on one industrial field (wood-processing industry), to establish emission measuring and control methods, to indicate utilization alternatives for solid matter separated at power plants, and to find out operable alternatives for the energy use of wastes. Other ventures of significance will also be financed: survey of 'new' emissions and development of their measuring and purification methods. The field of the programme will be divided into synergic sub-fields: systematics of emission chains, fields of operation (energy and environment problems in the wood-processing industries), development of flue gas purification technology, measuring and control technology, by-products of power plants, emissions from peat production, etc

  15. Environmental characteristics of clean coal technologies

    International Nuclear Information System (INIS)

    Bossart, S.J.

    1992-01-01

    The Department of Energy's (DOE) Clean Coal Technology (CCT) Program is aimed at demonstrating the commercial readiness of advanced coal-based technologies. A major goal of the CCT program is to introduce into the US energy marketplace those coal-based power generation technologies that have superior economic and environmental performance over the current suite of commercial coal-based power generation technologies. The commercialization of CCTs will provide the electric utility industry with technology options for replacing aging power plants and meeting future growth in electricity demand. This paper discusses the environmental advantages of two CCTs used for electric power generation: pressurized fluidized-bed combustion (PFBC) and integrated gasification combined-cycle (IGCC). These CCTs are suitable for repowering existing power plants or for grassroots construction. Due to their high efficiency and advanced environmental control systems, they emit less sulfur dioxide (SO 2 ), nitrogen oxides (NO x ), particulate matter, and carbon dioxide (CO 2 ) than a state-of-the-art, pulverized coal power plant with flue gas desulfurization (PC/FGD)

  16. High-Performance Secure Database Access Technologies for HEP Grids

    Energy Technology Data Exchange (ETDEWEB)

    Matthew Vranicar; John Weicher

    2006-04-17

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the

  17. High-Performance Secure Database Access Technologies for HEP Grids

    International Nuclear Information System (INIS)

    Vranicar, Matthew; Weicher, John

    2006-01-01

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist's computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that 'Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications'. There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure

  18. Developing innovative environmental technologies for DOE needs

    International Nuclear Information System (INIS)

    Devgun, J.S.; Sewell, I.O.; DeGregory, J.

    1995-01-01

    Environmental restoration and waste management activities at US Department of Energy (DOE) facilities are diverse and complex. Contamination at DOE sites and facilities includes radionuclides, chlorinated hydrocarbons, volatile organic compounds, non-aqueous phase liquids, and heavy metals, among others. Soil and groundwater contamination are major areas of concern and DOE has focused very significant efforts in these areas. Relevant technology development activities are being conducted at DOE's own national laboratories, as well as through collaborative efforts with other federal agencies and the private sector. These activities span research and development (R ampersand D) of new concepts and techniques to demonstration and commercialization of mature technologies. Since 1990, DOE has also supported R ampersand D of innovative technologies through interagency agreements with US Environmental Protection Agency (EPA), US Department of Defense, the National Science Foundation, and others

  19. Technology needs assessment for DOE environmental restoration programs

    International Nuclear Information System (INIS)

    Duray, J.R.; Carlson, T.J.; Carpenter, C.E.; Cummins, L.E.; Daub, G.J.

    1992-01-01

    The 'Technology Needs Assessment Final Report' describes current and planned environmental restoration activity, identifies technologies intended to be used or under consideration, and ranks technology deficiencies in the U.S. Department of Energy's environmental restoration program. Included in the ranking are treatment technologies, characterization technologies, and non-technology issues that affect environmental restoration. Data used for the assessment was gathered during interviews in the spring of 1991 with DOE site personnel responsible for the environmental restoration work. (author)

  20. Security training with interactive laser-video-disk technology

    International Nuclear Information System (INIS)

    Wilson, D.

    1988-01-01

    DOE, through its contractor EG and G Energy Measurements, Inc., has developed a state-of-the-art interactive-video system for use at the Department of Energy's Central Training Academy. Called the Security Training and Evaluation Shooting System (STRESS), the computer-driven decision shooting system employs the latest is laservideo-disk technology. STRESS is designed to provide realistic and stressful training for security inspectors employed by the DOE and its contractors. The system uses wide-screen video projection, sophisticated scenario-branching technology, and customized video scenarios especially designed for the DOE. Firing a weapon that has been modified to shoot ''laser bullets,'' and wearing a special vest that detects ''hits'': the security inspector encounters adversaries on the wide screen who can shoot or be shot by the inspector in scenarios that demand fast decisions. Based on those decisions, the computer provides instantaneous branching to different scenes, giving the inspector confrontational training with the realism and variability of real life

  1. Environmental support, energy security and economic growth in Japan

    International Nuclear Information System (INIS)

    Gasparatos, Alexandros; Gadda, Tatiana

    2009-01-01

    This study investigates the resource consumption of Japanese society since 1979 and its subsequent effects on the economic output of the nation and the environment. In order to quantify resource appropriation and trends in production and consumption, the concept of emergy synthesis is employed. Our results show a significant increase in the total amount of emergy consumed by 66.9% between 1979 and 2003 which comes hand in hand with an increase in the level of environmental stress by 93.7% (quantified as the environmental loading ratio). On the other hand the emergy required to produce 1 USD of economic output has been gradually decreasing which denotes an increase in the efficiency of the conversion of natural capital into economic output. What is most interesting though is the growing dependence of the Japanese economy on imported emergy, increasingly from developing nations, that severely affects the potential for unhindered economic growth. This can prove to be a big barrier that could affect the resource security of the Japanese economy and render it susceptible to risks associated with access to natural resources which in turn can jeopardise its long-term economic sustainability.

  2. Secure Data Exchange in Environmental Health Monitoring System through Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Amang Sudarsono

    2016-04-01

    Full Text Available Recently, disseminating latest sensory information regarding the status of environmental health in the surroundings of human life is one of very important circumstances which must be known by everyone. These circumstances should be accessible at anytime and anywhere by everyone through any type of end-user devices, both fixed and mobile devices, i.e., Desktop PCs, Laptop PCs, and Smartphones. Wireless Sensor Network (WSN is one of the networks which deals with data sensors distribution from sensor nodes to the gateway node toward a Data Center Server. However, there is a big possibility for many adversaries to intercept and even manipulate data sensors crossing the network. Hence, a secure data sensor exchange in the system would be strongly desirable. In this research, we propose an environmental health conditions monitoring system through WSN and its implementation with considering secure data sensor exchange within the network and secure data sensor access. This work may contribute to support a part of smart cities and take in part the Internet of Thing (IoT technology. In our proposed system, we collect some environmental health information such as temperature, humidity, luminosity, noise, carbon monoxide (CO and carbon dioxide (CO2 from sensor nodes. We keep the confidentiality and integrity of transmitted data sensors propagating through IEEE802.15.4-based communication toward a gateway node. Further, the collected data sensors in the gateway are synchronized to the Data Center Server through a secure TCP/IP connection for permanently storing. At anytime and anywhere, only legitimated users who successfully pass-through an attribute-based authentication system are able to access the data sensors.

  3. Technology Evaluation for Environmental Risk Mitigation Compendium

    Science.gov (United States)

    Meinhold, A.; Greene, B.; Dussich, J.; Sorkin, A.; Olsen, W.

    2017-01-01

    The Technology Evaluation for Environmental Risk Mitigation (TEERM) Principal Center and its predecessor organization the Acquisition Pollution Prevention Program (AP2) supported the National Aeronautics and Space Administration (NASA) in identifying technology solutions to risks and costs to NASA programs driven by environmental regulations and requirements. TEERM researched the commercial and government marketplace to locate viable and available technologies that met NASAs needs. TEERM focused on addressing environmentally-driven risks of direct concern to NASA programs and facilities, including hazardous materials in NASA operations and materials that became obsolescent because of environmental regulations. TEERM projects aimed to reduce cost; ensure the health and safety of people, assets, and the environment; promote efficiency; and minimize duplication. Major TEERM and AP2 projects focused on waste minimization and hazardous waste treatment, recycling, corrosion prevention and control, solvent and ozone depleting substances substitution, and aqueous based cleaners. In 2017, NASA made the decision to terminate the TEERM Principal Center. This Compendium Report documents TEERM and AP2 project successes. The Compendium Report traces the evolution of TEERM based on evolving risks and requirements for NASA and its relationship to the Space Shuttle Program, the United States Department of Defense, the European Space Agency, and other public and private stakeholders. This Compendium Report also documents project details from Project Summaries and Joint Test Plans and describes project stakeholders and collaborative effort results.

  4. Divison of Environmental Control Technology program, 1978

    Energy Technology Data Exchange (ETDEWEB)

    Mott, William E.

    1979-06-01

    This report covers Division of Environmental Control Technology projects in progress during FY 1978, within the Office of the Assistant Secretary for Environment, Department of Energy. It is the second in a planned series of annual reports. The Division of Environmental Control Technology (ECT) continues to support the Assistant Secretary for Environment (EV) in discharging two primary responsibilities: (1) under the Environmental Engineering (EE) Program, the independent overview and assessment of environmental control aspects of both the U.S. Department of Energy's (DOE) research, development, and demonstration (RD and D) programs and the Nation's energy policies, and (2) under the Decontamination and Decommissioning Program, the reduction of potential environmental hazards at the radioactively contaminated sites that are presently owned or were formerly used by the Government. This report presents a short summary of objectives, approach, progress and results, future plans, and a reference bibliography for each research, development, or assessment project within the program areas described above.

  5. Abandonment: Technological, organisational and environmental challenges

    Energy Technology Data Exchange (ETDEWEB)

    Twomey, B.G. [Reverse Engineering Ltd., (United Kingdom)

    1996-12-31

    The paper deals with the abandonment of offshore wells. Decommissioning of offshore installations is a complex multi-disciplined issue, which raises a number of technical, organisational and environmental challenges. The success of a planned decommissioning operation depends on the development of a clear understanding of the complex blend of drivers which control the decommissioning process and their inter-relationship. Due to the complexity of the inter-relationship between the primary drivers one cannot separate the technological, organisational and environmental issues raised by the decommissioning of offshore installations. The optimal solution will be a compromise between all the decommissioning drivers mentioned in this paper. 5 figs., 3 tabs.

  6. Abandonment: Technological, organisational and environmental challenges

    International Nuclear Information System (INIS)

    Twomey, B.G.

    1996-01-01

    The paper deals with the abandonment of offshore wells. Decommissioning of offshore installations is a complex multi-disciplined issue, which raises a number of technical, organisational and environmental challenges. The success of a planned decommissioning operation depends on the development of a clear understanding of the complex blend of drivers which control the decommissioning process and their inter-relationship. Due to the complexity of the inter-relationship between the primary drivers one cannot separate the technological, organisational and environmental issues raised by the decommissioning of offshore installations. The optimal solution will be a compromise between all the decommissioning drivers mentioned in this paper. 5 figs., 3 tabs

  7. Environmental effects of information and communications technologies.

    Science.gov (United States)

    Williams, Eric

    2011-11-16

    The digital revolution affects the environment on several levels. Most directly, information and communications technology (ICT) has environmental impacts through the manufacturing, operation and disposal of devices and network equipment, but it also provides ways to mitigate energy use, for example through smart buildings and teleworking. At a broader system level, ICTs influence economic growth and bring about technological and societal change. Managing the direct impacts of ICTs is more complex than just producing efficient devices, owing to the energetically expensive manufacturing process, and the increasing proliferation of devices needs to be taken into account. © 2011 Macmillan Publishers Limited. All rights reserved

  8. Applications of microwave radiation environmental remediation technologies

    International Nuclear Information System (INIS)

    Krause, T.R.; Helt, J.E.

    1993-01-01

    A growing number of environmental remediation technologies (e.g., drying, melting, or sintering) utilize microwave radiation as an integral part of the process. An increasing number of novel applications, such as sustaining low-temperature plasmas or enhancing chemical reactivity, are also being developed. An overview of such technologies being developed by the Department of Energy is presented. A specific example being developed at Argonne National Laboratory, microwave-induced plasma reactors for the destruction of volatile organic compounds, is discussed in more detail

  9. Information technologies in environmental engineering. Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    Athanasiadis, Ioannis N.; Rizzoli, Andrea E. [Istituto dalle Molle di Studi sull' Intelligenza Artificiale (IDSIA), Manno (Switzerland); Mitkas, Pericles A. [Aristotle Univ. of Thessaloniki (Greece); Marx Gomez, Jorge (eds.) [Oldenburg Univ. (Germany). Abt. Wirtschaftsinformatik

    2009-07-01

    Information technologies have evolved to an enabling science for natural resource management and conservation, environmental engineering, scientific simulation and integrated assessment studies. Computing plays a significant role in every day practices of environmental engineers, natural scientists, economists, and social scientists. The complexity of natural phenomena requires interdisciplinary approaches, where computing science offers the infrastructure for environmental data collection and management, scientific simulations, decision support documentation and reporting. Ecology, environmental engineering and natural resource management comprise an excellent real-world testbed for IT system demonstration, while raising new challenges for computer science. Complexity, uncertainty and scaling issues of natural systems form a demanding application domain for sensor networks and earth observation systems; modelling, simulation and scientific workflows, data management and reporting, decision support and intelligent systems, distributed computing environments, geographical information systems, heterogeneous systems integration, software engineering, accounting systems and control systems. This books offers a collection of papers presented at the 4th International Symposium on Environmental Engineering, held in May 2009, in Thessaloniki, Greece. Recent success stories in ecoinformatics, promising ideas and new challenges are discussed among computer scientists, environmental engineers, economists and social scientists, demonstrating new paradigms for problem solving and decision making. (orig.)

  10. Electron Beam Technology for Environmental Pollution Control.

    Science.gov (United States)

    Chmielewski, Andrzej G; Han, Bumsoo

    2016-10-01

    Worldwide, there are over 1700 electron beam (EB) units in commercial use, providing an estimated added value to numerous products, amounting to 100 billion USD or more. High-current electron accelerators are used in diverse industries to enhance the physical and chemical properties of materials and to reduce undesirable contaminants such as pathogens, toxic byproducts, or emissions. Over the past few decades, EB technologies have been developed aimed at ensuring the safety of gaseous and liquid effluents discharged to the environment. It has been demonstrated that EB technologies for flue gas treatment (SO x and NO x removal), wastewater purification, and sludge hygienization can be effectively deployed to mitigate environmental degradation. Recently, extensive work has been carried out on the use of EB for environmental remediation, which also includes the removal of emerging contaminants such as VOCs, endocrine disrupting chemicals (EDCs), and potential EDCs.

  11. New environmental applications of radiation technology

    International Nuclear Information System (INIS)

    Pikaev, A.K.

    1998-01-01

    The paper is a brief review of recent data on environmental applications of radiation technology obtained with participation of the author. It includes the results of the study on combined electron-beam and ozone treatment of municipal wastewater in the aerosol flow and electron-beam purification of water from heavy metals (lead, cadmium, mercury, chromium) by two methods (in the presence of formate as an OH radical scavenger or sorbents of inorganic and plant origins)

  12. Environmental technologies of woody crop production systems

    Science.gov (United States)

    Ronald S. Zalesny Jr.; John A. Stanturf; Emile S. Gardiner; Gary S. Ba??uelos; Richard A. Hallett; Amir Hass; Craig M. Stange; James H. Perdue; Timothy M. Young; David R. Coyle; William L. Headlee

    2016-01-01

    Soil erosion, loss of productivity potential, biodiversity loss, water shortage, and soil and water pollution are ongoing processes that decrease or degrade provisioning (e.g., biomass, freshwater) and regulating (e.g., carbon sequestration, soil quality) ecosystem services. Therefore, developing environmental technologies that maximize these services is essential for...

  13. Putting environmental technologies into the mainstream

    DEFF Research Database (Denmark)

    Kannan, Devika; Diana, Gabriel Cepollaro; Jabbour, Charbel José Chiappetta

    2017-01-01

    of a new CSF called employee empowerment, which derives from learning and benchmarking initiatives. Two CSFs can be highlighted as the most relevant and unanimously present in both company “Alpha” and company “Beta”: support from senior management and employee empowerment through learning and benchmarking...... greater intensity in terms of CSFs than Alpha. This work can be considered one of the first researches relating CSFs and the adoption of environmental technologies in medium-sized firms in Brazil....

  14. Trends in Global Agricultural Land Use: Implications for Environmental Health and Food Security.

    Science.gov (United States)

    Ramankutty, Navin; Mehrabi, Zia; Waha, Katharina; Jarvis, Larissa; Kremen, Claire; Herrero, Mario; Rieseberg, Loren H

    2018-04-29

    The eighteenth-century Malthusian prediction of population growth outstripping food production has not yet come to bear. Unprecedented agricultural land expansions since 1700, and technological innovations that began in the 1930s, have enabled more calorie production per capita than was ever available before in history. This remarkable success, however, has come at a great cost. Agriculture is a major cause of global environmental degradation. Malnutrition persists among large sections of the population, and a new epidemic of obesity is on the rise. We review both the successes and failures of the global food system, addressing ongoing debates on pathways to environmental health and food security. To deal with these challenges, a new coordinated research program blending modern breeding with agro-ecological methods is needed. We call on plant biologists to lead this effort and help steer humanity toward a safe operating space for agriculture.

  15. 77 FR 59407 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2012-09-27

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... Security Challenges; Accelerating Innovation Through Systems Analysis; and Leveraging Industry for Impact... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0053] Homeland Security Science and...

  16. 78 FR 14101 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-03-04

    ... Secretary for Science and Technology, such as new developments in systems engineering, cyber-security... HSSTAC input on how to improve that collaboration. --Cyber Security and the evolution of the Cyber... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0014] Homeland Security Science and...

  17. 78 FR 66949 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-11-07

    ... Technology, such as new developments in systems engineering, cyber-security, knowledge management and how... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0071] Homeland Security Science and... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Science and...

  18. Coping with global environmental change, disasters and security: threats, challenges, vulnerabilities and risks

    NARCIS (Netherlands)

    Brauch, H.G.; Oswald Spring, Ú.; Mesjasz, C.; Grin, J.; Kameri-Mbote, P.; Chourou, B.; Dunay, P.; Birkmann, J.

    2011-01-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10

  19. Environmental consequences of new energy technology

    International Nuclear Information System (INIS)

    Svensson, Torbjoern

    1991-09-01

    This report summarises and assesses the environmental consequences associated with new energy technologies, with particular emphasis on their use for space heating supplies in the built environment. In the case of solar heating, it is primarily the processes associated with the production of the necessary materials and ground use requirements that can adversely affect the environment. There is also a certain risk associated with the leakage of heat transfer fluid. For heat stores, problem areas are primarily those associated with heating of the ground, discharge of foreign substances in connection with water treatment and conflicts of other users of ground water. The main adverse effects of heat pumps are their emissions of CFCs, which damage the ozone layer, utilisation of certain types of heat sources and the need to provide primary energy for mechanical drive of the pumps. All three of these new energy technologies are regarded as having less environmental consequences than conventional alternatives, although this assumes a change to less hazardous working media in heat pumps. A mutual comparison of the three technologies indicates that solar heating and heat stores have somewhat better environmental characteristics than heat pumps

  20. Security of the electricity supply. The area of conflict between profitability and environmental compatibility

    International Nuclear Information System (INIS)

    Praktiknjo, Aaron

    2013-01-01

    The scope of the book is on the one hand support for the power industry defining investment and sales strategies that intend optimum supply security in the view of the customer and on the other hand the information for energy and environmental politicians demonstrating the conflict of objectives. The following issues are covered: technical and organizational aspects of electricity supply, theoretical background of the security of electricity supply, security of supply for economic sections, security of electricity supply for private households: theoretical microeconomic approach, security of electricity supply for private households: method of defined preferences, security of electricity supply in the context of climate protection and nuclear phase-out.

  1. Involving stakeholders in evaluating environmental restoration technologies

    International Nuclear Information System (INIS)

    McCabe, G.H.; Serie, P.J.

    1993-02-01

    Involving citizens, interest groups, and regulators in environmental restoration and waste management programs is a challenge for government agencies and the organizations that support them. To be effective, such involvement activities must identify all individuals and groups who have a stake in the cleanup. Their participation must be early, substantive, and meaningful. Stockholders must be able to see how their input was considered and used, and feel that a good- faith effort was made to reconcile conflicting objectives. The Integrated Demonstration for Cleanup of Volatile Organic Compounds at Arid Sites (VOC-Arid ID) is a Department of Energy Office of Technology Development project located at Hanford. Along with technical evaluation of innovative cleanup technologies, the program is conducting an institutional assessment of regulatory and public acceptance of new technologies. Through a series of interviews and workshops, and use of a computerized information management tool, stakeholders are having a voice in the evaluation. Public and regulatory reaction has been positive

  2. Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security.

    Science.gov (United States)

    Pavone, Vincenzo; Esposti, Sara Degli

    2012-07-01

    As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.

  3. Science implementation of Forecast Mekong for food and environmental security

    Science.gov (United States)

    Turnipseed, D. Phil

    2012-01-01

    Forecast Mekong is a significant international thrust under the Delta Research and Global Observation Network (DRAGON) of the U.S. Geological Survey (USGS) and was launched in 2009 by the U.S. Department of State and the Foreign Ministers of Cambodia, Laos, Thailand, and Vietnam under U.S. Department of State Secretary Hillary R. Clinton's Lower Mekong Initiative to enhance U.S. engagement with countries of the Lower Mekong River Basin in the areas of environment, health, education, and infrastructure. Since 2009, the USGS has worked closely with the U.S. Department of State; personnel from Cambodia, Laos, Thailand, and Vietnam; nongovernmental organizations; and academia to collect and use research and data from the Lower Mekong River Basin to provide hands-on results that will help decisionmakers in future planning and design for restoration, conservation, and management efforts in the Lower Mekong River Basin. In 2012 Forecast Mekong is highlighting the increasing cooperation between the United States and Lower Mekong River Basin countries in the areas of food and environmental security. Under the DRAGON, Forecast Mekong continues work in interactive data integration, modeling, and visualization system by initiating three-dimensional bathymetry and river flow data along with a pilot study of fish distribution, population, and migratory patterns in the Lower Mekong River Basin. When fully developed by the USGS, in partnership with local governments and universities throughout the Mekong River region, Forecast Mekong will provide valuable planning tools to visualize the consequences of climate change and river management.

  4. ENVIRONMENTAL INNOVATIVE BUSINESS SOLUTIONS AS A STRATEGIC FACTOR OF ECONOMIC SECURITY ISSUES

    Directory of Open Access Journals (Sweden)

    A. S. Senin

    2016-01-01

    Full Text Available The relevance of this work lies in the fact that it attempts to disclose the key theoretical and practical issues of economic security solutions, taking into account the problems of global transformations taking place in the global economy. As part of the article we have been studied various aspects that characterize global economic, environmental trends that will shape the future of modern civilization. The article also addresses the problem of exit from the raw model of the economy, the formation of economic mechanisms that take into account environmental costs, proposed internalization of environmental externalities.The purpose/goal. The purpose of this article and its main task is to systematize the areas of environmentally oriented development of economic entities, as well as the determination of the list of key provisions of environmental policies, which will ensure the further socio-economic development of Russia in line with the green economy.Methods. In this article, based on content analysis of theoretical and empirical basic conceptual provisions of economic security were formulated in the context of eco-oriented production, the transition to which world civilization is currently implementing. It was concluded that the economic, energy, environmental and social issues of sustainable development of modern civilization is directly linked, so the transition to ecooriented production is possible, firstly, it provided aggressive reduction of production and wasteful use of traditional hydrocarbon resources, and, secondly, on the condition of rational replacement of traditional energy sources with renewable energy.Results. This article outlines the basic solutions that can be used to provide environmentally responsible operation and development of Russian business and corporate structures. Also offered in the basic decisions that are to be included in the national environmental policy as a major incentive for the further transition to a

  5. Comparing energy technology alternatives from an environmental perspective

    International Nuclear Information System (INIS)

    House, P.W.; Coleman, J.A.; Shull, R.D.; Matheny, R.W.; Hock, J.C.

    1981-02-01

    A number of individuals and organizations advocate the use of comparative, formal analysis to determine which are the safest methods for producing and using energy. Some have suggested that the findings of such analyses should be the basis upon which final decisions are made about whether to actually deploy energy technologies. Some of those who support formal comparative analysis are in a position to shape the policy debate on energy and environment. An opposing viewpoint is presented, arguing that for technical reasons, analysis can provide no definitive or rationally credible answers to the question of overall safety. Analysis has not and cannot determine the sum total of damage to human welfare and ecological communities from energy technologies. Analysis has produced estimates of particular types of damage; however, it is impossible to make such estimates comparable and commensurate across different classes of technologies and environmental effects. As a result of the deficiencies, comparative analysis connot form the basis of a credible, viable energy policy. Yet, without formal comparative analysis, how can health, safety, and the natural environment be protected. This paper proposes a method for improving the Nation's approach to this problem. The proposal essentially is that health and the environment should be considered as constraints on the deployment of energy technologies, constraints that are embodied in Government regulations. Whichever technologies can function within these constraints should then compete among themselves. This competition should be based on market factors like cost and efficiency and on political factors like national security and the questions of equity

  6. Report: Information Security Series: Security Practices Comprehensive Environmental Response, Compensation, and Liability Information System

    Science.gov (United States)

    Report #2006-P-00019, March 28, 2006. OSWER’s implemented practices to ensure production servers were being monitored for known vulnerabilities and personnel with significant security responsibility completed the Agency’s recommended security training.

  7. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, GROUNDWATER SAMPLING TECHNOLOGIES, GEOPROBE INC., PNEUMATIC BLADDER PUMP GW 1400 SERIES

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) design efficient processes for conducting has created the Environmental Technology perfofl1lance tests of innovative technologies. Verification Program (E TV) to facilitate the deployment of innovative or improved environmental techn...

  8. 76 FR 41274 - Committee Name: Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2011-07-13

    ..., cyber-security, knowledge management and how best to leverage related technologies funded by other... Science and Technology Advisory Committee (HSSTAC) ACTION: Committee Management; Notice of Federal... FURTHER INFORMATION CONTACT: Mary Hanson, HSSTAC Executive Director, Science and Technology Directorate...

  9. Archives: African Journal of Environmental Science and Technology

    African Journals Online (AJOL)

    Items 1 - 50 of 117 ... Archives: African Journal of Environmental Science and Technology. Journal Home > Archives: African Journal of Environmental Science and Technology. Log in or Register to get access to full text downloads.

  10. Technological Criteria Technology-Environmental under a Systemic Approach: Chemistry Technology Transfer

    OpenAIRE

    Durán-García Martín Enrique

    2014-01-01

    Currently the transfer of chemical technology is a process that contributes to the technology policy of a country, an industry or an organization in general chemistry. This process requires the application of clear criteria for the proper development of the complex interrelations in the transfer of chemical technology. A group of criteria that are present, are those related to environmental technology which intrinsically define the technology and its impact to the environment. Therefore, the ...

  11. Technological Criteria Technology-Environmental under a Systemic Approach: Chemistry Technology Transfer

    Directory of Open Access Journals (Sweden)

    Durán-García Martín Enrique

    2014-07-01

    Full Text Available Currently the transfer of chemical technology is a process that contributes to the technology policy of a country, an industry or an organization in general chemistry. This process requires the application of clear criteria for the proper development of the complex interrelations in the transfer of chemical technology. A group of criteria that are present, are those related to environmental technology which intrinsically define the technology and its impact to the environment. Therefore, the transfer of chemical technology requires technological-environmental criteria defining, in conjunction with other criteria, an adequate process for the selection, acquisition and incorporation of technology in a holistic perspective, so it provides feasible solutions the chemical industry in pursuit of their goals. Then the criterion becomes a benchmark for assessing an appropriate technology transfer process. We performed a theoretical analysis of the technological and environmental criteria, proposing thirty-six (36 technological-environmental criteria interrelated under a systemic approach in the process of transfer of chemical technology, focused on a methodological cycle first run, based primarily on the research-action method. Future research is expected to make a refinement of the criteria from the formulation and validation of metrics so that necessary adjustments are made to optimize the process of transfer of chemical technology.

  12. 77 FR 14734 - Environmental Technologies Trade Advisory Committee Public Meeting

    Science.gov (United States)

    2012-03-13

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... proposed agenda of a meeting of the Environmental Technologies Trade Advisory Committee (ETTAC). DATES: The... innovation in the environmental technology sector. Background: The ETTAC is mandated by Public Law 103-392...

  13. An evaluation of the ecological and environmental security on China's terrestrial ecosystems.

    Science.gov (United States)

    Zhang, Hongqi; Xu, Erqi

    2017-04-11

    With rapid economic growth, industrialization, and urbanization, various ecological and environmental problems occur, which threaten and undermine the sustainable development and domestic survival of China. On the national scale, our progress remains in a state of qualitative or semi-quantitative evaluation, lacking a quantitative evaluation and a spatial visualization of ecological and environmental security. This study collected 14 indictors of water, land, air, and biodiversity securities to compile a spatial evaluation of ecological and environmental security in terrestrial ecosystems of China. With area-weighted normalization and scaling transformations, the veto aggregation (focusing on the limit indicator) and balanced aggregation (measuring balanced performance among different indicators) methods were used to aggregate security evaluation indicators. Results showed that water, land, air, and biodiversity securities presented different spatial distributions. A relatively serious ecological and environmental security crisis was found in China, but presented an obviously spatial variation of security evaluation scores. Hotspot areas at the danger level, which are scattered throughout the entirety of the country, were identified. The spatial diversities and causes of ecological and environmental problems in different regions were analyzed. Spatial integration of regional development and proposals for improving the ecological and environmental security were put forward.

  14. New technologies - How to assess environmental effects

    Science.gov (United States)

    Sullivan, P. J.; Lavin, M. L.

    1981-01-01

    A method is provided for assessing the environmental effects of a room-and-pillar mining system (RP) and a new hydraulic borehole mining system (HBM). Before environmental assessment can begin, each technology is defined in terms of its engineering characteristics at both the conceptual and preliminary design stages. The mining sites are also described in order to identify the significant advantages and constraints for each system. This can be a basic physical and biological survey of the region at the conceptual stage, but a more specific representation of site characteristics is required at the preliminary stage. Assessment of potential environmental effects of each system at the conceptual design is critical to its hardware development and application. A checklist can be used to compare and identify the negative impacts of each method, outlining the resource affected, the type of impact involved, and the exact activity causing that impact. At the preliminary design stage, these impacts should be evaluated as a result of either utilization or alteration. Underground coal mining systems have three major utilization impacts - the total area disturbed, the total water resources withdrawn from other uses, and the overall energy efficiency of the process - and one major alteration impact - the degradation of water quality by sedimentation and acid contamination. A comparison of the RP and HBM systems shows the HBM to be an environmentally less desirable system for the Central Appalachia region.

  15. Development of environmental radiation control technology

    International Nuclear Information System (INIS)

    Han, M. H.; Kim, E. H.; Keum, D. K.; Kang, M. J.; Jang, B. W.

    2010-04-01

    The objectives of the study are to development of an urban atmospheric dispersion model and data assimilation technique for improving the reliability, to develop the technology for assessing the radiation impact to biota and the surface water transport model, to develop the analytical techniques for the indicator radionuclides on decommissioning of nuclear facilities and nuclear waste disposal sites and to assess of the national environmental radiation impact and establish the optimum management bases of natural radiation. The obtained results might be used; for assessing the radiological effects due to and radiological incident in an urban area, for assessing radiation doses on biota for the environmental protection from ionizing radiation with the application of new concept of the ICP new recommendation, for analyzing the indicator radionuclides on decommissioning of nuclear facilities and nuclear waste disposal sites, and for providing the natural radionuclide database of Korea to international organizations such as UNSCEAR. It can be used for emphasizing relative nuclear safety

  16. Achieving a secure energy future: Environmental and economic issues

    International Nuclear Information System (INIS)

    Pimentel, David; Herdendorf, M.; Eisenfeld, S.

    1994-01-01

    Energy, economics, and the environment are interdependent. Land, water, atmospheric, and biological resources are being degraded by current high energy consumption. U.S. energy consumption is the highest in the world and the U.S. Department of Energy reports that the United States has only about 10 years of known and potentially discoverable oil reserves. The U.S. should reduce its energy consumption by one half to help restore the quality of the environment while improving the American standard of living by strengthening the economy and increasing the number of jobs. Because of the interdependence of energy, economics, and the environment, energy efficiency and transition to renewable energy sources are critical. An estimated 40% of current energy consumption could be produced employing solar energy technologies, but would require about 20% of total U.S. land area. Therefore, the development of solar energy technologies to substitute for fossil energy is projected to compete for land required for agriculture and forestry as well as have other environmental impacts

  17. New decontamination technologies for environmental applications

    International Nuclear Information System (INIS)

    Allen, R.P.; Arrowsmith, H.W.; McCoy, M.W.

    1981-01-01

    The technologies discussed represent a versatile collection of tools and approaches for environmental decontamination applications. The fixatives provide a means for gaining and maintaining control of large contaminated areas, for decontaminating large surface areas, and for protecting equipment and supplies used in decontamination operations. The other decontamination techniques together provide a method for removing loose surface contamination from almost all classes of materials and surfaces. These techniques should have wide application both as direct decontamination processes and for the cleaning of tools and equipment used in the decontamination operations

  18. Single-cell technologies in environmental omics

    KAUST Repository

    Kodzius, Rimantas; Gojobori, Takashi

    2015-01-01

    Environmental studies are primarily done by culturing isolated microorganisms or by amplifying and sequencing conserved genes. Difficulties understanding the complexity of large numbers of various microorganisms in an environment led to the development of techniques to enrich specific microorganisms for upstream analysis, ultimately leading to single-cell isolation and analyses. We discuss the significance of single-cell technologies in omics studies with focus on metagenomics and metatranscriptomics. We propose that by reducing sample heterogeneity using single-cell genomics, metaomic studies can be simplified.

  19. Single-cell technologies in environmental omics

    KAUST Repository

    Kodzius, Rimantas

    2015-10-22

    Environmental studies are primarily done by culturing isolated microorganisms or by amplifying and sequencing conserved genes. Difficulties understanding the complexity of large numbers of various microorganisms in an environment led to the development of techniques to enrich specific microorganisms for upstream analysis, ultimately leading to single-cell isolation and analyses. We discuss the significance of single-cell technologies in omics studies with focus on metagenomics and metatranscriptomics. We propose that by reducing sample heterogeneity using single-cell genomics, metaomic studies can be simplified.

  20. Intelligent Facial Recognition Systems: Technology advancements for security applications

    Energy Technology Data Exchange (ETDEWEB)

    Beer, C.L.

    1993-07-01

    Insider problems such as theft and sabotage can occur within the security and surveillance realm of operations when unauthorized people obtain access to sensitive areas. A possible solution to these problems is a means to identify individuals (not just credentials or badges) in a given sensitive area and provide full time personnel accountability. One approach desirable at Department of Energy facilities for access control and/or personnel identification is an Intelligent Facial Recognition System (IFRS) that is non-invasive to personnel. Automatic facial recognition does not require the active participation of the enrolled subjects, unlike most other biological measurement (biometric) systems (e.g., fingerprint, hand geometry, or eye retinal scan systems). It is this feature that makes an IFRS attractive for applications other than access control such as emergency evacuation verification, screening, and personnel tracking. This paper discusses current technology that shows promising results for DOE and other security applications. A survey of research and development in facial recognition identified several companies and universities that were interested and/or involved in the area. A few advanced prototype systems were also identified. Sandia National Laboratories is currently evaluating facial recognition systems that are in the advanced prototype stage. The initial application for the evaluation is access control in a controlled environment with a constant background and with cooperative subjects. Further evaluations will be conducted in a less controlled environment, which may include a cluttered background and subjects that are not looking towards the camera. The outcome of the evaluations will help identify areas of facial recognition systems that need further development and will help to determine the effectiveness of the current systems for security applications.

  1. The research of network database security technology based on web service

    Science.gov (United States)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  2. Augmenting Space Technology Program Management with Secure Cloud & Mobile Services

    Science.gov (United States)

    Hodson, Robert F.; Munk, Christopher; Helble, Adelle; Press, Martin T.; George, Cory; Johnson, David

    2017-01-01

    The National Aeronautics and Space Administration (NASA) Game Changing Development (GCD) program manages technology projects across all NASA centers and reports to NASA headquarters regularly on progress. Program stakeholders expect an up-to-date, accurate status and often have questions about the program's portfolio that requires a timely response. Historically, reporting, data collection, and analysis were done with manual processes that were inefficient and prone to error. To address these issues, GCD set out to develop a new business automation solution. In doing this, the program wanted to leverage the latest information technology platforms and decided to utilize traditional systems along with new cloud-based web services and gaming technology for a novel and interactive user environment. The team also set out to develop a mobile solution for anytime information access. This paper discusses a solution to these challenging goals and how the GCD team succeeded in developing and deploying such a system. The architecture and approach taken has proven to be effective and robust and can serve as a model for others looking to develop secure interactive mobile business solutions for government or enterprise business automation.

  3. 14 CFR 1274.937 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-01-01

    ... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...

  4. 48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...

  5. 48 CFR 1252.239-71 - Information technology security plan and accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...

  6. Privacy and Security within Biobanking: The Role of Information Technology.

    Science.gov (United States)

    Heatherly, Raymond

    2016-03-01

    Along with technical issues, biobanking frequently raises important privacy and security issues that must be resolved as biobanks continue to grow in scale and scope. Consent mechanisms currently in use range from fine-grained to very broad, and in some cases participants are offered very few privacy protections. However, developments in information technology are bringing improvements. New programs and systems are being developed to allow researchers to conduct analyses without distributing the data itself offsite, either by allowing the investigator to communicate with a central computer, or by having each site participate in meta-analysis that results in a shared statistic or final significance result. The implementation of security protocols into the research biobanking setting requires three key elements: authentication, authorization, and auditing. Authentication is the process of making sure individuals are who they claim to be, frequently through the use of a password, a key fob, or a physical (i.e., retinal or fingerprint) scan. Authorization involves ensuring that every individual who attempts an action has permission to do that action. Finally, auditing allows for actions to be logged so that inappropriate or unethical actions can later be traced back to their source. © 2016 American Society of Law, Medicine & Ethics.

  7. Science and technology and their implications for peace and security

    International Nuclear Information System (INIS)

    1990-01-01

    The issue of scientific and technological developments in relation to international peace and security has recently attracted a great deal of interest in the international community, due partly to their enormous potential for the well-being of humanity and also to their enormous implications for instability in the world, an instability characterized as the 'quantitative arms race'. There is a growing concern that, in parallel with 'quantitative disarmament' between the major Powers and the East and West Europe, a new rivalry might develop and extend to the quantitative improvement of weapons, with world-wide consequences. The General Assembly of United Nations has considered this problem and adopted several resolutions on the matter. There has been a great deal of interest in the continuation of international dialogue on the subject

  8. Advanced Technologies for Intelligent Systems of National Border Security

    CERN Document Server

    Simek, Krzysztof; Świerniak, Andrzej

    2013-01-01

    One of the world’s leading problems in the field of national security is protection of borders and borderlands. This book addresses multiple issues on advanced innovative methods of multi-level control of both ground (UGVs) and aerial drones (UAVs). Those objects combined with innovative algorithms become autonomous objects capable of patrolling chosen borderland areas by themselves and automatically inform the operator of the system about potential place of detection of a specific incident. This is achieved by using sophisticated methods of generation of non-collision trajectory for those types of objects and enabling automatic integration of both ground and aerial unmanned vehicles. The topics included in this book also cover presentation of complete information and communication technology (ICT) systems capable of control, observation and detection of various types of incidents and threats. This book is a valuable source of information for constructors and developers of such solutions for uniformed servi...

  9. INTERNET SECURITYTECHNOLOGY AND SOCIAL AWARENESS OF THE DANGERS

    Directory of Open Access Journals (Sweden)

    Laskowski Piotr Paweł

    2017-06-01

    Full Text Available The article describes selected issues related to user safety on the Internet. This safety consists of a number of factors such as the technology that we use to communicate and to browse the Internet, and habits and behaviors that we have acquired and through which we can identify at least some typical hazards encountered on the Web. Knowledge of software and the ability to use it and to configure it properly as well as checking regularly for security updates reduces the risk of data loss or identity theft. Public awareness of threats continues to grow, but there are also new, previously unknown threats; that is why it is so important to inform of the dangers by all available channels of communication.

  10. Review of the model of technological pragmatism considering privacy and security

    Directory of Open Access Journals (Sweden)

    Kovačević-Lepojević Marina M.

    2013-01-01

    Full Text Available The model of technological pragmatism assumes awareness that technological development involves both benefits and dangers. Most modern security technologies represent citizens' mass surveillance tools, which can lead to compromising a significant amount of personal data due to the lack of institutional monitoring and control. On the other hand, people are interested in improving crime control and reducing the fear of potential victimization which this framework provides as a rational justification for the apparent loss of privacy, personal rights and freedoms. Citizens' perception on the categories of security and privacy, and their balancing, can provide the necessary guidelines to regulate the application of security technologies in the actual context. The aim of this paper is to analyze the attitudes of students at the University of Belgrade (N = 269 toward the application of security technology and identification of the key dimensions. On the basis of the relevant research the authors have formed assumptions about the following dimensions: security, privacy, trust in institutions and concern about the misuse of security technology. The Prise Questionnaire on Security Technology and Privacy was used for data collection. Factor analysis abstracted eight factors which together account for 58% of variance, with the highest loading of the four factors that are identified as security, privacy, trust and concern. The authors propose a model of technological pragmatism considering security and privacy. The data also showed that students are willing to change their privacy for the purpose of improving security and vice versa.

  11. Development of decontamination, decommissioning and environmental restoration technology

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Byung Jik; Kwon, H. S.; Kim, G. N. and others

    1999-03-01

    Through the project of 'Development of decontamination, decommissioning and environmental restoration technology', the followings were studied. 1. Development of decontamination and repair technology for nuclear fuel cycle facilities 2. Development of dismantling technology 3. Development of environmental restoration technology. (author)

  12. Development of decontamination, decommissioning and environmental restoration technology

    International Nuclear Information System (INIS)

    Lee, Byung Jik; Kwon, H. S.; Kim, G. N. and others

    1999-03-01

    Through the project of D evelopment of decontamination, decommissioning and environmental restoration technology , the followings were studied. 1. Development of decontamination and repair technology for nuclear fuel cycle facilities 2. Development of dismantling technology 3. Development of environmental restoration technology. (author)

  13. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT: EXEL INDUSTRIAL AIRMIX SPRAY GUN

    Science.gov (United States)

    The Environmental Technology Verification Program has partnered with Concurrent Technologies Corp. to verify innovative coatings and coating equipment technologies for reducing air emissions. This report describes the performance of EXEL Industrial's Kremlin Airmix high transfer ...

  14. Globalization and environmental challenges. Reconceptualizing security in the 21{sup st} century

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Mexico City (MX). Centro Regional de Investigaciones Multidisciplinarias (CRIM); Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Grin, John [Amsterdam Univ. (Netherlands). Dept. of Political Science; Dunay, Pal [Geneva Centre for Security Policy (Switzerland); Chadha Behera, Navnita [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Univ. of Tunis-Carthage, Hammam-Chatt (Tunisia); Kameri-Mbote, Patricia [Nairobi Univ. (Kenya), Dept. of Private Law; Liotta, P.H. (eds.) [Salve Regina Univ., Newport, RI (United States). Pell Center for International Relations and Public Policy

    2008-07-01

    Put quite simply, the twin impacts of globalization and environmental degradation pose new security dangers and concerns. In this comprehensive new work on global security thinking, 91 authors from five continents and many disciplines, from science and practice, assess the worldwide reassessment of the meaning of security triggered by the end of the Cold War and globalization, as well as the multifarious impacts of global environmental change in the early 21st century. Chapters address the theoretical, philosophical, ethical and religious and spatial context of security. They analyze the relationship between security, peace, development and environment. The authors move on to review the rethinking of security in international law, economics and political science, as well as in the key political, military and economic milieux. The book also examines the environmental security dimension and the adaptation of the institutional security concepts of the UN, EU and NATO, and analyzes the effect of change on regional security. Finally, it posits alternative security futures and draws conclusions for future research and action. (orig.)

  15. ASPECT (Airborne Spectral Photometric Environmental Collection Technology) Fact Sheet

    Science.gov (United States)

    This multi-sensor screening tool provides infrared and photographic images with geospatial, chemical, and radiological data within minutes to support emergency responses, home-land security missions, environmental surveys, and climate monitoring missions.

  16. Technology needs for environmental restoration remedial action. Environmental Restoration Program

    Energy Technology Data Exchange (ETDEWEB)

    Watson, J.S.

    1992-11-01

    This report summarizes the current view of the most important technology needs for the US Department of Energy (DOE) facilities operated by Martin Marietta Energy Systems, Inc. These facilities are the Oak Ridge National Laboratory, the Oak Ridge K-25 Site, the Oak Ridge Y-12 Plant, the Paducah Gaseous Diffusion Plant, and the Portsmouth Gaseous Diffusion Plant. The sources of information used in this assessment were a survey of selected representatives of the Environmental Restoration (ER) programs at each facility, results from a questionnaire distributed by Geotech CWM, Inc., for DOE, and associated discussions with individuals from each facility. This is not a final assessment, but a brief look at an ongoing assessment; the needs will change as the plans for restoration change and, it is hoped, as some technical problems are solved through successful development programs.

  17. Positioning of a Peaceful Use of Nuclear Technology in National Security Aspects

    International Nuclear Information System (INIS)

    Kim, Hyun Jun; Chang, Moon Hee; Kim, Hark Rho; Lee, Young Joon; Lee, Sang Heon

    2012-01-01

    Many cases have shown that a peaceful use of nuclear technology should play an important role in national securities such as energy, economic and science and technology securities, etc. It would be interesting to know what the positioning of the peaceful use of nuclear technology is in the national security aspects. In this paper, a positioning of nuclear power on various national security components is intended by using a positioning process that has been widely used for marketing. Findings can be used for directing further R and Ds to develop nuclear power technology

  18. Positioning of a Peaceful Use of Nuclear Technology in National Security Aspects

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Jun; Chang, Moon Hee; Kim, Hark Rho; Lee, Young Joon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Lee, Sang Heon [Korea National Defense University, Goyang (Korea, Republic of)

    2012-05-15

    Many cases have shown that a peaceful use of nuclear technology should play an important role in national securities such as energy, economic and science and technology securities, etc. It would be interesting to know what the positioning of the peaceful use of nuclear technology is in the national security aspects. In this paper, a positioning of nuclear power on various national security components is intended by using a positioning process that has been widely used for marketing. Findings can be used for directing further R and Ds to develop nuclear power technology

  19. Environmental assessment report: Nuclear Test Technology Complex

    International Nuclear Information System (INIS)

    Tonnessen, K.; Tewes, H.A.

    1982-08-01

    The US Department of Energy (USDOE) is planning to construct and operate a structure, designated the Nuclear Test Technology Complex (NTTC), on a site located west of and adjacent to the Lawrence Livermore National Laboratory. The NTTC is designed to house 350 nuclear test program personnel, and will accommodate the needs of the entire staff of the continuing Nuclear Test Program (NTP). The project has three phases: land acquisition, facility construction and facility operation. The purpose of this environmental assessment report is to describe the activities associated with the three phases of the NTTC project and to evaluate potential environmental disruptions. The project site is located in a rural area of southeastern Alameda County, California, where the primary land use is agriculture; however, the County has zoned the area for industrial development. The environmental impacts of the project include surface disturbance, high noise levels, possible increases in site erosion, and decreased air quality. These impacts will occur primarily during the construction phase of the NTTC project and can be mitigated in part by measures proposed in this report

  20. National Security Science and Technology Initiative: Air Cargo Screening

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Philip R [ORNL; White, Tim [Pacific Northwest National Laboratory (PNNL); Cespedes, Ernesto [Idaho National Laboratory (INL); Bowerman, Biays [Brookhaven National Laboratory (BNL); Bush, John [Battelle

    2010-11-01

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three

  1. Assistive Technologies and Issues Relating to Privacy, Ethics and Security

    Science.gov (United States)

    Martin, Suzanne; Bengtsson, Johan E.; Dröes, Rose-Marie

    Emerging technologies provide the opportunity to develop innovative sustainable service models, capable of supporting adults with dementia at home. Devices range from simple stand-alone components that can generate a responsive alarm call to complex interoperable systems that even can be remotely controlled. From these complex systems the paradigm of the ubiquitous or ambient smart home has emerged, integrating technology, environmental design and traditional care provision. The service context is often complex, involving a variety of stakeholders and a range of interested agencies. Against this backdrop, as anecdotal evidence and government policies spawn further innovation it is critical that due consideration is given to the potential ethical ramifications at an individual, organisational and societal level. Well-grounded ethical thinking and proactive ethical responses to this innovation are required. Explicit policy and practice should therefore emerge which engenders confidence in existing supported living option schemes for adults with dementia and informs further innovation.

  2. Biomass cogeneration: industry response for energy security and environmental consideration

    International Nuclear Information System (INIS)

    Bacareza-Pacudan, L.; Lacrosse, L.; Pennington, M.; Dale Gonzales, A.

    1999-01-01

    Biomass occurs in abundance in the highly agricultural-based countries of South-East Asia. If these are processed in the wood and agro-processing industries, large volumes of residues are generated. The residue are potential sources of energy which the industries can tap through the use of cogeneration systems, in order to meet their own thermal and electrical requirements. This will reduce the industry's dependence on power from the grid and thus increase their own self-sufficiency in terms of energy. Biomass cogeneration brings the environmental, as well as economic benefits to the industries. It makes use of clean and energy-efficient technologies and utilises biomass as fuels which cause less environment al pollution and the greenhouse effect, as against the use of fossil fuels. A particular mill that embarks on biomass cogeneration is also able to realise, among others, income from the export of excess electricity to the grid. Biomass residue if not used for other purposes have negative values as they need to be disposed of. They can, however, be profit-generating as well. (Author)

  3. Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model

    Science.gov (United States)

    Kassa, Woldeloul

    2016-01-01

    Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…

  4. 76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-31

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0357] Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast Guard, DHS. ACTION: Notice of request for comments... Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection...

  5. Coping with global environmental change, disasters and security. Threats, challenges, vulnerabilities and risks

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; UNU-EHS, Bonn (DE). College of Associated Scientists and Advisors (CASA); Oswald Spring, Ursula [National Univ. of Mexico, Cuernavaca (MX). Regional Multidisciplinary Research Centre (CRIM); Mesjasz, Czeslaw [Cracow Univ. of Exonomics (Poland). Faculty of Management; Grin, John [Amsterdam Univ. (Netherlands). Dept. of Political Science; Dutch Knowledge network for Systems Innovations and Transitions (KSI), Amsterdam (Netherlands); Kameri-Mbote, Patricia [Strathmore Univ., Nairobi (Kenya). Dept. of Law; International Environmental Law Research Centre, Nairobi (Kenya); Chourou, Bechir [Univ. of Tunis-Carthage, Hammam-Chatt (Tunisia); Dunay, Pal [Geneva Centre for Security Policy (Switzerland). International Training Course in Security Policy; Birkmann, Joern (eds.) [United Nations Univ. (UNU), Bonn (DE). Inst. for Environment and Human Security (EHS)

    2011-07-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10 parts concepts of military and political hard security and economic, social, environmental soft security with a regional focus on the Near East, North and Sub-Sahara Africa and Asia and on hazards in urban centres. The major focus is on coping with global environmental change: climate change, desertification, water, food and health and with hazards and strategies on social vulnerability and resilience building and scientific, international, regional and national political strategies, policies and measures including early warning of conflicts and hazards. The book proposes a political geo-ecology and discusses a 'Fourth Green Revolution' for the Anthropocene era of earth history. (orig.)

  6. Laser Applications to Chemical, Security, and Environmental Analysis: introduction to the feature issue

    International Nuclear Information System (INIS)

    Dreizler, Andreas; Fried, Alan; Gord, James R.

    2007-01-01

    This Applied Optics feature issue on Laser Applications to Chemical, Security,and Environmental Analysis (LACSEA) highlights papers presented at theLACSEA 2006 Tenth Topical Meeting sponsored by the Optical Society ofAmerica

  7. Laser applications to chemical, security, and environmental analysis: introduction to the feature issue.

    Science.gov (United States)

    Seeger, Thomas; Dreier, Thomas; Chen, Weidong; Kearny, Sean; Kulatilaka, Waruna

    2017-04-10

    This Applied Optics feature issue on laser applications to chemical, security, and environmental analysis (LACSEA) highlights papers presented at the LACSEA 2016 Fifteenth Topical Meeting sponsored by the Optical Society of America.

  8. 76 FR 5209 - Notice of Availability of the Environmental Assessment for New Low Security Beds

    Science.gov (United States)

    2011-01-28

    ...-security male criminal aliens. In accordance with the National Environmental Policy Act (NEPA) of 1969, the... initiative (known as the Criminal Alien Requirement), the BOP has identified a specific requirement to confine a population of approximately 1,000 low-security adult male inmates that are primarily criminal...

  9. Securing a better future for all: Nuclear techniques for global development and environmental protection. NA factsheet on radioisotope production and radiation technology contributing to better health care and a cleaner environment

    International Nuclear Information System (INIS)

    2012-01-01

    Radioisotope and radiation technology finds numerous applications in a wide variety of fields, most importantly in medicine, industry, agriculture and the environment. However, in order to take full advantage of the benefits offered by this technology, it is essential to provide the necessary infrastructure as well as qualified personnel. The IAEA strives to promote worldwide availability of products and facilities in order to offer the benefits of radioisotope products and radiation technology to developing countries. In particular, the IAEA helps Member States to achieve self-sufficiency in the production of radioisotopes and radiopharmaceuticals, strengthen quality assurance practices and regulatory compliance as well as facilitate human resources development. The multipronged need based approach includes providing advice, assistance and capacity building support for: Development, production and quality assurance of reactor and accelerator based medical isotopes and radiopharmaceuticals for both the diagnosis and treatment of diseases, especially cancer; Establishment of irradiation facilities and utilization of gamma radiation, electron beam and X ray technology for varied applications, including tackling pollutants, wastewater treatment, sterilization of medical products, disinfestation of food grains, and synthesis and characterization of advanced materials; Application of radiation and isotopes in industrial process management.

  10. Science and Technology Resources on the Internet: Computer Security.

    Science.gov (United States)

    Kinkus, Jane F.

    2002-01-01

    Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…

  11. Rights management technologies: A good choice for securing electronic healthrecords?

    NARCIS (Netherlands)

    Petkovic, M.; Katzenbeisser, S.; Kursawe, K.; Pohlmann, N.; Reimer, H.; Schneider, W.

    2007-01-01

    Advances in healthcare IT bring new concerns with respect to privacy and security. Security critical patient data no longer resides on mainframes physically isolated within an organization, where physical security measures can be taken to defend the data and the system. Modern solutions are heading

  12. Homeland Security Affairs Journal, Supplement - 2012: IEEE 2011 Conference on Technology for Homeland Security: Best Papers

    OpenAIRE

    2012-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. IEEE Supplement 2012. Supplement: IEEE 2011 Conference on Te...

  13. Technology needs for environmental restoration remedial action

    Energy Technology Data Exchange (ETDEWEB)

    Watson, J.S.

    1992-11-01

    This report summarizes the current view of the most important technology needs for the US Department of Energy (DOE) facilities operated by Martin Marietta Energy Systems, Inc. These facilities are the Oak Ridge National Laboratory, the Oak Ridge K-25 Site, the Oak Ridge Y-12 Plant, the Paducah Gaseous Diffusion Plant, and the Portsmouth Gaseous Diffusion Plant. The sources of information used in this assessment were a survey of selected representatives of the Environmental Restoration (ER) programs at each facility, results from a questionnaire distributed by Geotech CWM, Inc., for DOE, and associated discussions with individuals from each facility. This is not a final assessment, but a brief look at an ongoing assessment; the needs will change as the plans for restoration change and, it is hoped, as some technical problems are solved through successful development programs.

  14. Technology needs for environmental restoration remedial action

    International Nuclear Information System (INIS)

    Watson, J.S.

    1992-11-01

    This report summarizes the current view of the most important technology needs for the US Department of Energy (DOE) facilities operated by Martin Marietta Energy Systems, Inc. These facilities are the Oak Ridge National Laboratory, the Oak Ridge K-25 Site, the Oak Ridge Y-12 Plant, the Paducah Gaseous Diffusion Plant, and the Portsmouth Gaseous Diffusion Plant. The sources of information used in this assessment were a survey of selected representatives of the Environmental Restoration (ER) programs at each facility, results from a questionnaire distributed by Geotech CWM, Inc., for DOE, and associated discussions with individuals from each facility. This is not a final assessment, but a brief look at an ongoing assessment; the needs will change as the plans for restoration change and, it is hoped, as some technical problems are solved through successful development programs

  15. Scanning technology with multi-slice helical CT in security inspection domain

    International Nuclear Information System (INIS)

    Wang Jue; Wang Fuquan; Jiang Zenghui

    2008-01-01

    The paper analyzes the technology conditions of security inspection in home and abroad, and expatiates technology of spiral CT and how to define CT value etc, with studying on the key technology of spiral CT scanning way (X-RAY, detector, technology of pulley etc) and mutual relation. By comparing the present products of security inspection, the conclusion was drawn that it is inevitable to develop the tendency of security inspection area with the checking and discerning the substance by using the technology of multi-layer spiral CT. (authors)

  16. Sustainable city policy. Economic, environmental, technological

    International Nuclear Information System (INIS)

    Camagni, R.; Capello, R.

    1995-01-01

    While the reasons for advocating intensified environmental concerns at the urban level are more and more accepted and clear, the question how to overcome such concerns is still fraught with many difficulties. The aim of the present paper is to formulate some policy guidelines, based on economic principles, for a 'sustainable city'; it is an ambitious aim, since a unique and operationally defined 'recipe' is difficult to envisage. An urban policy for a sustainable city needs to take different (and contrasting) aspects and many conflicting interests into consideration, while many political, social and economic frictions need to be overcome. A description of various aspects and concepts concerning sustainability issues at the urban level is given in Section 2. Section 3 then provides some considerations on possible technological, economic and environmental urban policies, by creating a typo logy of policy tools associated with different causes of urban decline. Section 4 provides some new, and partly provocative, suggestions for specific urban sustainability policies; in particular it deals with the problem of urban sustainability indicators, measures, and critical threshold levels at which urban sustainability policies should be implemented. Some reflective remarks will conclude the paper. 3 figs., 4 tabs., 25 refs

  17. Sustainable city policy. Economic, environmental, technological

    Energy Technology Data Exchange (ETDEWEB)

    Camagni, R.; Capello, R. [Politecnico di Milano, Milan (Italy). Economics Dept.; Nijkamp, P. [Dept. of Spatial Economics. Fac. of Economics and Econometrics. Vrije Univ., Amsterdam (Netherlands)

    1995-12-31

    While the reasons for advocating intensified environmental concerns at the urban level are more and more accepted and clear, the question how to overcome such concerns is still fraught with many difficulties. The aim of the present paper is to formulate some policy guidelines, based on economic principles, for a `sustainable city`; it is an ambitious aim, since a unique and operationally defined `recipe` is difficult to envisage. An urban policy for a sustainable city needs to take different (and contrasting) aspects and many conflicting interests into consideration, while many political, social and economic frictions need to be overcome. A description of various aspects and concepts concerning sustainability issues at the urban level is given in Section 2. Section 3 then provides some considerations on possible technological, economic and environmental urban policies, by creating a typo logy of policy tools associated with different causes of urban decline. Section 4 provides some new, and partly provocative, suggestions for specific urban sustainability policies; in particular it deals with the problem of urban sustainability indicators, measures, and critical threshold levels at which urban sustainability policies should be implemented. Some reflective remarks will conclude the paper. 3 figs., 4 tabs., 25 refs.

  18. A Study Of Cyber Security Challenges And Its Emerging Trends On Latest Technologies

    OpenAIRE

    Reddy, G. Nikhita; Reddy, G. J. Ugander

    2014-01-01

    Cyber Security plays an important role in the field of information technology .Securing the information have become one of the biggest challenges in the present day. When ever we think about the cyber security the first thing that comes to our mind is cyber crimes which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cyber crimes. Besides various measures cyber security is still a very big concern to many. This paper ma...

  19. ENVIRONMENTAL SECURITY IN THE REGION IN THE SERVICE OF SUSTAINABLE DEVELOPMENT OF LOCAL SPATIAL

    Directory of Open Access Journals (Sweden)

    Ljiljana Stošić Mihajlović

    2016-04-01

    Full Text Available A fundamental prerequisite for the existence, growth and development of each social community is environmental safety. In modern conditions of environmental degradation as a global process, it is bound to increase social stratification, ethnic and even religious conflict, conflict and intolerance that threatens the safety of society. It is a notorious fact that the world of Simply is no longer in a position to deal with new shocks. The financial crisis has reduced global economic resilience, while geopolitical tensions and increased social concerns point to the fact that the state and society less able than ever to cope with global challenges, among which is the primary problem of environmental security. In modern countries, political, security and other interests of the citizens' day-to-day modeling, transform, get the content, in accordance with the general civilization changes. In this connection, sustainable local spatial development is crucial conditioned ecological without security region and aims to achieve a balance between current consumption of natural resources and the ability of the system to maintain the level at which future generations will be able to use them. The work represents a contribution to the achievement of environmental security as a new, modern forms of security, and originated from the need to once again draw attention to the evident environmental degradation as an integral part of human security. Ecological security of the region protects the basic components of the environment and determinants of the local spatial development. In fact, safety in the field of protection and preservation of the environment is one of the most important factors Security Council shall contemporary world. In doing so, it is important to emphasize, however, that environmental security has no borders and is a global problem, a task and an obligation.

  20. Review of Enabling Technologies to Facilitate Secure Compute Customization

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pelfrey, Daniel S [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2014-12-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data for a variety of users, often requiring strong separation between job allocations. There are many challenges to establishing these secure enclaves within the shared infrastructure of high-performance computing (HPC) environments. The isolation mechanisms in the system software are the basic building blocks for enabling secure compute enclaves. There are a variety of approaches and the focus of this report is to review the different virtualization technologies that facilitate the creation of secure compute enclaves. The report reviews current operating system (OS) protection mechanisms and modern virtualization technologies to better understand the performance/isolation properties. We also examine the feasibility of running ``virtualized'' computing resources as non-privileged users, and providing controlled administrative permissions for standard users running within a virtualized context. Our examination includes technologies such as Linux containers (LXC [32], Docker [15]) and full virtualization (KVM [26], Xen [5]). We categorize these different approaches to virtualization into two broad groups: OS-level virtualization and system-level virtualization. The OS-level virtualization uses containers to allow a single OS kernel to be partitioned to create Virtual Environments (VE), e.g., LXC. The resources within the host's kernel are only virtualized in the sense of separate namespaces. In contrast, system-level virtualization uses hypervisors to manage multiple OS kernels and virtualize the physical resources (hardware) to create Virtual Machines (VM), e.g., Xen, KVM. This terminology of VE and VM, detailed in Section 2, is used throughout the report to distinguish between the two different approaches to providing virtualized execution

  1. 48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...

  2. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  3. Sustainable Phosphorus Measures: Strategies and Technologies for Achieving Phosphorus Security

    Directory of Open Access Journals (Sweden)

    Stuart White

    2013-01-01

    Full Text Available Phosphorus underpins the world’s food systems by ensuring soil fertility, maximising crop yields, supporting farmer livelihoods and ultimately food security. Yet increasing concerns around long-term availability and accessibility of the world’s main source of phosphorus—phosphate rock, means there is a need to investigate sustainable measures to buffer the world’s food systems against the long and short-term impacts of global phosphorus scarcity. While the timeline of phosphorus scarcity is contested, there is consensus that more efficient use and recycling of phosphorus is required. While the agricultural sector will be crucial in achieving this, sustainable phosphorus measures in sectors upstream and downstream of agriculture from mine to fork will also need to be addressed. This paper presents a comprehensive classification of all potential phosphorus supply- and demand-side measures to meet long-term phosphorus needs for food production. Examples range from increasing efficiency in the agricultural and mining sector, to technologies for recovering phosphorus from urine and food waste. Such measures are often undertaken in isolation from one another rather than linked in an integrated strategy. This integrated approach will enable scientists and policy-makers to take a systematic approach when identifying potential sustainable phosphorus measures. If a systematic approach is not taken, there is a risk of inappropriate investment in research and implementation of technologies and that will not ultimately ensure sufficient access to phosphorus to produce food in the future. The paper concludes by introducing a framework to assess and compare sustainable phosphorus measures and to determine the least cost options in a given context.

  4. Fiber-optic perimeter security system based on WDM technology

    Science.gov (United States)

    Polyakov, Alexandre V.

    2017-10-01

    Intelligent underground fiber optic perimeter security system is presented. Their structure, operation, software and hardware with neural networks elements are described. System allows not only to establish the fact of violation of the perimeter, but also to locate violations. This is achieved through the use of WDM-technology division spectral information channels. As used quasi-distributed optoelectronic recirculation system as a discrete sensor. The principle of operation is based on registration of the recirculation period change in the closed optoelectronic circuit at different wavelengths under microstrain exposed optical fiber. As a result microstrain fiber having additional power loss in a fiber optical propagating pulse, which causes a time delay as a result of switching moments of the threshold device. To separate the signals generated by intruder noise and interference, the signal analyzer is used, based on the principle of a neural network. The system detects walking, running or crawling intruder, as well as undermining attempts to register under the perimeter line. These alarm systems can be used to protect the perimeters of facilities such as airports, nuclear reactors, power plants, warehouses, and other extended territory.

  5. Nuclear material facilities - security systems and technology R and D trends

    International Nuclear Information System (INIS)

    Ellis, D.; Steele, B.

    2002-01-01

    Full text: In the US, physical security research and development (R and D) during the 1970s and 1980s created a body of technology and systems engineering that largely defined the industry for several decades. However, despite today's terrorists threats and risks, the overall funding of new and innovative physical security solutions is relatively very small. Such factors constraining physical security R and D include the expansion of overall security responsibilities, the emphasis on programmatic and business performance, in addition to evolving (mis)perceptions that 'the problem has been solved' or that 'anyone can do security'. Underlying these factors, the lack of robust standards and certifications has limited the development and application of physical security products, systems, and services. The research and development of new security technologies must be evaluated against very demanding constraints - including costs/benefits, emerging threats, and policies. Going forward, the goal will be to create a more comprehensive approach to physical security of nuclear material facilities that matches evolving threats and that will complement the transition to an integrated security/operations management environment. Such a management model evaluates the additional value of increasing security alternatives in addition to determining trade-offs between the programmatic mission and security issues. Correspondingly, more explicit and strategically useful measures must be developed to determine importance that, in turn, will influence security-related R and D efforts. The research and development of security technologies should be based upon identified needs and requirements resulting from a systematic analysis of the threat and other conditions. In particular, security technologies and systems must be evaluated in terms of current and long-term impacts. Such needs are (will be) diverse and will depend upon sustained research investments in a broad range of technologies

  6. Development of a security system for assisted reproductive technology (ART).

    Science.gov (United States)

    Hur, Yong Soo; Ryu, Eun Kyung; Park, Sung Jin; Yoon, Jeong; Yoon, San Hyun; Yang, Gi Deok; Hur, Chang Young; Lee, Won Don; Lim, Jin Ho

    2015-01-01

    In the field of assisted reproductive technology (ART), medical accidents can result in serious legal and social consequences. This study was conducted to develop a security system (called IVF-guardian; IG) that could prevent mismatching or mix-ups in ART. A software program was developed in collaboration with outside computer programmers. A quick response (QR) code was used to identify the patients, gametes and embryos in a format that was printed on a label. There was a possibility that embryo development could be affected by volatile organic components (VOC) in the printing material and adhesive material in the label paper. Further, LED light was used as the light source to recognize the QR code. Using mouse embryos, the effects of the label paper and LED light were examined. The stability of IG was assessed when applied in clinical practice after developing the system. A total of 104 cycles formed the study group, and 82 cycles (from patients who did not want to use IG because of safety concerns and lack of confidence in the security system) to which IG was not applied comprised the control group. Many of the label paper samples were toxic to mouse embryo development. We selected a particular label paper (P touch label) that did not affect mouse embryo development. The LED lights were non-toxic to the development of the mouse embryos under any experimental conditions. There were no differences in the clinical pregnancy rates between the IG-applied group and the control group (40/104 = 38.5 % and 30/82 = 36.6 %, respectively). The application of IG in clinical practice did not affect human embryo development or clinical outcomes. The use of IG reduces the misspelling of patient names. Using IG, there was a disadvantage in that each treatment step became more complicated, but the medical staff improved and became sufficiently confident in ART to offset this disadvantage. Patients who received treatment using the IG system also went through a somewhat

  7. THE ENVIRONMENTAL CHALLENGE AND HEALTH SECURITY IN CHINA

    Directory of Open Access Journals (Sweden)

    Wang Wuyi

    2010-01-01

    Full Text Available China has achieved impressive rapid development over the past 30 years. But China also faces the challenge of environmental change resulting from rapid economic growth and the attendant risks to human health. In this paper we described the environmental change and health risk in China from evident fluctuation of China’s climate, major changes in natural hydrological condition, raw materials and energy demand, changes of disease epidemic pattern related to climate change and ecosystem damage, new health risk raised by rapid urbanization and rural environmental quality degradation. The suggestion and countermeasures were discussed.

  8. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT LASER TOUCH AND TECHNOLOGIES, LLC LASER TOUCH MODEL LT-B512

    Science.gov (United States)

    The Environmental Technology Verification report discusses the technology and performance of Laser Touch model LT-B512 targeting device manufactured by Laser Touch and Technologies, LLC, for manual spray painting operations. The relative transfer efficiency (TE) improved an avera...

  9. Description of environmental technology; Beskrivelse av miljoeteknologi

    Energy Technology Data Exchange (ETDEWEB)

    2008-04-15

    This report gives an overview of different subject areas and the technological difficulties the businesses have met and which remains. This report is highly connected to the petroleum industry and technology like searching technology and well operations have been discussed

  10. Advances in cyber security technology, operations, and experiences

    CERN Document Server

    Hsu, D Frank

    2013-01-01

    Advances in Cyber Security provides, in a technical yet easy to understand fashion, a real life story of the evolving cyberspace ecosystem from the perspectives of structure, function, and application. It also provides ways and means to secure and sustain this ecosystem by the collective wisdom of professionals and practitioners from government, academia, and industry across national and international boundaries.

  11. The impact of medical technology on sense of security in the palliative home care setting.

    Science.gov (United States)

    Munck, Berit; Sandgren, Anna

    2017-03-02

    The increase in the use of medical devices in palliative home care requires that patients and next-of-kin feel secure. Therefore, the aim was to describe medical technology's impact on the sense of security for patients, next-of-kin and district nurses. Deductive content analysis was conducted on data from three previous studies, using the theoretical framework 'palliative home care as a secure base'. The use of medical technology was shown to have an impact on the sense of security for all involved. A sense of control was promoted by trust in staff and their competence in managing the technology, which was linked to continuity. Inner peace and being in comfort implied effective symptom relief facilitated by pain pumps and being relieved of responsibility. Health care professionals need to have practical knowledge about medical technology, but at the same time have an awareness of how to create and maintain a sense of security.

  12. Environmental radiation monitoring technology: Capabilities and needs

    International Nuclear Information System (INIS)

    Hofstetter, K.J.

    1994-01-01

    Radiation monitoring in the Savannah River Site (SRS) environment is conducted by a combination of automated, remote sampling and/or analysis systems, and manual sampling operations. This program provides early detection of radionuclide releases, minimizes the consequences, and assesses the impact on the public. Instrumentation installed at the release points monitor the atmospheric and aqueous releases from SRS operations. Ground water and air monitoring stations are strategically located throughout the site for radionuclide migration studies. The environmental radiological monitoring program at SRS includes: fixed monitoring stations for atmospheric radionuclide concentrations, aqueous monitors for surface water measurements, mobile laboratory operations for real-time, in-field measurements, aerial scanning for wide area contamination surveillance, and hand-held instruments for radionuclide-specific measurements. Rigorous environmentnal sampling surveillance coupled with laboratory analyses provide confirmatory results for all in-field measurements. Gaps in the technologies and development projects at SRS to fill these deficiencies are discussed in the context of customer needs and regulatory requirements

  13. Environmental control technology for shale oil wastewaters

    Energy Technology Data Exchange (ETDEWEB)

    Mercer, B.W.; Wakamiya, W.; Bell, N.E.; Mason, M.J.; Spencer, R.R.; English, C.J.; Riley, R.G.

    1982-09-01

    This report summarizes the results of studies conducted at Pacific Northwest Laboratory from 1976 to 1982 on environmental control technology for shale oil wastewaters. Experimental studies conducted during the course of the program were focused largely on the treatment and disposal of retort water, particularly water produced by in situ retorting of oil shale. Alternative methods were evaluated for the treatment and disposal of retort water and minewater. Treatment and disposal processes evaluated for retort water include evaporation for separation of water from both inorganic and organic pollutants; steam stripping for ammonia and volatile organics removal; activated sludge and anaerobic digestion for removal of biodegradable organics and other oxidizable substances; carbon adsorption for removal of nonbiodegradable organics; chemical coagulation for removal of suspended matter and heavy metals; wet air oxidation and solvent extraction for removal of organics; and land disposal and underground injection for disposal of retort water. Methods for the treatment of minewater include chemical processing and ion exchange for fluoride and boron removal. Preliminary cost estimates are given for several retort water treatment processes.

  14. 78 FR 56263 - HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc...

    Science.gov (United States)

    2013-09-12

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc., SLM Holdings, Inc., Spring Creek Healthcare Systems... securities of Security Intelligence Technologies, Inc. because it has not filed any periodic reports since...

  15. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Castro, R., E-mail: rodrigo.castro@visite.es [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Barbato, P. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy); Vega, J. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Taliercio, C. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy)

    2011-10-15

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  16. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    International Nuclear Information System (INIS)

    Castro, R.; Barbato, P.; Vega, J.; Taliercio, C.

    2011-01-01

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  17. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  18. The Savannah River environmental technology field test platform

    International Nuclear Information System (INIS)

    Rossabi, J.; Riha, B.D.

    1995-01-01

    The principal goal in the development of new technologies for environmental monitoring and characterization is transferring them to organizations and individuals for use in site assessment and compliance monitoring. The Savannah River technology Center (SRTC) has been developing a program to rigorously field test promising environmental technologies that have not undergone EPA equivalency testing. The infrastructure and staff expertise developed as part of the activities of the Savannah River Integrated Demonstration Program allows field testing of technologies without the difficulties of providing remote field support. By providing a well-characterized site and a well-developed infrastructure, technologies are tested in actual field scenarios to determine their appropriate applications in environmental characterization and monitoring activities. The field tests provide regulatory organizations, potential industrial partners, and potential users with the opportunity to evaluate the technology's performance and its utility for implementation in environmental characterization and monitoring programs. This program has resulted in the successful implementation of several new technologies

  19. Environmental security benefits arising from Russian/Norwegian/US cooperation in the high Arctic

    International Nuclear Information System (INIS)

    Dyer, R.S.

    1997-01-01

    Past practices associated with the civilian and military use of nuclear power in NW Russia present large environmental security risks of international concern. These risks arise from a variety of practices associated with weapons production, testing, power production and waste management. The threats presented by these activities are multimedia in nature, span political boundaries and cannot be simply or inexpensively remediated. Today, cooperative efforts are being undertaken to improve environmental security by remediating existing and potential emission sources. Initial efforts focused on the upgrade and expansion of the Murmansk Low-level Liquid Waste Treatment Facility, Murmansk, Russia. This facility handles wastes generated during the decommissioning of Russian Nuclear Navy submarines and from the operation of the Russian commercial nuclear-powered icebreaker fleet. This upgraded facility is now being constructed and is expected to be completed by March 1998. Completion of this facility will result in the cessation of any future dumping of liquid radioactive wastes into the Barents and Kara Seas. Another large environmental security risk is the LEPSE. The LEPSE is a ship docked in Murmansk, Russia, that contains ∼650 spent fuel elements as well as other solid and liquid wastes from Russian nuclear vessels. International efforts are now being mounted to remove the spent and damaged fuel from this ship, including the safe removal and storage/disposal of the fuel elements. This paper will summarize the environmental security problems presented by these different sources and the likely environmental security benefits associated with their remediation. 5 refs., 1 fig., 1 tab

  20. Nano-enabled environmental products and technologies - opportunities and drawbacks

    DEFF Research Database (Denmark)

    Møller Christensen, Frans; Brinch, Anna; Kjølholt, Jesper

    The project aims to investigate the benefits for health and environment that the use of nanomaterials in products and technologies may have. More specifically, the project provides an overview of the most relevant nano-enabled environmental technologies, different types of products and technologies...... on the (Danish) market, as well as products and technologies, which are still in R&D and it will provide a qualitative overview of health and environmental pros and cons of these technologies. The project has focused on technologies applied in: 1) purification of water and wastewater, 2) remediation of soil...

  1. Environmental regulation and the export dynamics of energy technologies

    International Nuclear Information System (INIS)

    Costantini, Valeria; Crespi, Francesco

    2008-01-01

    The pollution haven hypothesis affirms that an open market regime will encourage the flow of low-technology polluting industries towards developing countries because of potential comparative advantages related to low environmental standards. In contrast, the hypothesis suggested by Porter and van der Linde claims that innovating firms operate in a dynamic competitive situation which allows global diffusion of environmental-friendly technologies. Environmental regulation may represent a relevant mechanism through which technological change is induced. In this way, countries that are subject to more stringent environmental regulations may become net exporters of environmental technologies. This paper provides new evidence on the evolution of export flows of environmental technologies across different countries for the energy sector. Advanced economies, particularly the European Union, have increasingly focused on the role of energy policies as tools for sustaining the development path. The Kyoto Protocol commitments, together with growing import dependence on energy products, have brought attention to the analysis of innovation processes in this specific sector. The analysis uses a gravity model in order to test the determinants and the transmission channels through which environmental technologies for renewable energies and energy efficiency are exported to advanced and developing countries. Our results are consistent with the Porter and van der Linde hypothesis where environmental regulation represents a significant source of comparative advantages. What strongly emerges is that the stringency of environmental regulation supplemented by the strength of the National Innovation System is a crucial driver of export performance in the field of energy technologies. (author)

  2. The Advanced Technology Environmental Education Center Summer Fellows Institute.

    Science.gov (United States)

    Depken, Diane E.; Zeman, Catherine L.; Lensch, Ellen Kabat; Brown, Edward J.

    2002-01-01

    Describes the background, activities, and outcomes of the Advanced Technology Environmental Education Center (ATEEC) and its Summer Fellows Institutes as a model for disciplinary and cross-disciplinary infusion of environmental science and technology content, curriculum, and methods into the classroom. Presents experiences, themes, and activities…

  3. Environmental security as related to scale mismatches of disturbance patterns in a panarchy of social-ecological landscapes

    Science.gov (United States)

    Giovanni Zurlini; Irene Petrosillo; Nicola Zaccarelli; Kurt Riitters

    2008-01-01

    Environmental security, as the opposite of environmental fragility (vulnerability), is multilayered, multi-scale and complex, existing in both the objective realm of biophysics and society, and the subjective realm of individual human perception. For ecological risk assessments (ERAs), the relevant objects of environmental security are social-ecological landscapes (...

  4. New trends in science and technology implications for international peace and security

    International Nuclear Information System (INIS)

    1991-01-01

    In December 1988, the General Assembly requested the Secretary-General to follow future scientific and technological developments, especially those with potential military applications, and to evaluate their impact on international security. In resolution 43/77 A it also requested the Secretary-General to report to it at its forty-fifth session. The broad fields in which scientific and technological developments are taking place were identified as: information technology, biotechnology, materials technology, nuclear technology and space technology. These assessments were discussed by a wider group of experts at a high-level conference on ''New trends in science and technology: implications for international peace and security'', held in April 1990 in the city of Sendai, Japan. The Conference, which was attended by nearly 100 participants from over 20 countries, addressed issues of technological change and global security, new technologies and the search for security in the post-cold-war era, and national policy-making and international diplomacy in an era of rapid technological change. General approaches to technology assessment and technology trends in selected areas were also discussed. The positions taken by Member States on the subject of establishing a mechanism for technology assessment were also taken into account. The highlights of the report are summarized

  5. Information Technology Management: Social Security Administration Practices Can Be Improved

    National Research Council Canada - National Science Library

    Shaw, Clay

    2001-01-01

    To improve SSAs IT management practices, we recommend that the Acting Commissioner of Social Security direct the Chief Information Officer and the Deputy Commissioner for Systems to complete the following actions...

  6. Evolution of Biotechnology and Information Technology and Its Impact on Human Security

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2015-01-01

    Full Text Available Abstract: The development of post-industrial society initiates profound economic, technological and cultural change in the way of life of all mankind. The revolutionary breakthroughs in the field of new technologies such as biotechnology and information technology are reflected in all spheres of human activity, directly affecting the human security. The article analyzes the consequences of widespread usage biotechnology and information technology in the foreign policy practice on the basis of the human security theory. The detailed description of the main directions of the use of biometric technology in the foreign policy and consular practices is provided, the challenges and threats to information security associated with biometrics are analyzed, arising from widespread biotechnology are the main challenges and threats to as well as human security threats arising at the present stage of development and application of these technologies. Human security threats associated with the use of biotechnology are placed in the broader context of global trends in scientific and technological development. The recommendations are formulated in the field of foreign policy and international cooperation, which would neutralize new threats to international and personal safety arising at the present stage of development of biotechnology. The authors conclude that in order to ensure ethical regulation of new technologies that address issues of human security, it is necessary to organize multi-stakeholder partnerships at national and international level with the participation of states, representatives of civil society, business and the research community.

  7. Environmental applications of electron-beam technology

    International Nuclear Information System (INIS)

    Pikaev, A.K.

    2001-01-01

    The main directions of modern environmental applications of electron-beam technology are the following: 1) treatment of polluted natural and drinking water, municipal and industrial wastewater, other liquid wastes; 2) purification of gases; 3) treatment of sewage sludges; 4) treatment of solid wastes (medical wastes, contaminated soil and so on). In some cases, the results of respective researches and developments found a large-scale application. For example, recently several industrial plants for electron-beam purification of flue gases of thermal power plants from SO2 and NOx were created in China, Poland and Japan. In the report, a brief summary of the most important results obtained in the mentioned directions will be presented. A special attention will be paid to the data in the first direction. In particular, the recent results on radiation treatment of some liquid systems obtained in the laboratory under author's leadership will be considered. One of them is water polluted with petroleum products (motor oil, diesel fuel, residual fuel oil). The pollutants were present in water in dissolved form and as a separate phase. It was found that irradiation (dose 25-40 kGy) decomposes and removes the pollutants as a precipitate. The second system is natural oil gas consisting of gaseous and low-boiling hydrocarbons, water and so on. Laboratory- and pilot-scale (with electron accelerator of 0.7 MeV and 30 kW) studies have shown that electron-beam treatment (in a recycling regime with continuous sampling the liquid phase) of this gas leads to the formation of a mixture of liquid branched hydrocarbons, alcohols, ethers and so on, i.e., there is a radiation-induced liquefaction of the natural oil gas. The mechanism of radiolytic conversions occurring in the mentioned systems will be discussed

  8. Technology safeguards needed as security rule audits loom.

    Science.gov (United States)

    Gersh, Deborah; Hoey, Laura G; McCrystal, Timothy M; Tolley, David C

    2012-05-01

    The Department of Health and Human Services will conduct security rule audits that will involve on-site visits and include: Compliance-focused interviews with key organizational leaders. Scrutiny of physical operations controls, especially regarding storage, maintenance, and use of protected health information. Assessment of organizational policies and procedures to ensure compliance with privacy and security rules. Identification of regulatory compliance areas of concern.

  9. Security Aspects for Business Solution Development on Portal Technology

    OpenAIRE

    Ovidiu R?DU??; Adrian MUNTEANU

    2012-01-01

    In the scope of portal development, in order to talk about security issues, concerns, and solutions, it is necessary to define a few terms: authentication, authorization, Single Sign-On (SSO), confidentiality, integrity, and non-repudiation. Focusing on the scope of what the portal developer and designer need to know, below it will be explained these concepts, considering it is important to define and make a brief analysis of these terms for understanding of achieving the security goals.

  10. Adaptive security systems -- Combining expert systems with adaptive technologies

    International Nuclear Information System (INIS)

    Argo, P.; Loveland, R.; Anderson, K.

    1997-01-01

    The Adaptive Multisensor Integrated Security System (AMISS) uses a variety of computational intelligence techniques to reason from raw sensor data through an array of processing layers to arrive at an assessment for alarm/alert conditions based on human behavior within a secure facility. In this paper, the authors give an overview of the system and briefly describe some of the major components of the system. This system is currently under development and testing in a realistic facility setting

  11. Research on mobile electronic commerce security technology based on WPKI

    Science.gov (United States)

    Zhang, Bo

    2013-07-01

    Through the in-depth study on the existing mobile e-commerce and WAP protocols, this paper presents a security solution of e-commerce system based on WPKI, and describes its implementation process and specific implementation details. This solution uniformly distributes the key used by the various participating entities , to fully ensure the confidentiality, authentication, fairness and integrity of mobile e-commerce payments, therefore has some pract ical value for improving the security of e-commerce system.

  12. 78 FR 41954 - TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher...

    Science.gov (United States)

    2013-07-12

    ... Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business Technology Solutions Central Security Services Plymouth, Minnesota; TA- W-82,634C, Prudential Global Business Technology Solutions Central Security Services Scottsdale, Arizona; TA-W-82,634D...

  13. Environmental and Financial Evaluation of Passenger Vehicle Technologies in Belgium

    OpenAIRE

    Messagie, Maarten; Lebeau, Kenneth; Coosemans, Thierry; Macharis, Cathy; Mierlo, Joeri van

    2013-01-01

    Vehicles with alternative drive trains are regarded as a promising substitute for conventional cars, considering the growing concern about oil depletion and the environmental impact of our transportation system. However, “clean” technologies will only be viable when they are cost-efficient. In this paper, the environmental impacts and the financial costs of different vehicle technologies are calculated for an average Belgian driver. Environmentally friendly vehicles are compared with conventi...

  14. New technologies and emerging threats: personnel security adjudicative guidelines in the age of social networking

    OpenAIRE

    Festa, James P.

    2012-01-01

    Approved for public release; distribution is unlimited Publicized incidents involving espionage or violence by government employees with security clearances have raised concern for the personnel security community. The guidelines used to adjudicate security clearances were last updated in 2005; since that time, significant technological developments, especially in social media and communications, have emerged. This thesis developed a comprehensive list of current Internet behaviors, and us...

  15. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - PORTABLE GAS CHROMATOGRAPH ELECTRONIC SENSOR TECHNOLOGY MODEL 4100

    Science.gov (United States)

    The U.S. Environmental Protection Agency, through the Environmental Technology Verification Program, is working to accelerate the acceptance and use of innovative technologies that improve the way the United States manages its environmental problems. As part of this program, the...

  16. 78 FR 74129 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2013-12-10

    ... for Environmental Policy and Technology AGENCY: Environmental Protection Agency (EPA). ACTION: Notice... Environmental Policy and Technology (NACEPT). NACEPT provides advice to the EPA Administrator on a broad range of environmental policy, technology, and management issues. NACEPT members represent academia...

  17. 75 FR 25240 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2010-05-07

    ... ENVIRONMENTAL PROTECTION AGENCY National Advisory Council for Environmental Policy and Technology... for Environmental Policy and Technology (NACEPT). NACEPT provides advice to the EPA Administrator on a broad range of environmental policy, technology, and management issues. NACEPT is a committee of...

  18. Idaho National Engineering and Environmental Laboratory Environmental Technologies Proof-of-Concepts. Final report FY-96

    Energy Technology Data Exchange (ETDEWEB)

    Barrie, S.L.; Carpenter, G.S.; Crockett, A.B. [and others

    1997-04-01

    The Idaho National Engineering and Environmental Laboratory Environmental Technologies Proof-of-Concept Project was initiated for the expedited development of new or conceptual technologies in support of groundwater fate, transport, and remediation; buried waste characterization, retrieval, and treatment; waste minimization/pollution prevention; and spent fuel handling and storage. In Fiscal Year 1996, The Idaho National Engineering and Environmental Laboratory proposed 40 development projects and the Department of Energy funded 15. The projects proved the concepts of the various technologies, and all the technologies contribute to successful environmental management.

  19. Idaho National Engineering and Environmental Laboratory Environmental Technologies Proof-of-Concepts. Final report FY-96

    International Nuclear Information System (INIS)

    Barrie, S.L.; Carpenter, G.S.; Crockett, A.B.

    1997-04-01

    The Idaho National Engineering and Environmental Laboratory Environmental Technologies Proof-of-Concept Project was initiated for the expedited development of new or conceptual technologies in support of groundwater fate, transport, and remediation; buried waste characterization, retrieval, and treatment; waste minimization/pollution prevention; and spent fuel handling and storage. In Fiscal Year 1996, The Idaho National Engineering and Environmental Laboratory proposed 40 development projects and the Department of Energy funded 15. The projects proved the concepts of the various technologies, and all the technologies contribute to successful environmental management

  20. 78 FR 45255 - Homeland Security Science and Technology Advisory Committee (HSSTAC)

    Science.gov (United States)

    2013-07-26

    ..., cyber-security, knowledge management and how best to leverage related technologies funded by other... INFORMATION CONTACT: Mary Hanson, HSSTAC Executive Director, Science and Technology Directorate, Department of... Technology Advisory Committee (HSSTAC) ACTION: Notice of Federal Advisory Committee charter renewal. SUMMARY...

  1. 48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible for...

  2. 48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.

    Science.gov (United States)

    2010-10-01

    ... unclassified information technology resources. 3052.204-70 Section 3052.204-70 Federal Acquisition Regulations... for unclassified information technology resources. As prescribed in (HSAR) 48 CFR 3004.470-3, insert a clause substantially the same as follows: Security Requirements for Unclassified Information Technology...

  3. Technology and Environmental Education: Friend or Foe?

    Science.gov (United States)

    Athman, Julie; Bates, Tim

    1998-01-01

    Discusses the pros and cons often mentioned concerning technology in education. Describes measures of effectiveness of technology-enhanced educational programs, ranging from active learning and multidisciplinary tasks to performance-based assessments. Argues that technology should enhance rather than replace direct experiences. (PVD)

  4. Application of radiation technology for industry and environmental protection

    International Nuclear Information System (INIS)

    Sueo Machi

    1996-01-01

    The world population today is 5.7 billion and increasing by 94 million per year. In order to meet the increasing consumption of food and energy due to the tremendous population growth, unproved technologies which are environmentally friendly, are indispensable. In this context. a number of advanced technologies have been brought about by the LISC of radiation and isotopes. This paper highlights radiation technology, applications in industry, environmental conservation, and agriculture

  5. Climate change, environmental security and displacement in Nigeria ...

    African Journals Online (AJOL)

    LUKE AMADI

    Technology. Full Length ... support artisanal and industrial fisheries accounting for ... impact of wave breakers and the full force of storms and ... to internal conflict between competing ethnic groups or .... general information about climate change in the Niger Delta and ...... Flood control in the region needs collaborative efforts.

  6. An Evaluation Methodology for the Usability and Security of Cloud-based File Sharing Technologies

    Science.gov (United States)

    2012-09-01

    FISMA, ISO 27001 , FIPS 140-2, and ISO 270001) indicate a cloud-based service’s compliance with industry standard security controls, management and...Information Assurance IEEE Institute of Electrical and Electronics Engineers IT Information Technology ITS Insider Threat Study ISO International...effectively, efficiently and with satisfaction” (International Organization for Standardization [ ISO ], 1998). Alternately, information security

  7. Technology scale and supply chains in a secure, affordable and low carbon energy transition

    International Nuclear Information System (INIS)

    Hoggett, Richard

    2014-01-01

    Highlights: • Energy systems need to decarbonise, provide security and remain affordable. • There is uncertainty over which technologies will best enable this to happen. • A strategy to deal with uncertainty is to assess a technologies ability to show resilience, flexibility and adaptability. • Scale is important and smaller scale technologies are like to display the above characteristics. • Smaller scale technologies are therefore more likely to enable a sustainable, secure, and affordable energy transition. - Abstract: This research explores the relationship between technology scale, energy security and decarbonisation within the UK energy system. There is considerable uncertainty about how best to deliver on these goals for energy policy, but a focus on supply chains and their resilience can provide useful insights into the problems uncertainty causes. Technology scale is central to this, and through an analysis of the supply chains of nuclear power and solar photovoltaics, it is suggested that smaller scale technologies are more likely to support and enable a secure, low carbon energy transition. This is because their supply chains are less complex, show more flexibility and adaptability, and can quickly respond to changes within an energy system, and as such they are more resilient than large scale technologies. These characteristics are likely to become increasingly important in a rapidly changing energy system, and prioritising those technologies that demonstrate resilience, flexibility and adaptability will better enable a transition that is rapid, sustainable, secure and affordable

  8. New energy technology cope with global environmental problems

    International Nuclear Information System (INIS)

    Tsuchimoto, Tatsuya

    1991-01-01

    At present, the national and private storage of oil is the quantity for about 140 days in total, and it can cope with the temporary fear of oil supply, but if the Gulf War was prolonged, the large effect should be exerted to the energy supply. The reduction of the degree of oil dependence and the increase of the dependence on nonfossil fuel are taken up as the basic idea of the long term energy demand and supply in Japan. Also in the action plan for preventing global warming, the further promotion of energy conservation and the adoption of clean energy were decided to be carried out for decreasing carbon dioxide. In this report, among clean energies, the technology of electric power generation by sun beam, wind force and geotherm is described. The power generation by sun beam has many features, but the energy density is low, and the area for installation becomes large. The cost of power generation is relatively high. The power generation by wind force is superior in its environmental characteristics, and has been already put in practical use in USA and Europe. The problem is the reliability of the system. The geothermal power generation is available also in Japan, and is important for the energy security. The plants of about 270 MW are installed in Japan. (K.I.)

  9. Application of safeguards technology in DOE's environmental restoration program

    International Nuclear Information System (INIS)

    Eccleston, G.W.; Baker, M.P.; Hansen, W.R.; Lucas, M.C.; Markin, J.T.; Phillips, J.R.

    1990-01-01

    During the last two decades, the Department of Energy's Office of Safeguards and Security (DOE/OSS) has supported the research and development of safeguards systems analysis methodologies and nondestructive assay (NDS) technology for characterizing, monitoring, and accounting nuclear materials. This paper discusses methodologies and NDA instrumentation developed by the DOE/OSS program that could be applied in the Environmental Restoration Program. NDA instrumentation could be used for field measurements during site characterization and to monitor nuclear materials, heavy metals, and other hazardous materials during site remediation. Systems methodologies can minimize the expenditure of resources and help specify appropriate combinations of NDA instrumentation and chemical analyses to characterize a variety of materials quickly and reduce personnel exposure in hazardous environments. A training program is available to teach fundamental and advanced principles and approaches to characterize and quantify nuclear materials properly and to organize and analyze measurement information for decision making. The ability to characterize the overall volume and distribution of materials at a waste site is difficult because of the inhomogeneous distribution of materials, the requirement for extreme sensitivity, and the lack of resources to collect and chemically analyze a sufficient number of samples. Using a systems study approach based on statistical sampling, the resources necessary to characterize a site can be enhanced by appropriately combining in situ and field NDA measurements with laboratory analyses. 35 refs., 1 figs., 2 tabs

  10. Cost effectiveness studies of environmental technologies: Volume 1

    International Nuclear Information System (INIS)

    Silva, E.M.; Booth, S.R.

    1994-02-01

    This paper examines cost effectiveness studies of environmental technologies including the following: (1) In Situ Air Stripping, (2) Surface Towed Ordinance Locator System, (3) Ditch Witch Horizontal Boring Technology, (4) Direct Sampling Ion Trap Mass Spectrometer, (5) In Situ Vitrification, (6) Site Characterization and Analysis Penetrometer System, (7) In Situ Bioremediation, and (8) SEAMIST Membrane System Technology

  11. The Use of Technology by Nonformal Environmental Educators

    Science.gov (United States)

    Peffer, Tamara Elizabeth; Bodzin, Alec M.; Smith, Judith Duffield

    2013-01-01

    This study examined the use of instructional and learning technologies by nonformal environmental educators. A 40-question survey was developed to inquire about practitioner demographics, technology use in practice, and beliefs about technology. The survey consisted of multiple choice, open-ended questions, and a Likert-type scale component--the…

  12. Climate Change and Requirement of Transfer of Environmentally Sound Technology

    DEFF Research Database (Denmark)

    Uddin, Mahatab

    that developed the technology, to another that adopts, adapts, and uses it. As different kinds of threats posed by climate change are continuously increasing all over the world the issue of “technology transfer” especially the transfer of environmentally sound technologies has become one of the key topics...

  13. Green technological foresight on environmental friendly agriculture: Executive summary

    DEFF Research Database (Denmark)

    Borch, K.; Christensen, S.; Jørgensen, U.

    2005-01-01

    Risø and the co-operators have on behalf of the Forest and Nature Agency completed a technological foresight on environmentally friendly agriculture based on green technologies. A technological foresight is a systematic dialogue on how one prepares forfuture challenges, which have not yet manifes...

  14. Environmental Education through Inquiry and Technology

    Science.gov (United States)

    Markaki, Vassiliki

    2014-01-01

    In the transformative world of today, the role of environmental education has become a much-debated issue. The experience from various EU countries shows lack of a concrete policy for the advancement of those strategic skills that correspond to the identified need for the connection of environmental education to green career choices. This paper…

  15. Environmental control technology in petroleum drilling and production

    International Nuclear Information System (INIS)

    Wojtanowicz, A.K.

    1997-01-01

    Environmental control technology (ECT) is process integrated and relates mainly to pollution prevention and risk assessment. Mechanisms of environmental impact in petroleum drilling, well completion and production, include the generation of waste, induction of toxicity or the creation of pathways for pollutant migration. The identification and evaluation of these mechanisms constitute two parts of the scope of ECT. A third part is the development of new techniques to comply with environmental requirements without prejudicing productivity. The basic concepts of the ECT approach are presented in this chapter. The approach is then used to analyse oilfield drilling and production processes. Environmental control components developed in these technologies are described. These include: the control of the volume and toxicity of drilling fluids; source separation technology in produced water cleaning; subsurface injection of oilfield waste slurries; containment technology in the integrity of petroleum wells; subsurface reduction of produced water; oilfield pit closure technology. (37 figures; 26 tables; 227 references) (UK)

  16. Assessment of the Technological Changes Impact on the Sustainability of State Security System of Ukraine

    Directory of Open Access Journals (Sweden)

    Olexandr Yemelyanov

    2018-04-01

    Full Text Available Currently, the governments of many countries are facing with a lack of funds for financing programs for social protection of population. Among the causes of this problem, we can indicate the high unemployment rate, which, among other things, is due to implementation of labor-saving technologies. The purpose of this work is to study the impact of technological changes on the sustainability of the state social security system in Ukraine. The general approaches to the assessment of the stability of the state social security system are described. The simulation of the effect of economically efficient technological changes on the company’s income and expenses was carried out. Some patterns of such changes are established. The group of productive technological changes types is presented. The model is developed, and an indicator of the impact estimation of efficiently effective technological changes on the stability of the state social security system is proposed. The analysis of the main indicators of the state social security system functioning of Ukraine is carried out. The dynamics of indicators characterizing the labor market of Ukraine is analyzed. The influence of changes in labor productivity on costs and profits by industries of Ukraine is estimated. The evaluation of the impact of economically efficient technological changes in the industries of Ukraine on the stability of its state social security system is carried out. The different state authorities can use the obtained results for developing measures to manage the sustainability of the state social security system.

  17. Audit and Evaluation of Computer Security. Computer Science and Technology.

    Science.gov (United States)

    Ruthberg, Zella G.

    This is a collection of consensus reports, each produced at a session of an invitational workshop sponsored by the National Bureau of Standards. The purpose of the workshop was to explore the state-of-the-art and define appropriate subjects for future research in the audit and evaluation of computer security. Leading experts in the audit and…

  18. Food security and environmental degradation in northern Nigeria: demographic perspectives.

    Science.gov (United States)

    Lockwood, M

    1991-07-01

    The Malthusian controversy about the causes of environmental change and food insecurity in Hausaland in northern Nigeria is examined. The argument is irresolvable based on available data at the macro level. The individual and household level are appropriate for answering the question about how high density populations survive on a savannah. To understand population pressure in Hausaland, it is important to read Malthus very carefully and to understand the existing demographic structure in which economic and kinship relations support high fertility even where land is scarce. Demographic responses vary with economic strata. Policies ignore individual level differences. Since 1953, the densely populated areas of Sokoto, Katsina, Zaria, and Kano have spread in an area that is largely dry with a moderate-to-high risk of desertification. Food insecurity exists not only in times of drought, but also annually in the form of chronic shortages of staples for poor farmers. Average land holdings/capita have become smaller. Population pressure has also contributed to shifts in land use. Food prices have increased. Possible explanations include 1) the drought and the oil boom have a greater impact on environmental change and food insecurity and rural Hausa farmers have responded by raising yields, managing tree resources, and practicing soil conservation and 2) an independent source of income from non-agricultural activities is an essential part of the economy. The relationship among population pressure, land shortage, and food insecurity is complex. It is inaccurate to label Hausa as subsistence farmers, when trading in grain is an important enterprise. The role that commercialization of agriculture plays in food insecurity is discussed. Malthusian disaster is not imminent. The proximate determinants of fertility, birth spacing practices and infertility, should lead to high fertility rates, but in this case they do not. Determinants responsive to economic factors tend to be

  19. New technology in everyday life - social processes and environmental impact

    DEFF Research Database (Denmark)

    Røpke, Inge

    2001-01-01

    aspect both of changes in everyday life and of the environmental impact of everyday-life activities. Technological change is often seen as an important part of the solutions to environmental problems, however, when technological change is seen from the perspective of everyday life, this image becomes...... more complex. In this paper technological changes are explored from the perspective of consumption and everyday life, and it is argued that environmental impacts arise through the interplay of technology, consumption and everyday life. Firstly, because technological renewals form integral parts...... influence the environment in the long run. The paper points to the need for further studies of the long term interplay between new technologies, everyday life and the environment....

  20. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - BAGHOUSE FILTRATION PRODUCTS - TETRATEC PTFE TECHNOLOGIES TETRATEX 8005

    Science.gov (United States)

    Baghouse filtration products (BFPs) were evaluated by the Air Pollution Control Technology (APCT) pilot of the Environmental Technology Verification (ETV) Program. The performance factor verified was the mean outlet particle concentration for the filter fabric as a function of th...

  1. The application of data encryption technology in computer network communication security

    Science.gov (United States)

    Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.

  2. Overcoming regulatory barriers: DOE environmental technology development program

    International Nuclear Information System (INIS)

    Kurtyka, B.M.; Clodfelter-Schumack, K.; Evans, T.T.

    1995-01-01

    The potential to improve environmental conditions via compliance or restoration is directly related to the ability to produce and apply innovative technological solutions. However, numerous organizations, including the US General Accounting Office (GAO), the EPA National Advisory Council for Environmental Policy and Technology (NACEPT), the DOE Environmental Management Advisory Board (EMAB), and the National Science and Technology Council (NSTC) have determined that significant regulatory barriers exist that inhibit the development and application of these technologies. They have noted the need for improved efforts in identifying and rectifying these barriers for the purpose of improving the technology development process, providing innovative alternatives, and enhancing the likelihood of technology acceptance by all. These barriers include, among others, regulator and user bias against ''unknown/unproven'' technologies; multi-level/multi-media permit disincentives; potential liability of developers and users for failed implementation; wrongly defined or inadequate data quality objectives: and lack of customer understanding and input. The ultimate goal of technology development is the utilization of technologies. This paper will present information on a number of regulatory barriers hindering DOE's environmental technology development program and describe DOE efforts to address these barriers

  3. Technology management for environmentally sound and sustainable development

    International Nuclear Information System (INIS)

    Zaidi, S.M.J.

    1992-01-01

    With the evolutionary change in the production activities of human societies, the concept of development has also been changing. In the recent years the emphasis has been on the environmentally sound and sustainable development. The environmentally sound and sustainable development can be obtained through judicious use of technology. Technology as a resource transformer has emerged as the most important factor which can constitute to economic growth. But technology is not an independent and autonomous force, it is only an instrument which needs to be used carefully, properly and appropriately which necessitates technology management. (author)

  4. OCETA: services for environmental companies an technology developers

    Energy Technology Data Exchange (ETDEWEB)

    Buckley, A.; Ozdemir, B. [Ontario Centre for Environmental Technology Advancement, Toronto, ON (Canada)

    1995-12-31

    Services provided by OCETA (Ontario Centre for Environmental Technology Advancement) to Ontario-based developers of environmental technologies, were described. While OCETA is not a granting agency, it is prepared to provide seed funding, in combination with private and government funding for client projects, and is committed to sharing risks and rewards for successful commercialization. The agency is also in a position to provide technology services at agreed discounts and to maximize in-kind contributions in order to extend project funding. Other services that the agency is equipped to provide, are described. These include information services, technology demonstration and assessment, business services, funding identification and sourcing, marketing, partnerships, and export market development.

  5. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT, ENVIRONMENTAL DECISION SUPPORT SOFTWARE, UNIVERSITY OF TENNESSEE RESEARCH CORPORATION, SPATIAL ANALYSIS AND DECISION ASSISTANCE (SADA)

    Science.gov (United States)

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification Program (ETV) to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. The goal of the...

  6. Hawaii Energy and Environmental Technologies (HEET) Initiative

    National Research Council Canada - National Science Library

    Rocheleau, Richard E; Moore, Robert M; Turn, Scott Q; Antal, Jr., Michael J; Cooney, Michael J; Liaw, Bor-Yann; Masutani, Stephen M

    2007-01-01

    This report covers efforts by the Hawaii Natural Energy Institute of the University of Hawaii under the ONR-funded HEET Initiative that addresses critical technology needs for exploration/utilization...

  7. Evaluation methodologies for security testing biometric systems beyond technological evaluation

    OpenAIRE

    Fernández Saavedra, María Belén

    2013-01-01

    The main objective of this PhD Thesis is the specification of formal evaluation methodologies for testing the security level achieved by biometric systems when these are working under specific contour conditions. This analysis is conducted through the calculation of the basic technical biometric system performance and its possible variations. To that end, the next two relevant contributions have been developed. The first contribution is the definition of two independent biometric performance ...

  8. Japanese Technology and U.S. National Security

    Science.gov (United States)

    1990-12-01

    Japanese penchant for situational ethics allowed a sharp psychological about-face following the war, enabling them to accept the American policies. Power...Reagan/Bush Administrations have exaggerated the nation’s defense needs and that selfish interests are overriding objectivity and common sense in the ...security.195 They view the United States as having benign political motives and having the largest domestic market needed to develop regional

  9. Microcontroller Based Home Security and Load Controlling Using Gsm Technology

    OpenAIRE

    Mustafijur Rahman; A.H.M Zadidul Karim; Sultanur Nyeem; Faisal Khan; Golam Matin

    2015-01-01

    "Home automation" referred to as 'Intelligent home' or 'automated home', indicates the automation of daily tasks with electrical devices used in homes. This could be the control of lights or more complex chores such as remote viewing of the house interiors for surveillance purposes. The emerging concept of smart homes offers a comfortable, convenient and safe and secure environment for occupants. These include automatic load controlling, fire detection, temperature sensing, and motion detecti...

  10. Using automatic identification system technology to improve maritime border security

    OpenAIRE

    Lindstrom, Tedric R.

    2014-01-01

    Approved for public release; distribution is unlimited Our coastal waters are the United States’ most open and vulnerable borders. This vast maritime domain harbors critical threats from terrorism, criminal activities, and natural disasters. Maritime borders pose significant security challenges, as nefarious entities have used small boats to conduct illegal activities for years, and they continue to do so today. Illegal drugs, money, weapons, and migrants flow both directions across our ma...

  11. The Danish technology foresight on environmentally friendly agriculture

    DEFF Research Database (Denmark)

    Borch, Kristian

    2013-01-01

    A premise that is necessary for agriculture to develop into an environmentally friendly direction is that research is undertaken into environmentally friendly technologies and methods and how they can be brought into use. There is a need for a prioritised research effort that focuses on those...... without any plan or with some thought. Therefore the National Forest and Nature Agency in Denmark initiated the Green Technological foresight on environmentally friendly agriculture with the aim of examining the agricultural environmental challenges and suggesting technological and structural solutions....... problems which are related to minimising environmental problems affected by the agricultural production’s negative influence on the surroundings, improving animal welfare and finding new ways and products for agriculture. Future directions of agriculture can derive with or without dialogue; it can occur...

  12. Economic and environmental impacts of alternative transportation technologies.

    Science.gov (United States)

    2013-04-01

    This project has focused on comparing alternative transportation technologies in terms of their : environmental and economic impacts. The research is data-driven and quantitative, and examines the : dynamics of impact. We have developed new theory an...

  13. African Journal of Environmental Science and Technology - Vol 4 ...

    African Journals Online (AJOL)

    Increase in healthcare facilities and rapid environmental degradation: A technological paradox in Nigeria's urban centres · EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT. A Coker, MKC Sridhar, 577-585 ...

  14. Teaching Professionals Environmental Management and Cleaner Technology

    DEFF Research Database (Denmark)

    Jørgensen, Ulrik; Jørgensen, Michael Søgaard; Thorsen, Nils

    -ters. The target groups are professional environmental managers working in businesses including consultants, governmental institutions and organizations. To get access to the education the students must have a technical/nature science competence at master level or bachelor level combined with relevant job...... experience. Generally participants have had 5-15 years of practical experience and are in the position of a internal or external job change towards new tasks that require new knowledge, methodologies or management/co-ordination skills. The education of "Masters of Environmental Management" (MEM) started...

  15. Assessment and evaluation of technologies for environmental restoration. Progress report

    International Nuclear Information System (INIS)

    Uzochukwu, G.A.

    1999-01-01

    Nuclear and commercial non-nuclear technologies that have the potential of meeting the environmental restoration objectives of the Department of Energy are being evaluated. A detailed comparison of innovative technologies available will be performed to determine the safest and most economical technology for meeting these objectives. Information derived from this effort will be matched with the multi-objective of the environmental restoration effort to ensure that the best, most economical, and the safest technologies are used in decision making at USDOE-SRS. Technology-related variables will be developed and the resulting data formatted and computerized for multimedia systems. The multimedia system will be made available to technology developers and evaluators to ensure that the safest and most economical technologies are developed for use at SRS and other DOE sites

  16. Assessment and evaluation of technologies for environmental restoration. Progress report

    Energy Technology Data Exchange (ETDEWEB)

    Uzochukwu, G. A. [North Carolina A and T State Univ., Greensboro, NC (United States)

    2000-06-30

    Nuclear and commercial non-nuclear technologies that have the potential of meeting the environmental restoration objectives of the Department of Energy are being evaluated. A detailed comparison of innovative technologies available will be performed to determine the safest and most economical technology for meeting these objectives. Information derived from this effort will be matched with the multi-objective of the environmental restoration effort to ensure that the best, most economical, and the safest technologies are used in decision making at USDOE-SRS. Technology-related variables will be developed and the resulting data formatted and computerized for multimedia systems. The multimedia system will be made available to technology developers and evaluators to ensure that the safest and most economical technologies are developed for use at SRS and other DOE sites.

  17. Assessment and evaluation of technologies for environmental restoration. Progress report

    International Nuclear Information System (INIS)

    Uzochukwu, G. A.

    2000-01-01

    Nuclear and commercial non-nuclear technologies that have the potential of meeting the environmental restoration objectives of the Department of Energy are being evaluated. A detailed comparison of innovative technologies available will be performed to determine the safest and most economical technology for meeting these objectives. Information derived from this effort will be matched with the multi-objective of the environmental restoration effort to ensure that the best, most economical, and the safest technologies are used in decision making at USDOE-SRS. Technology-related variables will be developed and the resulting data formatted and computerized for multimedia systems. The multimedia system will be made available to technology developers and evaluators to ensure that the safest and most economical technologies are developed for use at SRS and other DOE sites.

  18. The 10th Anniversary Of Daejeon Environmental Technology Development Center

    International Nuclear Information System (INIS)

    2010-12-01

    This book describes the Daejeon Environment Technology Development Center with pictures for ten years. It also introduces the purpose of the foundation and background of center, structure of the center, main project and role of the center, center logo, current situation of cost of project, research business for 10 years, business supporting the environmental corporate, environment education, public relations activity and vision and prospect of the Daejeon Environmental Technology Development Center.

  19. Bridge to a sustainable future: National environmental technology strategy

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-04-01

    For the past two years the Administration has sought the views of Congress, the states, communities, industry, academia, nongovernmental organizations, and interested citizens on ways to spur the development and use of a new generation of environmental technologies. This document represents the views of thousands of individuals who participated in events around the country to help craft a national environmental technology strategy that will put us on the path to sustainable development.

  20. SIHTI 2 - Versatile research on environmental technology

    Energy Technology Data Exchange (ETDEWEB)

    Larjava, K. [VTT Chemical Technology, Espoo (Finland)

    1996-12-31

    The Finnish industry has in many fields reached an international top position in energy economy and environmental safety. This would have not been possible without intensive R and D work and close co-operation of process utilisers and equipment manufacturers - in particular in pulp and paper industries - in development of cleaner production methods and equipment

  1. Environmental statement for Applications Technology Satellite program

    Science.gov (United States)

    1971-01-01

    The experiments, environmental impact, and applications of data collected by ATS are discussed. Data cover communications, navigation, meteorology, data collection (including data from small unattended remote stations such as buoys, seismology and hydrology monitors, etc.), geodesy, and scientific experiments to define the environment at synchronous orbit, and to monitor emissions from the sun.

  2. Environmental Justice and Green-Technology Adoption

    Science.gov (United States)

    Ong, Paul

    2012-01-01

    This paper presents an analysis of an environmental justice (EJ) program adopted by the South Coast Air Quality Management District (SCAQMD) as a part of its regulation to phase out a toxic chemical used by dry cleaners. SCAQMD provided financial incentives to switch early and gave establishments in EJ neighborhoods priority in applying for…

  3. SIHTI 2 - Versatile research on environmental technology

    International Nuclear Information System (INIS)

    Larjava, K.

    1996-01-01

    The Finnish industry has in many fields reached an international top position in energy economy and environmental safety. This would have not been possible without intensive R and D work and close co-operation of process utilisers and equipment manufacturers - in particular in pulp and paper industries - in development of cleaner production methods and equipment

  4. Environmental assessment of solid waste systems and technologies: EASEWASTE

    DEFF Research Database (Denmark)

    Kirkeby, Janus Torsten; Birgisdottir, Harpa; Hansen, Trine Lund

    2006-01-01

    A new model has been developed for evaluating the overall resource consumption and environmental impacts of municipal solid waste management systems by the use of life cycle assessment. The model is named EASEWASTE (Environmental Assessment of Solid Waste Systems and Technologies) and is able...... may not always be the most environmentally friendly. The EASEWASTE model can identify the most environmentally sustainable solution, which may differ among waste materials and regions and can add valuable information about environmental achievements from each process in a solid waste management system....... to compare different waste management strategies, waste treatment methods and waste process technologies. The potential environmental impacts can be traced back to the most important processes and waste fractions that contribute to the relevant impacts. A model like EASEWASTE can be used by waste planners...

  5. A survey of environmental needs and innovative technologies in Germany

    International Nuclear Information System (INIS)

    Voss, C.F.; Roberds, W.J.

    1995-05-01

    The International Technology Program (IT?), formerly the international Technology Exchange Program (ITEP), of the Department of Energy's (DOE's) Office of Environmental Restoration and Waste Management (EM) is responsible for promoting: (1) the import of innovative technologies to better address EM's needs; and (2) the export of US services into foreign markets to enhance US competitiveness. Under this program: (1) the environmental restoration market in Germany was evaluated, including the description of the general types of environmental problems, the environmental regulations, and specific selected contaminated sites; and (2) potentially innovative environmental restoration technologies, either commercially available or under development in Germany, were identified, described and evaluated. It was found that: (1) the environmental restoration market in Germany is very large, on the order of several billion US dollars per year, with a significant portion possibly available to US businesses; and (2) a large number (54) of innovative environmental restoration technologies, which are either commercially available or under development in Germany, may have some benefit to the DOE EM program and should be considered for transfer to the US

  6. Mobile Technology: The Foundation for an Engaged and Secure Campus Community

    Science.gov (United States)

    Chapel, Edward

    2008-01-01

    Montclair State University, a public New Jersey institution with more than 17,000 students enrolled, has harnessed the cell phone and cellular broadband technology to foster a stronger sense of community and provide students with a safe, secure, and rich learning environment. This paper discusses the potential for new technologies to foster…

  7. Geospatial Technology In Environmental Impact Assessments – Retrospective.

    Directory of Open Access Journals (Sweden)

    Goparaju Laxmi

    2015-10-01

    Full Text Available Environmental Impact Assessments are studies conducted to give us an insight into the various impacts caused by an upcoming industry or any developmental activity. It should address various social, economic and environmental issues ensuring that negative impacts are mitigated. In this context, geospatial technology has been used widely in recent times.

  8. EASETECH – A LCA model for assessment of environmental technologies

    DEFF Research Database (Denmark)

    Damgaard, Anders; Baumeister, Hubert; Astrup, Thomas Fruergaard

    2014-01-01

    EASETECH is a new model for the environmental assessment of environmental technologies developed in collaboration between DTU Environment and DTU Compute. EASETECH is based on experience gained in the field of waste management modelling over the last decade and applies the same concepts to systems...

  9. 5th Conference on Aerospace Materials, Processes, and Environmental Technology

    Science.gov (United States)

    Cook, M. B. (Editor); Stanley, D. Cross (Editor)

    2003-01-01

    Records are presented from the 5th Conference on Aerospace Materials, Processes, and Environmental Technology. Topics included pollution prevention, inspection methods, advanced materials, aerospace materials and technical standards,materials testing and evaluation, advanced manufacturing,development in metallic processes, synthesis of nanomaterials, composite cryotank processing, environmentally friendly cleaning, and poster sessions.

  10. Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016

    CERN Document Server

    Serrhini, Mohammed; Felgueiras, Carlos

    2017-01-01

    This book contains a selection of articles from The Europe, Middle East and North Africa Conference on Technology and Security to Support Learning 2016 (EMENA-TSSL'16), held between the 3th and 5th of October at Saidia, Oujda, Morocco. EMENA-TSSL'16 is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges in Information & Communication Technologies, and Security to support Learning. The main topics covered are: A) Online Education; B) Emerging Technologies in Education; C) Artificial Intelligence in Education; D) Gamification and Serious games; E) Network & Web Technologies Applications; F) Online experimentation and Virtual Laboratories; G) Multimedia Systems and Applications; H) Security and Privacy; I) Multimedia, Computer Vision and Image Processing; J) Cloud, Big Data Analytics and Applications; K) Human-Computer Interaction; L) Software Systems, Architectures, Applications and Tools; M) Onli...

  11. ROLE OF GRASSROOTS ENVIRONMENTAL LITERACY: The case of water security at Bwaila Secondary School in Malawi

    Science.gov (United States)

    Chasukwa Mwalwenje, Yvonne; Chasukwa, Steria

    2015-04-01

    water. The main challenge is the degradation of water resources which result into siltation that blocks the water sources due to rain while in the dry season the water level in reservoirs goes down. Other challenges include inadequate service coverage, insufficient literacy on climate change, inadequate mitigation measures for water related disasters and inadequate promotion of hygiene and sanitation. Bwaila Secondary School in Malawi is no exception in experiencing inadequate water service coverage amidst opportunities such as availability of relatively abundant water resources, political will, active women and youth. The formal education curriculum in secondary schools has enriched students' knowledge of environmental management in subjects such as Geography, Agriculture and Biology to improve their understanding of natural resource management. However, the primary gap is that students do not use the skills in environmental management acquired from the formal school setting in their day to day life henceforth rendering it to be a mere academic exercise confined within classroom walls. It is against such background that Grassroots Environmental Literacy (GEL), an environmental management social marketing franchise in non-formal education was established to fill in the gap. GEL's mission is to inspire students to become change agents in environmental management in their own lives in both formal and non-formal settings in Malawi. GEL believes that the cultivation of broad-based private and public support is the key to bringing about positive and lasting environmental change hence contributing to water security. The education sector in general and school attendance in particular is largely affected by water security. Furthermore, technological limitations have also affected the accessibility of water resources. UNICEF (2008) asserts that water resources may be scarce as it is capital intensive to sink a bore hole in Malawi. Bwaila secondary school is one of the examples

  12. Scenario and multiple criteria decision analysis for energy and environmental security of military and industrial installations.

    Science.gov (United States)

    Karvetski, Christopher W; Lambert, James H; Linkov, Igor

    2011-04-01

    Military and industrial facilities need secure and reliable power generation. Grid outages can result in cascading infrastructure failures as well as security breaches and should be avoided. Adding redundancy and increasing reliability can require additional environmental, financial, logistical, and other considerations and resources. Uncertain scenarios consisting of emergent environmental conditions, regulatory changes, growth of regional energy demands, and other concerns result in further complications. Decisions on selecting energy alternatives are made on an ad hoc basis. The present work integrates scenario analysis and multiple criteria decision analysis (MCDA) to identify combinations of impactful emergent conditions and to perform a preliminary benefits analysis of energy and environmental security investments for industrial and military installations. Application of a traditional MCDA approach would require significant stakeholder elicitations under multiple uncertain scenarios. The approach proposed in this study develops and iteratively adjusts a scoring function for investment alternatives to find the scenarios with the most significant impacts on installation security. A robust prioritization of investment alternatives can be achieved by integrating stakeholder preferences and focusing modeling and decision-analytical tools on a few key emergent conditions and scenarios. The approach is described and demonstrated for a campus of several dozen interconnected industrial buildings within a major installation. Copyright © 2010 SETAC.

  13. Security of OS-level virtualization technologies: Technical report

    OpenAIRE

    Reshetova, Elena; Karhunen, Janne; Nyman, Thomas; Asokan, N.

    2014-01-01

    The need for flexible, low-overhead virtualization is evident on many fronts ranging from high-density cloud servers to mobile devices. During the past decade OS-level virtualization has emerged as a new, efficient approach for virtualization, with implementations in multiple different Unix-based systems. Despite its popularity, there has been no systematic study of OS-level virtualization from the point of view of security. In this report, we conduct a comparative study of several OS-level v...

  14. 77 FR 75997 - Environmental Technologies Trade Advisory Committee (ETTAC), Request for Nominations from U.S...

    Science.gov (United States)

    2012-12-26

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... Environmental Technologies Trade Advisory Committee (ETTAC). SUMMARY: This notice sets forth a request for... serve on the Environmental Technologies Trade Advisory Committee (ETTAC). One person will be appointed...

  15. 77 FR 50987 - Environmental Technologies Trade Advisory Committee, Request for Nominations

    Science.gov (United States)

    2012-08-23

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade... Commerce. ACTION: Solicitation of Nominations for Membership on the Environmental Technologies Trade...) is requesting nominations for memberships on the Environmental Technologies Trade Advisory Committee...

  16. 76 FR 1431 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2011-01-10

    ... and Technology AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of Meeting. SUMMARY... National Advisory Council for Environmental Policy and Technology (NACEPT). NACEPT provides advice to the EPA Administrator on a broad range of environmental policy, technology, and management issues. NACEPT...

  17. 75 FR 52941 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2010-08-30

    ... and Technology AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of meeting. SUMMARY... National Advisory Council for Environmental Policy and Technology (NACEPT). NACEPT provides advice to the EPA Administrator on a broad range of environmental policy, technology, and management issues. NACEPT...

  18. 76 FR 24481 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2011-05-02

    ... and Technology AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of meeting. SUMMARY... National Advisory Council for Environmental Policy and Technology (NACEPT). NACEPT provides advice to the EPA Administrator on a broad range of environmental policy, technology, and management issues. NACEPT...

  19. 75 FR 70215 - Environmental Technologies Trade Advisory Committee (ETTAC), Request for Nominations

    Science.gov (United States)

    2010-11-17

    ... DEPARTMENT OF COMMERCE International Trade Administration Environmental Technologies Trade...: Notice of solicitation of nominations for membership on the Environmental Technologies Trade Advisory Committee (ETTAC). SUMMARY: The Environmental Technologies Trade Advisory Committee (ETTAC) was established...

  20. 76 FR 68183 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2011-11-03

    ... and Technology AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of meeting. SUMMARY... National Advisory Council for Environmental Policy and Technology (NACEPT). NACEPT provides advice to the EPA Administrator on a broad range of environmental policy, technology, and management issues. NACEPT...

  1. 75 FR 38810 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2010-07-06

    ... and Technology AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of meeting. SUMMARY... of the National Advisory Council for Environmental Policy and Technology (NACEPT). NACEPT provides advice to the EPA Administrator on a broad range of environmental policy, technology, and management...

  2. 76 FR 37112 - National Advisory Council for Environmental Policy and Technology

    Science.gov (United States)

    2011-06-24

    ... and Technology AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of meeting. SUMMARY... of the National Advisory Council for Environmental Policy and Technology (NACEPT). NACEPT provides advice to the EPA Administrator on a broad range of environmental policy, technology, and management...

  3. New isotope technologies in environmental physics

    International Nuclear Information System (INIS)

    Povinec, P.; Betti, M.; Jull, A.J.T.; Vojtyla, P.

    2008-01-01

    As the levels of radionuclides observed at present in the environment are very low, high sensitive analytical systems are required for carrying out environmental investigations. We review recent progress which has been done in low-level counting techniques in both radiometric and mass spectrometry sectors, with emphasis on underground laboratories. Monte Carlo (GEANT) simulation of background of HPGe detectors operating in various configurations, secondary ionisation mass spectrometry, and accelerator mass spectrometry. Applications of radiometric and mass spectrometry techniques in radioecology and climate change studies are presented and discussed as well. The review should help readers in better orientation on recent developments in the field of low-level counting and spectrometry, and to advice on construction principles of underground laboratories, as well as on criteria how to choose low of high energy mass spectrometers for environmental investigation. (Authors)

  4. ENVIRONMENTAL IMPACT ASSESSMENT OF A HEALTH TECHNOLOGY: A SCOPING REVIEW.

    Science.gov (United States)

    Polisena, Julie; De Angelis, Gino; Kaunelis, David; Gutierrez-Ibarluzea, Iñaki

    2018-06-13

    The Health Technology Expert Review Panel is an advisory body to Canadian Agency for Drugs and Technologies in Health (CADTH) that develops recommendations on health technology assessments (HTAs) for nondrug health technologies using a deliberative framework. The framework spans several domains, including the environmental impact of the health technology(ies). Our research objective was to identify articles on frameworks, methods or case studies on the environmental impact assessment of health technologies. A literature search in major databases and a focused gray literature search were conducted. The main search concepts were HTA and environmental impact/sustainability. Eligible articles were those that described a conceptual framework or methods used to conduct an environmental assessment of health technologies, and case studies on the application of an environmental assessment. From the 1,710 citations identified, thirteen publications were included. Two articles presented a framework to incorporate environmental assessment in HTAs. Other approaches described weight of evidence practices and comprehensive and integrated environmental impact assessments. Central themes derived include transparency and repeatability, integration of components in a framework or of evidence into a single outcome, data availability to ensure the accuracy of findings, and familiarity with the approach used. Each framework and methods presented have different foci related to the ecosystem, health economics, or engineering practices. Their descriptions suggested transparency, repeatability, and the integration of components or of evidence into a single outcome as their main strengths. Our review is an initial step of a larger initiative by CADTH to develop the methods and processes to address the environmental impact question in an HTA.

  5. Development of monitoring technology for environmental radioactivity

    International Nuclear Information System (INIS)

    Lee, Chang Woo; Cho, Young Hyun; Lee, M. H.; Choi, K. S.; Hong, K. H.; Sin, H. S.; Kim, M. K.; Pak, J. H.

    2000-05-01

    The accurate and reliable determination techniques of the radioactive isotopes in environmental samples are very important to protect public health from the potential hazards of radiation. Isolation and purification of radiostrontium from environmental aqueous sample was performed by using strontium selectively binding resin (Sr-spec) and strontium selectively permeable liquid membrane. Radioactivity of radiostrontium was measured by liquid scintillation counter coupled with dual counting window and spectrum unfolding method. With combustion apparatus a new determination of Tc-99 in the environmental samples was developed for overcoming demerits of conventional TBP extraction method. An optimized method for determining beta-emitting 2 41Pu in the presence of alpha-emitting nuclides was developed using a liquid scintillation counting system. A method for measuring Rn-222 and Ra-226 in aqueous sample using liquid scintillation counting technique has studied. On-line measurement system coupled with ion chromatography and portable liquid scintillation detector was developed. U and Th measured by inductively coupled plasma mass spectrometry (ICP-MS). The mehtod of flow-injection preconcentration for the analysis of U and Th in seawater was developed. A new electrodeposition method for alpha spectrometry was developed

  6. Development of monitoring technology for environmental radioactivity

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Chang Woo; Cho, Young Hyun; Lee, M. H.; Choi, K. S.; Hong, K. H.; Sin, H. S.; Kim, M. K.; Pak, J. H

    2000-05-01

    The accurate and reliable determination techniques of the radioactive isotopes in environmental samples are very important to protect public health from the potential hazards of radiation. Isolation and purification of radiostrontium from environmental aqueous sample was performed by using strontium selectively binding resin (Sr-spec) and strontium selectively permeable liquid membrane. Radioactivity of radiostrontium was measured by liquid scintillation counter coupled with dual counting window and spectrum unfolding method. With combustion apparatus a new determination of Tc-99 in the environmental samples was developed for overcoming demerits of conventional TBP extraction method. An optimized method for determining beta-emitting {sup 2}41Pu in the presence of alpha-emitting nuclides was developed using a liquid scintillation counting system. A method for measuring Rn-222 and Ra-226 in aqueous sample using liquid scintillation counting technique has studied. On-line measurement system coupled with ion chromatography and portable liquid scintillation detector was developed. U and Th measured by inductively coupled plasma mass spectrometry (ICP-MS). The mehtod of flow-injection preconcentration for the analysis of U and Th in seawater was developed. A new electrodeposition method for alpha spectrometry was developed.

  7. Product waste in the automotive industry : Technology and environmental management

    NARCIS (Netherlands)

    Groenewegen, Peter; Hond, Frank Den

    1993-01-01

    In this article the changes in technology and industry structure forced by waste management in the automotive industry are explored. The analysis is based on (1) a characterisation of corporate response to environmental issues, and (2) the management of technology applied to the car manufacturing

  8. Perspectives on next-generation technology for environmental sensor networks

    Science.gov (United States)

    Barbara J. Benson; Barbara J. Bond; Michael P. Hamilton; Russell K. Monson; Richard Han

    2009-01-01

    Sensor networks promise to transform and expand environmental science. However, many technological difficulties must be overcome to achieve this potential. Partnerships of ecologists with computer scientists and engineers are critical in meeting these challenges. Technological issues include promoting innovation in new sensor design, incorporating power optimization...

  9. Summary: Fusion technology, safety and environmental aspects

    International Nuclear Information System (INIS)

    Matsuda, S.

    2003-01-01

    The year 2002 was in the middle of successive governmental negotiation toward the start of the ITER Construction. The ITER Engineering Design Activities (EDA) continued until July 2001, and most of the highlighted topics were already reported at the last IAEA Fusion Energy Conference in Montreal or in other opportunities. However, the ITER EDA was followed by the Coordinated Technical Activities that provided a lot of qualitative achievements such as, the search for predictions on operation capabilities based on various data bases and analysis, optimization of the design based on its validating technology R and D. As a consequence, at this conference, major contribution in the field of Fusion Technology was again from ITER, and its related topics occupied about 38% of the total number of contributions of 86. In ITER, physics analysis, predictions and heating/current drive technologies are highlighted. Another key feature at this conference was the progress of study toward steady-state operation in both physics and technology research as well as their application to toroidal devices. Several tokamaks and helical devises are under construction or under design, and most of them incorporate super-conducting magnet for their coils. Studies were made for various types of fusion reactors including Spherical Torus, Tokamaks, Helical systems etc., and their common understandings are progressing through their comparative study. Looking in the near term, but beyond ITER, about 20% of the papers were devoted to the fusion materials and blanket development, with the neutron irradiation facilities for the research. Because of the importance of this field to be implemented in parallel with ITER, more contributions would be expected in future. With these themes in mind, the remaining sections of this paper are arranged in the order of 2) ITER, 3) Toroidal Devices under Construction or under Design, 4) Reactor Technology, 5) Safety and Environment, and 6) Conclusion

  10. Finding the right technology solutions to secure our borders

    CSIR Research Space (South Africa)

    Venter, CP

    2015-10-01

    Full Text Available technologies used • Radar and Electronic warfare systems, optronic systems, unmanned aerial vehicles, databases, software, networks. • Preparation time 8 months • Executed over two weeks Working with real results After the experiment • Overall...

  11. New technology in everyday life - social processes and environmental impact

    DEFF Research Database (Denmark)

    Røpke, Inge

    2001-01-01

    In the environmental debate it is increasingly acknowledged that our way of life has profound environmental consequences. Therefore, it becomes ever more important to focus on and to understand how everyday life is formed and how it changes over time. Changing technology constitutes an important...... of several of the dynamic forces behind consumption and thus contribute to the growing quantities of consumption, which counteract the environmental improvements. Secondly, because some of the technological changes are integrated with the processes which change everyday life more profoundly and thus...

  12. Technology of environmental pollution control, 2nd edition

    International Nuclear Information System (INIS)

    Shaheen, E.I.

    1991-01-01

    The final decade of the 20th century is truly the environmental decade of the century because of the gravity of environmental challenges we are facing. This book covers the environmental spectrum in an attempt to update the reader on new technologies and topics regarding pollution control. Engineers, scientists, plant operators, and students studying the subject of pollution control will use the comprehensive text as a reference for technological advances, regulations, and pollution control. The major disasters witnessed in the last few years, such as the Bhopal gas tragedy, the Chernobyl nuclear disaster, the Exxon Valdez oil spill and the Ashland of tank collapse are described in detail

  13. From waste to technology. An environmental acceptable technology

    International Nuclear Information System (INIS)

    Tabasaran, O.

    2001-01-01

    Modern thermal waste treatment has the task to produce deposit capable inert products and is able to reduce contaminants emitted to the environment. In addition waste to energy plants enable the recovery of energy by a maximum amount of environmental protection even in the comparison with modern power stations or other industrial plants. Over that, regarding modern technical solutions, today's waste to energy plants can no more be turned on financial reasons [it

  14. Smart Secure Homes: A Survey of Smart Home Technologies that Sense, Assess, and Respond to Security Threats.

    Science.gov (United States)

    Dahmen, Jessamyn; Cook, Diane J; Wang, Xiaobo; Honglei, Wang

    2017-08-01

    Smart home design has undergone a metamorphosis in recent years. The field has evolved from designing theoretical smart home frameworks and performing scripted tasks in laboratories. Instead, we now find robust smart home technologies that are commonly used by large segments of the population in a variety of settings. Recent smart home applications are focused on activity recognition, health monitoring, and automation. In this paper, we take a look at another important role for smart homes: security. We first explore the numerous ways smart homes can and do provide protection for their residents. Next, we provide a comparative analysis of the alternative tools and research that has been developed for this purpose. We investigate not only existing commercial products that have been introduced but also discuss the numerous research that has been focused on detecting and identifying potential threats. Finally, we close with open challenges and ideas for future research that will keep individuals secure and healthy while in their own homes.

  15. Microsoft Technology as an Optimization Tool in Promoting Security and Functionality of the Educational System

    Directory of Open Access Journals (Sweden)

    Jelena Jardas Antonic

    2008-10-01

    Full Text Available Abstract - In the cooperation with the City of Rijeka, the project of analysis of the functional and security situation of information infrastructure has been initiated in 24 schools in the authority of the city. Having completed the multicriteria analysis of the collected data, we have built a model of implementing Microsoft service technologies. The implementation should satisfy the elementary security principles that are required by the security standards today, maximizing functionality of infrastructure and minimizing network administration tasks. Server technology that has been used in this solution is Microsoft Widows 2003 Server R2 and Internet Security and Acceleration Server 2006, as well as the GFI WebMonitor and antivirus.

  16. The research on information security technology for the industrial control system of special equipment

    International Nuclear Information System (INIS)

    Chen Ligang; Liu Hongye; Zhang Wei; Sun Jianying; Lan Peng; Dai Sidan

    2014-01-01

    With the rapid development of information technology in enterprise application, industrial control network and management network is becoming more and more closely linked. Development and application of special equipment control system from the traditional industrial control system, not considered when designing communication security problem mainly, therefore, the industrial control system opened at the same time, isolation control system and the outside was weakened, the safety problems of industrial control system had become more and more serious. The practical application combined with the special equipment control system, analysis and elaboration in view of security problems for the control network, also, provide appropriate security solutions for professional characteristics of industrial control network, design on process control system specially, provide security partition protection scheme, in order to improve security ability of industrial control system information. (authors)

  17. Are clean technology and environmental quality conflicting policy goals?

    OpenAIRE

    Brechet, Thierry; Meunier, Guy; Institut National de la Recherche Agronomique UR 1303 Alimentation et Sciences Sociales

    2012-01-01

    In this paper we analyze the effects of an environmental policy on the diffusion of a clean technology in an economy where firms compete on the output market. We show that the share of adopting firms is non-monotonic with the stringency of the environmental policy, and that the adoption of the clean technology may well increase the pollution level. We also compare the effects of an emission tax and tradable pollution permits on welfare, technology adoption, and pollution level. We show that, ...

  18. Are Clean Technology and Environmental Quality Conflicting Policy Goals?

    OpenAIRE

    Thierry Brechet; Guy Meunier

    2012-01-01

    In this paper we analyze the effects of an environmental policy on the diffusion of a clean technology in an economy where firms compete on the output market. We show that the share of adopting firms is non-monotonic with the stringency of the environmental policy, and that the adoption of the clean technology may well increase the pollution level. We also compare the effects of an emission tax and tradable pollution permits on welfare, technology adoption, and pollution level. We show that, ...

  19. Increased growth in environmental technology; Oekad tillvaext inom miljoeteknik

    Energy Technology Data Exchange (ETDEWEB)

    2011-07-01

    The Swedish Energy Agency has received a government commission, after consultation with the Swedish Agency for Economic and Regional Growth, Swedish Governmental Agency for Innovation Systems (VINNOVA) and other relevant actors. The commission is to develop proposals on how the actions for strengthening collaboration and increased communication between agencies, innovators, entrepreneurs and business angels and venture capitalists among others can be designed in environmental technology with a focus on early commercial stages. The largest part of the environmental technology sector consists of energy related technology

  20. The environmental effect of subsidies for clean technologies

    International Nuclear Information System (INIS)

    De Vries, F.P.; Nentjes, A.

    2001-01-01

    Environmental subsidies for clean technology result in a larger diffusion of such technology. However, as a result emissions can increase in imperfect markets for products. When several companies compete each other with clean and dirty technologies, production and emission will rise because of price competition.This effect will be even larger in case subsidies are applied. Therefore, subsidies are not advisable for every market. In this article an evolutionary game theory has been used with respect to the diffusion of environment-friendly innovation of products and the role of environmental policy instruments (in particular subsidies). 7 refs

  1. Environmental policy and technological development in the Dutch economy

    International Nuclear Information System (INIS)

    Vollebergh, H.; Van Groenendaal, W.; Hofkes, M.; Kemp, R.

    2004-01-01

    An analysis is given of recent insights into technological development and the environment. In particular, attention is paid to the question whether it is possible or not to combine continuous economic development with a release of the environmental burden. In several chapters the authors provide insight and discuss theories with regard to innovation and adoption of new technologies, the concept of transition management and the importance of uncertainty with respect to the decision to invest in environment-friendly techniques or not. Also, much attention is paid to characteristics of the Dutch economy and their consequences for technology and environmental policy and related interactions [nl

  2. Environmental Decision Making and Information Technology: Issues Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Barg, S.; Fletcher, T.; Mechling, J.; Tonn, B.; Turner, R.

    1999-05-01

    This report presents a summary of the Information Technology and Environmental Decision Making Workshop that was held at Harvard University, October 1-3, 1998. Over sixty participants from across the US took part in discussions that focused on the current practice of using information technology to support environmental decision making and on future considerations of information technology development, information policies, and data quality issues in this area. Current practice is focusing on geographic information systems and visualization tools, Internet applications, and data warehousing. In addition, numerous organizations are developing environmental enterprise systems to integrate environmental information resources. Plaguing these efforts are issues of data quality (and public trust), system design, and organizational change. In the future, much effort needs to focus on building community-based environmental decision-making systems and processes, which will be a challenge given that exactly what needs to be developed is largely unknown and that environmental decision making in this arena has been characterized by a high level of conflict. Experimentation and evaluation are needed to contribute to efficient and effective learning about how best to use information technology to improve environmental decision making.

  3. 1992 yearbook of environmental and technology-related law

    International Nuclear Information System (INIS)

    Schroeder, M.

    1992-01-01

    The 1992 and sixth edition of this yearbook contains papers on environmental and technology-related law in the European Communities and the Federal Republic of Germany including among other things information on the latest jurisdiction by the European Court of Justice; insurability of environmental damage; scientific aspects of limit values. There are also treatises on non-German and comparative as well as international environmental and technology- related law which deal among other things with atomic and immission protection law and on harmonization and codification from a general point of view. Finally, some papers report on developments of national and European environmental and technology-related law. Three of the fifteen contributions have been abstracted separately. (HSCH) [de

  4. MUSES RT2AE V P/DP: On the Road to Privacy-Friendly Security Technologies in the Workplace

    OpenAIRE

    Van Der Sype, Yung Shin Marleen; Guislain, Jonathan; Seigneur, Jean-Marc; Titi, Xavier

    2016-01-01

    Successful protection of company data assets requires strong technological support. As many security incidents still occur from within, security technologies often include elements to monitor the behaviour of employees. As those security systems are considered as privacy-intrusive, they are hard to align with the privacy and data protection rights of the employees of the company. Even though there is currently no legal obligation for developers to embed privacy and data protection in security...

  5. Heterogeneous technologies, strategic groups and environmental efficiency technology gaps for European countries

    International Nuclear Information System (INIS)

    Kounetas, Konstantinos

    2015-01-01

    This paper measures technology (TG) and environmental efficiency technology gaps (EETGs) in 25 European countries over two distinct periods 2002 and 2008 examining the possible effect of adopted environmental regulations and the Kyoto protocol commitments on environmental efficiency technology gaps. However, the introduction of the metafrontier in our analysis puts into our discussion the role of heterogeneous technologies and its effect on the above-mentioned measures. Employing a directional distance function, we investigate whether there is an actual difference, in terms of environmental efficiency and efficiency performance, among European countries considering the technological frontiers under which they operate. The construction of individual frontiers has been realized employing a large number of variables that are highly correlated with countries' learning and absorbing capacity, new technological knowledge and using economic theory and classical frontier discrimination like developed vs. developing, North vs. South and participation in the Eurozone or not. The overall results indicate a crucial role of heterogeneous technologies for technology gaps in both periods. Moreover, a significant decrease for both measures, although in different percent, has been recorded emphasizing the key role of knowledge spillovers. -- Highlights: •We estimate technology gaps (TGs) for 25 EU countries in two distinct periods. •We estimate environmental efficiency technology gaps (EETGs). •We consider countries' technological capabilities with R&D, innovation and eco-innovation. •We test the effect of different frontier constitutions on TGs-EETGs. •We denote the specific role of knowledge spillovers

  6. Technologies for improved soil carbon management and environmental quality

    Energy Technology Data Exchange (ETDEWEB)

    Reicosky, D.C. [USDA-Agricultural Research Service, Morris, MN (United States)

    1997-12-31

    The objective of this paper is to create an environmental awareness of and to provide insight into the future balance of environment and economic issues in developing new technologies that benefit the farmer, the public, and agricultural product sales. Agricultural impacts of tillage-induced CO{sub 2} losses are addressed along with new and existing technologies to minimize tillage-induced flow of CO{sub 2} to the atmosphere, Emphasis is placed on the carbon cycle and the cost of environmental damage to illustrate the need for improved technologies leading to reduced environmental impacts by business ventures. New technologies and concepts related to methods of tillage and stover management for carbon sequestration with the agricultural production systems are presented. 16 refs., 3 figs.

  7. Implementing Information Security and Its Technology: A LineManagement Perspective

    Energy Technology Data Exchange (ETDEWEB)

    Barletta, William A.

    2005-08-22

    Assuring the security and privacy of institutionalinformation assets is a complex task for the line manager responsible forinternational and multi-national transactions. In the face of an unsureand often conflicting international legal framework, the line managermust employ all available tools in an Integrated Security and PrivacyManagement framework that ranges from legal obligations, to policy, toprocedure, to cutting edge technology to counter the rapidly evolvingcyber threat to information assets and the physical systems thatinformation systems control.

  8. Science, Technology, Engineering, and Mathematics (STEM) Education Reform to Enhance Security of the Global Cyberspace

    Science.gov (United States)

    2014-05-01

    towards cloud computing technologies and capabilities demand needs for developing new tools that work in ensemble to handle security challenges. A...programs with the schools and/or hire from their pool of students. Therefore, no real STEM standards exist at the tertiary and beyond levels of education ...successful in cyber operations and network security related jobs much early on into the new STEM education model pipeline. Subjects such as computer

  9. A centralized information management system for environmental science and technology

    Energy Technology Data Exchange (ETDEWEB)

    Namboodiri, K. [Martin Marietta Technical Services, Inc., Bay City, MI (United States)

    1995-12-31

    During the past few decades there have been several serious initiatives focusing on the applications of computational technology towards understanding the diverse fields of environmental research such as environmental monitoring, pollution prevention, and hazardous chemical mitigation. Recently, due to the widespread application of high performance computer technology and the renewed interest of the industrial community in environmental protection, we are witnessing an era of environmental information explosion. In light of these large-scale computer-driven developments, the author identifies a highly desirable initiative for this field, which is solely devoted to a centralized environmental database and information management system. This talk will focus on some design aspects of such an information management system.

  10. 75 FR 29533 - National Advisory Council for Environmental Policy and Technology Notice of Charter Renewal

    Science.gov (United States)

    2010-05-26

    ... and Technology Notice of Charter Renewal AGENCY: Environmental Protection Agency (EPA). ACTION: Notice....2, the National Advisory Council for Environmental Policy and Technology (NACEPT) is a necessary...

  11. Development of technology on environmental monitoring, (2)

    International Nuclear Information System (INIS)

    Morita, Shigemitsu; Shimizu, Takehiko; Akutsu, Ken; Shinohara, Kunihiko

    1992-01-01

    Technetium-99 (Tc-99), which has a long half-life and relatively high fission yield, is one of the important radionuclide for environmental assessment. Therefore, it is very important to investigate the distribution and behavior of these long-lived radionuclides in the environment. The conventional method for the determination of Tc-99 is beta-ray counting using a low-background gas flow proportional counter. However, the method has disadvantages in that it demands a high degree of radiochemical purification of Tc-99 to eliminate beta-ray emitting nuclides coexisting in the samples and the electrodeposition of Tc-99 for it activity counting, and in that it requires a rather long counting time. A new analytical technique using inductively coupled plasma mass spectrometry (ICP-MS) was applied to the determination of some long-lived radionuclides in environmental samples. The sensitivities were 10 to 10000 times better than other counting method. And counting times were 300 to 10000 times shorter than that method. ICP-MS is expected to be widely used for the determination of other low level and long-lived radionuclides, with high precision and lower detection limit. (author)

  12. Hawai‘i Distributed Energy Resource Technologies for Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2012-09-30

    HNEI has conducted research to address a number of issues important to move Hawai‘i to greater use of intermittent renewable and distributed energy resource (DER) technologies in order to facilitate greater use of Hawai‘i's indigenous renewable energy resources. Efforts have been concentrated on the Islands of Hawai‘i, Maui, and O‘ahu, focusing in three areas of endeavor: 1) Energy Modeling and Scenario Analysis (previously called Energy Road mapping); 2) Research, Development, and Validation of Renewable DER and Microgrid Technologies; and 3) Analysis and Policy. These efforts focused on analysis of the island energy systems and development of specific candidate technologies for future insertion into an integrated energy system, which would lead to a more robust transmission and distribution system in the state of Hawai‘i and eventually elsewhere in the nation.

  13. Applications of ultra-compact accelerator technologies for homeland security

    International Nuclear Information System (INIS)

    Sampayan, S.; Caporaso, G.; Chen, Y.J.; Falabella, S.; Guethlein, G.; Harris, J.R.; Hawkins, S.; Holmes, C.; Krogh, M.; Nelson, S.; Nunnally, W.; Paul, A.C.; Poole, B.; Rhodes, M.; Sanders, D.; Selenes, K.; Shaklee, K.; Sitaraman, S.; Sullivan, J.; Wang, L.; Watson, J.

    2007-01-01

    We report on a technology development to address explosive detector system throughout with increased detection probability. The system we proposed and are studying consists of a pixelized X-ray based pre-screener and a pulsed neutron source quantitative post verifier. Both technologies are derived from our compact accelerator development program for the Department of Energy Radiography Mission that enables gradients >10MV/m. For the pixelized X-ray source panel technology, we have performed initial integration and testing. For the accelerator, we are presently integrating and testing cell modules. For the verifier, we performed MCNP calculations that show good detectability of military and multi-part liquid threat systems. We detail the progress of our overall effort, including research and modeling to date, recent high voltage test results and concept integration

  14. Cyber-Security Issues in Healthcare Information Technology.

    Science.gov (United States)

    Langer, Steve G

    2017-02-01

    In 1999-2003, SIIM (then SCAR) sponsored the creation of several special topic Primers, one of which was concerned with computer security. About the same time, a multi-society collaboration authored an ACR Guideline with a similar plot; the latter has recently been updated. The motivation for these efforts was the launch of Health Information Portability and Accountability Act (HIPAA). That legislation directed care providers to enable the portability of patient medical records across authorized medical centers, while simultaneously protecting patient confidentiality among unauthorized agents. These policy requirements resulted in the creation of numerous technical solutions which the above documents described. While the mathematical concepts and algorithms in those papers are as valid today as they were then, recent increases in the complexity of computer criminal applications (and defensive countermeasures) and the pervasiveness of Internet connected devices have raised the bar. This work examines how a medical center can adapt to these evolving threats.

  15. Proceedings of Opportunity '95 -- Environmental technology through small business

    International Nuclear Information System (INIS)

    Kothari, V.P.

    1994-11-01

    The Opportunity '95--Environmental Technology Through Small Business conference was held November 16--17, 1994, at the Morgantown Energy Technology Center (METC) in Morgantown, West Virginia. The overall objective of this conference was to review the latest environmental and waste management technologies being developed under the sponsorship of the Environmental Management--Office of Technology Development (EM-OTD) Program at METC. The focus of this conference was also to address the accomplishments and barriers affecting small businesses, and lay the groundwork for future technology development initiatives and opportunities. Twenty papers were presented in three EM-OTD focus areas: mixed waste characterization, treatment and disposal (6 papers); contaminant plume containment and remediation (6 papers); and facility transitioning, decommissioning and final disposition (8 papers). In addition to the presentations, nine posters of environmental management areas were displayed. A panel discussion was also held on technology development assistance to small businesses. Selected papers are indexed separately for inclusion in the Energy Science and Technology Database

  16. Challenges of Information Technology Security in the NASA Environment

    Science.gov (United States)

    Santiago, S. S.

    2000-01-01

    A brief description of the NASA organization and how the CIO responsibilities are integrated into that organization followed by an introduction of the NASA ITS Program goals and objectives. An overview of the four major enterprises' cultures and how those cultures tie back to the Enterprises' missions. A description of the ITS challenges that exist stemming from the competing NASA Enterprises' requirements and how they have formed the basis of the NASA ITS Program. A talk will focus on policies and procedures and the technology being incorporated into the NASA infrastructure and how that technology ties back to the policies and procedures.

  17. Technology adoption and food security: the role of the Nigerian ...

    African Journals Online (AJOL)

    The focus of this paper is on the potential role of the Nigerian Agricultural Insurance Scheme (NAIS) in protecting the farmer from the plethora of risks associated with the transfer and introduction of modern technologies. The scheme can improve farmers' access to credit when the insurance contract is used as collateral for ...

  18. MIT Lincoln Laboratory: Technology in Support of National Security

    Science.gov (United States)

    2011-01-01

    technologies that could be uti - lized in future Landsat satellites to achieve significant economies of mass, size, power consumption, and cost, and...epitomized by the pregnancy test kit. However, immunoassays are typically based on anti bodies removed from their host cells and placed on substrates

  19. Newer Technologies for School Security. ERIC Digest Number 145.

    Science.gov (United States)

    Schneider, Tod

    This digest describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that allows for…

  20. Security Concerns in Telecommuting within the Information Technology Industry

    Science.gov (United States)

    Chithambo, Loyce Maosa

    2011-01-01

    Since the availability of remote access technology, most companies have adopted telecommuting as part of business operations. Although some research has identified policies and procedures when individuals telecommute, limited research exists about existing policies and procedures for telecommuters. The purpose of this qualitative descriptive…

  1. Agricultural extension, technology adoption and household food security

    NARCIS (Netherlands)

    Santos Rocha, Jozimo

    2017-01-01

    In this thesis, I use experimental and quasi-experimental data from 25 villages and a total of 1,105 farmers from eastern DRC to investigate the relationship among agricultural training, the adoption of agricultural technologies, crop productivity, and household food insecurity and dietary

  2. Discussion on the Technology and Method of Computer Network Security Management

    Science.gov (United States)

    Zhou, Jianlei

    2017-09-01

    With the rapid development of information technology, the application of computer network technology has penetrated all aspects of society, changed people's way of life work to a certain extent, brought great convenience to people. But computer network technology is not a panacea, it can promote the function of social development, but also can cause damage to the community and the country. Due to computer network’ openness, easiness of sharing and other characteristics, it had a very negative impact on the computer network security, especially the loopholes in the technical aspects can cause damage on the network information. Based on this, this paper will do a brief analysis on the computer network security management problems and security measures.

  3. Electron beam irradiation technology for environmental conservation

    International Nuclear Information System (INIS)

    Tokunaga, Okihiro; Arai, Hidehiko; Hashimoto, Shoji

    1992-01-01

    This paper reviews research and development of application of electron beam (EB) irradiation technology for treatment of flue gas and waste water, and for disinfection of sewage sludge. Feasibility studies on EB purification of flue gases have been performed with pilot-scale experiments in Japan, the USA and Germany, and is being carried out in Poland for flue gases from iron-sintering furnaces or coal burning boilers. Based on results obtained by experiments using simulated flue gas, pilot scale test for treatment of flue gas of low-sulfur containing coal combustion has recently started in Japan. Organic pollutants in waste water and ground water have been found to be decomposed by EB irradiation. Synergetic effect of EB irradiation and ozone addition was found to improve the decomposition efficiency. Electron beam irradiation technology for disinfection of water effluent from water treatment plants was found to avoid formation of chlorinated organic compounds which are formed in using chlorine. Efficient process for composting of sewage sludge disinfected by EB irradiation has been developed by small scale and pilot scale experiments. In the new process, disinfection by EB irradiation and composing can be done separately and optimum temperature for composting can be, therefore, selected to minimize period of composting. (author)

  4. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  5. Technologies for environmental cleanup: Toxic and hazardous waste management

    International Nuclear Information System (INIS)

    Ragaini, R.C.

    1993-12-01

    This is the second in a series of EUROCOURSES conducted under the title, ''Technologies for Environmental Cleanup.'' To date, the series consist of the following courses: 1992, soils and groundwater; 1993, Toxic and Hazardous Waste Management. The 1993 course focuses on recent technological developments in the United States and Europe in the areas of waste management policies and regulations, characterization and monitoring of waste, waste minimization and recycling strategies, thermal treatment technologies, photolytic degradation processes, bioremediation processes, medical waste treatment, waste stabilization processes, catalytic organic destruction technologies, risk analyses, and data bases and information networks. It is intended that this course ill serve as a resource of state-of-the-art technologies and methodologies for the environmental protection manager involved in decisions concerning the management of toxic and hazardous waste

  6. What can information technology do for environmental protection?

    International Nuclear Information System (INIS)

    Trauboth, H.

    1987-01-01

    Information technology plays an important role in the accomplishment of an effective environmental protection. Prerequisite for its comprehensive implementation is the legal and economic achievement of closed material cycles for supply and waste discharge in production and consumption as well as in nuclear technology. Modern information processing may be used for the inventory of natural and emission sources, to gain knowledge on the functioning mechanisms of nature, for the planning of a considerate exploitation of natural recources and for the ecology-oriented monitoring and control of industrial plants. The state of the art of the corresponding information technology and new areas of research especially in measurement technology are shown. The breadth of the great opportunities of information technology for environmental protection is discribed. (orig.) [de

  7. The Western Environmental Technology Office (WETO) Butte, Montana

    International Nuclear Information System (INIS)

    1994-10-01

    This document has been prepared to highlight the research, development, demonstration, testing and evaluation activities funded through the Western Environmental Technology Office (WETO) in Butte, Montana. Technologies and processes described have the potential to enhance DOE's cleanup and waste management efforts, as well as improve US industry's competitiveness in global environmental markets. This information has been assembled from recently produced Office of Technology Development (OTD) documents which highlight technology development activities within each of the OTD program elements. Projects include: Heavy metals contaminated soil project; In Situ remediation integrated program; Minimum additive waste stabilization program; Resource recovery project; Buried waste integrated demonstration; Mixed waste integrated program; Pollution prevention program; and Mine waste technology program

  8. How Secure Is Education in Information Technology? A Method for Evaluating Security Education in IT

    Science.gov (United States)

    Grover, Mark; Reinicke, Bryan; Cummings, Jeff

    2016-01-01

    As the popularity of Information Technology programs has expanded at many universities, there are a number of questions to be answered from a curriculum standpoint. As many of these programs are either interdisciplinary, or at least exist outside of the usual Computer Science and Information Systems programs, questions of what is appropriate for…

  9. The Savannah River environmental technology field test platform: Phase II

    International Nuclear Information System (INIS)

    Rossabi, J.; Riha, B.D.; May, C.P.; Pemberton, B.E.; Jarosch, T.R.; Eddy-Dilek, C.A.; Looney, B.B.; Raymond, R.

    1995-01-01

    The principal goal in the development of new technologies for environmental monitoring and characterization is transferring them to organizations and individuals for use in site assessment and compliance monitoring. The DOE complex has devised several strategies to facilitate this transfer including joint research projects between private industries and government laboratories or universities (CRADAs), and streamlined licensing procedures. One strategy that has been under-utilized is a planned sequence gradually moving from laboratory development and field demonstration to long term evaluation and onsite use. Industrial partnership and commercial production can be initiated at any step based on the performance, market, user needs, and costs associated with the technology. The Savannah River Technology Center (SRTC) has been developing a program to rigorously field test promising environmental technologies that have not undergone EPA equivalency testing. The infrastructure and staff expertise developed as part of the activities of the Savannah River Integrated Demonstration Program (i.e., wells, available power, conventional baseline characterization and monitoring equipment, shelter structures) allows field testing of technologies without the difficulties of providing remote field support. By providing a well-characterized site and a well-developed infrastructure, technologies can be tested for long periods of time to determine their appropriate applications in environmental characterization and monitoring activities. Situation specific evaluations of the technology following stringent test plans can be made in comparison with simultaneous baseline methods and historical data. This program is designed to help expedite regulatory approval and technology transfer to manufacturers and the user community

  10. Environmental Survey preliminary report, Pittsburgh Energy Technology Center, Pittsburgh, Pennsylvania

    Energy Technology Data Exchange (ETDEWEB)

    1988-09-01

    This report presents the preliminary findings from the first phase of the Environmental Survey of the US Department of Energy (DOE) Pittsburgh Energy Technology Center (PETC) conducted December 7--11, 1987. The Survey is being conducted by an interdisciplinary team of environmental specialists, led and managed by the Office of Environment, Safety and Health's Office of Environmental Audit. Individual team specialists are outside experts being supplied by a private contractor. The objective of the Survey is to identify environmental problems and areas of environmental risk associated with PETC. The Survey covers all environmental media and all areas of environmental regulation. It is being performed in accordance with the DOE Environmental Survey Manual. This phase of the Survey involves the review of existing site environmental data, observations of the operations carried on at PETC, and interviews with site personnel. The Survey team developed a Sampling and Analysis (S A) Plan to assist in further assessing certain environmental problems identified during its on-site Survey activities at PETC. The S A Plan will be executed by the Oak Ridge National Laboratory (ORNL). When completed, the Plan's results will be incorporated into the PETC Survey findings for inclusion into the Environmental Survey Summary Report. 64 refs., 23 figs., 29 tabs.

  11. Environmental Assessment for the Air Force Research Laboratory Security Fence Project, Edwards Air Force Base, California

    Science.gov (United States)

    2012-11-26

    Pleistocene/Early-Holocene Prehistory (12,000 to 7,000 BP). The Lake Mojave Period in the southwestern Great Basin comprises a regional manifestation...adaptive patterns with focal exploitation of such habitats (Tetra Tech 2010). Middle-Holocene Prehistory (8,000 to 4,000 BP). Succeeding Lake Mojave in the...Security Fence at Edwards Air Force Base, California Late Holocene Prehistory (4,000 to Contact). With return to more “favorable” environmental

  12. Quantification of environmental impacts of various energy technologies. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Selfors, A [ed.

    1994-10-01

    This report discusses problems related to economic assessment of the environmental impacts and abatement measures in connection with energy projects. Attention is called to the necessity of assessing environmental impacts both in the form of reduced economic welfare and in the form of costs of abatement measures to reduce the impact. In recent years, several methods for valuing environmental impacts have been developed, but the project shows that few empirical studies have been carried out. The final report indicates that some important factors are very difficult to evaluate. In addition environmental impacts of energy development in Norway vary considerably from project to project. This makes it difficult to obtain a good basis for comparing environmental impacts caused by different technologies, for instance hydroelectric power versus gas power or wind versus hydroelectric power. It might be feasible however to carry out more detailed economic assessments of environmental impacts of specific projects. 33 refs., 1 fig., 4 tabs.

  13. Bechtel Hanford, Inc. network security plan for the environmental restoration contract

    International Nuclear Information System (INIS)

    McCaffrey, M.B.

    1997-01-01

    As part of the Computer Protection Program, this Network Security Plan identifies the specific security measures used to protect the Bechtel Hanford, Inc. (BHI) enterprise network. The network consists of the communication infrastructure and information systems used by BHI to perform work related to the Environmental Restoration Contract (ERC) at the Hanford Site. It provides electronic communication between the ERC-leased facilities in Richland, Washington and other facilities located on the Hanford Site. Network gateways to other site and offsite networks provide electronic communication with the rest of the Hanford community. The enterprise network is comprised of several individual networks that operate under different conditions and perform different functions. The principal network used by BHI is the Bechtel Local Area Network (BLAN). This document identifies specific security issues surrounding the BLAN and the measures BHI takes to protect it. The other BHI-operated networks are discussed from the perspective of the security impact they have on the BLAN. This plan addresses security for individual and shared computer systems connected to the BHI networks as well as the gateways between other site and external networks. It specifically does not address computer-based information systems that store or process particularly sensitive data, computer systems connected to other site networks (e.g., Hanford Local Area Network), or standalone computers located in ERC facilities

  14. Environmental implications of wireless technologies: news delivery and business meetings.

    Science.gov (United States)

    Toffel, Michael W; Horvath, Arpad

    2004-06-01

    Wireless information technologies are providing new ways to communicate, and are one of several information and communication technologies touted as an opportunity to reduce society's overall environmental impacts. However, rigorous system-wide environmental impact comparisons of these technologies to the traditional applications they may replace have only recently been initiated, and the results have been mixed. In this paper, the environmental effects of two applications of wireless technologies are compared to those of conventional technologies for which they can substitute. First, reading newspaper content on a personal digital assistant (PDA) is compared to the traditional way of reading a newspaper. Second, wireless teleconferencing is compared to business travel. The results show that for both comparisons wireless technologies create lower environmental impacts. Compared to reading a newspaper, receiving the news on a PDA wirelessly results in the release of 32-140 times less CO2, several orders of magnitude less NOx and SOx, and the use of 26-67 times less water. Wireless teleconferencing results in 1-3 orders of magnitude lower CO2, NOx, and SO2 emissions than business travel.

  15. Driving forces and barriers for environmental technology development

    International Nuclear Information System (INIS)

    2005-01-01

    Driving forces and barriers behind development and usage of environmental technology is discussed, and also whether there are certain characteristics related to environmental innovations compared to other innovations in general. The development of environmental technology is in principle dominated by the same drivers and barriers as any other technology, but the order and strength of the various factors may be different. This examination as well as other empirical studies shows that regulations play a greater part for environmental technology than 'pure market forces'. To many participants it is important to be one step ahead of the regulations, i.e. the expected regulations are equally important as the factual ones in driving the technology development. Players in the business community express that it is important that the authorities cooperate with them when introducing new regulations. This will increase acceptance for the regulations and facilitate the necessary adjustments. The most important barrier in the development and use of the technologies studied is probably the lack of demand

  16. Development of IT-based Cyber Security Technology for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Hong, S. B.; Lee, J. C.; Choi, Y. S.; Choi, Y. R.; Cho, J. W.; Jung, C. E.; Jeong, K. I.; Park, B.; Koo, I. S.

    2009-11-01

    Development and enlargement of the high speed communication network make it possible the user to access online information easily. It generates changing offline activities to online in the economics, expansion of cultural interchanges and convenient life. But it also causes misuse, wiretapping, forgery and alteration of the information via illegal invasion(virus, hacking), and these are derived from the open network characteristic, weakness of the securities of the TCP/IP protocol and information systems. The security of individual and the national foundation facility(industry and government) can be threatened because of these problems, and theses can be used as a instrument of cyber-war. Many cyber security technologies have been developed to corp with the cyber threat. One of the most important national facility is the nuclear power plant and the necessity of the cyber security for the digital I and C of it have been proposed since middle of the 2000. KINS announced the regulation of the cyber security for the digital I and C of the nuclear power plant in 2007. The main concept of the cyber security for it is similar to the IT field that is treated as a leader of the cyber security. Because of the difference of the characteristics between the IT field and the nuclear industry, applying the cyber security technologies developed and used in the IT field to the nuclear industry has some critical constraints. We will analyze these problems and propose a cyber security method based on cryptograph and authentication for the I and C communication network in this report

  17. Development of IT-based Cyber Security Technology for Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Hong, S. B.; Lee, J. C.; Choi, Y. S.; Choi, Y. R.; Cho, J. W.; Jung, C. E.; Jeong, K. I.; Park, B.; Koo, I. S

    2009-11-15

    Development and enlargement of the high speed communication network make it possible the user to access online information easily. It generates changing offline activities to online in the economics, expansion of cultural interchanges and convenient life. But it also causes misuse, wiretapping, forgery and alteration of the information via illegal invasion(virus, hacking), and these are derived from the open network characteristic, weakness of the securities of the TCP/IP protocol and information systems. The security of individual and the national foundation facility(industry and government) can be threatened because of these problems, and theses can be used as a instrument of cyber-war. Many cyber security technologies have been developed to corp with the cyber threat. One of the most important national facility is the nuclear power plant and the necessity of the cyber security for the digital I and C of it have been proposed since middle of the 2000. KINS announced the regulation of the cyber security for the digital I and C of the nuclear power plant in 2007. The main concept of the cyber security for it is similar to the IT field that is treated as a leader of the cyber security. Because of the difference of the characteristics between the IT field and the nuclear industry, applying the cyber security technologies developed and used in the IT field to the nuclear industry has some critical constraints. We will analyze these problems and propose a cyber security method based on cryptograph and authentication for the I and C communication network in this report.

  18. The market for environmental efficient technology; Markedet for miljoeeffektiv teknologi

    Energy Technology Data Exchange (ETDEWEB)

    Engbo Rasmussen, Peter; Madsen, Peter G. [COWI (Denmark)

    2006-08-31

    As part of governmental preparation of a Danish action plan for environmental efficient technology, COWI has made an analysis of the global market for technological solutions to important environmental challenges. The analysis focuses on technology for solving environmental challenges connected with climate changes, exploitation of water resources as well as pollution that poses a threat to health including air pollution and chemicals. The Analysis is based on reports made in Denmark, significant export countries, the European Union and different international organizations e.g. OECD and the International Energy Agency. This report presents results of the analysis. Due to the fact that the analysis was completed late in 2005 it is solely based on data and reports known at the time. (BA)

  19. Energy technologies and the environment: environmental information handbook

    International Nuclear Information System (INIS)

    1981-06-01

    This manual draws together information on the environmental consequences of energy technologies that will be in use in the United States during the next 20 years. We hope it will prove useful to planners, policymakers, legislators, researchers, and environmentalists. The information on environmental issues, control technologies, and energy production and conservation processes should also be a convenient starting point for deeper exploration. Published references are given for the statements, data, and conclusions so that the interested reader can obtain more detailed information where necessary. Environmental aspects of energy technologies are presented in a form suitable for government and public use and are intended to assist decisionmakers, researchers, and the public with basic information and references that can be relied upon through changing policies and changing world energy prices

  20. CFC environmental problems and cooling technology

    International Nuclear Information System (INIS)

    Hornung, M.O.

    1991-08-01

    The aim of the report is to provide a broad survey of the technological problems imposed on the production of cooling systems by the demands for reduction in the use of chlorofluorocarbons as refrigerants. With regard to industrial research in this area the present situation is clarified and possible future developments are discussed. The influence of CFC gasses on the global environment and international and national legislation within this field are explained. Alternative refrigerants and cooling processes, and ways of reducing refrigerant leakage, are described. It is concluded that currently the use of alternative refrigerants is the policy which is generally accepted, and intensive research is being carried out in this field. R134a should substitute R12 in the cases of household refrigerators and air conditioning, and will soon be commercially available. The use of R22 and ammonia will be extended. This is a practical policy to follow up commercially, whereas the policy of alternative processes presents more problems because they are not so developed and there is less available know-how in this area. The possibilities for hermetic sealing of cooling systems are unrealistic and should anyway be regarded only as a supplement to alternative refrigerants. Within the European Community it is intended to provide standards and regulations in relation to air pollution from refrigerants. (AB) (58 refs.)

  1. Environmental Evaluation of Soil Salinity with Various Watering Technologies Assessment.

    Science.gov (United States)

    Seitkaziev, Adeubay; Shilibek, Kenzhegali; Fakhrudenova, Idiya; Salybayev, Satybaldy; Zhaparova, Sayagul; Duisenbayeva, Saule; Bayazitova, Zulfia; Aliya, Maimakova; Seitkazieva, Karlygash; Aubakirov, Hamit

    2018-01-01

      The purpose of this study is to develop mathematical tools for evaluating the level of environmental safety of various watering technologies. A set of indicators, was developed with regard to the natural factors, the nature of the man-induced load, degradation type, and characteristics of the disruption of humification conditions. Thermal and physical characteristics of the soil, the state of its surface, and meteorological factors, including air temperature, relative humidity, precipitation, wind speed, solar radiation, etc. were studied with a view to determining the heat and air exchange in the soil. An environmental evaluation of the methods for saline land development was conducted with regard to the heat and moisture supply. This tool can be used to determine the level of environmental safety of soil salinization during the environmental evaluation of the investigation of soil salinity with various watering technologies.

  2. ICT security- aspects important for nuclear facilities; Information and Communication Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thunem, Atoosa P-J.

    2005-09-15

    Rapid application growth of complex Information and Communication Technologies (ICT) in every society and state infrastructure as well as industry has revealed vulnerabilities that eventually have given rise to serious security breaches. These vulnerabilities together with the course of the breaches from cause to consequence are gradually about to convince the field experts that ensuring the security of ICT-driven systems is no longer possible by only relying on the fundaments of computer science, IT, or telecommunications. Appropriating knowledge from other disciplines is not only beneficial, but indeed very necessary. At the same time, it is a common observation today that ICT-driven systems are used everywhere, from the nuclear, aviation, commerce and healthcare domains to camera-equipped web-enabled cellular phones. The increasing interdisciplinary and inter-sectoral aspects of ICT security worldwide have been providing updated and useful information to the nuclear domain, as one of the emerging users of ICT-driven systems. Nevertheless, such aspects have also contributed to new and complicated challenges, as ICT security for the nuclear domain is in a much more delicate manner than for any other domains related to the concept of safety, at least from the public standpoint. This report addresses some important aspects of ICT security that need to be considered at nuclear facilities. It deals with ICT security and the relationship between security and safety from a rather different perspective than usually observed and applied. The report especially highlights the influence on the security of ICT-driven systems by all other dependability factors, and on that basis suggests a framework for ICT security profiling, where several security profiles are assumed to be valid and used in parallel for each ICT-driven system, sub-system or unit at nuclear facilities. The report also covers a related research topic of the Halden Project with focus on cyber threats and

  3. Machine Learning Technologies Translates Vigilant Surveillance Satellite Big Data into Predictive Alerts for Environmental Stressors

    Science.gov (United States)

    Johnson, S. P.; Rohrer, M. E.

    2017-12-01

    The application of scientific research pertaining to satellite imaging and data processing has facilitated the development of dynamic methodologies and tools that utilize nanosatellites and analytical platforms to address the increasing scope, scale, and intensity of emerging environmental threats to national security. While the use of remotely sensed data to monitor the environment at local and global scales is not a novel proposition, the application of advances in nanosatellites and analytical platforms are capable of overcoming the data availability and accessibility barriers that have historically impeded the timely detection, identification, and monitoring of these stressors. Commercial and university-based applications of these technologies were used to identify and evaluate their capacity as security-motivated environmental monitoring tools. Presently, nanosatellites can provide consumers with 1-meter resolution imaging, frequent revisits, and customizable tasking, allowing users to define an appropriate temporal scale for high resolution data collection that meets their operational needs. Analytical platforms are capable of ingesting increasingly large and diverse volumes of data, delivering complex analyses in the form of interpretation-ready data products and solutions. The synchronous advancement of these technologies creates the capability of analytical platforms to deliver interpretable products from persistently collected high-resolution data that meet varying temporal and geographic scale requirements. In terms of emerging environmental threats, these advances translate into customizable and flexible tools that can respond to and accommodate the evolving nature of environmental stressors. This presentation will demonstrate the capability of nanosatellites and analytical platforms to provide timely, relevant, and actionable information that enables environmental analysts and stakeholders to make informed decisions regarding the prevention

  4. Mobile Security: A Systems Engineering Framework for Implementing Bring Your Own Device (BYOD) Security through the Combination of Policy Management and Technology

    Science.gov (United States)

    Zahadat, Nima

    2016-01-01

    With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…

  5. Information technology as a tool for the Italian Institute of Social Security (INPS) in the management of social security and civil disability: Pro and cons.

    Science.gov (United States)

    Sammicheli, Michele; Scaglione, Marcella

    2018-01-01

    We examine, from a medical-legal perspective, the pro and cons of the information technology procedures that the Italian Institute of Social Security (INPS) has implemented to manage the provision of social disability assistance, meaning that separate from the payment of pension contributions, being welfare, anchored to an administrative requirement by way of the compulsory payment of a minimum social security contribution.

  6. Application of environmental isotope tracing technology to geothermal geochemistry

    International Nuclear Information System (INIS)

    Shang Yingnan

    2006-01-01

    This paper reviews the recent application and development of environmental isotope tracing technology to geothermal geochemistry in the following aspects: gas isotopes (He, C) tracing of warm springs; H, O isotope tracing on the origin and cause of geothermal water, environmental isotope dating of geothermal water, and the advantage of excess parameter of deuterium (d) in geothermal research. The author also suggests that isotope method should combine with other geological methods to expand its advantage. (authors)

  7. Environmental management practices, environmental technology portfolio, and environmental commitment: A content analytic approach for U.K. manufacturing firms

    OpenAIRE

    Nath, P; Ramanathan, R

    2016-01-01

    This study investigates how various aspects of environmental management practices EMPs (operational, strategic, and tactical) undertaken by firms influence their environmental technology portfolios ETPs (pollution control and pollution prevention). It also explores the role of environmental commitment of firms on the influence of EMPs on ETPs. This study uses data from content analysis of annual reports, and corporate social responsibility reports available from corporate websites of 76 UK ma...

  8. Forty years of environmentally conscious building technology design

    Directory of Open Access Journals (Sweden)

    Lorenzo Matteoli

    2013-05-01

    Full Text Available This short essay analyzes the environmental approach throughout the history of Architectural Technology, starting from building details up to the present attention to the smart city, land maintenance and urban retrofit, seen as complex research activities, political strategies, design and entrepreneurial actions which have the scope to transform present day urban crusts into organic textures, climatologically consistent, reactive, user-friendly, efficient and with a low environmental impact. The exercise identifies some research and teaching trends for Architectural Technology in order to promote debate and the analysis of the historical perspective and present situation of the discipline.

  9. Technologies for security, military police, and professional policing organizations: the Department of Energy perspective

    Science.gov (United States)

    Steele, Basil J.

    1997-01-01

    There are many emerging technologies that can be used to help the law enforcement community protect the public as well as public and private facilities against ever increasing threats to this country and its resources. These technologies include sensors, closed circuit television (CCTV), access control, contraband detection, communications, control and display, barriers, and various component and system modeling techniques. This paper will introduce some of the various technologies that have been examined for the Department of Energy that could be applied to various law enforcement applications. They include: scannerless laser radar; next generation security systems; response force video information helmet system; access delay technologies; rapidly deployable intrusion detection systems; cost risk benefit analysis.

  10. Environmental and Financial Evaluation of Passenger Vehicle Technologies in Belgium

    Directory of Open Access Journals (Sweden)

    Maarten Messagie

    2013-11-01

    Full Text Available Vehicles with alternative drive trains are regarded as a promising substitute for conventional cars, considering the growing concern about oil depletion and the environmental impact of our transportation system. However, “clean” technologies will only be viable when they are cost-efficient. In this paper, the environmental impacts and the financial costs of different vehicle technologies are calculated for an average Belgian driver. Environmentally friendly vehicles are compared with conventional petrol and diesel vehicles. The assessments are done from a life cycle perspective. The effect on human health, resources and ecosystems is considered when calculating the environmental impact. The total cost of ownership (TCO model includes the purchase price, registration and road taxes, insurance, fuel or electricity cost, maintenance, tires replacement, technical control, battery leasing and battery replacement. In the presented analysis different vehicle technologies and fuels are compared (petrol, diesel, hybrid electric vehicles (HEVs, battery electric vehicles (BEVs and plug-in hybrid electric vehicles (PHEVs on their level of environmental impact and cost per kilometer. The analysis shows a lower environmental impact for electric vehicles. However, electric vehicles have a higher total cost of ownership compared to conventional vehicles, even though the fuel operating costs are significantly lower. The purchase cost of electric vehicles is highly linked to the size of the battery pack, and not to the size of the electric vehicle. This explains the relative high cost for the electric city cars and the comparable cost for the medium and premium cars.

  11. Preparation of environmental analyses for synfuel and unconventional gas technologies

    Energy Technology Data Exchange (ETDEWEB)

    Reed, R.M. (ed.)

    1982-09-01

    Government agencies that offer financial incentives to stimulate the commercialization of synfuel and unconventional gas technologies usually require an analysis of environmental impacts resulting from proposed projects. This report reviews potentially significant environmental issues associated with a selection of these technologies and presents guidance for developing information and preparing analyses to address these issues. The technologies considered are western oil shale, tar sand, coal liquefaction and gasification, peat, unconventional gas (western tight gas sands, eastern Devonian gas shales, methane from coal seams, and methane from geopressured aquifers), and fuel ethanol. Potentially significant issues are discussed under the general categories of land use, air quality, water use, water quality, biota, solid waste disposal, socioeconomics, and health and safety. The guidance provided in this report can be applied to preparation and/or review of proposals, environmental reports, environmental assessments, environmental impact statements, and other types of environmental analyses. The amount of detail required for any issue discussed must, by necessity, be determined on a case-by-case basis.

  12. Environmental aspects of battery and fuel cell technologies

    International Nuclear Information System (INIS)

    1992-10-01

    This report was commissioned by the UK Department of Trade and Industry in order to understand the policy, infrastructural and standards implications of increased use of batteries and fuel cells. In order to meet these requirements, the following areas have been examined: environmental initiatives related to power generation and transport in a pan-European context; the status of alternative technologies, specifically batteries and fuel cells; the market potential of battery and fuel cell based technologies in transport and power generation; environmental life cycle and cost benefit analyses of these technologies; the implications of the use of alternative technologies on the UK infrastructure. Each of these areas is covered briefly in the main body of the report and discussed in greater detail in six appendices. Overall there are 51 figures, 38 tables and 20 references. (UK)

  13. QuEST: Qualifying Environmentally Sustainable Technologies. Volume 6

    Science.gov (United States)

    Lewis, Pattie

    2011-01-01

    QuEST is a publication of the NASA Technology Evaluation for Environmental Risk Mitigation Principal Center (TEERM). This issue contains brief articles on: Risk Identification and Mitigation, Material Management and Substitution Efforts--Hexavalent Chrome-free Coatings and Low volatile organic compounds (VOCs) Coatings, Lead-Free Electronics, Corn-Based Depainting Media; Alternative Energy Efforts Hydrogen Sensors and Solar Air Conditioning. Other TEERM Efforts include: Energy and Water Management and Remediation Technology Collaboration.

  14. Environmental Security: What Environmental Issues Impact Regional Stability and Affect United States Foreign Policy with Mexico?

    Science.gov (United States)

    1997-03-01

    extraregional sponsor of Alianza para el Desarrollo Sostenible (Sustainable Development Alliance - ALIDES), along with United States and Canada. ALIDES is...more stable the government the better the country will be able to solve its environmental problems. 42 Glossary ALIDES Alianza para el Desarrollo ... Sostenible (Sustainable Development Alliance) C Centigrade CFCs Chlorofluorocarbons BECC Border Environment Cooperation Commission BNC Binational

  15. Oklahoma State University proposed Advanced Technology Research Center. Environmental Assessment

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-06-01

    The Department of Energy (DOE) has prepared an Environmental Assessment (EA) evaluating the construction and equipping of the proposed Advanced Technology Research Center (ATRC) at Oklahoma State University (OSU) in Stillwater, Oklahoma. Based on the analysis in the EA, the DOE has determined that the proposed action does not constitute a major federal action significantly affecting the quality of the human environment within the meaning of the National Environmental Policy Act (NEPA) of 1969. Therefore, the preparation of an Environmental Impact Statement is not required.

  16. Applications of information technology in the environmental area

    International Nuclear Information System (INIS)

    Jaeschke, A.; Page, B.

    1987-03-01

    The state of events in the environment are described by physical, chemical, meteorological and biological data. The spatially distributed information cannot be managed without technical help from automatic measuring devices, data telecommunication and process data processing. The computer-aided creation of models and simulation represent an aid involving environmental problems. One considerable extension of the possibilities will be provided by the introduction of the methods of artificial intelligence, especially expert systems. The use of information technology therefore forms an important precondition for environmental protection. The contributions illustrate the state of development of communication between scientists in the field of environmental protection. (DG) [de

  17. Smart Sensing Technology for Agriculture and Environmental Monitoring

    CERN Document Server

    2012-01-01

    The book focuses on the different aspects of sensing technology, i.e. high reliability, adaptability, recalibration, information processing, data fusion, validation and integration of novel and high performance sensors specifically aims to monitor agricultural and environmental parameters.   This book is dedicated to Sensing systems for Agricultural and Environmental Monitoring  offers to variety of users, namely, Master and PhD degree students, researchers, practitioners, especially Agriculture and Environmental engineers. The book will provide an opportunity of a dedicated and a deep approach in order to improve their knowledge in this specific field.

  18. About Place and Role of Information and Communication Technologies, Information Security at the Present Stage

    Directory of Open Access Journals (Sweden)

    Alexander A. Galushkin

    2015-12-01

    Full Text Available In the present article author considers questions of importance of information and communication technologies in modern information society and about information security. In the course of the research the author analyzes opinions both known Russian, and famous foreign scientists and practicians from various countries of the world (Italy, the USA, Portugal, etc.. Author emphasizes importance of information and communication technologies at the present stage of development of society and state.

  19. Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 & STA 2012

    CERN Document Server

    Kim, Jongsung; Zou, Deqing; Lee, Yang

    2012-01-01

    ITCS 2012 and STA 2012 address the various theories and practical applications of information technology convergence, secure and trust computing, and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of ITCS 2012 & STA 2012. In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future.

  20. Public participation in the evaluation of innovative environmental cleanup technology

    International Nuclear Information System (INIS)

    Peterson, T.; McCabe, G.; Serie, P.; Niesen, K.

    1994-08-01

    Technologies for remediation of contamination are urgently needed to clean up US Department of Energy (DOE) sites across the country. DOE is managing a national program to develop, demonstrate, and deploy new technologies with promise to expedite this cleanup. The Integrated Demonstration for Cleanup of Volatile Organic Compounds at Arid Sites (VOC-Arid ID) is one such effort. Time and resources, however, are too limited to be invested in methods of remediation that will never be deployed because they have not been rigorously evaluated or because they face the withering opposition of stakeholders. Therefore the VOC-Arid ID is assessing technology both in terms of its technical effectiveness and its stakeholder acceptability. Only if a technology performs as required and is acceptable to regulators, users of technology, and the public will the VOC-Arid ID recommend its use. What distinguishes public involvement in the VOC-Arid ID is the direct influence stakeholders have on the design of technology demonstrations by working directly with technology developers. Stakeholders participated in defining the criteria with which innovative environmental cleanup technology is being evaluated. The integrated demonstration is committed to providing stakeholders with the information they've indicated they need to reach reasoned judgments about the use of specific cleanup technologies. A guiding principle of the VOC-Arid ID is that stakeholder participation improves the technologies being developed, enhances the acceptance of the technologies, and will lead to the broad and timely deployment of appropriate and effective methods of environmental remediation. The VOC-Arid ID has involved stakeholders from the host demonstration site, Hanford, Washington, and from other and sites where the ID technologies may be deployed