WorldWideScience

Sample records for exterior physical security

  1. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    terrorist or criminal targets based on their grade, assignment, symbolic value, criticality, and threat and vulnerability assessment. Levels of protection The recommendations contained in this criterion are intended to minimize the possibility of HRP casualties in buildings or portions of buildings in which they work and live. These recommendations provide appropriate and implementable measures to establish a level of protection against terrorist attacks where no known threat of terrorist activity currently exists. While complete protection against all potential threats is cost prohibitive, the intent of these recommendations can be achieved through prudent master planning, real estate acquisition, and design and construction practices. Tag number The tag number at the beginning of each physical security measure (recommendation is unique and is intended to be a communication aid when linking the requirement (recommendation to the supporting text or commentary. The three-character tag number uses the following legend. Tag Number First Character -The first character is an abbreviation for the defense zone layer that is most applicable for the countermeasure. “S” is used to represent site or external zone issues. “P” is used to represent the perimeter zone. “G” is used to represent issues relative to the property grounds. “E” is used to represent issues associated with the building exterior of the HRP office or residence. “I” is used to represent issues associated with the building interior. “H” is used to represent issues associated with the safe room or safe haven. Tag Number Second Character - The second character is a sequential number for countermeasures in a given zone - a requirement or a recommendation. This number ensures a unique tag number. Tag Number Third Character- The third character indicates whether the countermeasure is applicable to offices, residences, or both (common. “O” indicates a requirement or recommendation unique to

  2. Mobile robot vehicles for physical security

    International Nuclear Information System (INIS)

    McGovern, D.E.

    1987-07-01

    A fleet of vehicles is being developed and maintained by Sandia National Labs for studies in remote control and autonomous operation. These vehicles range from modified commercial vehicles to specially constructed mobile platforms and are utilized as test beds for developing concepts in the application of robotics to interior and exterior physical security. Actuators control the vehicle speed, brakes, and steering through manual input from a remote driving station or through some level of digital computer control. On-board processing may include simple vehicle control functions or may allow for unmanned, autonomous operation. communication links are provided for digital communication between control computers, television transmission for vehicle vision, and voice for local control. With these vehicles, SNL can develop, test, and evaluate sensors, processing requirements, various methods of actuator implementation, operator controlled feedback requirements, and vehicle operations. A description of the major features and uses for each of the vehicles in the fleet is provided

  3. Mobile robot vehicles for physical security

    International Nuclear Information System (INIS)

    Mc Govern, D.E.

    1987-01-01

    A fleet of vehicles is being developed and maintained by Sandia National Labs for studies in remote control and autonomous operation. These vehicles range from modified commercial vehicles to specially constructed mobile platforms and are utilized as test beds for developing concepts in the application of robotics to interior and exterior physical security. Actuators control the vehicle speed, brakes, and steering through manual input from a remote driving station or through some level of digital computer control. On-board processing may include simple vehicle control functions or may allow for unmanned, autonomous operation. Communication links are provided for digital communication between control computers, television transmission for vehicle vision, and voice for local control. With these vehicles, SNL can develop, test, and evaluate sensors, processing requirements, various methods of actuator implementation, operator controlled feedback requirements, and vehicle operations. A description of the major features and uses for each of the vehicles in the fleet is provided

  4. Mobile robot vehicles for physical security

    International Nuclear Information System (INIS)

    McGovern, D.E.

    1987-06-01

    A fleet of vehicles is being developed and maintained by Sandia National Labs for studies in remote control and autonomous operation. These vehicles range from modified commercial vehicles to specially constructed mobile platforms and are utilized as test beds for developing concepts in the application of robotics to interior and exterior physical security. Actuators control the vehicle speed, brakes, and steering through manual input from a remote driving station or through some level of digital computer control. On-board processing may include simple vehicle control functions or may allow for unmanned, autonomous operation. Communication links are provided for digital communication between control computers, television transmission for vehicle vision, and voice for local control. With these vehicles, SNL can develop, test, and evaluate sensors, processing requirements, various methods of actuator implementation, operator controlled feedback requirements, and vehicle operations. A description of the major features and uses for each of the vehicles in the fleet is provided. 4 refs., 1 fig., 1 tab

  5. The remote security station (RSS)

    International Nuclear Information System (INIS)

    Pletta, J.B.

    1991-01-01

    This paper reports that, as an outgrowth of research into physical security systems, Sandia is investigating robotic technologies for improving physical security performance and flexibility. Robotic systems have the potential to allow more effective utilization of security personnel, especially in scenarios where they might be exposed to harm. They also can supplement fixed site installations where sensors have failed or where transient assets are present. The Remote Security Station (RSS) program for the defense Nuclear Agency is developing a proof-of-principle robotic system which will be used to evaluate the role, and associated cost, of robotic technologies in exterior physical security systems. The RSS consists of three primary elements: a fixed but quickly moveable tripod with intrusion detection sensors and assessment camera; a mobile robotic platform with a functionally identical security module; and a control console which allows an operator to perform security functions and teleoperate the mobile platform

  6. A primer on exterior differential calculus

    Directory of Open Access Journals (Sweden)

    Burton D.A.

    2003-01-01

    Full Text Available A pedagogical application-oriented introduction to the cal­culus of exterior differential forms on differential manifolds is presented. Stokes' theorem, the Lie derivative, linear con­nections and their curvature, torsion and non-metricity are discussed. Numerous examples using differential calculus are given and some detailed comparisons are made with their tradi­tional vector counterparts. In particular, vector calculus on R3 is cast in terms of exterior calculus and the traditional Stokes' and divergence theorems replaced by the more powerful exterior expression of Stokes' theorem. Examples from classical continuum mechanics and spacetime physics are discussed and worked through using the language of exterior forms. The numerous advantages of this calculus, over more traditional ma­chinery, are stressed throughout the article. .

  7. Wireless physical layer security

    Science.gov (United States)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  8. Formalizing physical security procedures

    NARCIS (Netherlands)

    Meadows, C.; Pavlovic, Dusko

    Although the problems of physical security emerged more than 10,000 years before the problems of computer security, no formal methods have been developed for them, and the solutions have been evolving slowly, mostly through social procedures. But as the traffic on physical and social networks is now

  9. 32 CFR 700.826 - Physical security.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Physical security. 700.826 Section 700.826... Commanding Officers in General § 700.826 Physical security. (a) The commanding officer shall take appropriate... officer shall take action to protect and maintain the security of the command against dangers from fire...

  10. Cyber/Physical Security Vulnerability Assessment Integration

    International Nuclear Information System (INIS)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-01-01

    This internally funded Laboratory-Directed R and D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  11. Geometrical treatment of non-potential interactions: the exterior variational calculus, dynamical systems, physical 1-forms and variational selfadjointness

    International Nuclear Information System (INIS)

    Trostel, R.

    1982-01-01

    A mathematical objective of this paper is to provide geometrical formulation of the integrability conditions for the existence of an action functional, that is, to provide a geometrical counterpart (similar to that by Abraham, Marsden, and Hughes) of the variational and functional approach to self-adjointness. This objective is achieved via the exterior variational calculus, an exterior differential calculus on the vector space of functions depending on time or space time, using from the outset extensively the concept of functional differentiation as its foundation. Variational self-adjointness equals the variational closure of the physical 1-form, the vanishing of a generalized curl-operation applied to the equations of motion. The convenience of this more formal approach is demonstrated, not only when deriving the conditions of variational self-adjointness for materials of differential type of arbitrary order (particles or fields), using roughly no more than Dirac's delta-distributions, but also when treating materials of a broader class (including causal and acausal constitutive functionals, materials of rate type, integral type, etc.). A physical objective of this paper is achieved by pointing out that, as physics is primarily concerned with the solutions of the evolution equations, i.e., with the set of the zero points of the physical 1-form, an equivalence relation among the physical 1-forms on the infinite dimensional vector space of functions is constructed by leaving the set of their zero points unchanged. Using this result, a direct Lagrangian universality is indicated and an almost one presented. Moreover, all physical 1-forms connected by invertible supermatrices (thus mixing the evolution law of different times or space-time) are equivalent. Choosing these supermatrices to be diagonal in time or space-time yields the indirect analytical representation factors

  12. Work Models in the Design Process for House Interior and Exterior: Physical or Virtual?

    Science.gov (United States)

    Bradecki, Tomasz; Uherek-Bradecka, Barbara

    2017-10-01

    The article presents the effects of research on different types of models of single family houses and multifamily houses. Exterior layout and interior functional layout are the main drivers for the final result of a design. Models are an important medium for presentation of architectural designs and play a pivotal role in explaining the first idea to people and potential clients. Although 3D models have unlimited possibilities of representation, some people cannot understand or ‘feel’ the designed space. The authors try to test how to combine the interior and the exterior in a single synthetic model. Several models of different houses have been presented in the article. All the case studies were developed with physical models, 3D models, and 2D hand sketches. The main focus of the work with the models was to achieve a coherent vision for future feeling of open space in designed houses. The research shows how synthetic models might be helpful in the design process. The research was carried in the URBAN model research group (urbanmodel.org, Gliwice, Poland) that consists of academic researchers and architects. The models reflect architectural experience gathered by the authors during their work on theoretical models, architectural projects and by supervision on site during construction site visits. Conclusions might be helpful for developers, architects, interior designers and architecture students.

  13. The Remote Security Station (RSS) final report

    International Nuclear Information System (INIS)

    Pletta, J.B.; Amai, W.A.; Klarer, P.; Frank, D.; Carlson, J.; Byrne, R.

    1992-10-01

    The Remote Security Station (RSS) was developed by Sandia National Laboratories for the Defense Nuclear Agency to investigate issues pertaining to robotics and sensor fusion in physical security systems. This final report documents the status of the RSS program at its completion in April 1992. The RSS system consists of the Man Portable Security Station (MaPSS) and the Telemanaged Mobile Security Station (TMSS), which are integrated by the Operator's Control Unit (OCU) into a flexible exterior perimeter security system. The RSS system uses optical, infrared, microwave, and acoustic intrusion detection sensors in conjunction with sensor fusion techniques to increase the probability of detection and to decrease the nuisance alarm rate of the system. Major improvements to the system developed during the final year are an autonomous patrol capability, which allows TMSS to execute security patrols with limited operator interaction, and a neural network approach to sensor fusion, which significantly improves the system's ability to filter out nuisance alarms due to adverse weather conditions

  14. 75 FR 34170 - Plastic Omnium Automotive Exteriors, LLC, Anderson, SC; Plastic Omnium Automotive Exteriors, LLC...

    Science.gov (United States)

    2010-06-16

    ... Omnium Automotive Exteriors, LLC, Anderson, SC; Plastic Omnium Automotive Exteriors, LLC, Troy, MI... the Anderson, South Carolina location of Plastic Omnium Automotive Exteriors, LLC, working out of Troy... certification to include workers in support of the Anderson, South Carolina facility working out of Troy...

  15. Cost and performance analysis of physical security systems

    International Nuclear Information System (INIS)

    Hicks, M.J.; Yates, D.; Jago, W.H.; Phillips, A.W.

    1998-04-01

    Analysis of cost and performance of physical security systems can be a complex, multi-dimensional problem. There are a number of point tools that address various aspects of cost and performance analysis. Increased interest in cost tradeoffs of physical security alternatives has motivated development of an architecture called Cost and Performance Analysis (CPA), which takes a top-down approach to aligning cost and performance metrics. CPA incorporates results generated by existing physical security system performance analysis tools, and utilizes an existing cost analysis tool. The objective of this architecture is to offer comprehensive visualization of complex data to security analysts and decision-makers

  16. Physical security technologies for weapons complex reconfiguration facilities

    International Nuclear Information System (INIS)

    Jaeger, C.D.

    1994-01-01

    Sandia National Laboratories was a member of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S ampersand S) team providing assistance to the Department of Energy's (DOE) Office of Weapons Complex Reconfiguration. The physical security systems in the new and upgraded facilities being considered for the WCR had to meet DOE orders and other requirements set forth in the WCR Programmatic Design Criteria (PDC), incorporate the latest physical security technologies using proven state-of-the-art systems and meet fundamental security principles. The outcome was to avoid costly retrofits and provide effective and comprehensive protection against current and projected threats with minimal impact on operations, costs and schedule. Physical security requirements for WCR facilities include: (1) reducing S ampersand S life-cycle costs, (2) where feasible automating S ampersand S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, (3) increasing the amount of delay to outsider adversary attack, (4) compartmentalizing the facility to minimize the number of personnel requiring access to critical areas and (5) having reliable and maintainable systems. To be most effective against threats physical security must be integrated with facility operations, safety and other S ampersand S activities, such as material control and accountability, nuclear measurements and computer and information security. This paper will discuss the S ampersand S issues, requirements, technology opportunities and needs. Physical security technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed

  17. Securing wireless communications at the physical layer

    CERN Document Server

    Liu, Ruoheng

    2009-01-01

    Throughout this book there is an underlying theme that the rich multipath environment that is typical of wireless scenarios supports the establishment of new security services at the physical layer, including new mechanisms that establish cryptographic keys, that support communication with assured confidentiality, and that can authenticate transmitters in mobile environments. The book takes a holistic approach to covering topics related to physical layer security solutions, with contributions ranging from the theoretical underpinnings behind secure communications to practical systems validatio

  18. Physical security in multinational nuclear-fuel-cycle operations

    International Nuclear Information System (INIS)

    Willrich, M.

    1977-01-01

    Whether or not multinationalization will reduce or increase risks of theft or sabotage will depend on the form and location of the enterprise, the precise nature of the physical security arrangements applied to the enterprise, and the future course of crime and terrorism in the nuclear age. If nuclear operations are multinationalized, the host government is likely to insist on physical security measures that are at least as stringent as those for a national or private enterprise subject to its jurisdiction. At the same time, the other participants will want to be sure the host government, as well as criminal groups, do not steal nuclear material from the facility. If designed to be reasonably effective, the physical security arrangements at a multinational nuclear enterprise seem likely to reduce the risk that any participating government will seek to divert material from the facility for use in a nuclear weapons program. Hence, multinationalization and physical security will both contribute to reducing the risks of nuclear weapons proliferation to additional governments. If economic considerations dominate the timing, scale and location of fuel-cycle facilities, the worldwide nuclear power industry is likely to develop along lines where the problems of physical security will be manageable. If, however, nuclear nationalism prevails, and numerous small-scale facilities become widely dispersed, the problem of security against theft and sabotage may prove to be unmanageable. It is ironic, although true, that in attempting to strengthen its security by pursuing self-sufficiency in nuclear power, a nation may be reducing its internal security against criminal terrorists

  19. SOR/84-81, Physical Security Regulations, amendment

    International Nuclear Information System (INIS)

    1984-01-01

    The Physical Security Regulations of 14 January 1983 which establish regulations concerning security systems, equipment and procedures at nuclear installations were amended in particular to take account of Canada's Charter of Rights and to provide for the security of certain information. (NEA)

  20. A Hierarchical Security Architecture for Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  1. Physical layer approaches for securing wireless communication systems

    CERN Document Server

    Wen, Hong

    2013-01-01

    This book surveys the outstanding work of physical-layer (PHY) security, including  the recent achievements of confidentiality and authentication for wireless communication systems by channel identification. A practical approach to building unconditional confidentiality for Wireless Communication security by feedback and error correcting code is introduced and a framework of PHY security based on space time block code (STBC) MIMO system is demonstrated.  Also discussed is a scheme which combines cryptographic techniques implemented in the higher layer with the physical layer security approach

  2. Cyber-Physical Systems Security: a Systematic Mapping Study

    OpenAIRE

    Lun, Yuriy Zacchia; D'Innocenzo, Alessandro; Malavolta, Ivano; Di Benedetto, Maria Domenica

    2016-01-01

    Cyber-physical systems are integrations of computation, networking, and physical processes. Due to the tight cyber-physical coupling and to the potentially disrupting consequences of failures, security here is one of the primary concerns. Our systematic mapping study sheds some light on how security is actually addressed when dealing with cyber-physical systems. The provided systematic map of 118 selected studies is based on, for instance, application fields, various system components, relate...

  3. Physical security of cut-and-cover underground facilities

    International Nuclear Information System (INIS)

    Morse, W.D.

    1998-01-01

    To aid designers, generic physical security objectives and design concepts for cut-and-cover underground facilities are presented. Specific aspects addressing overburdens, entryways, security doors, facility services, emergency egress, security response force, and human elements are discussed

  4. Spray Foam Exterior Insulation with Stand-Off Furring

    Energy Technology Data Exchange (ETDEWEB)

    Herk, Anastasia [IBACOS, Inc., Pittsburgh, PA (United States); Baker, Richard [IBACOS, Inc., Pittsburgh, PA (United States); Prahl, Duncan [IBACOS, Inc., Pittsburgh, PA (United States)

    2014-03-01

    IBACOS, in collaboration with GreenHomes America, was contracted by the New York State Energy Research and Development Authority to research exterior wall insulation solutions. This research investigated cost-effective deep energy retrofit (DER) solutions for improving the building shell exterior while achieving a cost-reduction goal, including reduced labor costs to reach a 50/50 split between material and labor. The strategies included exterior wall insulation plus energy upgrades as needed in the attic, mechanical and ventilation systems, and basement band joist, walls, and floors. The work can be integrated with other home improvements such as siding or window replacement. This strategy minimizes physical connections to existing wall studs, encapsulates existing siding materials (including lead paint) with spray foam, and creates a vented rain screen assembly to promote drying. GreenHomes America applied construction details created by IBACOS to a test home. 2x4 framing members were attached to the wall at band joists and top plates using 'L' clips, with spray foam insulating the wall after framing was installed. Windows were installed simultaneously with the framing, including extension jambs. The use of clips in specific areas provided the best strength potential, and 'picture framing' the spray foam held the 2x4s in place. Short-term testing was performed at this house, with monitoring equipment installed for long-term testing. Testing measurements will be provided in a later report, as well as utility impact (before and after), costs (labor and materials), construction time, standard specifications, and analysis for the exterior wall insulation strategy.

  5. Spray Foam Exterior Insulation with Stand-Off Furring

    Energy Technology Data Exchange (ETDEWEB)

    Herk, Anatasia [IBACOS, Inc., Pittsburgh, PA (United States); Baker, Richard [IBACOS, Inc., Pittsburgh, PA (United States); Prahl, Duncan [IBACOS, Inc., Pittsburgh, PA (United States)

    2014-03-01

    IBACOS, in collaboration with GreenHomes America, was contracted by the New York State Energy Research and Development Authority to research exterior wall insulation solutions. This research investigated cost-effective deep energy retrofit (DER) solutions for improving the building shell exterior while achieving a cost-reduction goal, including reduced labor costs to reach a 50/50 split between material and labor. The strategies included exterior wall insulation plus energy upgrades as needed in the attic, mechanical and ventilation systems, and basement band joist, walls, and floors. The work can be integrated with other home improvements such as siding or window replacement. This strategy minimizes physical connections to existing wall studs, encapsulates existing siding materials (including lead paint) with spray foam, and creates a vented rain screen assembly to promote drying. GreenHomes America applied construction details created by IBACOS to a test home. 2x4 framing members were attached to the wall at band joists and top plates using "L" clips, with spray foam insulating the wall after framing was installed. Windows were installed simultaneously with the framing, including extension jambs. The use of clips in specific areas provided the best strength potential, and "picture framing" the spray foam held the 2x4s in place. Short-term testing was performed at this house, with monitoring equipment installed for long-term testing. Testing measurements will be provided in a later report, as well as utility impact (before and after), costs (labor and materials), construction time, standard specifications, and analysis for the exterior wall insulation strategy.

  6. On exterior variational calculus

    International Nuclear Information System (INIS)

    Aldrovandi, R.; Kraenkel, R.A.

    1987-01-01

    Exterior variational calculus is introduced through examples in field theory. It provides a very simple technique to decide on the existence of Lagrangians for given equations of motions and, in the case, to find them. Only local aspects are discussed but the analogy to exterior calculus on finite dimensional manifolds is complete, strongly suggesting its suitability to the study of topological aspects. (Author) [pt

  7. Security analysis of cyber-physical system

    Science.gov (United States)

    Li, Bo; Zhang, Lichen

    2017-05-01

    In recent years, Cyber-Physical System (CPS) has become an important research direction of academic circles and scientific and technological circles at home and abroad, is considered to be following the third wave of world information technology after the computer, the Internet. PS is a multi-dimensional, heterogeneous, deep integration of open systems, Involving the computer, communication, control and other disciplines of knowledge. As the various disciplines in the research theory and methods are significantly different, so the application of CPS has brought great challenges. This paper introduces the definition and characteristics of CPS, analyzes the current situation of CPS, analyzes the security threats faced by CPS, and gives the security solution for security threats. It also discusses CPS-specific security technology, to promote the healthy development of CPS in information security.

  8. Robotic security vehicle for exterior environments

    International Nuclear Information System (INIS)

    Klarer, P.R.; Workhoven, R.M.

    1988-01-01

    This paper describes a current effort at Sandia National Labs to develop an outdoor robotic vehicle capable of performing limited security functions autonomously in a structured environment. The present stage of development entails application of algorithms originally developed for the SIR vehicle to a testbed vehicle more appropriate to an outdoor environment. The current effort will culminate in a full scale demonstration of autonomous navigation capabilities on routine patrol and teleoperation by a human operator for alarm assessment and response. Various schemes for implementation of the robot system are discussed, as are plans for further development of the system

  9. Exterior differentials in superspace and Poisson brackets

    International Nuclear Information System (INIS)

    Soroka, Dmitrij V.; Soroka, Vyacheslav A.

    2003-01-01

    It is shown that two definitions for an exterior differential in superspace, giving the same exterior calculus, yet lead to different results when applied to the Poisson bracket. A prescription for the transition with the help of these exterior differentials from the given Poisson bracket of definite Grassmann parity to another bracket is introduced. It is also indicated that the resulting bracket leads to generalization of the Schouten-Nijenhuis bracket for the cases of superspace and brackets of diverse Grassmann parities. It is shown that in the case of the Grassmann-odd exterior differential the resulting bracket is the bracket given on exterior forms. The above-mentioned transition with the use of the odd exterior differential applied to the linear even/odd Poisson brackets, that correspond to semi-simple Lie groups, results, respectively, in also linear odd/even brackets which are naturally connected with the Lie superalgebra. The latter contains the BRST and anti-BRST charges and can be used for calculation of the BRST operator cogomology. (author)

  10. Audit program for physical security systems at nuclear power plants

    International Nuclear Information System (INIS)

    Minichino, C.

    1982-01-01

    Licensees of nuclear power plants conduct audits of their physical security systems to meet the requirements of 10 CFR 73, Physical Protection of Plants and Materials. Section 73.55, Requirements for physical Protection of Licensed Activities in Nuclear Power Reactors Against Radiological Sabotage, requires that the security programs be reviewed at least every 12 months, that the audit be conducted by individuals independent of both security management and security supervision, and that the audit program review all aspects of the physical security system: hardware, personnel, and operational and maintenance procedures. This report contains information for the Nuclear Regulatory Commission (NRC) and for the licensees of nuclear power reactors who carry out these comprehensive audits. Guidance on the overall management of the audit function includes organizational structure and issues concerning the auditors who perform the review: qualifications, independence, due professional care, and standards. Guidance in the audit program includes purpose and scope of the audit, planning, techniques, post-audit procedures, reporting, and follow-up

  11. Physical security and IT convergence: Managing the cyber-related risks.

    Science.gov (United States)

    McCreight, Tim; Leece, Doug

    The convergence of physical security devices into the corporate network is increasing, due to the perceived economic benefits and efficiencies gained from using one enterprise network. Bringing these two networks together is not without risk. Physical devices like closed circuit television cameras (CCTV), card access readers, and heating, ventilation and air conditioning controllers (HVAC) are typically not secured to the standards we expect for corporate computer networks. These devices can pose significant risks to the corporate network by creating new avenues to exploit vulnerabilities in less-than-secure implementations of physical systems. The ASIS Information Technology Security Council (ITSC) developed a white paper describing steps organisations can take to reduce the risks this convergence can pose, and presented these concepts at the 2015 ASIS/ISC2 Congress in Anaheim, California. 1 This paper expands upon the six characteristics described by ITSC, and provides business continuity planners with information on how to apply these recommendations to physical security devices that use the corporate network.

  12. Wireless Physical Layer Security with CSIT Uncertainty

    KAUST Repository

    Hyadi, Amal

    2017-09-01

    Recent years have been marked by an enormous growth of wireless communication networks and an extensive use of wireless applications. In return, this phenomenal expansion induced more concerns about the privacy and the security of the users. Physical layer security is one of the most promising solutions that were proposed to enhance the security of next generation wireless systems. The fundamental idea behind this technique is to exploit the randomness and the fluctuations of the wireless channel to achieve security without conditional assumptions on the computational capabilities of the eavesdropper. In fact, while these elements have traditionally been associated with signal deterioration, physical layer security uses them to ensure the confidentiality of the users. Nevertheless, these technical virtues rely heavily on perhaps idealistic channel state information assumptions. In that regard, the aim of this thesis is to look at the physical layer security paradigm from the channel uncertainty perspective. In particular, we discuss the ergodic secrecy capacity of different wiretap channels when the transmitter is hampered by the imperfect knowledge of the channel state information (CSI). We consider two prevalent causes of uncertainty for the CSI at transmitter (CSIT); either an error of estimation occurs at the transmitter and he can only base his coding and the transmission strategies on a noisy version of the CSI, or the CSI feedback link has a limited capacity and the legitimate receivers can only inform the transmitter about the quantized CSI. We investigate both the single-user multiple-input multiple-output (MIMO) wiretap channel and the multi-user broadcast wiretap channel. In the latter scenario, we distinguish between two situations: multiple messages transmission and common message transmission. We also discuss the broadcast channel with confidential messages (BCCM) where the transmitter has one common message to be transmitted to two users and one

  13. Audit Teknologiinformasiatas Physical Security Control Dan Logical Security Control Serta Penentuan Kondisi Security Risk Studi Kasus: PT Talc Indonesia

    OpenAIRE

    Inggrid; Arfianti, Rizka I; Utami, Viany

    2009-01-01

    Abstract The fast growth of technology has an impact to the accounting field. This relates to the term of information technology (17) auditing. One of the risI6 of using information technology in business which can be fatal enough i fignored is security risk Security risk can be reduced by security controls which include physical security control and logical security contra Information technology auditing is the process of collecting and evaluating evidence to determine whether or not a co...

  14. Applications of exterior difference systems to variations in discrete mechanics

    International Nuclear Information System (INIS)

    Xie Zheng; Li Hongbo

    2008-01-01

    In discrete mechanics, difference equations describe the fundamental physical laws and exhibit many geometric properties. Can these equations be obtained in a geometric way? Using some techniques in exterior difference systems, we investigate the discrete variational problem. As an application, we give a positive answer to the above question for the discrete Newton's, Euler-Lagrange, and Hamilton's equations

  15. Physical security at research reactors

    International Nuclear Information System (INIS)

    Clark, R.A.

    1977-01-01

    Of the 84 non-power research facilities licensed under 10 CFR Part 50, 73 are active (two test reactors, 68 research reactors and three critical facilities) and are required by 10 CFR Part 73.40 to provide physical protection against theft of SNM and against industrial sabotage. Each licensee has developed a security plan required by 10 CFR Part 50.34(c) to demonstrate the means of compliance with the applicable requirements of 10 CFR Part 73. In 1974, the Commission provided interim guidance for the organization and content of security plans for (a) test reactors, (b) medium power research and training reactors, and (c) low power research and training reactors. Eleven TRIGA reactors, with power levels greater than 250 kW and all other research and training reactors with power levels greater than 100 kW and less than or equal to 5,000 kW are designated as medium power research and training reactors. Thirteen TRIGA reactors with authorized power levels less than 250 kW are considered to be low power research and training reactors. Additional guidance for complying with the requirements of 73.50 and 73.60, if applicable, is provided in the Commission's Regulatory Guides. The Commission's Office of Inspection and Enforcement inspects each licensed facility to assure that an approved security plan is properly implemented with appropriate procedures and physical protection systems

  16. Security analysis of socio-technical physical systems

    NARCIS (Netherlands)

    Lenzini, Gabriele; Mauw, Sjouke; Ouchani, Samir

    2015-01-01

    Recent initiatives that evaluate the security of physical systems with objects as assets and people as agents – here called socio-technical physical systems – have limitations: their agent behavior is too simple, they just estimate feasibility and not the likelihood of attacks, or they do estimate

  17. The Weathering Study of PC/ASA Alloy For Automotive Exterior Applications

    Directory of Open Access Journals (Sweden)

    Sinan Öztürk

    2017-10-01

    Full Text Available Polycarbonates (PC are used in automotive industry due to high physical and mechanical properties like high impact resistance and ductility. Polycarbonates are blended with ABS (Acrylonitrile-Butadiene-Styrene and ASA (Acrylonitrile-Styrene-Acrylate terpolymers for interior and exterior applications of automotive components to achieve good physical and mechanical properties. Other reason for choosing such alloys for interior applications is the IZOD impact resistance requirement higher than 40kJ/m2. Recently, grades of PC/ASA with UV stabilized are developed for non-painted exterior applications. The aim of our study is to investigate whether new developed PC/ASA could be chosen for exterior applications of automotive industry. In this study, the samples are prepared from injection molding and the weathering performance of PC/ASA was tested by a weather-o-meter for 1500h at a total of 1890 kJ/m2 at 340nm with a cut-off filter at λ<290nm. The results are evaluated by FT-IR, DSC, TGA and SEM. It has been observed that UV degradation of PC/ASA leads to several major changes in its IR spectrum like broad bands occurred in the hydroxyl region around 3300 cm-1, and carbonyl stretching region increased around 1728 cm-1. The main degradations were based on photo-oxidation and photo-Fries rearrangement of PC. In our study, the photo-oxidation was followed by the color shift to yellowing of the polymer.

  18. Physical security technology base programs for physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-01-01

    Sandia National Laboratories is the US Department of Energy's lead laboratory for physical security research and development (R and D). In support of this mission, Sandia has maintained for several years an R and D program in each of the following technology areas: Intrusion Detection, Entry Control, CCTV Assessment, Access Delay, Alarm Display, and Guard Equipment and Training. The purpose of the technology base programs is to maintain cognizance of the capabilities of the commercial market, identify improvements and transfer technology to industry and facilities. The output of these programs supports the development of new equipment and advanced system concepts, demonstrations of proof-of-principles and system implementation. This paper will review the status of current developments and discuss trends in new technologies which are being explored for future applications, i.e., artificial intelligence, expert systems, robotics, and more automated systems

  19. SecureCPS: Defending a nanosatellite cyber-physical system

    Science.gov (United States)

    Forbes, Lance; Vu, Huy; Udrea, Bogdan; Hagar, Hamilton; Koutsoukos, Xenofon D.; Yampolskiy, Mark

    2014-06-01

    Recent inexpensive nanosatellite designs employ maneuvering thrusters, much as large satellites have done for decades. However, because a maneuvering nanosatellite can threaten HVAs on-­orbit, it must provide a level of security typically reserved for HVAs. Securing nanosatellites with maneuvering capability is challenging due to extreme cost, size, and power constraints. While still in the design process, our low-­cost SecureCPS architecture promises to dramatically improve security, to include preempting unknown binaries and detecting abnormal behavior. SecureCPS also applies to a broad class of cyber-­physical systems (CPS), such as aircraft, cars, and trains. This paper focuses on Embry-­Riddle's ARAPAIMA nanosatellite architecture, where we assume any off-­the-­shelf component could be compromised by a supply chain attack.1 Based on these assumptions, we have used Vanderbilt's Cyber Physical -­ Attack Description Language (CP-­ADL) to represent realistic attacks, analyze how these attacks propagate in the ARAPAIMA architecture, and how to defeat them using the combination of a low-­cost Root of Trust (RoT) Module, Global InfoTek's Advanced Malware Analysis System (GAMAS), and Anomaly Detection by Machine Learning (ADML).2 Our most recent efforts focus on refining and validating the design of SecureCPS.

  20. Physical security workshop summary: entry control

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1982-01-01

    Entry control hardware has been used extensively in the past to assist security forces in separating the authorized from the unauthorized at the plant perimeter. As more attention is being focused on the insider threat, these entry control elements are being used to extend the security inspectors' presence into the plant by compartmentalizing access and monitoring vital components. This paper summarizes the experiences expressed by the participants at the March 16 to 19, 1982 INMM Physical Protection Workshop in utilizing access control and contraband detection hardware for plant wide entry control applications

  1. Tensor spaces and exterior algebra

    CERN Document Server

    Yokonuma, Takeo

    1992-01-01

    This book explains, as clearly as possible, tensors and such related topics as tensor products of vector spaces, tensor algebras, and exterior algebras. You will appreciate Yokonuma's lucid and methodical treatment of the subject. This book is useful in undergraduate and graduate courses in multilinear algebra. Tensor Spaces and Exterior Algebra begins with basic notions associated with tensors. To facilitate understanding of the definitions, Yokonuma often presents two or more different ways of describing one object. Next, the properties and applications of tensors are developed, including the classical definition of tensors and the description of relative tensors. Also discussed are the algebraic foundations of tensor calculus and applications of exterior algebra to determinants and to geometry. This book closes with an examination of algebraic systems with bilinear multiplication. In particular, Yokonuma discusses the theory of replicas of Chevalley and several properties of Lie algebras deduced from them.

  2. Physical and Cross-Layer Security Enhancement and Resource Allocation for Wireless Networks

    Science.gov (United States)

    Bashar, Muhammad Shafi Al

    2011-01-01

    In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…

  3. Future role of AI/Robotics in physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-01-01

    Manpower requirements for physical security systems place a heavy burden on operating security budgets. Technology innovations which free personnel or which make security personnel more efficient in carrying out their tasks is an important means of dealing with budget and manpower constraints. It is believed that AI/Robotics will be important technologies to alleviate these problems in the future. There are three types of applications for AI and Robotics technology that may: (l) help security personnel perform their tasks more effectively or efficiently, (2) perform tasks that security personnel would otherwise perform (free up people), and (3) perform tasks that cannot be performed by security personnel at this time. This paper discusses the various types of security applications that are presently being considered for the above areas and briefly describes a few examples of the application of this technology

  4. Inspection methods for physical protection Task III review of other agencies' physical security activities for research reactors

    International Nuclear Information System (INIS)

    In Task I of this project, the current Nuclear Regulatory Commission (NRC) position-on physical security practices and procedures at research reactors were reviewed. In the second task, a sampling of the physical security plans was presented and the three actual reactor sites described in the security plans were visited. The purpose of Task III is to review other agencies' physical security activities for research reactors. During this phase, the actions, procedures and policies of two domestic and two foreign agencies other than the NRC that relate to the research reactor community were examined. The agencies examined were: International Atomic Energy Agency; Canadian Atomic Energy Control Board; Department of Energy; and American Nuclear Insurers

  5. Security-aware design for cyber-physical systems a platform-based approach

    CERN Document Server

    Lin, Chung-Wei

    2017-01-01

    Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science. .

  6. Video motion detection for physical security applications

    International Nuclear Information System (INIS)

    Matter, J.C.

    1990-01-01

    Physical security specialists have been attracted to the concept of video motion detection for several years. Claimed potential advantages included additional benefit from existing video surveillance systems, automatic detection, improved performance compared to human observers, and cost-effectiveness. In recent years, significant advances in image-processing dedicated hardware and image analysis algorithms and software have accelerated the successful application of video motion detection systems to a variety of physical security applications. Early video motion detectors (VMDs) were useful for interior applications of volumetric sensing. Success depended on having a relatively well-controlled environment. Attempts to use these systems outdoors frequently resulted in an unacceptable number of nuisance alarms. Currently, Sandia National Laboratories (SNL) is developing several advanced systems that employ image-processing techniques for a broader set of safeguards and security applications. The Target Cueing and Tracking System (TCATS), the Video Imaging System for Detection, Tracking, and Assessment (VISDTA), the Linear Infrared Scanning Array (LISA); the Mobile Intrusion Detection and Assessment System (MIDAS), and the Visual Artificially Intelligent Surveillance (VAIS) systems are described briefly

  7. Cognitive Security of Wireless Communication Systems in the Physical Layer

    Directory of Open Access Journals (Sweden)

    Mustafa Harun Yılmaz

    2017-01-01

    Full Text Available While the wireless communication systems provide the means of connectivity nearly everywhere and all the time, communication security requires more attention. Even though current efforts provide solutions to specific problems under given circumstances, these methods are neither adaptive nor flexible enough to provide security under the dynamic conditions which make the security breaches an important concern. In this paper, a cognitive security (CS concept for wireless communication systems in the physical layer is proposed with the aim of providing a comprehensive solution to wireless security problems. The proposed method will enable the comprehensive security to ensure a robust and reliable communication in the existence of adversaries by providing adaptive security solutions in the communication systems by exploiting the physical layer security from different perspective. The adaptiveness relies on the fact that radio adapts its propagation characteristics to satisfy secure communication based on specific conditions which are given as user density, application specific adaptation, and location within CS concept. Thus, instead of providing any type of new security mechanism, it is proposed that radio can take the necessary precautions based on these conditions before the attacks occur. Various access scenarios are investigated to enable the CS while considering these conditions.

  8. Trusted communications with physical layer security for 5G and beyond

    CERN Document Server

    Duong, Trung Q; Poor, H Vincent

    2017-01-01

    Securely transferring confidential information over a wireless network is a challenging task. This book addresses security issues, not only for 5G but also beyond, using physical layer security technology and techniques.

  9. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    KAUST Repository

    Zorgui, Marwen

    2015-01-01

    Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public

  10. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo [KINAC, Daejeon (Korea, Republic of)

    2013-10-15

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012.

  11. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    International Nuclear Information System (INIS)

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo

    2013-01-01

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012

  12. Sandia's experience in designing and implementing integrated high security physical protection systems

    International Nuclear Information System (INIS)

    Caskey, D.L.

    1986-01-01

    As DOE's lead laboratory for physical security, Sandia National Laboratories has had a major physical security program for over ten years. Activities have ranged from component development and evaluation, to full scale system design and implementation. This paper presents some of the lessons learned in designing and implementing state-of-the-art high security physical protection systems for a number of government facilities. A generic system design is discussed for illustration purposes. Sandia efforts to transfer technology to industry are described

  13. Optimizing a physical security configuration using a highly detailed simulation model

    NARCIS (Netherlands)

    Marechal, T.M.A.; Smith, A.E.; Ustun, V.; Smith, J.S.; Lefeber, A.A.J.; Badiru, A.B.; Thomas, M.U.

    2009-01-01

    This research is focused on using a highly detailed simulation model to create a physical security system to prevent intrusions in a building. Security consists of guards and security cameras. The problem is represented as a binary optimization problem. A new heuristic is proposed to do the security

  14. Exterior and interior physical quality of egg of laying hens fed diets containing different dietary purslane levels

    Science.gov (United States)

    Kartikasari, L. R.; Hertanto, B. S.; Pranoto, D.; Salim, W. N.; Nuhriawangsa, A. M. P.

    2017-04-01

    Purslane is considered a rich vegetable source of alpha-linolenic acid, beta-carotene and various antioxidants. The objective of the study was to investigate the effect of different dietary levels of purslane meal (Portulaca oleracea) in the diets of laying hens on physical quality of eggs. A total of 125 Hy-Line Brown hens (54 weeks old) were placed at individual cages and assigned to five dietary treatments. The diets were supplemented with 0, 2, 4, 6 and 8% purslane meal. Laying hens were fed for 5 weeks after a typical period of adaptation (7 days). Water and feed were provided ad libitum. A total of 25 egg samples of day 28 and day 35 (n = 5 egg yolks for each treatment) were collected to analyse exterior and interior physical quality of eggs. The data were analysed using ANOVA. Differences between treatment means were further analysed using Duncan’s New Multiple Range Test. Results showed that feeding different purslane meal levels in the diets improved egg weight, yolk weight, albumen weight and yolk colour. The highest intensity of yolk colour was obtained with the diet containing 8% purslane meal. However, dietary treatments did not affect egg index, albumen index, yolk index, shell weight, shell thickness and Haugh Unit. It is concluded that including purslane meal to laying hen diets increases the physical qualities of the eggs.

  15. Application of smart cards in physical and information security systems

    International Nuclear Information System (INIS)

    Dreifus, H.N.

    1988-01-01

    Smart Cards, integrated circuits embedded into credit cards, have been proposed for many computer and physical security applications. The cards have shown promise in improving both the security and monitoring of systems ranging from computer network identification through physical protection and access control. With the increasing computational power embedded within these cards, advanced encryption techniques such as public key cryptography can now be realized, enabling more sophisticated uses

  16. Solving the three-body Coulomb breakup problem using exterior complex scaling

    Energy Technology Data Exchange (ETDEWEB)

    McCurdy, C.W.; Baertschy, M.; Rescigno, T.N.

    2004-05-17

    Electron-impact ionization of the hydrogen atom is the prototypical three-body Coulomb breakup problem in quantum mechanics. The combination of subtle correlation effects and the difficult boundary conditions required to describe two electrons in the continuum have made this one of the outstanding challenges of atomic physics. A complete solution of this problem in the form of a ''reduction to computation'' of all aspects of the physics is given by the application of exterior complex scaling, a modern variant of the mathematical tool of analytic continuation of the electronic coordinates into the complex plane that was used historically to establish the formal analytic properties of the scattering matrix. This review first discusses the essential difficulties of the three-body Coulomb breakup problem in quantum mechanics. It then describes the formal basis of exterior complex scaling of electronic coordinates as well as the details of its numerical implementation using a variety of methods including finite difference, finite elements, discrete variable representations, and B-splines. Given these numerical implementations of exterior complex scaling, the scattering wave function can be generated with arbitrary accuracy on any finite volume in the space of electronic coordinates, but there remains the fundamental problem of extracting the breakup amplitudes from it. Methods are described for evaluating these amplitudes. The question of the volume-dependent overall phase that appears in the formal theory of ionization is resolved. A summary is presented of accurate results that have been obtained for the case of electron-impact ionization of hydrogen as well as a discussion of applications to the double photoionization of helium.

  17. Exterior difference systems and invariance properties of discrete mechanics

    International Nuclear Information System (INIS)

    Xie Zheng; Xie Duanqiang; Li Hongbo

    2008-01-01

    Invariance properties describe the fundamental physical laws in discrete mechanics. Can those properties be described in a geometric way? We investigate an exterior difference system called the discrete Euler-Lagrange system, whose solution has one-to-one correspondence with solutions of discrete Euler-Lagrange equations, and use it to define the first integrals. The preservation of the discrete symplectic form along the discrete Hamilton phase flows and the discrete Noether's theorem is also described in the language of difference forms

  18. Designing a Physical Security System for Risk Reduction in a Hypothetical Nuclear Facility

    International Nuclear Information System (INIS)

    Saleh, A.A.; Abd Elaziz, M.

    2017-01-01

    Physical security in a nuclear facility means detection, prevention and response to threat, the ft, sabotage, unauthorized access and illegal transfer involving radioactive and nuclear material. This paper proposes a physical security system designing concepts to reduce the risk associated with variant threats to a nuclear facility. This paper presents a study of the unauthorized removal and sabotage in a hypothetical nuclear facility considering deter, delay and response layers. More over, the study involves performing any required upgrading to the security system by investigating the nuclear facility layout and considering all physical security layers design to enhance the weakness for risk reduction

  19. Accountancy, physical control and security: a question of balance

    International Nuclear Information System (INIS)

    Bishop, D.M.; Wilson, D.W.; Shaver, J.W.

    1976-01-01

    The historical development of current domestic safeguards regulations is summarized, from the perspective of an operating licensee nuclear fuel facility, in terms of timing, basis and need. Principal aspects of material accounting and physical security as independent approaches to safeguards control are described and analyzed in terms of overlap and effectiveness. Concerns with the licensee safeguards regulatory process are discussed, and development needs are identified. Recommendations are made which contribute to the evolution and improvement of safeguards based on a ''top-down'' systems approach to regulation using proven accounting, physical control and security principles to attain defined objectives

  20. Security Implications of Physical Design Attributes in the Emergency Department.

    Science.gov (United States)

    Pati, Debajyoti; Pati, Sipra; Harvey, Thomas E

    2016-07-01

    Security, a subset of safety, is equally important in the efficient delivery of patient care. The emergency department (ED) is susceptible to violence creating concerns for the safety and security of patients, staff, and visitors and for the safe and efficient delivery of care. Although there is an implicit and growing recognition of the role of the physical environment, interventions typically have been at the microlevel. The objective of this study was to identify physical design attributes that potentially influence safety and efficiency of ED operations. An exploratory, qualitative research design was adopted to examine the efficiency and safety correlates of ED physical design attributes. The study comprised a multimeasure approach involving multidisciplinary gaming, semistructured interviews, and touring interviews of frontline staff in four EDs at three hospital systems across three states. Five macro physical design attributes (issues that need to be addressed at the design stage and expensive to rectify once built) emerged from the data as factors substantially associated with security issues. They are design issues pertaining to (a) the entry zone, (b) traffic management, (c) patient room clustering, (d) centralization versus decentralization, and (e) provisions for special populations. Data from this study suggest that ED security concerns are generally associated with three sources: (a) gang-related violence, (b) dissatisfied patients, and (c) behavioral health patients. Study data show that physical design has an important role in addressing the above-mentioned concerns. Implications for ED design are outlined in the article. © The Author(s) 2016.

  1. Establishing an Information Security System related to Physical Protection

    International Nuclear Information System (INIS)

    Jang, Sung Soon; Yoo, Ho Sik

    2009-01-01

    A physical protection system (PPS) integrates people, procedures and equipment for the protection of assets or facilities against theft, sabotage or other malevolent attacks. In the physical protection field, it is important the maintain confidentiality of PPS related information, such as the alarm system layout, detailed maps of buildings, and guard schedules. In this abstract, we suggest establishing a methodology for an information security system. The first step in this methodology is to determine the information to protect and possible adversaries. Next, system designers should draw all possible paths to the information and arrange appropriate protection elements. Finally he/she should analyze and upgrade their information security system

  2. Handbook on Securing Cyber-Physical Critical Infrastructure

    CERN Document Server

    Das, Sajal K; Zhang, Nan

    2012-01-01

    The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports a

  3. Notes on symmetric and exterior depth and annihilator numbers

    Directory of Open Access Journals (Sweden)

    Gesa Kampf

    2008-11-01

    Full Text Available We survey and compare invariants of modules over the polynomial ring and the exterior algebra. In our considerations, we focus on the depth. The exterior analogue of depth was first introduced by Aramova, Avramov and Herzog. We state similarities between the two notion of depth and exhibit their relation in the case of squarefree modules. Work of Conca, Herzog and Hibi and Trung, respectively, shows that annihilator numbers are a meaningful generalization of depth over the polynomial ring. We introduce and study annihilator numbers over the exterior algebra. Despite some minor differences in the definition, those invariants show common behavior. In both situations a positive linear combination of the annihilator numbers can be used to bound the symmetric and exterior graded Betti numbers, respectively, from above.

  4. Interim format and content for a physical security plan for nuclear power plants

    International Nuclear Information System (INIS)

    1977-02-01

    The document serves as interim guidance to assist the licensee or applicant in the preparation of a physical security plan. It is to be used in conjunction with interim acceptance criteria for physical security programs, which will be distributed at a later date

  5. An intrinsic and exterior form of the Bianchi identities

    Science.gov (United States)

    Do, Thoan; Prince, Geoff

    2017-09-01

    We give an elegant formulation of the structure equations (of Cartan) and the Bianchi identities in terms of exterior calculus without reference to a particular basis and without the exterior covariant derivative. This approach allows both structure equations and the Bianchi identities to be expressed in terms of forms of arbitrary degree. We demonstrate the relationship with both the conventional vector version of the Bianchi identities and to the exterior covariant derivative approach. Contact manifolds, codimension one foliations and the Cartan form of classical mechanics are studied as examples of its flexibility and utility.

  6. Dod physical security equipment application experience

    International Nuclear Information System (INIS)

    Dixon, H.M.

    1978-01-01

    In the Department of Defense, the subject of physical security is very broad in scope. Its application ranges from countering the shoplifters in the post exchange facilities to the sophisticated terrorist who may attempt to obtain access to one of our nuclear weapons. This paper focuses on the area of specific interest to the members of INMM which is the protection of nuclear devices and the classified information associated with them

  7. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

    Science.gov (United States)

    Zhang, Junqing; Duong, Trung; Woods, Roger; Marshall, Alan

    2017-08-01

    The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.

  8. Exterior field evaluation of new generation video motion detection systems

    International Nuclear Information System (INIS)

    Malone, T.P.

    1988-01-01

    Recent advancements in video motion detection (VMD) system design and technology have resulted in several new commercial VMD systems. Considerable interest in the new VMD systems has been generated because the systems are advertised to work effectively in exterior applications. Previous VMD systems, when used in an exterior environment, tended to have very high nuisance alarm rates due to weather conditions, wildlife activity and lighting variations. The new VMD systems advertise more advanced processing of the incoming video signal which is aimed at rejecting exterior environmental nuisance alarm sources while maintaining a high detection capability. This paper discusses the results of field testing, in an exterior environment, of two new VMD systems

  9. Physical Watermarking for Securing Cyber-Physical Systems via Packet Drop Injections

    Energy Technology Data Exchange (ETDEWEB)

    Ozel, Omur [Carnegie Mellon Univ., Pittsburgh, PA (United States); Weekrakkody, Sean [Carnegie Mellon Univ., Pittsburgh, PA (United States); Sinopoli, Bruno [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2017-10-23

    Physical watermarking is a well known solution for detecting integrity attacks on Cyber-Physical Systems (CPSs) such as the smart grid. Here, a random control input is injected into the system in order to authenticate physical dynamics and sensors which may have been corrupted by adversaries. Packet drops may naturally occur in a CPS due to network imperfections. To our knowledge, previous work has not considered the role of packet drops in detecting integrity attacks. In this paper, we investigate the merit of injecting Bernoulli packet drops into the control inputs sent to actuators as a new physical watermarking scheme. With the classical linear quadratic objective function and an independent and identically distributed packet drop injection sequence, we study the effect of packet drops on meeting security and control objectives. Our results indicate that the packet drops could act as a potential physical watermark for attack detection in CPSs.

  10. Cooperative Wireless Communications and Physical Layer Security : State of the Art

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    in the mobile equipment is not feasible due to resource constraints. Cooperative wireless communication (CWC) is the upcoming virtual MIMO technique to combat fading and achieve diversity through user cooperation. Physical layer security (PLS) is the imminent security guarantee for the cooperative communication....

  11. Future role of AI/Robotics in physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-06-01

    Manpower requirements for physical security systems place a heavy burden on operating security budgets. Technology innovations which free personnel or which make security personnel more efficient in carrying out their tasks is an important means of dealing with budget and manpower constraints. It is believed that AI/Robotics will be important technologies to alleviate these problems in the future. There are three types of applications for AI and Robotics technology that may: (1) help security personnel perform their tasks more effectively or efficiently, (2) perform tasks that security personnel would otherwise perform (free up people), and (3) perform tasks that cannot be performed by security personnel at this time. This paper will discuss the various types of security applications that are presently being considered for the above areas and will briefly describe a few examples of the application of this technology. Examples will include ground mobile platforms carrying alarm assessment and/or surveillance sensors and operating either autonomously or with telepresence by a remote operator. An airborne platform performing similar functions will also be discussed. An application of a type of robot sentry that would be fixed and incorporate very simple portable displays will also be described. A third type of robot, an interior robot, that could be used in sensitive or hazardous areas to do detection and assessment functions will be reviewed

  12. Quantum photonic network and physical layer security.

    Science.gov (United States)

    Sasaki, Masahide; Endo, Hiroyuki; Fujiwara, Mikio; Kitamura, Mitsuo; Ito, Toshiyuki; Shimizu, Ryosuke; Toyoshima, Morio

    2017-08-06

    Quantum communication and quantum cryptography are expected to enhance the transmission rate and the security (confidentiality of data transmission), respectively. We study a new scheme which can potentially bridge an intermediate region covered by these two schemes, which is referred to as quantum photonic network. The basic framework is information theoretically secure communications in a free space optical (FSO) wiretap channel, in which an eavesdropper has physically limited access to the main channel between the legitimate sender and receiver. We first review a theoretical framework to quantify the optimal balance of the transmission efficiency and the security level under power constraint and at finite code length. We then present experimental results on channel characterization based on 10 MHz on-off keying transmission in a 7.8 km terrestrial FSO wiretap channel.This article is part of the themed issue 'Quantum technology for the 21st century'. © 2017 The Author(s).

  13. Security Culture in Physical Protection of Nuclear Material and Facility

    International Nuclear Information System (INIS)

    Susyanta-Widyatmaka; Koraag, Venuesiana-Dewi; Taswanda-Taryo

    2005-01-01

    In nuclear related field, there are three different cultures: safety, safeguards and security culture. Safety culture has established mostly in nuclear industries, meanwhile safeguards and security culture are relatively new and still developing. The latter is intended to improve the physical protection of material and nuclear facility. This paper describes concept, properties and factors affecting security culture and interactions among these cultures. The analysis indicates that anybody involving in nuclear material and facility should have strong commitment and awareness of such culture to establish it. It is concluded that the assessment of security culture outlined in this paper is still preliminary for developing and conduction rigorous security culture implemented in a much more complex facility such as nuclear power plant

  14. Physical and data-link security techniques for future communication systems

    CERN Document Server

    Tomasin, Stefano

    2016-01-01

     This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are discussed, with presentation of cutting-edge research and innovative results from leading researchers. The characteristic feature of all the contributions is their relevance for practical embodiments: detailed consideration is given to applications of security principles to a variety of widely used communication techniques such as multiantenna systems, ultra-wide band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, providing a bridge between two usually distinct worlds. The book comprises extended versions of contributions delivered at the Workshop on Communication Security, held in Ancona, I...

  15. Stackelberg Interdependent Security Game in Distributed and Hierarchical Cyber-Physical Systems

    Directory of Open Access Journals (Sweden)

    Jiajun Shen

    2017-01-01

    Full Text Available With the integration of physical plant and network, cyber-physical systems (CPSs are increasingly vulnerable due to their distributed and hierarchical framework. Stackelberg interdependent security game (SISG is proposed for characterizing the interdependent security in CPSs, that is, the interactions between individual CPSs, which are selfish but nonmalicious with the payoff function being formulated from a cross-layer perspective. The pure-strategy equilibria for two-player symmetric SISG are firstly analyzed with the strategy gap between individual and social optimum being characterized, which is known as negative externalities. Then, the results are further extended to the asymmetric and m-player SISG. At last, a numerical case of practical experiment platform is analyzed for determining the comprehensively optimal security configuration for administrator.

  16. QPFT operator algebras and commutative exterior differential calculus

    International Nuclear Information System (INIS)

    Yur'ev, D.V.

    1993-01-01

    The reduction of the structure theory of the operator algebras of quantum projective (sl(2, C)-invariant) field theory (QPFT operator algebras) to a commutative exterior differential calculus by means of the operation of renormalization of a pointwise product of operator fields is described. In the first section, the author introduces the concept of the operator algebra of quantum field theory and describes the operation of the renormalization of a pointwise product of operator fields. The second section is devoted to a brief exposition of the fundamentals of the structure theory of QPT operator algebras. The third section is devoted to commutative exterior differential calculus. In the fourth section, the author establishes the connection between the renormalized pointwise product of operator fields in QPFT operator algebras and the commutative exterior differential calculus. 5 refs

  17. Integrated assessment and mitigation of physical and digital security threats: Case studies on virtualization

    NARCIS (Netherlands)

    van Cleeff, A.; Pieters, Wolter; Wieringa, Roelf J.; van Tiel, F.

    2011-01-01

    Virtualization is one of the enabling technologies of cloud computing. It turns once dedicated physical computing resources such as servers into digital resources that can be provisioned on demand. Cloud computing thus tends to replace physical with digital security controls, and cloud security must

  18. Method for Determining the Sensitivity of a Physical Security System.

    Energy Technology Data Exchange (ETDEWEB)

    Speed, Ann [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gauthier, John H. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hoffman, Matthew John [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Wachtel, Amanda [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Kittinger, Robert Scott [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Munoz-Ramos, Karina [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-05-23

    Modern systems, such as physical security systems, are often designed to involve complex interactions of technological and human elements. Evaluation of the performance of these systems often overlooks the human element. A method is proposed here to expand the concept of sensitivity—as denoted by d’—from signal detection theory (Green & Swets 1966; Macmillan & Creelman 2005), which came out of the field of psychophysics, to cover not only human threat detection but also other human functions plus the performance of technical systems in a physical security system, thereby including humans in the overall evaluation of system performance. New in this method is the idea that probabilities of hits (accurate identification of threats) and false alarms (saying “threat” when there is not one), which are used to calculate d’ of the system, can be applied to technologies and, furthermore, to different functions in the system beyond simple yes-no threat detection. At the most succinct level, the method returns a single number that represents the effectiveness of a physical security system; specifically, the balance between the handling of actual threats and the distraction of false alarms. The method can be automated, and the constituent parts revealed, such that given an interaction graph that indicates the functional associations of system elements and the individual probabilities of hits and false alarms for those elements, it will return the d’ of the entire system as well as d’ values for individual parts. The method can also return a measure of the response bias* of the system. One finding of this work is that the d’ for a physical security system can be relatively poor in spite of having excellent d’s for each of its individual functional elements.

  19. Emerging Security Mechanisms for Medical Cyber Physical Systems.

    Science.gov (United States)

    Kocabas, Ovunc; Soyata, Tolga; Aktas, Mehmet K

    2016-01-01

    The following decade will witness a surge in remote health-monitoring systems that are based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) will be capable of transmitting the acquired data to a private or public cloud for storage and processing. Machine learning algorithms running in the cloud and processing this data can provide decision support to healthcare professionals. There is no doubt that the security and privacy of the medical data is one of the most important concerns in designing an MCPS. In this paper, we depict the general architecture of an MCPS consisting of four layers: data acquisition, data aggregation, cloud processing, and action. Due to the differences in hardware and communication capabilities of each layer, different encryption schemes must be used to guarantee data privacy within that layer. We survey conventional and emerging encryption schemes based on their ability to provide secure storage, data sharing, and secure computation. Our detailed experimental evaluation of each scheme shows that while the emerging encryption schemes enable exciting new features such as secure sharing and secure computation, they introduce several orders-of-magnitude computational and storage overhead. We conclude our paper by outlining future research directions to improve the usability of the emerging encryption schemes in an MCPS.

  20. Numerical convergence of discrete exterior calculus on arbitrary surface meshes

    KAUST Repository

    Mohamed, Mamdouh S.

    2018-02-13

    Discrete exterior calculus (DEC) is a structure-preserving numerical framework for partial differential equations solution, particularly suitable for simplicial meshes. A longstanding and widespread assumption has been that DEC requires special (Delaunay) triangulations, which complicated the mesh generation process especially for curved surfaces. This paper presents numerical evidence demonstrating that this restriction is unnecessary. Convergence experiments are carried out for various physical problems using both Delaunay and non-Delaunay triangulations. Signed diagonal definition for the key DEC operator (Hodge star) is adopted. The errors converge as expected for all considered meshes and experiments. This relieves the DEC paradigm from unnecessary triangulation limitation.

  1. Investigation of vessel exterior air cooling for a HLMC reactor

    International Nuclear Information System (INIS)

    Sienicki, J. J.; Spencer, B. W.

    2000-01-01

    The Secure Transportable Autonomous Reactor (STAR) concept under development at Argonne National Laboratory provides a small (300 MWt) reactor module for steam supply that incorporates design features to attain proliferation resistance, heightened passive safety, and improved cost competitiveness through extreme simplification. Examples are the achievement of 100%+ natural circulation heat removal from the low power density/low pressure drop ultra-long lifetime core and utilization of lead-bismuth eutectic (LBE) coolant enabling elimination of main coolant pumps as well as the need for an intermediate heat transport circuit. It is required to provide a passive means of removing decay heat and effecting reactor cooldown in the event that the normal steam generator heat sink, including its normal shutdown heat removal mode, is postulated to be unavailable. In the present approach, denoted as the Reactor Exterior Cooling System (RECS), passive decay heat removal is provided by cooling the outside of the containment/guard vessel with air. RECS is similar to the Reactor Vessel Auxiliary Cooling System (RVACS) incorporated into the PRISM design. However, to enhance the heat removal, RECS incorporates fins on the containment vessel exterior to enhance heat transfer to air as well as removable steel venetian conductors that provide a conduction heat transfer path across the reactor vessel-containment vessel gap to enhance heat transfer between the vessels. The objective of the present work is to investigate the effectiveness of air cooling in removing heat from the vessel and limiting the coolant temperature increase following a sudden complete loss of the steam generator heat sink

  2. Unconditionally Secure Credit/Debit Card Chip Scheme and Physical Unclonable Function

    Science.gov (United States)

    Kish, Laszlo B.; Entesari, Kamran; Granqvist, Claes-Göran; Kwan, Chiman

    The statistical-physics-based Kirchhoff-law-Johnson-noise (KLJN) key exchange offers a new and simple unclonable system for credit/debit card chip authentication and payment. The key exchange, the authentication and the communication are unconditionally secure so that neither mathematics- nor statistics-based attacks are able to crack the scheme. The ohmic connection and the short wiring lengths between the chips in the card and the terminal constitute an ideal setting for the KLJN protocol, and even its simplest versions offer unprecedented security and privacy for credit/debit card chips and applications of physical unclonable functions (PUFs).

  3. Physical security, HIPPA, and the HHS wall of shame.

    Science.gov (United States)

    Sage, April

    2014-01-01

    In this article, the author a healthcare IT expert, reveals what experts have discovered in analyzing HIPPA data breaches. Most are the result of theft or loss. She explains why this is so, and offers a solution--improved physical security.

  4. Three tenets for secure cyber-physical system design and assessment

    Science.gov (United States)

    Hughes, Jeff; Cybenko, George

    2014-06-01

    This paper presents a threat-driven quantitative mathematical framework for secure cyber-physical system design and assessment. Called The Three Tenets, this originally empirical approach has been used by the US Air Force Research Laboratory (AFRL) for secure system research and development. The Tenets were first documented in 2005 as a teachable methodology. The Tenets are motivated by a system threat model that itself consists of three elements which must exist for successful attacks to occur: - system susceptibility; - threat accessibility and; - threat capability. The Three Tenets arise naturally by countering each threat element individually. Specifically, the tenets are: Tenet 1: Focus on What's Critical - systems should include only essential functions (to reduce susceptibility); Tenet 2: Move Key Assets Out-of-Band - make mission essential elements and security controls difficult for attackers to reach logically and physically (to reduce accessibility); Tenet 3: Detect, React, Adapt - confound the attacker by implementing sensing system elements with dynamic response technologies (to counteract the attackers' capabilities). As a design methodology, the Tenets mitigate reverse engineering and subsequent attacks on complex systems. Quantified by a Bayesian analysis and further justified by analytic properties of attack graph models, the Tenets suggest concrete cyber security metrics for system assessment.

  5. Reflective coatings for interior and exterior of buildings and improving thermal performance

    International Nuclear Information System (INIS)

    Joudi, Ali; Svedung, Harald; Cehlin, Mathias; Rönnelid, Mats

    2013-01-01

    Highlights: ► Increase building energy efficiency by optimizing surface optical properties. ► Study different scenarios with both interior and exterior reflective coatings. ► Combined thermal effect of both interior and exterior reflective coatings. -- Abstract: The importance of reducing building energy usage and thriving for more energy efficient architectures, has nurtured creative solutions and smart choices of materials in the last few decades. Among those are optimizing surface optical properties for both interior and exterior claddings of the building. Development in the coil-coating steel industries has now made it possible to allocate correct optical properties for steel clad buildings with improved thermal performance. Although the importance of the exterior coating and solar gain are thoroughly studied in many literatures, the effect of interior cladding are less tackled, especially when considering a combination of both interior and exterior reflective coatings. This paper contemplates the thermal behavior of small cabins with reflective coatings on both interior and exterior cladding, under different conditions and climates with the aim to clarify and point out to the potential energy saving by smart choices of clad coatings.

  6. Upstate Windows and Exteriors Information Sheet

    Science.gov (United States)

    Upstate Windows and Exteriors (the Company) is located in Greenville, South Carolina. The settlement involves renovation activities conducted at properties constructed prior to 1978, located in Greenville and Easley, South Carolina.

  7. Secure physical layer using dynamic permutations in cognitive OFDMA systems

    DEFF Research Database (Denmark)

    Meucci, F.; Wardana, Satya Ardhy; Prasad, Neeli R.

    2009-01-01

    This paper proposes a novel lightweight mechanism for a secure Physical (PHY) layer in Cognitive Radio Network (CRN) using Orthogonal Frequency Division Multiplexing (OFDM). User's data symbols are mapped over the physical subcarriers with a permutation formula. The PHY layer is secured...... with a random and dynamic subcarrier permutation which is based on a single pre-shared information and depends on Dynamic Spectrum Access (DSA). The dynamic subcarrier permutation is varying over time, geographical location and environment status, resulting in a very robust protection that ensures...... confidentiality. The method is shown to be effective also for existing non-cognitive systems. The proposed mechanism is effective against eavesdropping even if the eavesdropper adopts a long-time patterns analysis, thus protecting cryptography techniques of higher layers. The correlation properties...

  8. Security strategy of powered-off SRAM for resisting physical attack to data remanence

    International Nuclear Information System (INIS)

    Yu Kai; Zou Xuecheng; Yu Guoyi; Wang Weixu

    2009-01-01

    This paper presents a security strategy for resisting a physical attack utilizing data remanence in powered-off static random access memory (SRAM). Based on the mechanism of physical attack to data remanence, the strategy intends to erase data remanence in memory cells once the power supply is removed, which disturbs attackers trying to steal the right information. Novel on-chip secure circuits including secure power supply and erase transistor are integrated into conventional SRAM to realize erase operation. Implemented in 0.25 μm Huahong-NEC CMOS technology, an SRAM exploiting the proposed security strategy shows the erase operation is accomplished within 0.2 μs and data remanence is successfully eliminated. Compared with conventional SRAM, the retentive time of data remanence is reduced by 82% while the operation power consumption only increases by 7%.

  9. Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems

    NARCIS (Netherlands)

    Lenzini, Gabriele; Mauw, Sjouke; Ouchani, Samir; Barthe, Gilles; Markatos, Evangelos; Samarati, Pierangela

    2016-01-01

    A crucial question for an ICT organization wishing to improve its security is whether a security policy together with physical access controls protects from socio-technical threats. We study this question formally. We model the information flow defined by what the organization’s employees do (copy,

  10. Measure Guideline: Incorporating Thick Layers of Exterior Rigid Insulation on Walls

    Energy Technology Data Exchange (ETDEWEB)

    Lstiburek, Joseph [Building Science Corporation, Westford, MA (United States); Baker, Peter [Building Science Corporation, Westford, MA (United States)

    2015-04-01

    This measure guideline provides information about the design and construction of wall assemblies that use layers of rigid exterior insulation thicker than 1-½ inches and that require a secondary cladding attachment location exterior to the insulation. The guideline is separated into several distinct sections that cover: fundamental building science principles relating to the use of exterior insulation on wall assemblies; design principles for tailoring this use to the specific project goals and requirements; and construction detailing to increase understanding about implementing the various design elements.

  11. Continuous-variable quantum authentication of physical unclonable keys: Security against an emulation attack

    Science.gov (United States)

    Nikolopoulos, Georgios M.

    2018-01-01

    We consider a recently proposed entity authentication protocol in which a physical unclonable key is interrogated by random coherent states of light, and the quadratures of the scattered light are analyzed by means of a coarse-grained homodyne detection. We derive a sufficient condition for the protocol to be secure against an emulation attack in which an adversary knows the challenge-response properties of the key and moreover, he can access the challenges during the verification. The security analysis relies on Holevo's bound and Fano's inequality, and suggests that the protocol is secure against the emulation attack for a broad range of physical parameters that are within reach of today's technology.

  12. Accuracy analysis of exterior orientation elements on vertical parallax in POS-supported aerial photogrammetry

    Science.gov (United States)

    Wu, Zhenli; Yuan, Xiuxiao

    2009-10-01

    This paper analyzes the effect of exterior orientation elements on vertical parallax, especially using the orientation parameters of aerial images obtained by a POS (Positioning and Orientation System) after calibration. Firstly, based on the theory of analytical relative orientation of consecutive photo connection, the exterior orientation elements can be easily translated to relative orientation elements. Then, the formula of vertical parallax can be deduced. The results of vertical parallax in left image space coordinate system are compared with the results calculated in the image coordinate system which are parallel to those of the object coordinate system. The validity and feasibility of the mathematical model are tested using two sets of actual data at different images scales. Finally, the differences between the effects of exterior orientation parameters on vertical parallax are compared using exterior orientation parameters obtained by traditional bundle block adjustment and by a POS after calibrated. And how the single element of exterior orientation effected on vertical parallax and how they worked together are analyzed. The empirical results indicate that the effects of different elements of exterior orientation on vertical parallax are different, all exterior orientation parameters can be affected by each other, so the overall effect of vertical parallax accuracy can be restricted by all exterior orientation parameters.

  13. Physical Layer Built-In Security Analysis and Enhancement Algorithms for CDMA Systems

    Directory of Open Access Journals (Sweden)

    Li Tongtong

    2007-01-01

    Full Text Available Historically developed for secure communication and military use, CDMA has been identified as a major modulation and multiple-access technique for 3G systems and beyond. In addition to the wide bandwidth and low power-spectrum density which make CDMA signals robust to narrowband jamming and easy to be concealed within the noise floor, the physical layer built-in information privacy of CDMA system is provided by pseudorandom scrambling. In this paper, first, security weakness of the operational and proposed CDMA airlink interfaces is analyzed. Second, based on the advanced encryption standard (AES, we propose to enhance the physical layer built-in security of CDMA systems through secure scrambling. Performance analysis demonstrates that while providing significantly improved information privacy, CDMA systems with secure scrambling have comparable computational complexity and overall system performance with that of conventionally scrambled systems. Moreover, it is shown that by scrambling the training sequence and the message sequence separately with two independent scrambling sequences, both information privacy and system performance can be further improved. The proposed scheme can readily be applied to 3G systems and beyond.

  14. The Role of Physical Layer Security in IoT: A Novel Perspective

    Directory of Open Access Journals (Sweden)

    Tommaso Pecorella

    2016-08-01

    Full Text Available This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. In a smart environment, each IoT device has limited resources and is often battery operated with limited capabilities (e.g., no keyboard. As a consequence, network security must be carefully analyzed in order to prevent security and privacy issues. In this paper, we will analyze the IoT threats, we will propose a security framework for the device initialization and we will show how physical layer security can effectively boost the security of IoT systems.

  15. Design Impedance Mismatch Physical Unclonable Functions for IoT Security

    Directory of Open Access Journals (Sweden)

    Xiaomin Zheng

    2017-01-01

    Full Text Available We propose a new design, Physical Unclonable Function (PUF scheme, for the Internet of Things (IoT, which has been suffering from multiple-level security threats. As more and more objects interconnect on IoT networks, the identity of each thing is very important. To authenticate each object, we design an impedance mismatch PUF, which exploits random physical factors of the transmission line to generate a security unique private key. The characteristic impedance of the transmission line and signal transmission theory of the printed circuit board (PCB are also analyzed in detail. To improve the reliability, current feedback amplifier (CFA method is applied on the PUF. Finally, the proposed scheme is implemented and tested. The measure results show that impedance mismatch PUF provides better unpredictability and randomness.

  16. Gravitational time dilation and length contraction in fields exterior to ...

    African Journals Online (AJOL)

    Here, we use our new metric tensor exterior to a massiv3e oblate spheroid to study the gravitational phenomena of time dilation and length contraction. It turns out most profoundly that, the above phenomena hold good in the gravitational field exterior to an oblate spheroid. We then use the oblate spheroidal Earth to ...

  17. Preliminary field evaluation of solid state cameras for security applications

    International Nuclear Information System (INIS)

    1987-01-01

    Recent developments in solid state imager technology have resulted in a series of compact, lightweight, all-solid-state closed circuit television (CCTV) cameras. Although it is widely known that the various solid state cameras have less light sensitivity and lower resolution than their vacuum tube counterparts, the potential for having a much longer Mean Time Between Failure (MTBF) for the all-solid-state cameras is generating considerable interest within the security community. Questions have been raised as to whether the newest and best of the solid state cameras are a viable alternative to the high maintenance vacuum tube cameras in exterior security applications. To help answer these questions, a series of tests were performed by Sandia National Laboratories at various test sites and under several lighting conditions. In general, all-solid-state cameras need to be improved in four areas before they can be used as wholesale replacements for tube cameras in exterior security applications: resolution, sensitivity, contrast, and smear. However, with careful design some of the higher performance cameras can be used for perimeter security systems, and all of the cameras have applications where they are uniquely qualified. Many of the cameras are well suited for interior assessment and surveillance uses, and several of the cameras are well designed as robotics and machine vision devices

  18. Physical protection educational program - information security aspects

    International Nuclear Information System (INIS)

    Tolstoy, A.

    2002-01-01

    Full text: Conceptual approaches for designing an expert training program on object physical protection taking into account information security aspects are examined. A special educational course does not only address the immediate needs for an educational support but also ensures that new professionals include new concepts and knowledge in their practice and encourages current practitioners towards such practice. Features of the modern physical protection systems (PPS) and classification of information circulating at them are pointed out. The requirements to the PPS information protection subsystem are discussed. During the PPS expert training on information security (IS) aspects they should receive certain knowledge, on the basis of which they could competently define and carry out the PPS IS policy for a certain object. Thus, it is important to consider minimally necessary volume of knowledge taught to the PPS experts for independent and competent implementation of the above listed tasks. For the graduate PPS IS expert training it is also necessary to examine the normative and legal acts devoted to IS as a whole and the PPS IS in particular. It is caused by necessity of conformity of methods and information protection tools implemented on a certain object to the federal and departmental IS requirements. The departmental normative IS requirements define an orientation of the PPS expert training. By curriculum development it is necessary to precisely determine for whom the PPS experts are taught. The curriculum should reflect common features of the PPS functioning of the certain object type, i.e. it should be adapted to a certain customer of the experts. The specified features were taken into account by development of an educational course 'Information security of the nuclear facility physical protection systems', taught at the Moscow Engineering Physics Institute (State University) according to the Russian-American educational program 'Master in Physical

  19. Nuclear Safeguards and Security Education at Russian Universities

    International Nuclear Information System (INIS)

    Killinger, Mark H.; Goodey, Kent O.; Butler, Gilbert W.; Duncan, Cristen L.

    2008-01-01

    The U.S. Department of Energy is assisting key Russian universities in developing safeguards and security degree programs to prepare the next generation of specialists who will be responsible for protecting nuclear material from illicit use. These programs include course and laboratory work in nuclear material measurements, vulnerability analysis, exterior and interior sensors, and legal aspects of nuclear nonproliferation. Moscow Engineering Physics Institute (MEPhI) has graduated nine classes of masters students, most of who are working in government agencies, research organizations, or pursuing their PhD. With DOE support, MEPhI has also established a 5 1/2-year engineering degree program in safeguards and security. This is a hands-on degree that more closely meets the needs of nuclear facilities. The first class graduated in February 2007, marking a major milestone in Russian nonproliferation education. A second engineering degree program has been established at Tomsk Polytechnic University and is designed to reach those students east of the Ural Mountains, where many nuclear facilities are located. The first class will graduate in February 2009. This paper describes current development of these education programs, new initiatives, and sustainability efforts to ensure their continued viability after DOE support ends. The paper also describes general nonproliferation education activities supported by DOE that complement the more technical safeguards and security education programs.

  20. Transweb and trafficking in illicit nuclear materials: beyond the borders of physical security

    International Nuclear Information System (INIS)

    Ballard, J.D.; Dilger, F.

    2005-01-01

    Full text: Transweb is a developing threat assessment analytical protocol that uses real time GIS based assessments (a.k.a., GTA for GIS Threat Assessment) to better understand potential trafficking in illicit nuclear materials that may come from energy related sites and/or weapons production facilities. This is not a physical security protocol nor is this program a border check format like the DOE's Second Line of Defense which is designed to detect special nuclear fuels. Transweb is a tool that allows the user to look at surreptitious transportation pathways that may be used to move illicit nuclear materials after they have already breached traditional physical security barriers and allows for movement prediction and potential mitigation/intervention if they are not traveling on the highways or railways, traversing the waterways, or entering ports equipped with detecting equipment like that deployed in Second Line of Defense program. Transweb is for the real world, a world where physical security may be breached and the smugglers that capture these materials do not follow the most traveled highways, railways, or waterways in a given society. Transweb focuses on the less obvious transportation routes that may be the most likely ways that illicit nuclear materials will be transported. Thus this program offers an additional layer of security analysis not currently in use as physical protection or as border mitigation. (author)

  1. Expert Meeting Report: Cladding Attachment Over Exterior Insulation

    Energy Technology Data Exchange (ETDEWEB)

    Baker, P. [Building Science Corporation, Somerville, MA (United States)

    2013-10-01

    The addition of insulation to the exterior of buildings is an effective means of increasing the thermal resistance of both wood framed walls as well as mass masonry wall assemblies. The location of the insulation to the exterior of the structure has many direct benefits including better effective R-value from reduced thermal bridging, better condensation resistance, reduced thermal stress on thestructure, as well as other commonly associated improvements such as increased air tightness and improved water management (Hutcheon 1964, Lstiburek 2007). The intent of the meeting was to review the current state of industry knowledge regarding cladding attachment over exterior insulation with a specific focus on: 1. Gravity load resistance, 2. Wind load resistance. The presentations explorethese topics from an engineering design, laboratory testing, field monitoring, as well as practical construction perspective. By bringing various groups together (who have been conduction research or have experience in this area), a more holistic review of the design limits and current code language proposals can be completed and additional gaps identified. The results of which will help informdesign standards and criteria.

  2. A preliminary cyber-physical security assessment of the Robot Operating System (ROS)

    Science.gov (United States)

    McClean, Jarrod; Stull, Christopher; Farrar, Charles; Mascareñas, David

    2013-05-01

    Over the course of the last few years, the Robot Operating System (ROS) has become a highly popular software framework for robotics research. ROS has a very active developer community and is widely used for robotics research in both academia and government labs. The prevalence and modularity of ROS cause many people to ask the question: "What prevents ROS from being used in commercial or government applications?" One of the main problems that is preventing this increased use of ROS in these applications is the question of characterizing its security (or lack thereof). In the summer of 2012, a crowd sourced cyber-physical security contest was launched at the cyber security conference DEF CON 20 to begin the process of characterizing the security of ROS. A small-scale, car-like robot was configured as a cyber-physical security "honeypot" running ROS. DEFFCON-20 attendees were invited to find exploits and vulnerabilities in the robot while network traffic was collected. The results of this experiment provided some interesting insights and opened up many security questions pertaining to deployed robotic systems. The Federal Aviation Administration is tasked with opening up the civil airspace to commercial drones by September 2015 and driverless cars are already legal for research purposes in a number of states. Given the integration of these robotic devices into our daily lives, the authors pose the following question: "What security exploits can a motivated person with little-to-no experience in cyber security execute, given the wide availability of free cyber security penetration testing tools such as Metasploit?" This research focuses on applying common, low-cost, low-overhead, cyber-attacks on a robot featuring ROS. This work documents the effectiveness of those attacks.

  3. Deformed exterior algebra, quons and their coherent states

    International Nuclear Information System (INIS)

    El Baz, M.; Hassouni, Y.

    2002-08-01

    We review the notion of the deformation of the exterior wedge product. This allows us to construct the deformation of the algebra of exterior forms over a vector space and also over an arbitrary manifold. We relate this approach to the generalized statistics and we study quons, as a particular case of these generalized statistics. We also give their statistical properties. A large part of the work is devoted to the problem of constructing coherent states for the deformed oscillators. We give a review of all the approaches existing in the literature concerning this point and enforce it with many examples. (author)

  4. Conceptual Design and Feasibility Analyses of a Robotic System for Automated Exterior Wall Painting

    Directory of Open Access Journals (Sweden)

    Young S. Kim

    2008-11-01

    Full Text Available There are approximately 6,677,000 apartment housing units in South Korea. Exterior wall painting for such multi-dwelling apartment housings in South Korea represents a typical area to which construction automation technology can be applied for improvement in safety, productivity, quality, and cost over the conventional method. The conventional exterior wall painting is costly and labor-intensive, and it especially exposes workers to significant health and safety risks. The primary objective of this study is to design a conceptual model of an exterior wall painting robot which is applicable to apartment housing construction and maintenance, and to conduct its technical?economical feasibility analyses. In this study, a design concept using a high ladder truck is proposed as the best alternative for automation of the exterior wall painting. Conclusions made in this study show that the proposed exterior wall painting robot is technically and economically feasible, and can greatly enhance safety, productivity, and quality compared to the conventional method. Finally, it is expected that the conceptual model of the exterior wall painting robot would be efficiently used in various applications in exterior wall finishing and maintenance of other architectural and civil structures such as commercial buildings, towers, and high-rise storage tanks.

  5. Concrete shielding exterior to iron

    International Nuclear Information System (INIS)

    Yurista, P.; Cossairt, D.

    1983-08-01

    A rule of thumb at Fermilab has been to use 3 feet of concrete exterior to iron shielding. A recent design of a shield with a severe dimensional constraint has prompted a re-evaluation of this rule of thumb and has led to the following calculations of the concrete thickness required to nullify this problem. 4 references, 4 figures

  6. Measure Guideline. Incorporating Thick Layers of Exterior Rigid Insulation on Walls

    Energy Technology Data Exchange (ETDEWEB)

    Lstiburek, Joseph [Building Science Corporation, Westford, MA (United States); Baker, Peter [Building Science Corporation, Westford, MA (United States)

    2015-04-09

    This measure guideline, written by the U.S. Department of Energy’s Building America team Building Science Corporation, provides information about the design and construction of wall assemblies that use layers of rigid exterior insulation thicker than 1-½ in. and that require a secondary cladding attachment location exterior to the insulation. The guideline is separated into several distinct sections that cover: (1) fundamental building science principles relating to the use of exterior insulation on wall assemblies; (2) design principles for tailoring this use to the specific project goals and requirements; and (3) construction detailing to increase understanding about implementing the various design elements.

  7. Security and privacy in cyber-physical systems foundations, principles, and applications

    CERN Document Server

    Song, Houbing; Jeschke, Sabina

    2017-01-01

    Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area. Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability far in excess of what today's simple embedded systems can provide. Just as the Internet revolutionized the way we interact with information, CPS technology has already begun to transform the way people interact with engineered systems. In the years ahead, smart CPS will drive innovat...

  8. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.

    Science.gov (United States)

    Yang, Bin; Zhang, Jianfeng

    2017-06-28

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

  9. 78 FR 69139 - Physical Security-Design Certification and Operating Reactors

    Science.gov (United States)

    2013-11-18

    ... Operating Reactors AGENCY: Nuclear Regulatory Commission. ACTION: Standard review plan--draft section..., ``Physical Security--Design Certification and Operating Reactors.'' The public comment period was originally....regulations.gov and search for Docket ID NRC-2013-0225. Address questions about NRC dockets to Carol Gallagher...

  10. Excavationless Exterior Foundation Insulation Field Study

    Energy Technology Data Exchange (ETDEWEB)

    Schirber, T.; Mosiman, G.; Ojczyk, C.

    2014-10-01

    Building science research supports installing exterior (soil side) foundation insulation as the optimal method to enhance the hygrothermal performance of new homes. With exterior foundation insulation, water management strategies are maximized while insulating the basement space and ensuring a more even temperature at the foundation wall. However, such an approach can be very costly and disruptive when applied to an existing home, requiring deep excavation around the entire house. The NorthernSTAR Building America Partnership team implemented an innovative, minimally invasive foundation insulation upgrade technique on an existing home. The approach consisted of using hydrovac excavation technology combined with a liquid insulating foam. The team was able to excavate a continuous 4" wide by 4' to 5' deep trench around the entire house, 128 linear feet, except for one small part under the stoop that was obstructed with concrete debris. The combination pressure washer and vacuum extraction technology also enabled the elimination of large trenches and soil stockpiles normally produced by backhoe excavation. The resulting trench was filled with liquid insulating foam, which also served as a water-control layer of the assembly. The insulation was brought above grade using a liquid foam/rigid foam hybrid system and terminated at the top of the rim joist. Cost savings over the traditional excavation process ranged from 23% to 50%. The excavationless process could result in even greater savings since replacement of building structures, exterior features, utility meters, and landscaping would be minimal or non-existent in an excavationless process.

  11. Excavationless Exterior Foundation Insulation Field Study

    Energy Technology Data Exchange (ETDEWEB)

    Schirber, T. [NorthernSTAR, Minneaplolis, MN (United States); Mosiman, G. [NorthernSTAR, Minneaplolis, MN (United States); Ojczyk, C. [NorthernSTAR, Minneaplolis, MN (United States)

    2014-09-01

    Building science research supports installing exterior (soil side) foundation insulation as the optimal method to enhance the hygrothermal performance of new homes. With exterior foundation insulation, water management strategies are maximized while insulating the basement space and ensuring a more even temperature at the foundation wall. However, such an approach can be very costly and disruptive when applied to an existing home, requiring deep excavation around the entire house. The NorthernSTAR Building America Partnership team implemented an innovative, minimally invasive foundation insulation upgrade technique on an existing home. The approach consisted of using hydrovac excavation technology combined with liquid insulating foam. The team was able to excavate a continuous 4 inches wide by 4 feet to 5 feet deep trench around the entire house, 128 linear feet, except for one small part under the stoop that was obstructed with concrete debris. The combination pressure washer and vacuum extraction technology also enabled the elimination of large trenches and soil stockpiles normally produced by backhoe excavation. The resulting trench was filled with liquid insulating foam, which also served as a water-control layer of the assembly. The insulation was brought above grade using a liquid foam/rigid foam hybrid system and terminated at the top of the rim joist. Cost savings over the traditional excavation process ranged from 23% to 50%. The excavationless process could result in even greater savings since replacement of building structures, exterior features, utility meters, and landscaping would be minimal or non-existent in an excavationless process.

  12. Diseño de un armario eléctrico para alumbrado exterior

    OpenAIRE

    Vermeil, Bastien

    2009-01-01

    El Proyecto tiene como objetivo el diseño de un armario eléctrico de alumbrado exterior que proporcione un valor añadido a los existentes actualmente. Este producto, diseñado para proteger los sistemas de alimentación y control de las instalaciones eléctricas, guardará esta función principal, tendrá un diseño exterior nuevo, y nuevas funcionalidades. Ahora, estas instalaciones permiten de alimentar la calle, los alumbradores exteriores en electricidad y gestionar las diferentes líneas desd...

  13. QCAPUF: QCA-based physically unclonable function as a hardware security primitive

    Science.gov (United States)

    Abutaleb, M. M.

    2018-04-01

    Physically unclonable functions (PUFs) are increasingly used as innovative security primitives to provide the hardware authentication and identification as well as the secret key generation based on unique and random variations in identically fabricated devices. Security and low power have appeared to become two crucial necessities to modern designs. As an emerging nanoelectronic technology, a quantum-dot cellular automata (QCA) can achieve ultra-low power consumption as well as an extremely small area for implementing digital designs. However, there are various classes of permanent defects that can happen during the manufacture of QCA devices. The recent extensive research has been focused on how to eliminate errors in QCA structures resulting from fabrication variances. By a completely different vision, to turn this disadvantage into an advantage, this paper presents a novel QCA-based PUF (QCAPUF) architecture to exploit the unique physical characteristics of fabricated QCA cells in order to produce different hardware fingerprint instances. This architecture is composed of proposed logic and interconnect blocks that have critical vulnerabilities and perform unexpected logical operations. The behaviour of QCAPUF is thoroughly analysed through physical relations and simulations. Results confirm that the proposed QCAPUF has state of the art PUF characteristics in the QCA technology. This paper will serve as a basis for further research into QCA-based hardware security primitives and applications.

  14. Inequivalence of interior and exterior dynamical problems

    International Nuclear Information System (INIS)

    Santilli, R.M.

    1991-09-01

    We begin a series of notes with the review of the historical distinction by Lagrange, Hamilton, Jacobi and other Founding Fathers of analytic dynamics, between the exteriordynamical problem, consisting of motion in vacuum under action-at-a-distance interactions, and the interior dynamical problem, consisting of motion within a resistive medium with the additional presence of contact, nonlinear, nonlocal and nonhamiltonian internal forces. After recalling some of the historical reasons that led to the contemporary, virtually complete restriction of research to the exterior problem, we show that the interior dynamical problem cannot be reduced to the exterior one. This establishes the open character of the central objective of these notes: the identification of the space-time symmetries and relativities that are applicable to interior, nonlinear, nonlocal and nonhamiltonian systems. (author). 29 refs

  15. Security Games for Cyber-Physical Systems

    DEFF Research Database (Denmark)

    Vigo, Roberto; Bruni, Alessandro; Yuksel, Ender

    2013-01-01

    The development of quantitative security analyses that consider both active attackers and reactive defenders is a main challenge in the design of trustworthy Cyber-Physical Systems. We propose a game-theoretic approach where it is natural to model attacker’s and defender’s actions explicitly......, associating costs to attacks and countermeasures. Cost considerations enable to contrast different strategies on the basis of their effectiveness and efficiency, paving the way to a multi-objective notion of optimality. Moreover, the framework allows expressing the probabilistic nature of the environment...... and of the attack detection process. Finally, a solver is presented to compute strategies and their costs, resorting to a recent combination of strategy iteration with linear programming....

  16. Evaluating an Exterior Insulation and Finish System for Deep Energy Retrofits

    Energy Technology Data Exchange (ETDEWEB)

    Dentz, Jordan [National Renewable Energy Lab. (NREL), Golden, CO (United States); Podorson, David [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2014-01-01

    Exterior insulation and finish systems (EIFS) are proprietary synthetic formulations that are applied to the exterior walls of buildings to serve as insulation and exterior cladding. The insulation thickness can vary from less than one inch to a foot or more. In this project the applicability of EIFS for residential deep energy retrofits was investigated through modeling and a case study home. The home was retrofitted using a site-applied four-inch-thick EIFS. Site-specific details were developed as required for the residential retrofit application. Site work and the costs of the EIFS system were documented. The demonstration home was modeled using Building Energy Optimization energy and cost analysis software to explore cost effectiveness of various EIFS insulation thicknesses in two climate locations.

  17. A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach

    Directory of Open Access Journals (Sweden)

    Qiao Liu

    2017-01-01

    Full Text Available Security issue has been considered as one of the most pivotal aspects for the fifth-generation mobile network (5G due to the increasing demands of security service as well as the growing occurrence of security threat. In this paper, instead of focusing on the security architecture in the upper layer, we investigate the secure transmission for a basic channel model in a heterogeneous network, that is, two-way relay channels. By exploiting the properties of the transmission medium in the physical layer, we propose a novel secure scheme for the aforementioned channel mode. With precoding design, the proposed scheme is able to achieve a high transmission efficiency as well as security. Two different approaches have been introduced: information theoretical approach and physical layer encryption approach. We show that our scheme is secure under three different adversarial models: (1 untrusted relay attack model, (2 trusted relay with eavesdropper attack model, and (3 untrusted relay with eavesdroppers attack model. We also derive the secrecy capacity of the two different approaches under the three attacks. Finally, we conduct three simulations of our proposed scheme. The simulation results agree with the theoretical analysis illustrating that our proposed scheme could achieve a better performance than the existing schemes.

  18. Numerical Method for Darcy Flow Derived Using Discrete Exterior Calculus

    Science.gov (United States)

    Hirani, A. N.; Nakshatrala, K. B.; Chaudhry, J. H.

    2015-05-01

    We derive a numerical method for Darcy flow, and also for Poisson's equation in mixed (first order) form, based on discrete exterior calculus (DEC). Exterior calculus is a generalization of vector calculus to smooth manifolds and DEC is one of its discretizations on simplicial complexes such as triangle and tetrahedral meshes. DEC is a coordinate invariant discretization, in that it does not depend on the embedding of the simplices or the whole mesh. We start by rewriting the governing equations of Darcy flow using the language of exterior calculus. This yields a formulation in terms of flux differential form and pressure. The numerical method is then derived by using the framework provided by DEC for discretizing differential forms and operators that act on forms. We also develop a discretization for a spatially dependent Hodge star that varies with the permeability of the medium. This also allows us to address discontinuous permeability. The matrix representation for our discrete non-homogeneous Hodge star is diagonal, with positive diagonal entries. The resulting linear system of equations for flux and pressure are saddle type, with a diagonal matrix as the top left block. The performance of the proposed numerical method is illustrated on many standard test problems. These include patch tests in two and three dimensions, comparison with analytically known solutions in two dimensions, layered medium with alternating permeability values, and a test with a change in permeability along the flow direction. We also show numerical evidence of convergence of the flux and the pressure. A convergence experiment is included for Darcy flow on a surface. A short introduction to the relevant parts of smooth and discrete exterior calculus is included in this article. We also include a discussion of the boundary condition in terms of exterior calculus.

  19. Thermographic method for evaluation of thermal influence of exterior surface colour of buildings

    Science.gov (United States)

    Wu, Yanpeng; Li, Deying; Jin, Rendong; Liu, Li; Bai, Jiabin; Feng, Jianming

    2008-12-01

    Architecture colour is an important part in urban designing. It directly affects the expressing and the thermal effect of exterior surface of buildings. It has proved that four factors affect the sign visibility, graphics, colour, lighting condition and age of the observers, and colour is the main aspect. The best method is to prevent the exterior space heating up in the first place, by reflecting heat away room the exterior surface.The colour of paint to coat building's exterior wall can have a huge impact on energy efficiency. While the suitable colour is essential to increasing the energy efficiency of paint colour during the warm summer months, those products also help paint colour efficiency and reduce heat loss from buildings during winter months making the interior more comfortable all year long. The article is based on analyzing the importance of architecture color design and existing urban colour design. The effect of external surface colour on the thermal behaviour of a building has been studied experimentally by Infrared Thermographic method in University of Science and technology Beijing insummer.The experimental results showed that different colour has quietly different thermal effect on the exterior surface of buildings. The thermal effect of carmine and fawn has nearly the same values. The main factor which is color express, give some suggest ting about urban color design. The investigation reveals that the use of suitable surface colour can dramatically reduce maximum the temperatures of the exterior wall. Keywords: architectural colour, thermal, thermographic

  20. Engineering safe and secure cyber-physical systems the specification PEARL approach

    CERN Document Server

    Gumzej, Roman

    2016-01-01

    This book introduces the concept of holistic design and development of cyber physical systems to achieve their safe and secure operation. It shows that by following the standards for embedded system’s safety and using appropriate hardware and software components inherently safe system’s architectures can be devised and certified. While the standards already enable testing and certification of inherently safe and sound hardware, this is still not the case with software. The book demonstrates that Specification PEARL(SPEARL) addresses this issue and proposes appropriate solutions from the viewpoints of software engineering as well as concrete program components. By doing so it reduces the complexity of cyber physical systems design in an innovative way. Three ultimate goals are being followed in the course of defining this new PEARL standard, namely: 1. simplicity over complexity, 2. inherent real-time ability, and 3. conformity to safety integrity and security capability levels.

  1. Numerical conformal mapping methods for exterior and doubly connected regions

    Energy Technology Data Exchange (ETDEWEB)

    DeLillo, T.K. [Wichita State Univ., KS (United States); Pfaltzgraff, J.A. [Univ. of North Carolina, Chapel Hill, NC (United States)

    1996-12-31

    Methods are presented and analyzed for approximating the conformal map from the exterior of the disk to the exterior a smooth, simple closed curve and from an annulus to a bounded, doubly connected region with smooth boundaries. The methods are Newton-like methods for computing the boundary correspondences and conformal moduli similar to Fornberg`s method for the interior of the disk. We show that the linear systems are discretizations of the identity plus a compact operator and, hence, that the conjugate gradient method converges superlinearly.

  2. Exteriorized colon anastomosis for unprepared bowel: An alternative to routine colostomy

    Science.gov (United States)

    Asfar, Sami K; Al-Sayer, Hilal M; Juma, Talib H

    2007-01-01

    AIM: To see the possibility of avoiding routine colostomy in patients presenting with unprepared bowel. METHODS: The cohort is composed of 103 patients, of these, 86 patients presented as emergencies (self-inflected and iatrogenic colon injuries, stab wounds and blast injury of the colon, volvulus sigmoid, obstructing left colon cancer, and strangulated ventral hernia). Another 17 patients were managed electively for other colon pathologies. During laparotomy, the involved segment was resected and the two ends of the colon were brought out via a separate colostomy wound. One layer of interrupted 3/0 silk was used for colon anastomosis. The exteriorized segment was immediately covered with a colostomy bag. Between the 5th and 7th postoperative day, the colon was easily dropped into the peritoneal cavity. The defect in the abdominal wall was closed with interrupted nonabsorbable suture. The skin was left open for secondary closure. RESULTS: The mean hospital stay (± SD) was 11.5 ± 2.6 d (8-20 d). The exteriorized colon was successfully dropped back into the peritoneal cavity in all patients except two. One developed a leak from oesophago-jejunostomy and from the exteriorized colon. She subsequently died of sepsis and multiple organ failure (MOF). In a second patient the colon proximal to the exteriorized anastomosis prolapsed and developed severe serositis, an elective ileo-colic anastomosis (to the left colon) was successfully performed. CONCLUSION: Exteriorized colon anastomosis is simple, avoids the inconvenience of colostomy and can be an alternative to routine colostomy. It is suitable where colostomy is socially unacceptable or the facilities and care is not available. PMID:17589900

  3. Using virtual reality in the training of security staff and evaluation of physical protection barriers in nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Augusto, Silas C.; Mol, Antonio C.A.; Mol, Pedro C.; Sales, Douglas S. [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil); Universidade do Estado do Rio de Janeiro (UERJ), RJ (Brazil)], e-mail: silas@ien.gov.br, e-mail: mol@ien.gov.br, e-mail: pedro98@gmail.com, e-mail: dsales@ien.gov.br

    2009-07-01

    The physical security of facilities containing radioactive objects, an already important matter, now has a new aggravating factor: the existence of groups intending to obtain radioactive materials for the purpose of intentionally induce radioactive contamination incidents, as for example the explosion of dirty bombs in populated regions, damaging both people and environment. In this context, the physical security of such facilities must be reinforced so to reduce the possibilities of such incidents. This paper presents a adapted game engine used as a virtual reality system, enabling the modeling and simulation of scenarios of nuclear facilities containing radioactive objects. In these scenarios, the physical protection barriers, as fences and walls, are simulated along with vigilance screens. Using a computer network, several users can participate simultaneously in the simulation, being represented by avatars. Users can play the roles of both invaders and security staff. The invaders have as objective to surpass the facility's physical protection barriers to steal radioactive objects and flee. The security staff have as objective to prevent and stop the theft of radioactive objects from the facility. The system can be used to analysis simulated scenarios and train vigilance/security staff. A test scenario was already developed and used, and the preliminary tests had satisfactory results, as they enabled the evaluation of the physical protection barriers of the virtual facility, and the training of those who participated in the simulations in the functions of a security staff. (author)

  4. Using virtual reality in the training of security staff and evaluation of physical protection barriers in nuclear facilities

    International Nuclear Information System (INIS)

    Augusto, Silas C.; Mol, Antonio C.A.; Mol, Pedro C.; Sales, Douglas S.

    2009-01-01

    The physical security of facilities containing radioactive objects, an already important matter, now has a new aggravating factor: the existence of groups intending to obtain radioactive materials for the purpose of intentionally induce radioactive contamination incidents, as for example the explosion of dirty bombs in populated regions, damaging both people and environment. In this context, the physical security of such facilities must be reinforced so to reduce the possibilities of such incidents. This paper presents a adapted game engine used as a virtual reality system, enabling the modeling and simulation of scenarios of nuclear facilities containing radioactive objects. In these scenarios, the physical protection barriers, as fences and walls, are simulated along with vigilance screens. Using a computer network, several users can participate simultaneously in the simulation, being represented by avatars. Users can play the roles of both invaders and security staff. The invaders have as objective to surpass the facility's physical protection barriers to steal radioactive objects and flee. The security staff have as objective to prevent and stop the theft of radioactive objects from the facility. The system can be used to analysis simulated scenarios and train vigilance/security staff. A test scenario was already developed and used, and the preliminary tests had satisfactory results, as they enabled the evaluation of the physical protection barriers of the virtual facility, and the training of those who participated in the simulations in the functions of a security staff. (author)

  5. Secure Data Transfer Guidance for Industrial Control and SCADA Systems

    Energy Technology Data Exchange (ETDEWEB)

    Mahan, Robert E.; Fluckiger, Jerry D.; Clements, Samuel L.; Tews, Cody W.; Burnette, John R.; Goranson, Craig A.; Kirkham, Harold

    2011-09-01

    This document was developed to provide guidance for the implementation of secure data transfer in a complex computational infrastructure representative of the electric power and oil and natural gas enterprises and the control systems they implement. For the past 20 years the cyber security community has focused on preventative measures intended to keep systems secure by providing a hard outer shell that is difficult to penetrate. Over time, the hard exterior, soft interior focus changed to focus on defense-in-depth adding multiple layers of protection, introducing intrusion detection systems, more effective incident response and cleanup, and many other security measures. Despite much larger expenditures and more layers of defense, successful attacks have only increased in number and severity. Consequently, it is time to re-focus the conventional approach to cyber security. While it is still important to implement measures to keep intruders out, a new protection paradigm is warranted that is aimed at discovering attempted or real compromises as early as possible. Put simply, organizations should take as fact that they have been, are now, or will be compromised. These compromises may be intended to steal information for financial gain as in the theft of intellectual property or credentials that lead to the theft of financial resources, or to lie silent until instructed to cause physical or electronic damage and/or denial of services. This change in outlook has been recently confirmed by the National Security Agency [19]. The discovery of attempted and actual compromises requires an increased focus on monitoring events by manual and/or automated log monitoring, detecting unauthorized changes to a system's hardware and/or software, detecting intrusions, and/or discovering the exfiltration of sensitive information and/or attempts to send inappropriate commands to ICS/SCADA (Industrial Control System/Supervisory Control And Data Acquisition) systems.

  6. History of physical security R and D

    International Nuclear Information System (INIS)

    Myre, W.C.; De Montmollin, J.M.

    1987-01-01

    Serious concern about physical protection of nuclear facilities began around 1972. R and D was initiated at Sandia National Laboratory which had developed techniques to protect weapons for many years. Special vehicles, convoy procedures, and a communications system previously developed for weapons shipments were improved and extended for shipments of other sensitive materials. Barriers, perimeter alarms, portal and internal control systems were developed, tested, and published in handbooks and presented at symposia. Training programs were initiated for U.S. and foreign personnel. Containment and surveillance techniques were developed for the IAEA. Presently emphasis is on computer security, active barriers, and techniques to prevent theft or sabotage by ''insiders''

  7. Physical Layer Security for Cooperative NOMA Systems

    KAUST Repository

    Chen, Jianchao

    2018-01-09

    In this correspondence, we investigate the physical layer security for cooperative non-orthogonal multiple access (NOMA) systems, where both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered. More specifically, some analytical expressions are derived for secrecy outage probability (SOP) and strictly positive secrecy capacity (SPSC). Results show that AF and DF almost achieve the same secrecy performance. Moreover, asymptotic results demonstrate that the SOP tends to a constant at high signal-to-noise ratio (SNR). Finally, our results show that the secrecy performance of considered NOMA systems is independent of the channel conditions between the relay and the poor user.

  8. Physical Layer Security for Cooperative NOMA Systems

    KAUST Repository

    Chen, Jianchao; Yang, Liang; Alouini, Mohamed-Slim

    2018-01-01

    In this correspondence, we investigate the physical layer security for cooperative non-orthogonal multiple access (NOMA) systems, where both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered. More specifically, some analytical expressions are derived for secrecy outage probability (SOP) and strictly positive secrecy capacity (SPSC). Results show that AF and DF almost achieve the same secrecy performance. Moreover, asymptotic results demonstrate that the SOP tends to a constant at high signal-to-noise ratio (SNR). Finally, our results show that the secrecy performance of considered NOMA systems is independent of the channel conditions between the relay and the poor user.

  9. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Science.gov (United States)

    2010-01-01

    ... significance (Category III), and for protection of Restricted Data, National Security Information, Safeguards... 10 Energy 2 2010-01-01 2010-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED...

  10. The generalization of the exterior square of a Bieberbach group

    Science.gov (United States)

    Masri, Rohaidah; Hassim, Hazzirah Izzati Mat; Sarmin, Nor Haniza; Ali, Nor Muhainiah Mohd; Idrus, Nor'ashiqin Mohd

    2014-06-01

    The exterior square of a group is one of the homological functors which were originated in the homotopy theory. Meanwhile, a Bieberbach group is a torsion free crystallographic group. A Bieberbach group with cyclic point group of order two, C2, of dimension n can be defined as the direct product of that group of the smallest dimension with a free abelian group. Using the group presentation and commutator generating sequence, the exterior square of a Bieberbach group with point group C2 of dimension n is computed.

  11. Elementos para una política exterior ambiental (Tema Central)

    OpenAIRE

    Salvador, Íñigo

    2002-01-01

    La necesidad de una política exterior ecuatoriana en lo ambiental surge de la naturaleza global del medio ambiente, de la responsabilidad del Ecuador como país privilegiado por su megadiversidad, de la vinculación inevitable entre la pobreza que le aqueja y la degradación del ambiente y de los compromisos internacionales por él adquiridos. Una política exterior ambiental debe resultar de un proceso de diseño en que participen todos los actores de la temática ambiental, aunque su ejecución deb...

  12. Physics of societal issues calculations on national security, environment, and energy

    CERN Document Server

    Hafemeister, David

    2007-01-01

    Why this book on the Physics of Societal Issues? The subdivisions of physics - nuclear physics, particle physics, condensed-matter physics, biophysics - have their textbooks, while the subdivision of physics and society lacks an equation-oriented text on the physics of arms, energy and the environment. Physics of Societal Issues is intended for undergraduate and doctoral students who may work on applied topics, or who simply want to know why things are the way they are. Decisions guiding policies on nuclear arms, energy and the environment often seem mysterious and contradictory. What is the science behind the deployment of MIRVed ICBMs, the quest for space-based beam weapons, the fear of powerline EM fields, the wholesale acceptance of SUVs, the issues of climactic change, and the failure of the pre-embargo market to produce buildings and appliances that now save over 50 power plants? Physics of Societal Issues is three "mini-texts" in one: National Security (5 chapters): Weapons, offense, defense, verificat...

  13. Physical security of nuclear facilities

    International Nuclear Information System (INIS)

    Dixon, H.

    1987-01-01

    A serious problem with present security systems at nuclear facilities is that the threats and standards prepared by the NRC and DOE are general, and the field offices are required to develop their own local threats and, on that basis, to prepared detailed specifications for security systems at sites in their jurisdiction. As a result, the capabilities of the systems vary across facilities. Five steps in particular are strongly recommended as corrective measures: 1. Those agencies responsible for civil nuclear facilities should jointly prepare detailed threat definitions, operational requirements, and equipment specifications to protect generic nuclear facilities, and these matters should be issued as policy. The agencies should provide sufficient detail to guide the design of specific security systems and to identify candidate components. 2. The DOE, NRC, and DOD should explain to Congress why government-developed security and other military equipment are not used to upgrade existing security systems and to stock future ones. 3. Each DOE and NRC facility should be assessed to determine the impact on the size of the guard force and on warning time when personnel-detecting radars and ground point sensors are installed. 4. All security guards and technicians should be investigated for the highest security clearance, with reinvestigations every four years. 5. The processes and vehicles used in intrafacility transport of nuclear materials should be evaluated against a range of threats and attack scenarios, including violent air and vehicle assaults. All of these recommendations are feasible and cost-effective. The appropriate congressional subcommittees should direct that they be implemented as soon as possible

  14. Relevance of exterior appraisal in pig breeding

    NARCIS (Netherlands)

    Steenbergen, van E.J.

    1990-01-01

    In farm animals characterization of exterior is not a goal in itself but rather serves as an indicator of economically important traits, i.e. for pigs: growth performance, reproductivity and constitution. This indication might be of interest when these traits can not be measured

  15. On the exterior structure of graphs

    International Nuclear Information System (INIS)

    Kastler, Daniel

    2004-01-01

    After a detailed ab initio description of the exterior structure of graphs as handled by Connes and Kreimer in their work on renormalization (illustrated by the example of the φ 3 model in six dimensions) we spell out in detail their study of the Lie algebra of infinitesimal characters and of the group of characters of the Hopf algebra of Feynman graphs

  16. Cost and performance analysis of physical security systems

    International Nuclear Information System (INIS)

    Hicks, M.J.; Yates, D.; Jago, W.H.

    1997-01-01

    CPA - Cost and Performance Analysis - is a prototype integration of existing PC-based cost and performance analysis tools: ACEIT (Automated Cost Estimating Integrated Tools) and ASSESS (Analytic System and Software for Evaluating Safeguards and Security). ACE is an existing DOD PC-based tool that supports cost analysis over the full life cycle of a system; that is, the cost to procure, operate, maintain and retire the system and all of its components. ASSESS is an existing DOE PC-based tool for analysis of performance of physical protection systems. Through CPA, the cost and performance data are collected into Excel workbooks, making the data readily available to analysts and decision makers in both tabular and graphical formats and at both the system and subsystem levels. The structure of the cost spreadsheets incorporates an activity-based approach to cost estimation. Activity-based costing (ABC) is an accounting philosophy used by industry to trace direct and indirect costs to the products or services of a business unit. By tracing costs through security sensors and procedures and then mapping the contributions of the various sensors and procedures to system effectiveness, the CPA architecture can provide security managers with information critical for both operational and strategic decisions. The architecture, features and applications of the CPA prototype are presented. 5 refs., 3 figs

  17. Adaptive boundary conditions for exterior flow problems

    CERN Document Server

    Boenisch, V; Wittwer, S

    2003-01-01

    We consider the problem of solving numerically the stationary incompressible Navier-Stokes equations in an exterior domain in two dimensions. This corresponds to studying the stationary fluid flow past a body. The necessity to truncate for numerical purposes the infinite exterior domain to a finite domain leads to the problem of finding appropriate boundary conditions on the surface of the truncated domain. We solve this problem by providing a vector field describing the leading asymptotic behavior of the solution. This vector field is given in the form of an explicit expression depending on a real parameter. We show that this parameter can be determined from the total drag exerted on the body. Using this fact we set up a self-consistent numerical scheme that determines the parameter, and hence the boundary conditions and the drag, as part of the solution process. We compare the values of the drag obtained with our adaptive scheme with the results from using traditional constant boundary conditions. Computati...

  18. Initial and Long-Term Movement of Cladding Installed Over Exterior Rigid Insulation

    Energy Technology Data Exchange (ETDEWEB)

    Baker, Peter [Building Science Corporation, Somerville, MA (United States)

    2014-09-01

    Changes in the International Energy Conservation Code (IECC) from 2009 to 2012 have resulted in the use of exterior rigid insulation becoming part of the prescriptive code requirements. With more jurisdictions adopting the 2012 IECC builders will be required to incorporate exterior insulation in the construction of their exterior wall assemblies. For thick layers of exterior insulation (levels greater than 1.5 inches), the use of wood furring strips attached through the insulation back to the structure has been used by many contractors and designers as a means to provide a convenient cladding attachment location. This research was an extension on previous research conducted by Building Science Corporation in 2011, and 2012. Each year the understanding of the system discrete load component interactions, as well as impacts of environmental loading, has increased. The focus of the research was to examine more closely the impacts of screw fastener bending on the total system capacity, effects of thermal expansion and contraction of materials on the compressive forces in the assembly, as well as to analyze a full year’s worth of cladding movement data from assemblies constructed in an exposed outdoor environment.

  19. Expert Meeting Report: Cladding Attachment Over Exterior Insulation (BSC Report)

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-10-01

    The addition of insulation to the exterior of buildings is an effective means of increasing the thermal resistance of both wood framed walls as well as mass masonry wall assemblies. The location of the insulation to the exterior of the structure has many direct benefits including better effective R-value from reduced thermal bridging, better condensation resistance, reduced thermal stress on the structure, as well as other commonly associated improvements such as increased air tightness and improved water management (Hutcheon 1964, Lstiburek 2007). The intent of the meeting was to review the current state of industry knowledge regarding cladding attachment over exterior insulation with a specific focus on: 1. Gravity load resistance, 2. Wind load resistance. The presentations explore these topics from an engineering design, laboratory testing, field monitoring, as well as practical construction perspective. By bringing various groups together (who have been conduction research or have experience in this area), a more holistic review of the design limits and current code language proposals can be completed and additional gaps identified. The results of which will help inform design standards and criteria.

  20. Secure and Resilient Functional Modeling for Navy Cyber-Physical Systems

    Science.gov (United States)

    2017-05-24

    control systems, it was determined that this project will employ the model of a Ship Chilled Water Distribution System as a central use case. This model...Siemens Corporation Corporate Technology Unrestricted. Distribution Statement A. Approved for public...release; distribution is unlimited. Page 1 of 4 Secure & Resilient Functional Modeling for Navy Cyber-Physical Systems FY17 Quarter 1 Technical Progress

  1. Gravitational Metric Tensor Exterior to Rotating Homogeneous ...

    African Journals Online (AJOL)

    The covariant and contravariant metric tensors exterior to a homogeneous spherical body rotating uniformly about a common φ axis with constant angular velocity ω is constructed. The constructed metric tensors in this gravitational field have seven non-zero distinct components.The Lagrangian for this gravitational field is ...

  2. Evaluation of Two CEDA Weatherization Pilot Implementations of an Exterior Insulation and Over-Clad Retrofit Strategy for Residential Masonry Buildings in Chicago

    Energy Technology Data Exchange (ETDEWEB)

    Neuhauser, Ken [Building Science Corporation, Somerville, MA (United States)

    2013-08-01

    This project examines the implementation of an exterior insulation and over-clad strategy for brick masonry buildings in Chicago—a free-standing two story two-family dwelling and a larger free-standing multifamily building. The test homes selected for this research represent predominant housing types for the Chicago area, in which high heating energy use typical in these buildings threaten housing affordability, and uninsulated mass masonry wall assemblies are uncomfortable for residents. In this project, the Community and Economic Development Association of Cook County, Inc. (CEDA) has secured a Sustainable Energy Resources for Consumers (SERC) innovation grant sponsored by DOE to pursue a pilot implementation of innovative approaches to retrofit in masonry wall enclosures. The retrofit measures are evaluated in terms of feasibility, cost and performance. Through observations of the strategies implemented, the research described in this report identifies measures critical to performance as well as conditions for wider adoption. The research also identifies common factors that must be considered in determining whether the exterior insulation and over-clad strategy is appropriate for the building.

  3. Evaluation of Two CEDA Weatherization Pilot Implementations of an Exterior Insulation and Over-Clad Retrofit Strategy for Residential Masonry Buildings in Chicago

    Energy Technology Data Exchange (ETDEWEB)

    Neuhauser, K.

    2013-08-01

    This project examines the implementation of an exterior insulation and over-clad strategy for brick masonry buildings in Chicago. The strategy was implemented at a free-standing two story two-family dwelling and a larger free-standing multifamily building. The test homes selected for this research represent predominant housing types for the Chicago area. High heating energy use typical in these buildings threaten housing affordability. Uninsulated mass masonry wall assemblies also have a strongly detrimental impact on comfort. Significant changes to the performance of masonry wall assemblies is generally beyond the reach of typical weatherization (Wx) program resources. The Community and Economic Development Association of Cook County, Inc. (CEDA) has secured a Sustainable Energy Resources for Consumers (SERC) innovation grant sponsored by the United States Department of Energy (DOE). This grant provides CEDA the opportunity to pursue a pilot implementation of innovative approaches to retrofit in masonry wall enclosures. The exterior insulation and over-clad strategy implemented through this project was designed to allow implementation by contractors active in CEDA weatherization programs and using materials and methods familiar to these contractors. The retrofit measures are evaluated in terms of feasibility, cost and performance. Through observations of the strategies implemented, the research described in this report identifies measures critical to performance as well as conditions for wider adoption. The research also identifies common factors that must be considered in determining whether the exterior insulation and over-clad strategy is appropriate for the building.

  4. 10 CFR 434.516 - Building exterior envelope.

    Science.gov (United States)

    2010-01-01

    ... Buildings for calculating the Energy Cost Budget. In calculating the Design Energy Consumption of the... assumptions for calculating the Energy Cost Budget and default assumptions for the Design Energy Consumption... without operable windows shall be assumed to be 0.038 cfm/ft2 of gross exterior wall. Hotels/motels and...

  5. Exterior Insulation Implications for Heating and Cooling Systems in Cold Climates

    Energy Technology Data Exchange (ETDEWEB)

    Herk, Anastasia [IBACOS Inc., Pittsburgh, PA (United States); Poerschke, Andrew [IBACOS Inc., Pittsburgh, PA (United States)

    2015-04-09

    The New York State Energy Research and Development Authority (NYSERDA) is interested in finding cost-effective solutions for deep energy retrofits (DERs) related to exterior wall insulation in a cold climate, with targets of 50% peak load reduction and 50% space conditioning energy savings. The U.S. Department of Energy Building America team, IBACOS, in collaboration with GreenHomes America, Inc. (GHA), was contracted by NYSERDA to research exterior wall insulation solutions. In addition to exterior wall insulation, the strategies included energy upgrades where needed in the attic, mechanical and ventilation systems, basement, band joist, walls, and floors. Under Building America, IBACOS is studying the impact of a “thermal enclosure” DER on the sizing of the space conditioning system and the occupant comfort if the thermal capacity of the heating and cooling system is dramatically downsized without any change in the existing heating and cooling distribution system (e.g., size, tightness and supply outlet configurations).

  6. Exterior Insulation Implications for Heating and Cooling Systems in Cold Climates

    Energy Technology Data Exchange (ETDEWEB)

    Herk, Anastasia; Poerschke, Andrew

    2015-04-01

    The New York State Energy Research and Development Authority (NYSERDA) is interested in finding cost-effective solutions for deep energy retrofits (DERs) related to exterior wall insulation in a cold climate, with targets of 50% peak load reduction and 50% space conditioning energy savings. The U.S. Department of Energy Building America team, IBACOS, in collaboration with GreenHomes America, Inc. (GHA), was contracted by NYSERDA to research exterior wall insulation solutions. In addition to exterior wall insulation, the strategies included energy upgrades where needed in the attic, mechanical and ventilation systems, basement, band joist, walls, and floors. Under Building America, IBACOS is studying the impact of a “thermal enclosure” DER on the sizing of the space conditioning system and the occupant comfort if the thermal capacity of the heating and cooling system is dramatically downsized without any change in the existing heating and cooling distribution system (e.g., size, tightness and supply outlet configurations).

  7. Canine Supply for Physical Security: An Analysis of the Royal Australian Air Force Military Working Dog Program

    Science.gov (United States)

    2016-03-01

    PHYSICAL SECURITY: AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM by Mark W. Powell March 2016 Thesis...AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM 5. FUNDING NUMBERS 6. AUTHOR(S) Mark W. Powell 7. PERFORMING...increased demand on its physical security elements. Its military working dog (MWD) workforce is required to meet an inventory of 204 by end of year 2023 as

  8. Physical-Layer Security with Full-Duplex Transceivers and Multiuser Receiver at Eve

    DEFF Research Database (Denmark)

    Mahmood, Nurul Huda; Shafique Ansari, Imran; Popovski, Petar

    2017-01-01

    , leading researchers to study other possible applications that can accord higher gains. The potential of full-duplex communication in improving the physical-layer security of a communication link is investigated in this contribution. We specifically present a thorough analysis of the achievable ergodic...

  9. Discrete Exterior Calculus Discretization of Incompressible Navier-Stokes Equations

    KAUST Repository

    Mohamed, Mamdouh S.; Hirani, Anil N.; Samtaney, Ravi

    2017-01-01

    A conservative discretization of incompressible Navier-Stokes equations over surface simplicial meshes is developed using discrete exterior calculus (DEC). Numerical experiments for flows over surfaces reveal a second order accuracy

  10. Improved iterative image reconstruction algorithm for the exterior problem of computed tomography

    International Nuclear Information System (INIS)

    Guo, Yumeng; Zeng, Li

    2017-01-01

    In industrial applications that are limited by the angle of a fan-beam and the length of a detector, the exterior problem of computed tomography (CT) uses only the projection data that correspond to the external annulus of the objects to reconstruct an image. Because the reconstructions are not affected by the projection data that correspond to the interior of the objects, the exterior problem is widely applied to detect cracks in the outer wall of large-sized objects, such as in-service pipelines. However, image reconstruction in the exterior problem is still a challenging problem due to truncated projection data and beam-hardening, both of which can lead to distortions and artifacts. Thus, developing an effective algorithm and adopting a scanning trajectory suited for the exterior problem may be valuable. In this study, an improved iterative algorithm that combines total variation minimization (TVM) with a region scalable fitting (RSF) model was developed for a unilateral off-centered scanning trajectory and can be utilized to inspect large-sized objects for defects. Experiments involving simulated phantoms and real projection data were conducted to validate the practicality of our algorithm. Furthermore, comparative experiments show that our algorithm outperforms others in suppressing the artifacts caused by truncated projection data and beam-hardening.

  11. Improved iterative image reconstruction algorithm for the exterior problem of computed tomography

    Energy Technology Data Exchange (ETDEWEB)

    Guo, Yumeng [Chongqing University, College of Mathematics and Statistics, Chongqing 401331 (China); Chongqing University, ICT Research Center, Key Laboratory of Optoelectronic Technology and System of the Education Ministry of China, Chongqing 400044 (China); Zeng, Li, E-mail: drlizeng@cqu.edu.cn [Chongqing University, College of Mathematics and Statistics, Chongqing 401331 (China); Chongqing University, ICT Research Center, Key Laboratory of Optoelectronic Technology and System of the Education Ministry of China, Chongqing 400044 (China)

    2017-01-11

    In industrial applications that are limited by the angle of a fan-beam and the length of a detector, the exterior problem of computed tomography (CT) uses only the projection data that correspond to the external annulus of the objects to reconstruct an image. Because the reconstructions are not affected by the projection data that correspond to the interior of the objects, the exterior problem is widely applied to detect cracks in the outer wall of large-sized objects, such as in-service pipelines. However, image reconstruction in the exterior problem is still a challenging problem due to truncated projection data and beam-hardening, both of which can lead to distortions and artifacts. Thus, developing an effective algorithm and adopting a scanning trajectory suited for the exterior problem may be valuable. In this study, an improved iterative algorithm that combines total variation minimization (TVM) with a region scalable fitting (RSF) model was developed for a unilateral off-centered scanning trajectory and can be utilized to inspect large-sized objects for defects. Experiments involving simulated phantoms and real projection data were conducted to validate the practicality of our algorithm. Furthermore, comparative experiments show that our algorithm outperforms others in suppressing the artifacts caused by truncated projection data and beam-hardening.

  12. Additional improvements needed in physical security at nuclear powerplants

    International Nuclear Information System (INIS)

    1983-01-01

    Since the middle 1970's, the Nuclear Regulatory Commission and powerplant operators have taken measures to reduce the vulnerability of powerplants to attempted acts of sabotage. GAO's evaluation disclosed that further improvements can be made by screening nuclear plant employees to reduce the number of potential saboteurs and strengthening the physical security systems to ensure their compatibility with other plant safety systems. The Commission has taken two initiatives addressing these improvements. Therefore, GAO is not making recommendations at this time

  13. Process design (exterior – interior design)

    OpenAIRE

    Sandeva, Vaska; Despot, Katerina

    2013-01-01

    The design is a complex process of spatial organization and creative problem object. It switched to the study of complex natural conditions (analysis and evaluation) and the development of compositional solution structure of the object. Construction and shaping of all buildings whether it is exterior or interior, be it street, Square apartment building, park or greater forest massif, public facility (administrative buildings, hospitals, schools, galleries etc.), residential object (garsion...

  14. Numerical investigation on exterior conformal mappings with application to airfoils

    International Nuclear Information System (INIS)

    Mohamad Rashidi Md Razali; Hu Laey Nee

    2000-01-01

    A numerical method is described in computing a conformal map from an exterior region onto the exterior of the unit disk. The numerical method is based on a boundary integral equation which is similar to the Kerzman-Stein integral equation for interior mapping. Some examples show that numerical results of high accuracy can be obtained provided that the boundaries are smooth. This numerical method has been applied to the mapping airfoils. However, due to the fact that the parametric representation of an air foil is not known, a cubic spline interpolation method has been used. Some numerical examples with satisfying results have been obtained for the symmetrical and cambered airfoils. (Author)

  15. Construction Guidelines for High R-Value Walls without Exterior Rigid Insulation

    Energy Technology Data Exchange (ETDEWEB)

    Arena, Lois B. [Steven Winter Associates, Inc., Norwalk, CT (United States). Consortium for Advanced Residential Buildings (CARB)

    2016-07-13

    High R-value wall assemblies (R-40 and above) are gaining popularity in the market due to programs such as the U.S. Department of Energy Zero Energy Ready Home program, Passive House, Net Zero Energy Home challenges in several states, and highly incentivized retrofit programs. In response to this demand, several builders have successfully used double-wall systems to achieve higher R-values in thicker, framed walls. To builders of conventional stick-framed homes, often one of the most appealing features of double-wall systems is that there are very few new exterior details. Exterior sheathings, structural bracings, house wraps or building paper, window and door flashings, and siding attachments are usually identical to good details in conventional framed-wall systems. However, although the details in double-wall systems are very similar to those in conventional stick framing, there is sometimes less room for error. Several studies have confirmed colder temperatures of exterior sheathing in high R-value wall assemblies that do not have exterior rigid foam insulation. These colder temperatures can lead to increased chances for condensation from air exfiltration, and they have the potential to result in moisture-related problems (Straube and Smegal 2009, Arena 2014, Ueno 2015). The information presented in this guide is intended to reduce the risk of failure in these types of assemblies, increase durability, and reduce material brought to landfills due to failures and resulting decay. Although this document focuses on double-wall framing techniques, the majority of the information about how to properly construct and finish high R-value assemblies is applicable to all wall assemblies that do not have foam insulation installed on the exterior of the structural sheathing. The techniques presented have been shown through field studies to reduce the likelihood of mold growth and moisture-related damage and are intended for builders, framing contractors, architects, and

  16. Use of soft probabilities in evaluating physical-security systems

    International Nuclear Information System (INIS)

    Green, J.N.

    1982-03-01

    The complexity of evaluating how a physical security system would perform against a broad array of threat situations dictates the use by an inspector of methods which are not completely rigorous. Intuition and judgment based on experience have a large role to play. The use of soft probabilities can give meaningful results when the nature of the situation to which they are applied is sufficiently understood. Although the scoring method proposed is based on complex theory, it is feasible to apply on an intuitive basis. 6 figures

  17. A Review of Cyber-Physical Energy System Security Assessment

    DEFF Research Database (Denmark)

    Rasmussen, Theis Bo; Yang, Guangya; Nielsen, Arne Hejde

    2017-01-01

    Increasing penetration of renewable energy resources (RES) and electrification of services by implementing distributed energy resources (DER) has caused a paradigm shift in the operation of the power system. The controllability of the power system is predicted to be shifted from the generation side...... to the consumption side. This transition entails that the future power system evolves into a complex cyber-physical energy system (CPES) with strong interactions between the power, communication and neighboring energy systems. Current power system security assessment methods are based on centralized computation...

  18. Role of physical protection and safeguards technology used to Nuclear Material Security

    International Nuclear Information System (INIS)

    Djoko-Irianto, Ign.

    2005-01-01

    The presence of nuclear materials at any nuclear facility must be in secure and must be known as safeguards purpose such as its position, from or type and amount. The clarification of the amount be reported to the national regulatory body and International Atomic Energy Agency (IAEA) as the International regulatory body. The national regulatory body and IAEA will then verify that report. The verification must be done to know there is no difference of the amount, and to give the assurance to the International community that any diversion of safeguarded nuclear material from civil use to a prescribed military purpose would be detected. To carry out verification, several verification techniques such as non-destructive analysis, surveillance, unattended and remote monitoring and environmental sampling are explained to convey the impression how those techniques are implemented. According to the security requirement, the physical protection system including all components of physical protection system have to be effectively designed

  19. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.

    Science.gov (United States)

    Ali, Bako; Awad, Ali Ismail

    2018-03-08

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  20. Initial and Long-Term Movement of Cladding Installed Over Exterior Rigid Insulation

    Energy Technology Data Exchange (ETDEWEB)

    Baker, P.

    2014-09-01

    Changes in the International Energy Conservation Code (IECC) from 2009 to 2012 have resulted in the use of exterior rigid insulation becoming part of the prescriptive code requirements. With more jurisdictions adopting the 2012 IECC builders are going to finding themselves required to incorporate exterior insulation in the construction of their exterior wall assemblies. For thick layers of exterior insulation (levels greater than 1.5 inches), the use wood furring strips attached through the insulation back to the structure has been used by many contractors and designers as a means to provide a convenient cladding attachment location. However, there has been a significant resistance to its widespread implementation due to a lack of research and understanding of the mechanisms involved and potential creep effects of the assembly under the sustained dead load of a cladding. This research was an extension on previous research conducted by BSC in 2011, and 2012. Each year the understanding of the system discrete load component interactions, as well as impacts of environmental loading has increased. The focus of the research was to examine more closely the impacts of screw fastener bending on the total system capacity, effects of thermal expansion and contraction of materials on the compressive forces in the assembly, as well as to analyze a full years worth of cladding movement data from assemblies constructed in an exposed outdoor environment.

  1. 10 CFR 72.186 - Change to physical security and safeguards contingency plans.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Change to physical security and safeguards contingency... contingency plans. (a) The licensee shall make no change that would decrease the safeguards effectiveness of... licensee safeguards contingency plan without prior approval of the Commission. A licensee desiring to make...

  2. Analysis of impact of noncompliance with physical-security requirements at nuclear facilities

    International Nuclear Information System (INIS)

    Green, J.N.

    1982-03-01

    Inspectors are required to analyze the impact of instances of noncompliance with physical security requirements at licensed nuclear facilities. A scoring procedure for components and a method for evaluating the effectiveness of the subsystems involved are proposed to reinforce an inspector's judgment about the remaining level of safeguards

  3. Non-static vacuum strings: exterior and interior solutions

    International Nuclear Information System (INIS)

    Stein-Schabes, J.A.

    1986-01-01

    New non-static cylindrically symmetric solutions of Einsteins's equations are presented. Some of these solutions represent string-like objects. An exterior vacuum solution is matched to a non-vacuum interior solution for different forms of the energy-momentum tensor. They generalize the standard static string. 12 refs

  4. A Probabilistic Model for Exteriors of Residential Buildings

    KAUST Repository

    Fan, Lubin; Wonka, Peter

    2016-01-01

    We propose a new framework to model the exterior of residential buildings. The main goal of our work is to design a model that can be learned from data that is observable from the outside of a building and that can be trained with widely available

  5. 40 CFR 205.55-5 - Labeling-exterior. [Reserved

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Labeling-exterior. [Reserved] 205.55-5 Section 205.55-5 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS Medium and Heavy Trucks § 205.55-5 Labeling...

  6. A Probabilistic Model for Exteriors of Residential Buildings

    KAUST Repository

    Fan, Lubin

    2016-07-29

    We propose a new framework to model the exterior of residential buildings. The main goal of our work is to design a model that can be learned from data that is observable from the outside of a building and that can be trained with widely available data such as aerial images and street-view images. First, we propose a parametric model to describe the exterior of a building (with a varying number of parameters) and propose a set of attributes as a building representation with fixed dimensionality. Second, we propose a hierarchical graphical model with hidden variables to encode the relationships between building attributes and learn both the structure and parameters of the model from the database. Third, we propose optimization algorithms to generate three-dimensional models based on building attributes sampled from the graphical model. Finally, we demonstrate our framework by synthesizing new building models and completing partially observed building models from photographs.

  7. Physical security and accountancy - capability and limits of integration

    International Nuclear Information System (INIS)

    Weh, R.

    1984-01-01

    The basis as well as the objectives of physical security are different from those of international safeguards. But it seems to be reasonable to combine measures which provide advantages to both in terms of the inspectorates resources and non-hindrance of plant concept and operational strategy. Starting with a comparison of objectives, principles and measures, common aspects are defined to investigate exemplarily capability and limits in terms of technical feasibility as well as compliance with national regulations and principles of EURATOM/IAEA-Safeguards from the viewpoint of the designer of an industrial German reprocessing plant

  8. An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty

    KAUST Repository

    Hyadi, Amal; Rezki, Zouheir; Alouini, Mohamed-Slim

    2016-01-01

    The concept of physical layer security builds on the pivotal idea of turning the channel's imperfections, such as noise and fading, into a source of security. This is established through appropriately designed coding techniques and signal processing strategies. In this vein, it has been shown that fading channels can enhance the transmission of confidential information and that a secure communication can be achieved even when the channel to the eavesdropper is better than the main channel. However, to fully benefit from what fading has to offer, the knowledge of the channel state information at the transmitter (CSIT) is of primordial importance. In practical wireless communication systems, CSIT is usually obtained, prior to data transmission, through CSI feedback sent by the receivers. The channel links over which this feedback information is sent can be either noisy, rate-limited, or delayed, leading to CSIT uncertainty. In this paper, we present a comprehensive review of recent and ongoing research works on physical layer security with CSIT uncertainty. We focus on both information theoretic and signal processing approaches to the topic when the uncertainty concerns the channel to the wiretapper or the channel to the legitimate receiver. Moreover, we present a classification of the research works based on the considered channel uncertainty. Mainly, we distinguish between the cases when the uncertainty comes from an estimation error of the CSIT, from a CSI feedback link with limited capacity, or from an outdated CSI.

  9. An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty

    KAUST Repository

    Hyadi, Amal

    2016-09-21

    The concept of physical layer security builds on the pivotal idea of turning the channel\\'s imperfections, such as noise and fading, into a source of security. This is established through appropriately designed coding techniques and signal processing strategies. In this vein, it has been shown that fading channels can enhance the transmission of confidential information and that a secure communication can be achieved even when the channel to the eavesdropper is better than the main channel. However, to fully benefit from what fading has to offer, the knowledge of the channel state information at the transmitter (CSIT) is of primordial importance. In practical wireless communication systems, CSIT is usually obtained, prior to data transmission, through CSI feedback sent by the receivers. The channel links over which this feedback information is sent can be either noisy, rate-limited, or delayed, leading to CSIT uncertainty. In this paper, we present a comprehensive review of recent and ongoing research works on physical layer security with CSIT uncertainty. We focus on both information theoretic and signal processing approaches to the topic when the uncertainty concerns the channel to the wiretapper or the channel to the legitimate receiver. Moreover, we present a classification of the research works based on the considered channel uncertainty. Mainly, we distinguish between the cases when the uncertainty comes from an estimation error of the CSIT, from a CSI feedback link with limited capacity, or from an outdated CSI.

  10. Excavationless Exterior Foundation Insulation Exploratory Study

    Energy Technology Data Exchange (ETDEWEB)

    Mosiman, G.; Wagner, R.; Schirber, T.

    2013-02-01

    The key objective of this exploratory study was to investigate the feasibility of the development or adoption of technologies that would enable a large percentage of existing homes in cold climates to apply a combination 'excavationless' soil removal process with appropriate insulation and water management on the exterior of existing foundations at a low cost. Our approach was to explore existing excavation and material technologies and systems to discover whether potential successful combinations existed.

  11. A framework to enhance security of physically unclonable functions using chaotic circuits

    Science.gov (United States)

    Chen, Lanxiang

    2018-05-01

    As a new technique for authentication and key generation, physically unclonable function (PUF) has attracted considerable attentions, with extensive research results achieved already. To resist the popular machine learning modeling attacks, a framework to enhance the security of PUFs is proposed. The basic idea is to combine PUFs with a chaotic system of which the response is highly sensitive to initial conditions. For this framework, a specific construction which combines the common arbiter PUF circuit, a converter, and the Chua's circuit is given to implement a more secure PUF. Simulation experiments are presented to further validate the framework. Finally, some practical suggestions for the framework and specific construction are also discussed.

  12. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

    Directory of Open Access Journals (Sweden)

    Bako Ali

    2018-03-01

    Full Text Available The Internet of Things (IoT is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  13. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

    Science.gov (United States)

    2018-01-01

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes. PMID:29518023

  14. Cladding Attachment Over Thick Exterior Insulating Sheathing

    Energy Technology Data Exchange (ETDEWEB)

    Baker, P. [Building Science Corporation, Somerville, MA (United States); Eng, P. [Building Science Corporation, Somerville, MA (United States); Lepage, R. [Building Science Corporation, Somerville, MA (United States)

    2014-01-01

    The addition of insulation to the exterior of buildings is an effective means of increasing the thermal resistance of both wood framed walls as well as mass masonry wall assemblies. For thick layers of exterior insulation (levels greater than 1.5 inches), the use of wood furring strips attached through the insulation back to the structure has been used by many contractors and designers as a means to provide a convenient cladding attachment location (Straube and Smegal 2009, Pettit 2009, Joyce 2009, Ueno 2010). The research presented in this report is intended to help develop a better understanding of the system mechanics involved and the potential for environmental exposure induced movement between the furring strip and the framing. BSC sought to address the following research questions: 1. What are the relative roles of the mechanisms and the magnitudes of the force that influence the vertical displacement resistance of the system? 2. Can the capacity at a specified deflection be reliably calculated using mechanics based equations? 3. What are the impacts of environmental exposure on the vertical displacement of furring strips attached directly through insulation back to a wood structure?

  15. NPP physical protection and information security as necessary conditions for reducing nuclear and radiation accident risks

    International Nuclear Information System (INIS)

    Pogosov, O.Yu.; Derevyanko, O.V.

    2017-01-01

    The paper focuses on the fact that nuclear failures and incidents can lead to radioactive contamination of NPP premises. Nuclear and radiation hazard may be caused by malefactors in technological processes when applying computers or inadequate control in case of insufficient level of information security.The researchers performed analysis of factors for reducing risks of nuclear and radiation accidents at NPPs considering specific conditions related to information security of NPP physical protection systems. The paper considers connection of heterogeneous factors that may increase the risk of NPP accidents, possibilities and ways to improve adequate modelling of security of information with limited access directly related to the functioning of automated set of engineering and technical means for NPP physical protection. Within the overall Hutchinson formalization, it is proposed to include additional functional dependencies on indicators specific for NPPs into analysis algorithms.

  16. Design and evaluation of physical protection systems of nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    An, Jin Soo; Lee, Hyun Chul; Hwang, In Koo; Kwack, Eun Ho; Choi, Yung Myung

    2001-06-01

    Nuclear material and safety equipment of nuclear facilities are required to be protected against any kind of theft or sabotage. Physical protection is one of the measures to prevent such illegally potential threats for public security. It should cover all the cases of use, storage, and transportation of nuclear material. A physical protection system of a facility consists of exterior intrusion sensors, interior intrusion sensors, an alarm assessment and communication system, entry control systems, access delay equipment, etc. The design of an effective physical protection system requires a comprehensive approach in which the designers define the objective of the system, establish an initial design, and evaluate the proposed design. The evaluation results are used to determine whether or not the initial design should be modified and improved. Some modelling techniques are commonly used to analyse and evaluate the performance of a physical protection system. Korea Atomic Energy Research Institute(KAERI) has developed a prototype of software as a part of a full computer model for effectiveness evaluation for physical protection systems. The input data elements for the prototype, contain the type of adversary, tactics, protection equipment, and the attributes of each protection component. This report contains the functional and structural requirements defined in the development of the evaluation computer model.

  17. Exterior LED Lighting Projects at Princeton University

    Energy Technology Data Exchange (ETDEWEB)

    Davis, Robert G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Evans, William [Princeton Univ., NJ (United States); Murphy, Arthur T. [Princeton Univ., NJ (United States); Perrin, Tess E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2015-10-01

    For this report, PNNL / the U.S. Department of Energy (DOE) studied a series of past exterior lighting projects at Princeton, in order to document Princeton’s experiences with solid-state lighting (SSL) and the lessons learned along the way, and to show how their approach to SSL projects evolved as their own learning expanded and as the products available improved in performance and sophistication.

  18. Wireless Physical Layer Security: On the Performance Limit of Secret-Key Agreement

    KAUST Repository

    Zorgui, Marwen

    2015-05-01

    Physical layer security (PLS) is a new paradigm aiming at securing communications between legitimate parties at the physical layer. Conventionally, achieving confidentiality in communication networks relies on cryptographic techniques such as public-key cryptography, secret-key distribution and symmetric encryption. Such techniques are deemed secure based on the assumption of limited computational abilities of a wiretapper. Given the relentless progress in computational capacities and the dynamic topology and proliferation of modern wireless networks, the relevance of the previous techniques in securing communications is more and more questionable and less and less reliable. In contrast to this paradigm, PLS does not assume a specific computational power at any eavesdropper, its premise to guarantee provable security via employing channel coding techniques at the physical layer exploiting the inherent randomness in most communication systems. In this dissertation, we investigate a particular aspect of PLS, which is secret-key agreement, also known as secret-sharing. In this setup, two legitimate parties try to distill a secret-key via the observation of correlated signals through a noisy wireless channel, in the presence of an eavesdropper who must be kept ignorant of the secret-key. Additionally, a noiseless public channel is made available to the legitimate parties to exchange public messages that are also accessible to the eavesdropper. Recall that key agreement is an important aspect toward realizing secure communications in the sense that the key can be used in a one-time pad scheme to send the confidential message. In the first part, our focus is on secret-sharing over Rayleigh fading quasi-static channels. We study the fundamental relationship relating the probability of error and a given target secret-key rate in the high power regime. This is characterized through the diversity multiplexing tradeoff (DMT) concept, that we define for our model and then

  19. Evaluation methodology based on physical security assessment results: a utility theory approach

    International Nuclear Information System (INIS)

    Bennett, H.A.; Olascoaga, M.T.

    1978-03-01

    This report describes an evaluation methodology which aggregates physical security assessment results for nuclear facilities into an overall measure of adequacy. This methodology utilizes utility theory and conforms to a hierarchical structure developed by the NRC. Implementation of the methodology is illustrated by several examples. Recommendations for improvements in the evaluation process are given

  20. Physical security system effectiveness evaluation, a status report

    International Nuclear Information System (INIS)

    Todd, J.L. Jr.; Nickell, W.C.

    1975-07-01

    A method to permit objective comparisons of physical security is under development and is expected to be useful in the optimization of system design and in cost benefit analysis. The procedure involves identifying the possible or potential characteristics of a postulated adversary, the countermeasures to deny or diminish adversary success, and the response capabilities of the defender. These, in conjunction with system definition information, are evaluated by the use of analytical models which provide a means of ranking systems against threats. This paper describes the status of this effort and includes an overview of the methodology with a brief description of various models being considered for use in effectiveness evaluation. (U.S.)

  1. Physical security system effectiveness evaluation: a status report

    International Nuclear Information System (INIS)

    Todd, J.L.; Nickell, W.C.

    1975-01-01

    A method to permit objective comparisons of physical security systems is under development and is expected to be useful in the optimization of system design and in cost benefit analysis. The procedure involves identifying the possible or potential characteristics of a postulated adversary, the counter-measures to deny or diminish adversary success and the response capabilities of the defender. These, in conjunction with system definition information, are evaluated by the use of analytical models which provide a menas of ranking systems against threats. The status of this effort and an overview of the methodology with a brief description of various models being considered for use in effective evaluation are discussed. (U.S.)

  2. Exterior domain problems and decomposition of tensor fields in weighted Sobolev spaces

    OpenAIRE

    Schwarz, Günter

    1996-01-01

    The Hodge decompOsition is a useful tool for tensor analysis on compact manifolds with boundary. This paper aims at generalising the decomposition to exterior domains G ⊂ IR n. Let L 2a Ω k(G) be the space weighted square integrable differential forms with weight function (1 + |χ|²)a, let d a be the weighted perturbation of the exterior derivative and δ a its adjoint. Then L 2a Ω k(G) splits into the orthogonal sum of the subspaces of the d a-exact forms with vanishi...

  3. Numerical convergence of discrete exterior calculus on arbitrary surface meshes

    KAUST Repository

    Mohamed, Mamdouh S.; Hirani, Anil N.; Samtaney, Ravi

    2018-01-01

    Discrete exterior calculus (DEC) is a structure-preserving numerical framework for partial differential equations solution, particularly suitable for simplicial meshes. A longstanding and widespread assumption has been that DEC requires special

  4. Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks.

    Science.gov (United States)

    Chen, Bo; Ho, Daniel W C; Hu, Guoqiang; Yu, Li; Bo Chen; Ho, Daniel W C; Guoqiang Hu; Li Yu; Chen, Bo; Ho, Daniel W C; Hu, Guoqiang; Yu, Li

    2018-06-01

    State estimation plays an essential role in the monitoring and supervision of cyber-physical systems (CPSs), and its importance has made the security and estimation performance a major concern. In this case, multisensor information fusion estimation (MIFE) provides an attractive alternative to study secure estimation problems because MIFE can potentially improve estimation accuracy and enhance reliability and robustness against attacks. From the perspective of the defender, the secure distributed Kalman fusion estimation problem is investigated in this paper for a class of CPSs under replay attacks, where each local estimate obtained by the sink node is transmitted to a remote fusion center through bandwidth constrained communication channels. A new mathematical model with compensation strategy is proposed to characterize the replay attacks and bandwidth constrains, and then a recursive distributed Kalman fusion estimator (DKFE) is designed in the linear minimum variance sense. According to different communication frameworks, two classes of data compression and compensation algorithms are developed such that the DKFEs can achieve the desired performance. Several attack-dependent and bandwidth-dependent conditions are derived such that the DKFEs are secure under replay attacks. An illustrative example is given to demonstrate the effectiveness of the proposed methods.

  5. Exteriorization or in-situ repair, comparison of options for uterine repair at cesarean delivery

    International Nuclear Information System (INIS)

    Zafar, B.; Shehzad, F.; Safdar, C.A.

    2016-01-01

    Objective of study is to compare peri-operative complications between exteriorization and intraabdominal repair of uterus after cesarean delivery. Study Design: Randomized controlled trial. Place and Duration of Study: Obstetrics and Gynecology Department of Pakistan Ordinance Factory Hospital, Wah Cantt, from 1st April 2010 to 30th September 2010. Material and Methods: Patients planned for 1st cesarean section under spinal anesthesia were randomly allocated by lottery method to exteriorized (A) or in situ uterine repair (B) group. Patients with history of uterine surgeries and cesarean section were excluded from study. Variables analyzed were operation time, peri-operative hemoglobin (Hb) fall, nausea and vomiting during the cesarean delivery. Results: The study analyzed 170 patients and divided them in 2 groups, having no significant difference with respect to maternal demographics, procedure statistics and indication of cesarean section. Significant difference was observed in operation time being 32.78 min in exteriorized group and 36.38 min in situ uterine repair group (p-value 0.0001). Hb percent fall was 0.85 g/dl and 0.92 g/dl respectively in both groups (p-value 0.62) Nausea and vomiting was 23.5 percent in group A and 11.8 percent in group B (p-value 0.02, 0.04 respectively) Conclusion: Peri-operative complications like operative time and Hb fall are less in uterine repair after temporary exteriorization as compared to intra-abdominal repair of uterus after cesarean delivery. Nausea and vomiting were increased in exteriorized group but proper regional anesthetic technique and achieving adequate analgesia can reduce patient discomfort. (author)

  6. Port exteriorization appendectomy in children: An alternative to the ...

    African Journals Online (AJOL)

    Introduction Laparoscopic appendectomy is usually performed using an intracorporeal approach. The conventional procedure uses three ports. The port exteriorization appendectomy uses two trocars to perform the entire procedure and can be considered an efficient alternative to the conventional approach, especially in ...

  7. Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

    Science.gov (United States)

    Muller, George; Perkins, Casey J.; Lancaster, Mary J.; MacDonald, Douglas G.; Clements, Samuel L.; Hutton, William J.; Patrick, Scott W.; Key, Bradley Robert

    2015-07-28

    Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.

  8. Realization of FRC interior and exterior furniture

    Science.gov (United States)

    Šonka, Š.; Frantová, M.; Štemberk, P.; Havrda, J.; Janouch, P.

    2017-09-01

    This article deals with the implementation of fibre reinforced concrete for interior and exterior furniture. The use of fibre reinforced concrete for non-traditional and small structures brings some specifics in design and realization. These are, in particular, the design of a suitable mixture, the choice of the shape of the structure in relation to the technological possibilities of realization, the static effects and finally the actual production of the element.

  9. Slowly rotating charged fluid balls and their matching to an exterior domain

    International Nuclear Information System (INIS)

    Fodor, Gyula; Perjes, Zoltan; Bradley, Michael

    2002-01-01

    The slow-rotation approximation of Hartle is developed to a setting where a charged rotating fluid is present. The linearized Einstein-Maxwell equations are solved on the background of the Reissner-Nordstroem space-time in the exterior electrovacuum region. The theory is put to action for the charged generalization of the Wahlquist solution found by Garcia. The Garcia solution is transformed to coordinates suitable for the matching and expanded in powers of the angular velocity. The two domains are then matched along the zero pressure surface using the Darmois-Israel procedure. We prove a theorem to the effect that the exterior region is asymptotically flat if and only if the parameter C 2 , characterizing the magnitude of an external magnetic field, vanishes. We obtain the form of the constant C 2 for the Garcia solution. We conjecture that the Garcia metric cannot be matched to an asymptotically flat exterior electrovacuum region even to first order in the angular velocity. This conjecture is supported by a high precision numerical analysis

  10. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  11. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.

    Science.gov (United States)

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2014-07-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation's electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.

  12. Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment

    Science.gov (United States)

    Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran

    2013-01-01

    Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation’s electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments. PMID:25685516

  13. Selection and application of exterior stains for wood

    Science.gov (United States)

    R. Sam. Williams; William C. Feist

    1999-01-01

    Exterior stains for wood protect the wood surface from sunlight and moisture. Because stains are formulated to penetrate the wood surface, they are not prone to crack or peel as can film-forming finishes, such as paints. This publication describes the properties of stains and wood, methods for applying stains, and the expected service life of stains.

  14. Child-directed marketing inside and on the exterior of fast food restaurants.

    Science.gov (United States)

    Ohri-Vachaspati, Punam; Isgor, Zeynep; Rimkus, Leah; Powell, Lisa M; Barker, Dianne C; Chaloupka, Frank J

    2015-01-01

    Children who eat fast food have poor diet and health outcomes. Fast food is heavily marketed to youth, and exposure to such marketing is associated with higher fast food consumption. To examine the extent of child-directed marketing (CDM) inside and on the exterior of fast food restaurants. Data were collected from 6,716 fast food restaurants located in a nationally representative sample of public middle- and high-school enrollment areas in 2010, 2011, and 2012. CDM was defined as the presence of one or more of seven components inside or on the exterior of the restaurant. Analyses were conducted in 2014. More than 20% of fast food restaurants used CDM inside or on their exterior. In multivariate analyses, fast food restaurants that were part of a chain, offered kids' meals, were located in middle- (compared to high)-income neighborhoods, and in rural (compared to urban) areas had significantly higher odds of using any CDM; chain restaurants and those located in majority black neighborhoods (compared to white) had significantly higher odds of having an indoor display of kids' meal toys. Compared to 2010, there was a significant decline in use of CDM in 2011, but the prevalence increased close to the 2010 level in 2012. CDM inside and on the exterior of fast food restaurants is prevalent in chain restaurants; majority black communities, rural areas, and middle-income communities are disproportionately exposed. The fast food industry should limit children's exposure to marketing that promotes unhealthy food choices. Copyright © 2015 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  15. Fire propagation over combustible exterior facades exposed to intensified flame in Japan

    Directory of Open Access Journals (Sweden)

    Nishio Yuhei

    2016-01-01

    Full Text Available With regard to fire safety for exterior walls of a building, fire-resistance performance is considered, according to the current Building Standard Law of Japan. And it was revealed that the fire safety is not specifically regulated from the viewpoint of reaction-to-fire performance, such as fire propagation caused by combustible materials or products installed on the exterior side of fire-resistant load-bearing walls. Actual fire incidents in the world have shown that massive façade fire could occur at the exterior side of building wall even when the wall itself is fire resistant. In previous studies of the authors, a test method of façade fire was proposed for evaluating the vertical fire propagation over an external wall within the same building [1,2]. Based on these studies, new domestic standard test method was established in Japan as JIS A 1310: 2015, “Test method for fire propagation over building façades” at the end of January 2015 [3]. But there was the argument that heat output of burner inside the combustion chamber was not sufficiently high in the previous study. In this paper, results of fire tests on combustible façades are discussed from the viewpoints of different strength of flame exposing facade. In this research, it was clearly found that JIS A 1310 with heat output of 900kW could be applicable for evaluating fire propagation behaviour over various types of combustible exterior façades.

  16. Discrete exterior calculus discretization of incompressible Navier–Stokes equations over surface simplicial meshes

    KAUST Repository

    Mohamed, Mamdouh S.

    2016-02-11

    A conservative discretization of incompressible Navier–Stokes equations is developed based on discrete exterior calculus (DEC). A distinguishing feature of our method is the use of an algebraic discretization of the interior product operator and a combinatorial discretization of the wedge product. The governing equations are first rewritten using the exterior calculus notation, replacing vector calculus differential operators by the exterior derivative, Hodge star and wedge product operators. The discretization is then carried out by substituting with the corresponding discrete operators based on the DEC framework. Numerical experiments for flows over surfaces reveal a second order accuracy for the developed scheme when using structured-triangular meshes, and first order accuracy for otherwise unstructured meshes. By construction, the method is conservative in that both mass and vorticity are conserved up to machine precision. The relative error in kinetic energy for inviscid flow test cases converges in a second order fashion with both the mesh size and the time step.

  17. Discrete exterior calculus discretization of incompressible Navier-Stokes equations over surface simplicial meshes

    Science.gov (United States)

    Mohamed, Mamdouh S.; Hirani, Anil N.; Samtaney, Ravi

    2016-05-01

    A conservative discretization of incompressible Navier-Stokes equations is developed based on discrete exterior calculus (DEC). A distinguishing feature of our method is the use of an algebraic discretization of the interior product operator and a combinatorial discretization of the wedge product. The governing equations are first rewritten using the exterior calculus notation, replacing vector calculus differential operators by the exterior derivative, Hodge star and wedge product operators. The discretization is then carried out by substituting with the corresponding discrete operators based on the DEC framework. Numerical experiments for flows over surfaces reveal a second order accuracy for the developed scheme when using structured-triangular meshes, and first order accuracy for otherwise unstructured meshes. By construction, the method is conservative in that both mass and vorticity are conserved up to machine precision. The relative error in kinetic energy for inviscid flow test cases converges in a second order fashion with both the mesh size and the time step.

  18. Simulations of incompressible Navier Stokes equations on curved surfaces using discrete exterior calculus

    Science.gov (United States)

    Samtaney, Ravi; Mohamed, Mamdouh; Hirani, Anil

    2015-11-01

    We present examples of numerical solutions of incompressible flow on 2D curved domains. The Navier-Stokes equations are first rewritten using the exterior calculus notation, replacing vector calculus differential operators by the exterior derivative, Hodge star and wedge product operators. A conservative discretization of Navier-Stokes equations on simplicial meshes is developed based on discrete exterior calculus (DEC). The discretization is then carried out by substituting the corresponding discrete operators based on the DEC framework. By construction, the method is conservative in that both the discrete divergence and circulation are conserved up to machine precision. The relative error in kinetic energy for inviscid flow test cases converges in a second order fashion with both the mesh size and the time step. Numerical examples include Taylor vortices on a sphere, Stuart vortices on a sphere, and flow past a cylinder on domains with varying curvature. Supported by the KAUST Office of Competitive Research Funds under Award No. URF/1/1401-01.

  19. La dolarización y su incidencia en el Comercio Exterior Ecuatoriano.

    OpenAIRE

    Tanicuchi, Jorge Arturo

    2004-01-01

    En razón de que la economía ecuatoriana depende en gran medida del desempeño de su comercio exterior, así como del funcionamiento del esquema de la dolarización, surge, entonces, la necesidad de comprender una serie de inquietudes en torno a este delicado tema, especialmente en lo concerniente al ¿cómo está respondiendo la dolarización a las necesidades del comercio exterior del país, al sector de los exportadores e importadores y a la economía nacional misma?; ¿cómo está...

  20. Acción exterior de la Unión Europea: UE-Rusia

    OpenAIRE

    Martín Garzón, Jorge

    2017-01-01

    El principal objetivo de este trabajo ha sido desarrollar las competencias de la UE en materia de acción exterior, así como su alcance sobre un tercer Estado, la Federación Rusa. Se parte de la identificación de la UE como sujeto con personalidad jurídica y un régimen jurídico propio. Se va a especificar las instituciones y organismos competentes que desarrollan las políticas exteriores. Después se analiza la estructura de la Federación Rusa junto con sus relaciones con la UE. ...

  1. Being the corresponding accents of red in one interior and one exterior as

    OpenAIRE

    Sandeva, Vaska; Despot, Katerina; Namicev, Petar; Ignatov, Aleksandar

    2013-01-01

    What is the emphasis in the interior and what is exterior accent? Thair next goal is to attract attention and to clarify the answer to his location i.e. to highlight the special effect of the composition, which we have set. The color is the emphasis that has been selected for analysis. From the color palette, accent color is red, a primary color and while contrast to green or color that represented 60% of the exterior and is dominant. Ability of the human eye to focus and take depending on th...

  2. Acceptance criteria for the evaluation of Category 1 fuel cycle facility physical security plans

    Energy Technology Data Exchange (ETDEWEB)

    Dwyer, P.A.

    1991-10-01

    This NUREG document presents criteria developed from US Nuclear Regulatory Commission regulations for the evaluation of physical security plans submitted by Category 1 fuel facility licensees. Category 1 refers to those licensees who use or possess a formula quantity of strategic special nuclear material.

  3. Acceptance criteria for the evaluation of Category 1 fuel cycle facility physical security plans

    International Nuclear Information System (INIS)

    Dwyer, P.A.

    1991-10-01

    This NUREG document presents criteria developed from US Nuclear Regulatory Commission regulations for the evaluation of physical security plans submitted by Category 1 fuel facility licensees. Category 1 refers to those licensees who use or possess a formula quantity of strategic special nuclear material

  4. Inclined asymmetric librations in exterior resonances

    Science.gov (United States)

    Voyatzis, G.; Tsiganis, K.; Antoniadou, K. I.

    2018-04-01

    Librational motion in Celestial Mechanics is generally associated with the existence of stable resonant configurations and signified by the existence of stable periodic solutions and oscillation of critical (resonant) angles. When such an oscillation takes place around a value different than 0 or π , the libration is called asymmetric. In the context of the planar circular restricted three-body problem, asymmetric librations have been identified for the exterior mean motion resonances (MMRs) 1:2, 1:3, etc., as well as for co-orbital motion (1:1). In exterior MMRs the massless body is the outer one. In this paper, we study asymmetric librations in the three-dimensional space. We employ the computational approach of Markellos (Mon Not R Astron Soc 184:273-281, https://doi.org/10.1093/mnras/184.2.273, 1978) and compute families of asymmetric periodic orbits and their stability. Stable asymmetric periodic orbits are surrounded in phase space by domains of initial conditions which correspond to stable evolution and librating resonant angles. Our computations were focused on the spatial circular restricted three-body model of the Sun-Neptune-TNO system (TNO = trans-Neptunian object). We compare our results with numerical integrations of observed TNOs, which reveal that some of them perform 1:2 resonant, inclined asymmetric librations. For the stable 1:2 TNO librators, we find that their libration seems to be related to the vertically stable planar asymmetric orbits of our model, rather than the three-dimensional ones found in the present study.

  5. Physically Transient Memory on a Rapidly Dissoluble Paper for Security Application

    Science.gov (United States)

    Bae, Hagyoul; Lee, Byung-Hyun; Lee, Dongil; Seol, Myeong-Lok; Kim, Daewon; Han, Jin-Woo; Kim, Choong-Ki; Jeon, Seung-Bae; Ahn, Daechul; Park, Sang-Jae; Park, Jun-Young; Choi, Yang-Kyu

    2016-12-01

    We report the transient memory device by means of a water soluble SSG (solid sodium with glycerine) paper. This material has a hydroscopic property hence it can be soluble in water. In terms of physical security of memory devices, prompt abrogation of a memory device which stored a large number of data is crucial when it is stolen because all of things have identified information in the memory device. By utilizing the SSG paper as a substrate, we fabricated a disposable resistive random access memory (RRAM) which has good data retention of longer than 106 seconds and cycling endurance of 300 cycles. This memory device is dissolved within 10 seconds thus it can never be recovered or replicated. By employing direct printing but not lithography technology to aim low cost and disposable applications, the memory capacity tends to be limited less than kilo-bits. However, unlike high memory capacity demand for consumer electronics, the proposed device is targeting for security applications. With this regards, the sub-kilobit memory capacity should find the applications such as one-time usable personal identification, authentication code storage, cryptography key, and smart delivery tag. This aspect is attractive for security and protection system against unauthorized accessibility.

  6. DoD Physical Security Technical Support at the 1980 Winter Olympics Village.

    Science.gov (United States)

    1980-09-02

    support were provided to the 1980 Winter Olympic Games were: (1) Physical Security, (2) Communications- Electronics , and (3) Medical via the New York Army...vibration-based Fence Pro- tection System (FPS), manufactured by General Telephone and Electronics (GT& E ) and installed for the Federal Bureau of Prisons...CM (Mr. Woomert) DRSXY-GB (Mr. R. E . Cam) Aberdeen Proving Ground, MD 21005 Commander US Army Communications and Electronics Material Readiness

  7. Development and Application of High-Cr Ferritic Stainless Steels as Building Exterior Materials

    International Nuclear Information System (INIS)

    Kim, Yeong H.; Lee, Yong H.; Lee, Yong D.

    2008-01-01

    Stainless Steels have been widely used as a building exterior materials in Asian countries for the last decade. It is required for the materials in this field to have an aesthetic appearance,a relatively high strength, and an excellent corrosion resistance. Other metallic materials such as copper, aluminum, and carbon steels have been also used as the exterior materials. Considering the cost of maintenance, stainless steel, having the outstanding corrosion resistance, is replacing other materials in the several parts in the building exteriors. Ferritic stainless steel has been applied as the roofing materials because its thermal expansion is much smaller than that of austenitic stainless steel. Therefore, it is suitable for the large-scale construction such as airport terminal, convention center, and football stadium. To improve the corrosion resistance of the ferritic stainless steels, the modification of alloy composition has been studied to develop new grade materials and the progress in the surface technology has been introduced. Corrosion properties, of these materials were evaluated in the laboratory and in the field for longer than two years. High-Cr ferritic stainless steel showed excellent corrosion resistance to the atmospheric environments. In the region close to the sea, the corrosion resistance of high-Cr ferritic stainless steel was much superior to that of other materials, which may prove this steel to be the appropriate materials for the construction around seashore. In some of the large constructions around seashore in South Korea, high-Cr ferritic stainless steels have been used as the building exterior materials for six years

  8. Development and Application of High-Cr Ferritic Stainless Steels as Building Exterior Materials

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Yeong H.; Lee, Yong H.; Lee, Yong D. [POSCO Technical Reseaarch Lab., Pohang (Korea, Republic of)

    2008-12-15

    Stainless Steels have been widely used as a building exterior materials in Asian countries for the last decade. It is required for the materials in this field to have an aesthetic appearance,a relatively high strength, and an excellent corrosion resistance. Other metallic materials such as copper, aluminum, and carbon steels have been also used as the exterior materials. Considering the cost of maintenance, stainless steel, having the outstanding corrosion resistance, is replacing other materials in the several parts in the building exteriors. Ferritic stainless steel has been applied as the roofing materials because its thermal expansion is much smaller than that of austenitic stainless steel. Therefore, it is suitable for the large-scale construction such as airport terminal, convention center, and football stadium. To improve the corrosion resistance of the ferritic stainless steels, the modification of alloy composition has been studied to develop new grade materials and the progress in the surface technology has been introduced. Corrosion properties, of these materials were evaluated in the laboratory and in the field for longer than two years. High-Cr ferritic stainless steel showed excellent corrosion resistance to the atmospheric environments. In the region close to the sea, the corrosion resistance of high-Cr ferritic stainless steel was much superior to that of other materials, which may prove this steel to be the appropriate materials for the construction around seashore. In some of the large constructions around seashore in South Korea, high-Cr ferritic stainless steels have been used as the building exterior materials for six years.

  9. Configuración actual del comercio exterior en Galicia = Current foreign trade framework in Galicia

    Directory of Open Access Journals (Sweden)

    José Luis Placer Galán

    2016-12-01

    Full Text Available La reciente crisis económica y la contracción de la demanda interna han impulsado un creciente interés por los mercados exteriores. Esta investigación pretende caracterizar la configuración actual del comercio exterior de la Comunidad Autónoma de Galicia, tanto en lo relativo a los productos como a los mercados geográficos de origen y destino. Para ello se emplean una serie de indicadores, ampliamente contrastados en la investigación económica, que permiten identificar: el grado de apertura de la economía provincial leonesa; la propensión exportadora y la dependencia importadora; el grado de concentración, por producto y mercados, de sus flujos comerciales exteriores; la especialización exportadora y la ventaja comparativa sectorial; la composición inter o intra-industrial del comercio exterior; y la distribución geográfica de los flujos comerciales de la economía gallega con los mercados exteriores. The recent economic crisis and internal demand contraction have encouraged the emerging interest in international markets. This study aims at featuring the current foreign trade framework of the Galicia, in regards to both import and export products and geographical markets. For that purpose, several indexes, widely verified in this study, have been utilized to identify the trade openness level of Leon economy, its export propensity, import dependence as well as the concentration level for products and internal trade flows. Leon export specialization, its comparative advantage by sector, the inter-intra-industry trade composition and geographical distribution of trade with international markets have been likewise included in this study.   Keywords: .

  10. Effective vulnerability assessments for physical security devices, systems, and programs

    International Nuclear Information System (INIS)

    Johnston, R.G.; Garcia, A.R.E.

    2002-01-01

    Full text: The efficacy of devices, systems, and programs used for physical security depend critically on having periodic and effective vulnerability assessments. Effective vulnerability assessments, in turn, require certain conditions and attributes. These include: a proper understanding of their purpose; not confusing vulnerability assessments with other kinds of metrics, analyses, tests, and security exercises; the view that vulnerabilities are inevitable, and that finding them is good news (since they can then be mitigated), not bad news; rejection of findings of no vulnerabilities; avoidance of mere 'compliance mode' rubber stamping; the use of the proper outside, independent, imaginative personnel; psychologically predisposed to finding and demonstrating problems; the absence of conflicts of interest; no unrealistic constraints on the possible attack tools, procedures, personnel, or strategies; efforts to not just find and demonstrate vulnerabilities, but also to suggest possible countermeasures; proper context; input and buy-in from ALL facility security personnel, especially low-level personnel; emphasis on the simplest, most relevant attacks first; no underestimation of potential adversaries; consideration of fault analysis attacks; awareness of Rohrbach's Maxim and Shannon's Maxim. In addition to these factors, we will cover some of the complex issues and problems associated with the design of vulnerability assessments. There will also be suggestions on how to conduct effective vulnerability assessments on a severely limited budget. We will conclude with a discussion of both conventional and unconventional ways of reporting results. (author)

  11. Transforming Security Screening With Biometrics

    National Research Council Canada - National Science Library

    Hearnsberger, Brian J

    2003-01-01

    ... and identity theft to dramatically improve physical security. Today, biometric technology could be implemented to transform physical security by enhancing screening procedures currently in use at U.S...

  12. Selection of exterior wall using advantageousness comparison; Ulkoseinaen valinta elinkaariedullisuuden perusteella

    Energy Technology Data Exchange (ETDEWEB)

    Saari, A.; Vesa, M.

    2001-07-01

    The objective of the study was to clarify the advantageousness of six chosen exterior wall solutions and at the same time to produce the procedure the measurement of the advantageousness. The examined wall types were: (1) brick wall, (2) brick-wool-concrete wall, (2b) brick-wool-concrete wall (not plastered), (3) brick-wool-wood wall, (4) precast concrete wall, and (5) plaster-wool-concrete wall. The analysis was made to a residential construction project which is built in a frame municipality of the metropolitan area. Here the life cycle costs, environmental burdens, and other factors (the aesthetic character, image, a comfort and easy maintenance) have an affect to the advantageousness of exterior wall. The averages of appreciation of the seven members of the supervising body of this study were used as the weights of the aforementioned value factors in the comparison. The result of the analysis was that the unplastered brick-wool-concrete wall had the equal life cycle costs as the precast concrete wall (an annual cost FIM 70 per apartment floor area). They were superior in relation to other examined wall types. In turn the brick wall had the highest life cycle costs (an annual cost nearly FIM 200 per apartment floor area) from the examined wall solutions on the advantageousness measuring straightforwardly likewise. It was chosen for an examination time period for 50 years. Likewise the brick wall was the distinctly weakest solution eco-economically, irrespective of, how costs and environmental factors are weighted. The brick wall was both the most expensive and unecological from the examined exterior wall types. It had a weak ecological qualities because considerably more building material than to other examined wall types. Also it's thermal insulation capacity was the weakest. But if in the decision-making also the aesthetic character, image, the effect on the comfort, and easy maintenance of the exterior wall indeed are included in addition to the eco

  13. La evolución de la política exterior China

    Directory of Open Access Journals (Sweden)

    Mario Esteban Rodríguez

    2016-01-01

    Full Text Available Este artículo sintetiza y analiza los principales cambios experimentados por la política exterior de la República Popular China desde su fundación en 1949 hasta la actualidad. Para explicar esas transformaciones se recurre fundamentalmente a tres variables (la política interna de China, las características del sistema internacional y el contexto de seguridad, que las autoridades chinas han interpretado influidas por tres componentes ideacionales: el comunismo, el nacionalismo y el pragmatismo. A modo de conclusión se subraya que, a pesar de sus vaivenes, la política exterior de Pekín ha mantenido tres objetivos fundamentales en las últimas siete décadas: modernización, reconocimiento internacional como gran potencia y reunificación nacional.

  14. 10 CFR 73.28 - Security background checks for secure transfer of nuclear materials.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security background checks for secure transfer of nuclear... PLANTS AND MATERIALS Physical Protection of Special Nuclear Material in Transit § 73.28 Security background checks for secure transfer of nuclear materials. Licensees are excepted from the security...

  15. New exact solution for the exterior gravitational field of a spinning mass

    International Nuclear Information System (INIS)

    Manko, V.S.

    1990-01-01

    An exact asymptotically flat solution of the vacuum Einstein equations representing the exterior gravitational field of a stationary axisymmetric mass with an arbitrary mass-multipole structure is presented

  16. Security Analysis of Smart Grid Cyber Physical Infrastructures Using Modeling and Game Theoretic Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL; Sheldon, Frederick T. [University of Idaho

    2015-01-01

    Cyber physical computing infrastructures typically consist of a number of sites are interconnected. Its operation critically depends both on cyber components and physical components. Both types of components are subject to attacks of different kinds and frequencies, which must be accounted for the initial provisioning and subsequent operation of the infrastructure via information security analysis. Information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. We concentrated our analysis on the electric sector failure scenarios and impact analyses by the NESCOR Working Group Study, From the Section 5 electric sector representative failure scenarios; we extracted the four generic failure scenarios and grouped them into three specific threat categories (confidentiality, integrity, and availability) to the system. These specific failure scenarios serve as a demonstration of our simulation. The analysis using our ABGT simulation demonstrates how to model the electric sector functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the cyber physical infrastructure network with respect to CIA.

  17. A dual exterior point simplex type algorithm for the minimum cost network flow problem

    Directory of Open Access Journals (Sweden)

    Geranis George

    2009-01-01

    Full Text Available A new dual simplex type algorithm for the Minimum Cost Network Flow Problem (MCNFP is presented. The proposed algorithm belongs to a special 'exterior- point simplex type' category. Similarly to the classical network dual simplex algorithm (NDSA, this algorithm starts with a dual feasible tree-solution and reduces the primal infeasibility, iteration by iteration. However, contrary to the NDSA, the new algorithm does not always maintain a dual feasible solution. Instead, the new algorithm might reach a basic point (tree-solution outside the dual feasible area (exterior point - dual infeasible tree.

  18. Implementation of exterior complex scaling in B-splines to solve atomic and molecular collision problems

    International Nuclear Information System (INIS)

    McCurdy, C William; MartIn, Fernando

    2004-01-01

    B-spline methods are now well established as widely applicable tools for the evaluation of atomic and molecular continuum states. The mathematical technique of exterior complex scaling has been shown, in a variety of other implementations, to be a powerful method with which to solve atomic and molecular scattering problems, because it allows the correct imposition of continuum boundary conditions without their explicit analytic application. In this paper, an implementation of exterior complex scaling in B-splines is described that can bring the well-developed technology of B-splines to bear on new problems, including multiple ionization and breakup problems, in a straightforward way. The approach is demonstrated for examples involving the continuum motion of nuclei in diatomic molecules as well as electronic continua. For problems involving electrons, a method based on Poisson's equation is presented for computing two-electron integrals over B-splines under exterior complex scaling

  19. Construction Guidelines for High R-Value Walls without Exterior Rigid Insulation

    Energy Technology Data Exchange (ETDEWEB)

    Arena, Lois B. [Steven Winter Associates, Inc., Norwalk, CT (United States). Consortium for Advanced Residential Buildings

    2016-07-13

    High-R wall assemblies (R-40 and above) are gaining popularity in the market due to programs like the DOE's Zero Energy Ready Home program, Passive House (PH), Net Zero Energy Home (NZEH) challenges in several states, and highly incentivized retrofit programs. In response to this demand, several builders have successfully used 'double wall' systems to more practically achieve higher R-values in thicker, framed walls. To builders of conventional stick-framed homes, often one of the most appealing features of double wall systems is that there are very few new exterior details. Exterior sheathing, structural bracing, house wrap or building paper, window and door flashing, and siding attachment are usually identical to good details in conventional framed wall systems. The information presented in this guide is intended to reduce the risk of failure in these types of assemblies, increase durability, and result in a reduction of material brought to landfills due to failures and resulting decay. While this document focuses on double wall framing techniques, the majority of the information on how to properly construct and finish high R-value assemblies is applicable to all wall assemblies that do not have foam insulation installed on the exterior of the structural sheathing. The techniques presented have been shown through field studies to reduce the likelihood of mold growth and moisture related damage and are intended for builders, framing contractors, architects, and consultants involved in designing and building super insulated homes.

  20. Gross anatomy of network security

    Science.gov (United States)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  1. Curvature in mathematics and physics

    CERN Document Server

    Sternberg, Shlomo

    2012-01-01

    This original Dover textbook is based on an advanced undergraduate course taught by the author for more than 50 years. It introduces semi-Riemannian geometry and its principal physical application, Einstein's theory of general relativity, using the Cartan exterior calculus as a principal tool. Prerequisites include linear algebra and advanced calculus. 2012 edition.

  2. SEAPATH: A microcomputer code for evaluating physical security effectiveness using adversary sequence diagrams

    International Nuclear Information System (INIS)

    Darby, J.L.

    1986-01-01

    The Adversary Sequence Diagram (ASD) concept was developed by Sandia National Laboratories (SNL) to examine physical security system effectiveness. Sandia also developed a mainframe computer code, PANL, to analyze the ASD. The authors have developed a microcomputer code, SEAPATH, which also analyzes ASD's. The Authors are supporting SNL in software development of the SAVI code; SAVI utilizes the SEAPATH algorithm to identify and quantify paths

  3. Sustainable wall construction and exterior insulation retrofit technology process and structure

    Science.gov (United States)

    Vohra, Arun

    2000-01-01

    A low-cost process for exterior wall insulation retrofit, or new wall construction by stacking layers of fabric tube filled with insulating material against a wall and covering them with mesh and stucco provides a durable structure with good insulating value.

  4. Los impuestos al comercio exterior en México en la era de las exportaciones, 1872-1930

    Directory of Open Access Journals (Sweden)

    Luz María Uhthoff López

    2005-12-01

    Full Text Available Este trabajo analiza la relación entre la fiscalidad y el comportamiento del comercio exterior en los años de 1872 a 1930. Especial énfasis se hace en la normatividad de la política arancelaria y la relación entre la dinámica política, el sistema fiscal y los impuestos al comercio exterior. Durante este periodo se observa, por un lado, una continuidad entre el antiguo régimen y la etapa de la revolución: el comercio exterior se mantuvo, incluso algunas ramas experimentaron un gran desarrollo y, por lo tanto, los impuestos exteriores continuaron siendo importantes. No obstante, también se registró una tendencia a la baja en los impuestos provenientes de este sector, y una disminución de su importancia en el conjunto de los ingresos federales, lo que indica que existió entre los gobiernos de esos años, tanto de la primera como de la segunda etapa, la preocupación de no depender solamente de éstos, aumentando las fuentes alternativas de ingresos internos, como es el caso del impuesto del timbre y del impuesto sobre la renta.

  5. Macro Security Methodology for Conducting Facility Security and Sustainability Assessments

    International Nuclear Information System (INIS)

    Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.

    2007-01-01

    Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a 'dirty bomb'. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.

  6. Estrutura de informação sobre comércio exterior em Santa Catarina

    OpenAIRE

    Lino, Sônia Regina Lamego

    2001-01-01

    Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Sócio-Econômico O trabalho tem como objetivo geral estudar a estrutura de informação sobre comércio exterior em Santa Catarina e o uso dessa estrutura de informação pelos usuários das médias empresas do setor moveleiro catarinense que exportam para o MERCOSUL. Os objetivos específicos são: 1) identificar as instituições públicas e privadas que mantêm estrutura de informações sobre comércio exterior em Santa Catarina; 2...

  7. Improving the physical layer security of wireless communication networks using spread spectrum coding and artificial noise approach

    CSIR Research Space (South Africa)

    Adedeji, K

    2016-09-01

    Full Text Available at the application layer to protect the messages against eavesdropping. However, the evolution of strong deciphering mechanisms has made conventional cryptography-based security techniques ineffective against attacks from an intruder. Figure 1: Layer protocol... communication networks with passive and active eavesdropper,” IEEE Globecom; Wireless Communication System, pp. 4868-4873, 2012. [9] Y. Zou, X. Wang and W. Shen, “Optimal relay selection for physical layer security in cooperative wireless networks,” IEEE...

  8. Virtual dosimetry applied to the physical security of a nuclear installation

    Energy Technology Data Exchange (ETDEWEB)

    Santo, Andre Cotelli do E.; Mol, Antonio C.A.; Machado, Daniel M.; Chelles, Daniel R.; Goncalves, Deise G.S., E-mail: cotelli.andre@gmail.com, E-mail: mol@ien.gov.br, E-mail: machado.mol@gmail.com, E-mail: daniel.chelles@gmail.com, E-mail: deise.galvao@gmail.com [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil)

    2013-07-01

    An important activity to be held in radiation protection is the location of radioactive sources. The present work was devoted to the development of a virtual dosimetry tool for locating and detecting such sources. To this end, was created a three-dimensional virtual model of the Instituto de Engenharia Nuclear - IEN, endowed with virtual characters (avatars), capable of move and interact with the environment, radiation detectors (fixed and mobile) and radioactive sources. Aiming to assist in planning physical security of nuclear installations, the tool developed allows the detection simulation of individuals carrying radioactive sources through detectors installed at strategic points of the site. In addition, it is possible to detect and locate sources by handling portable detectors, operated by characters within the virtual environment. The results obtained show the behavior of the radiation detectors on continuous profile of radioactive sources, allowing calculate the dose rate at any position of the virtual environment. Thus, this work can assist in the training of security officers, as well as in evaluating the radiological safety of the nuclear site. (author)

  9. Virtual dosimetry applied to the physical security of a nuclear installation

    International Nuclear Information System (INIS)

    Santo, Andre Cotelli do E.; Mol, Antonio C.A.; Machado, Daniel M.; Chelles, Daniel R.; Goncalves, Deise G.S.

    2013-01-01

    An important activity to be held in radiation protection is the location of radioactive sources. The present work was devoted to the development of a virtual dosimetry tool for locating and detecting such sources. To this end, was created a three-dimensional virtual model of the Instituto de Engenharia Nuclear - IEN, endowed with virtual characters (avatars), capable of move and interact with the environment, radiation detectors (fixed and mobile) and radioactive sources. Aiming to assist in planning physical security of nuclear installations, the tool developed allows the detection simulation of individuals carrying radioactive sources through detectors installed at strategic points of the site. In addition, it is possible to detect and locate sources by handling portable detectors, operated by characters within the virtual environment. The results obtained show the behavior of the radiation detectors on continuous profile of radioactive sources, allowing calculate the dose rate at any position of the virtual environment. Thus, this work can assist in the training of security officers, as well as in evaluating the radiological safety of the nuclear site. (author)

  10. Privacy and Security: A Bibliography.

    Science.gov (United States)

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  11. Compliance with federal and state regulations regarding the emergency response plan and physical security plan at the Oregon State TRIGA reactor

    International Nuclear Information System (INIS)

    Johnson, A.G.; Ringle, J.C.; Anderson, T.V.

    1976-01-01

    Recent legislative actions within the State of Oregon have had a significant impact upon the OSU TRIGA Emergency Response Plan, and to a lesser extent upon the Physical Security Plan. These state imposed changes will be reviewed in light of existing federal requirements. With the upcoming acquisition of FLIP fuel in August 1976, NRC required several major changes to the existing Physical Security Plan. Within the limitations of public disclosure, these changes will be contrasted to the present plan. (author)

  12. Motion of particles of non-zero rest masses exterior to ...

    African Journals Online (AJOL)

    In this article, we extend the metric tensor exterior to astrophysically real or imaginary spherical distributions of mass whose tensor field varies with polar angle only; to derive equations of motion for test particles in this field. The time, radial, polar and azimuthal equations of motion for particles of non-zero rest masses moving ...

  13. Minimizing and predicting delamination of southern plywood in exterior exposure

    Science.gov (United States)

    Peter Koch

    1967-01-01

    Southern pine plywood is substantially all being manufactured with phenolic glue for exterior use. Because panels must not delaminate in service, a reliable predictor of glueline durability is required. Drawing on the experience of the Douglas-fir plywood industry, southern manufacutrers have adopted as a predictor the percentage of wood failure(% WF) observed in...

  14. Non-invasive nuclear device for communicating pressure inside a body to the exterior thereof

    International Nuclear Information System (INIS)

    Fleischmann, L.W.; Meyer, G.A.; Hittman, F.; Lyon, W.C.; Hayes, W.H. Jr.

    1979-01-01

    The need for a non-invasive technique for measuring the pressure in body cavities of animals or humans is recognized as highly desirable for continuous or intermittent monitoring of body conditions. The non-invasive nuclear device of the present invention is fully implantable and is fully capable of communicating pressure inside a body to the exterior to allow readout non-invasively. In its preferred form, the invention includes a housing for subcutaneous implantation with the radioactive source. An urging means such as a bellows is provided in the housing interior. The fluid pressure from a fluid pressure sensing device within the body is transmitted to the housing interior by means of a pressure-limiting fluid through a conduit. This causes the radioactive source to move against the force out of the initial or repose shielded relationship causing a proportional increase in pressure in the body portion being monitored. The radioactive output from the radioactive source corresponds to the magnitude of the pressure within the body. The housing may be securely mounted on a supporting portion of the body and the mounting serves as a radiation shield for the body. (JTA)

  15. Machine vision applications for physical security, quality assurance and personnel dosimetry

    International Nuclear Information System (INIS)

    Kar, S.; Shrikhande, S.V.; Suresh Babu, R.M.

    2016-01-01

    Machine vision is the technology used to provide imaging-based solutions to variety of applications, relevant to nuclear facilities and other industries. It uses computerized image analysis for automatic inspection, process control, object sorting, parts assembly, human identity authentication, and so on. In this article we discuss the in-house developed machine vision systems at EISD, BARC for three specific areas: Biometric recognition for physical security, visual inspection for QA of fuel pellets, and fast neutron personnel dosimetry. The advantages in using these systems include objective decision making, reduced man-rem, operational consistency, and capability of statistical quantitative analysis. (author)

  16. User's guide for evaluating physical security capabilities of nuclear facilities by the EASI method

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1977-06-01

    This handbook is a guide for evaluating physical security of nuclear facilities using the ''Estimate of Adversary Sequence Interruption (EASI)'' method and a hand-held programmable calculator. The handbook is intended for use by personnel at facilities where special nuclear materials are used, processed, or stored. It may also be used as a design aid for such facilities by potential licensees

  17. Structure-preserving geometric algorithms for plasma physics and beam physics

    Science.gov (United States)

    Qin, Hong

    2017-10-01

    Standard algorithms in the plasma physics and beam physics do not possess the long-term accuracy and fidelity required in the study of multi-scale dynamics, because they do not preserve the geometric structures of the physical systems, such as the local energy-momentum conservation, symplectic structure and gauge symmetry. As a result, numerical errors accumulate coherently with time and long-term simulation results are not reliable. To overcome this difficulty, since 2008 structure-preserving geometric algorithms have been developed. This new generation of algorithms utilizes advanced techniques, such as interpolating differential forms, canonical and non-canonical symplectic integrators, and finite element exterior calculus to guarantee gauge symmetry and charge conservation, and the conservation of energy-momentum and symplectic structure. It is our vision that future numerical capabilities in plasma physics and beam physics will be based on the structure-preserving geometric algorithms.

  18. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  19. Preliminary field evaluation of solid state cameras for security applications

    International Nuclear Information System (INIS)

    Murray, D.W.

    1987-01-01

    Recent developments in solid state imager technology have resulted in a series of compact, lightweight, all-solid-state closed circuit television (CCTV) cameras. Although it is widely known that the various solid state cameras have less light sensitivity and lower resolution than their vacuum tube counterparts, the potential for having a much longer Mean Time Between Failure (MTBF) for the all-solid-state cameras is generating considerable interest within the security community. Questions have been raised as to whether the newest and best of the solid state cameras are a viable alternative to the high maintenance vacuum tube cameras in exterior security applications. To help answer these questions, a series of tests were performed by Sandia National Laboratories at various test sites and under several lighting conditions. The results of these tests as well as a description of the test equipment, test sites, and procedures are presented in this report

  20. Code-Hopping Based Transmission Scheme for Wireless Physical-Layer Security

    Directory of Open Access Journals (Sweden)

    Liuguo Yin

    2018-01-01

    Full Text Available Due to the broadcast and time-varying natures of wireless channels, traditional communication systems that provide data encryption at the application layer suffer many challenges such as error diffusion. In this paper, we propose a code-hopping based secrecy transmission scheme that uses dynamic nonsystematic low-density parity-check (LDPC codes and automatic repeat-request (ARQ mechanism to jointly encode and encrypt source messages at the physical layer. In this scheme, secret keys at the transmitter and the legitimate receiver are generated dynamically upon the source messages that have been transmitted successfully. During the transmission, each source message is jointly encoded and encrypted by a parity-check matrix, which is dynamically selected from a set of LDPC matrices based on the shared dynamic secret key. As for the eavesdropper (Eve, the uncorrectable decoding errors prevent her from generating the same secret key as the legitimate parties. Thus she cannot select the correct LDPC matrix to recover the source message. We demonstrate that our scheme can be compatible with traditional cryptosystems and enhance the security without sacrificing the error-correction performance. Numerical results show that the bit error rate (BER of Eve approaches 0.5 as the number of transmitted source messages increases and the security gap of the system is small.

  1. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  2. Effects of Exterior Insulation on Moisture Performance of Wood-Frame Walls in the Pacific Northwest: Measurements and Hygrothermal Modeling

    Science.gov (United States)

    Samuel V. Glass; Borjen Yeh; Benjamin J. Herzog

    2016-01-01

    Continuous exterior insulation on above-grade walls is becoming more common in many parts of North America. It is generally accepted that exterior insulation provides advantages for energy performance, by reducing thermal bridging, and for moisture performance, by warming the wood structural members, thereby reducing the potential for wintertime moisture accumulation....

  3. Fabrication of DNA nanotubes with an array of exterior magnetic nanoparticles.

    Science.gov (United States)

    Rafati, Adele; Zarrabi, Ali; Gill, Pooria

    2017-10-01

    Described here a methodology for arraying of magnetic nanoparticles (MNPs) on the surface of DNA nanotubes (DNTs). Positioning of magnetic nanoparticles at exterior surface of DNTs were shaped after self-assembling of oligonucleotide staples within an M13mp18 DNA scaffold via an origami process. The staples were partially labeled with biotin to be arrayed at the surface of DNTs. Gel retardation assay of the DNTs carrying magnetic nanoparticles indicated a reversely behavioral electrophoretic movement in comparison to the nanotubes have been demonstrated previously. Also, high resolution transmission electron microscopy confirmed positioning magnetic nanoparticles at the exterior surface of DNTs, correctly. Ultrastructural characteristics of these DNA nanotubes using atomic force microscopy demonstrated topographic heights on their surfaces formed through positioning of magnetic nanoparticles outside the tubules. This nanoarchitecture would be potential for multiple arraying of nanoparticles that those be useful as functionalized chimeric nanocarriers for developing novel nanodrugs and nanobiosensors. Copyright © 2017. Published by Elsevier B.V.

  4. Obtaining Approximate Values of Exterior Orientation Elements of Multi-Intersection Images Using Particle Swarm Optimization

    Science.gov (United States)

    Li, X.; Li, S. W.

    2012-07-01

    In this paper, an efficient global optimization algorithm in the field of artificial intelligence, named Particle Swarm Optimization (PSO), is introduced into close range photogrammetric data processing. PSO can be applied to obtain the approximate values of exterior orientation elements under the condition that multi-intersection photography and a small portable plane control frame are used. PSO, put forward by an American social psychologist J. Kennedy and an electrical engineer R.C. Eberhart, is a stochastic global optimization method based on swarm intelligence, which was inspired by social behavior of bird flocking or fish schooling. The strategy of obtaining the approximate values of exterior orientation elements using PSO is as follows: in terms of image coordinate observed values and space coordinates of few control points, the equations of calculating the image coordinate residual errors can be given. The sum of absolute value of each image coordinate is minimized to be the objective function. The difference between image coordinate observed value and the image coordinate computed through collinear condition equation is defined as the image coordinate residual error. Firstly a gross area of exterior orientation elements is given, and then the adjustment of other parameters is made to get the particles fly in the gross area. After iterative computation for certain times, the satisfied approximate values of exterior orientation elements are obtained. By doing so, the procedures like positioning and measuring space control points in close range photogrammetry can be avoided. Obviously, this method can improve the surveying efficiency greatly and at the same time can decrease the surveying cost. And during such a process, only one small portable control frame with a couple of control points is employed, and there are no strict requirements for the space distribution of control points. In order to verify the effectiveness of this algorithm, two experiments are

  5. OBTAINING APPROXIMATE VALUES OF EXTERIOR ORIENTATION ELEMENTS OF MULTI-INTERSECTION IMAGES USING PARTICLE SWARM OPTIMIZATION

    Directory of Open Access Journals (Sweden)

    X. Li

    2012-07-01

    Full Text Available In this paper, an efficient global optimization algorithm in the field of artificial intelligence, named Particle Swarm Optimization (PSO, is introduced into close range photogrammetric data processing. PSO can be applied to obtain the approximate values of exterior orientation elements under the condition that multi-intersection photography and a small portable plane control frame are used. PSO, put forward by an American social psychologist J. Kennedy and an electrical engineer R.C. Eberhart, is a stochastic global optimization method based on swarm intelligence, which was inspired by social behavior of bird flocking or fish schooling. The strategy of obtaining the approximate values of exterior orientation elements using PSO is as follows: in terms of image coordinate observed values and space coordinates of few control points, the equations of calculating the image coordinate residual errors can be given. The sum of absolute value of each image coordinate is minimized to be the objective function. The difference between image coordinate observed value and the image coordinate computed through collinear condition equation is defined as the image coordinate residual error. Firstly a gross area of exterior orientation elements is given, and then the adjustment of other parameters is made to get the particles fly in the gross area. After iterative computation for certain times, the satisfied approximate values of exterior orientation elements are obtained. By doing so, the procedures like positioning and measuring space control points in close range photogrammetry can be avoided. Obviously, this method can improve the surveying efficiency greatly and at the same time can decrease the surveying cost. And during such a process, only one small portable control frame with a couple of control points is employed, and there are no strict requirements for the space distribution of control points. In order to verify the effectiveness of this algorithm

  6. Game based cyber security training: are serious games suitable for cyber security training?

    OpenAIRE

    Hendrix, Maurice; Al-Sherbaz, Ali; Victoria, Bloom

    2016-01-01

    Security research and training is attracting a lot of investment and interest from governments and the private sector. Most efforts have focused on physical security, while cyber security or digital security has been given less importance. With recent high-profile attacks it has become clear that training in cyber security is needed. Serious Games have the capability to be effective tools for public engagement and behavioural change and role play games, are already used by security profession...

  7. SOR/83-77, Physical Security Regulations

    International Nuclear Information System (INIS)

    1983-01-01

    These Regulations establish and require the maintenance of security systems, equipment and procedures to implement Canada's international obligations regarding security at those nuclear facilities. The Regulations, which determine the different areas in a nuclear facility, provide for the establishment of security barriers around the ''protected areas'' occupied by facilities and prescribe that the licensees (operators) are required to keep the facilities for which they hold a licence under constant surveillance. They must also make arrangements for a response force - a local, provincial or federal police force detachment or similar force - to provide assistance where necessary. No person may enter a protected area without written authorization from the licensee concerned. Inspectors appointed under the Atomic Energy Control Regulations or designated under an agreement between Canada and the IAEA may be granted an authorization to enter such areas to discharge their duties. The Regulations have been amended by SOR/84-81 of 12 January 1988 to add certain requirements concerning documentary evidence and the duties of the board; by SOR/85-1016 of 25 October 1985 to revise the definition of response force and provide other clarifications; by SOR/91-585 of 10 October 1991 to clarify wording in French. (NEA)

  8. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    Science.gov (United States)

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  9. The effect of lighting exterior and interior design

    OpenAIRE

    Sandeva, Vaska; Despot, Katerina

    2017-01-01

    Light, whether natural or artificial is a very important element in interior and exterior design. It actually helps us to see color because color is visible to our eye because the substances of which was obtained reflect wavelengths of light. Light as an element of design influences other elements. It can make the space large or small, showy and bright or dark and unpleasant. Places that are well-lit with clean, clear light make the space seem larger, while the fading light and shadows ...

  10. New exact solution for the exterior gravitational field of a charged spinning mass

    International Nuclear Information System (INIS)

    Chamorro, A.; Manko, V.S.; Denisova, T.E.

    1991-01-01

    An exact asymptotically flat solution of the Einstein-Maxwell equations describing the exterior gravitational field of a charged rotating axisymmetric mass possessing an arbitrary set of multipole moments is presented explicitly

  11. Source amplitudes for active exterior cloaking

    International Nuclear Information System (INIS)

    Norris, Andrew N; Amirkulova, Feruza A; Parnell, William J

    2012-01-01

    The active cloak comprises a discrete set of multipole sources that destructively interfere with an incident time harmonic scalar wave to produce zero total field over a finite spatial region. For a given number of sources and their positions in two dimensions it is shown that the multipole amplitudes can be expressed as infinite sums of the coefficients of the incident wave decomposed into regular Bessel functions. The field generated by the active sources vanishes in the infinite region exterior to a set of circles defined by the relative positions of the sources. The results provide a direct solution to the inverse problem of determining the source amplitudes. They also define a broad class of non-radiating discrete sources. (paper)

  12. GATEWAY Demonstrations: Exterior LED Lighting Projects at Princeton University

    Energy Technology Data Exchange (ETDEWEB)

    Davis, Robert G. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Evans, WIlliam E. [Princeton Univ., NJ (United States); Murphy, Arthur [Princeton Univ., NJ (United States); Perrin, Tess [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2015-10-30

    This report focuses on four exterior solid-state lighting projects that have been completed at Princeton since 2008, when the University adopted a comprehensive sustainability plan. Through these initial projects – which include a parking garage, a pedestrian path, and two parking lot installations – the school’s facilities engineering staff learned important lessons about SSL technology and gained experience in dealing with the rapidly changing landscape of lighting manufacturers and their suppliers.

  13. La política exterior de Estados Unidos: una visión desde la periferia

    OpenAIRE

    Andrade A., Pablo

    2004-01-01

    Este artículo trata explica la forma como la política exterior de Estados Unidos persigue dos objetivos interrelacionados: primero, en el corto y mediano plazo consolidar y aumentar su predominio militar a nivel global y, segundo, en el largo plazo institucionalizar ese dominio en un orden político sumamente difícil –o costoso- de transformar. Así, la política exterior estadounidense hacia América Latina y, sobre todo, en relación con la Región Andina y más específicamente con el Ecuador debe...

  14. Process Security in Chemical Engineering Education

    Science.gov (United States)

    Piluso, Cristina; Uygun, Korkut; Huang, Yinlun; Lou, Helen H.

    2005-01-01

    The threats of terrorism have greatly alerted the chemical process industries to assure plant security at all levels: infrastructure-improvement-focused physical security, information-protection-focused cyber security, and design-and-operation-improvement-focused process security. While developing effective plant security methods and technologies…

  15. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  16. Verbal abuse and physical assault in the emergency department: Rates of violence, perceptions of safety, and attitudes towards security.

    Science.gov (United States)

    Partridge, Bradley; Affleck, Julia

    2017-08-01

    Emergency Department (ED) workers are prone to occupational violence, however the extent and impact of this may not be evenly felt across all roles in the ED. Explore: 1) the rate of verbal abuse and physical assaults experienced by ED staff, 2) perceptions of safety, 3) attitudes towards security officers, and 4) formal reporting of incidents. 330 ED workers were surveyed at four public hospitals in one metropolitan health service district in Queensland, Australia, including 179 nurses, 83 medical staff, 44 administration staff, 14 allied health, and 9 operational. Nurses were more likely to have been physically assaulted in the last six months and were less likely to feel safe. Most ED staff across all roles experienced verbal abuse. Nurses were better than medical staff at reporting instances of occupational violence although overall reporting across all roles was low. Staff who thought that security officers respond to incidents quickly and are a visible presence in the ED were more likely to feel safe in the ED. Workers in the ED, particularly nurses, experience high rates of verbal abuse and physical aggression and there may be a case for having designated security guards in the ED. Copyright © 2017 College of Emergency Nursing Australasia. Published by Elsevier Ltd. All rights reserved.

  17. Multi-point observations of Ion Dispersions near the Exterior Cusp with Cluster

    Science.gov (United States)

    Escoubet, C.-Philippe; Grison, Benjamin; Berchem, Jean; Trattner, Kralheinz; Pitout, Frederic; Richard, Robert; Taylor, Matt; Soucek, Jan; Laakso, Harri; Masson, Arnaud; Dunlop, Malcolm; Dandouras, Iannis; Reme, Henri; Fazakerley, Andrew; Daly, Patrick

    2014-05-01

    The exterior cusp is the most external region of the polar magnetosphere in direct contact with the plasma and the magnetic field from the solar wind. Unlike the rest of the magnetopause surface, the exterior cusp is a singular region with small and turbulent magnetic field and where large entry of plasma from solar origin takes place. The main process that injects solar wind plasma into the polar cusp is now generally accepted to be magnetic reconnection. Depending on the IMF direction, this process will take place equatorward (for IMF southward), poleward (for IMF northward) or on the dusk or dawn sides (for IMF azimuthal) of the cusp. We report a Cluster crossing on 5 January 2002 near the exterior cusp on the southern dusk side. The IMF was mainly azimuthal (IMF-By around -5 nT), the solar wind speed lower than usual around 280 km/s and the density around 5 cm-3. The four Cluster spacecraft were still in the "magnetotail" configuration with two perfect tetrahedra of 2000 km around apogee and turning into an elongated configuration near the magnetopause. C4 was the first spacecraft to enter the cusp around 19:52:04 UT, followed by C2 at 19:52:35 UT, C1 at 19:54:24 UT and C3 at 20:13:15 UT. C4 and C1 observed two ion energy dispersions at 20:10 UT and 20:40 UT and C3 at 20:35 UT and 21:15 UT. Using the time of flight technique on the upgoing and downgoing ions in the dispersions, we obtain an altitude of the sources of these ions between 14 and 20 RE. Using Tsyganenko model, these sources are located on the dusk flank, past the terminator. In addition, before entering the cusp, the magnetopause crossing was characterized by a large shear in By and bipolar plasma flows, suggesting that reconnection was taking place near the exterior cusp. We will discuss the extent of the reconnection line along the flank of the magnetopause based on these observations.

  18. Numerical Simulation of Antennae by Discrete Exterior Calculus

    International Nuclear Information System (INIS)

    Xie Zheng; Ye Zheng; Ma Yujie

    2009-01-01

    Numerical simulation of antennae is a topic in computational electromagnetism, which is concerned with the numerical study of Maxwell equations. By discrete exterior calculus and the lattice gauge theory with coefficient R, we obtain the Bianchi identity on prism lattice. By defining an inner product of discrete differential forms, we derive the source equation and continuity equation. Those equations compose the discrete Maxwell equations in vacuum case on discrete manifold, which are implemented on Java development platform to simulate the Gaussian pulse radiation on antennaes. (electromagnetism, optics, acoustics, heat transfer, classical mechanics, and fluid dynamics)

  19. Local density of states in two-dimensional topological superconductors under a magnetic field: Signature of an exterior Majorana bound state

    Science.gov (United States)

    Suzuki, Shu-Ichiro; Kawaguchi, Yuki; Tanaka, Yukio

    2018-04-01

    We study quasiparticle states on a surface of a topological insulator (TI) with proximity-induced superconductivity under an external magnetic field. An applied magnetic field creates two Majorana bound states: a vortex Majorana state localized inside a vortex core and an exterior Majorana state localized along a circle centered at the vortex core. We calculate the spin-resolved local density of states (LDOS) and demonstrate that the shrinking of the radius of the exterior Majorana state, predicted in R. S. Akzyanov et al., Phys. Rev. B 94, 125428 (2016), 10.1103/PhysRevB.94.125428, under a strong magnetic field can be seen in LDOS without smeared out by nonzero-energy states. The spin-resolved LDOS further reveals that the spin of the exterior Majorana state is strongly spin-polarized. Accordingly, the induced odd-frequency spin-triplet pairs are found to be spin-polarized as well. In order to detect the exterior Majorana states, however, the Fermi energy should be closed to the Dirac point to avoid contributions from continuum levels. We also study a different two-dimensional topological-superconducting system where a two-dimensional electron gas with the spin-orbit coupling is sandwiched between an s -wave superconductor and a ferromagnetic insulator. We show that the radius of an exterior Majorana state can be tuned by an applied magnetic field. However, on the contrary to the results at a TI surface, neither the exterior Majorana state nor the induced odd-frequency spin-triplet pairs are spin-polarized. We conclude that the spin polarization of the Majorana state is attributed to the spin-polarized Landau level, which is characteristic for systems with the Dirac-like dispersion.

  20. Cartan for beginners differential geometry via moving frames and exterior differential systems

    CERN Document Server

    Ivey, Thomas A

    2016-01-01

    Two central aspects of Cartan's approach to differential geometry are the theory of exterior differential systems (EDS) and the method of moving frames. This book presents thorough and modern treatments of both subjects, including their applications to both classic and contemporary problems in geometry. It begins with the classical differential geometry of surfaces and basic Riemannian geometry in the language of moving frames, along with an elementary introduction to exterior differential systems. Key concepts are developed incrementally, with motivating examples leading to definitions, theorems, and proofs. Once the basics of the methods are established, the authors develop applications and advanced topics. One notable application is to complex algebraic geometry, where they expand and update important results from projective differential geometry. As well, the book features an introduction to G-structures and a treatment of the theory of connections. The techniques of EDS are also applied to obtain explici...

  1. Análisis del yeso empleado en revestimientos exteriores mediante técnicas geológicas

    OpenAIRE

    Sanz Arauz, David

    2011-01-01

    El presente trabajo se centra en el yeso fabricado en hornos tradicionales y empleado históricamente para la ejecución de revestimientos exteriores. Para ello se realiza un estudio documental y un trabajo experimental mediante técnicas geológicas. En el estudio documental se ha pasado revisión a la historia del yeso como material de construcción con especial atención a su empleo en revestimientos exteriores, desde la antigüedad hasta mitad del siglo XX, momento en el que la industrializaci...

  2. Análisis del yeso empleado en revestimientos exteriores mediante técnicas geológicas

    OpenAIRE

    Sanz Arauz, David

    2009-01-01

    El presente trabajo se centra en el yeso fabricado en hornos tradicionales y empleado históricamente para la ejecución de revestimientos exteriores. Para ello se realiza un estudio documental y un trabajo experimental mediante técnicas geológicas. En el estudio documental se ha pasado revisión a la historia del yeso como material de construcción con especial atención a su empleo en revestimientos exteriores, desde la antigüedad hasta mitad del siglo XX, momento en el que la industrializaci...

  3. Overview of security culture

    International Nuclear Information System (INIS)

    Matulanya, M. A.

    2014-04-01

    Nuclear Security culture concept has been aggressively promoted over the past several years as a tool to improve the physical protection of the nuclear and radioactive materials due to growing threats of catastrophic terrorism and other new security challenges. It is obvious that, the scope of nuclear security and the associated cultures need to be extended beyond the traditional task of protecting weapons-usable materials. The role of IAEA is to strengthen the nuclear security framework globally and in leading the coordination of international activities in this field. Therefore all governments should work closely with the IAEA to take stronger measures to ensure the physical protection, the safety and security of the nuclear and radioactive materials. In the effort to reflect this new realities and concerns, the IAEA in 2008 came up with the document, the Nuclear Security Culture, Nuclear Security Series No. 7, Implementing Guide to the member states which urged every member state to take appropriate measures to promote security culture with respect to nuclear and radioactive materials. The document depicted this cultural approach as the way to protect individual, society and the environment. Among other things, the document defined nuclear security culture as characteristics and attitudes in organizations and of individuals which establishes that, nuclear security issues receives attention warranted by their significance. (au)

  4. A Development Framework for Software Security in Nuclear Safety Systems: Integrating Secure Development and System Security Activities

    Energy Technology Data Exchange (ETDEWEB)

    Park, Jaekwan; Suh, Yongsuk [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-02-15

    The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

  5. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, and physical protection. This report presents in more detail the knowledge and development needs as well as future development potentials seen in the security area. (orig.)

  6. Discrete exterior calculus discretization of incompressible Navier–Stokes equations over surface simplicial meshes

    KAUST Repository

    Mohamed, Mamdouh S.; Hirani, Anil N.; Samtaney, Ravi

    2016-01-01

    A conservative discretization of incompressible Navier–Stokes equations is developed based on discrete exterior calculus (DEC). A distinguishing feature of our method is the use of an algebraic discretization of the interior product operator and a

  7. An Innovative RFID-Based Solution to Secure Parking Spots for Physically Challenged

    Directory of Open Access Journals (Sweden)

    Sami Miniaoui

    2016-05-01

    Full Text Available Using RFID Technology is increasingly integrated in our daily life. We are presenting in this paper the secured parking spots for physically challenged -SPSPC- system implementing the RFID technology for managing parking slots of physically challenged. We demonstrated using scenarios (car with tag, car with expired date tag, car without tag that the -SPSPC- system is able to recognize not only cars equipped with tag -then send accordingly welcoming SMS -but also cars without tags by checking with a step tag fixed in the wall. Operational mode of the -SPSPC- system is illustrated as well as main components, methods, snippets of code and interfaces are presented and commented. In addition, we demonstrated how the -SPSPC- system is providing the tracking of people committing repetitively these violations -by reporting them to the authorities- and generating statistics on parking occupancy rates helping in providing sufficient slots.

  8. Iteratively-coupled propagating exterior complex scaling method for electron-hydrogen collisions

    International Nuclear Information System (INIS)

    Bartlett, Philip L; Stelbovics, Andris T; Bray, Igor

    2004-01-01

    A newly-derived iterative coupling procedure for the propagating exterior complex scaling (PECS) method is used to efficiently calculate the electron-impact wavefunctions for atomic hydrogen. An overview of this method is given along with methods for extracting scattering cross sections. Differential scattering cross sections at 30 eV are presented for the electron-impact excitation to the n = 1, 2, 3 and 4 final states, for both PECS and convergent close coupling (CCC), which are in excellent agreement with each other and with experiment. PECS results are presented at 27.2 eV and 30 eV for symmetric and asymmetric energy-sharing triple differential cross sections, which are in excellent agreement with CCC and exterior complex scaling calculations, and with experimental data. At these intermediate energies, the efficiency of the PECS method with iterative coupling has allowed highly accurate partial-wave solutions of the full Schroedinger equation, for L ≤ 50 and a large number of coupled angular momentum states, to be obtained with minimal computing resources. (letter to the editor)

  9. Índices de valor unitario y quantum del comercio exterior colombiano

    Directory of Open Access Journals (Sweden)

    Aarón Garavito

    2014-01-01

    Full Text Available Los índices de valor unitario y quantum de las importaciones y exportaciones son una herramienta importante para el análisis del comportamiento del comercio exterior de un país y su repercusión sobre la economía nacional. Estos indicadores se usan principalmente como insumo para el estudio de los términos de intercambio, la competitividad externa y los efectos en la inflación interna de cambios en los precios internacionales. Dada su importancia, este artículo presenta la estimación mensual de los índices encadenados de precios y cantida¬des del comercio exterior colombiano con base en estadísticas de aduanas. La metodología propuesta sigue las reco¬mendaciones de los organismos internacionales (FMI, CAN, EUROSTAT con el fin de afrontar los problemas de agregación y volatilidad propios de la información utilizada. Se obtienen resultados tales como la descomposición en efecto precio y cantidad del valor de las importaciones y exportaciones y los términos de intercambio bilaterales.

  10. Índices de valor unitario y quantum del comercio exterior colombiano

    Directory of Open Access Journals (Sweden)

    Aarón Garavito

    2014-01-01

    Full Text Available Los índices de valor unitario y quantum de las importaciones y exportaciones son una herramienta importante para el análisis del comportamiento del comercio exterior de un país y su repercusión sobre la economía nacional. Estos indicadores se usan principalmente como insumo para el estudio de los términos de intercambio, la competitividad externa y los efectos en la inflación interna de cambios en los precios internacionales. Dada su importancia, este artículo presenta la estimación mensual de los índices encadenados de precios y cantidades del comercio exterior colombiano con base en estadísticas de aduanas. La metodología propuesta sigue las recomendaciones de los organismos internacionales (FMI, CAN, EUROSTAT con el fin de afrontar los problemas de agregación y volatilidad propios de la información utilizada. Se obtienen resultados tales como la descomposición en efecto precio y cantidad del valor de las importaciones y exportaciones y los términos de intercambio bilaterales

  11. Project Overcoat - An Exploration of Exterior Insulation Strategies for 1-1/2-Story Roof Applications in Cold Climates

    Energy Technology Data Exchange (ETDEWEB)

    Ojczyk, Cindy [NorthernSTAR Building America Partnership, St. Paul, MN (United States); Mosiman, Garrett [NorthernSTAR Building America Partnership, St. Paul, MN (United States); Huelman, Pat [NorthernSTAR Building America Partnership, St. Paul, MN (United States); Schirber, Tom [NorthernSTAR Building America Partnership, St. Paul, MN (United States); Yost, Peter [NorthernSTAR Building America Partnership, St. Paul, MN (United States); Murry, Tessa [NorthernSTAR Building America Partnership, St. Paul, MN (United States)

    2013-04-01

    The development of an alternative method to interior-applied insulation strategies or exterior applied 'band-aids' such as heat tapes and ice belts may help reduce energy needs of millions of 1-1/2 story homes while reducing the risk of ice dam formation. A potential strategy for energy improvement of the roof is borrowed from new construction best practices: Here an 'overcoat' of a continuous air, moisture, and thermal barrier is applied on the outside of the roof structure for improved overall performance. The continuous insulation of this approach facilitates a reduction in thermal bridging which could further reduce energy consumption and bring existing homes closer to meeting the Building America goals for energy reduction. Research favors an exterior approach to deep energy retrofits and ice dam prevention in existing homes. The greatest amount of research focuses on whole house deep energy retrofits leaving a void in roof-only applications. The research is also void of data supporting the hygrothermal performance, durability, constructability, and cost of roof-only exterior overcoat strategies. Yet, contractors interviewed for this report indicate an understanding that exterior approaches are most promising for mitigating ice dams and energy loss and are able to sell these strategies to homeowners.

  12. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  13. Human security from paradigm shift to operationalisation: job description for a human security worker

    NARCIS (Netherlands)

    Glasius, M.

    2008-01-01

    This article shows how human security has functioned as both a paradigm-shifting and a bridging concept, with its most significant implications being, first, the shift from a focus on state security to one on human rights, and, second, the indivisibility of physical and material security. The

  14. Glossário terminológico de comércio exterior chinês/português

    OpenAIRE

    Yinping Liu

    2006-01-01

    A dissertação \\"Glossário Terminológico de Comércio Exterior\\" Chinês/ Português/Chinês tem por objetivo elaborar uma pesquisa terminográfica bilíngüe das unidades de conhecimento especializado relacionadas à área de comércio exterior relevantes para a relação Brasil-China, por meio da organização dessas unidades em um glossário terminológico. Inicialmente faz-se uma revisão da história cultural e comercial entre o mundo lusófono e o chinês com o objetivo de justificar a demanda de um trabalh...

  15. Soft Power de Argentina : La política exterior del gobierno de Néstor Kirchner

    OpenAIRE

    Bravi, Bárbara

    2016-01-01

    La presente tesis tiene como punto de partida el interés que despertase una arista de estudio de las relaciones internacionales, más específicamente en el campo de la política exterior, y que tiene que ver con el poder simbólico. Este enfoque, como veremos más adelante, tiene de particular que no sólo aborda la praxis de la política exterior, con esto nos referimos a los hechos, o los resultados; sino que se enfoca en un tiempo anterior. De allí que no sólo importan los efectos y la...

  16. The implementation of nuclear security program and the improvement of physical protection in Indonesia: progress and challenges

    International Nuclear Information System (INIS)

    Khairul

    2009-01-01

    facilities. The nuclear material and its installation is potential target in the facilities so that they needed physical protection measures in prevention and protection of nuclear material and radioactive source against theft and sabotage. The implementation of physical protection of nuclear material and radioactive sources in Indonesia complied with the international instruments such as the Convention of the Physical Protection on Nuclear Material and Facilities, amended on July 2005, and INFCIRC/225/Rev. 4, (corrected), the physical protection of nuclear material and nuclear facilities, June 1999. The application of nuclear energy for power program generation involve in the management of nuclear materials and other radioactive substance. According to international regulation and convention, an effective physical protection system is needed to protect nuclear materials and its facilities against theft and sabotage for both non-proliferation and radiation safety purpose. Further to implementation of the IAEA nuclear security program in the region, Indonesia received two nuclear security services, IPPAS and INSServ mission. Based on the expert mission recommendation, therefore Indonesia improved their physical protection system on nuclear material and facilities against theft and sabotage. One thing that should be considered by the Government of Indonesia is human resource development programmes. So far, some effort has developed to enhance the knowledge of the employee who deals with nuclear material and radioactive substances. It still needed to increase the awareness in particular to personal and other related agencies as well. The Department of Energy's National Nuclear Security Administration discussed security assistance with Indonesia's National Nuclear Energy Agency, BATAN. These upgrades not only reduced the threat of theft at the three research reactors, but also provided local physical protection expertise to use during the concept, design, and operation of

  17. Physical-layer security analysis of PSK quantum-noise randomized cipher in optically amplified links

    Science.gov (United States)

    Jiao, Haisong; Pu, Tao; Xiang, Peng; Zheng, Jilin; Fang, Tao; Zhu, Huatao

    2017-08-01

    The quantitative security of quantum-noise randomized cipher (QNRC) in optically amplified links is analyzed from the perspective of physical-layer advantage. Establishing the wire-tap channel models for both key and data, we derive the general expressions of secrecy capacities for the key against ciphertext-only attack and known-plaintext attack, and that for the data, which serve as the basic performance metrics. Further, the maximal achievable secrecy rate of the system is proposed, under which secrecy of both the key and data is guaranteed. Based on the same framework, the secrecy capacities of various cases can be assessed and compared. The results indicate perfect secrecy is potentially achievable for data transmission, and an elementary principle of setting proper number of photons and bases is given to ensure the maximal data secrecy capacity. But the key security is asymptotically perfect, which tends to be the main constraint of systemic maximal secrecy rate. Moreover, by adopting cascaded optical amplification, QNRC can realize long-haul transmission with secure rate up to Gb/s, which is orders of magnitude higher than the perfect secrecy rates of other encryption systems.

  18. BWR fuel assembly having fuel rod spacers axially positioned by exterior springs

    International Nuclear Information System (INIS)

    Taleyarkhan, R.P.

    1988-01-01

    In a fuel assembly having spaced fuel rods, an outer hollow tubular flow channel surrounding the fuel rods so as to direct flow of coolant/moderator fluid there-along, and at least one spacer being disposed along the channel and about the fuel rods so as to maintain them in side-by-side spaced relationship, an arrangement for disposing the spacer in a desired axial position along the fuel rods is described comprising: yieldably resilient springs disposed between an interior side of the outer channel and an exterior side of the spacer. The springs have an inherent spring bias directed away from the exterior sides of the spacers and toward the interior side of the channel such that by contact with the channel and spacer the springs assume states in which they are deflected away from the channel interior side so as to exert sufficient compressive contacting force thereon to maintain the spacer substantially stationary in the desired axial position along the fuel rods

  19. Database Security: A Historical Perspective

    OpenAIRE

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 ye...

  20. Importance of location and exterior of city hotels as elements of guest satisfaction

    Directory of Open Access Journals (Sweden)

    Tepavčević Jelena

    2016-01-01

    Full Text Available Business practices and attitudes of tourists show that hospitality represents the primary factor in the development of urban tourism. It is considered that, besides the exclusive appearance, there is no business success for hotel properties without a proper location. It is known that a typical tourist would like to be close enough to tourist attractions, to be able to reach them on foot. This paper deals with the importance of location and exterior of urban hotels on guests decision on the selection and overall satisfaction with hotel products. The survey was conducted in the hotels two largest urban centers in Serbia (Belgrade and Novi Sad. The aim of the research is an insight into the real impact of location and exterior when assessing the guest satisfaction. Descriptive statistical analysis, t-test and regression analysis were used for statistical data processing.

  1. Cloud Infrastructure Security

    OpenAIRE

    Velev , Dimiter; Zlateva , Plamena

    2010-01-01

    Part 4: Security for Clouds; International audience; Cloud computing can help companies accomplish more by eliminating the physical bonds between an IT infrastructure and its users. Users can purchase services from a cloud environment that could allow them to save money and focus on their core business. At the same time certain concerns have emerged as potential barriers to rapid adoption of cloud services such as security, privacy and reliability. Usually the information security professiona...

  2. Detection of Watermelon Seeds Exterior Quality based on Machine Vision

    OpenAIRE

    Xiai Chen; Ling Wang; Wenquan Chen; Yanfeng Gao

    2013-01-01

    To investigate the detection of watermelon seeds exterior quality, a machine vision system based on least square support vector machine was developed. Appearance characteristics of watermelon seeds included area, perimeter, roughness, minimum enclosing rectangle and solidity were calculated by image analysis after image preprocess.The broken seeds, normal seeds and high-quality seeds were distinguished by least square support vector machine optimized by genetic algorithm. Compared to the grid...

  3. La incidencia del totalitarismo en la configuración de una política exterior aislacionista

    OpenAIRE

    Patiño García, Andres Felipe

    2016-01-01

    El presente estudio de caso consiste en identificar la incidencia del totalitarismo en la configuración de una política exterior aislacionista, tomando los casos del Tercer Reich y la República Democrática Popular de Corea; se trata de inferir si la incidencia de un régimen totalitario en la configuración de una política exterior aislacionista es directa, en tanto que responde al interés nacional del Estado con el fin de implementar reformas y actos que conlleven al aislamiento de la nación d...

  4. Deformation of the exterior algebra and the GLq (r, included in) algebra

    International Nuclear Information System (INIS)

    El Hassouni, A.; Hassouni, Y.; Zakkari, M.

    1993-06-01

    The deformation of the associative algebra of exterior forms is performed. This operation leads to a Y.B. equation. Its relation with the braid group B n-1 is analyzed. The correspondence of this deformation with the GL q (r, included in) algebra is developed. (author). 9 refs

  5. Secure estimation, control and optimization of uncertain cyber-physical systems with applications to power networks

    Science.gov (United States)

    Taha, Ahmad Fayez

    Transportation networks, wearable devices, energy systems, and the book you are reading now are all ubiquitous cyber-physical systems (CPS). These inherently uncertain systems combine physical phenomena with communication, data processing, control and optimization. Many CPSs are controlled and monitored by real-time control systems that use communication networks to transmit and receive data from systems modeled by physical processes. Existing studies have addressed a breadth of challenges related to the design of CPSs. However, there is a lack of studies on uncertain CPSs subject to dynamic unknown inputs and cyber-attacks---an artifact of the insertion of communication networks and the growing complexity of CPSs. The objective of this dissertation is to create secure, computational foundations for uncertain CPSs by establishing a framework to control, estimate and optimize the operation of these systems. With major emphasis on power networks, the dissertation deals with the design of secure computational methods for uncertain CPSs, focusing on three crucial issues---(1) cyber-security and risk-mitigation, (2) network-induced time-delays and perturbations and (3) the encompassed extreme time-scales. The dissertation consists of four parts. In the first part, we investigate dynamic state estimation (DSE) methods and rigorously examine the strengths and weaknesses of the proposed routines under dynamic attack-vectors and unknown inputs. In the second part, and utilizing high-frequency measurements in smart grids and the developed DSE methods in the first part, we present a risk mitigation strategy that minimizes the encountered threat levels, while ensuring the continual observability of the system through available, safe measurements. The developed methods in the first two parts rely on the assumption that the uncertain CPS is not experiencing time-delays, an assumption that might fail under certain conditions. To overcome this challenge, networked unknown input

  6. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  7. La política exterior de América Latina hacia Siria y Líbano frente a los nuevos escenarios regionales

    Directory of Open Access Journals (Sweden)

    Fernando Bazán

    2012-01-01

    Full Text Available La actual política exterior de los países latinoamericanos hacia Siria y Líbano responde a condicionantes regionales y a los cambios político-económicos donde el rol de EE.UU. como potencia hegemónica en la región está en declive. Sin embargo no es posible identificar una única política exterior latinoamericana hacia Siria y Líbano, ya que los diferentes Estados latinoamericanos adoptaron diversos objetivos y estrategias adecuadas a sus propias necesidades internas. Aunque América del Sur participa de las iniciativas América del Sur-Países Árabes (ASPA, la región no ha podido establecer vínculos políticos significativos y los pocos logros alcanzados responden más a iniciativas particulares de los Estados que a una estrategia continental. El presente trabajo analiza tres modelos paradigmáticos: Brasil, como ejemplo de una política exterior orientada al intercambio comercial pero con una fuerte impronta para posicionarse como potencia emergente internacional; Venezuela, como referente de una política exterior que establece alianzas con Estados adversarios de EE.UU. y finalmente México, con una estrategia de inserción económica sin mayores aspiraciones debido a la influencia norteamericana en su política exterior general.

  8. 10 CFR 95.33 - Security education.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  9. 10 CFR 39.71 - Security.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Security. 39.71 Section 39.71 Energy NUCLEAR REGULATORY COMMISSION LICENSES AND RADIATION SAFETY REQUIREMENTS FOR WELL LOGGING Security, Records, Notifications § 39.71 Security. (a) A logging supervisor must be physically present at a temporary jobsite whenever...

  10. Diffusion phenomenon for linear dissipative wave equations in an exterior domain

    Science.gov (United States)

    Ikehata, Ryo

    Under the general condition of the initial data, we will derive the crucial estimates which imply the diffusion phenomenon for the dissipative linear wave equations in an exterior domain. In order to derive the diffusion phenomenon for dissipative wave equations, the time integral method which was developed by Ikehata and Matsuyama (Sci. Math. Japon. 55 (2002) 33) plays an effective role.

  11. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  12. Conceptual foundation for measures of physical function and behavioral health function for Social Security work disability evaluation.

    Science.gov (United States)

    Marfeo, Elizabeth E; Haley, Stephen M; Jette, Alan M; Eisen, Susan V; Ni, Pengsheng; Bogusz, Kara; Meterko, Mark; McDonough, Christine M; Chan, Leighton; Brandt, Diane E; Rasch, Elizabeth K

    2013-09-01

    Physical and mental impairments represent the 2 largest health condition categories for which workers receive Social Security disability benefits. Comprehensive assessment of physical and mental impairments should include aspects beyond medical conditions such as a person's underlying capabilities as well as activity demands relevant to the context of work. The objective of this article is to describe the initial conceptual stages of developing new measurement instruments of behavioral health and physical functioning relevant for Social Security work disability evaluation purposes. To outline a clear conceptualization of the constructs to be measured, 2 content models were developed using structured and informal qualitative approaches. We performed a structured literature review focusing on work disability and incorporating aspects of the International Classification of Functioning, Disability and Health as a unifying taxonomy for framework development. Expert interviews provided advice and consultation to enhance face validity of the resulting content models. The content model for work-related behavioral health function identifies 5 major domains: (1) behavior control, (2) basic interactions, (3) temperament and personality, (4) adaptability, and (5) workplace behaviors. The content model describing physical functioning includes 3 domains: (1) changing and maintaining body position, (2) whole-body mobility, and (3) carrying, moving, and handling objects. These content models informed subsequent measurement properties including item development and measurement scale construction, and provided conceptual coherence guiding future empirical inquiry. The proposed measurement approaches show promise to comprehensively and systematically assess physical and behavioral health functioning relevant to work. Copyright © 2013 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  13. Solution of Einstein's Geometrical Gravitational Field Equations Exterior to Astrophysically Real or Hypothetical Time Varying Distributions of Mass within Regions of Spherical Geometry

    Directory of Open Access Journals (Sweden)

    Chifu E. N.

    2009-07-01

    Full Text Available Here, we present a profound and complete analytical solution to Einstein’s gravitational field equations exterior to astrophysically real or hypothetical time varying distribu- tions of mass or pressure within regions of spherical geometry. The single arbitrary function f in our proposed exterior metric tensor and constructed field equations makes our method unique, mathematically less combersome and astrophysically satisfactory. The obtained solution of Einstein’s gravitational field equations tends out to be a gen- eralization of Newton’s gravitational scalar potential exterior to the spherical mass or pressure distribution under consideration

  14. Temporary physical protection systems

    International Nuclear Information System (INIS)

    Williams, J.D.; Gangel, D.J.; Madsen, R.W.

    1991-01-01

    Terrorism and other aspects of world political instability have created a high demand for temporary physical protection systems within the nuclear materials management community. They can be used when vehicles carrying important assets are away from their permanent fixed site location, around areas where experiments are being temporarily conducted, around construction areas and one portions of a fixed site physical security system which is temporarily inoperable. Physical security systems can be grouped into four categories: tactical, portable, semi-permanent, and fixed. The resources and experience gained at Sandia National Laboratories in over forty years of developing and implementing security systems for protecting nuclear weapons and fixed nuclear facilities is now being applied to temporary physical security systems. This paper emphasizes temporary physical security systems and their component parts that are presently available and identify additional system-subsystem objectives, requirements, and concepts

  15. A Conceptual Foundation for Measures of Physical Function and Behavioral Health Function for Social Security Work Disability Evaluation

    Science.gov (United States)

    Marfeo, Elizabeth E.; Haley, Stephen M.; Jette, Alan M.; Eisen, Susan V.; Ni, Pengsheng; Bogusz, Kara; Meterko, Mark; McDonough, Christine M.; Chan, Leighton; Brandt, Diane E.; Rasch, Elizabeth K.

    2014-01-01

    Physical and mental impairments represent the two largest health condition categories for which workers receive Social Security disability benefits. Comprehensive assessment of physical and mental impairments should include aspects beyond medical conditions such as a person’s underlying capabilities as well as activity demands relevant to the context of work. The objective of this paper is to describe the initial conceptual stages of developing new measurement instruments of behavioral health and physical functioning relevant for Social Security work disability evaluation purposes. To outline a clear conceptualization of the constructs to be measured, two content models were developed using structured and informal qualitative approaches. We performed a structured literature review focusing on work disability and incorporating aspects of the International Classification of Functioning, Disability, and Health (ICF) as a unifying taxonomy for framework development. Expert interviews provided advice and consultation to enhance face validity of the resulting content models. The content model for work-related behavioral health function identifies five major domains (1) Behavior Control, (2) Basic Interactions, (3) Temperament and Personality, (4) Adaptability, and (5) Workplace Behaviors. The content model describing physical functioning includes three domains (1) Changing and Maintaining Body Position, (2) Whole Body Mobility, and (3) Carrying, Moving and Handling Objects. These content models informed subsequent measurement properties including item development, measurement scale construction, and provided conceptual coherence guiding future empirical inquiry. The proposed measurement approaches show promise to comprehensively and systematically assess physical and behavioral health functioning relevant to work. PMID:23548543

  16. La “caja negra” de la política exterior estadounidense en Oriente Medio

    Directory of Open Access Journals (Sweden)

    Marcela Ulloa

    2013-07-01

    Full Text Available Reseña del siguiente libro:CHOMSKY, Noam y Gilbert Achar (2007. Estados peligrosos: oriente medio y la política exterior estadounidense. Barcelona: Ediciones Paidós Ibérica, 349 pp.

  17. Regulatory control of physical protection systems

    International Nuclear Information System (INIS)

    Rajdeep; Mayya, Y.S.

    2017-01-01

    The safety of facilities in BARC is under the regulatory oversight of BSC. The security architecture for these facilities incorporates multiple layers of Physical Protection Systems. The demands of safety may sometimes conflict with the needs of security. Realizing the need to identify these interfaces and extend the regulatory coverage to Physical Protection Systems, a Standing Committee named Physical Protection System Review Committee (PPSRC) has been constituted as a 2"n"d tier entity of BSC. PPSRC includes experts from various domains concerned with nuclear security, viz. physical protection systems, cyber security, radiation safety, security operations, technical services and security administration

  18. Computer Network Security- The Challenges of Securing a Computer Network

    Science.gov (United States)

    Scotti, Vincent, Jr.

    2011-01-01

    This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.

  19. Convergence of Corporate and Information Security

    OpenAIRE

    Syed; Rahman, M.; Donahue, Shannon E.

    2010-01-01

    As physical and information security boundaries have become increasingly blurry many organizations are experiencing challenges with how to effectively and efficiently manage security within the corporate. There is no current standard or best practice offered by the security community regarding convergence; however many organizations such as the Alliance for Enterprise Security Risk Management (AESRM) offer some excellent suggestions for integrating a converged security program. This paper rep...

  20. Health Information Security in Hospitals: the Application of Security Safeguards.

    Science.gov (United States)

    Mehraeen, Esmaeil; Ayatollahi, Haleh; Ahmadi, Maryam

    2016-02-01

    A hospital information system has potentials to improve the accessibility of clinical information and the quality of health care. However, the use of this system has resulted in new challenges, such as concerns over health information security. This paper aims to assess the status of information security in terms of administrative, technical and physical safeguards in the university hospitals. This was a survey study in which the participants were information technology (IT) managers (n=36) who worked in the hospitals affiliated to the top ranked medical universities (university A and university B). Data were collected using a questionnaire. The content validity of the questionnaire was examined by the experts and the reliability of the questionnaire was determined using Cronbach's coefficient alpha (α=0.75). The results showed that the administrative safeguards were arranged at a medium level. In terms of the technical safeguards and the physical safeguards, the IT managers rated them at a strong level. According to the results, among three types of security safeguards, the administrative safeguards were assessed at the medium level. To improve it, developing security policies, implementing access control models and training users are recommended.

  1. International Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  2. Security force effectiveness and technology

    International Nuclear Information System (INIS)

    Seaton, M.B.

    1988-01-01

    No one would propose ineffective security forces. Applied technology always has, as its purpose, to increase effectiveness. Evidence exists, however, that poorly conceived or executed technological solutions can actually do more harm than good. The author argues for improved human factor considerations in physical security applied technology -- especially in the area of security console operations

  3. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  4. Practices on nuclear security and international cooperation

    International Nuclear Information System (INIS)

    Shen Ning

    2009-01-01

    Full text: Nuclear terrorism has been a great threat against the safety and security of the world. It has been reached the consensus by international community to strengthen the nuclear security regime to protect the nuclear and other radiological materials and related facilities. Protection of the security of nuclear and other radiological materials in use, storage and transport and related facilities is always a important issue faced by each country and it depends on the technologies, funds and human resources can be utilized. As nuclear technology has been widely used in different area, China competent authorities have issued a series of regulations, implementation rules and guidelines on security of nuclear and radioactive materials and related facilities. China supports and has taken an active part in the international efforts to strengthen the international nuclear security regime to combat nuclear terrorism. China has paid great importance on international cooperations on nuclear security with IAEA and other countries. More than 10 various national workshops and training courses on nuclear security and physical protection were delivered per year, which provided a communication platform for Chinese facility operators and managers to know the international technology-development and share the research achievements. In cooperation with the IAEA, China has held a great number of regional and national training courses on physical protection and nuclear security since 1998. Different types of training, such as training on awareness, Design Basis Threat (DBT), physical security system design, equipments operation and vulnerability analysis, benefited the administrators, facility operators, engineers and technical staff in charge of physical security system design, operation and maintenance from China and regional countries. Under the framework of the bilateral agreement on Peaceful Use of Nuclear Technology (PUNT), China and U.S. jointly conducted a Technical Demo

  5. Systems Thinking Safety Analysis: Nuclear Security Assessment of Physical Protection System in Nuclear Power Plants

    Directory of Open Access Journals (Sweden)

    Tae Ho Woo

    2013-01-01

    Full Text Available The dynamical assessment has been performed in the aspect of the nuclear power plants (NPPs security. The physical protection system (PPS is constructed by the cyber security evaluation tool (CSET for the nuclear security assessment. The systems thinking algorithm is used for the quantifications by the Vensim software package. There is a period of 60 years which is the life time of NPPs' operation. The maximum possibility happens as 3.59 in the 30th year. The minimum value is done as 1.26 in the 55th year. The difference is about 2.85 times. The results of the case with time delay have shown that the maximum possibility of terror or sabotage incident happens as 447.42 in the 58th year and the minimum value happens as 89.77 in the 51st year. The difference is about 4.98 times. Hence, if the sabotage happens, the worst case is that the intruder can attack the target of the nuclear material in about one and a half hours. The general NPPs are modeled in the study and controlled by the systematic procedures.

  6. Mixing chaos modulations for secure communications in OFDM systems

    Science.gov (United States)

    Seneviratne, Chatura; Leung, Henry

    2017-12-01

    In this paper, we consider a novel chaotic OFDM communication scheme is to improve the physical layer security. By secure communication we refer to physical layer security that provides low probability of detection (LPD)/low probability of intercept (LPI) transmission. A mixture of chaotic modulation schemes is used to generate chaotically modulated symbols for each subcarrier of the OFDM transmitter. At the receiver, different demodulators are combined together for the different modulation schemes for enhanced security. Time domain, frequency domain and statistical randomness tests show that transmit signals are indistinguishable from background noise. BER performance comparison shows that the physical layer security of the proposed scheme comes with a slight performance degradation compared to conventional OFDM communication systems.

  7. Exterior Decay of Wood-Plastic Composite Boards: Characterization and Magnetic Resonance Imaging

    Science.gov (United States)

    Rebecca Ibach; Grace Sun; Marek Gnatowski; Jessie Glaeser; Mathew Leung; John Haight

    2016-01-01

    Magnetic resonance imaging (MRI) was used to evaluate free water content and distribution in wood-plastic composite (WPC) materials decayed during exterior exposure near Hilo, Hawaii. Two segments of the same board blend were selected from 6 commercial decking boards that had fungal fruiting bodies. One of the two board segments was exposed in sun, the other in shadow...

  8. A discrete exterior approach to structure-preserving discretization of distributed-parameter port-Hamiltonian systems

    NARCIS (Netherlands)

    Seslija, Marko; Scherpen, Jacquelien M.A.; van der Schaft, Arjan

    2011-01-01

    This paper addresses the issue of structure-preserving discretization of open distributed-parameter systems with Hamiltonian dynamics. Employing the formalism of discrete exterior calculus, we introduce simplicial Dirac structures as discrete analogues of the Stokes-Dirac structure and demonstrate

  9. RFID security : cryptography and physics perspectives

    NARCIS (Netherlands)

    Guajardo, J.; Tuyls, P.T.; Bird, N.; Conrado, C.; Maubach, S.; Schrijen, G.J.; Skoric, B.; Tombeur, A.M.H.; Thueringer, P.; Kitsos, P.; Zhang, Y.

    2008-01-01

    In this chapter, we provide an overview of mechanisms that are cheap to implement or integrate into RFID tags and that at the same time enhance their security and privacy properties. We emphasize solutions that make use of existing (or expected) functionality on the tag or that are inherently cheap

  10. Discrete exterior geometry approach to structure-preserving discretization of distributed-parameter port-Hamiltonian systems

    NARCIS (Netherlands)

    Seslija, Marko; van der Schaft, Arjan; Scherpen, Jacquelien M.A.

    This paper addresses the issue of structure-preserving discretization of open distributed-parameter systems with Hamiltonian dynamics. Employing the formalism of discrete exterior calculus, we introduce a simplicial Dirac structure as a discrete analogue of the Stokes-Dirac structure and demonstrate

  11. STRUCTURAL SOLUTIONS AND SPECIAL FEATURES OF THE THERMAL PROTECTION ANALYSIS OF EXTERIOR WALLS OF BUILDINGS MADE OF AUTOCLAVED GAS-CONCRETE BLOCKS

    Directory of Open Access Journals (Sweden)

    Bedov Anatolij Ivanovich

    2012-10-01

    Full Text Available Relevant structural solutions, physical and mechanical characteristics, coefficients of thermal conductivity for exterior masonry walls made of autoclaved gas-concrete blocks are provided in the article. If a single-layer wall is under consideration, an autoclaved gas-concrete block is capable of performing the two principal functions of a shell structure, including the function of thermal protection and the bearing function. The functions are performed simultaneously. Therefore, the application of the above masonry material means the design development and erection of exterior walls of residential buildings noteworthy for their thermal efficiency. In the event of frameless structures, the height of the residential building in question may be up to 5 stories, while the use of a monolithic or a ready-made frame makes it possible to build high-rise buildings, and the number of stories is not limited in this case. If the average block density is equal to 400…500 kilograms per cubic meter, the designed wall thickness is to be equal to 400 mm. Its thermal resistance may be lower than the one set in the event of the per-element design of the thermal protection (Rreq = 3.41 м2 C/Watt, in Ufa, although it will meet the requirements of the applicable regulations if per-unit power consumption rate is considered.

  12. Comercio Exterior Argentino (1935-1946: Comportamiento de las Importaciones en un Contexto de Turbulencia Internacional.

    Directory of Open Access Journals (Sweden)

    Teresita Gomez

    2017-11-01

    Full Text Available La estructura de la economía argentina, hasta la crisis de los años treinta, se había conformado de acuerdo a su inserción en el mercado internacional como exportador de bienes primarios alimentarios e importador de bienes energéticos y manufacturados. A partir de las modificaciones que se producen a nivel del comercio, especialmente la dificultad de las importaciones de bienes, se desarrolla la industrialización, orientada hacia la sustitución de importaciones. Nos interesa analizar la contribución del comercio exterior a esta transformación de estructura que se va produciendo. Se utilizan como fuentes: series de comercio exterior correspondientes a esos años (1935-1947, revistas especializadas y periódicos.

  13. Rights management technologies: A good choice for securing electronic healthrecords?

    NARCIS (Netherlands)

    Petkovic, M.; Katzenbeisser, S.; Kursawe, K.; Pohlmann, N.; Reimer, H.; Schneider, W.

    2007-01-01

    Advances in healthcare IT bring new concerns with respect to privacy and security. Security critical patient data no longer resides on mainframes physically isolated within an organization, where physical security measures can be taken to defend the data and the system. Modern solutions are heading

  14. Physical Layer Security Using Two-Path Successive Relaying

    Directory of Open Access Journals (Sweden)

    Qian Yu Liau

    2016-06-01

    Full Text Available Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes.

  15. Discrete Exterior Calculus Discretization of Incompressible Navier-Stokes Equations

    KAUST Repository

    Mohamed, Mamdouh S.

    2017-05-23

    A conservative discretization of incompressible Navier-Stokes equations over surface simplicial meshes is developed using discrete exterior calculus (DEC). Numerical experiments for flows over surfaces reveal a second order accuracy for the developed scheme when using structured-triangular meshes, and first order accuracy otherwise. The mimetic character of many of the DEC operators provides exact conservation of both mass and vorticity, in addition to superior kinetic energy conservation. The employment of barycentric Hodge star allows the discretization to admit arbitrary simplicial meshes. The discretization scheme is presented along with various numerical test cases demonstrating its main characteristics.

  16. [Ca2+]i in exterior of cells effected on apoptosis of HL-60 cells induced by irradiation

    International Nuclear Information System (INIS)

    He Ziyi; Meng Qingyong

    2005-01-01

    Objective: To investigate of the different [Ca 2+ ]i in exterior of cells promotion function on apoptosis of HL-60 cells induced by irradiation. Methods: To put ration dose 32 P and different [Ca 2+ ]i into culture of HL-60 and measure the apoptosis rate with FCM after 24 and 48 hours. Result: Apoptosis rate increased with the increase of [Ca 2+ ]i which shows an obvious function to promote apoptosis, r 24 =0.9001 (P=0.0145); r48=0.9343 (P=0.0063). Conclusion: [Ca 2+ ]i in exterior of cells has a obvious function in promoteing apoptosis induced by irradiation. (authors)

  17. Evaluation of 90nm 6T-SRAM as physical unclonable function for secure key generation in wireless sensor nodes

    NARCIS (Netherlands)

    Selimis, G.; Konijnenburg, M.; Ashouei, M.; Huisken, J.; de Groot, H.; van der Leest, V.; Schrijen, G.-J.; van Hulst, M.; Tuyls, P.

    2011-01-01

    Due to the unattended nature of WSN (Wireless Sensor Network) deployment, each sensor can be subject to physical capture, cloning and unauthorized device alteration. In this paper, we use the embedded SRAM, often available on a wireless sensor node, for secure data (cryptographic keys, IDs)

  18. Education and training for security personnel

    International Nuclear Information System (INIS)

    Chida, Toshiya

    2015-01-01

    It is said that Physical Protection (PP) has two purposes. One is to prevent from occurring risks of threat and terrorism and the other is to minimize damages which will be happened in case of unusual conditions or emergency situation. To achieve this goal, personnel who perform their duties should have professional knowledge and skills concerning security. However, since newcomers rarely satisfy their knowledge and skill for nuclear security in most cases. Therefore, we have to provide adequate education and training after they joined to our company. To this end, our company, located in Aomori Prefecture focused on security and physical protection for nuclear related facilities. In this paper, personnel training and challenges in order to bring up security personnel at our company will be introduced. (author)

  19. Needs for Development of Nuclear Security Culture in Korea

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yoo, Ho Sik; Kwack, Sung Woo; Lee, Ho Jin; Lee, Jong Uk

    2005-01-01

    Over the past several years, the growing international threat of terrorism has necessitated strengthening of physical protection and security of nuclear materials and facilities. A number of countries have made efforts in improving their physical protection system especially in the field of hardware such as security equipment. While security hardware is important, the efficient use of the equipment is yet another important issue, which depends on the operating personnel and their attitudes in performing their duties. Therefore, Security experts said that the nuclear security would not be completed without security culture. However, Nuclear Security Culture has not been introduced and developed in Korea. This paper introduces the concept and model of Nuclear Security Culture and raises awareness of the needs to develop the Nuclear Security Culture in Korea

  20. Nuclear security standard: Argentina approach

    International Nuclear Information System (INIS)

    Bonet Duran, Stella M.; Rodriguez, Carlos E.; Menossi, Sergio A.; Serdeiro, Nelida H.

    2007-01-01

    Argentina has a comprehensive regulatory system designed to assure the security and safety of radioactive sources, which has been in place for more than fifty years. In 1989 the Radiation Protection and Nuclear Safety branch of the National Atomic Energy Commission created the 'Council of Physical Protection of Nuclear Materials and Installations' (CAPFMIN). This Council published in 1992 a Physical Protection Standard based on a deep and careful analysis of INFCIRC 225/Rev.2 including topics like 'sabotage scenario'. Since then, the world's scenario has changed, and some concepts like 'design basis threat', 'detection, delay and response', 'performance approach and prescriptive approach', have been applied to the design of physical protection systems in facilities other than nuclear installations. In Argentina, radioactive sources are widely used in medical and industrial applications with more than 1,600 facilities controlled by the Nuclear Regulatory Authority (in spanish ARN). During 2005, measures like 'access control', 'timely detection of intruder', 'background checks', and 'security plan', were required by ARN for implementation in facilities with radioactive sources. To 'close the cycle' the next step is to produce a regulatory standard based on the operational experience acquired during 2005. ARN has developed a set of criteria for including them in a new standard on security of radioactive materials. Besides, a specific Regulatory Guide is being prepared to help licensees of facilities in design a security system and to fulfill the 'Design of Security System Questionnaire'. The present paper describes the proposed Standard on Security of Radioactive Sources and the draft of the Nuclear Security Regulatory Guidance, based on our regulatory experience and the latest international recommendations. (author)

  1. Radiological Threat Reduction (RTR) program: implementing physical security to protect large radioactive sources worldwide

    International Nuclear Information System (INIS)

    Lowe, Daniel L.

    2004-01-01

    The U.S. Department of Energy's Radiological Threat Reduction (RTR) Program strives to reduce the threat of a Radiological Dispersion Device (RDD) incident that could affect U.S. interests worldwide. Sandia National Laboratories supports the RTR program on many different levels. Sandia works directly with DOE to develop strategies, including the selection of countries to receive support and the identification of radioactive materials to be protected. Sandia also works with DOE in the development of guidelines and in training DOE project managers in physical protection principles. Other support to DOE includes performing rapid assessments and providing guidance for establishing foreign regulatory and knowledge infrastructure. Sandia works directly with foreign governments to establish cooperative agreements necessary to implement the RTR Program efforts to protect radioactive sources. Once necessary agreements are in place, Sandia works with in-country organizations to implement various security related initiatives, such as installing security systems and searching for (and securing) orphaned radioactive sources. The radioactive materials of interest to the RTR program include Cobalt 60, Cesium 137, Strontium 90, Iridium 192, Radium 226, Plutonium 238, Americium 241, Californium 252, and Others. Security systems are implemented using a standardized approach that provides consistency through out the RTR program efforts at Sandia. The approach incorporates a series of major tasks that overlap in order to provide continuity. The major task sequence is to: Establish in-country contacts - integrators, Obtain material characterizations, Perform site assessments and vulnerability assessments, Develop upgrade plans, Procure and install equipment, Conduct acceptance testing and performance testing, Develop procedures, and Conduct training. Other tasks are incorporated as appropriate and commonly include such as support of reconfiguring infrastructure, and developing security

  2. Outline of a future security system to provide physical protection of nuclear installations

    International Nuclear Information System (INIS)

    Rossnagel, A.

    1984-01-01

    Nuclear energy, within three or four decades, may become a main pillar of the world's energy supply. The author discusses the problems entailed by the necessity to protect nuclear facilities against assaults, and whether this can be ensured without interference with civic rights. The method applied by the author to show the significance of the problems is to explain the current situation, and to compare it with a plausible outline of the developments to be expected over the next 50 years. He shows the hazards to be taken into account due to criminal actions by persons from outside, or by persons working in nuclear facilities. A main problem is the fact that the security system to be set up has to encompass not only the nuclear installation itself, but also the surrounding area, and the measures to be taken will have an impact on the society, which necessarily will curtail personal freedom. The author presumes that the necessity to guarantee physical protection of nuclear facilities will lead to a modification of the meaning of basic rights, and states his anxiety that security for nuclear installations might affect our concept of freedom. (HSCH) [de

  3. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  4. Research on the recycling industry development model for typical exterior plastic components of end-of-life passenger vehicle based on the SWOT method.

    Science.gov (United States)

    Zhang, Hongshen; Chen, Ming

    2013-11-01

    In-depth studies on the recycling of typical automotive exterior plastic parts are significant and beneficial for environmental protection, energy conservation, and sustainable development of China. In the current study, several methods were used to analyze the recycling industry model for typical exterior parts of passenger vehicles in China. The strengths, weaknesses, opportunities, and challenges of the current recycling industry for typical exterior parts of passenger vehicles were analyzed comprehensively based on the SWOT method. The internal factor evaluation matrix and external factor evaluation matrix were used to evaluate the internal and external factors of the recycling industry. The recycling industry was found to respond well to all the factors and it was found to face good developing opportunities. Then, the cross-link strategies analysis for the typical exterior parts of the passenger car industry of China was conducted based on the SWOT analysis strategies and established SWOT matrix. Finally, based on the aforementioned research, the recycling industry model led by automobile manufacturers was promoted. Copyright © 2013 Elsevier Ltd. All rights reserved.

  5. Hazardous drug residue on exterior vial surfaces: evaluation of a commercial manufacturing process.

    Science.gov (United States)

    Power, Luci A; Sessink, Paul J M; Gesy, Kathy; Charbonneau, Flay

    2014-04-01

    Hazardous drug residue on the exterior surface of drug vials poses a potential risk for exposure of health care workers involved in handling these products. The purpose of this article is to heighten the awareness of this serious issue and to evaluate a commercial manufacturing process for removing and containing hazardous drug (HD) residue on exterior vial surfaces. Additionally, findings from this study are interpreted, incorporated into the current body of evidence, and discussed by experts in this field. This study includes separate evaluations for the presence or absence of surface drug contamination on the vials of 3 HD products: 5-fluorouracil, cisplatin, and methotrexate. The drug products were packaged in vials using a patented prewashing/decontamination method, application of a polyvinylchloride (PVC) base, and use of clear glass vials. An additional step of encasing the vial in a shrink-wrapped sheath was used for 5-fluorouracil and cisplatin. Of all 5-fluorouracil (110 vials), methotrexate (60 vials), and cisplatin (60 vials) tested, only 2 had detectable amounts of surface residue. One 5-fluorouracil vial was found to have approximately 4 mg of 5-fluorouracil on the surface of the vial. The second contaminated vial was cisplatin, which was discovered to have 131 ng of platinum, equal to 200 ng of cisplatin or 0.2 μL of cisplatin solution, on the vial sheath. Using validated extraction and analytic methods, all but 2 of the 230 tested vials were found to be free of surface drug contamination. Pharmacy leaders need to take an active role in promoting the need for clean HD vials. Manufacturers should be required to provide their clients with data derived from externally validated analytic studies, reporting the level of HD contamination on the exterior of their vial products.

  6. Moisture performance properties of exterior sheathing products made of spruce plywood or OSB

    Energy Technology Data Exchange (ETDEWEB)

    Ojanen, T.; Ahonen, J. [VTT Building and Transport, Espoo (Finland)

    2005-02-01

    Plywood and OSB (Oriented Strand Board) are building boards that are made of timber and glue and that have good structural strength. OSB is a relatively new product that is produced from various timber materials and even some wastewood can be used as raw material for this product. Due to the easy access of raw material and economical reasons, the use of OSB has been highly increasing. The moisture safety of the building envelope depends on the properties of the building products. The moisture performance properties of the sheathing boards have not got enough attention, too often these wood based materials are equated without considering the real properties and their effect on the overall moisture performance. This research was carried out to experimentally determine the material properties and performance characteristics that have an effect on the moisture performance of building structures where OSB or spruce plywood are applied as exterior sheathing boards. A relatively representative amount of samples were used to study the moisture properties of European OSB and plywood products and a comparison to one Canadian OSB and one plywood product was done. All the products used in this research were meant to be used also as exterior sheathing boards. The results shows clearly the differences between OSB and plywood products. The products are not interchangeable. The main differences can be found from the vapour permeability levels that have an effect on the drying efficiency of building structures. The products have different performance criteria, and the climate conditions and moisture loads have to be studied to evaluate their suitability and moisture safety aspects in different applications. Water repellent features and drying efficiency are somewhat opposite properties of the products and the dimensional changes under varying moisture contents can set some boundary conditions when the optimum solution for the exterior sheathing is considered. (orig.)

  7. Preparation of Thermoplastic Poly (vinyl Alcohol), Ethylene Vinyl Acetate and Vinyl Acetate Versatic Ester Blends for Exterior Masonry Coating

    International Nuclear Information System (INIS)

    EL-Nahas, H.H.; Gad, Y.H.; Magida, M.M.

    2013-01-01

    Blend systems including ethylene vinyl acetate (EVA), poly (vinyl alcohol) (PVA) and vinyl acetate versatic copolymer latex (VAcVe) were prepared and used as exterior coatings. Mechanical and thermal properties of the blends were investigated using a testo meter, shore hardness tester, thermogravimetric analysis (TGA) and scanning electron microscopy (SEM). The water resistance of the samples was measured. Effect of ionizing irradiation on gel content, tensile strength and surface hardness were also followed. The blend offers binder base for exterior masonry coating systems having superior water resistant and mechanical properties

  8. 17 CFR 403.5 - Custody of securities held by financial institutions that are government securities brokers or...

    Science.gov (United States)

    2010-04-01

    ... institution does not initiate the purchase of the specified securities by the close of the next business day... physical delivery of certificates if the securities are issued in certificated form, or to direct a... business day. (6) A government securities broker or dealer that is a branch or agency of a foreign bank...

  9. Unidad de destino en lo universal Falange y la propaganda exterior (1936-1945

    Directory of Open Access Journals (Sweden)

    Antonio César MORENO CANTANO

    2009-08-01

    Full Text Available RESUMEN: El control de la prensa y la propaganda se convirtió desde los inicios del régimen franquista en una preocupación constante por parte de las autoridades. El presente artículo analiza el papel desempeñado por la Delegación Nacional del Servicio Exterior de Falange, órgano encargado de difundir y promocionar en el campo internacional el ideario de la Nueva España. Para la realización de esta tarea se valió de una serie de delegaciones de Prensa y Propaganda que se localizaron principalmente en América y Europa.ABSTRACT: The control on the press and the propaganda became since the beginning of the Franco regime a constant preocupation for the authorities. The present article makes an analysis of the role of National Delegation of the Falange Exterior Services made, organization who had competences on the difusion and distribution of the idea of «The New Spain». To make this promotion, this organization had the cooperation of the press delegations specially in America and Europe.

  10. La política exterior de Estados Unidos: una visión desde la periferia

    Directory of Open Access Journals (Sweden)

    Pablo Andrade A.

    2004-11-01

    Full Text Available Este artículo trata explica la forma como la política exterior de Estados Unidos persigue dos objetivos interrelacionados: primero, en el corto y mediano plazo consolidar y aumentar su predominio militar a nivel global y, segundo, en el largo plazo institucionalizar ese dominio en un orden político sumamente difícil –o costoso- de transformar. Así, la política exterior estadounidense hacia América Latina y, sobre todo, en relación con la Región Andina y más específicamente con el Ecuador debe estudiarse a partir de las decisiones y comportamientos de Estados Unidos, así como de los medios que emplea para lograrlos: los tratados de libre comercio (TLC; la guerra antiterrorista y la promoción de la democracia.

  11. Initial boundary value problems of nonlinear wave equations in an exterior domain

    International Nuclear Information System (INIS)

    Chen Yunmei.

    1987-06-01

    In this paper, we investigate the existence and uniqueness of the global solutions to the initial boundary value problems of nonlinear wave equations in an exterior domain. When the space dimension n >= 3, the unique global solution of the above problem is obtained for small initial data, even if the nonlinear term is fully nonlinear and contains the unknown function itself. (author). 10 refs

  12. Wireless Physical Layer Security with CSIT Uncertainty

    KAUST Repository

    Hyadi, Amal

    2017-01-01

    Recent years have been marked by an enormous growth of wireless communication networks and an extensive use of wireless applications. In return, this phenomenal expansion induced more concerns about the privacy and the security of the users

  13. Nuclear material facilities - security systems and technology R and D trends

    International Nuclear Information System (INIS)

    Ellis, D.; Steele, B.

    2002-01-01

    Full text: In the US, physical security research and development (R and D) during the 1970s and 1980s created a body of technology and systems engineering that largely defined the industry for several decades. However, despite today's terrorists threats and risks, the overall funding of new and innovative physical security solutions is relatively very small. Such factors constraining physical security R and D include the expansion of overall security responsibilities, the emphasis on programmatic and business performance, in addition to evolving (mis)perceptions that 'the problem has been solved' or that 'anyone can do security'. Underlying these factors, the lack of robust standards and certifications has limited the development and application of physical security products, systems, and services. The research and development of new security technologies must be evaluated against very demanding constraints - including costs/benefits, emerging threats, and policies. Going forward, the goal will be to create a more comprehensive approach to physical security of nuclear material facilities that matches evolving threats and that will complement the transition to an integrated security/operations management environment. Such a management model evaluates the additional value of increasing security alternatives in addition to determining trade-offs between the programmatic mission and security issues. Correspondingly, more explicit and strategically useful measures must be developed to determine importance that, in turn, will influence security-related R and D efforts. The research and development of security technologies should be based upon identified needs and requirements resulting from a systematic analysis of the threat and other conditions. In particular, security technologies and systems must be evaluated in terms of current and long-term impacts. Such needs are (will be) diverse and will depend upon sustained research investments in a broad range of technologies

  14. Time-dependent approach to collisional ionization using exterior complex scaling

    International Nuclear Information System (INIS)

    McCurdy, C. William; Horner, Daniel A.; Rescigno, Thomas N.

    2002-01-01

    We present a time-dependent formulation of the exterior complex scaling method that has previously been used to treat electron-impact ionization of the hydrogen atom accurately at low energies. The time-dependent approach solves a driven Schroedinger equation, and scales more favorably with the number of electrons than the original formulation. The method is demonstrated in calculations for breakup processes in two dimensions (2D) and three dimensions for systems involving short-range potentials and in 2D for electron-impact ionization in the Temkin-Poet model for electron-hydrogen atom collisions

  15. 17 CFR 270.17f-1 - Custody of securities with members of national securities exchanges.

    Science.gov (United States)

    2010-04-01

    ... upon physical inspection thereof and upon examination of the books of the custodian. The physical... a member of a national securities exchange of any obligation under existing law or under the rules...

  16. Virtual reality in the creation of a tool to support planning of physical security at nuclear facilities

    International Nuclear Information System (INIS)

    Santo, Andre Cotelli do E.; Mol, Antonio Carlos de A.; Goncalves, Deise Galvao de S.; Marins, Eugenio; Freitas, Victor Goncalves G.

    2013-01-01

    In recent years was observed the importance of improving the physical security of nuclear facilities, mainly due to the increasing advancement of brazilian nuclear program. The present work aims to develop a tool that allows the visualization and planning of action strategies in a virtual environment, in order to improve this security. To this end, was created a virtual model of the Instituto de Engenharia Nuclear (IEN), which is located on Ilha do Fundao - Rio de Janeiro - Brazil. This environment is a three-dimensional model, with representations close to reality, where virtual characters (avatars) can move and interact in real time. In this virtual world, it was developed a dynamic weather system, where is possible to change between day and night, and climate changes such as: rain, storms, snow, among other features. Furthermore, the tool has a surveillance system using virtual cameras, allowing the monitoring of the environment. This way, making possible to simulate strategies approach, allowing an evaluation of the procedures performed, as well as assisting in the training of security installations subject to radiation. (author)

  17. Virtual reality in the creation of a tool to support planning of physical security at nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Santo, Andre Cotelli do E.; Mol, Antonio Carlos de A.; Goncalves, Deise Galvao de S.; Marins, Eugenio; Freitas, Victor Goncalves G., E-mail: cotelli.andre@gmail.com, E-mail: mol@ien.gov.br, E-mail: deise.galvao@gmail.com, E-mail: eugenio@ien.gov.br, E-mail: vgoncalves@ien.gov.br [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio De Janeiro, RJ (Brazil)

    2013-07-01

    In recent years was observed the importance of improving the physical security of nuclear facilities, mainly due to the increasing advancement of brazilian nuclear program. The present work aims to develop a tool that allows the visualization and planning of action strategies in a virtual environment, in order to improve this security. To this end, was created a virtual model of the Instituto de Engenharia Nuclear (IEN), which is located on Ilha do Fundao - Rio de Janeiro - Brazil. This environment is a three-dimensional model, with representations close to reality, where virtual characters (avatars) can move and interact in real time. In this virtual world, it was developed a dynamic weather system, where is possible to change between day and night, and climate changes such as: rain, storms, snow, among other features. Furthermore, the tool has a surveillance system using virtual cameras, allowing the monitoring of the environment. This way, making possible to simulate strategies approach, allowing an evaluation of the procedures performed, as well as assisting in the training of security installations subject to radiation. (author)

  18. Bondability of ipê (Tabebuia spp.) wood using ambient-curing exterior wood adhesives

    Science.gov (United States)

    Daniel J. Yelle

    2016-01-01

    Ipê is an extremely difficult species to bond because of its high density, interlocking grain, and high volumetric swelling–shrinkage under prolonged wet conditions. Despite its difficulties, the wood is known to be extremely durable in exterior conditions because of its resistance to microbial and insect degradation. Therefore, investigating its bondability with...

  19. Computer security at ukrainian nuclear facilities: interface between nuclear safety and security

    International Nuclear Information System (INIS)

    Chumak, D.; Klevtsov, O.

    2015-01-01

    Active introduction of information technology, computer instrumentation and control systems (I and C systems) in the nuclear field leads to a greater efficiency and management of technological processes at nuclear facilities. However, this trend brings a number of challenges related to cyber-attacks on the above elements, which violates computer security as well as nuclear safety and security of a nuclear facility. This paper considers regulatory support to computer security at the nuclear facilities in Ukraine. The issue of computer and information security considered in the context of physical protection, because it is an integral component. The paper focuses on the computer security of I and C systems important to nuclear safety. These systems are potentially vulnerable to cyber threats and, in case of cyber-attacks, the potential negative impact on the normal operational processes can lead to a breach of the nuclear facility security. While ensuring nuclear security of I and C systems, it interacts with nuclear safety, therefore, the paper considers an example of an integrated approach to the requirements of nuclear safety and security

  20. MIGRAÇÕES FICCIONAIS DO OBSERVADOR: O OLHAR EXTERIOR SOBRE O CANADÁ E SUAS MEDIAÇÕES

    Directory of Open Access Journals (Sweden)

    Walter Moser

    2012-12-01

    Full Text Available Pais de imigração, o Canadá é rico em textos literários – tanto anglófonos como francófonos – escritos por imigrantes. Recentemente, a crítica literária, interessada na representação da alteridade cultural, desenvolveu o paradigma da “literaturamigrante”. Ora, existe um estratagema bastante antigo para lançar um olhar estranho e estrangeiro sobre a própria cultura, que consiste em inventar um observador exterior que se desloca. Aplicado de maneira paradigmática na obra Les lettres persanes [Cartas persas], de Montesquieu, esse estratagema apresenta uma modalidade particular quando o olhar exterior é narrativamente construído pelo deslocamento de um personagem, que, longe de ser estrangeiro, vem de sua própria cultura – canadense no caso – e se desloca para lançar um olhar exterior sobre ela. De fato, esse olhar interno, transformando-se em externo, adquire um potencial crítico. Analisa-se aqui esse estratagema, com o objetivo de ressaltar seu valor crítico, em dois romances – The Englishman’s boy, de Vanderhaeghe, e The navigator of New York, de Johnston – e no filme Nô, de Robert Lepage.

  1. E-Commerce Privacy and Security System

    OpenAIRE

    Kuldeep Kaur; Dr. Ashutosh Pathak

    2015-01-01

    The Internet is a public networks consisting of thousand of private computer network connected together. Private computer network system is exposed to potential threats from anywhere on the public network. In physical world, crimes often leave evidence finger prints, footprints, witnesses, video on security comes and so on. Online a cyber –crimes, also leaves physical, electronic evidence, but unless good security measures are taken, it may be difficult to trace the source of cybe...

  2. Escape and evade control policies for ensuring the physical security of nonholonomic, ground-based, unattended mobile sensor nodes

    Science.gov (United States)

    Mascarenas, David; Stull, Christopher; Farrar, Charles

    2011-06-01

    In order to realize the wide-scale deployment of high-endurance, unattended mobile sensing technologies, it is vital to ensure the self-preservation of the sensing assets. Deployed mobile sensor nodes face a variety of physical security threats including theft, vandalism and physical damage. Unattended mobile sensor nodes must be able to respond to these threats with control policies that facilitate escape and evasion to a low-risk state. In this work the Precision Immobilization Technique (PIT) problem has been considered. The PIT maneuver is a technique that a pursuing, car-like vehicle can use to force a fleeing vehicle to abruptly turn ninety degrees to the direction of travel. The abrupt change in direction generally causes the fleeing driver to lose control and stop. The PIT maneuver was originally developed by law enforcement to end vehicular pursuits in a manner that minimizes damage to the persons and property involved. It is easy to imagine that unattended autonomous convoys could be targets of this type of action by adversarial agents. This effort focused on developing control policies unattended mobile sensor nodes could employ to escape, evade and recover from PIT-maneuver-like attacks. The development of these control policies involved both simulation as well as small-scale experimental testing. The goal of this work is to be a step toward ensuring the physical security of unattended sensor node assets.

  3. Physical security and cyber security issues and human error prevention for 3D printed objects: detecting the use of an incorrect printing material

    Science.gov (United States)

    Straub, Jeremy

    2017-06-01

    A wide variety of characteristics of 3D printed objects have been linked to impaired structural integrity and use-efficacy. The printing material can also have a significant impact on the quality, utility and safety characteristics of a 3D printed object. Material issues can be created by vendor issues, physical security issues and human error. This paper presents and evaluates a system that can be used to detect incorrect material use in a 3D printer, using visible light imaging. Specifically, it assesses the ability to ascertain the difference between materials of different color and different types of material with similar coloration.

  4. Information Security and the Internet.

    Science.gov (United States)

    Doddrell, Gregory R.

    1996-01-01

    As business relies less on "fortress" style central computers and more on distributed systems, the risk of disruption increases because of inadequate physical security, support services, and site monitoring. This article discusses information security and why protection is required on the Internet, presents a best practice firewall, and…

  5. Smart grid security

    CERN Document Server

    Goel, Sanjay; Papakonstantinou, Vagelis; Kloza, Dariusz

    2015-01-01

    This book on smart grid security is meant for a broad audience from managers to technical experts. It highlights security challenges that are faced in the smart grid as we widely deploy it across the landscape. It starts with a brief overview of the smart grid and then discusses some of the reported attacks on the grid. It covers network threats, cyber physical threats, smart metering threats, as well as privacy issues in the smart grid. Along with the threats the book discusses the means to improve smart grid security and the standards that are emerging in the field. The second part of the b

  6. Transportation Security : federal action needed to enhance security efforts : statement of Peter Guerrero, Director, Physical Infrastructure Issues

    Science.gov (United States)

    2003-09-09

    Mr. Guerrero's testimony examines (1) challenges in securing the nation's transportation system; (2) actions transportation operators, as well as state and local governments, have taken since September 11 to enhance security; (3) the federal role in ...

  7. Synthetic pubovaginal sling (TVT: failure in conservative treatment following vaginal exteriorization

    Directory of Open Access Journals (Sweden)

    Edgar Thorell

    2004-04-01

    Full Text Available Female, 57 year-old patient, reported having undergone surgery for correction of urinary incontinence due to sphincteric insufficiency with the implantation of a synthetic pubovaginal sling 14 months earlier. Though she did not present urine loss any longer, approximately 60 days following the surgical procedure she started to report dysuria, pollakiuria and dyspareunia. Attempts of a conservative solution were ineffective. The appearance of a vaginal infra-urethral granuloma and the exteriorization of the synthetic material led to its removal.

  8. Peace, Security, Globalisation & Cultural Diplomacy

    Directory of Open Access Journals (Sweden)

    Ashok Natarajan

    2017-06-01

    Full Text Available This article argues for a positive, comprehensive conception of peace that goes beyond the mere absence of war and a more integrated conception of human security that encompasses a wider range of issues than threats of physical violence. Education is one of humanity’s most effective social institutions for redirecting the violent physical energies of destruction into higher avenues of civilization and culture as an instrument of conscious social evolution. Organization is knowledge of higher accomplishment. Organization has the power to vastly accelerate and multiply the potentials of education for the promotion of peace and security. Peace and Security have a mutually reinforcing effect on each other in the sense that peace results in security while security results in peace. Physical violence eventually led to the development of the knowledge needed for the avoidance of violence by means of diplomacy, trade and cultural exchanges, marking the beginning of the transition from the physical to the mental level of evolution. Trade requires travel, transport, human interaction, exchange, trust with respect to products, and reliable mechanisms for the exchange of a stable currency that can only be effectively founded on an enduring peace that generates confidence among the traders. Isolated communities evolve a communal consciousness as they mature into organized social units founded on shared customs and culture, which later develop into a common legal framework. What began as diplomacy so many centuries ago has now evolved into a near universal recognition of fundamental human rights and the rule of law. The evolution of diplomacy in previous centuries is the foundation for the remarkable betterment of human life witnessed in recent times. The world is in the process of evolving a unifying global culture founded on universal values and recognition of the rich contributions of different cultures to humanity’s progress. As physical force once

  9. Major issues in the training of security personnel

    International Nuclear Information System (INIS)

    Knauf, W.M.; Robertson, L.P.

    1982-01-01

    The effectiveness of the response component of a physical protection system depends greatly upon the training received by the security personnel. The issues and problems in the area of training which were of greatest concern to the attendees of the 1980 and 1981 INMM sponsored Technical Workshops on Guard Training are discussed. The attendees were training supervisors of managers of security personnel and represented a variety of organizations and companies including DOE facilities, NRC licensees, the military, private security contractors, and governmental agencies. Major categories of concern include: professionalism in security, legal constraints and obligations, physical and psychological testing and standards, governmental requirements, morale and motivation, and tactical training techniques

  10. Optimisation of the Lowest Robin Eigenvalue in the Exterior of a Compact Set

    Czech Academy of Sciences Publication Activity Database

    Krejčiřík, David; Lotoreichik, Vladimir

    2018-01-01

    Roč. 25, č. 1 (2018), s. 319-337 ISSN 0944-6532 R&D Projects: GA ČR GA17-01706S Institutional support: RVO:61389005 Keywords : Robin Laplacian * negative boundary parameter * exterior of a convex set * spectral isoperimetric inequality * spectral isochoric inequality * parallel coordinates Subject RIV: BA - General Mathematics OBOR OECD: Pure mathematics Impact factor: 0.496, year: 2016

  11. Network perimeter security building defense in-depth

    CERN Document Server

    Riggs, Cliff

    2003-01-01

    PREFACEWho is this Book For?The Path to Network SecurityWho Should Read This Book?MANAGING NETWORK SECURITYThe Big Picture: Security Policies from A to ZAdministrative CountermeasuresPhysical CountermeasuresTechnological CountermeasuresCreating the Security Standards DocumentCreating the Configuration Guide DocumentPulling it All Together: Sample Security Policy CreationProteris Security Standards and ProceduresTHE NETWORK STACK AND SECURITYConnecting the NetworkProtocolsServers and HostsCRYPTOGRAPHY AND VPN TERMINOLOGYKeysCertificatesHashingDigital SignaturesCommon Encryption AlgorithmsSplit

  12. Global smooth solutions of 3-D null-form wave equations in exterior domains with Neumann boundary conditions

    Science.gov (United States)

    Jun, Li; Huicheng, Yin

    2018-05-01

    The paper is devoted to investigating long time behavior of smooth small data solutions to 3-D quasilinear wave equations outside of compact convex obstacles with Neumann boundary conditions. Concretely speaking, when the surface of a 3-D compact convex obstacle is smooth and the quasilinear wave equation fulfills the null condition, we prove that the smooth small data solution exists globally provided that the Neumann boundary condition on the exterior domain is given. One of the main ingredients in the current paper is the establishment of local energy decay estimates of the solution itself. As an application of the main result, the global stability to 3-D static compressible Chaplygin gases in exterior domain is shown under the initial irrotational perturbation with small amplitude.

  13. Personal computer security: part 1. Firewalls, antivirus software, and Internet security suites.

    Science.gov (United States)

    Caruso, Ronald D

    2003-01-01

    Personal computer (PC) security in the era of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) involves two interrelated elements: safeguarding the basic computer system itself and protecting the information it contains and transmits, including personal files. HIPAA regulations have toughened the requirements for securing patient information, requiring every radiologist with such data to take further precautions. Security starts with physically securing the computer. Account passwords and a password-protected screen saver should also be set up. A modern antivirus program can easily be installed and configured. File scanning and updating of virus definitions are simple processes that can largely be automated and should be performed at least weekly. A software firewall is also essential for protection from outside intrusion, and an inexpensive hardware firewall can provide yet another layer of protection. An Internet security suite yields additional safety. Regular updating of the security features of installed programs is important. Obtaining a moderate degree of PC safety and security is somewhat inconvenient but is necessary and well worth the effort. Copyright RSNA, 2003

  14. WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THREATS AND ITS COUNTERMEASURES

    OpenAIRE

    Ranjit Panigrahi; Kalpana Sharma; M.K. Ghose

    2013-01-01

    Wireless Sensor Network (WSN) has a huge range of applications such as battlefield, surveillance, emergency rescue operation and smart home technology etc. Apart from its inherent constraints such as limited memory and energy resources, when deployed in hostile environmental conditions, the sensor nodes are vulnerable to physical capture and other security constraints. These constraints put security as a major challenge for the researchers in the field of computer networking. T...

  15. Cluster Observations of Particle Injections in the Exterior Cusp

    Science.gov (United States)

    Escoubet, C. P.; Grison, B.; Berchem, J.; Trattner, K. J.; Lavraud, B.; Pitout, F.; Soucek, J.; Richard, R. L.; Laakso, H. E.; Masson, A.; Dunlop, M. W.; Dandouras, I. S.; Reme, H.; Fazakerley, A. N.; Daly, P. W.

    2014-12-01

    The main process that injects solar wind plasma into the polar cusp is now generally accepted to be magnetic reconnection. Depending on the IMF direction, this process takes place equatorward (for IMF southward), poleward (for IMF northward) or on the dusk or dawn sides (for IMF azimuthal) of the cusp. We report a Cluster crossing on 5 January 2002 near the exterior cusp on the southern dusk side. The IMF was mainly azimuthal (IMF-By around -5 nT), the solar wind speed lower than usual around 280 km/s with the density of order 5 cm-3. The four Cluster spacecraft had an elongated configuration near the magnetopause. C4 was the first spacecraft to enter the cusp around 19:52:04 UT, followed by C2 at 19:52:35 UT, C1 at 19:54:24 UT and C3 at 20:13:15 UT. C4 and C1 observed two ion energy dispersions at 20:10 UT and 20:40 UT and C3 at 20:35 UT and 21:15 UT. Using the time of flight technique on the upgoing and downgoing ions, which leads to energy dispersions, we obtain distances of the ion sources between 14 and 20 RE from the spacecraft. Using Tsyganenko model, we find that these sources are located on the dusk flank, past the terminator. The first injection by C3 is seen at approximately the same time as the 2nd injection on C1 but their sources at the magnetopause were separated by more than 7 RE. This would imply that two distinct sources were active at the same time on the dusk flank of the magnetosphere. In addition, a flow reversal was observed at the magnetopause on C4 which would be an indication that reconnection is taking place near the exterior cusp.

  16. Security measures required for HIPAA privacy.

    Science.gov (United States)

    Amatayakul, M

    2000-01-01

    HIPAA security requirements include administrative, physical, and technical services and mechanisms to safeguard confidentiality, availability, and integrity of health information. Security measures, however, must be implemented in the context of an organization's privacy policies. Because HIPAA's proposed privacy rules are flexible and scalable to account for the nature of each organization's business, size, and resources, each organization will be determining its own privacy policies within the context of the HIPAA requirements and its security capabilities. Security measures cannot be implemented in a vacuum.

  17. Influence of employment and job security on physical and mental health in adults living with HIV: cross-sectional analysis.

    Science.gov (United States)

    Rueda, Sergio; Raboud, Janet; Rourke, Sean B; Bekele, Tsegaye; Bayoumi, Ahmed; Lavis, John; Cairney, John; Mustard, Cameron

    2012-01-01

    In the general population, job insecurity may be as harmful to health as unemployment. Some evidence suggests that employment is associated with better health outcomes among people with HIV, but it is not known whether job security offers additional quality-of-life benefits beyond the benefits of employment alone. We used baseline data for 1660 men and 270 women who participated in the Ontario HIV Treatment Network Cohort Study, an ongoing observational cohort study that collects clinical and socio-behavioural data from people with HIV in the province of Ontario, Canada. We performed multivariable regression analyses to determine the contribution of employment and job security to health-related quality of life after controlling for potential confounders. Employed men with secure jobs reported significantly higher mental health-related quality of life than those who were non-employed (β = 5.27, 95% confidence interval [CI] 4.07 to 6.48), but insecure employment was not associated with higher mental health scores relative to non-employment (β = 0.18, 95% CI -1.53 to 1.90). Thus, job security was associated with a 5.09-point increase on a 100-point mental health quality-of-life score (95% CI 3.32 to 6.86). Among women, being employed was significantly associated with both physical and mental health quality of life, but job security was not associated with additional health benefits. Participation in employment was associated with better quality of life for both men and women with HIV. Among men, job security was associated with better mental health, which suggests that employment may offer a mental health benefit only if the job is perceived to be secure. Employment policies that promote job security may offer not only income stability but also mental health benefits, although this additional benefit was observed only for men.

  18. Development of a security-by-design handbook

    International Nuclear Information System (INIS)

    Olson, David L.; Snell, Mark Kamerer; Iida, Toru; Ochiai, Kazuya; Tanuma, Koji

    2010-01-01

    There is an increasing awareness that efficient and effective nuclear facility design is best achieved when requirements from the 3S disciplines Safety, Safeguards, and Security - are balanced and intrinsic to the facility design. This can be achieved when policy, processes, methods, and technologies are understood and applied in these areas during all phases of the design process. For the purposes of this paper, Security-by-design will be defined as the system level incorporation of the physical protection system (PPS) into a new or retrofitted nuclear power plant (NPP) or nuclear facility (NF) resulting in intrinsic security. Security-by-design can also be viewed as a framework to achieve robust and durable security systems. This paper reports on work performed to date to create a Security-by-Design Handbook, under a bilateral agreement between the United States and Japan, specifically, a review of physical protection principles and best practices, and a decommissioning to better understand where these principles and practices can be applied. This paper describes physical protection principles and best practices to achieve security-by- design that were gathered from International, Japanese, and U.S. sources. Principles are included for achieving security early in the design process where security requirements are typically less costly and easier to incorporate. The paper then describes a generic design process that covers the entire facility lifecycle from scoping and planning of the project to decommissioning and decontamination. Early design process phases, such as conceptual design, offer opportunities to add security features intrinsic to the facility design itself. Later phases, including design engineering and construction, are important for properly integrating security features into a coherent design and for planning for and assuring the proper performance of the security system during the operation and decommissioning of the facility. The paper also

  19. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  20. The (social) construction of information security

    NARCIS (Netherlands)

    Pieters, Wolter

    While the philosophical foundations of information security have been unexamined, there is an implicit philosophy of what protection of information is. This philosophy is based on the notion of containment, taken from analogies with things that offer physical security (e.g., buildings, safes,

  1. Physically unclonable functions constructions, properties and applications

    CERN Document Server

    Maes, Roel

    2013-01-01

    Physically unclonable functions (PUFs) are innovative physical security primitives that produce unclonable and inherent instance-specific measurements of physical objects; in many ways they are the inanimate equivalent of biometrics for human beings. Since they are able to securely generate and store secrets, they allow us to bootstrap the physical implementation of an information security system. In this book the author discusses PUFs in all their facets: the multitude of their physical constructions, the algorithmic and physical properties which describe them, and the techniques required to

  2. Asia Central en la política exterior rusa

    Directory of Open Access Journals (Sweden)

    Javier Morales

    2012-01-01

    Full Text Available Las políticas rusas hacia Asia Central han estado condicionadas por la herencia histórica anterior a la disolución de la URSS, pero también por los cambios en el sistema internacional y en la propia Rusia acaecidos desde entonces. ¿En qué medida la actuación de Rusia ha sido coherente y estable, basada en una estrategia para Asia Central fundamentada en los intereses nacionales? En este artículo examinamos los fundamentos de la política exterior rusa en relación con Asia Central, dividiéndola en tres apartados: político, económico y de seguridad.

  3. Exterior egg quality as affected by enrichment resources layout in furnished laying-hen cages.

    Science.gov (United States)

    Li, Xiang; Chen, Donghua; Meng, Fanyu; Su, Yingying; Wang, Lisha; Zhang, Runxiang; Li, Jianhong; Bao, Jun

    2017-10-01

    This study aimed to investigate the effects of enrichment resources (a perch, dustbath, and nest) layout in furnished laying-hen cages (FC) on exterior quality of eggs. One hundred and sixty-eight (168) Hy-Line Brown laying hens at 16 weeks of age were randomly distributed to four treatments: small furnished cages (SFC), medium furnished cages type I (MFC-I), medium furnished cages type II (MFC-II), and medium furnished cages type III (MFC-III). Each treatment had 4 replicates or cages with 6 hens for SFC (24 birds for each SFC) and 12 hen/cage for MFC-I, -II, and -III (48 birds for each MFC-I, -II and -III). Following a 2-week acclimation, data collection started at 18 weeks of age and continued till 52 weeks of age. Dirtiness of egg surface or cracked shell as indicators of the exterior egg quality were recorded each week. The results showed that the proportion of cracked or dirty eggs was significantly affected by the FC type (p<0.01) in that the highest proportion of cracked or dirty eggs was found in MFC-I and the lowest proportion of dirty eggs in SFC. The results of this showed that furnished cage types affected both dirty eggs and cracked eggs (p<0.01). The results also indicated that not nest but dustbath lead to more dirty eggs. Only MFC-I had higher dirty eggs at nest than other FC (p< 0.01). The results of dirty eggs in MFC-I and MFC-II compared with SFC and MFC-III seemed suggest that a low position of dustbath led to more dirty eggs. SFC design affected exterior egg quality and the low position of dustbath in FC resulted in higher proportion of dirty eggs.

  4. Systematic optimization of exterior measurement locations for the determination of interior magnetic field vector components in inaccessible regions

    Energy Technology Data Exchange (ETDEWEB)

    Nouri, N.; Plaster, B.

    2014-12-11

    An experiment may face the challenge of real-time determination of the magnetic field vector components present within some interior region of the experimental apparatus over which it is impossible to directly measure the field components during the operation of the experiment. As a solution to this problem, we propose a general concept which provides for a unique determination of the field components within such an interior region solely from exterior measurements at fixed discrete locations. The method is general and does not require the field to possess any type of symmetry. We describe our systematic approach for optimizing the locations of these exterior measurements which maximizes their sensitivity to successive terms in a multipole expansion of the field.

  5. Don't Drop Your Guard: Securing Nuclear Facilities

    International Nuclear Information System (INIS)

    Lööf, Susanna

    2013-01-01

    You're never quite finished with nuclear security. ''Even the most advanced security system for radioactive or nuclear material needs to be continuously updated to ensure that it remains effective,'' says Arvydas Stadalnikas, an IAEA Senior Nuclear Security Officer. ''Security can always be improved. Even if you think you have the best system for today, it may require enhancements because of the changing environment,'' he said. To help States with this daunting task, the IAEA offers support through its International Physical Protection Advisory Service (IPPAS) which includes in-depth analysis of the physical protection and nuclear security followed by expert advice. The IAEA has carried out 58 missions to 37 countries since the IPPAS programme was launched in 1996, helping States translate international conventions, codes and guidance on nuclear security into practice. Although each mission focuses on improving the security in a specific country, ''the programme has benefits that reach far beyond the recipient State's national borders,'' Stadalnikas noted. ''Each IPPAS mission helps improve global nuclear security because enhanced security in one country means that you improve globally. Deficiencies in one country could open the way for malicious acts, which can have worldwide effects,'' he said

  6. Physics of societal issues calculations on national security, environment, and energy

    CERN Document Server

    Hafemeister, David

    2014-01-01

    This book provides the reader with essential tools needed to analyze complex societal issues and demonstrates the transition from physics to modern-day laws and treaties. This second edition features new equation-oriented material and extensive data sets drawing upon current information from experts in their fields. Problems to challenge the reader and extend discussion are presented on three timely issues:   •        National Security: Weapons, Offense, Defense, Verification, Nuclear Proliferation, Terrorism •        Environment: Air/Water, Nuclear, Climate Change, EM Fields/Epidemiology •        Energy: Current Energy Situation, Buildings, Solar Buildings, Renewable  Energy, Enhanced End-Use Efficiency, Transportation, Economics   Praise for the first edition: "This insight is needed in Congress and the Executive Branch. Hafemeister, a former Congressional fellow with wide Washington experience, has written a book for physicists, chemists and engineers who want to learn science...

  7. Designing ECG-based physical unclonable function for security of wearable devices.

    Science.gov (United States)

    Shihui Yin; Chisung Bae; Sang Joon Kim; Jae-Sun Seo

    2017-07-01

    As a plethora of wearable devices are being introduced, significant concerns exist on the privacy and security of personal data stored on these devices. Expanding on recent works of using electrocardiogram (ECG) as a modality for biometric authentication, in this work, we investigate the possibility of using personal ECG signals as the individually unique source for physical unclonable function (PUF), which eventually can be used as the key for encryption and decryption engines. We present new signal processing and machine learning algorithms that learn and extract maximally different ECG features for different individuals and minimally different ECG features for the same individual over time. Experimental results with a large 741-subject in-house ECG database show that the distributions of the intra-subject (same person) Hamming distance of extracted ECG features and the inter-subject Hamming distance have minimal overlap. 256-b random numbers generated from the ECG features of 648 (out of 741) subjects pass the NIST randomness tests.

  8. Alignment of Organizational Security Policies -- Theory and Practice

    NARCIS (Netherlands)

    Dimkov, T.

    2012-01-01

    To address information security threats, an organization defines security policies that state how to deal with sensitive information. These policies are high-level policies that apply for the whole organization and span the three security domains: physical, digital and social. One example of a

  9. Security of practical quantum key distribution systems

    Energy Technology Data Exchange (ETDEWEB)

    Jain, Nitin

    2015-02-24

    This thesis deals with practical security aspects of quantum key distribution (QKD) systems. At the heart of the theoretical model of any QKD system lies a quantum-mechanical security proof that guarantees perfect secrecy of messages - based on certain assumptions. However, in practice, deviations between the theoretical model and the physical implementation could be exploited by an attacker to break the security of the system. These deviations may arise from technical limitations and operational imperfections in the physical implementation and/or unrealistic assumptions and insufficient constraints in the theoretical model. In this thesis, we experimentally investigate in depth several such deviations. We demonstrate the resultant vulnerabilities via proof-of-principle attacks on a commercial QKD system from ID Quantique. We also propose countermeasures against the investigated loopholes to secure both existing and future QKD implementations.

  10. Unconditionally Secure and Universally Composable Commitments from Physical Assumptions

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Scafuro, Alessandra

    2013-01-01

    We present a constant-round unconditional black-box compiler that transforms any ideal (i.e., statistically-hiding and statistically-binding) straight-line extractable commitment scheme, into an extractable and equivocal commitment scheme, therefore yielding to UC-security [9]. We exemplify the u...... of unconditional UC-security with (malicious) PUFs and stateless tokens, our compiler can be instantiated with any ideal straight-line extractable commitment scheme, thus allowing the use of various setup assumptions which may better fit the application or the technology available....

  11. The role of the health physicist in nuclear security.

    Science.gov (United States)

    Waller, Edward J; van Maanen, Jim

    2015-04-01

    Health physics is a recognized safety function in the holistic context of the protection of workers, members of the public, and the environment against the hazardous effects of ionizing radiation, often generically designated as radiation protection. The role of the health physicist as protector dates back to the Manhattan Project. Nuclear security is the prevention and detection of, and response to, criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Its importance has become more visible and pronounced in the post 9/11 environment, and it has a shared purpose with health physics in the context of protection of workers, members of the public, and the environment. However, the duties and responsibilities of the health physicist in the nuclear security domain are neither clearly defined nor recognized, while a fundamental understanding of nuclear phenomena in general, nuclear or other radioactive material specifically, and the potential hazards related to them is required for threat assessment, protection, and risk management. Furthermore, given the unique skills and attributes of professional health physicists, it is argued that the role of the health physicist should encompass all aspects of nuclear security, ranging from input in the development to implementation and execution of an efficient and effective nuclear security regime. As such, health physicists should transcend their current typical role as consultants in nuclear security issues and become fully integrated and recognized experts in the nuclear security domain and decision making process. Issues regarding the security clearances of health physics personnel and the possibility of insider threats must be addressed in the same manner as for other trusted individuals; however, the net gain from recognizing and integrating health physics expertise in all levels of a nuclear security regime far

  12. Perspectives on the International and Internal Nuclear Security Regime

    International Nuclear Information System (INIS)

    Jang, Sung Soon

    2015-01-01

    The term, 'Nuclear Security' became more familiar to Korean public after the government hosted 2012 Seoul Nuclear Security Summit. Nuclear Security is prevention of, detection of and response to criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Nuclear Security includes physical protection, security of radioactive sources, nuclear forensics, nuclear smuggling prevention, border monitoring, and cyber security with regard to nuclear and other radiological materials. This abstract will review recent international trends and discuss the nuclear security regime in the Republic of Korea (ROK). The international Nuclear Security Regime has been strengthened. The upcoming Chicago Summit in 2016 and the entry into force of the Amendment of Convention on Physical Protection of Nuclear Materials (CPPNM) will bring major changes in nuclear security. The Republic of Korea hosted the 2012 Seoul Summit and strengthened domestic regime to meet international standards. The ROK has worked hard to contribute to the international security regime and to establish a robust domestic security regime against terrorist threats. Even if the nuclear security regime is robust, Risk-informed Nuclear Security management should be established to meet international standards and to implement effective as well as an efficient nuclear security regime

  13. Perspectives on the International and Internal Nuclear Security Regime

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Sung Soon [Korea Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    The term, 'Nuclear Security' became more familiar to Korean public after the government hosted 2012 Seoul Nuclear Security Summit. Nuclear Security is prevention of, detection of and response to criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Nuclear Security includes physical protection, security of radioactive sources, nuclear forensics, nuclear smuggling prevention, border monitoring, and cyber security with regard to nuclear and other radiological materials. This abstract will review recent international trends and discuss the nuclear security regime in the Republic of Korea (ROK). The international Nuclear Security Regime has been strengthened. The upcoming Chicago Summit in 2016 and the entry into force of the Amendment of Convention on Physical Protection of Nuclear Materials (CPPNM) will bring major changes in nuclear security. The Republic of Korea hosted the 2012 Seoul Summit and strengthened domestic regime to meet international standards. The ROK has worked hard to contribute to the international security regime and to establish a robust domestic security regime against terrorist threats. Even if the nuclear security regime is robust, Risk-informed Nuclear Security management should be established to meet international standards and to implement effective as well as an efficient nuclear security regime.

  14. Los grabados exteriores de Santo Adriano (Tuñón. Santo Adriano. Asturias

    Directory of Open Access Journals (Sweden)

    F.J. Fortea Pérez

    2005-01-01

    Full Text Available En este trabajo se dan a conocer los grabados exteriores de la cueva de Santo Adriano, que se comparan con grabados del mismo tipo existentes en la Región Cantábrica, a lo largo de una franja territorial de 220 km, entre las cuencas de los ríos Nalón al oeste y el Asón al este.

  15. Basic exterior characteristics of body and head in Bulgarian scent hound

    Directory of Open Access Journals (Sweden)

    Urošević Milivoje

    2014-01-01

    Full Text Available A group of dogs known as hounds is widespread and highly appreciated among the hunters on the Balkans. Hounds are referred to as hunting dogs that engage in loud pursuit of game along its trail. These dogs do not need to se the game in order to pursue it and begin to bark once they stumble upon game trail. First serious research along with zootechnical measurement was conducted in 1905, at which occasion three large groups of hounds that inhabit the Balkans were described. This undertaking provided a solid foundation for further research and standardization of certain hound breeds. Though a lot of field work and standardization efforts were undertaken since then, there are still groups of hounds not encompassed in previous research work that are well-spread on the field and frequently utilized as hunting companions. One of the variety among these non-standardized breeds are Bulgarian scent hound, which differ from described hound breeds by certain exterior characteristics. In this paper, processed and analyzed some of the basic exterior features of body and head of the Bulgarian Scent Hound. Measurements were performed in 21 males and 15 females of following parameters, the height at withers, back height, loin height, chest circumference, body length, head length, skull length, nozzle length, head width and nozzle width. The average height of males is 54.60 and female 51.73 cm. Head length of males, on average, was 23.95 cm and females 23, 53 cm.

  16. Solutions for Creating the Main Elements which Condition the Energy Consumption. Exterior Windows - Roof

    OpenAIRE

    Rubnicu, Alin

    2013-01-01

    The envelope of the building often has a complex geometry in which a multitude of different sub-assemblies can be identified. The envelope elements specific to roof areas can generally be of three types: walk and non-walk terrace roof as well as roof truss. The exterior joinery analysed is PVC type with four glass sheets.

  17. Global existence of solutions for semilinear damped wave equation in 2-D exterior domain

    Science.gov (United States)

    Ikehata, Ryo

    We consider a mixed problem of a damped wave equation utt-Δ u+ ut=| u| p in the two dimensional exterior domain case. Small global in time solutions can be constructed in the case when the power p on the nonlinear term | u| p satisfies p ∗=2Japon. 55 (2002) 33) plays an effective role.

  18. Revisitando la Política de Derechos Humanos de la Administración Carter: Entendiendo los Desafíos Tradicionales para la Política Exterior Contemporánea

    Directory of Open Access Journals (Sweden)

    Luis da Vinha

    2014-05-01

    Full Text Available La Administración Carter llegó al Gobierno con la intención de cambiar la lógica tradicional de la política exterior de los EE.UU., a saber mediante la promoción de una política exterior situada en un marco basado en los derechos humanos. El gobierno trató de hacer de los derechos humanos un elemento central de la política exterior de los EE.UU. al mismo tiempo buscando proteger los intereses nacionales de los Estados Unidos en el extranjero. Sin embargo, desde el principio, los críticos han considerado que la política de la Administración era incongruente e fluctuante debido a su incapacidad de comprender la complejidad en equilibrar muchas cuestiones inherentemente contradictorias. En este trabajo se analiza la política de derechos humanos del gobierno de Carter. Demuestra cómo la Administración reconoció la dificultad de conciliar las cuestiones morales y materiales en el desarrollo de su política exterior. Además, considera cómo la política de derechos humanos de los EE.UU. ha informado a la política exterior de los gobiernos posteriores. Se destaca la dinámica continua contribuyendo para las inconsistencias verificadas entre el discurso y el comportamiento de la política exterior.

  19. Nuclear Security in Action at Facilities in Ghana

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    Nuclear security is a national responsibility. An Integrated Nuclear Security Support Plan (INSSP) is a tool that enables States to address nuclear security in a comprehensive way and to strengthen its national nuclear security regime, beginning with the legislative and regulatory framework within a State. Operating areas in nuclear facilities like research reactors which use highly enriched uranium, require additional physical protection measures to ensure the security of the nuclear material and prevent acts of sabotage. Other radioactive materials, like sealed radioactive sources used in radiotherapy machines in hospitals for cancer treatment, need to be protected so that they are not stolen and used with malicious intent. Nuclear and other radioactive material needs to be kept in safe and secure storage, which incorporates various types of physical barriers to prevent theft and unauthorized access. Intrusion detection and assessment systems, like cameras and sensors, help to ensure timely and adequate responses to any security incident. Responding to a nuclear security incident, and mitigating its consequences, requires specialized equipment like isotope identifiers, and competent and well trained personnel. Nuclear Security Support Centres (NSSCs) focus on human resource development as well as technical and scientific support which contribute to the sustainability of nuclear security in a State

  20. Análisis de la política exterior rusa frente a Abjasia en el período 2000-2008

    OpenAIRE

    Ropero Santiago, Andrés Felipe

    2014-01-01

    El objetivo de la presente monografía de grado es analizar la relación entre la identidad dentro de Rusia y la política exterior de dicho Estado hacia la región de Abjasia. Se analiza y explica la manera en que los referentes identitarios dentro de Rusia en el periodo 2000-2008 influyen en las decisiones de política exterior que Rusia tomó hacia Abjasia en el campo militar y político. Se efectúa una revisión de textos (transcripciones de intervenciones y textos escritos) del Presidente ...

  1. Feature-based alert correlation in security systems using self organizing maps

    Science.gov (United States)

    Kumar, Munesh; Siddique, Shoaib; Noor, Humera

    2009-04-01

    The security of the networks has been an important concern for any organization. This is especially important for the defense sector as to get unauthorized access to the sensitive information of an organization has been the prime desire for cyber criminals. Many network security techniques like Firewall, VPN Concentrator etc. are deployed at the perimeter of network to deal with attack(s) that occur(s) from exterior of network. But any vulnerability that causes to penetrate the network's perimeter of defense, can exploit the entire network. To deal with such vulnerabilities a system has been evolved with the purpose of generating an alert for any malicious activity triggered against the network and its resources, termed as Intrusion Detection System (IDS). The traditional IDS have still some deficiencies like generating large number of alerts, containing both true and false one etc. By automatically classifying (correlating) various alerts, the high-level analysis of the security status of network can be identified and the job of network security administrator becomes much easier. In this paper we propose to utilize Self Organizing Maps (SOM); an Artificial Neural Network for correlating large amount of logged intrusion alerts based on generic features such as Source/Destination IP Addresses, Port No, Signature ID etc. The different ways in which alerts can be correlated by Artificial Intelligence techniques are also discussed. . We've shown that the strategy described in the paper improves the efficiency of IDS by better correlating the alerts, leading to reduced false positives and increased competence of network administrator.

  2. IAEA Completes Nuclear Security Review Mission in Indonesia

    International Nuclear Information System (INIS)

    2014-01-01

    A team of International Atomic Energy Agency (IAEA) experts today completed a two-week mission to review nuclear security practices in Indonesia. At the request of the Indonesian Government, the IAEA conducted an International Physical Protection Advisory Service (IPPAS) mission that reviewed the current status of the State's Physical Protection Regime of nuclear and other radioactive material, as well as associated facilities and activities in Indonesia. This included the country's nuclear security-related legislative and regulatory framework and the physical protection systems at the nuclear research sites in Serpong, Bandung and Yogyakarta, as well as radioactive facilities at Bekasi and Cibitung. The mission also reviewed how the recommendations of previous IPPAS missions in 2001 and 2007 had been implemented. The IPPAS team concluded that, since the last missions, Indonesia has improved its national security regime, especially its legislation and regulations, and had introduced new physical protection equipment. It also found that areas remained that required attention and efforts were needed to reach an overall comprehensive and effective nuclear security regime. The team made a number of new recommendations and suggestions aimed at further strengthening the overall regime

  3. Best Practices for the Security of Radioactive Materials

    Energy Technology Data Exchange (ETDEWEB)

    Coulter, D.T.; Musolino, S.

    2009-05-01

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices

  4. Best Practices for the Security of Radioactive Materials

    International Nuclear Information System (INIS)

    Coulter, D.T.; Musolino, S.

    2009-01-01

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass

  5. Game Based Cyber Security Training: are Serious Games suitable for cyber security training?

    Directory of Open Access Journals (Sweden)

    Maurice Hendrix

    2016-03-01

    Full Text Available Security research and training is attracting a lot of investment and interest from governments and the private sector. Most efforts have focused on physical security, while cyber security or digital security has been given less importance. With recent high-profile attacks it has become clear that training in cyber security is needed. Serious Games have the capability to be effective tools for public engagement and behavioural change and role play games, are already used by security professionals. Thus cyber security seems especially well-suited to Serious Games. This paper investigates whether games can be effective cyber security training tools. The study is conducted by means of a structured literature review supplemented with a general web search.While there are early positive indications there is not yet enough evidence to draw any definite conclusions. There is a clear gap in target audience with almost all products and studies targeting the general public and very little attention given to IT professionals and managers. The products and studies also mostly work over a short period, while it is known that short-term interventions are not particularly effective at affecting behavioural change.

  6. Security issues in a parking facility.

    Science.gov (United States)

    Gutman, Abraham; Lew, I Paul

    2009-01-01

    Active security supported by passive security measures which are part of the physical design of a parking facility are essential to preventing crimes from happening wherever and whenever possible, the authors maintain. In the article, they focus on design elements which can be most effective in discouraging potential perpetrators.

  7. Physical health of patients with severe mental illness: an intervention on medium secure forensic unit.

    Science.gov (United States)

    Vasudev, Kamini; Thakkar, Pratish B; Mitcheson, Nicola

    2012-01-01

    Patients with severe mental illness (SMI) treated with antipsychotic medication are at increased risk of metabolic side-effects like weight gain, diabetes mellitus and dyslipidaemia. This study aims to examine the feasibility of maintaining a physical health monitoring sheet in patients' records and its impact on physical health of patients with SMI, over a period of one year. A physical health monitoring sheet was introduced in all the patients' records on a 15-bedded male medium secure forensic psychiatric rehabilitation unit, as a prompt to regularly monitor physical health parameters. An audit cycle was completed over a one year period. The data between baseline and re-audit were compared. At baseline, 80 per cent of the patients were identified as smokers, 80 per cent had increased body mass index (BMI) and 87 per cent had raised cardiovascular risk over the next ten years. Appropriate interventions were offered to address the risks. At re-audit, the physical health monitoring sheets were up to date in 100 per cent of patients' records. The serum lipids and cardiovascular risk over the next ten years reduced over time. No significant change was noted on the parameters including BMI, central obesity, high blood pressure and smoking status. This was a pilot study and was limited by the small sample size, male gender only and the specific nature of the ward. There is a need for improved access to physical health care in long-stay psychiatric settings. A more robust lifestyle modification programme is required to positively influence the physical health parameters in this cohort of patients. Introduction of a physical health monitoring sheet in patients' records led to regular screening of cardiovascular risks and subsequent increased prescribing of hypolipidaemic agents in individuals with severe mental illness.

  8. Evolution of nuclear security regulatory activities in Brazil

    International Nuclear Information System (INIS)

    Mello, Luiz A. de; Monteiro Filho, Joselio S.; Belem, Lilia M.J.; Torres, Luiz F.B.

    2009-01-01

    The changing of the world scenario in the last 15 years has increased worldwide the concerns about overall security and, as a consequence, about the nuclear and radioactive material as well as their associated facilities. Considering the new situation, in February 2004, the Brazilian National Nuclear Energy Commission (CNEN), decided to create the Nuclear Security Office. This Office is under the Coordination of Nuclear Safeguards and Security, in the Directorate for Safety, Security and Safeguards (Regulatory Directorate). Before that, security regulation issues were dealt in a decentralized manner, within that Directorate, by different licensing groups in specific areas (power reactors, fuel cycle facilities, radioactive facilities, transport of nuclear material, etc.). This decision was made in order to allow a coordinated approach on the subject, to strengthen the regulation in nuclear/radioactive security, and to provide support to management in the definition of institutional security policies. The CNEN Security Office develops its work based in the CNEN Physical Protection Regulation for Nuclear Operational Units - NE-2.01, 1996, the Convention on the Physical Protection of Nuclear Material and the IAEA Nuclear Security Series . This paper aims at presenting the activities developed and the achievements obtained by this new CNEN office, as well as identifying the issues and directions for future efforts. (author)

  9. 24 CFR 200.946 - Building product standards and certification program for exterior finish and insulation systems...

    Science.gov (United States)

    2010-04-01

    ... product standards and certification program for exterior finish and insulation systems, use of Materials... product, the administrator's validation mark and the manufacturer's certification of compliance with the... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Building product standards and...

  10. Report on Security 82

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    The 1982 trade fair Security 82 presented a variety of equipment and systems for protection and security in general. Apart from physical protection devices to prevent theft, a great number of fire protection devices, transmitting apparatus, locator systems, metal detectors, protective devices against signal interception, and complete alarm systems were exhibited and explained. By means of specifications and brief descriptions, sometimes with figures, predominantly passive and active infrared sensors, light and microwave sensors, ultrasound and microwave Doppler effect devices for indoor and outdoor physical protection, as well as other alarm systems and fire alarm systems or entry control systems are presented in this report. Design and functioning mode of the equipment presented are illustrated by explaining the fields of employment. (orig.) [de

  11. La continuidad del discurso neoconservador frente a la política exterior de la administración Obama

    Directory of Open Access Journals (Sweden)

    Manuel Iglesias

    2015-05-01

    Full Text Available A lo largo del pasado sexenio, la doctrina neoconservadora se ha convertido en la voz más beligerante contra la política exterior de la Administración Obama. Este artículo se propone analizar el contenido de la crítica neoconservadora, una crítica radical, pues no se limita a un disenso menor en torno a determinadas áreas temáticas o regionales de la política exterior estadounidense, sino que se presenta como un rechazo frontal tanto a sus fundamentos teóricos como a su implementación práctica. De este modo, se verá que el neoconservadurismo continúa firmemente apegado a sus principios, con un discurso que mantiene como eje su particular concepción del excepcionalismo americano. El neoconservadurismo sigue defendiendo la validez de sus ideas centrales y se reivindica como la mejor doctrina de política exterior posible para los EE.UU., la única adecuada para evitar su declive internacional y mantener el "orden mundial americano" en las próximas décadas. Ello nos permitirá observar cómo, pese a su actual falta de influencia política, el mismo sigue gozando de una vitalidad que contradice las recurrentes afirmaciones sobre su desaparición.

  12. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  13. DTIC Review: Biometric Security

    National Research Council Canada - National Science Library

    2007-01-01

    ...: Biometrics, the study of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits, is a critical tool used in law enforcement, computer security and homeland defense...

  14. Política exterior española: El juego europeo de España

    Directory of Open Access Journals (Sweden)

    Nieva Machín

    2011-10-01

    Full Text Available España tradicionalmente ha sido un miembro activo dentro de la unión Europea con un profundo carácter europeísta. Sin embargo los intereses de España están cada vez más distanciados de los de la corriente principal. La política exterior española carece de rumbo marcado y objetivos concretos establecidos y consensuados siendo ya más que evidente la carencia de una reflexión estratégica sobre qué se quiere lograr en Europa y como se quiere hacer. La falta de iniciativas y la pérdida de peso político de España en Europa y en el mundo, tras los efectos de la crisis económica y la indecisión gubernamental al respecto, ha afectado negativamente la imagen internacional de España como potencia media limitando su capacidad de influencia internacional. España está todavía a tiempo de reconducir su política exterior hacia Europa si se toman las medidas oportunas.

  15. Estudios de caso de la política exterior española hacia el Mundo Árabe y Musulmán: Egipto

    Directory of Open Access Journals (Sweden)

    Bárbara Azaola Piazza

    2012-06-01

    Full Text Available Este artículo se basa en el análisis de una serie de nuevos indicadores en el estudio de las relaciones exteriores españolas hacia Egipto. Los datos que aporta la Base de Datos sobre Política Exterior (BDPEX destacan la importancia de Egipto en la política exterior española. La presencia histórica española en el país a través de su red de representaciones en el exterior, el número de representantes españoles residentes en el país, el intercambio de visitas de alto nivel, la firma de convenios y tratados, las cifras económicas, la aportación española a la cooperación internacional y la presencia egipcia en el debate parlamentario español así lo demuestran. This article is based on the analysis of a series of new indicators in the study of Spanish foreign relations with Egypt. The data provided by the BDPEX emphasize the centrality of Egypt in Spanish foreign policy. The Spanish historical presence in the country through its network of offices abroad, the number of Spanish representatives resident in the country, the exchange of high level visits, the signing of agreements and treaties, economic data, the Spanish contribution to international cooperation and the Egyptian presence in the Spanish parliamentary debate are used as evidence.

  16. The secure heating reactor

    International Nuclear Information System (INIS)

    Pind, C.

    1987-01-01

    The SECURE heating reactor was designed by ASEA-ATOM as a realistic alternative for district heating in urban areas and for supplying heat to process industries. SECURE has unique safety characteristics, that are based on fundamental laws of physics. The safety does not depend on active components or operator intervention for shutdown and cooling of the reactor. The inherent safety characteristics of the plant cannot be affected by operator errors. Due to its very low environment impact, it can be sited close to heat consumers. The SECURE heating reactor has been shown to be competitive in comparison with other alternatives for heating Helsinki and Seoul. The SECURE heating reactor forms a basis for the power-producing SECURE-P reactor known as PIUS (Process Inherent Ultimate Safety), which is based on the same inherent safety principles. The thermohydraulic function and transient response have been demonstrated in a large electrically heated loop at the ASEA-ATOM laboratories

  17. Security bingo for administrators

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Have you ever thought about the security of your service(s) or system(s)? Show us and win one of three marvellous books on computer security! Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us at Computer.Security@cern.ch or P.O. Box G19710, by November 14th 2011.   Winners[1] must show us that they follow at least five good practices in a continuous horizontal row, vertical column or diagonal. For details on CERN Computer Security, please consult http://cern.ch/security. My service or system…   …is following a software development life-cycle. …is patched in an automatic and timely fashion. …runs a tightened local ingress/egress firewall. …uses CERN Single-Sign-On (SSO). …has physical access protections in place. …runs all processes / services / applications with least privileges. …has ...

  18. Dimensión social de la publicidad exterior

    Directory of Open Access Journals (Sweden)

    Lic. Marta Pacheco Rueda

    1998-01-01

    Full Text Available La publicidad exterior moderna nace en España a principios de los años 60, en un período en que desde el gobierno se acomete una serie de iniciativas tendentes a reactivar la economía del país. La incipiente apertura económica no es desaprovechada por grandes firmas internacionales que aumentan sus inversiones e introducen en el mercado español productos con una larga tradición de consumo en los países occidentales industrializados. Se produce el asentamiento definitivo de las agencias multinacionales de publicidad, de procedencia norteamericana sobre todo, que traen consigo técnicas que responden a una filosofía de marketing, término que si en aquel momento resulta un tanto extraño, con el paso de los años se convierte en un vocablo de uso extendido.

  19. 3D Imaging with Structured Illumination for Advanced Security Applications

    Energy Technology Data Exchange (ETDEWEB)

    Birch, Gabriel Carisle [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Dagel, Amber Lynn [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Kast, Brian A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Smith, Collin S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    Three-dimensional (3D) information in a physical security system is a highly useful dis- criminator. The two-dimensional data from an imaging systems fails to provide target dis- tance and three-dimensional motion vector, which can be used to reduce nuisance alarm rates and increase system effectiveness. However, 3D imaging devices designed primarily for use in physical security systems are uncommon. This report discusses an architecture favorable to physical security systems; an inexpensive snapshot 3D imaging system utilizing a simple illumination system. The method of acquiring 3D data, tests to understand illumination de- sign, and software modifications possible to maximize information gathering capability are discussed.

  20. Physical protection solutions for security problems at nuclear power plants

    International Nuclear Information System (INIS)

    Darby, J.L.; Jacobs, J.

    1980-09-01

    Under Department of Energy sponsorship, Sandia National Laboratories has developed a broad technological base of components and integrated systems to address security concerns at facilities of importance, including nuclear reactors. The primary security concern at a light water reactor is radiological sabotage, a deliberate set of actions at a plant which could expose the public to a significant amount of radiation (on the order of 10 CFR 100 limits)

  1. IAEA Completes Nuclear Security Advisory Mission in France

    International Nuclear Information System (INIS)

    2018-01-01

    An International Atomic Energy Agency (IAEA) team of experts today completed a nuclear security advisory mission in France. The mission was carried out at the request of the French Government. The scope of the two-week International Physical Protection Advisory Service (IPPAS) follow-up mission included France’s responses to the recommendations of the initial mission in 2011, the regulatory framework for the security of nuclear material and facilities as well as computer security. The IPPAS team also reviewed the country’s implementation of the 2005 Amendment to the Convention on the Physical Protection of Nuclear Material (CPPNM). As part of the review, the team visited the Georges Besse II uranium enrichment plant at the Tricastin nuclear site in Pierrelatte, south-eastern France. The team observed that the nuclear security regime in France is robust and well-established, and incorporates the fundamental principles of the amended CPPNM. The team provided recommendations and suggestions to support France in enhancing and sustaining nuclear security. Good practices were identified that can serve as examples to other IAEA Member States to help strengthen their nuclear security activities.

  2. Generación de un nuevo revestimiento arquitectónico, a partir del grafeno, aplicado a las pinturas exteriores de los edificios

    OpenAIRE

    Peña Benítez, Pedro Rafael de la

    2017-01-01

    En este trabajo, realizado para optar al grado de doctor, se investigan las posibilidades que ofrece la nanotecnología en la arquitectura a través de la aplicación del grafeno en las pinturas exteriores que actualmente se utilizan en la construcción. Mediante la experimentación y el análisis de los procesos es posible demostrar que el grafeno es un revestimiento arquitectónico que mejora las propiedades mecánicas y de durabilidad de las pinturas exteriores. Los objetivos de esta investigación...

  3. Meshes optimized for discrete exterior calculus (DEC).

    Energy Technology Data Exchange (ETDEWEB)

    Mousley, Sarah C. [Univ. of Illinois, Urbana-Champaign, IL (United States); Deakin, Michael [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Knupp, Patrick [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mitchell, Scott A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-12-01

    We study the optimization of an energy function used by the meshing community to measure and improve mesh quality. This energy is non-traditional because it is dependent on both the primal triangulation and its dual Voronoi (power) diagram. The energy is a measure of the mesh's quality for usage in Discrete Exterior Calculus (DEC), a method for numerically solving PDEs. In DEC, the PDE domain is triangulated and this mesh is used to obtain discrete approximations of the continuous operators in the PDE. The energy of a mesh gives an upper bound on the error of the discrete diagonal approximation of the Hodge star operator. In practice, one begins with an initial mesh and then makes adjustments to produce a mesh of lower energy. However, we have discovered several shortcomings in directly optimizing this energy, e.g. its non-convexity, and we show that the search for an optimized mesh may lead to mesh inversion (malformed triangles). We propose a new energy function to address some of these issues.

  4. Lie Symmetry Analysis of the Inhomogeneous Toda Lattice Equation via Semi-Discrete Exterior Calculus

    International Nuclear Information System (INIS)

    Liu Jiang; Wang Deng-Shan; Yin Yan-Bin

    2017-01-01

    In this work, the Lie point symmetries of the inhomogeneous Toda lattice equation are obtained by semi-discrete exterior calculus, which is a semi-discrete version of Harrison and Estabrook’s geometric approach. A four-dimensional Lie algebra and its one-, two- and three-dimensional subalgebras are given. Two similarity reductions of the inhomogeneous Toda lattice equation are obtained by using the symmetry vectors. (paper)

  5. Polychlorinated biphenyls in the exterior caulk of San Francisco Bay Area buildings, California, USA.

    Science.gov (United States)

    Klosterhaus, Susan; McKee, Lester J; Yee, Donald; Kass, Jamie M; Wong, Adam

    2014-05-01

    Extensive evidence of the adverse impacts of polychlorinated biphenyls (PCBs) to wildlife, domestic animals, and humans has now been documented for over 40 years. Despite the ban on production and new use of PCBs in the United States in 1979, a number of fish consumption advisories remain in effect, and there remains considerable uncertainty regarding ongoing environmental sources and management alternatives. Using a blind sampling approach, 25 caulk samples were collected from the exterior of ten buildings in the San Francisco Bay Area and analyzed for PCBs using congener-specific gas chromatography-mass spectrometry (GC-MS) and chlorine using portable X-ray fluorescence (XRF). PCBs were detected in 88% of the caulk samples collected from the study area buildings, with 40% exceeding 50 ppm. Detectable PCB concentrations ranged from 1 to 220,000 ppm. These data are consistent with previous studies in other cities that have identified relatively high concentrations of PCBs in concrete and masonry buildings built between 1950 and 1980. Portable XRF was not a good predictor of the PCB content in caulk and the results indicate that portable XRF analysis may only be useful for identifying caulk that contains low concentrations of Cl (≤ 10,000 ppm) and by extension low or no PCBs. A geographic information system-based approach was used to estimate that 10,500 kg of PCBs remain in interior and exterior caulk in buildings located in the study area, which equates to an average of 4.7 kg PCBs per building. The presence of high concentrations in the exterior caulk of currently standing buildings suggests that building caulk may be an ongoing source of PCBs to the San Francisco Bay Area environment. Further studies to expand the currently small international dataset on PCBs in caulking materials in buildings of countries that produced or imported PCBs appear justified in the context of both human health and possible ongoing environmental release. Copyright © 2014 Elsevier

  6. Networks and network analysis for defence and security

    CERN Document Server

    Masys, Anthony J

    2014-01-01

    Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic

  7. Security-by-design handbook.

    Energy Technology Data Exchange (ETDEWEB)

    Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

    2013-01-01

    This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

  8. Comercio exterior del sector porcino mexicano

    Directory of Open Access Journals (Sweden)

    Encarnación Ernesto Bobadilla-Soto

    2012-01-01

    Full Text Available El objetivo del presente trabajo fue analizar la dinámica del comercio exterior porcino mexicano, y el efecto de las importaciones de productos porcinos en el desplazamiento y sustitución de la producción en México. Para la dinámica se analizaron las tasas de crecimiento (decremento y las variaciones tanto en volumen y valor del subsector, de las fracciones arancelarias agrupadas en dos grandes rubros: a animales vivos y b carnes y despojos comestibles, que tienen un impacto directo en el desplazamiento y sustitución de la producción nacional. El desplazamiento y sustitución se calcularon con la suma de los valores de las importaciones, su relación con los pesos en canal de los animales durante los años analizados, y su equivalente en porcentaje a número de animales. El estudio comprende de 1990 a 2008. La balanza comercial al inicio del estudio fue de -180 mil toneladas equivalente a 1.4 millones de cerdos desplazados y al 13 % de la producción nacional. Para el 2008, la balanza comercial fue -581 mil toneladas, los cerdos desplazados se incrementaron a 5.9 millones equivalente al 39 % de la producción nacional.

  9. Developing Scalable Information Security Systems

    Directory of Open Access Journals (Sweden)

    Valery Konstantinovich Ablekov

    2013-06-01

    Full Text Available Existing physical security systems has wide range of lacks, including: high cost, a large number of vulnerabilities, problems of modification and support system. This paper covers an actual problem of developing systems without this list of drawbacks. The paper presents the architecture of the information security system, which operates through the network protocol TCP/IP, including the ability to connect different types of devices and integration with existing security systems. The main advantage is a significant increase in system reliability, scalability, both vertically and horizontally, with minimal cost of both financial and time resources.

  10. Optical security based on near-field processes at the nanoscale

    International Nuclear Information System (INIS)

    Naruse, Makoto; Tate, Naoya; Ohtsu, Motoichi

    2012-01-01

    Optics has been playing crucial roles in security applications ranging from authentication and watermarks to anti-counterfeiting. However, since the fundamental physical principle involves optical far-fields, or propagating light, diffraction of light causes severe difficulties, for example in device scaling and system integration. Moreover, conventional security technologies in use today have been facing increasingly stringent demands to safeguard against threats such as counterfeiting of holograms, requiring innovative physical principles and technologies to overcome their limitations. Nanophotonics, which utilizes interactions between light and matter at the nanometer scale via optical near-field interactions, can break through the diffraction limit of conventional propagating light. Moreover, nanophotonics has some unique physical attributes, such as localized optical energy transfer and the hierarchical nature of optical near-field interactions, which pave the way for novel security functionalities. This paper reviews the physical principles and describes some experimental demonstrations of systems based on nanophotonics with respect to security applications such as tamper resistance against non-invasive and invasive attacks, hierarchical information retrieval, hierarchical holograms, authentication, and traceability. (paper)

  11. Portunes: representing attack scenarios spanning through the physical, digital and social domain

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    The security goals of an organization are realized through security policies, which concern physical security, digital security and security awareness. An insider is aware of these security policies, and might be able to thwart the security goals by combining physical, digital and social means. A

  12. Secure Multiparty Quantum Computation for Summation and Multiplication.

    Science.gov (United States)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-21

    As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics.

  13. Electron-helium scattering in the S-wave model using exterior complex scaling

    International Nuclear Information System (INIS)

    Horner, Daniel A.; McCurdy, C. William; Rescigno, Thomas N.

    2004-01-01

    Electron-impact excitation and ionization of helium is studied in the S-wave model. The problem is treated in full dimensionality using a time-dependent formulation of the exterior complex scaling method that does not involve the solution of large linear systems of equations. We discuss the steps that must be taken to compute stable ionization amplitudes. We present total excitation, total ionization and single differential cross sections from the ground and n=2 excited states and compare our results with those obtained by others using a frozen-core model

  14. 17 CFR 450.4 - Custodial holdings of government securities.

    Science.gov (United States)

    2010-04-01

    ... securities as of the close of business upon the instruction of such broker or dealer, it shall send a... depository institution's control or direction that are not in its physical possession, where the securities... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Custodial holdings of...

  15. Building America Case Study: Construction Guidelines for High R-Value Walls without Exterior Rigid Insulation, Cold Climate Region

    Energy Technology Data Exchange (ETDEWEB)

    2017-01-01

    High-R wall assemblies (R-40 and above) are gaining popularity in the market due to programs like the DOE's Zero Energy Ready Home program, Passive House (PH), Net Zero Energy Home (NZEH) challenges in several states, and highly incentivized retrofit programs. In response to this demand, several builders have successfully used 'double wall' systems to more practically achieve higher R-values in thicker, framed walls. To builders of conventional stick-framed homes, often one of the most appealing features of double wall systems is that there are very few new exterior details. Exterior sheathing, structural bracing, house wrap or building paper, window and door flashing, and siding attachment are usually identical to good details in conventional framed wall systems. The information presented in this guide is intended to reduce the risk of failure in these types of assemblies, increase durability, and result in a reduction of material brought to landfills due to failures and resulting decay. While this document focuses on double wall framing techniques, the majority of the information on how to properly construct and finish high R-value assemblies is applicable to all wall assemblies that do not have foam insulation installed on the exterior of the structural sheathing. The techniques presented have been shown through field studies to reduce the likelihood of mold growth and moisture related damage and are intended for builders, framing contractors, architects, and consultants involved in designing and building super insulated homes.

  16. Control system security in nuclear power plant

    International Nuclear Information System (INIS)

    Li Jianghai; Huang Xiaojin

    2012-01-01

    The digitalization and networking of control systems in nuclear power plants has brought significant improvements in system control, operation and maintenance. However, the highly digitalized control system also introduces additional security vulnerabilities. Moreover, the replacement of conventional proprietary systems with common protocols, software and devices makes these vulnerabilities easy to be exploited. Through the interaction between control systems and the physical world, security issues in control systems impose high risks on health, safety and environment. These security issues may even cause damages of critical infrastructures and threaten national security. The importance of control system security by reviewing several control system security incidents that happened in nuclear power plants was showed in recent years. Several key difficulties in addressing these security issues were described. Finally, existing researches on control system security and propose several promising research directions were reviewed. (authors)

  17. Printable, scannable biometric templates for secure documents and materials

    Science.gov (United States)

    Cambier, James L.; Musgrave, Clyde

    2000-04-01

    Biometric technology has been widely acknowledged as an effective means for enhancing private and public security through applications in physical access control, computer and computer network access control, medical records protection, banking security, public identification programs, and others. Nearly all of these applications involve use of a biometric token to control access to a physical entity or private information. There are also unique benefits to be derived from attaching a biometric template to a physical entity such as a document, package, laboratory sample, etc. Such an association allows fast, reliable, and highly accurate association of an individual person's identity to the physical entity, and can be used to enhance security, convenience, and privacy in many types of transactions. Examples include authentication of documents, tracking of laboratory samples in a testing environment, monitoring the movement of physical evidence within the criminal justice system, and authenticating the identity of both sending and receiving parties in shipment of high value parcels. A system is described which combines a biometric technology based on iris recognition with a printing and scanning technology for high-density bar codes.

  18. 10 CFR 95.21 - Withdrawal of requests for facility security clearance.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Withdrawal of requests for facility security clearance. 95.21 Section 95.21 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Physical Security § 95.21 Withdrawal of...

  19. International Efforts for the Nuclear Security

    International Nuclear Information System (INIS)

    Yoo, Ho Sik; Kwak, Sung Woo; Lee, Ho Jin; Shim, Hye Won; Lee, Jong Uk

    2005-01-01

    Many concerns have been focused on the nuclear security since the 9.11. With increasing the threat related to nuclear material and nuclear facilities, the demand of strengthening the international physical protection system has been raised. Along with this, the international communities are making their efforts to increase nuclear security. The agreement of revising the 'Convention on Physical Protection of Nuclear Materials'(hereafter, CPPNM), which was held in Vienna on the July of 2005, was one of these efforts. U.N is also preparing the 'International Convention for the Suppression of Acts of Nuclear Terrorism' to show its firm resolution against nuclear terror. It is important to understand what measures should be taken to meet the international standard for establishing national physical protection system. To do this, international trend on the physical protection system such as CPPNM and U.N. convention should be followed. This paper explains about the content of the CPPNM and U.N convention. They will be helpful to consolidate the physical protection system in Korea

  20. Nuclear security assessment with Markov model approach

    International Nuclear Information System (INIS)

    Suzuki, Mitsutoshi; Terao, Norichika

    2013-01-01

    Nuclear security risk assessment with the Markov model based on random event is performed to explore evaluation methodology for physical protection in nuclear facilities. Because the security incidences are initiated by malicious and intentional acts, expert judgment and Bayes updating are used to estimate scenario and initiation likelihood, and it is assumed that the Markov model derived from stochastic process can be applied to incidence sequence. Both an unauthorized intrusion as Design Based Threat (DBT) and a stand-off attack as beyond-DBT are assumed to hypothetical facilities, and performance of physical protection and mitigation and minimization of consequence are investigated to develop the assessment methodology in a semi-quantitative manner. It is shown that cooperation between facility operator and security authority is important to respond to the beyond-DBT incidence. (author)

  1. Security challenges for virtualization in cloud

    International Nuclear Information System (INIS)

    Tayab, A.

    2015-01-01

    Virtualization is a model that is vastly growing in IT industry. Virtualization provides more than one logical resource in one single physical machine. Infrastructure use cloud services and on behalf of virtualization, cloud computing is also a rapidly growing model of IT industry. Cloud provider and cloud user, both remain ignorant of each other's security. Since virtualization and cloud computing are rapidly expanding and becoming more and more complex in infrastructure, more security is required to protect them from potential attacks and security threats. Virtualization provides various benefits in terms of hardware utilization, resources protection, remote access and other resources. This paper intends to discuss the common exploits of security uses in the virtualized environment and focuses on the security threats from the attacker's perspective. This paper discuss the major areas of virtualized model environment and also address the security concerns. And finally presents a solution for secure valorization in IT infrastructure and to protect inter communication of virtual machines. (author)

  2. Energy decay for solutions to semilinear systems of elastic waves in exterior domains

    Directory of Open Access Journals (Sweden)

    Marcio V. Ferreira

    2006-05-01

    Full Text Available We consider the dynamical system of elasticity in the exterior of a bounded open domain in 3-D with smooth boundary. We prove that under the effect of "weak" dissipation, the total energy decays at a uniform rate as $t o +infty$, provided the initial data is "small" at infinity. No assumptions on the geometry of the obstacle are required. The results are then applied to a semilinear problem proving global existence and decay for small initial data.

  3. Histopathologic changes induced in rats by localized x-irradiation of an exteriorized segment of the small intestine

    Energy Technology Data Exchange (ETDEWEB)

    Sebes, J I; Zaldivar, R; Vogel, Jr, H H [Tennessee Univ., Memphis (USA). Dept. of Radiation Oncology; Tennessee Univ., Memphis (USA). Dept. of Diagnostic Radiology)

    1975-10-01

    The sequence of histopathological changes was described after X-irradiation of the exteriorized segment (3 cm) of the rat ileum with a single dose of 2,200 R. A one-year follow-up was provided in rats whose exteriorized intestinal segments were irradiated. Comparisons were made between one group of animals in which the superior mesenteric artery and vein were clamped during irradiation and a second group in which these vessels were not clamped. A third group of sham-irradiated controls was used for comparisons. There was a delay in the onset and progression of the radiation damage to the mucosa of the hypoxic animals in the acute post-irradiation phase. In addition, prolongation of survival in the rats with the superior mesenteric vessels clamped was observed. Mucosal regeneration was noted, occurring at 52 days post-exposure. No adenocarcinomas were found up to 354 days after irradiation. An angiofibroma and a highly differentiated osteoid lesion were described.

  4. Attacks on Heartbeat-Based Security Using Remote Photoplethysmography.

    Science.gov (United States)

    Seepers, Robert Mark; Wang, Wenjin; de Haan, Gerard; Sourdis, Ioannis; Strydis, Christos

    2018-05-01

    The time interval between consecutive heartbeats (interpulse interval, IPI) has previously been suggested for securing mobile-health solutions. This time interval is known to contain a degree of randomness, permitting the generation of a time- and person-specific identifier. It is commonly assumed that only devices trusted by a person can make physical contact with him/her, and that this physical contact allows each device to generate a similar identifier based on its own cardiac recordings. Under these conditions, the identifiers generated by different trusted devices can facilitate secure authentication. Recently, a wide range of techniques have been proposed for measuring heartbeats remotely, a prominent example of which is remote photoplethysmography (rPPG). These techniques may pose a significant threat to heartbeat-based security, as an adversary may pretend to be a trusted device by generating a similar identifier without physical contact, thus bypassing one of the core security conditions. In this paper, we assess the feasibility of such remote attacks using state-of-the-art rPPG methods. Our evaluation shows that rPPG has similar accuracy as contact PPG and, thus, forms a substantial threat to heartbeat-based-security systems that permit trusted devices to obtain their identifiers from contact PPG recordings. Conversely, rPPG cannot obtain an accurate representation of an identifier generated from electrical cardiac signals, making the latter invulnerable to state-of-the-art remote attacks.

  5. Compare the difference of architecture design in Hong Kong and Penang – Exterior wall

    Directory of Open Access Journals (Sweden)

    Liu Wen Tao

    2015-12-01

    Full Text Available This research focuses on the exterior wall of architecture design of Hong Kong and Penang, it also analyzes how light pollution affects human life. As we know, Hong Kong prefers to use steel to build skyscrapers and middle or high rise buildings. However, Penang prefers to use concrete to do the construction. So, there are some advantages and disadvantages between the glass curtain wall and concrete wall in Hong Kong and Penang. The researcher used 400 samples to determine effect of the glass curtain wall and concrete wall on human life in Hong Kong and Penang separately. The result is light pollution created by glass curtain wall in Hong Kong is a serious problem to residents’ life. The glass curtain wall seriously glaze people’s eyes who drive or walk on the street. Thus, many car accidents were caused by this problem. The concrete wall is more often contaminated by fungus and difficult to clean. But, concrete wall is more natural and green for humans. Therefore, from the sustainable aspect that concrete is more healthy for humans, the previous researchers suggest that if the exterior wall is a mixture of both glass curtain and concrete it will not cause light pollution and will be easily involved in the natural environment.

  6. Covariant differential calculus on the quantum exterior vector space

    International Nuclear Information System (INIS)

    Parashar, P.; Soni, S.K.

    1992-01-01

    We formulate a differential calculus on the quantum exterior vector space spanned by the generators of a non-anticommutative algebra satisfying r ij = θ i θ j +B kl ij θ k θ l =0 i, j=1, 2, ..., n. and (θ i ) 2 =(θ j ) 2 =...=(θ n ) 2 =0, where B kl ij is the most general matrix defined in terms of complex deformation parameters. Following considerations analogous to those of Wess and Zumino, we are able to exhibit covariance of our calculus under ( 2 n )+1 parameter deformation of GL(n) and explicitly check that the non-anticommutative differential calculus satisfies the general constraints given by them, such as the 'linear' conditions dr ij ≅0 and the 'quadratic' condition r ij x n ≅0 where x n =dθ n are the differentials of the variables. (orig.)

  7. Secure Communications over Wireless Networks Even 1-bit Feedback Helps Achieving Security

    KAUST Repository

    Rezki, Zouheir

    2016-01-06

    Recently, there have been a surge toward developing sophisticated security mechanisms based on a cross layer design. While an extensive progress has been realized toward establishing physical layer security as an important design paradigm to enhance security of existing wireless networks, only a little effort has been made toward designing practical coding schemes that achieve or approach the secrecy capacity. Most of existing results are tied to some simplifying assumptions that do not seem always reasonable (passive eavesdropper, perfect channel state information (CSI), etc.). Furthermore, it is still not very clear how to exploit physical layer security paradigms, together with existing cryptosystems, in order to add a supplementary level of protection for information transmission or to achieve key agreement. In this talk, we address the first part of the above problematic, i.e., the effect of channel uncertainty on network security. Particularly, we show that even a coarse estimate of the main channel (channel between the transmitter and the legitimate receiver) can help providing a positive secrecy rate. Specifically, we assume two types of channel uncertainty at the transmitter. The first one is a rate-limited feedback in a block fading channel where the feedback information can be proactive (at the beginning of the coherence block) or of ARQ-type. The second type of uncertainty takes the form of a noisy estimate of the main channel at the transmitter in a fast fading channel. In both cases, we provide upper and lower bounds on the secrecy capacity. We argue how our achievable schemes and upper bounding techniques extend to multi-user setting (broadcasting a single confidential message or multiple confidential messages to multiple legitimate receivers) and to multiple antenna channels.

  8. Secure Communications over Wireless Networks Even 1-bit Feedback Helps Achieving Security

    KAUST Repository

    Rezki, Zouheir

    2016-01-01

    Recently, there have been a surge toward developing sophisticated security mechanisms based on a cross layer design. While an extensive progress has been realized toward establishing physical layer security as an important design paradigm to enhance security of existing wireless networks, only a little effort has been made toward designing practical coding schemes that achieve or approach the secrecy capacity. Most of existing results are tied to some simplifying assumptions that do not seem always reasonable (passive eavesdropper, perfect channel state information (CSI), etc.). Furthermore, it is still not very clear how to exploit physical layer security paradigms, together with existing cryptosystems, in order to add a supplementary level of protection for information transmission or to achieve key agreement. In this talk, we address the first part of the above problematic, i.e., the effect of channel uncertainty on network security. Particularly, we show that even a coarse estimate of the main channel (channel between the transmitter and the legitimate receiver) can help providing a positive secrecy rate. Specifically, we assume two types of channel uncertainty at the transmitter. The first one is a rate-limited feedback in a block fading channel where the feedback information can be proactive (at the beginning of the coherence block) or of ARQ-type. The second type of uncertainty takes the form of a noisy estimate of the main channel at the transmitter in a fast fading channel. In both cases, we provide upper and lower bounds on the secrecy capacity. We argue how our achievable schemes and upper bounding techniques extend to multi-user setting (broadcasting a single confidential message or multiple confidential messages to multiple legitimate receivers) and to multiple antenna channels.

  9. Modeling and simulation for cyber-physical system security research, development and applications.

    Energy Technology Data Exchange (ETDEWEB)

    Pollock, Guylaine M.; Atkins, William Dee; Schwartz, Moses Daniel; Chavez, Adrian R.; Urrea, Jorge Mario; Pattengale, Nicholas; McDonald, Michael James; Cassidy, Regis H.; Halbgewachs, Ronald D.; Richardson, Bryan T.; Mulder, John C.

    2010-02-01

    This paper describes a new hybrid modeling and simulation architecture developed at Sandia for understanding and developing protections against and mitigations for cyber threats upon control systems. It first outlines the challenges to PCS security that can be addressed using these technologies. The paper then describes Virtual Control System Environments (VCSE) that use this approach and briefly discusses security research that Sandia has performed using VCSE. It closes with recommendations to the control systems security community for applying this valuable technology.

  10. Estimation of exterior vertical daylight for the humid tropic of Kota Kinabalu city in East Malaysia

    Energy Technology Data Exchange (ETDEWEB)

    Djamila, Harimi; Ming, Chu Chi; Kumaresan, Sivakumar [School of Engineering and Information Technology, Universiti Malaysia Sabah, Locked Bag No. 2073, 88999 Kota Kinabalu, Sabah (Malaysia)

    2011-01-15

    In tropical regions natural daylight has been a fundamental factor in building design. It is the most efficient way of lighting a building in the daytime and has a great potential for energy conservation in buildings. In Malaysia there are a limited available data of measured illuminance which is the case of several regions in the tropics. Using established models it is possible to predict the luminous efficacy and then estimate the monthly mean hourly exterior illuminance. In this study two different models were chosen. The Perez and Du Mortier-Perraudeau-Page-Littlefair models were selected for the prediction of hourly exterior horizontal illuminance for the city of Kota Kinabalu in East Malaysia. Comparison between the two models were made. The vertical hourly illuminance was predicted also using Perez approach. The potentiality of daylight in four orientations was discussed. This study highlights the importance of Sunpath diagram on daylight illuminance during the conceptual design stage. The results in this study is hoped to contribute further insight into the potentiality of daylighting of tropical sky. (author)

  11. Difference in electron thermal diffusivity and profile between interior and exterior of TFTR L-mode plasmas

    International Nuclear Information System (INIS)

    Hiroe, S.; Johnson, D.W.; Goldston, R.J.

    1990-01-01

    The local properties such as scale lengths of the electron density (L n e ), temperature (L T e ), and pressure (L p e ), and the electron thermal diffusivity χ e (r) (m 2 /s) for r/a > 0.3 have been studied for TFTR L-mode discharges under the assumption of χ e = χ i . The scale lengths and the electron thermal diffusivity in the interior 0.3 e can be expressed as (with correlation coefficient R = 0.61), χ e (r) = 1.44 x 10 18 (r/a) 1.0 T e (r) 0.1 q(r) 0.1 /n e 0.9 (r). In the exterior region (0.55 e can be described as (with R = 0.68), χ e (r) = 2.3 x 10 3 (r/a) 1.7 T e (r) 0.7 q(r) 0.8 /n e 0.2 (r). It is interesting to note the negative n e dependence of χ e in the interior and the positive T e dependence of χ e in the exterior

  12. BIOMETRIC SECURITY: ALTERNATIF PENGENDALIAN DALAM SISTEM INFORMASI AKUNTANSI TERKOMPUTERISASI

    Directory of Open Access Journals (Sweden)

    Josua Tarigan

    2004-01-01

    Full Text Available As organization search more secure authentication method for user access, biometric security technology is gaining more and more attention. The implementation of biometric security technology in accounting information systems was physical access, virtual access, e-commerce applications and covert suveillance. There are three phase when an organization implementation biometric technology: strategic planning and budgeting, developing a system reliability plan and documentation. The challenges will face when develop biometric technology as control in accounting information system are standardization, hybrid technology uses, life cycle management. Abstract in Bahasa Indonesia : Adanya keinginan setiap organisasi untuk mencari metode pengamanan authentication yang lebih untuk akses user, dijawab dengan adanya teknologi biometric security yang mendapat perhatian yang cukup besar bagi organisasi. Implementasi teknologi biometric security cukup luas dalam sistem informasi akuntansi yaitu sebagai pengendalian pada physical access, virtual access, e-commerce applications dan covert surveillance. Dalam mengimplementasikan teknologi biometric, ada tiga tahapan yang harus dilakukan organisasi, yakni strategic planning and budgeting, developing a system reliability plan dan documentation. Tantangan yang akan dihadapi dalam mengembangkan teknologi biometric sebagai pengendalian dalam sistem informasi akuntansi yakni standarisasi, aplikasi teknologi hybrid dan manajemen siklus hidup pada biometric security. Kata kunci: authentication, akses user dan biometric security.

  13. Integrated Life Cycle Energy and Greenhouse Gas Analysis of Exterior Wall Systems for Residential Buildings

    Directory of Open Access Journals (Sweden)

    Reza Broun

    2014-11-01

    Full Text Available This paper investigates the breakdown of primary energy use and greenhouse gas (GHG emissions of two common types of exterior walls in the U.K.: insulated concrete form (ICF and cavity walls. A comprehensive assessment was conducted to evaluate the environmental performance of each exterior wall system over 50 years of service life in Edinburgh and Bristol. The results indicate that for both wall systems, use phase is the major contributor to the overall environmental impacts, mainly due to associated electricity consumption. For the ICF wall system in Edinburgh, 91% of GHG emissions were attributed to the use phase, with 7.8% in the pre-use and 1.2% in end-of-life phases. For the same system in Bristol, emissions were 89%, 9% and 2%, respectively. A similar trend was observed for cavity wall systems in both locations. It was concluded that in each scenario, the ICF wall system performed better when compared to the cavity wall system. The results of the sensitivity analysis clearly show that the uncertainties relevant to the change of the thickness of the wall are quite tolerable: variable up to 5%, as far as energy and greenhouse emissions are concerned.

  14. Radioactive source security: the cultural challenges

    International Nuclear Information System (INIS)

    Englefield, Chris

    2015-01-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. (authors)

  15. Security for small computer systems a practical guide for users

    CERN Document Server

    Saddington, Tricia

    1988-01-01

    Security for Small Computer Systems: A Practical Guide for Users is a guidebook for security concerns for small computers. The book provides security advice for the end-users of small computers in different aspects of computing security. Chapter 1 discusses the security and threats, and Chapter 2 covers the physical aspect of computer security. The text also talks about the protection of data, and then deals with the defenses against fraud. Survival planning and risk assessment are also encompassed. The last chapter tackles security management from an organizational perspective. The bo

  16. Outsourcing as a Mean of Service for Security Provision

    Directory of Open Access Journals (Sweden)

    D.I. Persanov

    2012-03-01

    Full Text Available The article highlights the implementation of outsourcing as a mean of service for security provision. Analysis is performed to describe the current issues affecting the management decision in favor of outsourcing. Investigation covers the processes of physical, information and economical security. The main recommendations to use outsourcing for security provision are described in the conclusion.

  17. Las contradicciones entre las políticas interior y exterior en la Rumania de la Guerra Fría (1956-1975

    Directory of Open Access Journals (Sweden)

    María Dolores Ferrero Blanco

    2009-12-01

    Full Text Available Este artículo va a tratar del desarrollo paralelo de las políticas interior y exterior del gobierno rumano en la Guerra Fría. Para ello se ha utilizado documentación proveniente del Ministerio de Asuntos Exteriores y de la Hemeroteca Nacional. Se ha buscado contrastar la información proveniente de medios oficiales (informes de embajadores, cónsules o representantes comerciales con la ofrecida por los rumanos exiliados en España (principalmente a través de su publicación El Boletín Rumano. Asimismo, se han consultado los fondos de periódicos como Ya, ABC o Arriba. Como principal conclusión, se extrae que entre las políticas interior y exterior funcionó un mecanismo de retroalimentación que las completaba entre sí, apuntalando el régimen. Este mismo efecto fue provocado por las relaciones y contactos mantenidos por países del exterior del bloque.________________ABSTRACT:This article deals with the parallel development of domestic and foreign policy of the Rumanian government during the Cold War. For it, documentation of the Foreign Ministry and the National Hemeroteque has been used. The aim was to contrast the information coming from official sources (such as reports of ambassadors, consuls or sales representatives with attestations made by the Romanians exiled in Spain (principally thanks to their publication, called El Boletín Rumano. Likewise, the newspaper archives of Ya, ABC or Arriba have been consulted. The most important result, is that it is attested that there were a feedback mechanism between domestic and foreign policy which matched them, supporting the regime. The same effect was caused by relations and contacts with western countries.

  18. Extraperitoneal exteriorization for treatment of colonic injuries:a report of 24 cases

    Directory of Open Access Journals (Sweden)

    Lian-yang ZHANG

    2011-05-01

    Full Text Available Objective To investigate the effectiveness and safety of extraperitoneal exteriorization after repair or anastomosis of colonic injuries.Methods The clinical data of 24 cases of colonic injuries from Jan.2001 to Nov.2010 were retrospectively analyzed,including 13 males and 11 females,age from 12 to 77 with a mean of 37.4 years.The causes of colon injury were blunt trauma in 17 cases,penetrating injury in 5 cases,and iatrogenic in 2 cases.Of them 15 were admitted to our hospital directly after the injury,and the rest were transferred from other hospitals after emergency surgical management.Data on colonic injury score,incision infection,intra-abdominal abscess,colonic fistula,pulmonary infection and death rate were recorded.Results The injured region was respectively cecum,ascending colon,decending colon and sigmoid colon.Abbreviated injury scale(AIS of colonic injuries ranged form 2 to 4(with a mean of 2.57.Multiple injuries in abdominal cavity and pelvic cavity were found in 12 patients.The time from injury to definitive operation ranged from 3 to 26(mean,9.8 hours.Twenty-three patient recovered and 1 patient died of hemorrhagic shock.Complications occurred in 5 cases(20.8%,including incision infection in 3 cases,colonic fistula in 1 case and low small intestine obstruction in 1 case.Conclusion Extra-peritoneal exteriorization of colon following repair of rapture or anastomosis is an effective and safe method in treating colonic injuries,especially in patients with delayed operation,and one-stage operation rate can be increased by this procedure.

  19. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  20. Validation of the "Security Needs Assessment Profile" for measuring the profiles of security needs of Chinese forensic psychiatric inpatients.

    Science.gov (United States)

    Siu, B W M; Au-Yeung, C C Y; Chan, A W L; Chan, L S Y; Yuen, K K; Leung, H W; Yan, C K; Ng, K K; Lai, A C H; Davies, S; Collins, M

    Mapping forensic psychiatric services with the security needs of patients is a salient step in service planning, audit and review. A valid and reliable instrument for measuring the security needs of Chinese forensic psychiatric inpatients was not yet available. This study aimed to develop and validate the Chinese version of the Security Needs Assessment Profile for measuring the profiles of security needs of Chinese forensic psychiatric inpatients. The Security Needs Assessment Profile by Davis was translated into Chinese. Its face validity, content validity, construct validity and internal consistency reliability were assessed by measuring the security needs of 98 Chinese forensic psychiatric inpatients. Principal factor analysis for construct validity provided a six-factor security needs model explaining 68.7% of the variance. Based on the Cronbach's alpha coefficient, the internal consistency reliability was rated as acceptable for procedural security (0.73), and fair for both physical security (0.62) and relational security (0.58). A significant sex difference (p=0.002) in total security score was found. The Chinese version of the Security Needs Assessment Profile is a valid and reliable instrument for assessing the security needs of Chinese forensic psychiatric inpatients. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. El comercio exterior durante la década revolucionaria: un acercamiento preliminar

    OpenAIRE

    Sandra Kuntz Ficker

    2001-01-01

    El propósito de este trabajo es realizar un primer acercamiento sistemático al análisis del comercio exterior de México durante la década de 1910. Tal objetivo se ha visto obstaculizado en el pasado por la escasez de fuentes cuantitativas de procedencia mexicana para los años de la revolución. Para suplir esta carencia, este artículo recurre a las estadísticas comerciales publicadas por los principales socios de México durante estos años (Estados Unidos, Gran Bretaña y Francia). A pa...

  2. Combined peak-to-average power ratio reduction and physical layer security enhancement in optical orthogonal frequency division multiplexing visible-light communication systems

    Science.gov (United States)

    Wang, Zhongpeng; Chen, Shoufa

    2016-07-01

    A physical encryption scheme for discrete Hartley transform (DHT) precoded orthogonal frequency division multiplexing (OFDM) visible-light communication (VLC) systems using frequency domain chaos scrambling is proposed. In the scheme, the chaos scrambling, which is generated by a modified logistic mapping, is utilized to enhance the physical layer of security, and the DHT precoding is employed to reduce of OFDM signal for OFDM-based VLC. The influence of chaos scrambling on peak-to-average power ratio (PAPR) and bit error rate (BER) of systems is studied. The experimental simulation results prove the efficiency of the proposed encryption method for DHT-precoded, OFDM-based VLC systems. Furthermore, the influence of the proposed encryption to the PAPR and BER of systems is evaluated. The experimental results show that the proposed security scheme can protect the DHT-precoded, OFDM-based VLC from eavesdroppers, while keeping the good BER performance of DHT-precoded systems. The BER performance of the encrypted and DHT-precoded system is almost the same as that of the conventional DHT-precoded system without encryption.

  3. Information security becoming a priority for utilities

    Energy Technology Data Exchange (ETDEWEB)

    Nicolaides, S. [Numerex, Atlanta, GA (United States)

    2009-10-15

    As part of North America's national critical infrastructure, utilities are finding themselves at the forefront of a security issue. In October 2007, a leading security service provider reported a 90 per cent increase in the number of hackers attempting to attack its utility clients in just one year. Utilities are vulnerable to cyber attacks that could disrupt power production and the transmission system. This article discussed the need for intelligent technologies in securely enabling resource management and operational efficiency of the utilities market. It discussed the unique security challenges that utilities face at a time of greater regulatory activity, heightened environmental concerns, tighter data security requirements and an increasing need for remote monitoring and control. A new tool has emerged for cyber security in the form of an international standard that may offer a strong guideline to work toward 11 security domains. These include security policy; organization of information security; asset management; human resources security; physical and environmental security; communications and operations management; access control; information systems acquisition; development and maintenance; information security incident management; business continuity management; and compliance. 2 figs.

  4. IAEA Completes Nuclear Security Advisory Mission in Ecuador

    International Nuclear Information System (INIS)

    2018-01-01

    An International Atomic Energy Agency (IAEA) team of experts today completed a nuclear security advisory mission in Ecuador. The mission was carried out at the request of the Government of Ecuador. The scope of the two-week International Physical Protection Advisory Service (IPPAS) mission included the legislative and regulatory framework for the security of radioactive material, regulatory licensing, inspection and enforcement as well as coordination among authorities and other stakeholders involved in nuclear security. In September 2017, Ecuador ratified the 2005 Amendment to the Convention on the Physical Protection of Nuclear Material (CPPNM) and its incorporation into the nuclear security regime was also included in the scope of the mission. The IPPAS team carried out a number of visits, including to a steel company that uses gamma radiography, two hospitals, the National Polytechnic University and a company that transports radioactive material. In addition, the team visited a temporary storage facility for disused radioactive sources in Alóag, a town about 50 km south of the capital, Quito. The team observed that Ecuador is making efforts towards enhancing its national nuclear security regime. The team provided recommendations and suggestions to support Ecuador in enhancing and sustaining nuclear security. Good practices were identified that can serve as examples to other IAEA Member States to help strengthen their nuclear security activities.

  5. Cyberspace security system

    Science.gov (United States)

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  6. Information Security Risk Assessment in Hospitals.

    Science.gov (United States)

    Ayatollahi, Haleh; Shagerdi, Ghazal

    2017-01-01

    To date, many efforts have been made to classify information security threats, especially in the healthcare area. However, there are still many unknown risks which may threat the security of health information and their resources especially in the hospitals. The aim of this study was to assess the risks threatening information security in the hospitals located in one of the northwest cities of Iran. This study was completed in 2014. The participants were information technology managers who worked in the hospitals (n=27). The research instrument was a questionnaire composed of a number of open and closed questions. The content validity of the questionnaire was confirmed, and the reliability of the closed questions was measured by using the test-retest method (r =0.78). The results showed that among the information security risks, fire found to be a high probability/high impact risk factor. Human and physical/environmental threats were among the low probability risk factors. Regarding the information security safeguards used in the hospitals, the results showed that the use of the technical safeguards was the most frequent one (n =22, 91.7%) compared to the administrative (n =21, 87.5%) and the physical safeguards (n =16, 66.7%). The high probability risk factors require quick corrective actions to be taken. Therefore, the underlying causes of such threats should be identified and controlled before experiencing adverse effects. It is also important to note that information security in health care systems needs to be considered at a macro level with respect to the national interests and policies.

  7. ADP Security Plan, Math Building, Room 1139

    Energy Technology Data Exchange (ETDEWEB)

    Melton, R.

    1985-08-27

    This document provides the draft copy of an updated (ADP) Security Plan for an IBM Personal Computer to be used in the Math Building at PNL for classified data base management. Using the equipment specified in this document and implementing the administrative and physical procedures as outlined will provide the secure environment necessary for this work to proceed.

  8. Influence of Connection Placement to the Behavior of Precast Concrete Exterior Beam-Column Joint

    OpenAIRE

    Elly Tjahjono; Heru Purnomo

    2010-01-01

    This paper presents an experimental study on the influence of connection placement to the behaviour of exterior beamcolumn joint of precast concrete structure under semi cyclic loading. Four half-scale beam-column specimens were investigated. Three beam-columns were jointed through connection that are placed in beam-column joint region and the forth is connected at the plastic hinge potensial region of the beam. Crack patterns, strength, stiffness and ductility of the test specimens have been...

  9. The use of exterior forms in Einstein's gravitation theory

    International Nuclear Information System (INIS)

    Thirring, W.; Wallner, R.

    1978-01-01

    Cartan's calculus is used to reformulate the general variational principle and conservation laws in terms of exterior forms. In applying this method to Einstein's gravitation theory, we do not only benefit from the great economy of Cartan's formalism but also gain a deeper understanding of fundamental results already known. So the existence of superpotential-forms may be deduced from d o d identical to 0 and as a consequence the vanishing of total energy and momentum in a closed universe is affirmed in a more general way. Simple expressions for the sundry superpotential are obtained quite naturally. As a byproduct, Einstein's equations are rewritten in a form where the coderivative of a 2-form (the superpotential-form) is a current, and therefore resembles the inhomogeneous Maxwell equations. In passing from the Lagrangian to the Hamiltonian 4-form, the ADM formalism is immediately entered without lengthy calculations [pt

  10. International Legal Framework for Nuclear Security

    International Nuclear Information System (INIS)

    Moore, G.M.

    2010-01-01

    The responsibility for nuclear security rests entirely with each State. There is no single international instrument that addresses nuclear security in a comprehensive manner. The legal foundation for nuclear security comprises international instruments and recognized principles that are implemented by national authorities. Security systems at the national level will contribute to a strengthened and more universal system of nuclear security at the international level. The binding security treaties are; Convention on the Physical Protection of Nuclear Material, the 2005 amendment thereto, Safeguards Agreements between the Agency and states required in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons. Model Protocol additional to agreement(s) between State(s) and the Agency for the application of Safeguards Convention on Early Notification of a Nuclear Accident, Convention on Assistance in the Case of a Nuclear Accident or Radiological Emergency, Convention on Nuclear Safety, Joint Convention on the Safety of Spent Fuel Management and on the Safety of Radioactive Waste Management

  11. Radioactive source security: the cultural challenges.

    Science.gov (United States)

    Englefield, Chris

    2015-04-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  12. Automotive Exterior Noise Optimization Using Grey Relational Analysis Coupled with Principal Component Analysis

    Science.gov (United States)

    Chen, Shuming; Wang, Dengfeng; Liu, Bo

    This paper investigates optimization design of the thickness of the sound package performed on a passenger automobile. The major characteristics indexes for performance selected to evaluate the processes are the SPL of the exterior noise and the weight of the sound package, and the corresponding parameters of the sound package are the thickness of the glass wool with aluminum foil for the first layer, the thickness of the glass fiber for the second layer, and the thickness of the PE foam for the third layer. In this paper, the process is fundamentally with multiple performances, thus, the grey relational analysis that utilizes grey relational grade as performance index is especially employed to determine the optimal combination of the thickness of the different layers for the designed sound package. Additionally, in order to evaluate the weighting values corresponding to various performance characteristics, the principal component analysis is used to show their relative importance properly and objectively. The results of the confirmation experiments uncover that grey relational analysis coupled with principal analysis methods can successfully be applied to find the optimal combination of the thickness for each layer of the sound package material. Therefore, the presented method can be an effective tool to improve the vehicle exterior noise and lower the weight of the sound package. In addition, it will also be helpful for other applications in the automotive industry, such as the First Automobile Works in China, Changan Automobile in China, etc.

  13. Conceptual design of technical security systems for Russian nuclear facilities physical protection

    International Nuclear Information System (INIS)

    Izmailov, A.V.

    1995-01-01

    Conceptual design of technical security systems (TSS) used in the early stages of physical protection systems (PPS) design for Russia nuclear facilities is discussed. The importance of work carried out in the early stages was noted since the main design solutions are being made within this period (i.e. selection of a structure of TSS and its components). The methods of analysis and synthesis of TSS developed by ''Eleron'' (MINATOM of Russia) which take into account the specific conditions of Russian nuclear facilities and a scope of equipment available are described in the review. TSS effectiveness assessment is based on a probability theory and a simulation. The design procedure provides for a purposeful choice of TSS competitive options including a ''cost-benefit'' criterion and taking into account a prechosen list of design basis threats to be used for a particular facility. The attention is paid to a practical aspect of the methods application as well as to the bilateral Russian-American scientific and technical co-operation in the PPS design field

  14. Security Implications for Ultra-Low Power Configurable SoC FPAA Embedded Systems

    Directory of Open Access Journals (Sweden)

    Jennifer Hasler

    2018-06-01

    Full Text Available We discuss the impact of physical computing techniques to classifying network security issues for ultra-low power networked IoT devices. Physical computing approaches enable at least a factor of 1000 improvement in computational energy efficiency empowering a new generation of local computational structures for embedded IoT devices. These techniques offer computational capability to address network security concerns. This paper begins the discussion of security opportunities for, and issues using, FPAA devices for small embedded IoT platforms. These FPAAs enable devices often utilized for low-power context aware computation. Embedded FPAA devices have both positive Security attributes, as well as potential vulnerabilities. FPAA devices can be part of the resulting secure computation, such as implementing unique functions. FPAA devices can be used investigate security of analog/mixed signal capabilities. The paper concludes with summarizing key improvements for secure ultra-low power embedded FPAA devices.

  15. Ghana's Integrated Nuclear Security Support Plan

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    At the Korle Bu Teaching Hospital outside Accra, Pearl Lovelyn Lawson checks the records of the next patient to undergo radiotherapy and adjusts the dose settings of the teletherapy machine. It is business as usual at the facility that treats over fifty patients each day. But Lawson's routine now includes additional procedures to ensure that the highly radioactive cobalt-60 source located inside the machine remains secure. Nuclear security devices and systems such as double locks, motion sensors, and cameras that transmit images to a central alarm system have been installed to ensure that the source cannot be stolen, the facility sabotaged, or unauthorized access gained. At Korle Bu physical protection measures were upgraded as part of Ghana's Integrated Nuclear Security Support Plan (INSSP). Preventing, detecting and responding to criminal acts like the theft or illegal transfer of a radioactive source, is an international priority that could be addressed through an INSSP. As one of its key nuclear security services, the IAEA assists Member States in drafting such plans. An INSSP is developed jointly with the Member State, using a holistic approach to nuclear security capacity building. It reinforces the primary objective of a State's nuclear security regime to protect people, society, and the environment from the harmful consequences of a nuclear security event. Addressing five components - the legal and regulatory framework, prevention, detection, and sustainability - the jointly developed plan identifies the needs, responsible entities and organizations within the State, as well as the timeframe for the implementation of agreed nuclear security related activities. Ghana's INSSP, tailored to its specific needs, is based on findings and recommendations from advisory service missions carried out in Ghana, including an International Nuclear Security Advisory Service mission and an International Physical Protection Advisory Service mission. Ghana's INSSP was

  16. IAEA Completes Nuclear Security Review Mission in Hungary

    International Nuclear Information System (INIS)

    2013-01-01

    Full text: A team of International Atomic Energy Agency (IAEA) experts today completed a mission to review nuclear security practices in Hungary. At the request of the Government of Hungary, the IAEA conducted the two-week International Physical Protection Advisory Service (IPPAS) mission that reviewed the nation's nuclear security-related legislative and regulatory framework, physical protection systems at Hungarian nuclear facilities, and security arrangements applied to the transport of nuclear and radioactive materials. The IAEA team was led by Stephen Ortiz of the United States and included nine experts from six nations and the IAEA. The team met in Budapest with officials from the Hungarian Atomic Energy Authority, Hungarian Police Headquarters, National Security Authority and other relevant agencies. They also conducted site visits to the Paks Nuclear Power Plant, the Interim Spent Fuel Storage Facility, the Budapest Research Reactor, the Budapest Training Reactor, the Radioactive Waste Treatment and Disposal Facility and several other locations where high activity radioactive sources are used for different applications. ''At a time where development of a nuclear power programme is more than ever recognised as necessitating a strong commitment to safety, security and sustainability, the example given today by Hungary strengthens the message about the value of applying the IAEA Security Guidance,'' said IAEA Deputy Director General for Nuclear Safety and Security, Denis Flory, who opened the mission. ''Indeed, IPPAS missions, carried out at the appropriate time in the development of a nuclear power programme, provide valuable insights into how best to reach that goal.'' The IPPAS team concluded that nuclear security within Hungary has been significantly enhanced in recent years. The team also identified a number of good practices at the nation's nuclear facilities, and provided some recommendations and suggestions to assist Hungary in the continuing

  17. Protecting the Privacy and Security of Your Health Information

    Science.gov (United States)

    ... can be used and shared with others. The Security Rule sets rules for how your health information must be kept secure with administrative, technical, and physical safeguards. You may have additional protections and health information rights under your State's laws. ...

  18. Smart Grid Security A Smart Meter-Centric Perspective

    DEFF Research Database (Denmark)

    Vigo, Roberto; Yuksel, Ender; Ramli, Carroline Dewi Puspa Kencana

    2012-01-01

    , leading to what is known as the Smart Grid. The development of this Cyber-Physical System introduces new security issues, thus calling for efforts in studying possible attacks and devising suitable countermeasures. In this paper, we review a generic model for the Smart Grid, and present possible attacks......The electricity grid is a key infrastructure for our society, therefore its security is a critical public concern. This physical system is becoming more and more complex as it is coupled with a cyber layer carrying information about power usage and control instructions for intelligent appliances...

  19. A Survey on Secure Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Shihong Zou

    2017-01-01

    Full Text Available Combining tiny sensors and wireless communication technology, wireless body area network (WBAN is one of the most promising fields. Wearable and implantable sensors are utilized for collecting the physiological data to achieve continuously monitoring of people’s physical conditions. However, due to the openness of wireless environment and the significance and privacy of people’s physiological data, WBAN is vulnerable to various attacks; thus, strict security mechanisms are required to enable a secure WBAN. In this article, we mainly focus on a survey on the security issues in WBAN, including securing internal communication in WBAN and securing communication between WBAN and external users. For each part, we discuss and identify the security goals to be achieved. Meanwhile, relevant security solutions in existing research on WBAN are presented and their applicability is analyzed.

  20. Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System

    KAUST Repository

    El Shafie, Ahmed

    2016-07-07

    This letter proposes a novel hybrid half-/full-duplex relaying scheme to enhance the relay channel security. A source node (Alice) communicates with her destination node (Bob) in the presence of a buffer-aided full-duplex relay node (Rooney) and a potential eavesdropper (Eve). Rooney adopts two different relaying, namely randomize-and-forward and decode-andforward relaying strategies, to improve the security of the legitimate system. In the first relaying strategy, Rooney uses a codebook different from that used at Alice. In the second relaying strategy, Rooney and Alice use the same codebooks. In addition, Rooney switches between half-duplex and full-duplex modes to further enhance the security of the legitimate system. The numerical results demonstrate that our proposed scheme achieves a significant average secrecy end-to-end throughput improvement relative to the conventional bufferless full-duplex relaying scheme.

  1. Physical-Layer Security of a Buffer-Aided Full-Duplex Relaying System

    KAUST Repository

    El Shafie, Ahmed; Salem, Ahmed Sultan; Al-Dhahir, Naofal

    2016-01-01

    This letter proposes a novel hybrid half-/full-duplex relaying scheme to enhance the relay channel security. A source node (Alice) communicates with her destination node (Bob) in the presence of a buffer-aided full-duplex relay node (Rooney) and a potential eavesdropper (Eve). Rooney adopts two different relaying, namely randomize-and-forward and decode-andforward relaying strategies, to improve the security of the legitimate system. In the first relaying strategy, Rooney uses a codebook different from that used at Alice. In the second relaying strategy, Rooney and Alice use the same codebooks. In addition, Rooney switches between half-duplex and full-duplex modes to further enhance the security of the legitimate system. The numerical results demonstrate that our proposed scheme achieves a significant average secrecy end-to-end throughput improvement relative to the conventional bufferless full-duplex relaying scheme.

  2. Formal Analysis of Graphical Security Models

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi

    , software components and human actors interacting with each other to form so-called socio-technical systems. The importance of socio-technical systems to modern societies requires verifying their security properties formally, while their inherent complexity makes manual analyses impracticable. Graphical...... models for security offer an unrivalled opportunity to describe socio-technical systems, for they allow to represent different aspects like human behaviour, computation and physical phenomena in an abstract yet uniform manner. Moreover, these models can be assigned a formal semantics, thereby allowing...... formal verification of their properties. Finally, their appealing graphical notations enable to communicate security concerns in an understandable way also to non-experts, often in charge of the decision making. This dissertation argues that automated techniques can be developed on graphical security...

  3. La débil Europa: consideraciones críticas sobre la política exterior de la Unión

    Directory of Open Access Journals (Sweden)

    Víctor C. Pascual Planchuelo

    2009-07-01

    Full Text Available Este trabajo tiene como objetivo analizar la Política Exterior de la Unión Europea. Para ello se revisa la orientación general de todos los países miembros, sus agendas diplomáticas y posturas geoestratégicas. En un contexto global en el que la Unión Europea desempeña un rol de simple observador, sin posibilidad de ejercer un poder decisorio sobre los aspectos fundamentales de la política internacional, la única opción válida es la de reforzar la Política Exterior. La Unión Europea tiene la obligación de hablar ante el mundo con una sola voz, y no delegar los temas de defensa y seguridad al aliado de costumbre, los Estados Unidos.

  4. FAA computer security : concerns remain due to personnel and other continuing weaknesses

    Science.gov (United States)

    2000-08-01

    FAA has a history of computer security weaknesses in a number of areas, including its physical security management at facilities that house air traffic control (ATC) systems, systems security for both operational and future systems, management struct...

  5. La Influencia de la Temperatura Exterior sobre los Sistemas de Ventilación Natural en Grandes Atrios

    Directory of Open Access Journals (Sweden)

    Espina, P.

    2008-09-01

    Full Text Available Natural venting systems present numerous advantages opposite to the mechanical exhaust for the smoke control – a reduction in both facilities and maintenance costs–. Nevertheless, the influence of numerous factors affects significantly their efficacy: the architectural characteristics of the building, the direction and wind velocity, the proximity of tall buildings, the smoke temperature, the environmental interior and exterior temperatures, the existence of snow or ice on the ceiling, etc. All of them are important, but the influence of the environmental exterior temperature plays a decisive role. The goal of this Investigation Research was to evaluate the influence of the external temperature on the smoke movement and the hot layer descent regarding the efficacy of the natural venting systems installed for the smoke control in large atria. The analysis was developed using the ‘Fire Dynamics Simulator - FDS’ model (1, a computational fluid dynamics (CFD model of fi re-driven fluid flow for the study of fire. The results demonstrated that a design that does not contemplate this factor can turn out to be inadequate, since it has a decisive influence to guarantee human safety. The obtained results showed very significant differences about the different parameters linked to the smoke movement in an atrium.Entre las diferentes estrategias de Control y Evacuación de los Humos del Incendio, los sistemas de ventilación natural presentan numerosas ventajas frente a la ventilación mecánica – fundamentalmente una menor inversión tanto en equipos como en gastos de mantenimiento –. Sin embargo, su eficacia depende de la influencia ejercida por numerosos factores – características arquitectónicas del edificio, dirección y velocidad del viento, proximidad de edificios de gran altura, temperatura de los humos, temperatura ambiental interior, temperatura en el exterior del recinto, existencia de nieve o hielo en

  6. Biometric Security: Alternatif Pengendalian Dalam Sistem Informasi Akuntansi Terkomputerisasi

    OpenAIRE

    Tarigan, Josua

    2004-01-01

    As organization search more secure authentication method for user access, biometric security technology is gaining more and more attention. The implementation of biometric security technology in accounting information systems was physical access, virtual access, e-commerce applications and covert suveillance. There are three phase when an organization implementation biometric technology: strategic planning and budgeting, developing a system reliability plan and documentation. The challenges w...

  7. BIOMETRIC SECURITY: ALTERNATIF PENGENDALIAN DALAM SISTEM INFORMASI AKUNTANSI TERKOMPUTERISASI

    OpenAIRE

    Josua Tarigan

    2004-01-01

    As organization search more secure authentication method for user access, biometric security technology is gaining more and more attention. The implementation of biometric security technology in accounting information systems was physical access, virtual access, e-commerce applications and covert suveillance. There are three phase when an organization implementation biometric technology: strategic planning and budgeting, developing a system reliability plan and documentation. The challenges w...

  8. Air Traffic Control: Weak Computer Security Practices Jeopardize Flight Safety

    Science.gov (United States)

    1998-05-01

    Given the paramount importance of computer security of Air Traffic Control (ATC) systems, Congress asked the General Accounting Office to determine (1) whether the Fedcral Aviation Administration (FAA) is effectively managing physical security at ATC...

  9. Short communication: quantification of the transmission of microorganisms to milk via dirt attached to the exterior of teats

    NARCIS (Netherlands)

    Vissers, M.M.M.; Driehuis, F.; Giffel, M.C.T.; Jong, de P.; Lankveld, J.M.G.

    2007-01-01

    Pathogens and spoilage microorganisms can be transmitted to milk via dirt (e.g., feces, bedding material, soil, or a combination of these) attached to the exterior of the cows¿ teats. To determine the relevance of this pathway and to perform quantitative microbial risk analysis of the microbial

  10. Research on a Valuation Standard and the Actual Condition About Security Management in PACS

    International Nuclear Information System (INIS)

    Jeong, Jae Ho; Son, Gi Gyeong; Kang, Hee Doo; Dong, Kyung Rae; Kweon, Dae Cheol; Kim, Hyun Soo

    2008-01-01

    This study is to prepare an evaluation standard about personal information protection and security management of a medical institution and to build up a grade standard of evaluation in PACS environment. We built up evaluation index based on 10 detailed items in four big categories (political security, technical security, data management security and physical security) by referring to ISO17799 (BS 7799), HIPPA (Health Insurance and Portability and Accountability Act of 1996) and domestic medical law. We have investigated at the thirty places where medical facility with the extracted security criteria and security evaluation index. Average score of physical security list, one of the big categories, was 18.5/20 (93%) at all medical institutions. Political security score was 18.5/30 (62%), data management security score was 12/20 (60%) and technical security score was 17.5/30 (58%). Therefore, security evaluation score was average 67 in 30 general hospitals, which was 4th level. The results showed that it is necessary to establish evaluation and management standard about personal information protection and security consciousness which are weak in PACS environment.

  11. Smart Grid Security. White Paper

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-09-15

    One of the biggest concerns for smart grid developers is cyber security due to the reliance on IT communication networks. While the current grid is not immune to energy theft, fraud and malicious cyber-attacks, the smart grid poses new security issues. It is more likely now that theft, malicious attack and fraud will be committed by people working remotely from a laptop several miles away, even in a different country, than someone physically manipulating meters. This makes it difficult to predict where attacks will come from.

  12. Assessing security technology's impact: old tools for new problems.

    Science.gov (United States)

    Kreissl, Reinhard

    2014-09-01

    The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.

  13. A conservação e o restauro de revestimentos exteriores de edifícios antigos - Uma Metodologia de Estudo e Reparação

    OpenAIRE

    Tavares, M.

    2009-01-01

    Este registo pertence ao Repositório Científico do LNEC O presente trabalho reporta-se ao tema geral da conservação e restauro de revestimentos exteriores de edifícios antigos, destacando-se como tema específico as questões do desenvolvimento de uma metodologia de estudo e reparação. Com este estudo foi possível um maior entendimento do comportamento dos revestimentos exteriores de edifícios antigos com base em cal, bem como estabelecer um maior rigor na aplicação de metodol...

  14. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals

    International Nuclear Information System (INIS)

    2013-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit trafficking and the inadvertent movement of

  15. Nuclear security: strategies and techniques

    International Nuclear Information System (INIS)

    Khan, I.K.

    2010-05-01

    The modern society, whether in developed or in developing countries, depend on the availability of nuclear energy and on the day-to-day use of radioactive materials in medicine, agriculture, industry and for research. Before 9/11, these activities were mainly covered by safety rules regarding health and environment. Since 9/ 11, it is clear, that these activities also require adequate security. For the continued and expanded use of nuclear energy or radioactive materials, nuclear security is indispensable and an important prerequisite for successful and sustainable development. Many of our nuclear security services, expert assistance and training events, we have assisted Member States in their efforts to improve their preparedness and response capabilities and acquired a much better understanding of Member States prob and the need for further support. The end of the Cold War was marked by a shift from a bi-polar structure of global security into a more complex and unpredictable configuration of world affairs. It also brought about new security challenges, i.e. an increased probability for low-density regional, national or sub-national conflicts with new and more dispersed threats emanating from a larger number of actors, including non-state actors; terrorists or criminals. The audio-visual impact of modern media has enhanced the socio-psychological impact on a global scale of such conflicts. The number of cases of illicit trafficking in nuclear materials that were recorded since the 90's raised concern about the international physical protection regime and triggered an effort to enhance our capabilities for prevention, detection and responses regarding terrorist acts, as well as to strengthen the Convention on the Physical Protection of Nuclear Material

  16. Identification of complex model thermal boundary conditions based on exterior temperature measurement

    International Nuclear Information System (INIS)

    Lu Jianming; Ouyang Guangyao; Zhang Ping; Rong Bojun

    2012-01-01

    Combining the advantages of the finite element software in temperature field analyzing with the multivariate function optimization arithmetic, a feasibility method based on the exterior temperature was proposed to get the thermal boundary conditions, which was required in temperature field analyzing. The thermal boundary conditions can be obtained only by some temperature measurement values. Taking the identification of the convection heat transfer coefficient of a high power density diesel engine cylinder head as an example, the calculation result shows that when the temperature measurement error was less than 0.5℃, the maximum relative error was less than 2%. It is shown that the new method was feasible (authors)

  17. Numerical electromagnetic frequency domain analysis with discrete exterior calculus

    Science.gov (United States)

    Chen, Shu C.; Chew, Weng Cho

    2017-12-01

    In this paper, we perform a numerical analysis in frequency domain for various electromagnetic problems based on discrete exterior calculus (DEC) with an arbitrary 2-D triangular or 3-D tetrahedral mesh. We formulate the governing equations in terms of DEC for 3-D and 2-D inhomogeneous structures, and also show that the charge continuity relation is naturally satisfied. Then we introduce a general construction for signed dual volume to incorporate material information and take into account the case when circumcenters fall outside triangles or tetrahedrons, which may lead to negative dual volume without Delaunay triangulation. Then we examine the boundary terms induced by the dual mesh and provide a systematical treatment of various boundary conditions, including perfect magnetic conductor (PMC), perfect electric conductor (PEC), Dirichlet, periodic, and absorbing boundary conditions (ABC) within this method. An excellent agreement is achieved through the numerical calculation of several problems, including homogeneous waveguides, microstructured fibers, photonic crystals, scattering by a 2-D PEC, and resonant cavities.

  18. A novel quantum scheme for secure two-party distance computation

    Science.gov (United States)

    Peng, Zhen-wan; Shi, Run-hua; Zhong, Hong; Cui, Jie; Zhang, Shun

    2017-12-01

    Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure multiparty computational geometry, which computes the distance between two points without revealing each point's location information (i.e., coordinate). Secure two-party distance computation has potential applications with high secure requirements in military, business, engineering and so on. In this paper, we present a quantum solution to secure two-party distance computation by subtly using quantum private query. Compared to the classical related protocols, our quantum protocol can ensure higher security and better privacy protection because of the physical principle of quantum mechanics.

  19. Security personnel training using a computer-based game

    International Nuclear Information System (INIS)

    Ralph, J.; Bickner, L.

    1987-01-01

    Security personnel training is an integral part of a total physical security program, and is essential in enabling security personnel to perform their function effectively. Several training tools are currently available for use by security supervisors, including: textbook study, classroom instruction, and live simulations. However, due to shortcomings inherent in each of these tools, a need exists for the development of low-cost alternative training methods. This paper discusses one such alternative: a computer-based, game-type security training system. This system would be based on a personal computer with high-resolution graphics. Key features of this system include: a high degree of realism; flexibility in use and maintenance; high trainee motivation; and low cost

  20. The security analyzer: A security analyzer program written in Prolog

    International Nuclear Information System (INIS)

    Zimmerman, B.D.; Densley, P.J.

    1986-09-01

    The Security Analyzer is a software tool capable of analyzing the effectiveness of a facility's security system. It is written in the Prolog logic programming computer language, using entity-relationship data modeling techniques. The program performs the following functions: (1) provides descriptive, locational and operational status information about intrusion detectors and assessment devices (i.e., ''sensors'' and ''cameras'') upon request; (2) provides for storage and retrieval of maintenance history information for various components of the security system (including intrusion detectors), and allows for changing that information as desired; (3) provides a ''search'' mode, wherein all paths are found from any specified physical location to another specified location which satisfy user chosen ''intruder detection'' probability and elapsed time criteria (i.e., the program finds the ''weakest paths'' from a security point of view). The first two of these functions can be provided fairly easily with a conventional database program; the third function could be provided using Fortran or some similar language, though with substantial difficulty. In the Security Analyzer program, all these functions are provided in a simple and straight-forward manner. This simplicity is possible because the program is written in the symbolic (as opposed to numeric) processing language Prolog, and because the knowledge base is structured according to entity-relationship modeling principles. Also, the use of Prolog and the entity-relationship modeling technique allows the capabilities of the Security analyzer program, both for knowledge base interrogation and for searching-type operations, to be easily expanded in ways that would be very difficult for a numeric and more algorithmically deterministic language such as Fortran to duplicate. 4 refs

  1. Employment of security personnel

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-section 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. The court decision was taken for settlement of court proceedings commenced by Institute of Plasma Physics in Garching. In his comments, W. Hunold accedes to the court's decision and discusses the underlying reasons of this decision and of a previous ruling in the same matter by putting emphasis on the difference between a contract for services and a contract for work, and a contract for temporary employment. The author also discusses the basic features of an employment contract. (orig./HP) [de

  2. Metaphors for cyber security.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  3. Standard format and content for a licensee physical security plan for the protection of special nuclear material of moderate or low strategic significance (Revision 1, Feb. 1983)

    International Nuclear Information System (INIS)

    Anon.

    1983-01-01

    This regulatory guide describes the information required in the physical security plan submitted as part of an application for a license to possess, use, or transport Special Nuclear Materials (SNM) of moderate strategic significance or 10 kg or more of SNM of low strategic significance and recommends a standard format for presenting the information in an orderly arrangement. This standard format will thus serve as an aid to uniformity and completeness in the preparation and review of the physical security plan of the license application. This document can also be used as guidance by licensees possessing or transporting less than 10 kg of SNM of low strategic significance in understanding the intent and implementing the requirements of paragraphs 73.67(a), 73.67(f), and 73.67(g) of 10 CFR Part 73

  4. Estratégias de Promoção para o Comércio Exterior Brasileiro: O Caso do Setor Têxtil

    Directory of Open Access Journals (Sweden)

    Claudia Raphaeta Borges

    2015-01-01

    Full Text Available O comércio exterior brasileiro vem crescendo continuamente. Sua participação no comércio mundial, no entanto, não ultrapassa 1,1 %. Barreiras internas de ordem estrutural, política, econômica e cultural por um lado, associadas à baixa cultura exportadora por outro, explicam parte de tal desempenho. Este trabalho procurou identificar as principais estratégias de promoção aplicadas ao comércio exterior e, em especial ao setor têxtil. Observou-se que o setor têxtil, embora tenha participação expressiva no grupo de manufaturados da pauta exportadora brasileira, atinge mercados restritos, como conseqüência das estratégias adotadas que têm como foco a comercialização e verticalização, em vez da tecnologia.

  5. Implementation of computer security at nuclear facilities in Germany

    Energy Technology Data Exchange (ETDEWEB)

    Lochthofen, Andre; Sommer, Dagmar [Gesellschaft fuer Anlagen- und Reaktorsicherheit mbH (GRS), Koeln (Germany)

    2013-07-01

    In recent years, electrical and I and C components in nuclear power plants (NPPs) were replaced by software-based components. Due to the increased number of software-based systems also the threat of malevolent interferences and cyber-attacks on NPPs has increased. In order to maintain nuclear security, conventional physical protection measures and protection measures in the field of computer security have to be implemented. Therefore, the existing security management process of the NPPs has to be expanded to computer security aspects. In this paper, we give an overview of computer security requirements for German NPPs. Furthermore, some examples for the implementation of computer security projects based on a GRS-best-practice-approach are shown. (orig.)

  6. Implementation of computer security at nuclear facilities in Germany

    International Nuclear Information System (INIS)

    Lochthofen, Andre; Sommer, Dagmar

    2013-01-01

    In recent years, electrical and I and C components in nuclear power plants (NPPs) were replaced by software-based components. Due to the increased number of software-based systems also the threat of malevolent interferences and cyber-attacks on NPPs has increased. In order to maintain nuclear security, conventional physical protection measures and protection measures in the field of computer security have to be implemented. Therefore, the existing security management process of the NPPs has to be expanded to computer security aspects. In this paper, we give an overview of computer security requirements for German NPPs. Furthermore, some examples for the implementation of computer security projects based on a GRS-best-practice-approach are shown. (orig.)

  7. Exterior Space Retrofitting Planning with Possible Effect on Building Thermal Characteristics

    Science.gov (United States)

    Berezin, D. V.

    2017-11-01

    The problems of mass housing which was serially designed and produced throughout Eastern European and former Soviet cities in the middle of the 20th century, in regard to its solar-related thermal conditions improvement by refurbishing are raised in the paper. The impact of functional zones’ dimensions (based on the dwellers’ domestic actions) on shading properties of balconies and loggias is analyzed. As a result, the ratios of exterior space area (as a complex of shading elements related to balconies/loggias) to the windows area that reflect the frequency of the indoor air overheating are determined which can serve as a simple evaluative thermal comfort-related tool for projected and existing buildings under a real solar activity between the geographic latitudes 55° - 56°.

  8. Transformaciones de la política exterior egipcia en materia de seguridad, frente al Estado de Israel, desde la caída de Mubarak. 2002- 2012

    OpenAIRE

    Morales, Alejandra

    2015-01-01

    El presente estudio de caso identifica las transformaciones de la política exterior egipcia en materia de seguridad frente al Estado de Israel, desde la Caída de Mubarak. La hipótesis que sustenta este ejercicio académico repasa las principales transformaciones que ha sufrido la política exterior egipcia en términos de seguridad frente a Israel pasando por la seguridad fronteriza, las relaciones diplomáticas, y el cambio del discurso gubernamental hasta la incidencia y actual importancia de ...

  9. Employment of security personnel of a security service company does not need approval by the works council

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-secion 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. The court decision was taken for settlement of court proceedings commenced by Institute of Plasma Physics in Garching. (Federal Labour Court, decision dated November 28, 1989 - 1 ABR 90/88). (orig./HP) [de

  10. Don’t get (sun) burned : exposing exterior wood to the weather prior to painting contributes to finish failure

    Science.gov (United States)

    R. Sam Williams

    2005-01-01

    Contrary to what might be called popular myth, research shows that allowing exterior wood surfaces to weather before applying paint does not help the cause of long-term coating performance. Instead, weathering prior to painting has been shown to contribute significantly to premature failure of the finish due to loss of adhesion.

  11. Safety and Security at School: A Pedagogical Perspective

    Science.gov (United States)

    de Waal, Elda; Grosser, M. M.

    2009-01-01

    Education law and policy currently focus on broader physical aspects of safety and security at schools, as well as, for example, on pedagogical insecurity such as is caused by discriminatory teaching, but law and policy have yet to pay attention to the overall and far-reaching pedagogical safety and security of learners. By means of a descriptive…

  12. Physical Penetration Testing: A Whole New Story in Penetration Testing

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter

    2011-01-01

    Physical penetration testing plays an important role in assuring a company that the security policies are properly enforced and that the security awareness of the employees is on the appropriate level. In physical penetration tests the tester physically enters restricted locations and directly

  13. Biometric Template Security

    Directory of Open Access Journals (Sweden)

    Abhishek Nagar

    2008-03-01

    Full Text Available Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorization of the various vulnerabilities of a biometric system and discuss countermeasures that have been proposed to address these vulnerabilities. In particular, we focus on biometric template security which is an important issue because, unlike passwords and tokens, compromised biometric templates cannot be revoked and reissued. Protecting the template is a challenging task due to intrauser variability in the acquired biometric traits. We present an overview of various biometric template protection schemes and discuss their advantages and limitations in terms of security, revocability, and impact on matching accuracy. A template protection scheme with provable security and acceptable recognition performance has thus far remained elusive. Development of such a scheme is crucial as biometric systems are beginning to proliferate into the core physical and information infrastructure of our society.

  14. Intrusion detection sensors

    International Nuclear Information System (INIS)

    Williams, J.D.

    1978-07-01

    Intrusion detection sensors are an integral part of most physical security systems. Under the sponsorship of the U.S. Department of Energy, Office of Safeguards and Security, Sandia Laboratories has conducted a survey of available intrusion detection sensors and has tested a number of different sensors. An overview of these sensors is provided. This overview includes (1) the operating principles of each type of sensor, (2) unique sensor characteristics, (3) desired sensor improvements which must be considered in planning an intrusion detection system, and (4) the site characteristics which affect the performance of both exterior and interior sensors. Techniques which have been developed to evaluate various intrusion detection sensors are also discussed

  15. Black Holes in the Framework of the Metric Tensor Exterior to the Sun and Planets

    Directory of Open Access Journals (Sweden)

    Chifu E.N.

    2011-04-01

    Full Text Available The conditions for the Sun and oblate spheroidal planets in the solar system to reduce to black holes is investigated. The metric tensor exterior to oblate spheroidal masses indicates that for the Sun to reduce to a black hole, its mass must condense by a factor of 2 : 32250 10 5 . Using Schwarzschild’s metric, this factor is obtained as 2 : 3649 10 5 . Similar results are obtained for oblate spheroidal planets in the solar system.

  16. 28 CFR 16.51 - Security of systems of records.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Security of systems of records. 16.51... Security of systems of records. (a) Each component shall establish administrative and physical controls to prevent unauthorized access to its systems of records, to prevent unauthorized disclosure of records, and...

  17. 13 CFR 102.33 - Security of systems of records.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Security of systems of records....33 Security of systems of records. (a) Each Program/Support Office Head or designee shall establish administrative and physical controls to prevent unauthorized access to its systems of records, to prevent...

  18. Using Bayesian Networks and Decision Theory to Model Physical Security

    National Research Council Canada - National Science Library

    Roberts, Nancy

    2003-01-01

    .... Cameras, sensors and other components used along with the simple rules in the home automation software provide an environment where the lights, security and other appliances can be monitored and controlled...

  19. Nuclear security - New challenge to the safety of nuclear power plants

    International Nuclear Information System (INIS)

    Li Ganjie

    2008-01-01

    The safety of nuclear power plants involves two aspects: one is to prevent nuclear accidents resulted from systems and equipments failure or human errors; the other is to refrain nuclear accidents from external intended attack. From this point of view, nuclear security is an organic part of the nuclear safety of power plants since they have basically the same goals and concrete measures with each other. In order to prevent malicious attacks; the concept of physical protection of nuclear facilities has been put forward. In many years, a series of codes and regulations as well as technical standard systems on physical protection had been developed at international level. The United Nations passed No. 1540 resolution as well as 'Convention on the Suppression of Acts of Nuclear terrorism', and revised 'Convention on Physical Protection of Nuclear Materials', which has enhanced a higher level capacity of preparedness by international community to deal with security issues of nuclear facilities. In China, in order to improve the capability of nuclear power plants on preventing and suppressing the external attacks, the Chinese government consecutively developed the related codes and standards as well as technical documents based on the existing laws and regulations, including 'Guide for the Nuclear Security of Nuclear Power Plants' and 'Guide for the Physical Protection of Nuclear Materials', so as to upgrade the legislative requirements for nuclear security in power plants. The government also made greater efforts to support the scientific research and staff training on physical protection, and satisfying the physical protection standards for newly-built nuclear facilities such as large scale nuclear power plants to meet requirement at international level. At the same time old facilities were renovated and the Chinese government established a nuclear emergency preparedness coordination mechanism, developed corresponding emergency preparedness plans, intensified the

  20. Security Techniques for the Electronic Health Records.

    Science.gov (United States)

    Kruse, Clemens Scott; Smith, Brenna; Vanderlinden, Hannah; Nealand, Alexandra

    2017-08-01

    The privacy of patients and the security of their information is the most imperative barrier to entry when considering the adoption of electronic health records in the healthcare industry. Considering current legal regulations, this review seeks to analyze and discuss prominent security techniques for healthcare organizations seeking to adopt a secure electronic health records system. Additionally, the researchers sought to establish a foundation for further research for security in the healthcare industry. The researchers utilized the Texas State University Library to gain access to three online databases: PubMed (MEDLINE), CINAHL, and ProQuest Nursing and Allied Health Source. These sources were used to conduct searches on literature concerning security of electronic health records containing several inclusion and exclusion criteria. Researchers collected and analyzed 25 journals and reviews discussing security of electronic health records, 20 of which mentioned specific security methods and techniques. The most frequently mentioned security measures and techniques are categorized into three themes: administrative, physical, and technical safeguards. The sensitive nature of the information contained within electronic health records has prompted the need for advanced security techniques that are able to put these worries at ease. It is imperative for security techniques to cover the vast threats that are present across the three pillars of healthcare.