WorldWideScience

Sample records for high security spanish

  1. The Spanish Contribution to European Security and Defense

    Directory of Open Access Journals (Sweden)

    Félix Sanz

    2000-05-01

    Full Text Available The author examines Spain’s material and intellectual contributions to European security and defense. In the first place, he provides an overview of the changes in the personal qualifications of the Spanish Armed Forces and in the mentality of the military officials in adapting to the work of international organisms and to cooperation in broadlydefined schemes of security. On this point, he highlights the Spanish contribution to the missions carried out by the United Nations, OSCE and the WEU. With respect to NATO, Félix Sanz analyzes the Spanish participation before and after this country’s integrationin military structure and in the operative plans of the Alliance. Sanz also underscores the contribution made to multinational forces such as Eurocorps, Eurofor/Euromarfor, the Italian-Spanish amphibious force and, in the future, the European air group. He discussesSpain’s support for other bilateral forums for security, in particular the relation with the United States. In the area of intellectual contributions, the author underlines this country’sinterest in bringing about a convergence of defense forces, Spain’s support for a multinational military and its willingness to collaborate in the design of European defense.

  2. 48 CFR 252.222-7004 - Compliance with Spanish social security laws and regulations.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Compliance with Spanish... PROVISIONS AND CONTRACT CLAUSES Text of Provisions And Clauses 252.222-7004 Compliance with Spanish social... Spanish Social Security Laws and Regulations (JUN 1997) (a) The Contractor shall comply with all Spanish...

  3. Evaluating the Sustainability of the Spanish Social Security System

    Directory of Open Access Journals (Sweden)

    Francisco J. Blanco-Encomienda

    2017-12-01

    Full Text Available Social security has remarkable relevance in the general context of Spanish economy. This system is viable if the volume of active population increases at a higher rate than the number of pensioners does and if, in addition, active population is employed by the productive system. The reports of the National Institute of Statistics about Spanish demography demonstrate how these conditions are not met as of today, because our society has one of the highest aging rates and also a remarkable increase in the dependency rate. Through various techniques of time series analysis, this paper reveals the current economic trends in Spain to demonstrate the need for structural reforms of the system so as to make it more sustainable in the long term. To achieve this, it is necessary to change the financing model to a mixed one where the capitalization method plays a significant role, and also to implement urgent measures in order to reduce the barriers to business and employment development.

  4. High School Spanish Teachers' Attitudes and Practices toward Spanish Heritage Language Learners

    Science.gov (United States)

    Russell, Brittany D.; Kuriscak, Lisa M.

    2015-01-01

    This case study uses survey data to examine the attitudes and pedagogical practices of preservice and current high school Spanish teachers toward Spanish heritage language learners (HLLs). The research questions addressed were (1) the extent to which participants were aware of the challenges facing Spanish HLLs who are enrolled in traditional…

  5. Heritage Language Learners in Mixed Spanish Classes: Subtractive Practices and Perceptions of High School Spanish Teachers

    Science.gov (United States)

    Randolph, Linwood J., Jr.

    2017-01-01

    This qualitative study investigated the language ideologies and instructional practices of an entire Spanish language faculty at a high school in a new gateway state for immigration. The study examined additive and subtractive practices of teachers as they strived to teach Spanish to heritage language learners (HLLs) enrolled in mixed…

  6. Main challenges for security in the Spanish nuclear industry by experts and professionals in the sector

    International Nuclear Information System (INIS)

    German, S.; Silla, I.; Navajas, J.

    2014-01-01

    The overall objective of the project was to identify critical aspects of the organizational culture and safety performance and safe operation of high reliability of the Spanish nuclear sector organizations. (Author)

  7. Cohort profile: the Spanish WORKing life Social Security (WORKss) cohort study

    OpenAIRE

    López Gómez, María Andreé, 1985-; Duran Jordà, Xavier, 1974-; Zaballa, Elena; Sánchez Niubò, Albert; Delclòs i Clanchet, Jordi, 1956-; Benavides, Fernando G. (Fernando García)

    2016-01-01

    PURPOSE: The global economy is changing the labour market and social protection systems in Europe. The effect of both changes on health needs to be monitored in view of an ageing population and the resulting increase in prevalence of chronic health conditions. The Spanish WORKing life Social Security (WORKss) cohort study provides unique longitudinal data to study the impact of labour trajectories and employment conditions on health, in terms of sickness absence, permanent disability and deat...

  8. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Spanish Edition)

    International Nuclear Information System (INIS)

    2014-01-01

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objeurity Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit

  9. High-Tech Security Help.

    Science.gov (United States)

    Flanigan, Robin L.

    2000-01-01

    Advocates embrace high-tech security measures as necessary to avoid Columbine-style massacres. Critics contend that school systems can go overboard, making students feel less safe and too closely scrutinized. Current electronic, biometric, and computer-mapping devices and school applications are discussed. Vendors are listed. (MLH)

  10. Cohort profile: the Spanish WORKing life Social Security (WORKss) cohort study.

    Science.gov (United States)

    López Gómez, María Andrée; Durán, Xavier; Zaballa, Elena; Sanchez-Niubo, Albert; Delclos, George L; Benavides, Fernando G

    2016-03-07

    The global economy is changing the labour market and social protection systems in Europe. The effect of both changes on health needs to be monitored in view of an ageing population and the resulting increase in prevalence of chronic health conditions. The Spanish WORKing life Social Security (WORKss) cohort study provides unique longitudinal data to study the impact of labour trajectories and employment conditions on health, in terms of sickness absence, permanent disability and death. The WORKss cohort originated from the Continuous Working Life Sample (CWLS) generated by the General Directorate for the Organization of the Social Security in Spain. The CWLS contains a 4% representative sample of all individuals in contact with the Social Security system. The WORKss cohort exclusively includes individuals with a labour trajectory from 1981 or later. In 2004, the cohort was initiated with 1,022 ,79 Social Security members: 840,770 (82.2%) contributors and 182,009 (17.8%) beneficiaries aged 16 and older. The WORKss cohort includes demographic characteristics, chronological data about employment history, retirement, permanent disability and death. These data make possible the measurement of incidence of permanent disability, the number of potential years of working life lost, and the number of contracts and inactive periods with the Social Security system. The WORKss cohort was linked to temporary sickness absence registries to study medical diagnoses that lead to permanent disability and consequently to an earlier exit from the labour market in unhealthy conditions. Thanks to its administrative source, the WORKss cohort study will continue follow-up in the coming years, keeping the representativeness of the Spanish population affiliated to the Social Security system. The linkage between the WORKss cohort and temporary sickness absence registries is envisioned to continue. Future plans include the linkage of the cohort with mortality registries. Published by the BMJ

  11. Social security status and mortality in Belgian and Spanish male workers.

    Science.gov (United States)

    Duran, Xavier; Vanroelen, Christophe; Deboosere, Patrick; Benavides, Fernando G

    2016-01-01

    To assess differences in mortality rates between social security statuses in two independent samples of Belgian and Spanish male workers. Study of two retrospective cohorts (Belgium, n=23,607; Spain, n=44,385) of 50-60 year old male employees with 4 years of follow-up. Mortality rate ratios (MRR) were estimated using Poisson regression models. Mortality for subjects with permanent disability was higher than for the employed, for both Belgium [MRR=4.56 (95% CI: 2.88-7.21)] and Spain [MRR=7.15 (95% CI: 5.37-9.51)]. For the unemployed/early retirees, mortality was higher in Spain [MRR=1.64 (95% CI: 1.24-2.17)] than in Belgium [MRR=0.88 (95% CI: 0.46-1.71)]. MRR differences between Belgium and Spain for unemployed workers could be partly explained because of differences between the two social security systems. Future studies should further explore mortality differences between countries with different social security systems. Copyright © 2016 SESPAS. Published by Elsevier Espana. All rights reserved.

  12. Moving forward: Revisiting the Spanish for High Beginners course

    Directory of Open Access Journals (Sweden)

    Flavia Belpoliti

    2015-08-01

    Full Text Available This paper presents a case study on the redesign of a Spanish for High Beginners (SHB course at a large metropolitan university in Texas, USA. The first section presents a discussion on the diverse nature of students who can benefit from an intensive first-year Spanish course and the challenges that these learners’ mixed abilities pose for instruction. The second section describes the redesign process of the SHB course, including placement procedures, the Spanish Language Program sequence, and changes in the syllabus to integrate communicative and transcultural competences by implementing a combination of focused instruction, collaborative learning and task-based approaches. The last section introduces a short presentation of four activities implemented in the redesigned course, which provide paths for future development of advanced beginners’ integrative tasks. The final section focuses on the results of an exit survey measuring students’ perceptions of the course. The successful implementation of changes and its outcomes demonstrate that this course could be a relevant solution for Spanish programs at tertiary institutions with diverse populations, helping to solve challenges of placement, articulation, and time-to-graduation effectiveness.

  13. Prosocial behavior and academic motivation in Spanish High School Students

    OpenAIRE

    Inglés, Cándido J.; Universidad Miguel Hernández de Elche; Martínez-González, Agustin E.; Universidad Miguel Hernández de Elche; Valle, Antonio; Universidad de A Coruña; García-Fernández, José M.; Universidad de Alicante; Ruiz-Esteban, Cecilia; Universidad de Murcia

    2010-01-01

    This study analyzed the relationship between prosocial behaviour and academic goals in a sample of 2,022 Spanish compulsory secondary education students. The prosocial behaviour was measured with the Prosocial Behaviour scale of the Teenage Inventory of Social Skills (TISS) and academic goals were measured with the Achievement Goal Tendencies Questionnaire (AGTQ). The results revealed that students with high prosocial behaviour presented higher significantly scores in learning and performance...

  14. Computer Security: SAHARA - Security As High As Reasonably Achievable

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    History has shown us time and again that our computer systems, computing services and control systems have digital security deficiencies. Too often we deploy stop-gap solutions and improvised hacks, or we just accept that it is too late to change things.    In my opinion, this blatantly contradicts the professionalism we show in our daily work. Other priorities and time pressure force us to ignore security or to consider it too late to do anything… but we can do better. Just look at how “safety” is dealt with at CERN! “ALARA” (As Low As Reasonably Achievable) is the objective set by the CERN HSE group when considering our individual radiological exposure. Following this paradigm, and shifting it from CERN safety to CERN computer security, would give us “SAHARA”: “Security As High As Reasonably Achievable”. In other words, all possible computer security measures must be applied, so long as ...

  15. Secure Cloud-Based Solutions for Different eHealth Services in Spanish Rural Health Centers

    Science.gov (United States)

    2015-01-01

    Background The combination of eHealth applications and/or services with cloud technology provides health care staff—with sufficient mobility and accessibility for them—to be able to transparently check any data they may need without having to worry about its physical location. Objective The main aim of this paper is to put forward secure cloud-based solutions for a range of eHealth services such as electronic health records (EHRs), telecardiology, teleconsultation, and telediagnosis. Methods The scenario chosen for introducing the services is a set of four rural health centers located within the same Spanish region. iCanCloud software was used to perform simulations in the proposed scenario. We chose online traffic and the cost per unit in terms of time as the parameters for choosing the secure solution on the most optimum cloud for each service. Results We suggest that load balancers always be fitted for all solutions in communication together with several Internet service providers and that smartcards be used to maintain identity to an appropriate extent. The solutions offered via private cloud for EHRs, teleconsultation, and telediagnosis services require a volume of online traffic calculated at being able to reach 2 Gbps per consultation. This may entail an average cost of €500/month. Conclusions The security solutions put forward for each eHealth service constitute an attempt to centralize all information on the cloud, thus offering greater accessibility to medical information in the case of EHRs alongside more reliable diagnoses and treatment for telecardiology, telediagnosis, and teleconsultation services. Therefore, better health care for the rural patient can be obtained at a reasonable cost. PMID:26215155

  16. Secure Cloud-Based Solutions for Different eHealth Services in Spanish Rural Health Centers.

    Science.gov (United States)

    de la Torre-Díez, Isabel; Lopez-Coronado, Miguel; Garcia-Zapirain Soto, Begonya; Mendez-Zorrilla, Amaia

    2015-07-27

    The combination of eHealth applications and/or services with cloud technology provides health care staff—with sufficient mobility and accessibility for them—to be able to transparently check any data they may need without having to worry about its physical location. The main aim of this paper is to put forward secure cloud-based solutions for a range of eHealth services such as electronic health records (EHRs), telecardiology, teleconsultation, and telediagnosis. The scenario chosen for introducing the services is a set of four rural health centers located within the same Spanish region. iCanCloud software was used to perform simulations in the proposed scenario. We chose online traffic and the cost per unit in terms of time as the parameters for choosing the secure solution on the most optimum cloud for each service. We suggest that load balancers always be fitted for all solutions in communication together with several Internet service providers and that smartcards be used to maintain identity to an appropriate extent. The solutions offered via private cloud for EHRs, teleconsultation, and telediagnosis services require a volume of online traffic calculated at being able to reach 2 Gbps per consultation. This may entail an average cost of €500/month. The security solutions put forward for each eHealth service constitute an attempt to centralize all information on the cloud, thus offering greater accessibility to medical information in the case of EHRs alongside more reliable diagnoses and treatment for telecardiology, telediagnosis, and teleconsultation services. Therefore, better health care for the rural patient can be obtained at a reasonable cost.

  17. A Hard Month's Work in Manila. Securing Radioactive Sources (Spanish Edition)

    International Nuclear Information System (INIS)

    Potterton, Louise

    2013-01-01

    Security managers keep a watchful eye on spent radioactive sources. These disused sources, which served myriad purposes in medicine, industry and research, present a potential security threat; they could be obtained by terrorists to construct a dirty bomb. To ensure nuclear security and safety, it is essential to package, store and eventually dispose of these spent sources safely and securely. In some cases, that is easier said than done. For instance, removing an old and highly radioactive source from a medical device is difficult and dangerous. Imagine doing this remotely, using manipulators, in temperatures of up to 35 degrees and over 20 times. This is exactly what the IAEA, together with the South African Nuclear Energy Corporation (Necsa), successfully achieved in March and April 2013 at the Philippine Nuclear Research Institute (PNRI) in Manila. (author)

  18. Prosocial behavior and academic motivation in Spanish High School Students

    Directory of Open Access Journals (Sweden)

    Cándido J. Inglés

    2011-05-01

    Full Text Available This study analyzed the relationship between prosocial behaviour and academic goals in a sample of 2,022 Spanish compulsory secondary education students. The prosocial behaviour was measured with the Prosocial Behaviour scale of the Teenage Inventory of Social Skills (TISS and academic goals were measured with the Achievement Goal Tendencies Questionnaire (AGTQ. The results revealed that students with high prosocial behaviour presented higher significantly scores in learning and performance goals. The prosocial behaviour was a positive and statistically significant predictor of learning and performance goals. Furthermore, learning and performance goals were positive and statistically significant predictors of the prosocial behaviour, whereas social reinforcement goals were a negative and statisticallysignificant predictor of prosocial behaviour.

  19. High-speed high-security signatures

    NARCIS (Netherlands)

    Bernstein, D.J.; Duif, N.; Lange, T.; Schwabe, P.; Yang, B.Y.

    2011-01-01

    This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 108000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128 security level. Public keys are 32 bytes, and signatures are 64 bytes. These performance figures

  20. Latina Spanish High School Teachers' Negotiation of Capital in New Latino Communities

    Science.gov (United States)

    Colomer, Soria Elizabeth

    2014-01-01

    Based on a qualitative study documenting how Spanish teachers bear an especially heavy burden as unofficial translators, interpreters, and school representatives, this article documents how some Latina high school Spanish teachers struggle to form social networks with Latino students in new Latino school communities. Employing social frameworks,…

  1. Social security status and mortality in Belgian and Spanish male workers

    Directory of Open Access Journals (Sweden)

    Xavier Duran

    2016-07-01

    Conclusion: MRR differences between Belgium and Spain for unemployed workers could be partly explained because of differences between the two social security systems. Future studies should further explore mortality differences between countries with different social security systems.

  2. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    Full Text Available The design of physical security measures is a specialized technical area that does not fall in the normal skill record and resume of commanders, architects, engineers, and project managers. This document provides guidance to those parties tasked with implementing existing and emerging physical protection system requirements: -    Creation of a single-source reference for the design and construction of physical security measures for high-risk personnel (HRP. -    Promulgation of multi-service standard recommendations and considerations. -    Potential increase of productivity of HRP and reduced temporary housing costs through clarification of considerations, guidance on planning, and provision of design solutions. -    Reduction of facility project costs. -    Better performance of modernized facilities, in terms of force protection, than original facilities. Throughout this process you must ensure: confidentiality, appropriate Public Relations, sustainability, compliance with all industrial guidelines and legal and regulatory requirement, constant review and revision to accommodate new circumstances or threats. Introduction Physical security is an extremely broad topic. It encompasses access control devices such as smart cards, air filtration and fireproofing. It is also heavily reliant on infrastructure. This means that many of the ideal physical security measures may not be economically or physically feasible for existing sites. Many businesses do not have the option of building their own facility from the ground up; thus physical security often must be integrated into an existing structure. This limits the overall set of security measures that can be installed. There is an aspect of physical security that is often overlooked; the humans that interact with it. Humans commit crime for a number of reasons. The document focuses on two building types: the HRP office and the HRP residence. HRP are personnel who are likely to be

  3. Potential Threats to Spanish Security: Implications for the United States and NATO

    Science.gov (United States)

    1990-12-01

    the Civil War served as a sort of paternal catalyst for the resistance movement, the economic crisis that followed it served as a kind of maternal ...June 1977, Spain spent almost forty years unde the dictatmhip of Generalissim Francisco Franco, who established an authoritarian regime in Spain...dictatorship of Generalissimo Francisco Franco, who established an authoritarian regime in Spain following the Spanish Civil War (1936- 1939). Upon Franco’s

  4. Security of highly radioactive sources in Nepal

    International Nuclear Information System (INIS)

    Shrestha, Kamal K.

    2010-01-01

    Subsequent to 9/11, concerned countries and UN agencies have taken especial interest in the security of highly radioactive sources throughout the world. The IAEA Nuclear Security Plan (2006-2009) consequently made as a result of UN Security Council Resolution 1540 is binding to all States. The Global Threat Reduction Initiative (GTRI) of the US and the Global Threat Reduction Programme (GTRP) of UK have assisted the four hospitals in Nepal having more than 1,000 Curies of radioactivity in their Cobalt-60 sources used for teletherapy. The physical upgrade of the security of the nuclear materials has also been launched in Nepal for prevention of theft with malicious intention or threats. In this presentation, the radioisotopes in Nepal that comes under different categories according to TECDOC-1355 of IAEA will be described. Problems and issues regarding the security and protection of radioactive sources at hospitals, academic and research institutions that could be prevalent in many developing counties too will be discussed by taking a case study of one of the cancer hospitals in Kathmandu valley. (author)

  5. Nuclear Security Recommendations on Nuclear and other Radioactive Material out of Regulatory Control: Recommendations (Spanish Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    This publication presents recommendations for the nuclear security of nuclear and other radioactive material that is out of regulatory control. It is based on national experiences and practices and guidance publications in the field of security as well as the nuclear security related international instruments. The recommendations include guidance for States with regard to the nuclear security of nuclear and other radioactive material that has been reported as being out of regulatory control as well as for material that is lost, missing or stolen but has not been reported as such, or has been otherwise discovered. In addition, these recommendations adhere to the detection and assessment of alarms and alerts and to a graded response to criminal or unauthorized acts with nuclear security implications.

  6. Suicide in high security hospital patients.

    Science.gov (United States)

    Jones, Roland M; Hales, Heidi; Butwell, Martin; Ferriter, Mike; Taylor, Pamela J

    2011-08-01

    People with mental disorder and people who are violent are separately recognised as being at high risk of suicide. People detained in high security hospitals are recognised for their violence to others, but perhaps less so for their suicide potential. We aimed to investigate suicide rates among such patients during and after their high security hospital residency, and to establish risk factors for suicide. We extracted data from the Special Hospitals' Case Register on each person resident at any time between 1 January 1972 and 31 December 2000. Suicide rates were calculated for the whole period. We compared rates to the general population using standardised mortality ratios (SMRs). We used poisson regression to estimate the effects of gender, legal category of detention, offending history and length of admission on the suicide rate. Of the 5,955 individuals, 218 completed suicide. The suicide rate was nearly 7 times higher among resident men (SMR 662, 95% CI 478-845) and over 40 times higher in resident women (SMR 4,012, 95% CI 2,526-5,498) than in the general population; it was 23 times higher (SMR 2,325, 95% CI 1,901-2,751) and 45 times higher (SMR 4,486, 95% CI 2,727-6,245) among post-discharge men and women, respectively. The suicide rate was significantly higher among women than men inside high security but not after discharge. The suicide rate among high security hospital patients was significantly higher than in the general population. Women were especially at risk while resident, whereas for men, the risk was higher after discharge.

  7. Spanish I

    CERN Document Server

    Rodriguez, Jill

    2001-01-01

    CliffsQuickReview course guides cover the essentials of your toughest classes. Get a firm grip on core concepts and key material, and test your newfound knowledge with review questions. CliffsQuickReview Spanish I is meant to provide all the foundations of basic Spanish pronunciation, spelling, and sentence construction. Spanish grammar is systematically explained in its most simplistic way, so there's no need for any prerequisite before beginning this ""review"" of the equivalent of two years of high school Spanish. As you work your way through this review, you'll be ready to tackle such conc

  8. Attachment Security Balances Perspectives: Effects of Security Priming on Highly Optimistic and Pessimistic Explanatory Styles.

    Science.gov (United States)

    Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue

    2016-01-01

    Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.

  9. Security in the transport of radioactive material: Implementing guide. Spanish edition

    International Nuclear Information System (INIS)

    2013-01-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks

  10. Energy security in western Mediterranean: new factors, new policies. A Spanish perspective

    International Nuclear Information System (INIS)

    Mane-Estrada, Aurelia

    2008-01-01

    After having noticed that there are two typical approaches and models to address energy security, policies acting on the supply side and policies based on a market-and-institutions approach (like stated by the European Union), the author outlines the effects of this second approach for countries of the western Mediterranean Sea, and then analyses the evolutions of energetic relationships between Algeria (where the energy sector is the most open, which is the best equipped in terms of gas infrastructures, and which attracts foreign investors) and European countries of the region (France, Italy, Spain and Portugal). Thus, she analyses present exchanges in the region, the dependency of these European countries on Mediterranean producers, and the relationships between involved companies of the region. She discusses the issue of energy security policy for the region from the perspective of the governments of producing countries and of consuming countries, and of companies. She discusses whether the project of Union for the Mediterranean complies with these objectives of energy security

  11. Recovery and Purification of Spanish High Oleate Peanut ‘AT-9899’

    Science.gov (United States)

    “AT-9899” developed in Golden Peanut Company in 2002 is a Spanish market type peanut. It has spreading growth habit and mid maturity. Due to high level of oleate and small seed size, it is grown specifically for confectionery market in the USA and Mexico. However, from the time of development and ...

  12. Improving performance of high risk organizations Spanish nuclear sector from the analysis of organizational culture factors

    International Nuclear Information System (INIS)

    La Salabarnada, E.; German, S.; Silla, I.; Navajas, J.

    2012-01-01

    This paper presents the research project funded by UNESA and conducted by the CISOT-CIEMAT that aims to contribute to improving the operating performance of the Spanish nuclear power plants. This paper aims to identify the factors and key organizational processes to improve efficiency, in order to advance knowledge about the influence of organizational culture on the safety of high reliability organizations.

  13. High Assurance Models for Secure Systems

    Science.gov (United States)

    Almohri, Hussain M. J.

    2013-01-01

    Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…

  14. Spanish Earth Observation Satellite System

    Science.gov (United States)

    Borges, A.; Cerezo, F.; Fernandez, M.; Lomba, J.; Lopez, M.; Moreno, J.; Neira, A.; Quintana, C.; Torres, J.; Trigo, R.; Urena, J.; Vega, E.; Vez, E.

    2010-12-01

    The Spanish Ministry of Industry, Tourism and Trade (MITyC) and the Ministry of Defense (MoD) signed an agreement in 2007 for the development of a "Spanish Earth Observation Satellite System" based, in first instance, on two satellites: a high resolution optical satellite, called SEOSAT/Ingenio, and a radar satellite based on SAR technology, called SEOSAR/Paz. SEOSAT/Ingenio is managed by MITyC through the Centre for the Development of Industrial Technology (CDTI), with technical and contractual support from the European Space Agency (ESA). HISDESA T together with the Spanish Instituto Nacional de Técnica Aeroespacial (INTA, National Institute for Aerospace Technology) will be responsible for the in-orbit operation and the commercial operation of both satellites, and for the technical management of SEOSAR/Paz on behalf of the MoD. In both cases EADS CASA Espacio (ECE) is the prime contractor leading the industrial consortia. The ground segment development will be assigned to a Spanish consortium. This system is the most important contribution of Spain to the European Programme Global Monitoring for Environment and Security, GMES. This paper presents the Spanish Earth Observation Satellite System focusing on SEOSA T/Ingenio Programme and with special emphasis in the potential contribution to the ESA Third Party Missions Programme and to the Global Monitoring for Environment and Security initiative (GMES) Data Access.

  15. Ultra Secure High Reliability Wireless Radiation Monitor

    International Nuclear Information System (INIS)

    Cordaro, J.; Shull, D.; Farrar, M.; Reeves, G.

    2011-01-01

    Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows high temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be used for classified data

  16. ULTRA SECURE HIGH RELIABILITY WIRELESS RADIATION MONITOR

    Energy Technology Data Exchange (ETDEWEB)

    Cordaro, J.; Shull, D.; Farrar, M.; Reeves, G.

    2011-08-03

    Radiation monitoring in nuclear facilities is essential to safe operation of the equipment as well as protecting personnel. In specific, typical air monitoring of radioactive gases or particulate involves complex systems of valves, pumps, piping and electronics. The challenge is to measure a representative sample in areas that are radioactively contaminated. Running cables and piping to these locations is very expensive due to the containment requirements. Penetration into and out of an airborne or containment area is complex and costly. The process rooms are built with thick rebar-enforced concrete walls with glove box containment chambers inside. Figure 1 shows high temperature radiation resistance cabling entering the top of a typical glove box. In some case, the entire processing area must be contained in a 'hot cell' where the only access into the chamber is via manipulators. An example is shown in Figure 2. A short range wireless network provides an ideal communication link for transmitting the data from the radiation sensor to a 'clean area', or area absent of any radiation fields or radioactive contamination. Radiation monitoring systems that protect personnel and equipment must meet stringent codes and standards due to the consequences of failure. At first glance a wired system would seem more desirable. Concerns with wireless communication include latency, jamming, spoofing, man in the middle attacks, and hacking. The Department of Energy's Savannah River National Laboratory (SRNL) has developed a prototype wireless radiation air monitoring system that address many of the concerns with wireless and allows quick deployment in radiation and contamination areas. It is stand alone and only requires a standard 120 VAC, 60 Hz power source. It is designed to be mounted or portable. The wireless link uses a National Security Agency (NSA) Suite B compliant wireless network from Fortress Technologies that is considered robust enough to be

  17. High Security at a Low Cost

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    In the future tiny devices with microcontrollers and sensors will be in charge of numerous activities in our lives. Tracking our energy consumption and CO2 emission, controlling our living conditions, enforcing security, and monitoring our health will be some examples of their functions These dev......In the future tiny devices with microcontrollers and sensors will be in charge of numerous activities in our lives. Tracking our energy consumption and CO2 emission, controlling our living conditions, enforcing security, and monitoring our health will be some examples of their functions...

  18. Spanish high level radioactive waste management system issues

    International Nuclear Information System (INIS)

    Espejo, J.M.; Beceiro, A.R.

    1992-01-01

    The Empresa Nacional de Residuos Radiactivos, S.A. (ENRESA) has been limited liability company to be responsible for the management of all kind of radioactive wastes in Spain. This paper provides an overview of the strategy and main lines of action stated in the third General Radioactive Waste Plan, currently in force, for the management of spent nuclear fuel and high - level wastes, as well as an outline of the main related projects, either being developed or foreseen. Aspects concerning the organizational structure, the economic and financing system and the international cooperation are also included

  19. Spanish high level radioactive waste management system issues

    International Nuclear Information System (INIS)

    Ulibarri, A.; Veganzones, A.

    1993-01-01

    The Empresa Nacional de Residuous Radiactivos, S.A. (ENRESA) was set up in 1984 as a state-owned limited liability company to be responsible for the management of all kinds of radioactive wastes in Spain. This paper provides an overview of the strategy and main lines of action stated in the third General Radioactive Waste Plan, currently in force, for the management of spent nuclear fuel and high-level wastes, as well as an outline of the main related projects, either being developed or foreseen. Aspects concerning the organizational structure, the economic and financing system and the international co-operational are also included

  20. Secure Enclaves: An Isolation-centric Approach for Creating Secure High Performance Computing Environments

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological Univ., Cookeville, TN (United States); Caldwell, Blake A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Hicks, Susan Elaine [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Koch, Scott M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Naughton, III, Thomas J. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Pelfrey, Daniel S. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Pogge, James R [Tennessee Technological Univ., Cookeville, TN (United States); Scott, Stephen L [Tennessee Technological Univ., Cookeville, TN (United States); Shipman, Galen M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Sorrillo, Lawrence [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-01-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data at various security levels but in so doing are often enclaved at the highest security posture. This approach places significant restrictions on the users of the system even when processing data at a lower security level and exposes data at higher levels of confidentiality to a much broader population than otherwise necessary. The traditional approach of isolation, while effective in establishing security enclaves poses significant challenges for the use of shared infrastructure in HPC environments. This report details current state-of-the-art in virtualization, reconfigurable network enclaving via Software Defined Networking (SDN), and storage architectures and bridging techniques for creating secure enclaves in HPC environments.

  1. Video performance for high security applications

    International Nuclear Information System (INIS)

    Connell, Jack C.; Norman, Bradley C.

    2010-01-01

    The complexity of physical protection systems has increased to address modern threats to national security and emerging commercial technologies. A key element of modern physical protection systems is the data presented to the human operator used for rapid determination of the cause of an alarm, whether false (e.g., caused by an animal, debris, etc.) or real (e.g., a human adversary). Alarm assessment, the human validation of a sensor alarm, primarily relies on imaging technologies and video systems. Developing measures of effectiveness (MOE) that drive the design or evaluation of a video system or technology becomes a challenge, given the subjectivity of the application (e.g., alarm assessment). Sandia National Laboratories has conducted empirical analysis using field test data and mathematical models such as binomial distribution and Johnson target transfer functions to develop MOEs for video system technologies. Depending on the technology, the task of the security operator and the distance to the target, the Probability of Assessment (PAs) can be determined as a function of a variety of conditions or assumptions. PAs used as an MOE allows the systems engineer to conduct trade studies, make informed design decisions, or evaluate new higher-risk technologies. This paper outlines general video system design trade-offs, discusses ways video can be used to increase system performance and lists MOEs for video systems used in subjective applications such as alarm assessment.

  2. TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Hsien-Hsin S

    2010-05-11

    The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniques and system software for achieving a robust, secure, and reliable computing system toward our goal.

  3. High Speed Rail commuting: Efficiency analysis of the Spanish HSR links

    Energy Technology Data Exchange (ETDEWEB)

    Moyano, A.

    2016-07-01

    This paper is centred on the analysis of the commuting High Speed Rail (HSR) links that are possible nowadays in the Spanish network. The large development of the network multiplies the possibilities of travelling for commuting. However, not only the feasibility but also the characteristics of the trip, in terms of ticket cost and time spent on the travel, become essential factors when considering HSR commuting links. This paper presents a person-based methodology focused on travellers’ needs and working schedules constraints, which allow differentiating among connections and identifying those intervals of time spent and costs that are affordable for commuting. (Author)

  4. High enrichment to low enrichment core's conversion. Technical securities

    International Nuclear Information System (INIS)

    Abbate, P.; Madariaga, M.R.

    1990-01-01

    This work presents the fulfillment of the technical securities subscribed by INVAP S.E. for the conversion of a high enriched uranium core. The reactor (of 5 thermal Mw), built in the 50's and 60's, is of the 'swimming pool' type, with light water and fuel elements of the curve plates MTR type, enriched at 93.15 %. These are neutronic and thermohydraulic securities. (Author) [es

  5. The Contribution of the Spanish Guardia Civil to the Peace and Stability Operations Within the Human Security Framework

    Science.gov (United States)

    2010-03-08

    1999.- U.N. Civilian Police component in Kosovo (UNMIK.) 2000.- Oficina del Programa de Irak (no es especificamente una misi6n de paz) 2000.- Special...community security, and political security. Nevertheless, it is worth pointing out that the establishment and the inclusion of an agenda based on the human...model the pattern set in France by the Gendarmerie and in Catalonia by the existing Mossos de Escuadra. The Dulce of Ahumada personally shaped this new

  6. The ESPRIT project CAFE : high security digital payment systems

    NARCIS (Netherlands)

    Boly, J.P.; Bosselaers, A.; Cramer, R.; Michelsen, R.; Mjølsnes, S.F.; Muller, F.; Pedersen, T.P.; Pfitzmann, B.; Rooij, de P.; Schoenmakers, B.; Schunter, M.; Vallée, L.; Waidner, M.; Gollmann, D.

    1994-01-01

    CAFE (“Conditional Access for Europe”) is an ongoing project in the European Community's ESPRIT program. The goal of CAFE is to develop innovative systems for conditional access, and in particular, digital payment systems. An important aspect of CAFE is high security of all parties concerned, with

  7. Development of high-index optical coating for security holograms

    Science.gov (United States)

    Ahmed, Nadir A. G.

    2000-10-01

    Over the past few years security holograms have grown into a complex business to prevent counterfeiting of security cards, banknotes and the like. Rapid advances in holographic technology have led to a growing requirement for optical materials and coating methods to produce such holograms at reasonable costs. These materials have specific refractive indices and are used to fabricate semi- transparent holograms. The present paper describes a coating process to deposit optical coating on flexible films inside a vacuum web metallizer for the production of high quality semi-transparent holograms.

  8. Assessing Time Management Skills as an Important Aspect of Student Learning: The Construction and Evaluation of a Time Management Scale with Spanish High School Students

    Science.gov (United States)

    Garcia-Ros, Rafael; Perez-Gonzalez, Francisco; Hinojosa, Eugenia

    2004-01-01

    The main purpose of this study is to analyse the factorial structure, psychometric properties and predictive capacity for academic achievement of a scale designed to evaluate the time management skills of Spanish high school students. An adaptation of the Time Management Questionnaire was presented to two samples of 350 Spanish high school…

  9. Two Sides of the Communicative Coin: Honors and Nonhonors French and Spanish Classes in a Midwestern High School

    Science.gov (United States)

    Morris, Michael

    2005-01-01

    This study compares the instructional practices in honors and nonhonors French and Spanish classes at a Midwestern high school, as well as factors influencing those practices. The researcher observed 54 class sessions and used questionnaires and interviews to obtain teachers' perspectives on instruction. Analysis revealed a statistically…

  10. A Hard Month's Work in Manila. Securing Radioactive Sources (Spanish Edition); Un mes de intenso trabajo en Manila. Garantizar la seguridad fisica de las fuentes radiactivas

    Energy Technology Data Exchange (ETDEWEB)

    Potterton, Louise [IAEA, Division of Public Information. Vienna (Austria)

    2013-06-15

    Security managers keep a watchful eye on spent radioactive sources. These disused sources, which served myriad purposes in medicine, industry and research, present a potential security threat; they could be obtained by terrorists to construct a dirty bomb. To ensure nuclear security and safety, it is essential to package, store and eventually dispose of these spent sources safely and securely. In some cases, that is easier said than done. For instance, removing an old and highly radioactive source from a medical device is difficult and dangerous. Imagine doing this remotely, using manipulators, in temperatures of up to 35 degrees and over 20 times. This is exactly what the IAEA, together with the South African Nuclear Energy Corporation (Necsa), successfully achieved in March and April 2013 at the Philippine Nuclear Research Institute (PNRI) in Manila. (author)

  11. Safety of spanish nuclear park. Analysis of the fundamental principles of security of nuclear facilities and activities

    International Nuclear Information System (INIS)

    2010-01-01

    The aim of this study is to analyze the fundamental principles underlying the safety of nuclear installations and activities, which defined the International Atomic Energy Agency (IAEA). These principles determine the roles of government and responsibilities of the holders of power, explain how to achieve security and nuclear energy to justify the society, present and future and the environment from the risks of ionizing radiation, both and explain natural and man must be managed as waste that occur or have occurred in the past. (Author)

  12. [Prevalence trends of high risk of mental disorders in the Spanish adult population: 2006-2012].

    Science.gov (United States)

    Basterra, Virginia

    To evaluate the prevalence of high risk of psychiatric morbidity in the Spanish adult population and its changes between 2006 and 2012. Data from 47,905 participants obtained from the National Health Surveys in 2006 and 2012 were used. Mental health status was assessed with the General Health Questionnaire score. Adjusted logistic regression models were fitted. The prevalence of high risk of psychiatric morbidity was 20.5% in 2012 and 21.3% in 2006. Using 2006 as the reference, the odds ratio (OR) for these problems in 2012 was 0.84 (0.79-0.89) in women and 1.10 (1.02-1.18) in men. In women, it decreased for all ages. In men, these ORs were 1.15 (1.04-1.27) in the aged 16-44 group, 1.23 (1.08-1.40) in the aged 45-64 group and 0.81 (0.68-0.96) in the aged ≥ 65 group. The prevalence of high risk of psychiatric morbidity decreased except in males <65 years of age, who are more sensitive to the economic crisis. Copyright © 2017 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  13. Design and implementation of a high performance network security processor

    Science.gov (United States)

    Wang, Haixin; Bai, Guoqiang; Chen, Hongyi

    2010-03-01

    The last few years have seen many significant progresses in the field of application-specific processors. One example is network security processors (NSPs) that perform various cryptographic operations specified by network security protocols and help to offload the computation intensive burdens from network processors (NPs). This article presents a high performance NSP system architecture implementation intended for both internet protocol security (IPSec) and secure socket layer (SSL) protocol acceleration, which are widely employed in virtual private network (VPN) and e-commerce applications. The efficient dual one-way pipelined data transfer skeleton and optimised integration scheme of the heterogenous parallel crypto engine arrays lead to a Gbps rate NSP, which is programmable with domain specific descriptor-based instructions. The descriptor-based control flow fragments large data packets and distributes them to the crypto engine arrays, which fully utilises the parallel computation resources and improves the overall system data throughput. A prototyping platform for this NSP design is implemented with a Xilinx XC3S5000 based FPGA chip set. Results show that the design gives a peak throughput for the IPSec ESP tunnel mode of 2.85 Gbps with over 2100 full SSL handshakes per second at a clock rate of 95 MHz.

  14. Spanish experience of fuel performance under zinc injection conditions in high duty plants

    International Nuclear Information System (INIS)

    Sanchez, Alicia; Doncel, Nuria

    2008-01-01

    Zinc is being added to the reactor coolant system in three Spanish PWRs (Vandellos II, Asco I and Asco II), owned by Association Nuclear Asco Vandellos AIE (ANAV), to delay Primary Water Stress Corrosion Cracking (PWSCC) initiation. Although additional advantages from zinc addition are expected, in the short term some concern exists concerning fuel performance during the first cycles of zinc addition due to a possible elevation of corrosion products from system materials when zinc is initially added. Elevated corrosion product levels in a high duty plant may cause an enhancement on crud deposited on fuel, increasing Axial Offset Anomaly (AOA) risk and accelerated cladding corrosion. To demonstrate the acceptable performance of ZIRLOTM clad fuel under zinc chemistry at a high duty plant, EPRI's Fuel Reliability Program (FRP) has chosen Vandellos II as a zinc demonstration plant to perform oxide thickness measurements and crud scraping and analysis. This paper presents the results from Vandellos II and Asco II oxide measurements as well as the conclusions from the crud samples analyses performed at Vandellos II. Furthermore, the effect of zinc addition on corrosion product behavior and dose rates are be discussed

  15. High-Performance Secure Database Access Technologies for HEP Grids

    Energy Technology Data Exchange (ETDEWEB)

    Matthew Vranicar; John Weicher

    2006-04-17

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the

  16. High-Performance Secure Database Access Technologies for HEP Grids

    International Nuclear Information System (INIS)

    Vranicar, Matthew; Weicher, John

    2006-01-01

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist's computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that 'Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications'. There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure

  17. Selection and evaluation of inner material candidates for Spanish high level radioactive waste canisters

    International Nuclear Information System (INIS)

    Puig, Francesc; Dies, Javier; Sevilla, Manuel; Pablo, Joan de; Pueyo, Juan Jose; Miralles, Lourdes; Martinez-Esparza, Aurora

    2007-01-01

    This paper summarizes the work carried out to analyse different alternatives related to the inner material selection of the Spanish high level waste canister for long term storage. The preliminary repository design considers granitic or clay formations, compacted bentonite sealing, corrosion allowing steel canisters and glass bead filling between the fuel assemblies and canister walls. This filling material will have the primary role of avoiding the possibility of a criticality event, which becomes an issue of major importance once the container is finally breached by corrosion and flooded by groundwater. In the first place, a complete set of requirements have been devised as evaluation criteria for candidate materials examination and selection; resulting in a compilation of demands significantly deeper and more exhaustive than any other similar work found in literature, including over 20 requirements and some other general aspects that could involve improvements in repository performance. Secondly, eight materials or material families (cast iron or steel, borosilicate glass, spinel, depleted uranium, dehydrated zeolites, hematite, phosphates and olivine) have been chosen and examined in detail, extracting some relevant conclusions. Either cast iron, borosilicate glass, spinel or depleted uranium are considered to look quite promising for the mentioned purpose. (authors)

  18. High prevalence of vitamin D insufficiency among elite Spanish athletes the importance of outdoor training adaptation.

    Science.gov (United States)

    Valtueña, Jara; Dominguez, D; Til, L; González-Gross, M; Drobnic, F

    2014-07-01

    The discovery of vitamin D muscle receptors in the last few years suggested a significant role in muscle tissue, pointing out athletes as a special group. Specific data are scarce. The main aim of the current paper was to provide, for the first time, comparable data about vitamin D status in elite Spanish athletes by sport, age, season and training environment. Four hundred and eight elite athletes with a mean age of 22.8 ± 8.4 years were recruited from the High-performance sport centre in Barcelona for this cross-sectional study. Athletes from 34 different sports modalities were analysed. Data were available for vitamin D status, training environment, seasonality and number of medical visits. All data were analysed using SPSS version 18.0. Mean 25(OH)D of all athletes was 56.7 ± 23.4 nmol/L. Approximately 82% of the athletes were below the optimal levels, (D concentrations with increasing age (p < 0.01) Highest levels were observed in those subjects training outdoors compared with those training indoor (p. Copyright AULA MEDICA EDICIONES 2014. Published by AULA MEDICA. All rights reserved.

  19. Integrated safeguards and security for a highly automated process

    International Nuclear Information System (INIS)

    Zack, N.R.; Hunteman, W.J.; Jaeger, C.D.

    1993-01-01

    Before the cancellation of the New Production Reactor Programs for the production of tritium, the reactors and associated processing were being designed to contain some of the most highly automated and remote systems conceived for a Department of Energy facility. Integrating safety, security, materials control and accountability (MC and A), and process systems at the proposed facilities would enhance the overall information and protection-in-depth available. Remote, automated fuel handling and assembly/disassembly techniques would deny access to the nuclear materials while upholding ALARA principles but would also require the full integration of all data/information systems. Such systems would greatly enhance MC and A as well as facilitate materials tracking. Physical protection systems would be connected with materials control features to cross check activities and help detect and resolve anomalies. This paper will discuss the results of a study of the safeguards and security benefits achieved from a highly automated and integrated remote nuclear facility and the impacts that such systems have on safeguards and computer and information security

  20. Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    2006-01-01

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  1. Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    2007-01-01

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most

  2. Specifying Information Security Needs for the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. We propose to explicitly link security requirements with the organizations' business vision, i.e. to provide business rationale for security requirements. The rationale is then

  3. Optimizing a physical security configuration using a highly detailed simulation model

    NARCIS (Netherlands)

    Marechal, T.M.A.; Smith, A.E.; Ustun, V.; Smith, J.S.; Lefeber, A.A.J.; Badiru, A.B.; Thomas, M.U.

    2009-01-01

    This research is focused on using a highly detailed simulation model to create a physical security system to prevent intrusions in a building. Security consists of guards and security cameras. The problem is represented as a binary optimization problem. A new heuristic is proposed to do the security

  4. Genetic analysis of high bone mass cases from the BARCOS cohort of Spanish postmenopausal women.

    Directory of Open Access Journals (Sweden)

    Patricia Sarrión

    Full Text Available The aims of the study were to establish the prevalence of high bone mass (HBM in a cohort of Spanish postmenopausal women (BARCOS and to assess the contribution of LRP5 and DKK1 mutations and of common bone mineral density (BMD variants to a HBM phenotype. Furthermore, we describe the expression of several osteoblast-specific and Wnt-pathway genes in primary osteoblasts from two HBM cases. A 0.6% of individuals (10/1600 displayed Z-scores in the HBM range (sum Z-score >4. While no mutation in the relevant exons of LRP5 was detected, a rare missense change in DKK1 was found (p.Y74F, which cosegregated with the phenotype in a small pedigree. Fifty-five BMD SNPs from Estrada et al. [NatGenet 44:491-501,2012] were genotyped in the HBM cases to obtain risk scores for each individual. In this small group of samples, Z-scores were found inversely related to risk scores, suggestive of a polygenic etiology. There was a single exception, which may be explained by a rare penetrant genetic variant, counterbalancing the additive effect of the risk alleles. The expression analysis in primary osteoblasts from two HBM cases and five controls suggested that IL6R, DLX3, TWIST1 and PPARG are negatively related to Z-score. One HBM case presented with high levels of RUNX2, while the other displayed very low SOX6. In conclusion, we provide evidence of lack of LRP5 mutations and of a putative HBM-causing mutation in DKK1. Additionally, we present SNP genotyping and expression results that suggest additive effects of several genes for HBM.

  5. Spanish High School Students' Interests in Technology: Applying Social Cognitive Career Theory

    Science.gov (United States)

    Inda-Caro, Mercedes; Rodríguez-Menéndez, Carmen; Peña-Calvo, José-Vicente

    2016-01-01

    The authors have examined the relative contribution of personal (emotional state, gender-role attitudes), contextual (perceived social supports and barriers), and cognitive (self-efficacy beliefs, outcome expectations) variables to technological interests in a sample (N = 2,364) of 10th-grade Spanish students. The results of path analysis…

  6. Curriculum Guide for General Education Development or High School Equivalency Examination in Spanish.

    Science.gov (United States)

    Sharma, Shobha; Escalona, Margaret Boyter

    This curriculum guide was developed as part of the Worker Education Program for workers in the garment industry. The program was jointly developed by the workers, their employer, their union, and Northeastern Illinois University. It contains the materials required to teach a course to help Spanish-speaking individuals pass the General Educational…

  7. Validity and reliability of Spanish versions of the Ruminative Responses Scale-Short Form and the Distraction Responses Scale in a sample of Spanish high school and college students.

    Science.gov (United States)

    Extremera, Natalio; Fernández-Berrocal, Pablo

    2006-02-01

    This study investigated the construct validity and reliability of the Spanish Ruminative Responses Scale-Short From, and the Distraction Responses Scale of the Response Styles Questionnaire for a sample of 727 Spanish high school and college students who responded anonymously and voluntarily to a questionnaire (293 men, 434 women; ages 16 to 29 years, M=18.8, SD=3.0). In addition to the above scales, the questionnaire included the Spanish forms of the Beck Depression Inventory, the Trait Anxiety Scale from the State-Trait Anxiety Scale, the Satisfaction with Life Scale, and the Subjective Happiness Scale. The internal consistency of the scales was satisfactory (Cronbach alpha=.86 for the Ruminative Responses Scale and .78 for the Distraction Responses Scale). As expected, scores on the Spanish Ruminative Responses Scale showed positive correlations with those on the Beck Depression Inventory and the Trait Anxiety Scale and negative associations with the Satisfaction with Life Scale and the Subjective Happiness Scale. Conversely, the Spanish Distraction Responses Scale was negatively correlated with the Beck Depression Inventory and positively associated with the Satisfaction with Life Scale and the Subjective Happiness Scale. These results provide evidence of appropriate reliability for research purposes. Furthermore, the correlational analysis supported prior findings that ruminative response and distraction response styles are differentially associated with reported depressed and positive moods.

  8. Mastering wireless penetration testing for highly secured environments

    CERN Document Server

    Johns, Aaron

    2015-01-01

    This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking.

  9. 33 CFR 165.121 - Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode Island.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones: High... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.121 Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode...

  10. CONSIDERATIONS REGARDING THE 21st CENTURY’s HIGH QUALITY SECURITY CONCEPT

    Directory of Open Access Journals (Sweden)

    Eugen SITEANU

    2017-12-01

    Full Text Available The present paper is devoted to qualitative security which today has to become a topic issue of world security. The opinions regarding the 21st century’s security concept are contradictory since people have different understandings and perceptions of security, respectively insecurity, and do not agree to analyze the security concept as a function of the system. Our take is that implementation of some new security concepts should aim an analysis and understanding of security in an integrating view, in order to make the most comprehensive security environment possible. Therefore, we do believe that it is necessary to define the concept of high quality security, which is translated in our current paper.

  11. Quantum secure direct communication with high-dimension quantum superdense coding

    International Nuclear Information System (INIS)

    Wang Chuan; Li Yansong; Liu Xiaoshu; Deng Fuguo; Long Guilu

    2005-01-01

    A protocol for quantum secure direct communication with quantum superdense coding is proposed. It combines the ideas of block transmission, the ping-pong quantum secure direct communication protocol, and quantum superdense coding. It has the advantage of being secure and of high source capacity

  12. Vraaggestuurd Programma 2012-2014. Voortgangsrapportage 2013, VP Security, Thema VII High Tech Systemen en Materialen

    NARCIS (Netherlands)

    Don, J.A.

    2014-01-01

    De roadmap Security voor topsector High Tech Systems & Materials wordt gedragen door een breed consortium van bedrijven, overheden, TNO, NLR en STW/NWO (zie www.htsm.nl). Onder regie van het roadmapteam Security is het plan 2013 voor TNO-Vraaggestuurd Onderzoeksprogramma Security 2012-2014 opgesteld

  13. Occurrence of high-tonnage anionic surfactants in Spanish sewage sludge.

    Science.gov (United States)

    Cantarero, Samuel; Prieto, Carlos A; López, Ignacio

    2012-03-01

    Agricultural application has become the most widespread method of sewage sludge disposal, being the most economical outlet for sludge and also recycling beneficial plant nutrients and organic matter to soil for crop production. As a matter of fact, the European Sewage Sludge Directive 86/278/EEC seeks to encourage the disposal of sewage sludge in agriculture applications and regulate its use to prevent harmful effects on the soil environment. At the present time, the sewage sludge Directive is under revision and a possible cut-off limit for some organic chemicals may be implemented. Linear alkylbenzene sulphonate (LAS), the main synthetic anionic surfactant, has been included in the draft list of chemicals to be limited. The present research work deals with the monitoring of LAS and soap in Spanish sewage sludge. The average concentration of LAS found in anaerobic sewage sludge samples was 8.06 g/kg, higher than the average values for European sludge. Besides, it has been also found that more than 55% of Spanish anaerobic sludge would not fulfil the limit proposed by the 3rd European Working paper on sludge. As a consequence, the implementation of the limit for LAS would make the disposal of most Spanish biosolids for agricultural applications almost impossible. Regarding the mechanisms why anionic surfactants are found in sludge, two surfactants are compared: LAS and soap, both readily biodegraded in aerobic conditions. Irrespective of the anaerobic biodegradability of soap, its concentration found in sludge is higher than LAS (only anaerobically biodegradable under particular conditions). The relevance of anaerobic biodegradation to assure environmental protection is discussed for this case. Copyright © 2011 Elsevier Ltd. All rights reserved.

  14. Prevalence of high blood pressure and association with obesity in Spanish schoolchildren aged 4-6 years old.

    Science.gov (United States)

    Martín-Espinosa, Noelia; Díez-Fernández, Ana; Sánchez-López, Mairena; Rivero-Merino, Irene; Lucas-De La Cruz, Lidia; Solera-Martínez, Montserrat; Martínez-Vizcaíno, Vicente

    2017-01-01

    The prevalence of high blood pressure in children is increasing worldwide, largely, but not entirely, driven by the concurrent childhood obesity epidemic. The aims of this study were to examine the prevalence of prehypertension and hypertension in 4-to-6-year-old Spanish schoolchildren, and to evaluate the association between different blood pressure (BP) components with different adiposity indicators. Cross-sectional study including a sample of 1.604 schoolchildren aged 4-to-6-years belonging to 21 schools from the provinces of Ciudad Real and Cuenca, Spain. We measured height, weight, body mass index (BMI), fat mass percentage (%FM), triceps skinfold thickness (TST), waist circumference (WC), systolic and diastolic BP, mean arterial pressure and pulse pressure. The estimates of prevalence of prehypertension and hypertension were 12.3% and 18.2%, respectively. In both sexes, adiposity indicators were positively and significantly associated with all BP components (phigh blood pressure in Spanish children. Moreover, high levels of adiposity are associated with high blood pressure in early childhood, which support that it could be related to cardiovascular risk later in life.

  15. The external dimension of the Spanish transition

    Directory of Open Access Journals (Sweden)

    Charles T. Powell

    1993-07-01

    Full Text Available The author intends to go beyond the unanimous opinion that the processes of political transition must be explained, almost exclusively, in terms of national forces and calculations. In the case of the Spanish transition he intends to demonstrate how thestrategies of the national actors (crown, government and parties were moulded largely by the pressure of regulations and structures drawn up outside its frontiers. Firstly, by the United States’ discreet support (always putting forward first her strategic interests of the political evolution whilst it did not put in danger the Spanish contribution to the western defensive system (while the USSR hardly played any role. The Spanish transition did not offer a threat to the alliance system from the beginning and with which the result was practically guaranteed. The European governments for their part, worried least about security and more about the political dimension pressurizing the regime and supporting the leaders of the democratic opposition more and more. The European institutions, withtheir veto, ended up legitimizing the Spanish process of democratization while the different Internationals came together and helped their coreligionists in Spain. Their political and diplomatic pressure were complemented, with the paradigm in the case of PSOE, with the contribution of means and resources by the political foundations, largely German, whose highly visible participation did not lessen the credibiity of those it protected.

  16. Application of the Spanish methodological approach for biosphere assessment to a generic high-level waste disposal site

    International Nuclear Information System (INIS)

    Agueero, A.; Pinedo, P.; Simon, I.; Cancio, D.; Moraleda, M.; Trueba, C.; Perez-Sanchez, D.

    2008-01-01

    A methodological approach which includes conceptual developments, methodological aspects and software tools have been developed in the Spanish context, based on the BIOMASS 'Reference Biospheres Methodology'. The biosphere assessments have to be undertaken with the aim of demonstrating compliance with principles and regulations established to limit the possible radiological impact of radioactive waste disposals on human health and on the environment, and to ensure that future generations will not be exposed to higher radiation levels than those that would be acceptable today. The biosphere in the context of high-level waste disposal is defined as the collection of various radionuclide transfer pathways that may result in releases into the surface environment, transport within and between the biosphere receptors, exposure of humans and biota, and the doses/risks associated with such exposures. The assessments need to take into account the complexity of the biosphere, the nature of the radionuclides released and the long timescales considered. It is also necessary to make assumptions related to the habits and lifestyle of the exposed population, human activities in the long term and possible modifications of the biosphere. A summary on the Spanish methodological approach for biosphere assessment are presented here as well as its application in a Spanish generic case study. A reference scenario has been developed based on current conditions at a site located in Central-West Spain, to indicate the potential impact to the actual population. In addition, environmental change has been considered qualitatively through the use of interaction matrices and transition diagrams. Unit source terms of 36 Cl, 79 Se, 99 Tc, 129 I, 135 Cs, 226 Ra, 231 Pa, 238 U, 237 Np and 239 Pu have been taken. Two exposure groups of infants and adults have been chosen for dose calculations. Results are presented and their robustness is evaluated through the use of uncertainty and sensitivity

  17. Application of the Spanish methodological approach for biosphere assessment to a generic high-level waste disposal site.

    Science.gov (United States)

    Agüero, A; Pinedo, P; Simón, I; Cancio, D; Moraleda, M; Trueba, C; Pérez-Sánchez, D

    2008-09-15

    A methodological approach which includes conceptual developments, methodological aspects and software tools have been developed in the Spanish context, based on the BIOMASS "Reference Biospheres Methodology". The biosphere assessments have to be undertaken with the aim of demonstrating compliance with principles and regulations established to limit the possible radiological impact of radioactive waste disposals on human health and on the environment, and to ensure that future generations will not be exposed to higher radiation levels than those that would be acceptable today. The biosphere in the context of high-level waste disposal is defined as the collection of various radionuclide transfer pathways that may result in releases into the surface environment, transport within and between the biosphere receptors, exposure of humans and biota, and the doses/risks associated with such exposures. The assessments need to take into account the complexity of the biosphere, the nature of the radionuclides released and the long timescales considered. It is also necessary to make assumptions related to the habits and lifestyle of the exposed population, human activities in the long term and possible modifications of the biosphere. A summary on the Spanish methodological approach for biosphere assessment are presented here as well as its application in a Spanish generic case study. A reference scenario has been developed based on current conditions at a site located in Central-West Spain, to indicate the potential impact to the actual population. In addition, environmental change has been considered qualitatively through the use of interaction matrices and transition diagrams. Unit source terms of (36)Cl, (79)Se, (99)Tc, (129)I, (135)Cs, (226)Ra, (231)Pa, (238)U, (237)Np and (239)Pu have been taken. Two exposure groups of infants and adults have been chosen for dose calculations. Results are presented and their robustness is evaluated through the use of uncertainty and

  18. Relationships between Physical Activity Levels, Self-Identity, Body Dissatisfaction and Motivation among Spanish High School Students.

    Science.gov (United States)

    Sánchez-Miguel, Pedro Antonio; Leo, Francisco Miguel; Amado, Diana; Pulido, Juan José; Sánchez-Oliva, David

    2017-10-01

    The aim of this study was to examine the relationships between gender and the educational grade on the one hand, and physical activity levels, motivation, self-identity, body dissatisfaction, the intention to be physically active and daily sitting time on the other, in a sample of Spanish high school adolescents. The sample consisted of 2087 Spanish students from the 3rd (n = 1141) and 4th grade (n = 946), both male (n = 1046) and female (n = 1041), ranging in age from 15 to 17 years old (M = 15.42; SD = .86). Students completed questionnaires to assess their levels of physical activity, self-identity, motivation, intention to be physically active and daily sitting time. The students' perceptions of their body height and mass were also tested. With the exception of walking MET values, the results showed gender differences in the variables tested. Male participants showed higher intrinsic motivation and lower amotivation than female participants. Furthermore, male students revealed higher levels of physical activity than female students. Finally, the research concluded with the importance of promoting intrinsic reasons for physical activity in order to encourage positive consequences in high school students.

  19. Relationships between Physical Activity Levels, Self-Identity, Body Dissatisfaction and Motivation among Spanish High School Students

    Science.gov (United States)

    Sánchez-Miguel, Pedro Antonio; Leo, Francisco Miguel; Amado, Diana; Pulido, Juan José; Sánchez-Oliva, David

    2017-01-01

    Abstract The aim of this study was to examine the relationships between gender and the educational grade on the one hand, and physical activity levels, motivation, self-identity, body dissatisfaction, the intention to be physically active and daily sitting time on the other, in a sample of Spanish high school adolescents. The sample consisted of 2087 Spanish students from the 3rd (n = 1141) and 4th grade (n = 946), both male (n = 1046) and female (n = 1041), ranging in age from 15 to 17 years old (M = 15.42; SD = .86). Students completed questionnaires to assess their levels of physical activity, self-identity, motivation, intention to be physically active and daily sitting time. The students’ perceptions of their body height and mass were also tested. With the exception of walking MET values, the results showed gender differences in the variables tested. Male participants showed higher intrinsic motivation and lower amotivation than female participants. Furthermore, male students revealed higher levels of physical activity than female students. Finally, the research concluded with the importance of promoting intrinsic reasons for physical activity in order to encourage positive consequences in high school students. PMID:29134046

  20. Relationships Between Physical Activity Levels, Self-Identity, Body Dissatisfaction and Motivation Among Spanish High School Students

    Directory of Open Access Journals (Sweden)

    Sánchez-Miguel Pedro Antonio

    2017-10-01

    Full Text Available The aim of this study was to examine the relationships between gender and the educational grade on the one hand, and physical activity levels, motivation, self-identity, body dissatisfaction, the intention to be physically active and daily sitting time on the other, in a sample of Spanish high school adolescents. The sample consisted of 2087 Spanish students from the 3rd (n = 1141 and 4th grade (n = 946, both male (n = 1046 and female (n = 1041, ranging in age from 15 to 17 years old (M = 15.42; SD = .86. Students completed questionnaires to assess their levels of physical activity, self-identity, motivation, intention to be physically active and daily sitting time. The students’ perceptions of their body height and mass were also tested. With the exception of walking MET values, the results showed gender differences in the variables tested. Male participants showed higher intrinsic motivation and lower amotivation than female participants. Furthermore, male students revealed higher levels of physical activity than female students. Finally, the research concluded with the importance of promoting intrinsic reasons for physical activity in order to encourage positive consequences in high school students.

  1. Spanish Visit to CERN

    CERN Multimedia

    2002-01-01

    Last week CERN was visited by the Spanish Minister of Science and Technology, Josep Piqué i Camps. While here, he was able to visit the ATLAS assembly hall where many items of equipment are being built in collaboration with Spanish academic institutions or firms. These include the vacuum vessels for the ATLAS barrel toroid magnets supplied by the Spanish firm Felguera Construcciones Mechanics. Similarly, the Universidad Autónoma de Madrid is participating in the manufacture of the electromagnetic calorimeter endcaps, while the Barcelona Institute for High Energy Physics and the Valencia IFIC (Instituto de Física Corpuscular) are highly involved in the production of barrel modules for the tile calorimeter. The delegation, accompanied by Spanish scientists at CERN, also visited the LHC superconducting magnet test hall (photo). From left to right: Felix Rodriguez Mateos of CERN LHC Division, Josep Piqué i Camps, Spanish Minister of Science and Technology, César Dopazo, Director-General of CIEMAT (Spanish ...

  2. [Adaptation and validation of the SMP-T2D questionnaire in Spanish for evaluating self-management of high blood pressure and type 2 diabetes: PAG-DT2+HTA].

    Science.gov (United States)

    Galván Flores, G M; Gallegos Carrillo, K; Palomo Piñon, S; Sánchez García, S; Cuadros Moreno, J; Martínez Olivares, M V; Cuevas Cancino, J J; Grijalva, I; Sánchez Arenas, R

    High blood pressure is one of the most common chronic conditions worldwide. It affects one in every 3 adults over 40, while one in 10 suffers from diabetes. For both diseases, adherence to pharmacological treatment is over 30%, and self-management, which takes into account diet and physical activity, is still unknown, as there is no tool available to measure self-management. Therefore, the object of this study was to adapt and validate the Spanish version of the self-management profile for type 2 diabetes (SMP-T2D) questionnaire in patients with type 2 diabetes and high blood pressure among users of first level care in the social security institution of Mexico. The SMP-T2D was adapted to Spanish by translation into Spanish, and being used only in patients with high blood pressure and type 2 diabetes-hypertension. A convergent and discriminatory validation was performed. Patients over 50 years old with high blood pressure were include. Those that did not complete the questionnaire or give informed consent were rejected. The Spanish version of the SMP-T2D was called PAG-DT2+HTA, and was applied to 145 people with hypertension: 54.4% with hypertension only, and 43.6% with hypertension and type 2 diabetes. Mean age was 66.14 years (SD=10.78), with 34.7% women and 65.3% men. Internal consistency by α-Cronbach for the questionnaire was 0.561 (P=.000). The correlation between the PAG-DT2+HTA and Morisky-Green was significant. The ability to discriminate between people with and without education and with and without economic means was obtained. The Spanish version of SMP-T2D (PAG-DT2+HTA) that measures self-management in type 2 diabetes, can be used to measure self-management in people with type 2 diabetes-hypertension. Copyright © 2017 SEH-LELHA. Publicado por Elsevier España, S.L.U. All rights reserved.

  3. Ultra-high bandwidth quantum secured data transmission

    Science.gov (United States)

    Dynes, James F.; Tam, Winci W.-S.; Plews, Alan; Fröhlich, Bernd; Sharpe, Andrew W.; Lucamarini, Marco; Yuan, Zhiliang; Radig, Christian; Straw, Andrew; Edwards, Tim; Shields, Andrew J.

    2016-10-01

    Quantum key distribution (QKD) provides an attractive means for securing communications in optical fibre networks. However, deployment of the technology has been hampered by the frequent need for dedicated dark fibres to segregate the very weak quantum signals from conventional traffic. Up until now the coexistence of QKD with data has been limited to bandwidths that are orders of magnitude below those commonly employed in fibre optic communication networks. Using an optimised wavelength divisional multiplexing scheme, we transport QKD and the prevalent 100 Gb/s data format in the forward direction over the same fibre for the first time. We show a full quantum encryption system operating with a bandwidth of 200 Gb/s over a 100 km fibre. Exploring the ultimate limits of the technology by experimental measurements of the Raman noise, we demonstrate it is feasible to combine QKD with 10 Tb/s of data over a 50 km link. These results suggest it will be possible to integrate QKD and other quantum photonic technologies into high bandwidth data communication infrastructures, thereby allowing their widespread deployment.

  4. Ecologia: Spanish Ecology Packet Resource Units and Materials for Intermediate and Advanced Spanish Classes.

    Science.gov (United States)

    Bell, Mozelle Sawyer; Arribas, E. Jaime

    This Spanish ecology packet contains resource units and materials for intermediate and advanced Spanish classes. It is designed to be used for individual and small-group instruction in the senior high school to supplement the Spanish language curriculum. Included are articles, pictures, and cartoons from Spanish-language newspapers and magazines…

  5. Biofuels and Food Security. A report by the High Level Panel of Experts on Food Security and Nutrition

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-06-15

    In October 2011, the UN Committee on World Food Security (CFS) recommended a ''review of biofuels policies -- where applicable and if necessary -- according to balanced science-based assessments of the opportunities and challenges that they may represent for food security so that biofuels can be produced where it is socially, economically and environmentally feasible to do so''. In line with this, the CFS requested the HLPE (High Level Panel of Experts) to ''conduct a science-based comparative literature analysis taking into consideration the work produced by the FAO and Global Bioenergy Partnership (GBEP) of the positive and negative effects of biofuels on food security''. Recommendations from the report include the following. Food security policies and biofuel policies cannot be separated because they mutually interact. Food security and the right to food should be priority concerns in the design of any biofuel policy. Governments should adopt the principle: biofuels shall not compromise food security and therefore should be managed so that food access or the resources necessary for the production of food, principally land, biodiversity, water and labour are not put at risk. The CFS should undertake action to ensure that this principle is operable in the very varied contexts in which all countries find themselves. Given the trend to the emergence of a global biofuels market, and a context moving from policy-driven to market-driven biofuels, there is an urgent need for close and pro-active coordination of food security, biofuel/bioenergy policies and energy policies, at national and international levels, as well as rapid response mechanisms in case of crisis. There is also an urgent need to create an enabling, responsible climate for food and non-food investments compatible with food security. The HLPE recommends that governments adopt a coordinated food security and energy security strategy, which would require articulation around the following five axes

  6. Biofuels and Food Security. A report by the High Level Panel of Experts on Food Security and Nutrition

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-06-15

    In October 2011, the UN Committee on World Food Security (CFS) recommended a ''review of biofuels policies -- where applicable and if necessary -- according to balanced science-based assessments of the opportunities and challenges that they may represent for food security so that biofuels can be produced where it is socially, economically and environmentally feasible to do so''. In line with this, the CFS requested the HLPE (High Level Panel of Experts) to ''conduct a science-based comparative literature analysis taking into consideration the work produced by the FAO and Global Bioenergy Partnership (GBEP) of the positive and negative effects of biofuels on food security''. Recommendations from the report include the following. Food security policies and biofuel policies cannot be separated because they mutually interact. Food security and the right to food should be priority concerns in the design of any biofuel policy. Governments should adopt the principle: biofuels shall not compromise food security and therefore should be managed so that food access or the resources necessary for the production of food, principally land, biodiversity, water and labour are not put at risk. The CFS should undertake action to ensure that this principle is operable in the very varied contexts in which all countries find themselves. Given the trend to the emergence of a global biofuels market, and a context moving from policy-driven to market-driven biofuels, there is an urgent need for close and pro-active coordination of food security, biofuel/bioenergy policies and energy policies, at national and international levels, as well as rapid response mechanisms in case of crisis. There is also an urgent need to create an enabling, responsible climate for food and non-food investments compatible with food security. The HLPE recommends that governments adopt a coordinated food security and energy security strategy, which would require articulation

  7. How to develop sex education among adolescents in high school, from the Spanish-Literature lessons ?

    Directory of Open Access Journals (Sweden)

    Yanicet Rodríguez Marrero

    2012-09-01

    Full Text Available This article deals with the treatment of sexual education for adolescents from the Spanish-Literature lessons in pr euniversity. It is based on contents that have become of paramount importance at the time of having a responsible sexuality, and in preventing risky behaviour on the STD (Sexual Transmitted Diseases. In its modelling various up-to-date concepts and appro aches that deal with this theme for its contextualization and enrichment of the educative models existing in Cuba were taken into consideration. It is considered that the formation of adolescents should be dealt with in the pedagogical context where the role of the teachers is of great significance from the point of view of the lesson.

  8. [FRAX® thresholds to identify people with high or low risk of osteoporotic fracture in Spanish female population].

    Science.gov (United States)

    Azagra, Rafael; Roca, Genís; Martín-Sánchez, Juan Carlos; Casado, Enrique; Encabo, Gloria; Zwart, Marta; Aguyé, Amada; Díez-Pérez, Adolf

    2015-01-06

    To detect FRAX(®) threshold levels that identify groups of the population that are at high/low risk of osteoporotic fracture in the Spanish female population using a cost-effective assessment. This is a cohort study. Eight hundred and sixteen women 40-90 years old selected from the FRIDEX cohort with densitometry and risk factors for fracture at baseline who received no treatment for osteoporosis during the 10 year follow-up period and were stratified into 3 groups/levels of fracture risk (low20%) according to the real fracture incidence. The thresholds of FRAX(®) baseline for major osteoporotic fracture were: low riskX-ray absorptiometry (DXA-scan) for FRAX(®)≥ 5 (Intermediate and high risk) to reclassify by FRAX(®) with DXA-scan at high/low risk. These thresholds select 17.5% of women for DXA-scan and 10% for treatment. With these thresholds of FRAX(®), compared with the strategy of opportunistic case finding isolated risk factors, would improve the predictive parameters and reduce 82.5% the DXA-scan, 35.4% osteoporosis prescriptions and 28.7% cost to detect the same number of women who suffer fractures. The use of FRAX ® thresholds identified as high/low risk of osteoporotic fracture in this calibration (FRIDEX model) improve predictive parameters in Spanish women and in a more cost-effective than the traditional model based on the T-score ≤ -2.5 of DXA scan. Copyright © 2013 Elsevier España, S.L.U. All rights reserved.

  9. Defining the Needs of Patients with Intellectual Disabilities in the High Security Psychiatric Hospitals in England

    Science.gov (United States)

    Thomas, S. D.; Dolan, M.; Johnston, S.; Middleton, H.; Harty, M. A.; Carlisle, J.; Thornicroft, G.; Appleby, L.; Jones, P.

    2004-01-01

    Previous studies have suggested that a substantial proportion of the patients with intellectual disabilities (ID) in the high security psychiatric hospitals (HSPHs) should be transferred to more appropriate services to cater for their specific needs in the longer term. The individual and placement needs of high secure psychiatric patients detained…

  10. A set of high quality colour images with Spanish norms for seven relevant psycholinguistic variables: the Nombela naming test.

    Science.gov (United States)

    Moreno-Martinez, Francisco Javier; Montoro, Pedro R; Laws, Keith R

    2011-05-01

    This paper presents a new corpus of 140 high quality colour images belonging to 14 subcategories and covering a range of naming difficulty. One hundred and six Spanish speakers named the items and provided data for several psycholinguistic variables: age of acquisition, familiarity, manipulability, name agreement, typicality and visual complexity. Furthermore, we also present lexical frequency data derived internet search hits. Apart from the large number of variables evaluated, these stimuli present an important advantage with respect to other comparable image corpora in so far as naming performance in healthy individuals is less prone to ceiling effect problems. Reliability and validity indexes showed that our items display similar psycholinguistic characteristics to those of other corpora. In sum, this set of ecologically valid stimuli provides a useful tool for scientists engaged in cognitive and neuroscience-based research.

  11. Optical Verification Laboratory Demonstration System for High Security Identification Cards

    Science.gov (United States)

    Javidi, Bahram

    1997-01-01

    Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the

  12. Tentative job analysis for a high-level, fixed-site, nuclear security officer

    International Nuclear Information System (INIS)

    Adams, K.G.; Trujillo, A.A.

    1977-10-01

    A tentative job analysis for a high-level, fixed-site, nuclear security officer is presented. The primary objective of the report is to provide a framework for evaluating the functions of a security officer in physical protection systems. Several job requirements related to duties, basic skills, personal contacts, supervision, working conditions, and decision making are presented. Individual character traits desirable in security officers are described

  13. Sandia's experience in designing and implementing integrated high security physical protection systems

    International Nuclear Information System (INIS)

    Caskey, D.L.

    1986-01-01

    As DOE's lead laboratory for physical security, Sandia National Laboratories has had a major physical security program for over ten years. Activities have ranged from component development and evaluation, to full scale system design and implementation. This paper presents some of the lessons learned in designing and implementing state-of-the-art high security physical protection systems for a number of government facilities. A generic system design is discussed for illustration purposes. Sandia efforts to transfer technology to industry are described

  14. A comparison of consumer sensory acceptance, purchase intention, and willingness to pay for high quality United States and Spanish beef under different information scenarios.

    Science.gov (United States)

    Beriain, M J; Sánchez, M; Carr, T R

    2009-10-01

    Tests were performed to identify variation across consumer evaluation ratings for 2 types of beef (Spanish yearling bull beef and US Choice and Prime beef), using 3 information levels (blind scores; muscle fat content + production conditions; and all production data including geographical origin) and 3 consumer evaluation ratings (hedonic rating, willingness to pay, and purchase intention). Further testing was carried out to assess the extent to which expert evaluations converged with those of untrained consumers. Taste panel tests involving 290 consumers were conducted in Navarra, a region in northern Spain. The beef samples were 20 loins of Pyrenean breed yearling bulls that had been born and raised on private farms located in this Spanish region and 20 strip loins from high quality US beef that ranged from high Choice to average Prime US quality grades. The Spanish beef were slaughtered at 507 +/- 51 kg of BW and 366 +/- 23 d of age. The US beef proved more acceptable to consumers and received greater ratings from the trained panel, with greater scores for juiciness (3.33), tenderness (3.33), flavor (3.46), and fat content (5.83) than for Spanish beef (2.77, 2.70, 3.14, 1.17). The differences in sensory variable rating were more pronounced for the Spanish beef than for the US beef, always increasing with the level of information. The variation in the ratings across different information levels was statistically significant in the case of the Spanish beef, whereas the variation observed in the ratings of the US beef was highly significant in the willingness of consumers to pay a premium. Consumers who appreciated greater quality were also more willing to pay for the additional level of quality.

  15. High-resolution spatio-temporal analyses of drought episodes in the western Mediterranean basin (Spanish mainland, Iberian Peninsula)

    Science.gov (United States)

    González-Hidalgo, J. C.; Vicente-Serrano, S. M.; Peña-Angulo, D.; Salinas, C.; Tomas-Burguera, M.; Beguería, S.

    2018-04-01

    The purpose of this research was to identify major drought events on the Spanish mainland between 1961 and 2014 by means of two drought indices, and analyze the spatial propagation of drought conditions. The indices applied were the standardized precipitation index (SPI) and the standardized evaporation precipitation index (SPEI). The first was calculated as standardized anomalies of precipitation at various temporal intervals, while the second examined the climatic balance normalized at monthly scale, incorporating the relationship between precipitation and the atmospheric water demand. The daily meteorological data from Spanish Meteorological Archives (AEMet) were used in performing the analyses. Within the framework of the DESEMON project, original data were converted into a high spatial resolution grid (1.1 km2) following exhaustive quality control. Values of both indices were calculated on a weekly scale and different timescales (12, 24 and 36 months). The results show that during the first half of the study period, the SPI usually returned a higher identification of drought areas, while the reverse was true from the 1990s, suggesting that the effect from atmospheric evaporative demand could have increased. The temporal propagation from 12- to 24-month and 36-month timescales analyzed in the paper seems to be a far from straightforward phenomenon that does not follow a simple rule of time lag, because events at different temporal scales can overlap in time and space. Spatially, the propagation of drought events affecting more than 25% of the total land indicates the existence of various spatial gradients of drought propagation, mostly east-west or west-east, but also north-south have been found. No generalized episodes were found with a radial pattern, i.e., from inland to the coast.

  16. Diamond High Assurance Security Program: Trusted Computing Exemplar

    Science.gov (United States)

    2002-09-01

    computing component, the Embedded MicroKernel Prototype. A third-party evaluation of the component will be initiated during development (e.g., once...target technologies and larger projects is a topic for future research. Trusted Computing Reference Component – The Embedded MicroKernel Prototype We...Kernel The primary security function of the Embedded MicroKernel will be to enforce process and data-domain separation, while providing primitive

  17. Research of Smart Grid Cyber Architecture and Standards Deployment with High Adaptability for Security Monitoring

    DEFF Research Database (Denmark)

    Hu, Rui; Hu, Weihao; Chen, Zhe

    2015-01-01

    Security Monitoring is a critical function for smart grid. As a consequence of strongly relying on communication, cyber security must be guaranteed by the specific system. Otherwise, the DR signals and bidding information can be easily forged or intercepted. Customers’ privacy and safety may suffer...... huge losses. Although OpenADR specificationsprovide continuous, secure and reliable two-way communications in application level defined in ISO model, which is also an open architecture for security is adopted by it and no specific or proprietary technologies is restricted to OpenADR itself....... It is significant to develop a security monitoring system. This paper discussed the cyber architecture of smart grid with high adaptability for security monitoring. An adaptable structure with Demilitarized Zone (DMZ) is proposed. Focusing on this network structure, the rational utilization of standards...

  18. California Conference on High Blood Pressure Control in the Spanish-Speaking Community (Los Angeles, California, April 1-2, 1978). Summary Report.

    Science.gov (United States)

    National Institutes of Health (DHEW), Bethesda, MD. High Blood Pressure Information Center.

    As part of the National High Blood Pressure Education Program effort, the conference explored the implications and impact of the prevalence of hypertension in Spanish-speaking populations in California. Approximately 150 experts in health fields, representing all levels of government, public and private health care providers, consumers, and health…

  19. Nuclear Security Recommendations on Radioactive Material and Associated Facilities: Recommendations (Spanish Edition); Recomendaciones de Seguridad Fisica Nuclear sobre Materiales Radiactivos e Instalaciones Conexas: Recomendaciones

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-06-15

    The purpose of this publication is to provide guidance to States and competent authorities on how to develop or enhance, implement and maintain a nuclear security regime for facilities dealing with radioactive material and associated activities. This is to be achieved through the establishment or improvement of their capabilities to implement a legislative and regulatory framework to address the security of radioactive material, associated facilities and associated activities in order to reduce the likelihood of malicious acts involving those materials. These recommendations reflect a broad consensus among States on the requirements which should be met for the security of radioactive material, associated facilities and activities.

  20. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  1. Spanish Visit

    CERN Multimedia

    2004-01-01

    On 23 January, CERN welcomed a visit by Pedro Morenés Eulate, Spanish Secretary of State for Scientific and Technological Policy. He was taken on a tour of the LHC Superconducting test facility, the CMS magnet assembly hall and the civil engineering works at Point 5. After a brief presentation on the AMS (Alpha Magnetic Spectrometer) experiment, delivered by Sam Ting, and lunch hosted by Director General Robert Aymar, he continued his tour of the ATLAS assembly hall and the ISOLDE experimental hall. Pedro Morenés finished his visit by meeting with the Spanish scientific community working at CERN. From left to right: Juan-Antonio Rubio, CERN, Responsible for the Education & Communication, Technology transfer and Scientific Information groups; Gonzalo León, General Secretary of the Spanish Ministry; Joaquín Pérez-Villanueva y Tovar, Ambassador, Permanent Representative of Spain to the United Nations Office; Robert Aymar, CERN Director General; Maria-José Garcia-Borge, ISOLDE and NTOF, CSIC Madrid Tea...

  2. The Centralized Temporary Storage (ATC) Spanish. General and operational readiness in the management of high level radioactive waste

    International Nuclear Information System (INIS)

    Reyes, S.; Diaz, A.; Dilla, A.; Gonzalez, J. R.; Haro, R.

    2014-01-01

    The high-level waste will go to Centralized Temporary Storage (ATC) in Villar de Canas (Cuenca), which is the solution to your management until finished designing its final disposal in the Deep Geological Storage (AGP). Transport containers of high activity radioactive waste will be stored on arrival at the ATC. In time of management, waste will be taken remotely, will be encapsulated in secure conditions and stored in vaults designed to be cooled by natural convection of air confinement. The buildings in the facility will have a general provision optimize the movement of packages and people for the development of all these activities. (Author)

  3. The problematic internet entertainment use scale for adolescents: prevalence of problem internet use in Spanish high school students.

    Science.gov (United States)

    Lopez-Fernandez, Olatz; Freixa-Blanxart, Montserrat; Honrubia-Serrano, Maria Luisa

    2013-02-01

    Many researchers and professionals have reported nonsubstance addiction to online entertainments in adolescents. However, very few scales have been designed to assess problem Internet use in this population, in spite of their high exposure and obvious vulnerability. The aim of this study was to review the currently available scales for assessing problematic Internet use and to validate a new scale of this kind for use, specifically in this age group, the Problematic Internet Entertainment Use Scale for Adolescents. The research was carried out in Spain in a gender-balanced sample of 1131 high school students aged between 12 and 18 years. Psychometric analyses showed the scale to be unidimensional, with excellent internal consistency (Cronbach's alpha of 0.92), good construct validity, and positive associations with alternative measures of maladaptive Internet use. This self-administered scale can rapidly measure the presence of symptoms of behavioral addiction to online videogames and social networking sites, as well as their degree of severity. The results estimate the prevalence of this problematic behavior in Spanish adolescents to be around 5 percent.

  4. Meeting the security requirements of electronic medical records in the ERA of high-speed computing.

    Science.gov (United States)

    Alanazi, H O; Zaidan, A A; Zaidan, B B; Kiah, M L Mat; Al-Bakri, S H

    2015-01-01

    This study has two objectives. First, it aims to develop a system with a highly secured approach to transmitting electronic medical records (EMRs), and second, it aims to identify entities that transmit private patient information without permission. The NTRU and the Advanced Encryption Standard (AES) cryptosystems are secured encryption methods. The AES is a tested technology that has already been utilized in several systems to secure sensitive data. The United States government has been using AES since June 2003 to protect sensitive and essential information. Meanwhile, NTRU protects sensitive data against attacks through the use of quantum computers, which can break the RSA cryptosystem and elliptic curve cryptography algorithms. A hybrid of AES and NTRU is developed in this work to improve EMR security. The proposed hybrid cryptography technique is implemented to secure the data transmission process of EMRs. The proposed security solution can provide protection for over 40 years and is resistant to quantum computers. Moreover, the technique provides the necessary evidence required by law to identify disclosure or misuse of patient records. The proposed solution can effectively secure EMR transmission and protect patient rights. It also identifies the source responsible for disclosing confidential patient records. The proposed hybrid technique for securing data managed by institutional websites must be improved in the future.

  5. High-salt brines compromise autoinducer-mediated bacteriocinogenic Lactobacillus plantarum survival in Spanish-style green olive fermentations.

    Science.gov (United States)

    Caballero-Guerrero, Belén; Lucena-Padrós, Helena; Maldonado-Barragán, Antonio; Ruiz-Barba, José Luis

    2013-02-01

    The effect of NaCl on plantaricin production by five Lactobacillus plantarum strains was investigated. Plantaricin production in these strains was found to be regulated by three-component regulatory systems ruled by two different autoinducer peptides (AIPs), either PLNC8IF or Plantaricin A. Bacteriocin activity exhibited by these strains came to a halt in liquid medium containing NaCl concentrations of or above 2%. In contrast, bacteriocin activity was still observed when the producing strains were growing on solid medium containing up to 4% NaCl. Bacteriocin activity in liquid medium containing up to 2% NaCl could be restored by coculturing the producing strains with a selected plantaricin-production inducing strain of Lactococcus lactis. Growth of these bacteriocinogenic L. plantarum strains was monitored in traditional Spanish-style green olive fermentations. Survival of these strains could not be enhanced when provided with a range of plantaricin-production inducing mechanisms previously described, such as constitutive AIP production or coinoculation with a specific bacteriocin-production inducing strain of L. lactis. Our results suggest that it is advisable the use of constitutive bacteriocin producers, or at least non-AIP-dependant ones, as starters for olive fermentations due to the intrinsic physical characteristics of this food fermentation, especially the high salt concentration of the brines currently used. Copyright © 2012 Elsevier Ltd. All rights reserved.

  6. A risk score to predict type 2 diabetes mellitus in an elderly Spanish Mediterranean population at high cardiovascular risk.

    Directory of Open Access Journals (Sweden)

    Marta Guasch-Ferré

    Full Text Available INTRODUCTION: To develop and test a diabetes risk score to predict incident diabetes in an elderly Spanish Mediterranean population at high cardiovascular risk. MATERIALS AND METHODS: A diabetes risk score was derived from a subset of 1381 nondiabetic individuals from three centres of the PREDIMED study (derivation sample. Multivariate Cox regression model ß-coefficients were used to weigh each risk factor. PREDIMED-personal Score included body-mass-index, smoking status, family history of type 2 diabetes, alcohol consumption and hypertension as categorical variables; PREDIMED-clinical Score included also high blood glucose. We tested the predictive capability of these scores in the DE-PLAN-CAT cohort (validation sample. The discrimination of Finnish Diabetes Risk Score (FINDRISC, German Diabetes Risk Score (GDRS and our scores was assessed with the area under curve (AUC. RESULTS: The PREDIMED-clinical Score varied from 0 to 14 points. In the subset of the PREDIMED study, 155 individuals developed diabetes during the 4.75-years follow-up. The PREDIMED-clinical score at a cutoff of ≥6 had sensitivity of 72.2%, and specificity of 72.5%, whereas AUC was 0.78. The AUC of the PREDIMED-clinical Score was 0.66 in the validation sample (sensitivity = 85.4%; specificity = 26.6%, and was significantly higher than the FINDRISC and the GDRS in both the derivation and validation samples. DISCUSSION: We identified classical risk factors for diabetes and developed the PREDIMED-clinical Score to determine those individuals at high risk of developing diabetes in elderly individuals at high cardiovascular risk. The predictive capability of the PREDIMED-clinical Score was significantly higher than the FINDRISC and GDRS, and also used fewer items in the questionnaire.

  7. Threats to information security in a highly organized system of the “Smart city”

    Science.gov (United States)

    Kurcheeva, G. I.; Denisov, V. V.; Khvorostov, V. A.

    2017-01-01

    The article discusses issues related to comprehensive development and introduction of technologies such as “Smart city”. The urgency of accelerating the development of such highly organized systems, primarily in terms of reducing threats to information security, is emphasized in the paper. In accordance with authors’ analysis of the composition and structure of the threats to information security, “Accessibility”, “Integrity” and “Confidentiality” are highlighted. Violation of any of them leads to harmful effects on the information and other system resources. The protection of “Accessibility” mobilizes one third of all efforts to ensure information security that must be taken into account when allocating protective actions. The threats associated with failure of the supporting infrastructure are also significantly reduced. But the threats associated with failures of the system itself and failures of users are clearly increasing. There is a high level of society and production informatization, and the threats to information security are changing accordingly.

  8. Security in the transport of radioactive material: Implementing guide. Spanish edition; La seguridad fisica en el transporte de materiales radiactivos. Guia de aplicacion

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-07-01

    This guide provides States with guidance in implementing, maintaining or enhancing a nuclear security regime to protect radioactive material (including nuclear material) in transport against theft, sabotage or other malicious acts that could, if successful, have unacceptable radiological consequences. From a security point of view, a threshold is defined for determining which packages or types of radioactive material need to be protected beyond prudent management practice. Minimizing the likelihood of theft or sabotage of radioactive material in transport is accomplished by a combination of measures to deter, detect, delay and respond to such acts. These measures are complemented by other measures to recover stolen material and to mitigate possible consequences, in order to further reduce the risks.

  9. High incidence of large deletions in the PMS2 gene in Spanish Lynch syndrome families.

    Science.gov (United States)

    Brea-Fernández, A J; Cameselle-Teijeiro, J M; Alenda, C; Fernández-Rozadilla, C; Cubiella, J; Clofent, J; Reñé, J M; Anido, U; Milá, M; Balaguer, F; Castells, A; Castellvi-Bel, S; Jover, R; Carracedo, A; Ruiz-Ponte, C

    2014-06-01

    Lynch syndrome (LS) is caused by germline mutations in one of the four mismatch repair (MMR) genes. Defects in this pathway lead to microsatellite instability (MSI) in DNA tumors, which constitutes the molecular hallmark of this disease. Selection of patients for genetic testing in LS is usually based on fulfillment of diagnostic clinical criteria (i.e. Amsterdam criteria or the revised Bethesda guidelines). However, following these criteria PMS2 mutations have probably been underestimated as their penetrances appear to be lower than those of the other MMR genes. The use of universal MMR study-based strategies, using MSI testing and immunohistochemical (IHC) staining, is being one proposed alternative. Besides, germline mutation detection in PMS2 is complicated by the presence of highly homologous pseudogenes. Nevertheless, specific amplification of PMS2 by long-range polymerase chain reaction (PCR) and the improvement of the analysis of large deletions/duplications by multiplex ligation-dependent probe amplification (MLPA) overcome this difficulty. By using both approaches, we analyzed 19 PMS2-suspected carriers who have been selected by clinical or universal strategies and found five large deletions and one frameshift mutation in PMS2 in six patients (31%). Owing to the high incidence of large deletions found in our cohort, we recommend MLPA analysis as the first-line method for searching germline mutations in PMS2. © 2013 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  10. Security of bottle to fill in a high pressure air

    Science.gov (United States)

    Todic, M.; Latinovic, T.; Golubovic-Bugarski, V.; Majstorovic, A.

    2018-01-01

    Charging the bottle of high pressure air isolation devices is performed by a high-pressure compressor. The charging time is in function of the compressor capacity and the intensity of the nominal pressure of the air in the bottle. However, in accident situations this time is long and therefore high-pressure accumulators are used where the filling time of the bottle of isolation apparatus has been drastically reduced. Due to the short filling time of the bottle through the air flow, there is a thermodynamic load of bottle material that could endanger the safety of users and other participants in the area. It is therefore necessary to determine the critical parameters of the rapid charge and their intensity.

  11. Leadership in organizations with high security and reliability requirements

    International Nuclear Information System (INIS)

    Gonzalez, F.

    2013-01-01

    Developing leadership skills in organizations is the key to ensure the sustainability of excellent results in industries with high requirements safety and reliability. In order to have a model of leadership development specific to this type of organizations, Tecnatom in 2011, we initiated a project internal, to find and adapt a competency model to these requirements.

  12. WSES: HIGH SECURED DATA ENCRYPTION AND AUTHENTICATION USING WEAVING, ROTATION AND FLIPPING

    Directory of Open Access Journals (Sweden)

    A. Yesu Raj

    2015-12-01

    Full Text Available Data security is the very important part in the network data communication. Avoidance of the information hacking and steeling are very challenging part for network data communication. Now-a-days people are using many encryption and decryption techniques for data security. But all encryption and decryption techniques are having more time occupation or less security for the process. This paper proposed high level security approach to encryption and decryption for data security. Two levels of securities are used in this proposed method. First one is data encryption and the second one is hash value generation. The proposed Weaving based Superior Encryption Standard (WSES uses a novel weaving based approach. The weaving array generation is done by Elementary Number Theory Notation (ENTN method. The weaving array has multiple private keys for XOR encryption. After encryption the error value is extracted from the encrypted array and weaving array. This error value is sent to the other side. The novel approach for hash value generation uses the encrypted array. After encryption, the encrypted array is rotated into four degrees and each degree data are converted to vector format and arranged on by one under the vector. Finally a 2D Rotational Encryption Matrix (REM is obtained. After this process a REM copy is converted to mirror flip and it is need as Flipped Matrix (FM. The FM is concatenated under the REM and converted to vector using the zigzag operation. Finally this process gives two bytes hash value from the vector. This proposed method executes very fast and provide high security. This method is much reliable to small size applications and also used for any type of data security.

  13. Quantitative PCR analysis reveals a high incidence of large intragenic deletions in the FANCA gene in Spanish Fanconi anemia patients.

    Science.gov (United States)

    Callén, E; Tischkowitz, M D; Creus, A; Marcos, R; Bueren, J A; Casado, J A; Mathew, C G; Surrallés, J

    2004-01-01

    Fanconi anaemia is an autosomal recessive disease characterized by chromosome fragility, multiple congenital abnormalities, progressive bone marrow failure and a high predisposition to develop malignancies. Most of the Fanconi anaemia patients belong to complementation group FA-A due to mutations in the FANCA gene. This gene contains 43 exons along a 4.3-kb coding sequence with a very heterogeneous mutational spectrum that makes the mutation screening of FANCA a difficult task. In addition, as the FANCA gene is rich in Alu sequences, it was reported that Alu-mediated recombination led to large intragenic deletions that cannot be detected in heterozygous state by conventional PCR, SSCP analysis, or DNA sequencing. To overcome this problem, a method based on quantitative fluorescent multiplex PCR was proposed to detect intragenic deletions in FANCA involving the most frequently deleted exons (exons 5, 11, 17, 21 and 31). Here we apply the proposed method to detect intragenic deletions in 25 Spanish FA-A patients previously assigned to complementation group FA-A by FANCA cDNA retroviral transduction. A total of eight heterozygous deletions involving from one to more than 26 exons were detected. Thus, one third of the patients carried a large intragenic deletion that would have not been detected by conventional methods. These results are in agreement with previously published data and indicate that large intragenic deletions are one of the most frequent mutations leading to Fanconi anaemia. Consequently, this technology should be applied in future studies on FANCA to improve the mutation detection rate. Copyright 2003 S. Karger AG, Basel

  14. Assessing Advanced Theory of Mind in Children and Adolescents with High-Functioning Autism: The Spanish Version of the Stories of Everyday Life.

    Science.gov (United States)

    Lera-Miguel, Sara; Rosa, Mireia; Puig, Olga; Kaland, Nils; Lázaro, Luisa; Castro-Formieles, Josefina; Calvo, Rosa

    2016-01-01

    Most individuals with autism spectrum disorders often fail in tasks of theory of mind (ToM). However, those with normal intellectual functioning known as high functioning ASD (HF-ASD) sometimes succeed in mentalizing inferences. Some tools have been developed to more accurately test their ToM abilities. The aims of this study were to examine the psychometric properties of the Spanish version of Stories of Everyday Life Test (SEL) in a sample of 29 children and adolescents with HF-ASD and 25 typically developing controls and to compare their performance. The Spanish-SEL demonstrated good internal consistency, strong convergence with clinical severity and another ToM test, and adequate discriminant validity from intellectual capability and age, identifying the condition of 70 % of participants.

  15. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    Science.gov (United States)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  16. PUFKEY: a high-security and high-throughput hardware true random number generator for sensor networks.

    Science.gov (United States)

    Li, Dongfang; Lu, Zhaojun; Zou, Xuecheng; Liu, Zhenglin

    2015-10-16

    Random number generators (RNG) play an important role in many sensor network systems and applications, such as those requiring secure and robust communications. In this paper, we develop a high-security and high-throughput hardware true random number generator, called PUFKEY, which consists of two kinds of physical unclonable function (PUF) elements. Combined with a conditioning algorithm, true random seeds are extracted from the noise on the start-up pattern of SRAM memories. These true random seeds contain full entropy. Then, the true random seeds are used as the input for a non-deterministic hardware RNG to generate a stream of true random bits with a throughput as high as 803 Mbps. The experimental results show that the bitstream generated by the proposed PUFKEY can pass all standard national institute of standards and technology (NIST) randomness tests and is resilient to a wide range of security attacks.

  17. PUFKEY: A High-Security and High-Throughput Hardware True Random Number Generator for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Dongfang Li

    2015-10-01

    Full Text Available Random number generators (RNG play an important role in many sensor network systems and applications, such as those requiring secure and robust communications. In this paper, we develop a high-security and high-throughput hardware true random number generator, called PUFKEY, which consists of two kinds of physical unclonable function (PUF elements. Combined with a conditioning algorithm, true random seeds are extracted from the noise on the start-up pattern of SRAM memories. These true random seeds contain full entropy. Then, the true random seeds are used as the input for a non-deterministic hardware RNG to generate a stream of true random bits with a throughput as high as 803 Mbps. The experimental results show that the bitstream generated by the proposed PUFKEY can pass all standard national institute of standards and technology (NIST randomness tests and is resilient to a wide range of security attacks.

  18. Development of national standards related to the integrated safety and security of high-rise buildings

    Science.gov (United States)

    Voskresenskaya, Elena; Vorona-Slivinskaya, Lubov

    2018-03-01

    The article considers the issues of developing national standards for high-rise construction. The system of standards should provide industrial, operational, economic and terrorist safety of high-rise buildings and facilities. Modern standards of high-rise construction should set the rules for designing engineering systems of high-rise buildings, which will ensure the integrated security of buildings, increase their energy efficiency and reduce the consumption of resources in construction and operation.

  19. Development of national standards related to the integrated safety and security of high-rise buildings

    Directory of Open Access Journals (Sweden)

    Voskresenskaya Elena

    2018-01-01

    Full Text Available The article considers the issues of developing national standards for high-rise construction. The system of standards should provide industrial, operational, economic and terrorist safety of high-rise buildings and facilities. Modern standards of high-rise construction should set the rules for designing engineering systems of high-rise buildings, which will ensure the integrated security of buildings, increase their energy efficiency and reduce the consumption of resources in construction and operation.

  20. Faster and Further Morphosyntactic Development of CLIL vs. EFL Basque-Spanish Bilinguals Learning English in High-School

    Directory of Open Access Journals (Sweden)

    Amparo Lázaro

    2012-06-01

    Full Text Available A general advantage in proficiency has been repeatedly reported for learners receiving Content and Language Integrated Learning (CLIL when compared to learners who only receive English lessons. However, fine-grained studies addressing the aspects which make up this general advantage are still scarce. Within this context, this paper concentrates on the morphosyntactic development of two groups of (Basque-Spanish adolescents learning English in high-school over a two-year period. One group (n= 15 received CLIL instruction and English classes while the other group (n=11 only received English classes. The results indicate a clear advantage for the CLIL group, which seems to be at a further developmental stage. Nonetheless, both groups improve over the two years and, unlike previous claims in schools, no signs of fossilization are found although inaccuracies in inflection still exist. In light of these results, the value of increasing exposure in the form of CLIL lessons in high-school is discussed.Repetidamente se ha demostrado que los alumnos en programas de Adquisición Integrada de Contenidos y Lengua Extranjera (AICLE son mejores que los alumnos que únicamente reciben clases de inglés. Sin embargo, pocos trabajos han especificado qué aspectos concretos de la lengua mejoran con estas metodologías. Este trabajo analiza, a lo largo de dos años, el desarrollo morfosintáctico de dos grupos de adolescentes bilingües (euskera-castellano que aprenden inglés en el colegio. Un grupo (n=11 solo recibe clases de inglés mientras que el otro (n=15 también recibe clases de AICLE. Los resultados muestran que los alumnos AICLE presentan un mayor desarrollo morfosintáctico. También se muestra que ambos grupos evolucionan a lo largo de los dos años y, frente a trabajos anteriores, no hay signos de fosilización aunque los problemas flexivos persisten. Con estos resultados, se discute la validez de aumentar la exposición al inglés mediante programas

  1. Design of High-Security USB Flash Drives Based on Chaos Authentication

    Directory of Open Access Journals (Sweden)

    Teh-Lu Liao

    2018-05-01

    Full Text Available This paper aims to propose a novel design of high-security USB flash drives with the chaos authentication. A chaos authentication approach with the non-linear encryption and decryption function design is newly proposed and realized based on the controller design of chaos synchronization. To complete the design of high-security USB flash drives, first, we introduce six parameters into the original Henon map to adjust and obtain richer chaotic state responses. Then a discrete sliding mode scheme is proposed to solve the synchronization problem of discrete hyperchaotic Henon maps. The proposed sliding mode controller can ensure the synchronization of the master-slave Henon maps. The selection of the switching surface and the existence of the sliding motion are also addressed. Finally, the obtained results are applied to design a new high-security USB flash drive with chaos authentication. We built discrete hyperchaotic Henon maps in the smartphone (master and microcontroller (slave, respectively. The Bluetooth module is used to communicate between the master and the slave to achieve chaos synchronization such that the same random and dynamical chaos signal can be simultaneously obtained at both the USB flash drive and smartphone, and pass the chaos authentication. When users need to access data in the flash drive, they can easily enable the encryption APP in the smartphone (master for chaos authentication. After completing the chaos synchronization and authentication, the ARM-based microcontroller allows the computer to access the data in the high-security USB flash drive.

  2. High Efficiency of Two Efficient QSDC with Authentication Is at the Cost of Their Security

    International Nuclear Information System (INIS)

    Su-Juan, Qin; Qiao-Yan, Wen; Luo-Ming, Meng; Fu-Chen, Zhu

    2009-01-01

    Two efficient protocols of quantum secure direct communication with authentication [Chin. Phys. Lett. 25 (2008) 2354] were recently proposed by Liu et al. to improve the efficiency of two protocols presented in [Phys. Rev. A 75 (2007) 026301] by four Pauli operations. We show that the high efficiency of the two protocols is at the expense of their security. The authenticator Trent can reach half the secret by a particular attack strategy in the first protocol. In the second protocol, not only Trent but also an eavesdropper outside can elicit half-information about the secret from the public declaration

  3. Accelerators Spanish steps

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    In September, the CERN Accelerator School (CAS) held its third General Accelerator Physics Course, the venue this time being Salamanca, the oldest university in Spain. Spain, which rejoined CERN in 1982, now has a vigorous and steadily growing high energy physics community making substantial contributions to physics detector development and successfully involving Spanish industry. However the embryonic accelerator community cannot yet generate an equivalent level of activity, and this important channel for introducing new high technology into industry has yet to be fully exploited

  4. Constitutional principles regarding the Spanish Social Security system : a citizen’s right = Principios constitucionales del sistema español deSeguridad Social : un derecho de los ciudadanos

    Directory of Open Access Journals (Sweden)

    Javier García Roca

    2014-01-01

    Full Text Available A public system of social security is specially protected in a Social State, as happens in Spain and most of the European countries. This public system is nowadays reinforced by the Charter of Fundamental Rights of the European Union and not only by the International Covenant on Economic, Social and Cultural Rights. The Spanish constitutional recognition of this system (article 41 SC is based on several principles: flexibility, publicity, sufficiency, necessity, universality and complementarity. All the other contents of the right can be shaped by the law, but it is in any case a true citizen’s right according to the General Law on Social Security and several international treaties such as the European Social Charter and certain relevant norms of the European Union. It is as well a clear mandate to the legislator, so public authorities are obliged to preserve a public scheme of Social Security with different benefits and levels. Indeed it is above all a right to legal configuration or legal development and several limits and dynamic restrictions can be imposed by laws according to the constitutional principle of financial sustainability. But, on the other hand, if the principle of proportionality has been violated, there are several remedies to react against those legal restrictions before the social courts, the Constitutional Court and the European Court of Human Rights which must guarantee the right to the peaceful enjoyment of possessions. A system of social security is always the fruit of the Law and therefore legal constrictions must be proportional. Un sistema público de seguridad social cobra especial protección en el contexto de un Estado social, como ocurre en España y en Europa, que viene ahora reforzado como derecho por la Carta de Derechos Fundamentales de la Unión Europea y no sólo por el Pacto Internacional de Derechos Económicos y Sociales. El reconocimiento constitucional español de este sistema (artículo 41 CE se basa

  5. Spanish nuclear industry

    International Nuclear Information System (INIS)

    1994-01-01

    In this book published to commemorate the twentieth anniversary of the Spanish Nuclear Society, it is included a report on the Spanish Nuclear Industry. The Spanish Companies and Organizations in nuclear world are: CIEMAT, Empresarios Agrupados, ENRESA, ENUSA, ENDESA, Grupo Iberdrola, LAINSA, INITEC AND TECNATOM. Activities, history and research programs of each of them are included

  6. Synchronization and secure communication of chaotic systems via robust adaptive high-gain fuzzy observer

    International Nuclear Information System (INIS)

    Hyun, Chang-Ho; Park, Chang-Woo; Kim, Jae-Hun; Park, Mignon

    2009-01-01

    This paper proposes an alternative robust adaptive high-gain fuzzy observer design scheme and its application to synchronization and secure communication of chaotic systems. It is assumed that their states are immeasurable and their parameters are unknown. The structure of the proposed observer is represented by Takagi-Sugeno fuzzy model and has the integrator of the estimation error. It improves the performance of high-gain observer and makes the proposed observer robust against noisy measurements, uncertainties and parameter perturbations as well. Using Lyapunov stability theory, an adaptive law is derived to estimate the unknown parameters and the stability of the proposed observer is analyzed. Some simulation result of synchronization and secure communication of chaotic systems is given to present the validity of theoretical derivations and the performance of the proposed observer as an application.

  7. Looking back, looking forward: Recovery journeys in a high secure hospital.

    Science.gov (United States)

    McKeown, Mick; Jones, Fiona; Foy, Paul; Wright, Karen; Paxton, Tracey; Blackmon, Mike

    2016-06-01

    A qualitative study of staff and service users' views of recovery was undertaken in a UK high secure hospital working to implement recovery practices. 30 staff and 25 service users participated in semi-structured interviews or focus groups. Thematic analysis identified four broad accounts of how recovery was made sense of in the high secure environment: the importance of meaningful occupation; valuing relationships; recovery journeys and dialogue with the past; and recovery as personal responsibility. These themes are discussed with an emphasis on service user strategies of cooperation or resistance, respectively advancing or impeding progress through the system. In this context the notion of cooperation is, for many, commensurate with compliance with a dominant medical model. The policy framing of recovery opens up contemplation of treatment alternatives, more participatory approaches to risk management, and emphasise the value of relational skills, but may not elude the overarching bio-psychiatric episteme. © 2016 Australian College of Mental Health Nurses Inc.

  8. FOOD SECURITY SITUATION OF SELECTED HIGHLY DEVELOPED COUNTRIES AGAINST DEVELOPING COUNTRIES

    OpenAIRE

    Karolina Pawlak

    2016-01-01

    The aim of the paper is to present the food security situation in selected highly developed countries and to identify consumption disparities between them and developing countries. The research is based on the data from the United Nations Food and Agriculture Organization (FAO), the Statistical Office of the European Union (Eurostat), the United Nations Statistics Division, the Organisation for Economic Co-operation and Development (OECD), World Food Programme (WFP) and selected measures used...

  9. Delivering high-level food industry skills for future food security through Advanced Training Partnerships

    OpenAIRE

    Frazier, Richard A.

    2013-01-01

    The UK Biotechnology and Biological Sciences Research Council’s Advanced Training Partnerships initiative represents a significant investment in the provision of high-level skills for the UK food industry sector to address global food security from farm to fork. This paper summarises the background, aims and scope of the Advanced Training Partnerships, their development so far, and offers a view on future directions and evaluation of impact.

  10. Secure data storage by three-dimensional absorbers in highly scattering volume medium

    International Nuclear Information System (INIS)

    Matoba, Osamu; Matsuki, Shinichiro; Nitta, Kouichi

    2008-01-01

    A novel data storage in a volume medium with highly scattering coefficient is proposed for data security application. Three-dimensional absorbers are used as data. These absorbers can not be measured by interferometer when the scattering in a volume medium is strong enough. We present a method to reconstruct three-dimensional absorbers and present numerical results to show the effectiveness of the proposed data storage.

  11. The use of electronic health records in Spanish hospitals.

    Science.gov (United States)

    Marca, Guillem; Perez, Angel; Blanco-Garcia, Martin German; Miravalles, Elena; Soley, Pere; Ortiga, Berta

    The aims of this study were to describe the level of adoption of electronic health records in Spanish hospitals and to identify potential barriers and facilitators to this process. We used an observational cross-sectional design. The survey was conducted between September and December 2011, using an electronic questionnaire distributed through email. We obtained a 30% response rate from the 214 hospitals contacted, all belonging to the Spanish National Health Service. The level of adoption of electronic health records in Spanish hospitals was found to be high: 39.1% of hospitals surveyed had a comprehensive EHR system while a basic system was functioning in 32.8% of the cases. However, in 2011 one third of the hospitals did not have a basic electronic health record system, although some have since implemented electronic functionalities, particularly those related to clinical documentation and patient administration. Respondents cited the acquisition and implementation costs as the main barriers to implementation. Facilitators for EHR implementation were: the possibility to hire technical support, both during and post implementation; security certification warranty; and objective third-party evaluations of EHR products. In conclusion, the number of hospitals that have electronic health records is in general high, being relatively higher in medium-sized hospitals.

  12. Household food security status and associated factors among high-school students in Esfahan, Iran.

    Science.gov (United States)

    Mohammadzadeh, Assieh; Dorosty, Ahmadreza; Eshraghian, Mohammadreza

    2010-10-01

    The present study was designed to determine household food security status and factors associated with food insecurity among high-school students in Esfahan, Iran. Cross-sectional surveys. The present study was conducted in autumn 2008 in Esfahan, Iran. The samples were selected using systematic cluster sampling. Socio-economic questionnaires, food security questionnaires and FFQ were filled out during face-to-face interviews. In addition, data on participants' weights and heights were collected. A total of 580 students (261 boys and 319 girls) aged 14-17 years from forty high schools in Esfahan, Iran, were selected. The prevalence of household food insecurity according to the US Department of Agriculture food security questionnaire was 36.6 % (95 % CI 0.33, 0.40). Food insecurity was positively associated with number of members in the household (P hamburger, poultry, fish, green vegetables, root and bulb (coloured) vegetables, melons, apples and oranges, milk and yoghurt (P hamburger), whereas those living in food-insecure households more frequently consumed cheap foods containing high energy per kilogram. The present study suggests that intervention programmes be designed and carried out.

  13. Midterm prospective evaluation of TVT-Secur reveals high failure rate.

    Science.gov (United States)

    Cornu, Jean-Nicolas; Sèbe, Philippe; Peyrat, Laurence; Ciofu, Calin; Cussenot, Olivier; Haab, Francois

    2010-07-01

    TVT-Secur has been described as a new minimally invasive sling for women's stress urinary incontinence (SUI) management, showing promising results in short-term studies. Our goal was to evaluate the outcome of this procedure after a midterm follow-up. A prospective evaluation involved 45 consecutive patients presenting SUI associated with urethral hypermobility. Fourteen patients preoperatively reported overactive bladder (OAB) symptoms, but none had objective detrusor overactivity. Eight patients had low maximal urethral closure pressure (MUCP). Four patients had pelvic organ prolapse (POP). Patients with POP were treated under general anesthesia by Prolift and TVT-Secur procedure. The 41 other patients received TVT-Secur under local anesthesia on an outpatient basis. All interventions were made by the same surgeon. Postoperative assessment included pad count, bladder diary, clinical examination with stress test, evaluation of satisfaction with the Patient Global Impression of Improvement (PGI-I) scale, and evaluation of side effects. Patients were classified as cured if they used no pads, had no leakage, and had a PGI-I score 50% and PGI-I score TVT or transobturator tape during follow-up. Age, MUCP, or OAB were not associated with failure. Side effects were limited to five cases of de novo OAB and three cases of urinary tract infection. This work is limited by the absence of a comparison group. Our experience shows that despite its good short-term efficacy, TVT-Secur is associated with a high recurrence rate of SUI. Therefore, TVT-Secur does not seem appropriate for SUI first-line management in women. Copyright 2010 European Association of Urology. Published by Elsevier B.V. All rights reserved.

  14. Long-term optimal energy mix planning towards high energy security and low GHG emission

    International Nuclear Information System (INIS)

    Thangavelu, Sundar Raj; Khambadkone, Ashwin M.; Karimi, Iftekhar A.

    2015-01-01

    Highlights: • We develop long-term energy planning considering the future uncertain inputs. • We analyze the effect of uncertain inputs on the energy cost and energy security. • Conventional energy mix prone to cause high energy cost and energy security issues. • Stochastic and optimal energy mix show benefits over conventional energy planning. • Nuclear option consideration reduces the energy cost and carbon emissions. - Abstract: Conventional energy planning focused on energy cost, GHG emission and renewable contribution based on future energy demand, fuel price, etc. Uncertainty in the projected variables such as energy demand, volatile fuel price and evolution of renewable technologies will influence the cost of energy when projected over a period of 15–30 years. Inaccurate projected variables could affect energy security and lead to the risk of high energy cost, high emission and low energy security. The energy security is an ability of generation capacity to meet the future energy demand. In order to minimize the risks, a generic methodology is presented to determine an optimal energy mix for a period of around 15 years. The proposed optimal energy mix is a right combination of energy sources that minimize the risk caused due to future uncertainties related to the energy sources. The proposed methodology uses stochastic optimization to address future uncertainties over a planning horizon and minimize the variations in the desired performance criteria such as energy security and costs. The developed methodology is validated using a case study for a South East Asian region with diverse fuel sources consists of wind, solar, geothermal, coal, biomass and natural gas, etc. The derived optimal energy mix decision outperformed the conventional energy planning by remaining stable and feasible against 79% of future energy demand scenarios at the expense of 0–10% increase in the energy cost. Including the nuclear option in the energy mix resulted 26

  15. Identification of cellulose fibres belonging to Spanish cultural heritage using synchrotron high resolution X-ray diffraction

    Energy Technology Data Exchange (ETDEWEB)

    Herrera, L.K.; Justo, A.; Duran, A.; Haro, M.C.J. de; Franquelo, M.L.; Perez Rodriguez, J.L. [CSIC-Seville University, Materials Science Institute of Seville, Seville (Spain)

    2010-05-15

    A complete characterisation of fibres used in Spanish artwork is necessary to provide a complete knowledge of these natural fibres and their stage of degradation. Textile samples employed as painting supports on canvas and one sample of unprocessed plant material were chosen for this study. All the samples were investigated by synchrotron radiation X-ray diffraction (SR-XRD). Flax and cotton have the Cellulose I structure. The values of the crystalline index (CI) were calculated for both types of fibres. The structure of Cellulose IV was associated with the unprocessed plant material. The information obtained by SR-XRD was confirmed by laboratory techniques including scanning electron microscopy (SEM) and Fourier transform infrared spectroscopy (FTIR). (orig.)

  16. Implosion lessons from national security, high reliability spacecraft, electronics, and the forces which changed them

    CERN Document Server

    Temple, L Parker

    2012-01-01

    Implosion is a focused study of the history and uses of high-reliability, solid-state electronics, military standards, and space systems that support our national security and defense. This book is unique in combining the interdependent evolution of and interrelationships among military standards, solid-state electronics, and very high-reliability space systems. Starting with a brief description of the physics that enabled the development of the first transistor, Implosion covers the need for standardizing military electronics, which began during World War II and continu

  17. The Use of Questionnaires in Safety Culture Studies in High Reliability Organizations. Literature Review and an Application in the Spanish Nuclear Sector

    International Nuclear Information System (INIS)

    German, S.; Navajas, J.; Silla, I.

    2014-01-01

    This report examines two aspects related to the use of questionnaires in safety culture research conducted in high reliability organizations. First, a literature review of recent studies that address safety culture through questionnaires is presented. Literature review showed that most studies used only questionnaires as a research technique, were cross-sectional, applied paper-based questionnaires, and were conducted in one type of high reliability organization. Second, a research project on safety culture that used electronic surveys in a sample of experts on safety culture is discussed. This project, developed by CISOT-CIEMAT research institute, was carry out in the Spanish nuclear sector and illustrates relevant aspects of the methodological design and administration processes that must be considered to encourage participation in the study.. (Author)

  18. FOOD SECURITY SITUATION OF SELECTED HIGHLY DEVELOPED COUNTRIES AGAINST DEVELOPING COUNTRIES

    Directory of Open Access Journals (Sweden)

    Karolina Pawlak

    2016-06-01

    Full Text Available The aim of the paper is to present the food security situation in selected highly developed countries and to identify consumption disparities between them and developing countries. The research is based on the data from the United Nations Food and Agriculture Organization (FAO, the Statistical Office of the European Union (Eurostat, the United Nations Statistics Division, the Organisation for Economic Co-operation and Development (OECD, World Food Programme (WFP and selected measures used by the Economist Intelligence Unit (EIU for the construction of the Global Food Security Index. It has been showed that to the greatest extent the problem of maintaining food security occur in developing countries which are characterised by low per capita income, while in developed countries the scale of hunger is marginal and it afflicts less than 1% of the population. On a regional scale the daily dietary energy supply is greater than the minimum dietary energy requirement in all regions of the world, but the extent to which the dietary needs are satisfied increases along with the increase in national income. In order to reduce the problem of hunger it is necessary to solve the problem of asymmetrical distribution of global income, e.g. by taking actions to accelerate the economic growth in less developed regions and increase the purchasing power of the population.

  19. 6 CFR 27.205 - Determination that a chemical facility “presents a high level of security risk.”

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Determination that a chemical facility âpresents... SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.205 Determination that a chemical facility “presents a high level of security risk.” (a...

  20. Ageing management program for the Spanish low and intermediate level waste disposal and spent fuel and high-level waste centralised storage facilities

    Science.gov (United States)

    Zuloaga, P.; Ordoñez, M.; Andrade, C.; Castellote, M.

    2011-04-01

    The generic design of the centralised spent fuel storage facility was approved by the Spanish Safety Authority in 2006. The planned operational life is 60 years, while the design service life is 100 years. Durability studies and surveillance of the behaviour have been considered from the initial design steps, taking into account the accessibility limitations and temperatures involved. The paper presents an overview of the ageing management program set in support of the Performance Assessment and Safety Review of El Cabril low and intermediate level waste (LILW) disposal facility. Based on the experience gained for LILW, ENRESA has developed a preliminary definition of the Ageing Management Plan for the Centralised Interim Storage Facility of spent Fuel and High Level Waste (HLW), which addresses the behaviour of spent fuel, its retrievability, the confinement system and the reinforced concrete structure. It includes tests plans and surveillance design considerations, based on the El Cabril LILW disposal facility.

  1. Ageing management program for the Spanish low and intermediate level waste disposal and spent fuel and high-level waste centralised storage facilities

    Directory of Open Access Journals (Sweden)

    Andrade C.

    2011-04-01

    Full Text Available The generic design of the centralised spent fuel storage facility was approved by the Spanish Safety Authority in 2006. The planned operational life is 60 years, while the design service life is 100 years. Durability studies and surveillance of the behaviour have been considered from the initial design steps, taking into account the accessibility limitations and temperatures involved. The paper presents an overview of the ageing management program set in support of the Performance Assessment and Safety Review of El Cabril low and intermediate level waste (LILW disposal facility. Based on the experience gained for LILW, ENRESA has developed a preliminary definition of the Ageing Management Plan for the Centralised Interim Storage Facility of spent Fuel and High Level Waste (HLW, which addresses the behaviour of spent fuel, its retrievability, the confinement system and the reinforced concrete structure. It includes tests plans and surveillance design considerations, based on the El Cabril LILW disposal facility.

  2. High-Capacity Quantum Secure Direct Communication Based on Quantum Hyperdense Coding with Hyperentanglement

    International Nuclear Information System (INIS)

    Wang Tie-Jun; Li Tao; Du Fang-Fang; Deng Fu-Guo

    2011-01-01

    We present a quantum hyperdense coding protocol with hyperentanglement in polarization and spatial-mode degrees of freedom of photons first and then give the details for a quantum secure direct communication (QSDC) protocol based on this quantum hyperdense coding protocol. This QSDC protocol has the advantage of having a higher capacity than the quantum communication protocols with a qubit system. Compared with the QSDC protocol based on superdense coding with d-dimensional systems, this QSDC protocol is more feasible as the preparation of a high-dimension quantum system is more difficult than that of a two-level quantum system at present. (general)

  3. Are we safe? A tool to improve the knowledge of the risk areas: high-resolution floods database (MEDIFLOOD) for Spanish Mediterranean coast (1960 -2014)

    Science.gov (United States)

    Gil-Guirado, Salvador; Perez-Morales, Alfredo; Lopez-Martinez, Francisco; Barriendos-Vallve, Mariano

    2016-04-01

    The Mediterranean coast of the Iberian Peninsula concentrates an important part of the population and economic activities in Spain. Intensive agriculture, industry in the major urban centers, trade and tourism make this region the main center of economic dynamism and one of the highest rates of population and economic growth of southern Europe. This process accelerated after Franco regime started to be more open to the outside in the early sixties of the last century. The main responsible factor for this process is the climate because of warmer temperatures and a large number of sunny days, which has become in the economic slogan of the area. However, this growth process has happened without proper planning to reduce the impact of other climatic feature of the area, floods. Floods are the natural hazard that generates greater impacts in the area.One of the factors that facilitate the lack of strategic planning is the absence of a correct chronology of flood episodes. In this situation, land use plans, are based on inadequate chronologies that do not report the real risk of the population of this area. To reduce this deficit and contribute to a more efficient zoning of the Mediterranean coast according to their floods risk, we have prepared a high-resolution floods database (MEDIFLOOD) for all the municipalities of the Spanish Mediterranean coast since 1960 until 2013. The methodology consists on exploring the newspaper archives of all newspapers with a presence in the area. The searches have been made by typing the name of each of the 180 municipalities of the Spanish coast followed by 5 key terms. Each identified flood has been classified by dates and according to their level of intensity and type of damage. Additionally, we have consulted the specific bibliography to rule out any data gaps. The results are surprising and worrying. We have identified more than 3,600 cases where a municipality has been affected by floods. These cases are grouped into more than 700

  4. Building a highly available and intrusion tolerant Database Security and Protection System (DSPS).

    Science.gov (United States)

    Cai, Liang; Yang, Xiao-Hu; Dong, Jin-Xiang

    2003-01-01

    Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.

  5. An Embedded System for Safe, Secure and Reliable Execution of High Consequence Software

    Energy Technology Data Exchange (ETDEWEB)

    MCCOY,JAMES A.

    2000-08-29

    As more complex and functionally diverse requirements are placed on high consequence embedded applications, ensuring safe and secure operation requires an execution environment that is ultra reliable from a system viewpoint. In many cases the safety and security of the system depends upon the reliable cooperation between the hardware and the software to meet real-time system throughput requirements. The selection of a microprocessor and its associated development environment for an embedded application has the most far-reaching effects on the development and production of the system than any other element in the design. The effects of this choice ripple through the remainder of the hardware design and profoundly affect the entire software development process. While state-of-the-art software engineering principles indicate that an object oriented (OO) methodology provides a superior development environment, traditional programming languages available for microprocessors targeted for deeply embedded applications do not directly support OO techniques. Furthermore, the microprocessors themselves do not typically support nor do they enforce an OO environment. This paper describes a system level approach for the design of a microprocessor intended for use in deeply embedded high consequence applications that both supports and enforces an OO execution environment.

  6. Improving performance of high risk organizations Spanish nuclear sector from the analysis of organizational culture factors; Mejora del desempeno de las organizaciones de alto riesgo del sector nuclear espanol a partir del analisis de los factores de cultura organizativa

    Energy Technology Data Exchange (ETDEWEB)

    La Salabarnada, E.; German, S.; Silla, I.; Navajas, J.

    2012-07-01

    This paper presents the research project funded by UNESA and conducted by the CISOT-CIEMAT that aims to contribute to improving the operating performance of the Spanish nuclear power plants. This paper aims to identify the factors and key organizational processes to improve efficiency, in order to advance knowledge about the influence of organizational culture on the safety of high reliability organizations.

  7. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  8. Development and applications of diffractive optical security devices for banknotes and high value documents

    Science.gov (United States)

    Drinkwater, John K.; Holmes, Brian W.; Jones, Keith A.

    2000-04-01

    Embossed holograms and othe rdiffractive optically variable devices are increasingly familiar security items on plastic cards, banknotes, securyt documetns and on branded gods and media to protect against counterfeit, protect copyright and to evidence tamper. This paper outlines some of the diffractive optical seuryt and printed security develoepd for this rapidly growing field and provides examles of some current security applications.

  9. High-Capacity Quantum Secure Communication with Authentication Using Einstein-Podolsky-Rosen Pairs

    International Nuclear Information System (INIS)

    Xiao Min; Xu Hong-Wei

    2015-01-01

    A new protocol for quantum secure communication with authentication is proposed. The proposed protocol has a higher capacity as each EPR pair can carry four classical bits by the XOR operation and an auxiliary photon. The security and efficiency are analyzed in detail and the major advantage of this protocol is that it is more efficient without losing security. (paper)

  10. Comparative consideration and design of a security depot for high radioactive glass-enclosed materials

    International Nuclear Information System (INIS)

    Jaroni, U.

    1985-01-01

    From the beginning of 1990 the COGEMA shall supply glass-enclosed high radioactive waste of the reprocessing of German fuel elements back to the Federal Republic of Germany. As to this time the final waste storage in the salt stock of Gorleben will not be available the glass cannisters have to be deposited above ground. First a comparison is made out of a number of proposed storage concepts for the deposition of HAW-glass blocks. The safety technical behaviour of the facility is considered. On the basis of the gained results a new facility design is presented, which can take 450 glass cannisters in a discoid built up cast-steel vessel and makes possible the utilization of the resulting radioactive heat of dissociation. During the development of this concept besides a compact, reasonable method of building and the thermodynamic behaviour of the storage the aspect of high security against release of radioactive materials was emphasized. (orig.) [de

  11. Method and device for secure, high-density tritium bonded with carbon

    Science.gov (United States)

    Wertsching, Alan Kevin; Trantor, Troy Joseph; Ebner, Matthias Anthony; Norby, Brad Curtis

    2016-04-05

    A method and device for producing secure, high-density tritium bonded with carbon. A substrate comprising carbon is provided. A precursor is intercalated between carbon in the substrate. The precursor intercalated in the substrate is irradiated until at least a portion of the precursor, preferably a majority of the precursor, is transmutated into tritium and bonds with carbon of the substrate forming bonded tritium. The resulting bonded tritium, tritium bonded with carbon, produces electrons via beta decay. The substrate is preferably a substrate from the list of substrates consisting of highly-ordered pyrolytic graphite, carbon fibers, carbon nanotunes, buckministerfullerenes, and combinations thereof. The precursor is preferably boron-10, more preferably lithium-6. Preferably, thermal neutrons are used to irradiate the precursor. The resulting bonded tritium is preferably used to generate electricity either directly or indirectly.

  12. High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states

    Science.gov (United States)

    Wu, FangZhou; Yang, GuoJian; Wang, HaiBo; Xiong, Jun; Alzahrani, Faris; Hobiny, Aatef; Deng, FuGuo

    2017-12-01

    This study proposes the first high-capacity quantum secure direct communication (QSDC) with two-photon six-qubit hyper-entangled Bell states in two longitudinal momentum and polarization degrees of freedom (DOFs) of photon pairs, which can be generated using two 0.5 mm-thick type-I β barium borate crystal slabs aligned one behind the other and an eight-hole screen. The secret message can be independently encoded on the photon pairs with 64 unitary operations in all three DOFs. This protocol has a higher capacity than previous QSDC protocols because each photon pair can carry 6 bits of information, not just 2 or 4 bits. Our QSDC protocol decreases the influence of decoherence from environment noise by exploiting the decoy photons to check the security of the transmission of the first photon sequence. Compared with two-way QSDC protocols, our QSDC protocol is immune to an attack by an eavesdropper using Trojan horse attack strategies because it is a one-way quantum communication. The QSDC protocol has good applications in the future quantum communication because of all these features.

  13. Peer-to-peer computing for secure high performance data copying

    International Nuclear Information System (INIS)

    Hanushevsky, A.; Trunov, A.; Cottrell, L.

    2001-01-01

    The BaBar Copy Program (bbcp) is an excellent representative of peer-to-peer (P2P) computing. It is also a pioneering application of its type in the P2P arena. Built upon the foundation of its predecessor, Secure Fast Copy (sfcp), bbcp incorporates significant improvements performance and usability. As with sfcp, bbcp uses ssh for authentication; providing an elegant and simple working model--if you can ssh to a location, you can copy files to or from that location. To fully support this notion, bbcp transparently supports 3rd party copy operations. The program also incorporates several mechanism to deal with firewall security; the bane of P2P computing. To achieve high performance in a wide area network, bbcp allows a user to independently specify, the number of parallel network streams, tcp window size, and the file I/O blocking factor. Using these parameters, data is pipelined from source to target to provide a uniform traffic pattern that maximizes router efficiency. For improved recoverability, bbcp also keeps track of copy operations so that an operation can be restarted from the point of failure at a later time; minimizing the amount of network traffic in the event of a copy failure. Here, the authors present the bbcp architecture, it's various features, and the reasons for their inclusion

  14. Peer-to-Peer Computing for Secure High Performance Data Copying

    International Nuclear Information System (INIS)

    2002-01-01

    The BaBar Copy Program (bbcp) is an excellent representative of peer-to-peer (P2P) computing. It is also a pioneering application of its type in the P2P arena. Built upon the foundation of its predecessor, Secure Fast Copy (sfcp), bbcp incorporates significant improvements performance and usability. As with sfcp, bbcp uses ssh for authentication; providing an elegant and simple working model -- if you can ssh to a location, you can copy files to or from that location. To fully support this notion, bbcp transparently supports 3rd party copy operations. The program also incorporates several mechanism to deal with firewall security; the bane of P2P computing. To achieve high performance in a wide area network, bbcp allows a user to independently specify, the number of parallel network streams, tcp window size, and the file I/O blocking factor. Using these parameters, data is pipelined from source to target to provide a uniform traffic pattern that maximizes router efficiency. For improved recoverability, bbcp also keeps track of copy operations so that an operation can be restarted from the point of failure at a later time; minimizing the amount of network traffic in the event of a copy failure. Here, we preset the bbcp architecture, it's various features, and the reasons for their inclusion

  15. Lived experience of working with female patients in a high-secure mental health setting.

    Science.gov (United States)

    Beryl, Rachel; Davies, Jason; Völlm, Birgit

    2018-02-01

    Women's secure hospitals are often considered to be stressful and demanding places to work, with these environments characterized as challenging and violent. However, the staff experience of working in this environment is not well represented in the literature. The present study is the first to examine the 'lived experience' of seven nurses working in the National High Secure Healthcare Service for Women. Interview transcripts were analysed with the use of interpretative phenomenological analysis, and the findings presented within four superordinate themes 'horror', 'balancing acts', 'emotional hard labour', and 'the ward as a community'. These themes all depict the challenges that participants experience in their work, the ways in which they cope with these challenges, and how they make sense of these experiences. A meta-theme of 'making sense by understanding why' is also presented, which represents the importance for participants to attempt to make sense of the tensions and challenges by formulating a fuller meaning. The findings suggest the importance of workforce development in terms of allowing sufficient protected time for reflection and formulation (e.g. within the format of group supervision or reflective practice), and for staff-support mechanisms (e.g. clinical supervision, counselling, debriefs) to be inbuilt into the ethos of a service, so as to provide proactive support for staff 'on the frontline'. © 2016 Australian College of Mental Health Nurses Inc.

  16. High-speed true random number generation based on paired memristors for security electronics

    Science.gov (United States)

    Zhang, Teng; Yin, Minghui; Xu, Changmin; Lu, Xiayan; Sun, Xinhao; Yang, Yuchao; Huang, Ru

    2017-11-01

    True random number generator (TRNG) is a critical component in hardware security that is increasingly important in the era of mobile computing and internet of things. Here we demonstrate a TRNG using intrinsic variation of memristors as a natural source of entropy that is otherwise undesirable in most applications. The random bits were produced by cyclically switching a pair of tantalum oxide based memristors and comparing their resistance values in the off state, taking advantage of the more pronounced resistance variation compared with that in the on state. Using an alternating read scheme in the designed TRNG circuit, the unbiasedness of the random numbers was significantly improved, and the bitstream passed standard randomness tests. The Pt/TaO x /Ta memristors fabricated in this work have fast programming/erasing speeds of ˜30 ns, suggesting a high random number throughput. The approach proposed here thus holds great promise for physically-implemented random number generation.

  17. Security of attachment and quality of mother-toddler social interaction in a high-risk sample.

    Science.gov (United States)

    Haltigan, John D; Lambert, Brittany L; Seifer, Ronald; Ekas, Naomi V; Bauer, Charles R; Messinger, Daniel S

    2012-02-01

    The quality of children's social interactions and their attachment security with a primary caregiver are two widely studied indices of socioemotional functioning in early childhood. Although both Bowlby and Ainsworth suggested that the parent-child interactions underlying the development of attachment security could be distinguished from other aspects of parent-child interaction (e.g., play), relatively little empirical research has examined this proposition. The aim of the current study was to explore this issue by examining concurrent relations between toddler's attachment security in the Strange Situation Procedure and quality of mother-child social interaction in a high-risk sample of toddlers characterized by prenatal cocaine exposure and low levels of maternal education. Analyses of variance suggested limited relations between attachment security and quality of social interaction. Further research examining the interrelations among various components of the parent-child relationship is needed. Copyright © 2011 Elsevier Inc. All rights reserved.

  18. The Spanish gas industry

    International Nuclear Information System (INIS)

    Anon.

    1993-01-01

    The spanish gas industry has become one of the major actors in the gas sector of the European Economic Community. This paper pictures the spanish gas industry on the basis of a study by Sedigas, the spanish member of the International Gas Union (IGU). The main subjects described are structure of gas companies, natural gas supply, transport and storage, natural gas distribution networks, statistical data on natural gas consumption, manufactured gas and Liquefied Petroleum Gases (LPG) production-consumption in Spain. 7 figs., 10 tabs

  19. High speed fault tolerant secure communication for muon chamber using FPGA based GBTx emulator

    Science.gov (United States)

    Sau, Suman; Mandal, Swagata; Saini, Jogender; Chakrabarti, Amlan; Chattopadhyay, Subhasis

    2015-12-01

    The Compressed Baryonic Matter (CBM) experiment is a part of the Facility for Antiproton and Ion Research (FAIR) in Darmstadt at the GSI. The CBM experiment will investigate the highly compressed nuclear matter using nucleus-nucleus collisions. This experiment will examine lieavy-ion collisions in fixed target geometry and will be able to measure hadrons, electrons and muons. CBM requires precise time synchronization, compact hardware, radiation tolerance, self-triggered front-end electronics, efficient data aggregation schemes and capability to handle high data rate (up to several TB/s). As a part of the implementation of read out chain of Muon Cliamber(MUCH) [1] in India, we have tried to implement FPGA based emulator of GBTx in India. GBTx is a radiation tolerant ASIC that can be used to implement multipurpose high speed bidirectional optical links for high-energy physics (HEP) experiments and is developed by CERN. GBTx will be used in highly irradiated area and more prone to be affected by multi bit error. To mitigate this effect instead of single bit error correcting RS code we have used two bit error correcting (15, 7) BCH code. It will increase the redundancy which in turn increases the reliability of the coded data. So the coded data will be less prone to be affected by noise due to radiation. The data will go from detector to PC through multiple nodes through the communication channel. The computing resources are connected to a network which can be accessed by authorized person to prevent unauthorized data access which might happen by compromising the network security. Thus data encryption is essential. In order to make the data communication secure, advanced encryption standard [2] (AES - a symmetric key cryptography) and RSA [3], [4] (asymmetric key cryptography) are used after the channel coding. We have implemented GBTx emulator on two Xilinx Kintex-7 boards (KC705). One will act as transmitter and other will act as receiver and they are connected

  20. High speed fault tolerant secure communication for muon chamber using FPGA based GBTx emulator

    International Nuclear Information System (INIS)

    Sau, Suman; Chakrabarti, Amlan; Saini, Jogender; Chattopadhyay, Subhasis; Mandal, Swagata

    2015-01-01

    The Compressed Baryonic Matter (CBM) experiment is a part of the Facility for Antiproton and Ion Research (FAIR) in Darmstadt at the GSI. The CBM experiment will investigate the highly compressed nuclear matter using nucleus-nucleus collisions. This experiment will examine lieavy-ion collisions in fixed target geometry and will be able to measure hadrons, electrons and muons. CBM requires precise time synchronization, compact hardware, radiation tolerance, self-triggered front-end electronics, efficient data aggregation schemes and capability to handle high data rate (up to several TB/s). As a part of the implementation of read out chain of Muon Cliamber(MUCH) [1] in India, we have tried to implement FPGA based emulator of GBTx in India. GBTx is a radiation tolerant ASIC that can be used to implement multipurpose high speed bidirectional optical links for high-energy physics (HEP) experiments and is developed by CERN. GBTx will be used in highly irradiated area and more prone to be affected by multi bit error. To mitigate this effect instead of single bit error correcting RS code we have used two bit error correcting (15, 7) BCH code. It will increase the redundancy which in turn increases the reliability of the coded data. So the coded data will be less prone to be affected by noise due to radiation. The data will go from detector to PC through multiple nodes through the communication channel. The computing resources are connected to a network which can be accessed by authorized person to prevent unauthorized data access which might happen by compromising the network security. Thus data encryption is essential. In order to make the data communication secure, advanced encryption standard [2] (AES - a symmetric key cryptography) and RSA [3], [4] (asymmetric key cryptography) are used after the channel coding. We have implemented GBTx emulator on two Xilinx Kintex-7 boards (KC705). One will act as transmitter and other will act as receiver and they are connected

  1. Highly Luminescent Dual Mode Polymeric Nanofiber-Based Flexible Mat for White Security Paper and Encrypted Nanotaggant Applications.

    Science.gov (United States)

    Gangwar, Amit Kumar; Gupta, Ashish; Kedawat, Garima; Kumar, Pawan; Singh, Bhanu Pratap; Singh, Nidhi; Srivastava, Avanish K; Dhakate, Sanjay R; Gupta, Bipin Kumar

    2018-05-23

    Increasing counterfeiting of important data, currency, stamp papers, branded products etc., has become a major security threat which could lead to serious damage to the global economy. Consequences of such damage are compelling for researchers to develop new high-end security features to address full-proof solutions. Herein, we report a dual mode flexible highly luminescent white security paper and nanotaggants composed of nanophosphors incorporated in polymer matrix to form a nanofiber-based mat for anti-counterfeiting applications. The dual mode nanofibers are fabricated by electrospinning technique by admixing the composite of NaYF 4 :Eu 3+ @NaYF 4 :Yb 3+ , Er 3+ nanophosphors in the polyvinyl alcohol solution. This flexible polymer mat derived from nanofibers appears white in daylight, while emitting strong red (NaYF 4 :Eu 3+ ) and green (NaYF 4 :Yb 3+ , Er 3+ ) colors at excitation wavelengths of 254 nm and 980 nm, respectively. These luminescent nanofibers can also be encrypted as a new class of nanotaggants to protect confidential documents. These obtained results suggest that highly luminescent dual mode polymeric nanofiber-based flexible white security paper and nanotaggants could offer next-generation high-end unique security features against counterfeiting. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  2. An overview of the roles and structure of international high-security veterinary laboratories for infectious animal diseases.

    Science.gov (United States)

    Murray, P K

    1998-08-01

    The unique structure, role and operations of government high-security (HS) laboratories which work on animal diseases are described, with particular reference to the laboratories of nine countries. High-security laboratories provide cost-effective insurance against catastrophic losses which could occur following exotic disease outbreaks. The importance of these laboratories is reflected in the fact that several new laboratories have recently been constructed at considerable expense and older facilities have undergone major renovations. Biosecurity is fundamental to the operation of high-security laboratories, so good facility design and microbiological security practices are very important. High-security laboratories conduct exotic disease diagnosis, certification and surveillance, and also perform research into virology, disease pathogenesis and improvements to diagnostic tests and vaccines. The mandate of these laboratories includes the training of veterinarians in the recognition of exotic diseases. One extremely important role is the provision of expert advice on exotic diseases and participation (both nationally and internationally) in policy decisions regarding animal disease issues.

  3. Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model

    Directory of Open Access Journals (Sweden)

    Chun-Juan Ouyang

    2017-01-01

    Full Text Available Security measure is of great importance in both steganography and steganalysis. Considering that statistical feature perturbations caused by steganography in an image are always nondeterministic and that an image is considered nonstationary, in this paper, the steganography is regarded as a fuzzy process. Here a steganographic security measure is proposed. This security measure evaluates the similarity between two vague sets of cover images and stego images in terms of n-order Markov chain to capture the interpixel correlation. The new security measure has proven to have the properties of boundedness, commutativity, and unity. Furthermore, the security measures of zero order, first order, second order, third order, and so forth are obtained by adjusting the order value of n-order Markov chain. Experimental results indicate that the larger n is, the better the measuring ability of the proposed security measure will be. The proposed security measure is more sensitive than other security measures defined under a deterministic distribution model, when the embedding is low. It is expected to provide a helpful guidance for designing secure steganographic algorithms or reliable steganalytic methods.

  4. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission

    Energy Technology Data Exchange (ETDEWEB)

    Han, I; Bond, S; Welty, R; Du, Y; Yoo, S; Reinhardt, C; Behymer, E; Sperry, V; Kobayashi, N

    2004-02-12

    This project is focused on the development of advanced components and system technologies for secure data transmission on high-speed fiber optic data systems. This work capitalizes on (1) a strong relationship with outstanding faculty at the University of California-Davis who are experts in high speed fiber-optic networks, (2) the realization that code division multiple access (CDMA) is emerging as a bandwidth enhancing technique for fiber optic networks, (3) the realization that CDMA of sufficient complexity forms the basis for almost unbreakable one-time key transmissions, (4) our concepts for superior components for implementing CDMA, (5) our expertise in semiconductor device processing and (6) our Center for Nano and Microtechnology, which is where the majority of the experimental work was done. Here we present a novel device concept, which will push the limits of current technology, and will simultaneously solve system implementation issues by investigating new state-of-the-art fiber technologies. This will enable the development of secure communication systems for the transmission and reception of messages on deployed commercial fiber optic networks, through the CDMA phase encoding of broad bandwidth pulses. CDMA technology has been developed as a multiplexing technology, much like wavelength division multiplexing (WDM) or time division multiplexing (TDM), to increase the potential number of users on a given communication link. A novel application of the techniques created for CDMA is to generate secure communication through physical layer encoding. Physical layer encoding devices are developed which utilize semiconductor waveguides with fast carrier response times to phase encode spectral components of a secure signal. Current commercial technology, most commonly a spatial light modulator, allows phase codes to be changed at rates of only 10's of Hertz ({approx}25ms response). The use of fast (picosecond to nanosecond) carrier dynamics of semiconductors

  5. Measurements of oleic acid among individual kernels harvested from test plots of purified runner and spanish high oleic seed

    Science.gov (United States)

    Normal oleic peanuts are often found within commercial lots of high oleic peanuts when sampling among individual kernels. Kernels not meeting high oleic threshold could be true contamination with normal oleic peanuts introduced via poor handling, or kernels not meeting threshold could be immature a...

  6. The Spanish experience - future developments in the gas industry

    International Nuclear Information System (INIS)

    Moraleda, P.

    1996-01-01

    Spanish experience is presented concerned it may be useful at the time of setting up a natural gas industry. The Spanish natural gas industry is of recent creation. Developing infrastructure and securing gas supplies have been major challenges. Challenges which, are also common for majority of the countries. The presentation is split into two blocks: the first one is on our experience in the establishment and consolidation of the market for natural gas in Spain. The second block deals with future developments aiming to strengthen the security of supply; and with the opportunities and threats the gas industry will face

  7. Factors associated with the utilization of primary care emergency centers in a Spanish region with high population dispersion: a mixed-methods study.

    Science.gov (United States)

    Sanz-Barbero, Belén; Otero-García, Laura; Blasco-Hernández, Teresa; San Sebastián, Miguel

    2014-09-03

    Adequate access to primary care emergency centers is particularly important in rural areas isolated from urban centers. However, variability in utilization of emergency services located in primary care centers among inhabitants of nearby geographical areas is understudied. The objectives of this study are twofold: 1) to analyze the association between the availability of municipal emergency care centers and utilization of primary care emergency centers (PCEC), in a Spanish region with high population dispersion; and 2) to determine healthcare providers' perceptions regarding PCEC utilization. A mixed-methods study was conducted. Quantitative phase: multilevel logistic regression modeling using merged data from the 2003 Regional Health Survey of Castile and Leon and the 2001 census data (Spain). Qualitative phase:14 in-depth- interviews of rural-based PCEC providers. Having PCEC as the only emergency center in the municipality was directly associated with its utilization (p use. PCEC users were considered to be predominantly workers and students with scheduling conflicts with rural primary care opening hours. The location of emergency care centers is associated with PCEC utilization. Increasing access to primary care by extending hours may be an important step toward optimal PCEC utilization. Further research would determine whether lower PCEC use by certain groups is associated with disparities in access to care.

  8. Nuclear Security Recommendations on Nuclear and other Radioactive Material out of Regulatory Control: Recommendations (Spanish Edition); Recomendaciones de Seguridad Fisica Nuclear sobre Materiales Nucleares y otros Materiales Radiactivos no sometidos a Control Reglamentario: Recomendaciones

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-06-15

    This publication presents recommendations for the nuclear security of nuclear and other radioactive material that is out of regulatory control. It is based on national experiences and practices and guidance publications in the field of security as well as the nuclear security related international instruments. The recommendations include guidance for States with regard to the nuclear security of nuclear and other radioactive material that has been reported as being out of regulatory control as well as for material that is lost, missing or stolen but has not been reported as such, or has been otherwise discovered. In addition, these recommendations adhere to the detection and assessment of alarms and alerts and to a graded response to criminal or unauthorized acts with nuclear security implications.

  9. Multi-Agent System based Event-Triggered Hybrid Controls for High-Security Hybrid Energy Generation Systems

    DEFF Research Database (Denmark)

    Dou, Chun-Xia; Yue, Dong; Guerrero, Josep M.

    2017-01-01

    This paper proposes multi-agent system based event- triggered hybrid controls for guaranteeing energy supply of a hybrid energy generation system with high security. First, a mul-ti-agent system is constituted by an upper-level central coordi-nated control agent combined with several lower......-level unit agents. Each lower-level unit agent is responsible for dealing with internal switching control and distributed dynamic regula-tion for its unit system. The upper-level agent implements coor-dinated switching control to guarantee the power supply of over-all system with high security. The internal...

  10. India's grain security policy in the era of high food prices

    DEFF Research Database (Denmark)

    Yu, Wusheng; Bandara, Jayatilleke

    2017-01-01

    policies, which are superior in terms of their welfare effects and fiscal costs and might also be politically feasible. These findings have important implications on the ongoing debates on India's food security policy, particularly in relation to the discussion on its National Food Security Act....

  11. Providing strong Security and high privacy in low-cost RFID networks

    DEFF Research Database (Denmark)

    David, Mathieu; Prasad, Neeli R.

    2009-01-01

    Since the dissemination of Radio Frequency IDentification (RFID) tags is getting larger and larger, the requirement for strong security and privacy is also increasing. Low-cost and ultra-low-cost tags are being implemented on everyday products, and their limited resources constraints the security...

  12. 48 CFR 1352.237-70 - Security processing requirements-high or moderate risk contracts.

    Science.gov (United States)

    2010-10-01

    ... background inquiries pertaining to verification of name, physical description, marital status, present and... undergo security processing by the Department's Office of Security before being eligible to work on the.... citizens must have: (1) Official legal status in the United States; (2) Continuously resided in the United...

  13. What do prisoners eat? Nutrient intakes and food practices in a high-secure prison.

    Science.gov (United States)

    Hannan-Jones, Mary; Capra, Sandra

    2016-04-01

    There are limited studies on the adequacy of prisoner diet and food practices, yet understanding these are important to inform food provision and assure duty of care for this group. The aim of this study was to assess the dietary intakes of prisoners to inform food and nutrition policy in this setting. This research used a cross-sectional design with convenience sampling in a 945-bed male high-secure prison. Multiple methods were used to assess food available at the group level, including verification of food portion, quality and practices. A pictorial tool supported the diet history method. Of 276 eligible prisoners, 120 dietary interviews were conducted and verified against prison records, with 106 deemed plausible. The results showed the planned food to be nutritionally adequate, with the exception of vitamin D for older males and long-chain fatty acids, with Na above upper limits. The Australian dietary targets for chronic disease risk were not achieved. High energy intakes were reported with median 13·8 (se 0·3) MJ. Probability estimates of inadequate intake varied with age groups: Mg 8 % (>30 years), 2·9 % (70 years), 1·5 % (food provision in the prison environment and also poses questions for population-level dietary guidance in delivering appropriate nutrients within energy limits.

  14. High-performance secure multi-party computation for data mining applications

    DEFF Research Database (Denmark)

    Bogdanov, Dan; Niitsoo, Margus; Toft, Tomas

    2012-01-01

    Secure multi-party computation (MPC) is a technique well suited for privacy-preserving data mining. Even with the recent progress in two-party computation techniques such as fully homomorphic encryption, general MPC remains relevant as it has shown promising performance metrics in real...... operations such as multiplication and comparison. Secondly, the confidential processing of financial data requires the use of more complex primitives, including a secure division operation. This paper describes new protocols in the Sharemind model for secure multiplication, share conversion, equality, bit...

  15. The Evaluation of the Spanish Air Quality Modelling System: CALIOPE. Dynamics and Chemistry over Europe and Iberian Peninsula for 2004 at high horizontal resolution

    Science.gov (United States)

    Piot, M.; Pay, M.; Jorba, O.; Lopez, E.; Pirez, C.; Gasso, S.; Baldasano, J. M.

    2009-12-01

    In Europe, human exposure to air pollution often exceeds standards set by the EU commission (Directives 1996/62/EC, 2002/3/EC, 2008/50/EC) and the World Health Organization (WHO). Urban/suburban areas are predominantly impacted upon, although exceedances of particulate matter (PM10 and PM2.5) and Ozone (O3) also take place in rural areas. Within the CALIOPE project, a high-resolution air quality forecasting system, namely WRF-ARW/HERMES04/CMAQ/BSC-DREAM, has been developed and applied to the European domain (12x12 sq. km, 1hr) as well as the Spanish domain (4x4 sq. km, 1hr). The simulation of such high-resolution model system has been made possible by its implementation on the MareNostrum supercomputer. This contribution describes a thorough quantitative evaluation study performed for the reference year 2004. The WRF-ARW meteorological model contains 38 vertical layers reaching up to 50 hPa. The vertical resolution of the CMAQ chemistry-transport model for gas-phase and aerosols has been increased from 8 to 15 layers in order to simulate vertical exchanges more accurately. Gas phase boundary conditions are provided by the LMDz-INCA2 global climate-chemistry model. For the European simulation, emissions are disaggregated from the EMEP emission inventory for 2004 to the utilized resolution using the criteria implemented in the HERMES04 emission model. The HERMES04 model system, running through a bottom-up approach, is used to estimate emissions for Spain at a 1x1 sq. km horizontal resolution, every hour. In order to evaluate the performances of the CALIOPE system, the model simulation for Europe was compared with ground-based measurements from the EMEP and the Spanish air quality networks (total of 60 stations for O3, 43 for NO2, 31 for SO2, 25 for PM10 and 16 for PM2.5). The model simulation for Europe satisfactorily reproduces O3 concentrations throughout the year (annual correlation: 0.66) with relatively small errors: MNGE values range from 13% to 26%, and MNBE

  16. Bridging nuclear safety, security and safeguards at geological disposl of high level radioactive waste and spent nuclear fuel

    International Nuclear Information System (INIS)

    Niemeyer, Irmgard; Deissmann, Guido; Bosbach, Dirk

    2016-01-01

    Findings and recommendations: • Further R&D needed to identify concepts, methods and technologies that would be best suited for the holistic consideration of safety, security and safeguards provisions of geological disposal. • 3S ‘toolbox’, including concepts, methods and technologies for: ■ material accountancy, ■ measurement techniques for spent fuel verification, ■ containment and surveillance, ■ analysis of open source information, ■ environmental sampling and monitoring, ■ continuity of knowledge, ■ design implications. •: Bridging safety, security and safeguards in research funding and research activities related to geological disposal of high-level radioactive waste and spent nuclear fuel.

  17. Ballistic Missile Defense: National Security and the High Frontier of Space.

    Science.gov (United States)

    Adragna, Steven P.

    1985-01-01

    Ballistic missile defense is discussed, and the rationale behind the proposal to place defensive weapons in space is examined. Strategic defense is a national security, political, and moral imperative. (RM)

  18. High prevalence of mutations affecting the splicing process in a Spanish cohort with autosomal dominant retinitis pigmentosa

    Science.gov (United States)

    Ezquerra-Inchausti, Maitane; Barandika, Olatz; Anasagasti, Ander; Irigoyen, Cristina; López de Munain, Adolfo; Ruiz-Ederra, Javier

    2017-01-01

    Retinitis pigmentosa is the most frequent group of inherited retinal dystrophies. It is highly heterogeneous, with more than 80 disease-causing genes 27 of which are known to cause autosomal dominant RP (adRP), having been identified. In this study a total of 29 index cases were ascertained based on a family tree compatible with adRP. A custom panel of 31 adRP genes was analysed by targeted next-generation sequencing using the Ion PGM platform in combination with Sanger sequencing. This allowed us to detect putative disease-causing mutations in 14 out of the 29 (48.28%) families analysed. Remarkably, around 38% of all adRP cases analysed showed mutations affecting the splicing process, mainly due to mutations in genes coding for spliceosome factors (SNRNP200 and PRPF8) but also due to splice-site mutations in RHO. Twelve of the 14 mutations found had been reported previously and two were novel mutations found in PRPF8 in two unrelated patients. In conclusion, our results will lead to more accurate genetic counselling and will contribute to a better characterisation of the disease. In addition, they may have a therapeutic impact in the future given the large number of studies currently underway based on targeted RNA splicing for therapeutic purposes. PMID:28045043

  19. Changes in bread consumption and 4-year changes in adiposity in Spanish subjects at high cardiovascular risk.

    Science.gov (United States)

    Bautista-Castaño, I; Sánchez-Villegas, A; Estruch, R; Martínez-González, M A; Corella, D; Salas-Salvadó, J; Covas, M I; Schroder, H; Alvarez-Pérez, J; Quilez, J; Lamuela-Raventós, R M; Ros, E; Arós, F; Fiol, M; Lapetra, J; Muñoz, M A; Gómez-Gracia, E; Tur, J; Pintó, X; Ruiz-Gutierrez, V; Portillo-Baquedano, M P; Serra-Majem, L

    2013-07-28

    The effects of bread consumption change over time on anthropometric measures have been scarcely studied. We analysed 2213 participants at high risk for CVD from the PREvención con DIeta MEDiterránea (PREDIMED) trial to assess the association between changes in the consumption of bread and weight and waist circumference gain over time. Dietary habits were assessed with validated FFQ at baseline and repeatedly every year during 4 years of follow-up. Using multivariate models to adjust for covariates, long-term weight and waist circumference changes according to quartiles of change in energy-adjusted white and whole-grain bread consumption were calculated. The present results showed that over 4 years, participants in the highest quartile of change in white bread intake gained 0·76 kg more than those in the lowest quartile (P for trend = 0·003) and 1·28 cm more than those in the lowest quartile (P for trend bread consumption and anthropometric measures. Gaining weight (>2 kg) and gaining waist circumference (>2 cm) during follow-up was not associated with increase in bread consumption, but participants in the highest quartile of changes in white bread intake had a reduction of 33 % in the odds of losing weight (>2 kg) and a reduction of 36 % in the odds of losing waist circumference (>2 cm). The present results suggest that reducing white bread, but not whole-grain bread consumption, within a Mediterranean-style food pattern setting is associated with lower gains in weight and abdominal fat.

  20. Validation of a Spanish translation of the Gratitude Questionnaire (GQ-6) with a Chilean sample of adults and high schoolers.

    Science.gov (United States)

    Langer, Álvaro I; Ulloa, Valentina G; Aguilar-Parra, José M; Araya-Véliz, Claudio; Brito, Gonzalo

    2016-03-31

    Recent studies have associated positive emotions with several variables such as learning, coping strategies or assertive behaviour. The concept of gratitude has been specifically defined as a tendency to recognise and respond to people or situations with grateful emotion. Unfortunately in Latin America, no validated measures of gratitude on different populations are available. The aim of this study was to analyse the psychometric properties of the Gratitude Questionnaire (GQ-6) in two Chilean samples. Two studies were conducted: the first with 668 high school adolescents (390 women and 278 men, with ages ranging between 12 and 20, and a mean age 15.54 ± 1.22) and the second with 331 adults (231 women and 100 men, with an average age of 37.59 ± 12.6). An analysis of the psychometric properties of the GQ-6 scale to determine the validity and reliability of the instrument in Chilean adolescents and adults was performed. Bivariate correlations, multiple regression analyses, exploratory factor analysis (EFA) and Monte Carlo simulations were carried out. Finally, a confirmatory factor analysis (CFA) was performed. A single-factor solution was found in both studies, a 5 item version for the adolescents and 6 items for adults. This factorial solution was invariant across genders. Reliability of the GQ was adequate in both samples (using Cronbach's alpha coefficient). In addition convergent and discriminate validity were assessed. Additionally, a negative correlation between the GQ-5 and depression in adolescents and a positive correlation between the GQ-6 and happiness in adults was found. The GQ is a suitable measure for evaluating a person's disposition toward gratitude in Chilean adolescents and adults. This instrument may contribute to the advancement of the study of positive emotions in Latin America.

  1. Los Ninos y el Mundo: Children's Books in Spanish from around the World.

    Science.gov (United States)

    Schon, Isabel

    2001-01-01

    Offers brief descriptions of 32 children's books (or book series) in Spanish that introduce children to numerous countries around the world. Notes a web site address listing high-quality books in Spanish for children and adolescents. (SR)

  2. Objective and Essential Elements of a State's Nuclear Security Regime. Nuclear Security Fundamentals (Spanish Edition); Objetivo y elementos esenciales del régimen de seguridad física nuclear de un Estado. Nociones fundamentales de seguridad física nuclear

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2014-10-15

    The possibility that nuclear material or other radioactive material could be used for criminal purposes or intentionally used in an unauthorized manner cannot be ruled out in the current global situation. States have responded to this risk by engaging in a collective commitment to strengthen the protection and control of such material and to respond effectively to nuclear security events. States have agreed to strengthen existing instruments and have established new international legal instruments to enhance nuclear security worldwide. Nuclear security is fundamental in the management of nuclear technologies and in applications where nuclear material or other radioactive material is used or transported. Through its nuclear security programme, the IAEA supports States to establish, maintain and sustain an effective nuclear security regime. The IAEA has adopted a comprehensive approach to nuclear security. This recognizes that an effective national nuclear security regime builds on: the implementation of relevant international legal instruments; information protection; physical protection; material accounting and control; detection of and response to trafficking in such material; national response plans; and contingency measures. With its Nuclear Security Series, the IAEA aims to assist States in implementing and sustaining such a regime in a coherent and integrated manner. The IAEA Nuclear Security Series comprises: Nuclear Security Fundamentals, which include the objeurity Fundamentals, which include the objective and essential elements of a State's nuclear security regime; Recommendations; Implementing Guides; and Technical Guidance. Each State carries the full responsibility for nuclear security. Specifically, each State has the responsibility to provide for the security of nuclear material and other radioactive material and their associated facilities and activities; to ensure the security of such material in use, storage, or in transport; to combat illicit

  3. Spanish? What Spanish? The Search for a 'Caribbean Standard.'

    Science.gov (United States)

    Hollingsworth, C.

    1978-01-01

    Variations in lexicon, phonology, morphology, and syntax of Spanish as spoken in Venezuela, Cuba, Mexico, and Castile have led to a diversity in the types of Spanish taught in Caribbean schools. The Programa Interamericano de Linguistica y Ensenanza de Idiomas is conducting a survey which will provide authoritative standards for Spanish teachers.…

  4. Environmental security benefits arising from Russian/Norwegian/US cooperation in the high Arctic

    International Nuclear Information System (INIS)

    Dyer, R.S.

    1997-01-01

    Past practices associated with the civilian and military use of nuclear power in NW Russia present large environmental security risks of international concern. These risks arise from a variety of practices associated with weapons production, testing, power production and waste management. The threats presented by these activities are multimedia in nature, span political boundaries and cannot be simply or inexpensively remediated. Today, cooperative efforts are being undertaken to improve environmental security by remediating existing and potential emission sources. Initial efforts focused on the upgrade and expansion of the Murmansk Low-level Liquid Waste Treatment Facility, Murmansk, Russia. This facility handles wastes generated during the decommissioning of Russian Nuclear Navy submarines and from the operation of the Russian commercial nuclear-powered icebreaker fleet. This upgraded facility is now being constructed and is expected to be completed by March 1998. Completion of this facility will result in the cessation of any future dumping of liquid radioactive wastes into the Barents and Kara Seas. Another large environmental security risk is the LEPSE. The LEPSE is a ship docked in Murmansk, Russia, that contains ∼650 spent fuel elements as well as other solid and liquid wastes from Russian nuclear vessels. International efforts are now being mounted to remove the spent and damaged fuel from this ship, including the safe removal and storage/disposal of the fuel elements. This paper will summarize the environmental security problems presented by these different sources and the likely environmental security benefits associated with their remediation. 5 refs., 1 fig., 1 tab

  5. The Spanish reforms on domestic work regulation

    Directory of Open Access Journals (Sweden)

    Elena Desdentado Daroca

    2016-06-01

    Full Text Available This paper analyses the latest Spanish reforms regarding domestic work. The Spanish legislator, doubtlessly influenced by the ILO Domestic Work Convention nº 189 – which, however, was not later ratified in Spain- made a deep reform on domestic work in 2011. This legal reform implied a striking change that affected both working conditions and social security of employees in the family home. The aim of this reform has been to bring the regulation in domestic work closer to the general regulation for other workers, although maintaining certain specialties. Regarding working conditions, their setting as “particular employment relationship” has been held. However, the differences between this relationship and the common ones have been reduced. As for social security, domestic employees have been incorporated into the General Social Security System, but with important specialties, thus erasing the Special Domestic Employees System. The paper also examines the legal changes that have taken place in this field after the new Government arose.

  6. Spanish participation in the Conference on Security and Cooperation in Europe (CSCE: contributions to the Helsinki Final Act | La participación española en la Conferencia para la Seguridad y la Cooperación en Europa (CSCE: aportaciones al Acta Final de Helsinki

    Directory of Open Access Journals (Sweden)

    Ana Capilla Casco

    2015-12-01

    Full Text Available The Conference on Security and Cooperation in Europe announcement provided Francoist Spain an excellent opportunity to join a multilateral forum aiming to promote security in Europe as well as a détente between the West and the Soviet Union. Spanish diplomacy, despite the relative international isolation of the country and the limits derived from the authoritarian nature of the Regime, designed a negotiation strategy contributing to gaining visibility and providing valuable contributions to the Final Act, such as the incorporation of the text on Mediterranean security. They also reached a wording of the Act principles agreeable to Spain’s interest and to the progress made in United Nations. On the basis of the analysis of the Spanish delegation reports, this article studies both the lights of the work done in Helsinki and Geneva and its shades, the latter being identified with the red lines established by the Francoist Regime. In terms of human rights and especially regarding free circulation and exchange of information. | La convocatoria de la Conferencia para la Seguridad y la Cooperación en Europa brindó una ocasión excelente a la España franquista para poder participar en un foro multilateral destinado a promover la seguridad en Europa y la distensión entre Occidente y la Unión Soviética. La diplomacia española, pese al relativo aislamiento al que seguía sometido el país y las limitaciones que se derivaban de la naturaleza autoritaria del Régimen, trazó una estrategia negociadora que le permitió ganar visibilidad y realizar aportaciones destacadas al Acta Final, como la incorporación del texto sobre la seguridad en el Mediterráneo. Del mismo modo, logró que la redacción de los principios del Acta fuera conforme a los intereses de España y se preservaran los logros alcanzados en Naciones Unidas. Este artículo tiene por objeto estudiar, a partir del análisis de los informes redactados por la propia delegación espa

  7. Reading and Vocabulary Recommendations for Spanish for Native Speakers Materials.

    Science.gov (United States)

    Spencer, Laura Gutierrez

    1995-01-01

    Focuses on the need for appropriate materials to address the needs of native speakers of Spanish who study Spanish in American universities and high schools. The most important factors influencing the selection of readings should include the practical nature of themes for reading and vocabulary development, level of difficulty, and variety in…

  8. Cultural Understanding: Spanish Level 1.

    Science.gov (United States)

    Scott, Reid

    The teacher's attention is focused on selected elements of Spanish culture which may be taught integrally with instructional materials found in the first-year Spanish texts "Entender y Hablar", "La Familia Fernandez", and "A-LM Spanish, Level One". Items are cross-referenced for 42 cultural concepts ranging from nicknames to streets, roads, and…

  9. A Protocol for Provably Secure Authentication of a Tiny Entity to a High Performance Computing One

    Directory of Open Access Journals (Sweden)

    Siniša Tomović

    2016-01-01

    Full Text Available The problem of developing authentication protocols dedicated to a specific scenario where an entity with limited computational capabilities should prove the identity to a computationally powerful Verifier is addressed. An authentication protocol suitable for the considered scenario which jointly employs the learning parity with noise (LPN problem and a paradigm of random selection is proposed. It is shown that the proposed protocol is secure against active attacking scenarios and so called GRS man-in-the-middle (MIM attacking scenarios. In comparison with the related previously reported authentication protocols the proposed one provides reduction of the implementation complexity and at least the same level of the cryptographic security.

  10. Analyzing driving forces behind changes in energy vulnerability of Spanish electricity generation through a Divisia index-based method

    International Nuclear Information System (INIS)

    Fernández González, P.; Moreno, B.

    2015-01-01

    Highlights: • We propose and develop the LMDI approach to factorize changes in electricity bill vulnerability. • Spanish vulnerability (1995–2011) markedly grew mainly by increasing gas dependence. • Fuel price increase and growing importance of electricity damage energy security. • Energy intensity advances & fuel diversification: insufficient to drive vulnerability. • Main recommendation: enhance internal energy market and common external EU strategy. - Abstract: High energy dependence on fossil raises vulnerability concerns about security of supply and energy cost. This research examines the impact of high dependence of imported fuels for power generation in Spain through the quantification and analysis of the driving forces behind the change in its electricity bill. Following logarithmic mean Divisia indexes approach, we present and perform a new method that enables a complete decomposition of changes in electricity vulnerability into contributions from several drivers. In fact, we identify five predefined factors behind the variations in vulnerability in Spain during the 1998–2011 period: fuel price, average heat rate, fuel dependence, degree of electricity importance and energy intensity. The application of this approach reveals a significant increase in Spanish vulnerability in the last two decades, promoted by increments in fuel price and importance of electricity over the primary energy consumption, but especially by increasing fuel dependence (particularly gas dependence). Therefore, findings mainly advocate for those strategies aimed at reducing Spanish energy dependence. Also those improving thermal efficiency and energy intensity are indicated

  11. Spanish Consensus Statement

    Science.gov (United States)

    Rey, Guillermo Álvarez; Cuesta, Jordi Ardevol; Loureda, Rafael Arriaza; España, Fernando Ávila; Matas, Ramón Balius; Pazos, Fernando Baró; de Dios Beas Jiménez, Juan; Rosell, Jorge Candel; Fernandez, César Cobián; Ros, Francisco Esparza; Colmenero, Josefina Espejo; de Prado, Jorge Fernández; Cota, Juan José García; González, Jose Ignacio Garrido; Santander, Manuela González; Munilla, Miguel Ángel Herrador; Ruiz, Francisco Ivorra; Díaz, Fernando Jiménez; Marqueta, Pedro Manonelles; Fernandez, Antonio Maestro; Benito, Juan José Muñoz; Vilás, Ramón Olivé; Teres, Xavier Peirau; Amaro, José Peña; Roque, Juan Pérez San; Parenteu, Christophe Ramírez; Serna, Juan Ribas; Álvarez, Mikel Sánchez; Marchori, Carlos Sanchez; Soto, Miguel del Valle; Alonso, José María Villalón; García, Pedro Guillen; de la Iglesia, Nicolas Hugo; Alcorocho, Juan Manuel Lopez

    2015-01-01

    On the 21st of March, 2015, experts met at Clínica CEMTRO in Madrid, Spain, under the patronage of The Spanish Society for Sports Traumatology (SETRADE), The Spanish Federation of Sports Medicine (FEMEDE), The Spanish Association of Medical Services for Football Clubs (AEMEF), and The Spanish Association of Medical Services for Basketball Clubs (AEMB) with the aim of establishing a round table that would allow specialists to consider the most appropriate current general actions to be taken when treating muscle tears in sport, based on proven scientific data described in the medical literature. Each expert received a questionnaire prior to the aforementioned meeting comprising a set of questions concerning therapeutic indications generally applied in the different stages present during muscle repair. The present Consensus Document is the result of the answers to the questionnaire and resulting discussion and consensus over which are the best current indications in the treatment of muscle tears in sport. Avoiding immobilization, not taking nonsteroidal anti-inflammatory drugs (NSAIDs) randomly, fostering early mobilization, increasing vascularization of injured, site and regulating inflammatory mechanisms—without inhibiting these from the early stages of the recovery period—all stood out as main points of the Consensus Document. Additionally, there is controversy concerning cell stimulation techniques and the use of growth factors or cell inhibitors. The decision concerning discharge was unanimous, as was the criteria considered when it came to performing sport techniques without pain. PMID:27213161

  12. Water sovereignty and security, high politics and hard power: the dangers of borrowing discourses!

    NARCIS (Netherlands)

    Gupta, J.; Dellapenna, J.W.; van den Heuvel, M.; Pahl-Wostl, C.; Bhaduri, A.; Gupta, J.

    2016-01-01

    This chapter argues that water security has many meanings. It addresses the question: will framing water in terms of ‘water security’ be likely to do a disservice to the water governance challenge of the 21st century? Isn’t there a real risk that the term will become hostage to a much more sinister

  13. The spanish electric system operation. The contribution of nuclear generation

    International Nuclear Information System (INIS)

    Duvison, M. R.; Torre, M. de la

    2009-01-01

    Operation of an electric system encloses the collection of activities which extend from affective generation dispatch to issuing instruction for network manoeuvring along with international exchange scheduling. Based on the market mechanisms that apply to energy transactions, these tasks guarantee the security of supply end consumers, which is the final goal of the System Operators actions. In Spain this function is executed by Red Electrica de Espana (REE) since 1985, after being constituted as the first Transmission and System Operator (TSO) in the world. Additionally the variations to Law 54/1997 introduced by law 17/2007 also assign REE the function of sole transmission owner in the Spanish electric system. In order to achieve the aforementioned goal, nuclear energy plays in Spain a fundamental role in electric generation thanks to its high availability rate, the predictability of its fuel recharges, its high operational reliability, its geographical location, the stability of its costs and the security of supply given by the possibility of on-site fuel storage in the power plant. (Author)

  14. Intrinsic imperfection of self-differencing single-photon detectors harms the security of high-speed quantum cryptography systems

    Science.gov (United States)

    Jiang, Mu-Sheng; Sun, Shi-Hai; Tang, Guang-Zhao; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2013-12-01

    Thanks to the high-speed self-differencing single-photon detector (SD-SPD), the secret key rate of quantum key distribution (QKD), which can, in principle, offer unconditionally secure private communications between two users (Alice and Bob), can exceed 1 Mbit/s. However, the SD-SPD may contain loopholes, which can be exploited by an eavesdropper (Eve) to hack into the unconditional security of the high-speed QKD systems. In this paper, we analyze the fact that the SD-SPD can be remotely controlled by Eve in order to spy on full information without being discovered, then proof-of-principle experiments are demonstrated. Here, we point out that this loophole is introduced directly by the operating principle of the SD-SPD, thus, it cannot be removed, except for the fact that some active countermeasures are applied by the legitimate parties.

  15. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  16. High reliability - low noise radionuclide signature identification algorithms for border security applications

    Science.gov (United States)

    Lee, Sangkyu

    Illicit trafficking and smuggling of radioactive materials and special nuclear materials (SNM) are considered as one of the most important recent global nuclear threats. Monitoring the transport and safety of radioisotopes and SNM are challenging due to their weak signals and easy shielding. Great efforts worldwide are focused at developing and improving the detection technologies and algorithms, for accurate and reliable detection of radioisotopes of interest in thus better securing the borders against nuclear threats. In general, radiation portal monitors enable detection of gamma and neutron emitting radioisotopes. Passive or active interrogation techniques, present and/or under the development, are all aimed at increasing accuracy, reliability, and in shortening the time of interrogation as well as the cost of the equipment. Equally important efforts are aimed at advancing algorithms to process the imaging data in an efficient manner providing reliable "readings" of the interiors of the examined volumes of various sizes, ranging from cargos to suitcases. The main objective of this thesis is to develop two synergistic algorithms with the goal to provide highly reliable - low noise identification of radioisotope signatures. These algorithms combine analysis of passive radioactive detection technique with active interrogation imaging techniques such as gamma radiography or muon tomography. One algorithm consists of gamma spectroscopy and cosmic muon tomography, and the other algorithm is based on gamma spectroscopy and gamma radiography. The purpose of fusing two detection methodologies per algorithm is to find both heavy-Z radioisotopes and shielding materials, since radionuclides can be identified with gamma spectroscopy, and shielding materials can be detected using muon tomography or gamma radiography. These combined algorithms are created and analyzed based on numerically generated images of various cargo sizes and materials. In summary, the three detection

  17. Teaching Units for Consumer Home Economics. Topic: Housing and Interior Decorating, Bilingual/Spanish.

    Science.gov (United States)

    Bernadt, Ruth

    The instructional aids in this packet were designed to be used by high school home economics teachers who have Spanish speaking students with limited English skills mainstreamed into their regular classes. The teaching aids can be used by both English and Spanish speaking students at the same time because both Spanish and English are presented on…

  18. On the Nature of Cross-Linguistic Transfer: A Case Study of Andean Spanish

    Science.gov (United States)

    Muntendam, Antje G.

    2013-01-01

    This paper presents the results of a study on cross-linguistic transfer in Andean Spanish word order. In Andean Spanish the object appears in preverbal position more frequently than in non-Andean Spanish, which has been attributed to an influence from Quechua (a Subject-Object-Verb language). The high frequency of preverbal objects could be…

  19. Crucial times for Spanish physical oceanography

    Directory of Open Access Journals (Sweden)

    Josep L. Pelegrí

    2012-08-01

    Full Text Available The field of physical oceanography has undergone exponential growth in Spain during the last few decades. From a handful of self-taught researchers in the late 1960s there are now several hundred physical oceanographers distributed in some 20 Spanish institutions, and many more working overseas. The First Spanish Physical Oceanography Meeting (EOF1, held in Barcelona in October 2010, was a good example of the high quality and large variety of this research. The facilities and human resources are excellent but the alarming decrease in public investment in science due to the economic crisis must lead the Spanish physical oceanography community to define its current priorities. In this introductory paper to EOF1 we revise our history and where we are now, and suggest that progress in the near future will rely on our intelligence to sustain and enhance human capital, partnership and society-oriented research.

  20. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  1. An audit of a specialist old age psychiatry liaison service to a medium and a high secure forensic psychiatry unit.

    Science.gov (United States)

    Shah, Ajit

    2006-04-01

    The elderly prison population is increasing and there is a significant amount of unidentified psychiatric morbidity among elderly prisoners. A sizeable number of elderly subjects are referred to regional forensic units. These units are able to provide advice but are reluctant to admit frail, physically ill and vulnerable elderly into their unit because the ward environment is considered inappropriate for them. A sizeable number of inpatients in medium and high secure units are elderly. This paper is an exploratory audit of referrals from a medium and high secure forensic psychiatry unit to a specialist consultation-only liaison old age psychiatry service, which was specifically developed to service the forensic unit. The demographic and clinical characteristics of the patients seen by this specialist service were similar to elderly inpatients in medium and high secure units. All referrals were judged to be appropriate and new management advice was provided in all cases. Main reasons for referral included diagnostic advice, placement advice and treatment advice. Establishing a diagnosis of dementia was considered important because Alzheimer's disease and Lewy body dementia can be treated with cholinesterase inhibitors. Placement advice was the most difficult to provide because of paucity of residential and nursing homes able and willing to accept patients with a forensic history. There is a need for a comprehensive model of specialist forensic old age psychiatry service at a regional or supraregional level. A consensus needs to be reached on the exact configuration of such a service.

  2. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  3. A Spanish language and culture initiative for a doctor of pharmacy curriculum.

    Science.gov (United States)

    VanTyle, W Kent; Kennedy, Gala; Vance, Michael A; Hancock, Bruce

    2011-02-10

    To implement a Spanish language and culture initiative in a doctor of pharmacy (PharmD) curriculum that would improve students' Spanish language skills and cultural competence so that graduates could provide competent pharmaceutical care to Spanish-speaking patients. Five elective courses were created and introduced to the curriculum including 2 medical Spanish courses; a medical Spanish service-learning course; a 2-week Spanish language and cultural immersion trip to Mexico; and an advanced practice pharmacy experience (APPE) at a medical care clinic serving a high percentage of Spanish-speaking patients. Advisors placed increased emphasis on encouraging pharmacy students to complete a major or minor in Spanish. Enrollment in the Spanish language courses and the cultural immersion trip has been strong. Twenty-three students have completed the APPE at a Spanish-speaking clinic. Eleven percent of 2010 Butler University pharmacy graduates completed a major or minor in Spanish compared to approximately 1% in 2004 when the initiative began. A Spanish language and culture initiative started in 2004 has resulted in increased Spanish language and cultural competence among pharmacy students and recent graduates.

  4. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  5. Secure and robust cloud computing for high-throughput forensic microsatellite sequence analysis and databasing.

    Science.gov (United States)

    Bailey, Sarah F; Scheible, Melissa K; Williams, Christopher; Silva, Deborah S B S; Hoggan, Marina; Eichman, Christopher; Faith, Seth A

    2017-11-01

    Next-generation Sequencing (NGS) is a rapidly evolving technology with demonstrated benefits for forensic genetic applications, and the strategies to analyze and manage the massive NGS datasets are currently in development. Here, the computing, data storage, connectivity, and security resources of the Cloud were evaluated as a model for forensic laboratory systems that produce NGS data. A complete front-to-end Cloud system was developed to upload, process, and interpret raw NGS data using a web browser dashboard. The system was extensible, demonstrating analysis capabilities of autosomal and Y-STRs from a variety of NGS instrumentation (Illumina MiniSeq and MiSeq, and Oxford Nanopore MinION). NGS data for STRs were concordant with standard reference materials previously characterized with capillary electrophoresis and Sanger sequencing. The computing power of the Cloud was implemented with on-demand auto-scaling to allow multiple file analysis in tandem. The system was designed to store resulting data in a relational database, amenable to downstream sample interpretations and databasing applications following the most recent guidelines in nomenclature for sequenced alleles. Lastly, a multi-layered Cloud security architecture was tested and showed that industry standards for securing data and computing resources were readily applied to the NGS system without disadvantageous effects for bioinformatic analysis, connectivity or data storage/retrieval. The results of this study demonstrate the feasibility of using Cloud-based systems for secured NGS data analysis, storage, databasing, and multi-user distributed connectivity. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. A Common Criteria-Based Team Project for High Assurance Secure Systems

    Science.gov (United States)

    2005-01-01

    experience in the FHM, full system documentation, and plenty of time. The students had little experience and little time. The MINIX operating... MINIX is a very appropriate target for student enhancements. Since the principle objective of Secure Systems is to teach the concepts of...to construct a system when one of the developmental threats is subversion. Because students were studying MINIX in a prerequisite operating systems

  7. Reading Difficulties in Spanish Adults with Dyslexia

    Science.gov (United States)

    Suárez-Coalla, Paz; Cuetos, Fernando

    2015-01-01

    Recent studies show that dyslexia persists into adulthood, even in highly educated and well-read people. The main characteristic that adults with dyslexia present is a low speed when reading. In Spanish, a shallow orthographic system, no studies about adults with dyslexia are available; and it is possible that the consistency of the orthographic…

  8. Genetic structure of Japanese Spanish mackerel ( Scomberomorus ...

    African Journals Online (AJOL)

    Genetic structure of Japanese Spanish mackerel ( Scomberomorus niphonius ) in the East China Sea and Yellow Sea inferred from AFLP data. ... Considering the high hydrological connectivity of this region and the species pelagic life history, retention of larvae, different migration route and different spawning season may ...

  9. Consensus statement on definition, diagnosis, and management of high-risk prostate cancer patients on behalf of the Spanish Groups of Uro-Oncology Societies URONCOR, GUO, and SOGUG.

    Science.gov (United States)

    Henríquez, I; Rodríguez-Antolín, A; Cassinello, J; Gonzalez San Segundo, C; Unda, M; Gallardo, E; López-Torrecilla, J; Juarez, A; Arranz, J

    2018-03-01

    Prostate cancer (PCa) is the most prevalent malignancy in men and the second cause of mortality in industrialized countries. Based on Spanish Register of PCa, the incidence of high-risk PCa is 29%, approximately. In spite of the evidence-based beneficial effect of radiotherapy and androgen deprivation therapy in high-risk PCa, these patients (pts) are still a therapeutic challenge for all specialists involved, in part due to the absence of comparative studies to establish which of the present disposable treatments offer better results. Nowadays, high-risk PCa definition is not well consensual through the published oncology guides. Clinical stage, tumour grade, and number of risk factors are relevant to be considered on PCa prognosis. However, these factors are susceptible to change depending on when surgical or radiation therapy is considered to be the treatment of choice. Other factors, such as reference pathologist, different diagnosis biopsy schedules, surgical or radiotherapy techniques, adjuvant treatments, biochemical failures, and follow-up, make it difficult to compare the results between different therapeutic options. This article reviews important issues concerning high-risk PCa. URONCOR, GUO, and SOGUG on behalf of the Spanish Groups of Uro-Oncology Societies have reached a consensus addressing a practical recommendation on definition, diagnosis, and management of high-risk PCa.

  10. Incorporating Charging/Discharging Strategy of Electric Vehicles into Security-Constrained Optimal Power Flow to Support High Renewable Penetration

    Directory of Open Access Journals (Sweden)

    Kyungsung An

    2017-05-01

    Full Text Available This research aims to improve the operational efficiency and security of electric power systems at high renewable penetration by exploiting the envisioned controllability or flexibility of electric vehicles (EVs; EVs interact with the grid through grid-to-vehicle (G2V and vehicle-to-grid (V2G services to ensure reliable and cost-effective grid operation. This research provides a computational framework for this decision-making process. Charging and discharging strategies of EV aggregators are incorporated into a security-constrained optimal power flow (SCOPF problem such that overall energy cost is minimized and operation within acceptable reliability criteria is ensured. Particularly, this SCOPF problem has been formulated for Jeju Island in South Korea, in order to lower carbon emissions toward a zero-carbon island by, for example, integrating large-scale renewable energy and EVs. On top of conventional constraints on the generators and line flows, a unique constraint on the system inertia constant, interpreted as the minimum synchronous generation, is considered to ensure grid security at high renewable penetration. The available energy constraint of the participating EV associated with the state-of-charge (SOC of the battery and market price-responsive behavior of the EV aggregators are also explored. Case studies for the Jeju electric power system in 2030 under various operational scenarios demonstrate the effectiveness of the proposed method and improved operational flexibility via controllable EVs.

  11. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  12. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.

    Science.gov (United States)

    Suárez-Albela, Manuel; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Castedo, Luis

    2017-08-29

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to

  13. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications

    Science.gov (United States)

    Castedo, Luis

    2017-01-01

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up

  14. Using the Spanish Online Resource Aula Virtual de Español (AVE to Promote a Blended Teaching Approach in High School Spanish Language Classrooms / Utilisation de la ressource en ligne espagnole AVE pour favoriser l’approche de l’enseignement hybride

    Directory of Open Access Journals (Sweden)

    Martine Pellerin

    2012-02-01

    Full Text Available The study explores the effectiveness of the implementation of blended teaching (BT by combining the Spanish online resource Aula Virtual de Español (AVE with the face-to-face (F2F delivery approach in second language Spanish programs in two high schools in Alberta, Canada. Findings demonstrate the effectiveness of combining the online resource AVE to the F2F teaching approach to promote BT in the Spanish language classroom. The use of BT approach in the language classroom had a positive impact on the students’ attitudes towards the study of the language, the students’ motivation and their participation levels in class, as well as their use of the target language in the classroom. Moreover, the multimodal experiences provided by the use of the online AVE resource combined with the F2F delivery approach responded more to the different learners learning styles and specific needs. Finally, the use of online AVE in conjunction with F2F teaching was also perceived as an effective tool in the preparation for the International Spanish Diplomas (DELE taken by the students in the more advanced Spanish classes. La présente étude explore l’efficacité de l’enseignement hybride combinant l’utilisation de la ressource espagnole en ligne Aula Virtual de Español (AVE et l’interaction face à face dans les programmes d’enseignement de l’espagnol, langue seconde, dans deux écoles secondaires de l’Alberta (Canada. Les résultats démontrent l’efficacité de la combinaison de la ressource en ligne AVE à la prestation face à face pour favoriser l’approche de l’enseignement hybride dans les cours d’espagnol. L’utilisation de l’approche de l’enseignement hybride dans le cours de langue a eu une incidence positive sur l’attitude des élèves relativement à l’apprentissage de la langue, la motivation des élèves et leur taux de participation en classe, ainsi que leur utilisation de la langue d’apprentissage dans la classe

  15. Experimental realization of a highly secure chaos communication under strong channel noise

    International Nuclear Information System (INIS)

    Ye Weiping; Dai Qionglin; Wang Shihong; Lu Huaping; Kuang Jinyu; Zhao Zhenfeng; Zhu Xiangqing; Tang Guoning; Huang Ronghuai; Hu Gang

    2004-01-01

    A one-way coupled spatiotemporally chaotic map lattice is used to construct cryptosystem. With the combinatorial applications of both chaotic computations and conventional algebraic operations, our system has optimal cryptographic properties much better than the separative applications of known chaotic and conventional methods. We have realized experiments to practice duplex voice secure communications in realistic Wired Public Switched Telephone Network by applying our chaotic system and the system of Advanced Encryption Standard (AES), respectively, for cryptography. Our system can work stably against strong channel noise when AES fails to work

  16. Experimental realization of a highly secure chaos communication under strong channel noise

    Science.gov (United States)

    Ye, Weiping; Dai, Qionglin; Wang, Shihong; Lu, Huaping; Kuang, Jinyu; Zhao, Zhenfeng; Zhu, Xiangqing; Tang, Guoning; Huang, Ronghuai; Hu, Gang

    2004-09-01

    A one-way coupled spatiotemporally chaotic map lattice is used to construct cryptosystem. With the combinatorial applications of both chaotic computations and conventional algebraic operations, our system has optimal cryptographic properties much better than the separative applications of known chaotic and conventional methods. We have realized experiments to practice duplex voice secure communications in realistic Wired Public Switched Telephone Network by applying our chaotic system and the system of Advanced Encryption Standard (AES), respectively, for cryptography. Our system can work stably against strong channel noise when AES fails to work.

  17. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  18. CLSM: COUPLE LAYERED SECURITY MODEL A HIGH-CAPACITY DATA HIDING SCHEME USING WITH STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    Cemal Kocak

    2017-03-01

    Full Text Available Cryptography and steganography are the two significant techniques used in secrecy of communications and in safe message transfer. In this study CLSM – Couple Layered Security Model is suggested which has a hybrid structure enhancing information security using features of cryptography and steganography. In CLSM system; the information which has been initially cryptographically encrypted is steganographically embedded in an image at the next step. The information is encrypted by means of a Text Keyword consisting of maximum 16 digits determined by the user in cryptography method. Similarly, the encrypted information is processed, during the embedding stage, using a 16 digit pin (I-PIN which is determined again by the user. The carrier images utilized in the study have been determined as 24 bit/pixel colour. Utilization of images in .jpeg, .tiff, .pnp format has also been provided. The performance of the CLSM method has been evaluated according to the objective quality measurement criteria of PSNR-dB (Peak Signal-to-Noise Ratio and SSIM (Structural Similarity Index. In the study, 12 different sized information between 1000 and 609,129 bits were embedded into images. Between 34.14 and 65.8 dB PSNR values and between 0.989 and 0.999 SSIM values were obtained. CLSM showed better results compared to Pixel Value Differencing (PVD method, Simulated Annealing (SA Algorithm and Mix column transform based on irreducible polynomial mathematics methods.

  19. Visible and NIR spectral band combination to produce high security ID tags for automatic identification

    Science.gov (United States)

    Pérez-Cabré, Elisabet; Millán, María S.; Javidi, Bahram

    2006-09-01

    Verification of a piece of information and/or authentication of a given object or person are common operations carried out by automatic security systems that can be applied, for instance, to control the entrance to restricted areas, access to public buildings, identification of cardholders, etc. Vulnerability of such security systems may depend on the ease of counterfeiting the information used as a piece of identification for verification and authentication. To protect data against tampering, the signature that identifies an object is usually encrypted to avoid an easy recognition at human sight and an easy reproduction using conventional devices for imaging or scanning. To make counterfeiting even more difficult, we propose to combine data from visible and near infrared (NIR) spectral bands. By doing this, neither the visible content nor the NIR data by theirselves are sufficient to allow the signature recognition and thus, the identification of a given object. Only the appropriate combination of both signals permits a satisfactory authentication. In addition, the resulting signature is encrypted following a fully-phase encryption technique and the obtained complex-amplitude distribution is encoded on an ID tag. Spatial multiplexing of the encrypted signature allows us to build a distortion-invariant ID tag, so that remote authentication can be achieved even if the tag is captured under rotation or at different distances. We also explore the possibility of using partial information of the encrypted signature to simplify the ID tag design.

  20. "Highly processed, highly packaged, very unhealthy. But they are low risk": exploring intersections between community food security and food safety.

    Science.gov (United States)

    Speed, Kelsey A; Meyer, Samantha B; Hanning, Rhona M; Majowicz, Shannon E

    2017-10-01

    Food insecurity and foodborne disease are important issues in Canada, and the public health actions taken to address them can be conceptualized as factors shaping the food environment. Given emerging evidence that these two areas may interrelate, the objective of this study was to explore ways in which community food security efforts and food safety practices (and the population health issues they aim to address) may intersect in British Columbia, Canada, and interpret what this might mean for conceptualizing and attaining healthier food environments. We conducted 14 key informant interviews with practitioners working in community food security and food safety in British Columbia, and used qualitative descriptive analysis to identify examples of intersections between the sectors. Participants identified four key ways that the two sectors intersect. They identified (1) how their daily practices to promote safe or healthy food could be helped or hindered by the activities of the other sector; (2) that historically disjointed policies that do not consider multiple health outcomes related to food may complicate the interrelationship; (3) that the relationship of these sectors is also affected by the fact that specific types of food products, such as fresh produce, can be considered both risky and beneficial; and (4) that both sectors are working towards the same goal of improved population health, albeit viewing it through slightly different lenses. Food security and food safety connect in several ways, with implications for characterizing and improving Canadian food environments. Collaboration across separated public health areas related to food is needed when designing new programs or policies aimed at changing the way Canadians eat.

  1. "Highly processed, highly packaged, very unhealthy. But they are low risk": exploring intersections between community food security and food safety

    Directory of Open Access Journals (Sweden)

    Kelsey A. Speed

    2017-10-01

    Full Text Available Introduction: Food insecurity and foodborne disease are important issues in Canada, and the public health actions taken to address them can be conceptualized as factors shaping the food environment. Given emerging evidence that these two areas may interrelate, the objective of this study was to explore ways in which community food security efforts and food safety practices (and the population health issues they aim to address may intersect in British Columbia, Canada, and interpret what this might mean for conceptualizing and attaining healthier food environments. Methods: We conducted 14 key informant interviews with practitioners working in community food security and food safety in British Columbia, and used qualitative descriptive analysis to identify examples of intersections between the sectors. Results: Participants identified four key ways that the two sectors intersect. They identified (1 how their daily practices to promote safe or healthy food could be helped or hindered by the activities of the other sector; (2 that historically disjointed policies that do not consider multiple health outcomes related to food may complicate the interrelationship; (3 that the relationship of these sectors is also affected by the fact that specific types of food products, such as fresh produce, can be considered both risky and beneficial; and (4 that both sectors are working towards the same goal of improved population health, albeit viewing it through slightly different lenses. Conclusion: Food security and food safety connect in several ways, with implications for characterizing and improving Canadian food environments. Collaboration across separated public health areas related to food is needed when designing new programs or policies aimed at changing the way Canadians eat.

  2. The Spanish Language in Ireland

    OpenAIRE

    Barnwell, David

    2008-01-01

    This article provides an overview of the situation of Spanish in the Irish educational system and in wider society. Spain enjoys positive attitudes among Irish people, helped by the considerable amount of property in that country purchased by Irish during the past few years. The Spanish language has over the years experienced mixed fortunes as regards its place in Irish education. Recently, however, there has been a moderate increase in the numbers studying Spanish across all sectors...

  3. Highly Educated Men Establish Strong Emotional Links with Their Dogs: A Study with Monash Dog Owner Relationship Scale (MDORS) in Committed Spanish Dog Owners

    Science.gov (United States)

    Bulbena, Antoni; Tobeña, Adolf

    2016-01-01

    The characteristics of the human-animal bond may be influenced by both owner-related and dog-related factors. A study was designed to explore the existence of different dog ownership patterns and their related factors. We created an on line questionnaire that included demographic questions about the dog and the owner, a Spanish version of the Monash Dog Owner Relationship Scale (MDORS) and a validated measure of satisfaction with life (Cantril’s ladder). We collected 1140 valid responses from adult dog owners, who were recruited using the client databases of Spanish veterinary practices. We explored the presence of groups within the population using Principal Components Analysis (PCA) of the MDORS variables combined with Hierarchical Cluster Analysis (HCA). Two groups were found; Group I having a higher level of emotional involvement with their dogs compared with Group II. Binary logistic regression was used to explore demographic factors that influenced group membership. Four variables were significantly associated with membership of Group I (pdog-ownership may be present within a population of owner-dog dyads, and that certain owner characteristics are associated with the type of owner-dog relationship. Future research could apply a similar approach to different types of sample population in order to identify specific patterns of dog-ownership. PMID:28033397

  4. Highly Educated Men Establish Strong Emotional Links with Their Dogs: A Study with Monash Dog Owner Relationship Scale (MDORS) in Committed Spanish Dog Owners.

    Science.gov (United States)

    Calvo, Paula; Bowen, Jonathan; Bulbena, Antoni; Tobeña, Adolf; Fatjó, Jaume

    2016-01-01

    The characteristics of the human-animal bond may be influenced by both owner-related and dog-related factors. A study was designed to explore the existence of different dog ownership patterns and their related factors. We created an on line questionnaire that included demographic questions about the dog and the owner, a Spanish version of the Monash Dog Owner Relationship Scale (MDORS) and a validated measure of satisfaction with life (Cantril's ladder). We collected 1140 valid responses from adult dog owners, who were recruited using the client databases of Spanish veterinary practices. We explored the presence of groups within the population using Principal Components Analysis (PCA) of the MDORS variables combined with Hierarchical Cluster Analysis (HCA). Two groups were found; Group I having a higher level of emotional involvement with their dogs compared with Group II. Binary logistic regression was used to explore demographic factors that influenced group membership. Four variables were significantly associated with membership of Group I (pdog-ownership may be present within a population of owner-dog dyads, and that certain owner characteristics are associated with the type of owner-dog relationship. Future research could apply a similar approach to different types of sample population in order to identify specific patterns of dog-ownership.

  5. Pastoral Group Counselling at a High Security Prison in Israel: Integrating Pierre Janet's Psychological Analysis with Fritz Perls' Gestalt Therapy.

    Science.gov (United States)

    Brown, Paul; Brown, Marta

    2015-03-01

    This is a report of a short-term, pastoral counselling group conducted with Jewish internees in a high security prison in Israel. It was held as an adjunct to daily secular individual and group counselling and rehabilitation run by the Department of Social Work. Pastoral counselling employed spiritual and psychosocial methodologies to reduce anger, improve prisoner frustration tolerance, and develop a sense of self-efficacy and communal identity. It combined semi-didactic scriptural input with Pierre Janet's personality model, Fritz Perls' gestalt therapy, and analysis of the group process. © The Author(s) 2015 Reprints and permissions:sagepub.co.uk/journalsPermissions.nav.

  6. Security "high-tech" individual extra-light device mask 2.0: CAD/CAM evolution.

    Science.gov (United States)

    Ramieri, V; Vellone, V; Crimi, S; Cascone, P

    2017-06-01

    In 2008, we presented our security "high-tech" individual extra-light device mask (SHIELD), a protective shield based on the face cast of an injured soccer player that can be customised. It allows a shortened convalescent period, is comfortable, fits well, and allows the patient to continue to play at a professional level in their chosen sport or activity in the shortest time possible. It has been used often in both amateur and professional categories of many sports, and we now present an update. Copyright © 2017 The British Association of Oral and Maxillofacial Surgeons. Published by Elsevier Ltd. All rights reserved.

  7. MAHRES: Spanish hydrogen geography

    International Nuclear Information System (INIS)

    Bordallo, C.R.; Moreno, E.; Brey, R.; Guerrero, F.M.; Carazo, A.F.

    2004-01-01

    Nowadays, it is common to hear about the hydrogen potential as an energetic vector or the renewable character of fuel cells; thus, the conjunction between both of them as a way to produce electricity, decreasing pollutant emission, is often discussed. However, that renewable character is only guaranteed in the case that the hydrogen used comes from some renewable energy source. Because of that, and due to the Spanish great potential related to natural usable resources like water, sun, wind or biomass, for instance, it seems attractive to make a meticulous study (supported by the statistical Multicriteria Decision Making Method) in order to quantify that potential and place it in defined geographical areas. Moreover, the growth of the electricity demand is always significant, and in this way the energy consumption in Spain is estimated to grow up to 3'4 % above the average during the next ten years. On the other hand, it must be taken into account that the contribution of the oil production will not be enough in the future. The study being carried out will try to elaborate 'The Spanish Renewable Hydrogen Map', that would contemplate, not only the current situation but also predictable scenarios and their implementation. (author)

  8. The Spanish flu in Denmark

    DEFF Research Database (Denmark)

    Kolte, Ida Viktoria; Skinhøj, Peter; Keiding, Niels

    2008-01-01

    The spread of H5N1 influenza and the similarity between this avian virus and the Spanish flu virus causes fear of a new influenza pandemic, but data from the Spanish flu may also be of guidance in planning for preventive measures. Using data on influenza cases, influenza deaths and total deaths...

  9. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  10. Characteristics and Pathways of Long-Stay Patients in High and Medium Secure Settings in England; A Secondary Publication From a Large Mixed-Methods Study

    Directory of Open Access Journals (Sweden)

    Birgit A. Völlm

    2018-04-01

    Full Text Available Background: Many patients experience extended stays within forensic care, but the characteristics of long-stay patients are poorly understood.Aims: To describe the characteristics of long-stay patients in high and medium secure settings in England.Method: Detailed file reviews provided clinical, offending and risk data for a large representative sample of 401 forensic patients from 2 of the 3 high secure settings and from 23 of the 57 medium secure settings in England on 1 April 2013. The threshold for long-stay status was defined as 5 years in medium secure care or 10 years in high secure care, or 15 years in a combination of high and medium secure settings.Results: 22% of patients in high security and 18% in medium security met the definition for “long-stay,” with 20% staying longer than 20 years. Of the long-stay sample, 58% were violent offenders (22% both sexual and violent, 27% had been convicted for violent or sexual offences whilst in an institutional setting, and 26% had committed a serious assault on staff in the last 5 years. The most prevalent diagnosis was schizophrenia (60% followed by personality disorder (47%, predominantly antisocial and borderline types; 16% were categorised as having an intellectual disability. Overall, 7% of the long-stay sample had never been convicted of any offence, and 16.5% had no index offence prompting admission. Although some significant differences were found between the high and medium secure samples, there were more similarities than contrasts between these two levels of security. The treatment pathways of these long-stay patients involved multiple moves between settings. An unsuccessful referral to a setting of lower security was recorded over the last 5 years for 33% of the sample.Conclusions: Long-stay patients accounted for one fifth of the forensic inpatient population in England in this representative sample. A significant proportion of this group remain unsettled. High levels of

  11. A revision of the revaluation index of Spanish pensions

    OpenAIRE

    Roch, Oriol; Bosch Príncep, Manuela; Morillo, Isabel; Vilalta de Miguel, Daniel

    2017-01-01

    This article reviews the methodological aspects of the revaluation index of Spanish pensions developed following Law 23/2013 which regulates the sustainability factor and revaluation index of the Social Security pension system. From a gradual breakdown of the elements that make up the revaluation index, an exposition is given of the formal and implementation problems it involves. Finally, an alternative model based on dynamic optimization techniques is proposed and its use is illustrated with...

  12. Notable Books in Spanish for Children and Young Adults from Spanish-Speaking Countries.

    Science.gov (United States)

    Schon, Isabel

    1985-01-01

    Presents a bibliography of books recently published in Mexico, Spain, Argentina, and Peru for Spanish-speaking children and young adults. The books are grouped by the following levels: (1) preschool and primary grades; (2) grades 3 to 6; (3) junior high and up; and (4) young adult. (SED)

  13. Thin film CdTe based neutron detectors with high thermal neutron efficiency and gamma rejection for security applications

    Energy Technology Data Exchange (ETDEWEB)

    Smith, L.; Murphy, J.W. [Materials Science and Engineering, University of Texas at Dallas, Richardson, TX 75080 (United States); Kim, J. [Korean Research Institute of Standards and Science, Daejeon 305-600 (Korea, Republic of); Rozhdestvenskyy, S.; Mejia, I. [Materials Science and Engineering, University of Texas at Dallas, Richardson, TX 75080 (United States); Park, H. [Korean Research Institute of Standards and Science, Daejeon 305-600 (Korea, Republic of); Allee, D.R. [Flexible Display Center, Arizona State University, Phoenix, AZ 85284 (United States); Quevedo-Lopez, M. [Materials Science and Engineering, University of Texas at Dallas, Richardson, TX 75080 (United States); Gnade, B., E-mail: beg031000@utdallas.edu [Materials Science and Engineering, University of Texas at Dallas, Richardson, TX 75080 (United States)

    2016-12-01

    Solid-state neutron detectors offer an alternative to {sup 3}He based detectors, but suffer from limited neutron efficiencies that make their use in security applications impractical. Solid-state neutron detectors based on single crystal silicon also have relatively high gamma-ray efficiencies that lead to false positives. Thin film polycrystalline CdTe based detectors require less complex processing with significantly lower gamma-ray efficiencies. Advanced geometries can also be implemented to achieve high thermal neutron efficiencies competitive with silicon based technology. This study evaluates these strategies by simulation and experimentation and demonstrates an approach to achieve >10% intrinsic efficiency with <10{sup −6} gamma-ray efficiency.

  14. Natural gas market review 2008 - optimising investments and ensuring security in a high-priced environment

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-09-18

    Over the last 18 months, natural gas prices have continued to rise steadily in all IEA markets. What are the causes of this steady upward trend? Unprecedented oil and coal prices which have encouraged power generators to switch to gas, together with tight supplies, demand for gas in new markets and delayed investments all played a role. Investment uncertainties, cost increases and delays remain major concerns in most gas markets and are continuing to constitute a threat to long-term security of supply. A massive expansion in LNG production is expected in the short term to 2012, but the lag in LNG investment beyond 2012 is a concern for all gas users in both IEA and non-IEA markets. Despite this tight market context, regional markets continue on their way to globalisation. This tendency seems irreversible, and it impacts even the most independent markets. Price linkages and other interactions between markets are becoming more pronounced. This publication addresses these major developments, assessing investment in natural gas projects (LNG, pipelines, upstream), escalating costs, the activities of international oil and gas companies, and gas demand in the power sector. In addition, the publication includes data and forecasts on OECD and non-OECD regions to 2015 and in-depth reviews of five OECD countries and regions including the European Union. It also provides analysis of 34 non-OECD countries in South America, the Middle East, Africa, and Asia, including a detailed assessment of the outlook for gas in Russia, as well as insights on new technologies to deliver gas to markets.

  15. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  16. Predictors of admission to a high-security hospital of people with intellectual disability with and without schizophrenia.

    Science.gov (United States)

    Doody, G A; Thomson, L D; Miller, P; Johnstone, E C

    2000-04-01

    reduction in the number of admissions to high-security hospitals in the UK. In people with comorbid intellectual disability and schizophrenia, males with an early age of onset and no known family history are more likely to require care and treatment in a secure psychiatric setting. Such comorbid subjects may be suffering from a particular malignant form of schizophrenia, manifesting in childhood as cognitive impairment prior to the early onset of psychosis in teenage years.

  17. Envisioning Urban Farming for Food Security during the Climate Change Era. Vertical Farm within Highly Urbanized Areas

    Science.gov (United States)

    Januszkiewicz, Krystyna; Jarmusz, Małgorzata

    2017-10-01

    Global climate change constitutes a serious threat to global security including food production in the following decades. This paper is focused on a new possibility and advisability of creating a systemic solution to resolve the problem of food security in highly-urbanized areas. The first part of the paper deal with historical development vertical farms ideas and defines the main environmental and spatial constrains also it indicates that vertical farms are going to be part of the future horticultural production. The second part presents results of the research program undertaken at West Pomeranian University of Technology in Szczecin by authors. The program goes on to attempt to solve the problem through architectural design. This study highlights an integrating large-scale horticultural production directly into the cities, where the most of the food consumption takes place. In conclusions emphasizes, that the design will force architects, engineers and urban planners to completely revise and redefine contemporary design process and understanding of the idea-fix of sustainable design. To successfully migrate food production from extensive rural areas to dense environment of city centres, a new holistic approach, integrating knowledge and advances of multiple fields of science, have to develop.

  18. Migration of Spanish nurses 2009-2014. Underemployment and surplus production of Spanish nurses and mobility among Spanish registered nurses: A case study.

    Science.gov (United States)

    Galbany-Estragués, Paola; Nelson, Sioban

    2016-11-01

    After the financial crisis of 2008, increasing numbers of nurses from Spain are going abroad to work. To examine the health and workforce policy trends in Spain between 2009 and 2014 and to analyze their correlation with the migration of nurses. Single embedded case study. We examined data published by: Health Statistics, Organization for Economic Cooperation and Development (1996 to 2013); Ministry of Education, Culture and Sports (2006 to 2013); Ministry of Employment and Social Security (2009 to 2014); Ministry of Health, Social Services and Equality (1997 to 2014); and National Institute of Statistics (1976 to 2014). In addition to reviewing the scholarly literature on the topic in Spanish and English, we also examined Spanish mobility laws and European directives. We used the Organization for Economic Cooperation and Development definition of "professionally active nurses" which defines practising nurses and other nurses as those for whom their education is a prerequisite for employment as a nurse. Moreover, we used the term "nursing graduate" as defined by Spanish Ministry of Education to describe those who have obtained a recognized qualification in nursing in a given year, the term "registered nurses" is defined by Spanish law as nurses registered in the Nurses Associations and "unemployed nurses" are those without work and registered as seeking employment. A transformation of the Spanish health system has reduced the number of employed nurses per capita since 2010. Moreover, reductions in public spending, labour market reforms and widespread unemployment have affected nurses in two ways: first by increasing the number of applicants per vacancy between 2009 and 2013, and second, by an increase in casual positions. However, despite the poor job market and decreasing job security, the number of registered nurses and nursing graduates in Spain per year has continued to grow, increasing the pressure on the labour market. Spain is transforming from a stable

  19. Managerial style in Spanish

    Directory of Open Access Journals (Sweden)

    Dra. Cristina Etayo Pérez

    2008-01-01

    Full Text Available This paper aims to study the management style of the Spanish advertising agencies. For this purpose, it explores the way in which the dimensions that define the nature of this concept arise in the sector chosen. The analysis begins with the definition of management style as concept followed by an exposition of its main functions and its fundamental dimensions. Then, the paper presents the methodology used to verify how these dimensions appear among managers as well as the results obtained during the fieldwork. Such methodology includes the achievement of in-depth interviews, with the help of a questionnaire of semi-structured questions, and the descriptive analysis of qualitative and quantitative information obtained from those interviews. The revision of these aspects enriches the study of management at the advertising agencies since it contributes to understand why certain actions have as a consequence one particular kind of relationship between directors and collaborators or another.

  20. The spanish nuclear choice

    International Nuclear Information System (INIS)

    Martin Blazquez, C.

    1983-12-01

    The aim of this thesis was to examine the present state and projections of the nuclear energy development in Spain, the limits and conditions of this development, as also the industrial and politic-economical stakes resulting. The analysis is considered through the evolution of the energetic balance up to 1990, taking into account the exceptional role of the nuclear energy: description of the various economic and social development plans since 1964, history of the energy consumption in Spain, structures of the nuclear sector (mining, production, and the private industry), importance of the electric energy in the spanish industry, structures of the electric sector in Spain, roles and interventions of the government in the nuclear electric subsector

  1. Formulating a strategy for securing high-speed rail in the United States.

    Science.gov (United States)

    2013-03-01

    This report presents an analysis of information relating to attacks, attempted attacks, and plots against high-speed rail (HSR) : systems. It draws upon empirical data from MTIs Database of Terrorist and Serious Criminal Attacks Against Public Sur...

  2. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  3. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  4. Location iron-Mantua an area with high securities gives natural radioactivity

    International Nuclear Information System (INIS)

    Alcaide Orpi, J.; Oliveira Acosta, J.; Valdes Hernadez, G.M.; Leal Ramirez, M.R.; Blanco Jorrin, N.

    1998-01-01

    The work shows the high natural radioactivity and the concentration to the natural radioelements (U,Th, Ra, K) it is exists in the sulfurous Hierro Mantua location. The objective is to know the possible radiological risk to that would be subjected the workers during the mining exploitation, because the high gamma radiation doses that could receive and to the risks product the internal contamination due to the inhalation the radon 222 and uranium aerosols and particles

  5. Interpreting Mini-Mental State Examination Performance in Highly Proficient Bilingual Spanish-English and Asian Indian-English Speakers: Demographic Adjustments, Item Analyses, and Supplemental Measures.

    Science.gov (United States)

    Milman, Lisa H; Faroqi-Shah, Yasmeen; Corcoran, Chris D; Damele, Deanna M

    2018-04-17

    Performance on the Mini-Mental State Examination (MMSE), among the most widely used global screens of adult cognitive status, is affected by demographic variables including age, education, and ethnicity. This study extends prior research by examining the specific effects of bilingualism on MMSE performance. Sixty independent community-dwelling monolingual and bilingual adults were recruited from eastern and western regions of the United States in this cross-sectional group study. Independent sample t tests were used to compare 2 bilingual groups (Spanish-English and Asian Indian-English) with matched monolingual speakers on the MMSE, demographically adjusted MMSE scores, MMSE item scores, and a nonverbal cognitive measure. Regression analyses were also performed to determine whether language proficiency predicted MMSE performance in both groups of bilingual speakers. Group differences were evident on the MMSE, on demographically adjusted MMSE scores, and on a small subset of individual MMSE items. Scores on a standardized screen of language proficiency predicted a significant proportion of the variance in the MMSE scores of both bilingual groups. Bilingual speakers demonstrated distinct performance profiles on the MMSE. Results suggest that supplementing the MMSE with a language screen, administering a nonverbal measure, and/or evaluating item-based patterns of performance may assist with test interpretation for this population.

  6. Articulation Skills in Spanish-Speaking Children.

    Science.gov (United States)

    Linares, Thomas A.

    The purpose of the research was to develop an articulation test for Spanish-speakers and to field-test the instrument in both a monolingual Spanish-speaking environment and a bilingual Spanish/English environment. Such a test is needed because there has been little available to enable the diagnostician, whose clientele includes Spanish-speakers,…

  7. Determinants of Research Productivity in Spanish Academia

    Science.gov (United States)

    Albert, Cecilia; Davia, María A.; Legazpe, Nuria

    2016-01-01

    This article aims to widen the empirical evidence about the determinants of Spanish academics' publication productivity across fields of study. We use the Spanish Survey on Human Resources in Science and Technology addressed to Spanish resident PhDs employed in Spanish universities as academics. Productivity is measured as the total number of…

  8. Adult Second Language Learning of Spanish Vowels

    Science.gov (United States)

    Cobb, Katherine; Simonet, Miquel

    2015-01-01

    The present study reports on the findings of a cross-sectional acoustic study of the production of Spanish vowels by three different groups of speakers: 1) native Spanish speakers; 2) native English intermediate learners of Spanish; and 3) native English advanced learners of Spanish. In particular, we examined the production of the five Spanish…

  9. Interdisciplinary investigation on the recent deformation in the high fertile lowland of the Segura river (Murcia): Hydrogeologic criteria applicable to the study of the neotectonic in the spanish south eastern region

    International Nuclear Information System (INIS)

    Rodriguez Estrella, T.; Lopez Bermudes, F.

    1984-01-01

    This neotectonic investigation concentrates on the southern area in the high fertile lowland of the Segura river (23 Km 2 ). Our methodology is various, pointing towards a better understanding of the recent tectonic activity which have taken place in this area. Our methods and techniques have been indirect and direct. Indirect techniques: aerial photography (at different scales and different periods of time), hydrochemistry (over 70 analyses) seismicity (from the end of last century) and vertical electric fathoming probings (64 S.E.V. of AB=1000). Direct techniques: geomorphology (alluvial terraces and loose meanders), mechanic fathoming probings (over 50) and structural cuttings in the ground. Archaeology has contributed to a great extent to clarify the existence of neotectonics in this alluvial terraces and its dating. Lastly, certain hydrogeologic criteria have been analysed concerning the recent deformations of the Spanish Southeast, as well as, some general considerations on the neotectonic of this area on the Iberian Peninsula. (author)

  10. The use of Spanish language skills by physicians and nurses: policy implications for teaching and testing.

    Science.gov (United States)

    Diamond, Lisa C; Tuot, Delphine S; Karliner, Leah S

    2012-01-01

    Language barriers present a substantial communication challenge in the hospital setting. To describe how clinicians with various levels of Spanish language proficiency work with interpreters or their own Spanish skills in common clinical scenarios. Survey of physicians and nurses who report ever speaking Spanish with patients on a general medicine hospital floor. Spanish proficiency rated on a 5-point scale, self-reported use of specific strategies (own Spanish skills, professional or ad-hoc interpreters) to overcome the language barrier. Sixty-eight physicians and 65 nurses participated. Physicians with low-level Spanish proficiency reported frequent use of ad-hoc interpreters for all information-based scenarios, except pre-rounding in the morning when most reported using their own Spanish skills. For difficult conversations and procedural consent, most used professional interpreters. Comparatively, physicians with medium proficiency reported higher rates of using their own Spanish skills for information-based scenarios, lower rates of professional interpreter use, and little use of ad-hoc interpreters. They rarely used their own Spanish skills or ad-hoc interpreters for difficult conversations. Physicians with high-level Spanish proficiency almost uniformly reported using their own Spanish skills. The majority (82%) of nurses had low-level Spanish proficiency, and frequently worked with professional interpreters for educating patients, but more often used ad hoc interpreters and their own Spanish skills for information-based scenarios, including medication administration. Physicians and nurses with limited Spanish proficiency use these skills, even in important clinical circumstances in the hospital. Health-care organizations should evaluate clinicians' non-English language proficiency and set policies about use of language skills in clinical care.

  11. Computational Approach for Securing Radiology-Diagnostic Data in Connected Health Network using High-Performance GPU-Accelerated AES.

    Science.gov (United States)

    Adeshina, A M; Hashim, R

    2017-03-01

    Diagnostic radiology is a core and integral part of modern medicine, paving ways for the primary care physicians in the disease diagnoses, treatments and therapy managements. Obviously, all recent standard healthcare procedures have immensely benefitted from the contemporary information technology revolutions, apparently revolutionizing those approaches to acquiring, storing and sharing of diagnostic data for efficient and timely diagnosis of diseases. Connected health network was introduced as an alternative to the ageing traditional concept in healthcare system, improving hospital-physician connectivity and clinical collaborations. Undoubtedly, the modern medicinal approach has drastically improved healthcare but at the expense of high computational cost and possible breach of diagnosis privacy. Consequently, a number of cryptographical techniques are recently being applied to clinical applications, but the challenges of not being able to successfully encrypt both the image and the textual data persist. Furthermore, processing time of encryption-decryption of medical datasets, within a considerable lower computational cost without jeopardizing the required security strength of the encryption algorithm, still remains as an outstanding issue. This study proposes a secured radiology-diagnostic data framework for connected health network using high-performance GPU-accelerated Advanced Encryption Standard. The study was evaluated with radiology image datasets consisting of brain MR and CT datasets obtained from the department of Surgery, University of North Carolina, USA, and the Swedish National Infrastructure for Computing. Sample patients' notes from the University of North Carolina, School of medicine at Chapel Hill were also used to evaluate the framework for its strength in encrypting-decrypting textual data in the form of medical report. Significantly, the framework is not only able to accurately encrypt and decrypt medical image datasets, but it also

  12. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  13. An investigation into Spanish EFL learners' anxiety

    Directory of Open Access Journals (Sweden)

    Juan de Dios Martínez Agudo

    2013-08-01

    Full Text Available This research article reports the results of a study designed to measure and analyse Spanish students' perceived anxiety when learning and using EFL inside the classroom. This article first includes a review of the literature on foreign language anxiety. Then it describes the participants of the investigation and the research methodology procedures. This is followed by the presentation and discussion of the results and, finally, the conclusions derived from this study. The resulting data revealed interesting information about the anxiety levels present among Spanish EFL learners. While relatively high levels of speaking anxiety have been identified, somewhat lower levels of listening anxiety associated with error correction, by contrast, have also been found. More specifically, the results suggested that the level of listening anxiety seems to slightly increase when error correction is somehow involved in the process.

  14. Visit of Spanish Government delegation

    CERN Multimedia

    CERN PhotoLab

    1982-01-01

    A Spanish Government delegation visited CERN before Spain rejoined CERN as a Member State(in 1983). Delegates interested in advanced technologies visited the ISR workshop clean room, where Romeo Perin explained fabrication and properties of stainless steel, titanium and inconel components of vacuum chambers for experiments at the ISR. Left to right: Technical Director Giorgio Brianti, the Spanish Minister of Industry and Energy Mr.Ignacio Bayon Marine , Romeo Perin, a delegate and Director-General Herwig Schopper. See also 8202369.

  15. Spanish Young Generation (JJNN) Activities

    International Nuclear Information System (INIS)

    Millan, Miguel

    2008-01-01

    Spanish Young Generation has been very active during 2006-2008. JJNN have mainly focused on communication activities, as conferences at universities, schools and nuclear companies. Lately, becoming in referent of the young politics, journalist and the young people in Nuclear Subjects is the new and most challenging target of the Spanish Young Generation. In order to accomplish with their objects and commitments with their members, JJNN are developing all kinds of activities focused in the young people and the JJNN members. (authors)

  16. Spanish-cedar : Cedrela spp.

    Science.gov (United States)

    B. F. Kukachka

    1964-01-01

    From the earliest days of exploration and colonization in tropical America, Spanish-cedar has been one of the most important timber trees of the area. The wood became an article for the export trade during the 1800’s when the cigar industry demanded the use of Spanish-cedar for packing cigars. These fragrant boxes were commonplace before rising costs in the 1930’s...

  17. Spanish Young Generation (JJNN) Activities

    Energy Technology Data Exchange (ETDEWEB)

    Millan, Miguel [INITEC Nuclear- Westinghouse, Padilla 17, 28006 Madrid (Spain)

    2008-07-01

    Spanish Young Generation has been very active during 2006-2008. JJNN have mainly focused on communication activities, as conferences at universities, schools and nuclear companies. Lately, becoming in referent of the young politics, journalist and the young people in Nuclear Subjects is the new and most challenging target of the Spanish Young Generation. In order to accomplish with their objects and commitments with their members, JJNN are developing all kinds of activities focused in the young people and the JJNN members. (authors)

  18. Quantitative gas chromatography-olfactometry carried out at different dilutions of an extract. Key differences in the odor profiles of four high-quality Spanish aged red wines.

    Science.gov (United States)

    Ferreira, V; Aznar, M; López, R; Cacho, J

    2001-10-01

    Four Spanish aged red wines made in different wine-making areas have been extracted, and the extracts and their 1:5, 1:50, and 1:500 dilutions have been analyzed by a gas chromatography-olfactometry (GC-O) approach in which three judges evaluated odor intensity on a four-point scale. Sixty-nine different odor regions were detected in the GC-O profiles of wines, 63 of which could be identified. GC-O data have been processed to calculate averaged flavor dilution factors (FD). Different ANOVA strategies have been further applied on FD and on intensity data to check for significant differences among wines and to assess the effects of dilution and the judge. Data show that FD and the average intensity of the odorants are strongly correlated (r(2) = 0.892). However, the measurement of intensity represents a quantitative advantage in terms of detecting differences. For some odorants, dilution exerts a critical role in the detection of differences. Significant differences among wines have been found in 30 of the 69 odorants detected in the experiment. Most of these differences are introduced by grape compounds such as methyl benzoate and terpenols, by compounds released by the wood, such as furfural, (Z)-whiskey lactone, Furaneol, 4-propylguaiacol, eugenol, 4-ethylphenol, 2,6-dimethoxyphenol, isoeugenol, and ethyl vanillate, by compounds formed by lactic acid bacteria, such as 2,3-butanedione and acetoine, or by compounds formed during the oxidative storage of wines, such as methional, sotolon, o-aminoacetophenone, and phenylacetic acid. The most important differences from a quantitative point of view are due to 2-methyl-3-mercaptofuran, 4-propylguaiacol, 2,6-dimethoxyphenol, and isoeugenol.

  19. High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source

    International Nuclear Information System (INIS)

    Tsvetkov, Pavel Valeryevich; Rodriguez, Salvador B.; Ames, David E. II; Rochau, Gary Eugene

    2009-01-01

    The impact associated with energy generation and utilization is immeasurable due to the immense, widespread, and myriad effects it has on the world and its inhabitants. The polar extremes are demonstrated on the one hand, by the high quality of life enjoyed by individuals with access to abundant reliable energy sources, and on the other hand by the global-scale environmental degradation attributed to the affects of energy production and use. Thus, nations strive to increase their energy generation, but are faced with the challenge of doing so with a minimal impact on the environment and in a manner that is self-reliant. Consequently, a revival of interest in nuclear energy has followed, with much focus placed on technologies for transmuting nuclear spent fuel. The performed research investigates nuclear energy systems that optimize the destruction of nuclear waste. In the context of this effort, nuclear energy system is defined as a configuration of nuclear reactors and corresponding fuel cycle components. The proposed system has unique characteristics that set it apart from other systems. Most notably the dedicated High-Energy External Source Transmuter (HEST), which is envisioned as an advanced incinerator used in combination with thermal reactors. The system is configured for examining environmentally benign fuel cycle options by focusing on minimization or elimination of high level waste inventories. Detailed high-fidelity exact-geometry models were developed for representative reactor configurations. They were used in preliminary calculations with Monte Carlo N-Particle eXtented (MCNPX) and Standardized Computer Analysis for Licensing Evaluation (SCALE) code systems. The reactor models have been benchmarked against existing experimental data and design data. Simulink(reg s ign), an extension of MATLAB(reg s ign), is envisioned as the interface environment for constructing the nuclear energy system model by linking the individual reactor and fuel component sub

  20. 75 FR 75486 - Maritime Security Directive 104-6 (Rev. 4); Guidelines for U.S. Vessels Operating in High Risk...

    Science.gov (United States)

    2010-12-03

    ... Directive 104-6 (Rev. 4); Guidelines for U.S. Vessels Operating in High Risk Waters AGENCY: Coast Guard, DHS... Maritime Transportation Security Act (MTSA) on international voyages through or in designated high risk... MARSEC Directives are available at your local Captain of the Port (COTP) office. Phone numbers and...

  1. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  2. Additional psychometric data for the Spanish Modified Dental Anxiety Scale, and psychometric data for a Spanish version of the Revised Dental Beliefs Survey.

    Science.gov (United States)

    Coolidge, Trilby; Hillstead, M Blake; Farjo, Nadia; Weinstein, Philip; Coldwell, Susan E

    2010-05-13

    Hispanics comprise the largest ethnic minority group in the United States. Previous work with the Spanish Modified Dental Anxiety Scale (MDAS) yielded good validity, but lower test-retest reliability. We report the performance of the Spanish MDAS in a new sample, as well as the performance of the Spanish Revised Dental Beliefs Survey (R-DBS). One hundred sixty two Spanish-speaking adults attending Spanish-language church services or an Hispanic cultural festival completed questionnaires containing the Spanish MDAS, Spanish R-DBS, and dental attendance questions, and underwent a brief oral examination. Church attendees completed the questionnaire a second time, for test-retest purposes. The Spanish MDAS and R-DBS were completed by 156 and 136 adults, respectively. The test-retest reliability of the Spanish MDAS was 0.83 (95% CI = 0.60-0.92). The internal reliability of the Spanish R-DBS was 0.96 (95% CI = 0.94-0.97), and the test-retest reliability was 0.86 (95% CI = 0.64-0.94). The two measures were significantly correlated (Spearman's rho = 0.38, p Spanish MDAS was higher. The significant relationships between dental attendance and questionnaire scores, as well as the difference in caries severity seen in those with high fear, add to the evidence of this scale's construct validity in Hispanic samples. Our results also provide evidence for the internal and test-retest reliabilities, as well as the construct validity, of the Spanish R-DBS.

  3. High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source

    International Nuclear Information System (INIS)

    Tsvetkov, Pavel Valeryevich; Rodriguez, Salvador B.; Ames, David E. II; Rochau, Gary Eugene

    2010-01-01

    A new high-fidelity integrated system method and analysis approach was developed and implemented for consistent and comprehensive evaluations of advanced fuel cycles leading to minimized Transuranic (TRU) inventories. The method has been implemented in a developed code system integrating capabilities of Monte Carlo N - Particle Extended (MCNPX) for high-fidelity fuel cycle component simulations. In this report, a Nuclear Energy System (NES) configuration was developed to take advantage of used fuel recycling and transmutation capabilities in waste management scenarios leading to minimized TRU waste inventories, long-term activities, and radiotoxicities. The reactor systems and fuel cycle components that make up the NES were selected for their ability to perform in tandem to produce clean, safe, and dependable energy in an environmentally conscious manner. The diversity in performance and spectral characteristics were used to enhance TRU waste elimination while efficiently utilizing uranium resources and providing an abundant energy source. A computational modeling approach was developed for integrating the individual models of the NES. A general approach was utilized allowing for the Integrated System Model (ISM) to be modified in order to provide simulation for other systems with similar attributes. By utilizing this approach, the ISM is capable of performing system evaluations under many different design parameter options. Additionally, the predictive capabilities of the ISM and its computational time efficiency allow for system sensitivity/uncertainty analysis and the implementation of optimization techniques.

  4. High fidelity nuclear energy system optimization towards an environmentally benign, sustainable, and secure energy source.

    Energy Technology Data Exchange (ETDEWEB)

    Tsvetkov, Pavel Valeryevich (Texas A& M University, College Station, TX); Rodriguez, Salvador B.; Ames, David E., II (Texas A& M University, College Station, TX); Rochau, Gary Eugene

    2010-10-01

    A new high-fidelity integrated system method and analysis approach was developed and implemented for consistent and comprehensive evaluations of advanced fuel cycles leading to minimized Transuranic (TRU) inventories. The method has been implemented in a developed code system integrating capabilities of Monte Carlo N - Particle Extended (MCNPX) for high-fidelity fuel cycle component simulations. In this report, a Nuclear Energy System (NES) configuration was developed to take advantage of used fuel recycling and transmutation capabilities in waste management scenarios leading to minimized TRU waste inventories, long-term activities, and radiotoxicities. The reactor systems and fuel cycle components that make up the NES were selected for their ability to perform in tandem to produce clean, safe, and dependable energy in an environmentally conscious manner. The diversity in performance and spectral characteristics were used to enhance TRU waste elimination while efficiently utilizing uranium resources and providing an abundant energy source. A computational modeling approach was developed for integrating the individual models of the NES. A general approach was utilized allowing for the Integrated System Model (ISM) to be modified in order to provide simulation for other systems with similar attributes. By utilizing this approach, the ISM is capable of performing system evaluations under many different design parameter options. Additionally, the predictive capabilities of the ISM and its computational time efficiency allow for system sensitivity/uncertainty analysis and the implementation of optimization techniques.

  5. Spanish opinion polls 1998

    International Nuclear Information System (INIS)

    Nufiez Lopez, Maria Pilar

    1999-01-01

    There is widespread conviction among the professionals working in the nuclear sector that the image of nuclear energy held by the general public is poor. In Spain we insist again and again that an overwhelming majority of people consider nuclear energy to be dangerous, contaminating and relating to war. Depending on individual experience, we even go as far as to venture percentages of acceptability. When asked to explain the reasons for this, some claim that the cause of this attitude of rejection is to do with wastes, others that it is fear of radiation, and so on. Most of these claims are 'subjective perceptions' based on our own personal contacts and xperiences. With a view to establishing a reliable analytical basis and thus be able to carry out an objective study of the problem of public perception of nuclear energy in Spain, the Forum of the Spanish Nuclear Industry commissioned a group of external consultants specializing in this type of studies to carry out a survey designed to provide information on the causes underlying the rejection of nuclear energy and its measure. This survey is one of the first performed in this country since the decision was taken to use nuclear power in the nineteen sixties. The survey, performed by way of telephone conversations, included 2,000 people aged between 15 and 60 years. Of the total number of interviewees, 25 percent lived in areas surrounding a nuclear power plant, but had no direct professional or family ties with the plant. In addition to the 2000 telephone interviews, the study included also a qualitative investigation based on open interviews and focus groups. In general, the image detected during the qualitative phase is that in spite of its being technologically advanced and professionally directed and managed, nuclear energy arouses fear and mistrust. The structure of the survey was based on overall issues: the concerns of Spanish society. Twenty-four percent of the interviewees claimed that the environment was

  6. Design of High-Fidelity Testing Framework for Secure Electric Grid Control

    Energy Technology Data Exchange (ETDEWEB)

    Yoginath, Srikanth B [ORNL; Perumalla, Kalyan S [ORNL

    2014-01-01

    A solution methodology and implementation components are presented that can uncover unwanted, unintentional or unanticipated effects on electric grids from changes to actual electric grid control software. A new design is presented to leapfrog over the limitations of current modeling and testing techniques for cyber technologies in electric grids. We design a fully virtualized approach in which actual, unmodified operational software under test is enabled to interact with simulated surrogates of electric grids. It enables the software to influence the (simulated) grid operation and vice versa in a controlled, high fidelity environment. Challenges in achieving such capability include achieving low-overhead time control mechanisms in hypervisor schedulers, network capture and time-stamping, translation of network packets emanating from grid software into discrete events of virtual grid models, translation back from virtual sensors/actuators into data packets to control software, and transplanting the entire system onto an accurately and efficiently maintained virtual-time plane.

  7. Gross anatomy of network security

    Science.gov (United States)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  8. R and D program of the Spanish National Company for Radioactive Wastes management

    International Nuclear Information System (INIS)

    Astudillo, J.

    1993-01-01

    The second R+D program of the Spanish National Company for Radioactive Wastes Management (ENRESA) has a whole budget of 56 million $ for the period 1991-1995. This program is included within the Spanish Energy Plan (PEN-91) and encompasses four main areas: 1) Low and medium level radioactive wastes 2) High level radioactive wastes 3) Decommissioning and dismantling of nuclear installations 4) Radiological protection The Spanish program is coordinated with policies of international organizations: CEC,OECD and IAEA

  9. Airborne chemical elements in Spanish moss

    Energy Technology Data Exchange (ETDEWEB)

    Shacklette, H.T.; Connor, J.J.

    1973-01-01

    Spanish moss (Tillandsia usneoides L.), collected from its geographic range in Southern United States, was analyzed for 38 chemical elements in 123 samples. Analyses of Spanish moss samples collected at rural, residential, highway, and industrial locations reflected significant differences in concentrations of metals. Samples from industrial and highway locations are characterized as containing greater-than-average amounts of arsenic, cadmium, chromium, cobalt, copper, lead, nickel, and vanadium. The high levels of lead found in some samples from highway locations are especially noteworthy. Many samples from sites near the seashore contained greater-than-average amounts of sodium that is thought to have been derived from ocean spray. Samples from rural locations commonly contain low concentrations of the metal usually associated with industrial or urban activity but may contain large amounts of the elements that are ordinary constituents of soil dust. Four of six samples containing detectable amounts of tin were collected within 50 miles of the only tin smelter in the United States; this result suggests that elemental analyses of Spanish moss samples can provide an economical and rapid method of estimating the kind and relative degree of local atmospheric metal pollution.

  10. Securing energy efficiency as a high priority. Scenarios for common appliance electricity consumption in Thailand

    Energy Technology Data Exchange (ETDEWEB)

    Foran, T. [Unit for Social and Environmental Research USER, Faculty of Social Sciences, Chiang Mai University, P.O. Box 144, Chiang Mai, 50200 (Thailand); Du Pont, P.T. [International Resources Group and Joint Graduate School of Energy and Environment, Bangkok (Thailand); Parinya, P. [The Joint Graduate School of Energy and Environment, King Mongkut' s University of Technology Thonburi, Bangkok (Thailand); Phumaraphand, N. [Electricity Generating Authority of Thailand, Nonthaburi (Thailand)

    2010-11-15

    Between 1995 and 2008, Thailand's energy efficiency programs produced an estimated total of 8,369 GWh/year energy savings and 1,471 MW avoided peak power. Despite these impressive saving figures, relatively little future scenario analysis is available to policy makers. Before the 2008 global financial crisis, electricity planners forecasted 5-6% long-term increases in demand. We explored options for efficiency improvements in Thailand's residential sector, which consumes more than 20% of Thailand's total electricity consumption of 150 TWh/year. We constructed baseline and efficient scenarios for the period 2006-2026, for air conditioners, refrigerators, fans, rice cookers, and compact fluorescent light bulbs. We drew on an appliance database maintained by Electricity Generating Authority of Thailand's voluntary labeling program. For the five appliances modeled, the efficiency scenario results in total savings of 12% of baseline consumption after 10 years and 29% of baseline after 20 years. Approximately 80% of savings come from more stringent standards for air conditioners, including phasing out unregulated air conditioner sales within 6 years. Shifting appliance efficiency standards to current best-in-market levels within 6 years produces additional savings. We discuss institutional aspects of energy planning in Thailand that thus far have limited the consideration of energy efficiency as a high-priority resource.

  11. Psychotropic prescribing in seriously violent men with schizophrenia or personality disorder in a UK high security hospital.

    Science.gov (United States)

    Stone-Brown, Keir; Naji, Mahmood; Francioni, Alex; Myers, Kyle; Samarendra, Harsh; Mushtaq-Chaudhry, Haseeb; Heslop, Stephen; Sengupta, Samrat; Ross, Callum C; Larkin, Fintan; Das, Mrigendra

    2016-02-01

    To analyze antipsychotic prescribing patterns in a UK high security hospital (HSH) that treats seriously violent men with either schizophrenia or personality disorder and examine how different groups consented to treatment and prescribing for metabolic conditions. We hypothesized that there would be high prevalence of antipsychotic polypharmacy, and high-dose antipsychotic and clozapine prescribing. HSHs treat seriously violent, mentally disordered offenders, and the extant literature on prescribing patterns in forensic settings is sparse. Prescribing and clinical data on all 189 patients in a UK HSH were collected from the hospital's databases. Data were analyzed using SPSS. The population was split into the following groups: schizophrenia spectrum disorder (SSD-only), personality disorder (PD-only), and comorbid schizophrenia spectrum disorder and PD. The majority (93.7%) of all patients were prescribed at least one antipsychotic, and (27.5%) were on clozapine. Polypharmacy was prevalent in 22.2% and high-dose antipsychotic in 27.5%. Patients on clozapine were more likely to be prescribed antidiabetic, statins, or antihypertensive medication. Patients in the PD-only group were more likely to be deemed to have the capacity to consent to treatment and be prescribed clozapine in contrast to the SSD-only group. Rates of clozapine and high-dose antipsychotic prescribing were higher than in other psychiatric settings, while polypharmacy prescribing rates were lower. Higher clozapine prescribing rates may be a function of a treatment-resistant and aggressive population. A higher proportion of PD-only patients consented to treatment and received clozapine compared with in-house SSD-only as well as other psychiatric settings. Implications of the findings are discussed.

  12. Prevalence and correlates of latent tuberculosis infection among employees of a high security prison in Malaysia.

    Science.gov (United States)

    Al-Darraji, Haider Abdulrazzaq Abed; Tan, Cynthia; Kamarulzaman, Adeeba; Altice, Frederick L

    2015-06-01

    Although prison employees share the same tuberculosis (TB) risk environment with prisoners, the magnitude of TB problems among prison employees is unknown in most resource-limited prisons. This survey was conducted to investigate the prevalence and correlates of tuberculin skin test (TST) positivity among employees in Malaysia's largest prison. Consented, full-time prison employees were interviewed using a structured questionnaire that included sociodemographic data, history of working in the correctional system and TB-related risk. TST was placed intradermally and read after 48-72 h. Induration size of ≥10 mm was considered positive. Logistic regression analyses were conducted to explore associations with TST positivity. Of the 445 recruited prison employees, 420 (94.4%) had complete data. Most were young (median=30.0 years) men (88.8%) who had only worked at this prison (76.4%) for a median total employment period of 60 months (IQR 34.5-132.0). The majority were correctional officers, while civilian employees represented only 7.6% of the sample. Only 26 (6.2%) reported having ever been screened for TB since employment. Prevalence of TST positivity was 81% and was independently associated with longer (≥12 months) prison employment (AOR 4.9; 95% CI 1.5 to 15.9) and current tobacco smoking (AOR=1.9, 95% CI 1.2 to 3.2). Latent TB prevalence was high in this sample, approximating that of prisoners in this setting, perhaps suggesting within prison TB transmission in this facility. Formal TB control programmes for personnel and prisoners alike are urgently needed within the Malaysian correctional system. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  13. A framework for an institutional high level security policy for the processing of medical data and their transmission through the Internet.

    Science.gov (United States)

    Ilioudis, C; Pangalos, G

    2001-01-01

    The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a

  14. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  15. The Design and Implementation of a Low Cost and High Security Smart Home System Based on Wi-Fi and SSL Technologies

    Science.gov (United States)

    Xu, Chong-Yao; Zheng, Xin; Xiong, Xiao-Ming

    2017-02-01

    With the development of Internet of Things (IoT) and the popularity of intelligent mobile terminals, smart home system has come into people’s vision. However, due to the high cost, complex installation and inconvenience, as well as network security issues, smart home system has not been popularized. In this paper, combined with Wi-Fi technology, Android system, cloud server and SSL security protocol, a new set of smart home system is designed, with low cost, easy operation, high security and stability. The system consists of Wi-Fi smart node (WSN), Android client and cloud server. In order to reduce system cost and complexity of the installation, each Wi-Fi transceiver, appliance control logic and data conversion in the WSN is setup by a single chip. In addition, all the data of the WSN can be uploaded to the server through the home router, without having to transit through the gateway. All the appliance status information and environmental information are preserved in the cloud server. Furthermore, to ensure the security of information, the Secure Sockets Layer (SSL) protocol is used in the WSN communication with the server. What’s more, to improve the comfort and simplify the operation, Android client is designed with room pattern to control home appliances more realistic, and more convenient.

  16. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  17. The Spanish National Dose Registry and Spanish radiation passbooks

    International Nuclear Information System (INIS)

    Hernandez, A.; Martin, A.; Villanueva, I.; Amor, I.; Butragueno, J.L.

    2001-01-01

    The Spanish National Dose Registry (BDN) is the Nuclear Safety Council's (CSN) national database of occupational exposure to radiation. Each month BDN receives records of individual external doses from approved dosimetry services. The dose records include information regarding the occupational activities of exposed workers. The dose information and the statistical analysis prepared by the BDN are a useful tool for effective operational protection of occupationally exposed workers and a support for the CSN in the development and application of the ALARA principle. The Spanish radiation passbook was introduced in 1990 and since then CSN, as regulatory authority, has required that all outside workers entering controlled areas should have radiation passbooks. Nowadays, CSN has implemented improvements in the Spanish radiation Passbooks, taking into account previous experience and Directive 96/29/EURATOM. (author)

  18. Electricity market participation of wind farms: the success story of the Spanish pragmatism

    Energy Technology Data Exchange (ETDEWEB)

    Rivier Abbad, Juan, E-mail: jrivier@iberdrola.e [Iberdrola Renovables, 28033 Madrid (Spain)

    2010-07-15

    In the last 10 years, more than 15 GW of wind power (Asociacion Empresarial Eolica (Spanish Wind Energy Association), Nota de prensa (Press release) 17 de enero de 2008. (http://www.aeeolica.org/doc/NP_080117_Espana_supera_los_15000_MW_eolicos.pdf)) have been installed in Spain, of which more than 3.5 GW in 2007. Furthermore, plans are to reach 20 GW by 2010 and there are expectations of an installed capacity exceeding 40 GW by 2020. This article will present the innovative solutions for technical and economical integration that allow to reach such high level wind penetration objectives (the system peaks at around 44 GW and is almost isolated). It will be described how the regulation has evolved from a pure Feed-in-Tariff to a market+premium option, where technical and economic integration has been a priority. Today, approximately 97% of installed wind capacity accesses the Spanish wholesale electricity market. Market integration has been crucial, sending the correct signals to participants to look for the optimum technical solutions. Technical improvements have come from both wind power producers (fault-ride-through capabilities, visibility and controllability of wind power, power production forecasting, reactive power control) and the system operator (specific control centre dedicated to Renewable Energy Sources (RES), new security analysis tools, gaining technical confidence of wind capabilities).

  19. Electricity market participation of wind farms. The success story of the Spanish pragmatism

    Energy Technology Data Exchange (ETDEWEB)

    Rivier Abbad, Juan [Iberdrola Renovables, 28033 Madrid (Spain)

    2010-07-15

    In the last 10 years, more than 15 GW of wind power (Asociacion Empresarial Eolica (Spanish Wind Energy Association), Nota de prensa (Press release) 17 de enero de 2008. http://www.aeeolica.org/doc/NP{sub 0}80117{sub E}spana{sub s}upera{sub l}os{sub 1}5000{sub M}W{sub e}olicos.pdf) have been installed in Spain, of which more than 3.5 GW in 2007. Furthermore, plans are to reach 20 GW by 2010 and there are expectations of an installed capacity exceeding 40 GW by 2020. This article will present the innovative solutions for technical and economical integration that allow to reach such high level wind penetration objectives (the system peaks at around 44 GW and is almost isolated). It will be described how the regulation has evolved from a pure Feed-in-Tariff to a market+premium option, where technical and economic integration has been a priority. Today, approximately 97% of installed wind capacity accesses the Spanish wholesale electricity market. Market integration has been crucial, sending the correct signals to participants to look for the optimum technical solutions. Technical improvements have come from both wind power producers (fault-ride-through capabilities, visibility and controllability of wind power, power production forecasting, reactive power control) and the system operator (specific control centre dedicated to Renewable Energy Sources (RES), new security analysis tools, gaining technical confidence of wind capabilities). (author)

  20. School Security Technologies

    Science.gov (United States)

    Schneider, Tod

    2010-01-01

    Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…

  1. High security container

    International Nuclear Information System (INIS)

    Moreau, P.J.-M.; Monsterleet, G.A.

    1979-01-01

    This invention concerns containments, vessels or tanks for containing and protecting products or installations of various kinds, to be called by the general denomination 'containers'. Such products can be, inter alia, liquids such as natural gas, ammonia, vinyle chloride and hydrocarbons. Far from just forming simple means of storage, the containers used for this must now be capable of withstanding fire, sabotage for instance rocket fire, even impacts from aircraft, earthquakes and other aggressions of the same kind. The particular object of this invention is to create a container withstanding all these various agressions. It must also be considered that this container can not only be used for storing products or materials but also for enclosing particularly dangerous or delicate installations, such as nuclear or chemical reactors [fr

  2. Renewable energy integration into the Spanish power system

    International Nuclear Information System (INIS)

    Duvison Garcia, Miguel R.; Rivas Cuenca, Ana

    2013-01-01

    The increase in renewable energy sources in the Spanish peninsular system, along with the installation of other technologies represents a challenge due to the particularities of this type of technologies. Innovative solutions and new operation paradigms may be needed in order to cope with these challenges. Grid codes must incorporate new specifications for these technologies and demand management strategies must be incorporated in control centers in order to balance the system, maximize renewable production and maintain system security. In real time, the most significant improvements that ease integration of renewable resources are the introduction of observability and controllability, which is especially important in dealing with the problem of system balancing and the impact of renewable energy on matching generation and demand. In this regard the commissioning of a control center specifically for management of these technologies have been taken in the Spanish electrical system in order to integrate the maximum amount of renewable energy

  3. Policies for closing down nuclear power plants. A Spanish review

    International Nuclear Information System (INIS)

    Ruiz del Olmo, G.A.

    2000-01-01

    A review of policies concerned with closing down the Spanish nuclear power plants is described, together with the role of Spanish Group of Municipalities affected by NPPs (AMAC) since its establishment in 1988. Currently there are 9 nuclear reactors operating in seven cities, contributing to the national network bu 39.3% of gross power generation, and one reactor dismantled after the accident in Vandellos in 1989. The main objectives of AMAC activity are concerned with security, economic development and transparency. It has an important role in improvement of the quality of life of the population in municipalities with operating NPPs. It is involved in solving the problems related to radioactive waste management and disposal

  4. High Fidelity Down-Conversion Source for Secure Communications using On-Demand Single Photons, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — To provide reliably secure communications, development of quantum optical devices for encrypted ground-to-space communications is a necessity. The overall goal of...

  5. Everything moves on: referral trends to a leavers' group in a high secure hospital and trial leave progress of group graduates.

    Science.gov (United States)

    Adshead, Gwen; Pyszora, Natalie; Wilson, Claire; Gopie, Ramesh; Thomas, Deryk; Smith, Julia; Glorney, Emily; Moore, Estelle; Tapp, James

    2017-04-01

    Moving on from high secure psychiatric care can be a complex and potentially stressful experience, which may hinder progression. A leavers' group in a UK high secure hospital is offered to support patients with this transition. The aims of this study are to investigate characteristics of patients referred for the leavers' group and compare outcomes for leavers' group graduates with those for patients who never attended a leavers' group for any reason. A retrospective quasi-experimental design was applied to data extracted from various records sources - within and outside the high security hospital. About one-fifth of patients who left the hospital on trial leave during the study were referred to the leavers' group (N = 109). Referred patients were significantly more likely to have either been admitted from another high-security hospital or transferred from prison for treatment and have a diagnosis of paranoid schizophrenia. Patients not referred had a significantly higher rate of previously refusing to participate in groups. There was a tendency for rate of return from trial leave for group graduates to be lower than that of patients who did not attend the leavers' group, but this just failed to reach statistical significance (rate ratio [RR] = 1.04; CI 0.97-1.11). A leavers' group appeared to be a valued therapy option for people who had spent a long time in high secure psychiatric care, or those who continued to require hospital treatment beyond prison tariffs. There was a low return rate from trial leave, which made the evaluation of this outcome difficult. A detailed study into both the reasons for return from trial leave and successes would provide further information on ideal preparation for moving on. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  6. Semantic and Pragmatic Functions of the Spanish Diminutive in Spanish in Contact with Quechua.

    Science.gov (United States)

    Escobar, Anna Maria

    2001-01-01

    Presents data from the Spanish of Quechua-Spanish bilinguals that exemplify a contact situation that gives rise to a process called structural interference. Concentrates on the use of the diminutive in the Spanish of speakers of Spanish in the Andes. (Author/VWL)

  7. Spanish Is Foreign: Heritage Speakers' Interpretations of the Introductory Spanish Language Curriculum

    Science.gov (United States)

    DeFeo, Dayna Jean

    2015-01-01

    This article presents a case study of the perceptions of Spanish heritage speakers enrolled in introductory-level Spanish foreign language courses. Despite their own identities that were linked to the United States and Spanish of the Borderlands, the participants felt that the curriculum acknowledged the Spanish of Spain and foreign countries but…

  8. Linguistic validation of the US Spanish work productivity and activity impairment questionnaire, general health version.

    Science.gov (United States)

    Gawlicki, Mary C; Reilly, Margaret C; Popielnicki, Ana; Reilly, Kate

    2006-01-01

    There are no measures of health-related absenteeism and presenteeism validated for use in the large and increasing US Spanish-speaking population. Before using a Spanish translation of an available English-language questionnaire, the linguistic validity of the Spanish version must be established to ensure its conceptual equivalence to the original and its cultural appropriateness. The objective of this study was to evaluate the linguistic validity of the US Spanish version of the Work Productivity and Activity Impairment questionnaire, General Health Version (WPAI:GH). A US Spanish translation of the US English WPAI:GH was created through a reiterative process of creating harmonized forward and back translations by independent translators. Spanish-speaking and English-speaking subjects residing in the US self-administered the WPAI:GH in their primary language and were subsequently debriefed by a bilingual (Spanish-English) interviewer. US Spanish subjects (N = 31) and English subjects (N = 35), stratified equally by educational level, with and without a high school degree participated in the study. The WPAI-GH item comprehension rate was 98.6% for Spanish and 99.6% for English. Response revision rates during debriefing were 1.6% for Spanish and 0.5% for English. Responses to hypothetical scenarios indicated that both language versions adequately differentiate sick time taken for health and non-health reasons and between absenteeism and presenteeism. Linguistic validity of the US Spanish translation of the WPAI:GH was established among a diverse US Spanish-speaking population, including those with minimal education.

  9. Spanish translation and validation of four short pelvic floor disorders questionnaires.

    Science.gov (United States)

    Treszezamsky, Alejandro D; Karp, Deborah; Dick-Biascoechea, Madeline; Ehsani, Nazanin; Dancz, Christina; Montoya, T Ignacio; Olivera, Cedric K; Smith, Aimee L; Cardenas, Rosa; Fashokun, Tola; Bradley, Catherine S

    2013-04-01

    Globally, Spanish is the primary language for 329 million people; however, most urogynecologic questionnaires are available in English. We set out to develop valid Spanish translations of the Questionnaire for Urinary Incontinence Diagnosis (QUID), the Three Incontinence Questions (3IQ), and the short Pelvic Floor Distress Inventory (PFDI-20) and Pelvic Floor Impact Questionnaire (PFIQ-7). The TRAPD method (translation, review, adjudication, pretesting, and documentation) was used for translation. Eight native Spanish-speaking translators developed Spanish versions collaboratively. These were pretested with cognitive interviews and revised until optimal. For validation, bilingual patients at seven clinics completed Spanish and English questionnaire versions in randomized order. Participants completed a second set of questionnaires later. The Spanish versions' internal consistency and reliability and Spanish-English agreement were measured using Cronbach's alpha, weighted kappa, and intraclass correlation coefficients. A total of 78 subjects were included; 94.9 % self-identified as Hispanic and 73.1 % spoke Spanish as their primary language. The proportion of per-item missing responses was similar in both languages (median 1.3 %). Internal consistency for Spanish PFDI-20 subscales was acceptable to good and for PFIQ-7 and QUID excellent. Test-retest reliability per item was moderate to near perfect for PFDI-20, substantial to near perfect for PFIQ-7 and 3IQ, and substantial for QUID. Spanish-English agreement for individual items was substantial to near perfect for all questionnaires (kappa range 0.64-0.95) and agreement for PFDI-20, PFIQ-7, and QUID subscales scores was high [intraclass correlation coefficient (ICC) range 0.92-0.99]. We obtained valid Spanish translations of the PFDI-20, PFIQ-7, QUID, and 3IQ. These results support their use as clinical and research assessment tools in Spanish-speaking populations.

  10. Chatting in L2 Spanish: Interactivity, Self-Efficacy and Interpersonal Relations

    Science.gov (United States)

    Sanchez-Castro, Olga; Mrowa-Hopkins, Colette

    2012-01-01

    This study seeks to examine variations in patterns of interactivity as they are displayed in the ongoing discourse construction of high and low self-efficacy learners of Spanish in the context of computer-mediated-communication. The paper specifically focuses on the analysis of synchronous text chats of six university students of Spanish at…

  11. Validating a Spanish Developmental Spelling Test.

    Science.gov (United States)

    Ferroli, Lou; Krajenta, Marilyn

    The creation and validation of a Spanish version of an English developmental spelling test (DST) is described. An introductory section reviews related literature on the rationale for and construction of DSTs, spelling development in the early grades, and Spanish-English bilingual education. Differences between the English and Spanish test versions…

  12. Spanish wines in the US market: What attributes do US consumers look for in Spanish wines?

    Energy Technology Data Exchange (ETDEWEB)

    Areta, A.; Bardají, I.; Iráizoz, B.

    2017-07-01

    This paper analysed the impact of different attributes in Spanish quality wines on United States (US) demand behaviour. A hedonic price model was estimated in order to assess the values that US consumers give Spanish wines. The main results showed that the most influential factor on sale price was aging, which had a positive impact. US consumers valued the quality ratings provided by experts, especially in the upper price categories. The year of vintage and size of the winery were considered medium importance factors in decision-making, with the latest vintages and the smallest wineries receiving the highest ratings. Geographical origin (appellation) helped to explain consumer preferences. Although colour was the least important attribute in consumers’ purchase decisions, red wines were the most highly rated in this attribute.

  13. Spanish wines in the US market: What attributes do US consumers look for in Spanish wines?

    International Nuclear Information System (INIS)

    Areta, A.; Bardají, I.; Iráizoz, B.

    2017-01-01

    This paper analysed the impact of different attributes in Spanish quality wines on United States (US) demand behaviour. A hedonic price model was estimated in order to assess the values that US consumers give Spanish wines. The main results showed that the most influential factor on sale price was aging, which had a positive impact. US consumers valued the quality ratings provided by experts, especially in the upper price categories. The year of vintage and size of the winery were considered medium importance factors in decision-making, with the latest vintages and the smallest wineries receiving the highest ratings. Geographical origin (appellation) helped to explain consumer preferences. Although colour was the least important attribute in consumers’ purchase decisions, red wines were the most highly rated in this attribute.

  14. Processing Controlled PROs in Spanish

    Science.gov (United States)

    Betancort, Moises; Carreiras, Manuel; Acuna-Farina, Carlos

    2006-01-01

    Two experiments were carried out to investigate the processing of the empty category PRO and the time-course of this in Spanish. Eye movements were recorded while participants read sentences in which a matrix clause was followed by a subordinate infinitival clause, so that the subject or the object of the main clause could act as controller of…

  15. V Congress of Spanish Geochemistry

    International Nuclear Information System (INIS)

    1993-01-01

    This proceedings book present the lectures of V Spanish geochemistry Congress. The sessions were: 1.- Materials geochemistry and geologic process. 2.- Geochemistry prospection 3.- Environmental geochemistry 4.- Isotopic geochemistry 5.- Organic geochemistry 6.- Natural materials geochemistry for industry 7.- Hydrogeochemistry 8.- Mathematical models in geochemistry 9.- Analysis methods in geochemistry 10.-Training of geochemistry 11.-Cosmochemistry

  16. Agentivity Marking in Spanish Nominalisations

    DEFF Research Database (Denmark)

    Høeg Müller, Henrik

    2017-01-01

    The first objective of this paper is to provide justification for the claim that variation between the prepositions por ‘by’ and de ‘of’ introducing the subject argument in Spanish nominalisations should not be explained as primarily paralleling sentence-level voice or aspectual distinctions...

  17. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  18. Espanol mexicano y espanol chicano: Problemas y propuestas fundamentales (Mexican Spanish and Chicano Spanish: Fundamental Problems and Proposals).

    Science.gov (United States)

    Hidalgo, Margarita

    1987-01-01

    Discusses the rise of Mexican Spanish as a distinct variety of Spanish and describes the regional and social dialects of contemporary Mexican Spanish. Although countless similarities exist between Mexican Spanish and the Chicano Spanish spoken in the southwestern United States, Mexican Spanish shows greater variability. (GR)

  19. Securing General Aviation

    National Research Council Canada - National Science Library

    Elias, Bart

    2005-01-01

    ... of various GA operations. While some recent high-profile breaches of GA security point to persisting vulnerabilities and limited intelligence information suggests a continued terrorist interest in using GA aircraft...

  20. Linux Server Security

    CERN Document Server

    Bauer, Michael D

    2005-01-01

    Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--

  1. Satisfaction With Communication in Primary Care for Spanish-Speaking and English-Speaking Parents.

    Science.gov (United States)

    Flower, Kori B; Skinner, Asheley C; Yin, H Shonna; Rothman, Russell L; Sanders, Lee M; Delamater, Alan; Perrin, Eliana M

    Effective communication with primary care physicians is important yet incompletely understood for Spanish-speaking parents. We predicted lower satisfaction among Spanish-speaking compared to English-speaking Latino and non-Latino parents. Cross-sectional analysis at 2-month well visits within the Greenlight study at 4 pediatric resident clinics. Parents reported satisfaction with 14 physician communication items using the validated Communication Assessment Tool (CAT). High satisfaction was defined as "excellent" on each CAT item. Mean estimations compared satisfaction for communication items among Spanish- and English-speaking Latinos and non-Latinos. We used generalized linear regression modeling, adjusted for parent age, education, income, and clinic site. Among Spanish-speaking parents, we compared visits conducted in Spanish with and without an interpreter, and in English. Compared to English-speaking Latino (n = 127) and non-Latino parents (n = 432), fewer Spanish-speaking parents (n = 303) reported satisfaction with 14 communication items. No significant differences were found between English-speaking Latinos and non-Latinos. Greatest differences were found in the use of a greeting that made the parent comfortable (59.4% of Spanish-speaking Latinos endorsing "excellent" vs 77.5% English-speaking Latinos, P English-speaking Latinos, P < .01). After adjusting for parent age, education, income, and study site, Spanish-speaking Latinos were still less likely to report high satisfaction with these communication items. Satisfaction was not different among Spanish-speaking parents when the physician spoke Spanish versus used an interpreter. Satisfaction with physician communication was associated with language but not ethnicity. Spanish-speaking parents less frequently report satisfaction with communication, and innovative solutions to enhance communication quality are needed. Copyright © 2017 Academic Pediatric Association. Published by Elsevier Inc. All

  2. Ambulatory blood pressure monitoring and development of cardiovascular events in high-risk patients included in the Spanish ABPM registry: the CARDIORISC Event study.

    Science.gov (United States)

    de la Sierra, Alejandro; Banegas, José R; Segura, Julián; Gorostidi, Manuel; Ruilope, Luis M

    2012-04-01

    Ambulatory blood pressure monitoring (ABPM) is superior to conventional BP measurement in predicting outcome, with baseline 24-h, daytime and night-time absolute values, as well as relative nocturnal decline, as powerful determinants of prognosis. We aimed to evaluate ABPM estimates on the appearance of cardiovascular events and mortality in a cohort of high-risk treated hypertensive patients. A total of 2115 treated hypertensive patients with high or very high added risk were evaluated by means of office and 24-h ABPM. Cardiovascular events and mortality were assessed after a median follow-up of 4 years. Two hundred and sixty-eight patients (12.7%) experienced a primary event (nonfatal coronary or cerebrovascular event, heart failure hospitalization or cardiovascular death) and 114 died (45 from cardiovascular causes). In a multiple Cox regression model, and after adjusting for baseline cardiovascular risk and office BP, night-time SBP predicted cardiovascular events [hazard ratio for each SD increase: 1.45; 95% confidence interval (CI) 1.29-1.59]. Values above 130 mmHg increased the risk by 52% in comparison to values less than 115 mmHg. In addition to clinical determinants of cardiovascular risk and conventional BP, ABPM performed during treatment adds prognostic significance on the development of cardiovascular events in high-risk hypertensive patients. Among different ABPM-derived values, night-time SBP is the most potent predictor of outcome.

  3. Assessing Advanced Theory of Mind in Children and Adolescents with High-Functioning Autism: The Spanish Version of the "Stories of Everyday Life"

    Science.gov (United States)

    Lera-Miguel, Sara; Rosa, Mireia; Puig, Olga; Kaland, Nils; Lázaro, Luisa; Castro-Formieles, Josefina; Calvo, Rosa

    2016-01-01

    Most individuals with autism spectrum disorders often fail in tasks of theory of mind (ToM). However, those with normal intellectual functioning known as high functioning ASD (HF-ASD) sometimes succeed in mentalizing inferences. Some tools have been developed to more accurately test their ToM abilities. The aims of this study were to examine the…

  4. Successful New Product Development by Optimizing Development Process Effectiveness in Highly Regulated Sectors: The Case of the Spanish Medical Devices Sector

    NARCIS (Netherlands)

    Pullen, A.J.J.; Cabello-Medina, Carmen; de Weerd-Nederhof, Petronella C.; Visscher, Klaasjan; Groen, Arend J.; Tschirky, H.; Herstatt, C.; Probert, D.; Gemunden, H.G.; Colombo, M.G.; Durand, T.; de Weerd-Nederhof, P.C.; Schweisfurth, T.

    2010-01-01

    Rapid development and commercialization of new products is of vital importance for small and medium sized enterprises (SME) in regulated sectors. Due to strict regulations, competitive advantage can hardly be achieved through the effectiveness of product concepts only. If an SME in a highly

  5. Influence of Social Cognitive and Gender Variables on Technological Academic Interest among Spanish High-School Students: Testing Social Cognitive Career Theory

    Science.gov (United States)

    Rodríguez, Carmen; Inda, Mercedes; Fernández, Carmen Mª

    2016-01-01

    This study tested social cognitive career theory (SCCT) in the technological domain with 2,359 high-school students in Asturias (Spain). Path analyses were run to determine the influence of gender on the SCCT model and to explain the influence of personal (emotional state, gender-role attitudes), contextual (perceived social supports and…

  6. 78 FR 19103 - Safety Zone; Spanish Navy School Ship San Sebastian El Cano Escort; Bahia de San Juan; San Juan, PR

    Science.gov (United States)

    2013-03-29

    ...-AA00 Safety Zone; Spanish Navy School Ship San Sebastian El Cano Escort; Bahia de San Juan; San Juan... temporary moving safety zone on the waters of Bahia de San Juan during the transit of the Spanish Navy... Channel entrance, and to protect the high ranking officials on board the Spanish Navy School Ship San...

  7. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  8. The Universality of Semantic Prototypes in Spanish Lexical Availability

    Directory of Open Access Journals (Sweden)

    Marjana Šifrar Kalan

    2016-12-01

    Full Text Available The article presents the words with highest index of availability on the basis of semantic fluency tests. The conceptual stability of highly available words in various semantic categories enables them to be classified as semantic prototypes according to the theory of prototype. The aim of this article is to compare the semantic prototypes in nine semantic categories from different lexical availability studies: those carried out in Spanish as a mother tongue and Spanish as a foreign language (with Slovene, Finnish, Turkish, Chinese students and students of various other mother tongues who studied Spanish in Madrid and Salamanca. The informants who come from different countries and cultures and speak different first languages demonstrate that human beings share the same or similar categorization and universality of semantic prototypes.

  9. Development of the Spanish Language Houston Pain Outcome Instrument for Spanish Speakers.

    Science.gov (United States)

    McNeill, Jeanette; Sherwood, Gwen

    2017-12-01

    To address reported disparities in pain management among Hispanic patients, this article reports the psychometrics of the newly developed Spanish language Houston Pain Outcome Instrument (HPOI) with postoperative Hispanic patients. Findings from qualitative interviews conducted with 35 self-identified Hispanics in Phase 1 of the overall project were used to generate items for a new Spanish language instrument, Cuestionario de Houston Sobre el Dolor (HPOI). The second phase tested the psychometric properties with 95 self-identified Hispanic postoperative inpatients in three Texas hospitals. HPOI subscale reliabilities ranged from .63 to .91, with similar reliabilities for Spanish and English versions. Concurrent validity was demonstrated by moderate significant correlations with similar items on the Brief Pain Inventory. Participants reported moderate and severe worst pain in the last 24 hours; 38% were undertreated for pain according to the Pain Management Index; and 75% reported nonpharmacologic strategies including family support, prayer, and position change as highly effective in managing pain. The HPOI is a reliable instrument for addressing disparities in pain management for the rapidly growing Hispanic population in the United States. Subscales for interference with mood and physical function and patient-reported nonpharmacologic strategies facilitate a more comprehensive assessment of the pain experience.

  10. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  11. Understanding High Incidence of Severe Obesity and Very Low Food Security in Food Pantry Clients: Implications For Social Work.

    Science.gov (United States)

    Kaiser, Michelle L; Cafer, Anne

    2018-01-01

    The United States is facing two interconnected social and public health crises of severe obesity and food insecurity within the social-ecological environment. Marginalized groups experience the highest rates and the greatest impacts in terms of morbidity, mortality, and financial burdens. Consequences include experiencing multimorbidities, mental health issues, and decreased quality of life. Food pantries have served as spaces to obtain food to meet household needs, but for some, food pantries have become long-term solutions. We surveyed 2,634 people who accessed pantries in 2005, 2010, and 2013 across 32 counties in a Midwest state. The authors sought to understand to what extent does length of time using a food pantry, food security status, income sources, use of federal food benefits, visiting a doctor, and demographic variables increase odds of severe obesity. More than 14% were severely obese; those who were long-term food pantry users and very low food secure were 1.732 times more likely to be severely obese. Receiving Disability/Supplemental Security Income, seeing a doctor in the last year, being female, and older age reduced the odds of severe obesity. Discussion includes implications for social workers who interact with groups likely to experience very low food security and severe obesity at different systems levels.

  12. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  13. Gender, school and academic year differences among Spanish university students at high-risk for developing an eating disorder: An epidemiologic study

    Directory of Open Access Journals (Sweden)

    Carrobles Jose A

    2008-03-01

    Full Text Available Abstract Background The aim of this study was to assess the magnitude of the university population at high-risk of developing an eating disorder and the prevalence of unhealthy eating attitudes and behaviours amongst groups at risk; gender, school or academic year differences were also explored. Methods A cross-sectional study based on self-report was used to screen university students at high-risk for an eating disorder. The sample size was of 2551 university students enrolled in 13 schools between the ages of 18 and 26 years. The instruments included: a social-demographic questionnaire, the Eating Disorders Inventory (EDI, the Body Shape Questionnaire (BSQ, the Symptom Check List 90-R (SCL-90-R, and the Self-Esteem Scale (RSE. The sample design is a non-proportional stratified sample by academic year and school. The prevalence rate was estimated controlling academic year and school. Logistic regression analysis was used to investigate adjusted associations between gender, school and academic year. Results Female students presented unhealthy weight-control behaviours as dieting, laxatives use or self-induced vomiting to lose weight than males. A total of 6% of the females had a BMI of 17.5 or less or 2.5% had amenorrhea for 3 or more months. In contrast, a higher proportion of males (11.6% reported binge eating behaviour. The prevalence rate of students at high-risk for an eating disorder was 14.9% (11.6–18 for males and 20.8% (18.7–22.8 for females, according to an overall cut-off point on the EDI questionnaire. Prevalence rates presented statistically significant differences by gender (p Conclusion The prevalence of eating disorder risk in university students is high and is associated with unhealthy weight-control practices, similar results have been found in previous studies using cut-off points in questionnaires. These results may be taken into account to encourage early detection and a greater awareness for seeking treatment in order

  14. Are electricity prices affected by the US dollar to Euro exchange rate? The Spanish case

    International Nuclear Information System (INIS)

    Munoz, M. Pilar; Dickey, David A.

    2009-01-01

    The objective of this paper is to investigate the relationships between Spanish electricity spot prices and the US dollar/Euro (USD/Euro) exchange rate during the period 2005-2007, taking into account the study of the association between dollar and oil prices, in order to better understand the evolution of the former over time. The first finding in this study is that Spanish electricity spots prices, the USD/Euro exchange rate and oil prices are cointegrated; therefore there is a long-run equilibrium relationship between the three variables. Short-run relationships have been detected between oil prices and Spanish electricity prices and USD/Euro exchange rate in the sense that Spanish electricity prices and USD/Euro exchange rate are affected by oil prices in the short run. There is a transmission of volatility between USD/Euro exchange rate and oil prices to Spanish electricity prices; so although Spanish electricity prices are not affected in level by the movements of USD/Euro exchange rate, they are in volatility. In this kind of scenario the conclusions confirm that for countries so dependent on external causes as Spain, one possible solution for guarantying the energy security would be the promotion of the renewable energies. Therefore we cannot ignore the impact in the internal expenses of the cost of installation and generation of green energies so there must be a balance between the increase in renewables and the reasonable market price of the electricity. (author)

  15. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  16. Social Security, Intergenerational Transfers, and Endogenous Growth

    OpenAIRE

    Junsen Zhang; Junxi Zhang

    1998-01-01

    In this paper, the effects of social security in a simple model of endogenous growth with alternative motives of having children are analyzed. It shows how the effects of social security depend on the size of the social security tax, the motive to have children, and the pattern of intergenerational transfers. The pattern of intergenerational transfers itself, however, is shown to change with the social security tax rate. When the social security tax is not too high, social security increases ...

  17. Successful Characterization and Remedial Contour of Highly Contaminated Mercury Soil at the Y-12 National Security Complex - 13593

    Energy Technology Data Exchange (ETDEWEB)

    White, Aaron; Rigas, Michael [U.S. Department of Energy Oak Ridge Operations, Oak Ridge, TN 37830 (United States); Birchfield, Joseph W. III [1528 Paxton Drive Knoxville, TN 37918 (United States)

    2013-07-01

    An area known as the 81-10 pad within the footprint of the Y-12 National Security Complex, suspected to be heavily contaminated with mercury, was slated for characterization in support of a Federal Facilities Agreement (FFA) milestone to be accomplished by September 30, 2012. A full remedial design report (RDR) required the soil in Exposure Unit -9 (EU-9) to be fully characterized for a number of contaminates of concern including mercury. The goal of this characterization effort was to determine what soil, if any, would need to be removed for the protection of industrial workers and impacts to the surface and ground water. Funding for this project was made available using buy-back scope under the American Recovery and Reinvestment Act (ARRA). The EU-9 soil unit involved 3 different classifications which were determined as follows: Class 1: Known to have been impacted, contamination is likely; Class 2: Suspected to have been impacted, contamination is unknown; Class 3: Area not known to have been impacted, contamination unlikely. Due to various sampling and analysis events since the 1980's, significant mercury contamination was expected under the concrete pad of an area known as 81-10. Mercury contamination outside of the boundary of this pad within the EU-9 footprint was not known and therefore an original planned estimate of 1,461 cubic meters of material were expected to be heavily contaminated with mercury requiring removal, treatment and disposal. Through the use of a highly effective nature and extent sampling and analysis design that involved a hybrid of statistically-based and judgmental sampling, the actual remedial contour requiring removal was approximately 717 cubic meters, roughly 12% of the original estimate. This characterization approach was executed in full compliance with the Record of Decision (ROD) [1] documents that were agreed upon by the U.S. Department of Energy, Environmental Protection Agency and Tennessee Department of Environment and

  18. Computer-Assisted Spanish-Composition Survey--1986.

    Science.gov (United States)

    Harvey, T. Edward

    1986-01-01

    A survey of high school and higher education teachers' (N=208) attitudes regarding the use of computers for Spanish-composition instruction revealed that: the lack of foreign-character support remains the major frustration; most teachers used Apple or IBM computers; and there was mixed opinion regarding the real versus the expected benefits of…

  19. SITUATION OF THE SPANISH AMERICANS OF NORTHERN NEW MEXICO.

    Science.gov (United States)

    KNOWLTON, CLARK S.

    THE SPANISH AMERICANS OF NORTHERN NEW MEXICO HAVE CONSTITUTED ONE OF THE UNRECOGNIZED DISADVANTAGED GROUPS. PER CAPITA INCOME IS LOW AND THE RATES OF UNEMPLOYMENT AND WELFARE ARE HIGH. THE CAUSES OF THE PRESENT SITUATION ARE--(1) LOSS OF LAND, (2) CULTURAL AND LINGUISTIC DISCRIMINATORY ATTITUDES, (3) NON-PROVISION OF ADEQUATE PROGRAMS TO…

  20. Tonal Targets in Early Child English, Spanish, and Catalan

    Science.gov (United States)

    Astruc, Lluisa; Payne, Elinor; Post, Brechtje; Vanrell, Maria del Mar; Prieto, Pilar

    2013-01-01

    This study analyses the scaling and alignment of low and high intonational targets in the speech of 27 children--nine English-speaking, nine Catalan-speaking and nine Spanish-speaking--between the ages of two and six years. We compared the intonational patterns of words controlled for number of syllables and stress position in the child speech to…

  1. Translation Priming Effect in Spanish-English Bilinguals

    Science.gov (United States)

    Ramírez Sarmiento, Albeiro Miguel Ángel

    2011-01-01

    This article aims to establish the effects of masked priming by translation equivalents in Spanish-English bilinguals with a high-intermediate level of proficiency in their second language. Its findings serve as evidence to support the hypothesis that semantic representations mediate the mental association among non-cognates from a speaker's first…

  2. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  3. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  4. An Approach to Regulation on Financial Derivatives in the Spanish Law

    Directory of Open Access Journals (Sweden)

    Pablo Sanz Bayón

    2013-07-01

    Full Text Available This review examines the major reforms implemented in the regulations governing the trading of financial derivatives in Spain. This new regulation is intended to harmonize the treatment of derivative products with the legal standards of international markets in the European area as well as improving their competitiveness by enhancing the trading of new products and business lines in the Spanish markets while reducing the systemic risk associated to the clearing and settlement of derivatives contracts. Including measures regarding the conversion of OTC derivatives into assets quoted on organized markets into Spanish law has made an important contribution to a better regulation, security and transparency of the financial system.

  5. Software Safety and Security

    CERN Document Server

    Nipkow, T; Hauptmann, B

    2012-01-01

    Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was

  6. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  7. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  8. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  9. Oral health status in older adults with social security in Mexico City: Latent class analysis.

    Science.gov (United States)

    Sánchez-García, Sergio; Heredia-Ponce, Erika; Cruz-Hervert, Pablo; Juárez-Cedillo, Teresa; Cárdenas-Bahena, Angel; García-Peña, Carmen

    2014-02-01

    To explore the oral health status through a latent class analysis in elderly social security beneficiaries from Southwest Mexico City. Cross-sectional study of beneficiaries of the State Employee Social Security and Social Services Institute (ISSSTE, in Spanish) and the Mexican Institute of Social Security (IMSS, in Spanish) aged 60 years or older. Oral health conditions such as edentulism, coronal and root caries (DMFT and DFT ≥ 75 percentile), clinical attachment loss (≥ 4 mm), and healthy teeth (≤ 25 percentile) were determined. A latent class analysis (LCA) was performed to classify the oral health status of dentate patients. In total, 336 patients were included (47.9% from the ISSSTE and 52.1% from the IMSS), with an average age of 74.4 (SD = 7.1) years. The 75th percentile of the DMFT = 23 and of the DFT = 2. Of the patients, 77.9% had periodontal disease. The 25th percentile of healthy teeth = 4. A three class model is adequate, with a high classification quality (Entropy = 0.915). The patients were classified as "Edentulous" (15.2%), "Class 1 = Unfavorable" (13.7%), "Class 2 = Somewhat favorable" (10.4%), and "Class 3 = Favorable" (60.7%). Using "Class 3 = Favorable" as a reference, there was an association (OR = 3.4; 95% CI = 1.8-6.4) between being edentulous and being 75 years of age and over, compared with the 60- to 74-year age group. The oral health in elderly social security beneficiaries is not optimal. The probability of becoming edentulous increases with age. A three-class model appropriately classifies the oral health dimensions in the elderly population. Key words:Elderly, Latent class analysis (LCA), oral health, social security, Mexico.

  10. SPANISH PEAKS PRIMITIVE AREA, MONTANA.

    Science.gov (United States)

    Calkins, James A.; Pattee, Eldon C.

    1984-01-01

    A mineral survey of the Spanish Peaks Primitive Area, Montana, disclosed a small low-grade deposit of demonstrated chromite and asbestos resources. The chances for discovery of additional chrome resources are uncertain and the area has little promise for the occurrence of other mineral or energy resources. A reevaluation, sampling at depth, and testing for possible extensions of the Table Mountain asbestos and chromium deposit should be undertaken in the light of recent interpretations regarding its geologic setting.

  11. Performance of spanish wind turbines

    International Nuclear Information System (INIS)

    Lago, C.

    1995-01-01

    In this document we can find a statistical evaluation for the wind energy generation from each spanish wind farm referred to 1994, going on with the work that has been carried out since 1992, by initiative of the Wind Energy Division from Renewable Energy Institute. The purpose of this work is to contribute with interesting information for the wind environment and offer a global view from monthly performances of different wind farms. (Author)

  12. Community Health Center Provider and Staff’s Spanish Language Ability and Cultural Awareness

    Science.gov (United States)

    Baig, Arshiya A.; Benitez, Amanda; Locklin, Cara A.; Campbell, Amanda; Schaefer, Cynthia T.; Heuer, Loretta J.; Mee Lee, Sang; Solomon, Marla C.; Quinn, Michael T.; Burnet, Deborah L.; Chin, Marshall H.

    2014-01-01

    Many community health center providers and staff care for Latinos with diabetes, but their Spanish language ability and awareness of Latino culture are unknown. We surveyed 512 Midwestern health center providers and staff who managed Latino patients with diabetes. Few respondents had high Spanish language (13%) or cultural awareness scores (22%). Of respondents who self-reported 76–100% of their patients were Latino, 48% had moderate/low Spanish language and 49% had moderate/low cultural competency scores. Among these respondents, 3% lacked access to interpreters and 27% had neither received cultural competency training nor had access to training. Among all respondents, Spanish skills and Latino cultural awareness were low. Respondents who saw a significant number of Latinos had good access to interpretation services but not cultural competency training. Improved Spanish-language skills and increased access to cultural competency training and Latino cultural knowledge are needed to provide linguistically and culturally tailored care to Latino patients. PMID:24858866

  13. Community health center provider and staff's Spanish language ability and cultural awareness.

    Science.gov (United States)

    Baig, Arshiya A; Benitez, Amanda; Locklin, Cara A; Campbell, Amanda; Schaefer, Cynthia T; Heuer, Loretta J; Lee, Sang Mee; Solomon, Marla C; Quinn, Michael T; Burnet, Deborah L; Chin, Marshall H

    2014-05-01

    Many community health center providers and staff care for Latinos with diabetes, but their Spanish language ability and awareness of Latino culture are unknown. We surveyed 512 Midwestern health center providers and staff who managed Latino patients with diabetes. Few respondents had high Spanish language (13%) or cultural awareness scores (22%). Of respondents who self-reported 76-100% of their patients were Latino, 48% had moderate/low Spanish language and 49% had moderate/low cultural competency scores. Among these respondents, 3% lacked access to interpreters and 27% had neither received cultural competency training nor had access to training. Among all respondents, Spanish skills and Latino cultural awareness were low. Respondents who saw a significant number of Latinos had good access to interpretation services but not cultural competency training. Improved Spanish-language skills and increased access to cultural competency training and Latino cultural knowledge are needed to provide linguistically and culturally tailored care to Latino patients.

  14. Romanian and Spanish Cultural Crossings

    Directory of Open Access Journals (Sweden)

    Anisoara Popa

    2010-06-01

    Full Text Available Much more appreciated and known in his time than by posterity, V.A.Urechia was ahistorian, politician and learned man, formed together with great personalities of the generation of the40's, A.I.Cuza's collaborator (the first ruler of the United Principalities, and also our first hispanist.After finishing his studies in Paris, he married Francoise Josephine Dominique Plano, the daughter ofQueen Isabela's of Spain personal doctor, Urechia showed a constant interest and maintained strongconnections with the Spanish cultural space that he discovered to be the origin of the foundingemperor of Dacia Traiana. The subject-matter of the present paper is Urechia's "capital of Spanisheducation" (enhanced in time, the contacts with the great personalities of the Spanish culture of histime , that can be reconstituted due to his work, his memoires, his letters a intercultural dialogue andarticles published in the Spanish and Romanian press, as well as the influence of those contacts on thepersonality, method, and purpose of his cultural approaches. Moreover, we are to point out thecontribution that the personalities had in the intercultural dialogue in Europe, at the end of the 19thcentury.

  15. An analysis of national collaboration with Spanish researchers abroad in the health sciences.

    Science.gov (United States)

    Aceituno-Aceituno, Pedro; Romero-Martínez, Sonia Janeth; Victor-Ponce, Patricia; García-Núñez, José

    2015-11-07

    The establishment of scientific collaborations with researchers abroad can be considered a good practice to make appropriate use of their knowledge and to increase the possibilities of them returning to their country. This paper analyses the collaboration between Spanish researchers abroad devoted to health sciences and national science institutions. We used the Fontes' approach to perform a study on this collaboration with Spanish researchers abroad. We measured the level of national and international cooperation, the opportunity provided by the host country to collaborate, the promotion of collaboration by national science institutions, and the types of collaboration. A total of 88 biomedical researchers out of the 268 Spanish scientists who filled up the survey participated in the study. Different data analyses were performed to study the variables selected to measure the scientific collaboration and profile of Spanish researchers abroad. There is a high level of cooperation between Spanish health science researchers abroad and international institutions, which contrasts with the small-scale collaboration with national institutions. Host countries facilitate this collaboration with national and international scientific institutions to a larger extent than the level of collaboration promotion carried out by Spanish institutions. The national collaboration with Spanish researchers abroad in the health sciences is limited. Thus, the practice of making appropriate use of the potential of their expertise should be promoted and the opportunities for Spanish health science researchers to return home should be improved.

  16. Survey of familial glaucoma shows a high incidence of cytochrome P450, family 1, subfamily B, polypeptide 1 (CYP1B1) mutations in non-consanguineous congenital forms in a Spanish population

    Science.gov (United States)

    Millá, Elena; Mañé, Begoña; Duch, Susana; Hernan, Imma; Borràs, Emma; Planas, Ester; Dias, Miguel de Sousa; Carballo, Miguel

    2013-01-01

    Purpose To identify myocilin (MYOC) and cytochrome P450, family 1, subfamily B, polypeptide 1 (CYP1B1) mutations in a Spanish population with different clinical forms of familial glaucoma or ocular hypertension (OHT). Methods Index patients from 226 families participated in this study. Patients were diagnosed with familial glaucoma or OHT by complete ophthalmologic examination. Screening for MYOC mutations was performed in 207 index patients: 96 with adult-onset primary open-angle glaucoma (POAG), 21 with primary congenital glaucoma (PCG), 18 with juvenile-onset open-angle glaucoma (JOAG), five with Axenfeld-Rieger syndrome (ARS), and 67 with other types of glaucoma. One hundred two of the families (including all those in whom a MYOC mutation was detected) were also screened for CYP1B1 mutations: 45 POAG, 25 PCG, 21 JOAG, four ARS, and seven others. Results We examined 292 individuals (patients and relatives) with a positive family history of glaucoma or OHT. We identified two novel MYOC variants, p.Lys39Arg and p.Glu218Lys, in two families with POAG, and six previously reported MYOC mutations in seven families with POAG (four), JOAG (one), PCG (one), and normotensive glaucoma (one). CYP1B1 mutations were found in 16 index patients with PCG (nine), POAG (three), JOAG (two), and ARS (two). Conclusions The high percentage (9/25=36%) of mutations in CYP1B1 found in non-consanguineous patients with congenital glaucoma mandates genetic testing. However, the percentage of mutations (9/207=4.4%) in MYOC associated with glaucoma is relatively low in our population. The variable phenotype expression of glaucoma, even in families, cannot be explained with a digenic mechanism between MYOC and CYP1B1. PMID:23922489

  17. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  18. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  19. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  20. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  1. Nuclear security standard: Argentina approach

    International Nuclear Information System (INIS)

    Bonet Duran, Stella M.; Rodriguez, Carlos E.; Menossi, Sergio A.; Serdeiro, Nelida H.

    2007-01-01

    Argentina has a comprehensive regulatory system designed to assure the security and safety of radioactive sources, which has been in place for more than fifty years. In 1989 the Radiation Protection and Nuclear Safety branch of the National Atomic Energy Commission created the 'Council of Physical Protection of Nuclear Materials and Installations' (CAPFMIN). This Council published in 1992 a Physical Protection Standard based on a deep and careful analysis of INFCIRC 225/Rev.2 including topics like 'sabotage scenario'. Since then, the world's scenario has changed, and some concepts like 'design basis threat', 'detection, delay and response', 'performance approach and prescriptive approach', have been applied to the design of physical protection systems in facilities other than nuclear installations. In Argentina, radioactive sources are widely used in medical and industrial applications with more than 1,600 facilities controlled by the Nuclear Regulatory Authority (in spanish ARN). During 2005, measures like 'access control', 'timely detection of intruder', 'background checks', and 'security plan', were required by ARN for implementation in facilities with radioactive sources. To 'close the cycle' the next step is to produce a regulatory standard based on the operational experience acquired during 2005. ARN has developed a set of criteria for including them in a new standard on security of radioactive materials. Besides, a specific Regulatory Guide is being prepared to help licensees of facilities in design a security system and to fulfill the 'Design of Security System Questionnaire'. The present paper describes the proposed Standard on Security of Radioactive Sources and the draft of the Nuclear Security Regulatory Guidance, based on our regulatory experience and the latest international recommendations. (author)

  2. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  3. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  4. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  5. 7 CFR 51.2731 - U.S. Spanish Splits.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false U.S. Spanish Splits. 51.2731 Section 51.2731... STANDARDS) United States Standards for Grades of Shelled Spanish Type Peanuts Grades § 51.2731 U.S. Spanish Splits. “U.S. Spanish Splits” consists of shelled Spanish type peanut kernels which are split or broken...

  6. Concept for Energy Security Matrix

    International Nuclear Information System (INIS)

    Kisel, Einari; Hamburg, Arvi; Härm, Mihkel; Leppiman, Ando; Ots, Märt

    2016-01-01

    The following paper presents a discussion of short- and long-term energy security assessment methods and indicators. The aim of the current paper is to describe diversity of approaches to energy security, to structure energy security indicators used by different institutions and papers, and to discuss several indicators that also play important role in the design of energy policy of a state. Based on this analysis the paper presents a novel Energy Security Matrix that structures relevant energy security indicators from the aspects of Technical Resilience and Vulnerability, Economic Dependence and Political Affectability for electricity, heat and transport fuel sectors. Earlier publications by different authors have presented energy security assessment methodologies that use publicly available indicators from different databases. Current paper challenges viability of some of these indicators and introduces new indicators that would deliver stronger energy security policy assessments. Energy Security Matrix and its indicators are based on experiences that the authors have gathered as high-level energy policymakers in Estonia, where all different aspects of energy security can be observed. - Highlights: •Energy security should be analysed in technical, economic and political terms; •Energy Security Matrix provides a framework for energy security analyses; •Applicability of Matrix is limited due to the lack of statistical data and sensitivity of output.

  7. Global Health Security Demands a Strong International Health Regulations Treaty and Leadership From a Highly Resourced World Health Organization.

    Science.gov (United States)

    Burkle, Frederick M

    2015-10-01

    If the Ebola tragedy of West Africa has taught us anything, it should be that the 2005 International Health Regulations (IHR) Treaty, which gave unprecedented authority to the World Health Organization (WHO) to provide global public health security during public health emergencies of international concern, has fallen severely short of its original goal. After encouraging successes with the 2003 severe acute respiratory syndrome (SARS) pandemic, the intent of the legally binding Treaty to improve the capacity of all countries to detect, assess, notify, and respond to public health threats has shamefully lapsed. Despite the granting of 2-year extensions in 2012 to countries to meet core surveillance and response requirements, less than 20% of countries have complied. Today it is not realistic to expect that these gaps will be solved or narrowed in the foreseeable future by the IHR or the WHO alone under current provisions. The unfortunate failures that culminated in an inadequate response to the Ebola epidemic in West Africa are multifactorial, including funding, staffing, and poor leadership decisions, but all are reversible. A rush by the Global Health Security Agenda partners to fill critical gaps in administrative and operational areas has been crucial in the short term, but questions remain as to the real priorities of the G20 as time elapses and critical gaps in public health protections and infrastructure take precedence over the economic and security needs of the developed world. The response from the Global Outbreak Alert and Response Network and foreign medical teams to Ebola proved indispensable to global health security, but both deserve stronger strategic capacity support and institutional status under the WHO leadership granted by the IHR Treaty. Treaties are the most successful means the world has in preventing, preparing for, and controlling epidemics in an increasingly globalized world. Other options are not sustainable. Given the gravity of ongoing

  8. Integrated security system definition

    International Nuclear Information System (INIS)

    Campbell, G.K.; Hall, J.R. II

    1985-01-01

    The objectives of an integrated security system are to detect intruders and unauthorized activities with a high degree of reliability and the to deter and delay them until effective response/engagement can be accomplished. Definition of an effective integrated security system requires proper application of a system engineering methodology. This paper summarizes a methodology and describes its application to the problem of integrated security system definition. This process includes requirements identification and analysis, allocation of identified system requirements to the subsystem level and provides a basis for identification of synergistic subsystem elements and for synthesis into an integrated system. The paper discusses how this is accomplished, emphasizing at each step how system integration and subsystem synergism is considered. The paper concludes with the product of the process: implementation of an integrated security system

  9. Attitudes toward Spanish and Code-Switching in Belize: Stigmatization and Innovation in the Spanish Classroom

    Science.gov (United States)

    Balam, Osmer; de Prada Pérez, Ana

    2017-01-01

    Through the analysis of survey and interview data, we investigated the attitudes and perceptions of 32 multilingual teachers of Spanish in Belize, a code-switching (CS) context where Spanish is in intense contact with English and Belizean Kriol. More specifically, we examined teachers' and students' attitudes toward Spanish and CS and teachers'…

  10. An Investigation of Anglicized Spanish as a Communication Strategy in the Beginning Spanish Classroom

    Science.gov (United States)

    Kobeck, Ashley Brianne

    2013-01-01

    Considering the recent increase in Spanish use in the United States, particularly as reflected in the media, beginning Spanish students are entering their classrooms with knowledge of phrases such as "hasta la vista" and "numero uno," regardless of their amount of previous formal Spanish study. The present research focuses on…

  11. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  12. Leveraging Formal Methods and Fuzzing to Verify Security and Reliability Properties of Large-Scale High-Consequence Systems

    Energy Technology Data Exchange (ETDEWEB)

    Ruthruff, Joseph. R. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Armstrong, Robert C. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Davis, Benjamin Garry [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Mayo, Jackson R. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Punnoose, Ratish J. [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2012-09-01

    Formal methods describe a class of system analysis techniques that seek to prove specific properties about analyzed designs, or locate flaws compromising those properties. As an analysis capability,these techniques are the subject of increased interest from both internal and external customers of Sandia National Laboratories. Given this lab's other areas of expertise, Sandia is uniquely positioned to advance the state-of-the-art with respect to several research and application areas within formal methods. This research project was a one-year effort funded by Sandia's CyberSecurity S&T Investment Area in its Laboratory Directed Research & Development program to investigate the opportunities for formal methods to impact Sandia's present mission areas, more fully understand the needs of the research community in the area of formal methods and where Sandia can contribute, and clarify from those potential research paths those that would best advance the mission-area interests of Sandia. The accomplishments from this project reinforce the utility of formal methods in Sandia, particularly in areas relevant to Cyber Security, and set the stage for continued Sandia investments to ensure this capabilityis utilized and advanced within this laboratory to serve the national interest.

  13. Las uniones conjuntivas en espanol (Conjunctive Correspondences in Spanish)

    Science.gov (United States)

    Perez Botero, Luis

    1977-01-01

    This study of the medieval Spanish concept of order examines uses made of the word "y" ("and") in Spanish medieval writing to join words and phrases connoting social, natural and human order. (Text is in Spanish.) (CHK)

  14. Spanish adaptation of social withdrawal motivation and frequency scales.

    Science.gov (United States)

    Indias García, Sílvia; De Paúl Ochotorena, Joaquín

    2016-11-01

    To adapt into Spanish three scales measuring frequency (SWFS) and motivation for social withdrawal (CSPS and SWMS) and to develop a scale capable of assessing the five motivations for social withdrawal. Participants were 1,112 Spanish adolescents, aged 12-17 years. The sample was randomly split into two groups in which exploratory and confirmatory (CFA) factor analyses were performed separately. A sample of adolescents in residential care (n = 128) was also used to perform discriminant validity analyses. SWFS was reduced to eight items that account for 40% of explained variance (PVE), and its reliability is high. SWMS worked adequately in the original version, according to CFA. Some items from the CSPS were removed from the final Spanish version. The newly developed scale (SWMS-5D) is composed of 20 items including five subscales: Peer Isolation, Unsociability, Shyness, Low Mood and Avoidance. Analyses reveal adequate convergent and discriminant validities. The resulting SWFS-8 and SWMS-5D could be considered useful instruments to assess frequency and motivation for social withdrawal in Spanish samples.

  15. False anglicisms in the Spanish language of fashion and beauty

    Directory of Open Access Journals (Sweden)

    Isabel Balteiro

    2012-10-01

    Full Text Available Many works have already dealt with anglicisms in Spanish, especially in science and information technologies. However, despite the high and growing number of English terms incorporated daily by the language of fashion, it has received comparative less attention in lexicographic and terminological studies than that of other areas, such as science or business. For several reasons, which include prestige or peer pressure, Spanish has not only adopted English words with new meanings and usage, but also contains other forms based on English patterns which users seem to consider more accurate or expressive. This paper concentrates on false anglicisms as indicators of some of the special relationships and influences between languages arising from the pervasive presence of English. We shall look at the Spanish language of fashion, which, in addition to genuine anglicisms, has for some time been using English words with different meanings, or even created items of its own (or imported them from other languages with the appearance of English words. These false anglicisms, which have proven extremely popular in receiving languages (not only in Spanish have frequently been disseminated by youth magazines and the new digital media, both in general spheres and in fashion-specific contexts.

  16. Game based cyber security training: are serious games suitable for cyber security training?

    OpenAIRE

    Hendrix, Maurice; Al-Sherbaz, Ali; Victoria, Bloom

    2016-01-01

    Security research and training is attracting a lot of investment and interest from governments and the private sector. Most efforts have focused on physical security, while cyber security or digital security has been given less importance. With recent high-profile attacks it has become clear that training in cyber security is needed. Serious Games have the capability to be effective tools for public engagement and behavioural change and role play games, are already used by security profession...

  17. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  18. Security culture for nuclear facilities

    Science.gov (United States)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  19. The “cost of not doing” energy planning: The Spanish energy bubble

    International Nuclear Information System (INIS)

    Gómez, Antonio; Dopazo, César; Fueyo, Norberto

    2016-01-01

    The Spanish power generation sector is facing dire problems: generation overcapacity, various tariff hikes over recent years, uncertainty over the financial viability of many power plants and a regulatory framework that lacks stability. This situation is the consequence of both poor energy policies and the economic crisis in the late 2000s and early 2010s. In this paper we analyze the following three points from an energy planning perspective: how the country has arrived at this situation; whether other alternatives would have been possible through adequate planning; and the quantitative benefits that would have been accrued from such planning. We do so by developing a LEAP model, and building three scenarios that allow to segregate the costs of the economic crisis from the costs of the lack of planning. We find that appropriate energy planning could have reduced investments in the Spanish power sector by 2010€28.6 billion without compromising on performance in terms of sustainability or energy security, while improving affordability. The main causes of these surplus investments were two supply bubbles: those of gas combined cycles and of solar technologies. The results of this work highlight the value of rigorous, quantitative energy planning, and the high costs of not doing it. - Highlights: • We analyze the costs of the lack of quantitative planning for energy-policy making. • We separate the costs of the economic crisis in Spain from the cost of not planning. • We find the “cost of not doing” energy planning to be 28.6 billion 2010EUR.

  20. Securitizing the Arctic indigenous peoples: A community security perspective with special reference to the Sámi of the European high north

    Science.gov (United States)

    Hossain, Kamrul

    2016-09-01

    The theory of securitization-the so-called Copenhagen school-centers the concept of security on various identified threats. Security based on the collective identity by which a society preserves its essential characteristics has been defined as community security, or societal security. The underlying principle of the Copenhagen school is that state-based, sovereignty-oriented security is ineffective unless the other components of security threats are addressed. The concept of human security, developed nearly simultaneously to that of securitization, identifies threat components at the sub-state level which are not traditionally understood as security concerns. Both schools of security thought are similar as they offer nontraditional approaches to understanding the concept of security. In this article, I explore securitization theory and the concept of human security to elaborate community perspectives in the understanding of security. In a case study, I investigate the security concerns of the indigenous peoples of the Arctic. The transformation of the Arctic by climate change and its impacts has resulted in new challenges and opportunities, so I explore how indigenous peoples in general and the Sámi in particular understand security which promotes their societal security. Although I show that this group of people deserves recognition and the ability to exercise greater authority, I conclude that diverse concepts of security do not by any means undermine the core traditional concept of security. These aspects of security remain subject to scrutiny by states and exist in a vertical structure. The Sámi, therefore, rely on affirmative actions by states to enjoy greater rights to maintain their community security.

  1. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  2. Security systems engineering overview

    International Nuclear Information System (INIS)

    Steele, B.J.

    1996-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.)

  3. Security systems engineering overview

    Science.gov (United States)

    Steele, Basil J.

    1997-01-01

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.

  4. The Suffix "-oso" in Central American Spanish.

    Science.gov (United States)

    Scavnicky, Gary Eugene A.

    1982-01-01

    Examines the lexical formative "-oso," which is added to nominal and verbal roots to form adjectives to denote possession of the quality contained in the primitive, in Central American Spanish. Concludes it is used with traditional Spanish denotations and has undergone various semantic shifts and is being applied to roots in a completely…

  5. "Proyecto Sherezade": Teaching Spanish Literature Interactively.

    Science.gov (United States)

    Fernandez, Enrique

    2001-01-01

    Describes "Proyecto Sherezade," an Internet-based project publicly available to anyone. Founded in 1996 by a group of Spanish language and literature academics in Canada and the United States, the project began as an Internet literary magazine that published non-established writers's short stories in Spanish and commentaries sent by readers.…

  6. Forms of Address in Chilean Spanish

    Science.gov (United States)

    Bishop, Kelley; Michnowicz, Jim

    2010-01-01

    The present investigation examines possible social and linguistic factors that influence forms of address used in Chilean Spanish with various interlocutors. A characteristic of the Spanish of Chile is the use of a variety of forms of address for the second person singular, "tu", "vos", and "usted", with corresponding…

  7. Personality traits as predictors of inpatient aggression in a high-security forensic psychiatric setting: prospective evaluation of the PCL-R and IPDE dimension ratings.

    Science.gov (United States)

    Langton, Calvin M; Hogue, Todd E; Daffern, Michael; Mannion, Aisling; Howells, Kevin

    2011-05-01

    The Dangerous and Severe Personality Disorder (DSPD) initiative in England and Wales provides specialized care to high-risk offenders with mental disorders. This study investigated the predictive utility of personality traits, assessed using the Psychopathy Checklist-Revised (PCL-R) and the International Personality Disorder Examination, with 44 consecutive admissions to the DSPD unit at a high-security forensic psychiatric hospital. Incidents of interpersonal physical aggression (IPA) were observed for 39% of the sample over an average 1.5-year period following admission. Histrionic personality disorder (PD) predicted IPA, and Histrionic, Borderline, and Antisocial PDs all predicted repetitive (2+ incidents of) IPA. PCL-R Factor 1 and Facets 1 and 2 were also significant predictors of IPA. PCL-R Factor 1 and Histrionic PD scores were significantly associated with imminence of IPA. Results were discussed in terms of the utility of personality traits in risk assessment and treatment of specially selected high-risk forensic psychiatric patients in secure settings.

  8. Calibration of a Gamma Spectrometry System Used for the Determination of Cs-137 in Spanish Soils

    International Nuclear Information System (INIS)

    Barreraa, M.; Romero, M. L.; Valino, F.

    2008-01-01

    The document describes the methodology used at CIEMAT in order to determine, by gamma spectrometry, the background levels of the radionuclide Cs-137 in soils of the Spanish peninsular territory. the work is a part of an extensive research project developed jointly by the University of the Basque Country (UPV-EHU) and the CIEMAT, endellite Content and migration of radiocaesium and radiostrontium in Spanish soils, which is funded by the Plan I+D of the Spanish Nuclear Security Council (CSN). The objective of the project is to establish the reference levels of man-made radionuclides in Spanish soils, with respect to which the evaluation of a possible posterior accidental release of radioactive material could be appraised. The activity concentration of the fission products Cs-137 has been determined in 34 soil cores extracted from representative Spanish soils type zones. This publication describes the experimental system employed, its calibration, the particular conditions applied to perform the measurements, as well as the experimental validation of the methodology. The activity profiles and inventories of the radioactive element so obtained are also presented. The estimation of the background Cs-137 reference levels, will provide a basis for later applications as the study of the spatial distribution in the region, the determination of the correlation between the deposited activity and the meteorological conditions, or the calculation of the specific migration parameters of the radioactive elements in Mediterranean conditions. (Author) 15 refs

  9. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  10. Cultural notions in Spanish Dictionaries for Foreigners

    Directory of Open Access Journals (Sweden)

    Luis Pablo-Núñez

    2017-11-01

    Full Text Available Although later than in English, Linguistics applied to the teaching of Spanish language has produced several didactic dictionaries for foreigners in the last two decades. This dictionaries include grammatical information in order to facilitate pronunciation, and morphological or syntactical comprehension; cultural notions, however, are more difficult to include because they go beyond the scope of the lexicon. Through the analysis of some terms related to folk music and gastronomy, we analyse the inclusion of Spanish and Latin American cultural notions in the three main dictionaries of Spanish for foreigners: the dictionary for the teaching of the Spanish language published by Vox-Alcalá University (Diccionario para la enseñanza de la lengua española, the Salamanca Dictionary (Diccionario Salamanca de la lengua española and the Spanish dictionary for foreigners of SM publishing house (Diccionario de español para extranjeros.

  11. Food marketing to children on U.S. Spanish-language television.

    Science.gov (United States)

    Kunkel, Dale; Mastro, Dana; Ortiz, Michelle; McKinley, Christopher

    2013-01-01

    Latino children in particular are at risk of childhood obesity. Because exposure to televised food marketing is a contributor to childhood obesity, it is important to examine the nutritional quality of foods advertised on Spanish-language children's programming. The authors analyzed a sample of 158 Spanish-language children's television programs for its advertising content and compared them with an equivalent sample of English-language advertising. The authors evaluated nutritional quality of each advertised product using a food rating system from the U.S. Department of Health and Human Services. In addition, the authors assessed compliance with industry self-regulatory pledges. The authors found that amount of food advertising on Spanish-language channels (M = 2.2 ads/hour) was lower than on English-language programs, but the nutritional quality of food products on Spanish-language channels was substantially poorer than on English channels. Industry self-regulation was less effective on Spanish-language channels. The study provides clear evidence of significant disparities. Food advertising targeted at Spanish-speaking children is more likely to promote nutritionally poor food products than advertising on English-language channels. Industry self-regulation is less effective on Spanish-language television channels. Given the disproportionately high rate of childhood obesity among Latinos, the study's findings hold important implications for public health policy.

  12. DSA for Secured Optical Communication

    International Nuclear Information System (INIS)

    Shojaei, A.A.; Amiri, I.S.

    2011-01-01

    Novel system of dark soliton array (DSA) for secured communication is proposed. The DSA are obtained by using a series micro ring resonators where the input wavelengths of λ 1 = 1516 nm, λ 2 = 1518 nm and λ 3 =1520 nm propagate inside the system and finally will be multiplexed. For security applications, the DSA can be tuned and amplified. The use of DSA for high capacity can be realized by using proposed secured system. (author)

  13. Tsunami hazard maps of spanish coast at national scale from seismic sources

    Science.gov (United States)

    Aniel-Quiroga, Íñigo; González, Mauricio; Álvarez-Gómez, José Antonio; García, Pablo

    2017-04-01

    Tsunamis are a moderately frequent phenomenon in the NEAM (North East Atlantic and Mediterranean) region, and consequently in Spain, as historic and recent events have affected this area. I.e., the 1755 earthquake and tsunami affected the Spanish Atlantic coasts of Huelva and Cadiz and the 2003 Boumerdés earthquake triggered a tsunami that reached Balearic island coast in less than 45 minutes. The risk in Spain is real and, its population and tourism rate makes it vulnerable to this kind of catastrophic events. The Indian Ocean tsunami in 2004 and the tsunami in Japan in 2011 launched the worldwide development and application of tsunami risk reduction measures that have been taken as a priority in this field. On November 20th 2015 the directive of the Spanish civil protection agency on planning under the emergency of tsunami was presented. As part of the Spanish National Security strategy, this document specifies the structure of the action plans at different levels: National, regional and local. In this sense, the first step is the proper evaluation of the tsunami hazard at National scale. This work deals with the assessment of the tsunami hazard in Spain, by means of numerical simulations, focused on the elaboration of tsunami hazard maps at National scale. To get this, following a deterministic approach, the seismic structures whose earthquakes could generate the worst tsunamis affecting the coast of Spain have been compiled and characterized. These worst sources have been propagated numerically along a reconstructed bathymetry, built from the best resolution available data. This high-resolution bathymetry was joined with a 25-m resolution DTM, to generate continuous offshore-onshore space, allowing the calculation of the flooded areas prompted by each selected source. The numerical model applied for the calculation of the tsunami propagations was COMCOT. The maps resulting from the numerical simulations show not only the tsunami amplitude at coastal areas but

  14. ICT INEQUALITIES IN THE SPANISH URBAN SYSTEM

    Directory of Open Access Journals (Sweden)

    Francisco Jose Armas QUINTA

    2010-12-01

    Full Text Available In the current Information Society cities enjoy a privileged position when it comes to transport and communication infrastructures. The post-industrial society has brought with it a notable change, changing from an economy based on the production of merchandise to another based on the production of services. The metropolitan areas act as key areas and markets for predominant sectors, such as finance and specialised services for business. In another way, big cities fulfil new roles in the global economy of the Information society, operating as command points in the world economy. They bring equipment together highly-qualified workers, they are big information and knowledge consumers and have been able to reinvent themselves, changing from industrial to cultural cities. They are, as well, ideal areas for big telecommunication companies and they are, for this reason, those who most benefit from information and communication technology. An important social area difference has then been introduced, with respect to other urban areas of lesser importance, or rather, with respect to rural areas that stay on the margin of the new technology revolution. In this context, it is right to ask what is happening in Spain. Why are ICT inequalities happening in Spain? Are there urban system differences before the arrival of the Information Society? Can it be said that Spanish urban areas are consolidated in the Information Society? In this article we try to outline the reality of the immersion the Information Society in the Spanish urban system, and, in the same way, bring to light a new idea of „Digital Divide‟, amongst those sectors of the population that make the most of all or a great part of the potential new technology offers and those that limit themselves to using the most basic functions, such as looking up information and using communication.

  15. Use of a Game-Like Application on a Mobile Device to Improve Accuracy in Conjugating Spanish Verbs

    Science.gov (United States)

    Castañeda, Daniel A.; Cho, Moon-Heum

    2016-01-01

    Interest in using mobile applications to enhance students' learning in Spanish classrooms runs high; however, little empirical research about their effects has been conducted. Using intentionally designed classroom activities to promote meaningful learning with a mobile application, we investigated the extent to which students of Spanish as a…

  16. Pitfalls in Measuring the Health Status of Mexican Americans: Comparative Validity of the English and Spanish Sickness Impact Profile.

    Science.gov (United States)

    Deyo, Richard A.

    1984-01-01

    A test found responses to the Sickness Impact Profile highly reliable, whether administered in Spanish or English. However, construct validity of responses by Mexican Americans using the Spanish version, non-Hispanics using the English version, and Mexican Americans using the English version was weak. (CMG)

  17. 8 CFR 252.5 - Special procedures for deserters from Spanish or Greek ships of war.

    Science.gov (United States)

    2010-01-01

    ... Spanish or Greek ships of war. 252.5 Section 252.5 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY... Greek ships of war. (a) General. Under E.O. 11267 of January 19, 1966 (31 FR 807) and 28 CFR 0.109, and... a ship of war of that government, while in any port of the United States, and on proof by the...

  18. Carbon in Spanish electric system; El carbon en el sistema electrico espanol

    Energy Technology Data Exchange (ETDEWEB)

    Menendez Perez, E.; Camara Rascon, A.

    2002-07-01

    In this document is analysed the electrical Spanish system in the horizon of the three next decades, revising the different sources of generation, but with the look focused specifically toward the paper that the coal must play in the same, having basically to debit the questions of energetic security, environmental incidence that implies the use of the coal, and the social and economic aspects. (Author)

  19. Highly processed, highly packaged, very unhealthy. But they are low risk”: exploring intersections between community food security and food safety

    Science.gov (United States)

    Kelsey A., Speed; Samantha B., Meyer; Rhona M., Hanning; Shannon E., Majowicz

    2017-01-01

    Abstract Introduction: Food insecurity and foodborne disease are important issues in Canada, and the public health actions taken to address them can be conceptualized as factors shaping the food environment. Given emerging evidence that these two areas may interrelate, the objective of this study was to explore ways in which community food security efforts and food safety practices (and the population health issues they aim to address) may intersect in British Columbia, Canada, and interpret what this might mean for conceptualizing and attaining healthier food environments. Methods: We conducted 14 key informant interviews with practitioners working in community food security and food safety in British Columbia, and used qualitative descriptive analysis to identify examples of intersections between the sectors. Results: Participants identified four key ways that the two sectors intersect. They identified (1) how their daily practices to promote safe or healthy food could be helped or hindered by the activities of the other sector; (2) that historically disjointed policies that do not consider multiple health outcomes related to food may complicate the interrelationship; (3) that the relationship of these sectors is also affected by the fact that specific types of food products, such as fresh produce, can be considered both risky and beneficial; and (4) that both sectors are working towards the same goal of improved population health, albeit viewing it through slightly different lenses. Conclusion: Food security and food safety connect in several ways, with implications for characterizing and improving Canadian food environments. Collaboration across separated public health areas related to food is needed when designing new programs or policies aimed at changing the way Canadians eat. PMID:29043759

  20. Evaluation of the security of a hydrogen producing plant by means of the S I cycle coupled to a nuclear reactor of high temperature

    International Nuclear Information System (INIS)

    Ruiz S, T.; Francois, J. L.; Nelson, P. F.; Cruz G, M. J.

    2011-11-01

    At the present one of the processes that demonstrates, theoretically, to be one of the most efficient for the hydrogen production is the thermal-chemistry cycle Sulfur-Iodine. One way of obtaining the temperature ranges required by the process is through the helium coming from a very high temperature reactor. The coupling of the chemical plant with the nuclear plant presents aspects of security that should be analyzed; among them the analysis of the danger of the process materials is, with the purpose of implementing security measures to protect the facilities and equipment s, the environment and the population. These measures can be: emergency answer plans of the stations, definition of the minimum distance required among facilities, determination of the exclusion area, etc. In this study simulations were made with the computer code Phast in order to knowing the possible affectation areas due to the liberation of a great quantity of energy due to a helium leak to very high temperature, of toxic materials or by a possible hydrogen combustion. The results for the liberations of sulfuric acid, hydrogen, iodine, helium and sulfur dioxide are shown, specially. The operation conditions were taken of a combination of the preliminary design proposed by General Atomics and the optimized conditions by the Korea Advanced Institute of Science and Technology, considering a production of 1 kg-mol/s of hydrogen. The iodine was the material that presented a major affectation area. (Author)

  1. Computers, business, and security the new role for security

    CERN Document Server

    Schweitzer, James A

    1987-01-01

    Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs.Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communicat

  2. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  3. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  4. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  5. Military veterans and Social Security.

    Science.gov (United States)

    Olsen, Anya

    There are 9.4 million military veterans receiving Social Security benefits, which means that almost one out of every four adult Social Security beneficiaries has served in the United States military. In addition, veterans and their families make up almost 40 percent of the adult Social Security beneficiary population. Policymakers are particularly interested in military veterans and their families and have provided them with benefits through several government programs, including Social Security credits, home loan guarantees, and compensation and pension payments through the Department of Veterans Affairs. It is therefore important to understand the economic and demographic characteristics of this population. Information in this article is based on data from the March 2004 Current Population Survey, a large, nationally representative survey of U.S. households. Veterans are overwhelmingly male compared with all adult Social Security beneficiaries who are more evenly split between males and females. Military veterans receiving Social Security are more likely to be married and to have finished high school compared with all adult Social Security beneficiaries, and they are less likely to be poor or near poor than the overall beneficiary population. Fourteen percent of veterans receiving Social Security benefits have income below 150 percent of poverty, while 25 percent of all adult Social Security beneficiaries are below this level. The higher economic status among veterans is also reflected in the relatively high Social Security benefits they receive. The number of military veterans receiving Social Security benefits will remain high over the next few decades, while their make-up and characteristics will change. In particular, the number of Vietnam War veterans who receive Social Security will increase in the coming decades, while the number of veterans from World War II and the Korean War will decline.

  6. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  7. Competition, regulation, and pricing behavior in the Spanish retail gasoline market

    OpenAIRE

    Contín Pilart, Ignacio; Correljé, Aad F.; Palacios, María Blanca

    2006-01-01

    The restructuring of the Spanish oil industry produced a highly concentrated oligopoly in the retail gasoline market. In June 1990 the Spanish government introduced a system of ceiling price regulation in order to ensure that "liberalization" was accompanied by adequate consumer protection. This paper examines the pricing behavior of the retail gasoline market using multivariate error correction models over the period January 1993 (abolishment of the state monopoly)-December 2004. The results...

  8. THE ROLE OF QUALITY: SPANISH WOOL IN PORTUGUESE TRADE IN THE EARLY NINETEENTH CENTURY

    Directory of Open Access Journals (Sweden)

    Maria Cristina Moreira

    2007-01-01

    Full Text Available Cross-referencing qualitative and quantitative statistics from handwritten Portuguese trade sources shows the Spanish in the first half of the 19th century using Portuguese trade to introduce their wool in English and other markets. High quality Spanish merino wool played a key role in Portuguese trade during this period, particularly in the golden years of 1809-1819 and 1825. Its quality intensified both legal trade and smuggling.

  9. The Spanish Constitutional Rights Court and its interpretation of the Term 'Feminism

    OpenAIRE

    Alejandra Germán Doldán

    2015-01-01

    The Constitutional Tribunal, the highest judicial court involved in the interpretation of the Spanish Constitution, has issued numerous judgments of high technical value in order to advance gender equality. Its decisions had widely developed, as a guarantee, the prohibition of gender discrimination included in Article 14 of the Spanish Constitution. However, these decisions had not always employed theoretically accurate concepts or adequately refined conceptual models This article is a critic...

  10. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  11. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  12. Forecasting Spanish natural life expectancy.

    Science.gov (United States)

    Guillen, Montserrat; Vidiella-i-Anguera, Antoni

    2005-10-01

    Knowledge of trends in life expectancy is of major importance for policy planning. It is also a key indicator for assessing future development of life insurance products, substantiality of existing retirement schemes, and long-term care for the elderly. This article examines the feasibility of decomposing age-gender-specific accidental and natural mortality rates. We study this decomposition by using the Lee and Carter model. In particular, we fit the Poisson log-bilinear version of this model proposed by Wilmoth and Brouhns et al. to historical (1975-1998) Spanish mortality rates. In addition, by using the model introduced by Wilmoth and Valkonen we analyze mortality-gender differentials for accidental and natural rates. We present aggregated life expectancy forecasts compared with those constructed using nondecomposed mortality rates.

  13. Reconsidering Subextraction: Evidence from Spanish

    Directory of Open Access Journals (Sweden)

    Ignacio Bosque

    2014-11-01

    Full Text Available This paper argues that so-called subextraction (e.g., Whoi has John seen a picture of ti ?; cf. Corver 2006 for recent discussion does not involve movement of a wh-phrase to a DP internal escape hatch position before reaching the CP layer. Instead, we claim that apparently subextracted wh-phrases are actually direct dependents of the verb after a process of reanalysis (or readjustment; cf. Chomsky 1977, Kayne 2002 applies. Our proposal rethinks an old (Bach & Horn 1976 idea, reframes it in modern terms and argues against the cyclic status of DPs (cf. Bruening 2009, Leu 2008, Ott 2008, and references therein, by leaning on new evidence from Spanish. The non-cyclic status of DPs is a fairly standard idea ever since clausal properties were assumed to hold for nominal domains (cf. Chomsky 1970, Brame 1982, Abney 1987, and much subsequent literature.

  14. Slovenian and Spanish electricity markets

    International Nuclear Information System (INIS)

    Bregar, Z.

    2004-01-01

    Spanish electricity market has served as a basic model in the construction of the electricity market in Slovenia. However, in the final phase of its development additional solutions were adopted from other European and worldwide electricity markets. The electricity market thus obtained is in some aspects more complex and in others simpler with regard to the original model. This article describes two of the new solutions on the Slovenian electricity market: the introduction of numerous standardized electric energy products (Band, Peak, Off-peak, Hourly power etc.) to be traded on completely separate markets, and the introduction of continuous, real-time type trading on all of them but the hourly market.(author)

  15. Genesis of enterprise financial security

    Directory of Open Access Journals (Sweden)

    Davydenko N. M.

    2015-05-01

    Full Text Available The article analyzes the scientific approaches to the definition of «financial security of entities», advantages and disadvantages of these approaches are highlighted. The own definition of financial security of entities is given. The composition of elements of enterprise financial security and principles of its provision are defined. Тhe role of individual elements of financial security to ensure high efficiency operation and development of enterprises is significant and has a direct impact on their solvency, liquidity and profitability.

  16. Lecture 3: Web Application Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture focuses on security aspects of Web application development. Various vulnerabilities typical to web applications (such as Cross-site scripting, SQL injection, cross-site request forgery etc.) are introduced and discussed. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support servic...

  17. [Biological security confronting bioterrorism].

    Science.gov (United States)

    Suárez Fernández, Guillermo

    2002-01-01

    A review is made on Biosecurity at both local and global level in relationship with Bioterrorism as a real threat and its control and prevention. The function of the network of High Security Laboratories around the world able to make immediate diagnosis, research on vaccines, fundamental and urgent epidemiological studies, conform a steady basis to control natural infections and also the possible bioterrorism attacks.

  18. Today's School Security

    Science.gov (United States)

    Kennedy, Mike

    2012-01-01

    Outbreaks of violence at education institutions typically do not rise to the horrific levels of Virginia Tech, Columbine High School, or Oikos University. But incidents that threaten school security--bullying, hazing, online harassment--take place in every month of the year and may occur in any classroom or campus from coast to coast. Schools and…

  19. Application Security Automation

    Science.gov (United States)

    Malaika, Majid A.

    2011-01-01

    With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…

  20. Home Network Security

    NARCIS (Netherlands)

    Scholten, Hans; van Dijk, Hylke

    2008-01-01

    Service discovery and secure and safe service usage are essential elements in the deployment of home and personal networks. Because no system administrator is present, setup and daily operation of such a network has to be automated as much as possible with a high degree of user friendliness. To

  1. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  2. Nuclear security officer training

    International Nuclear Information System (INIS)

    Harrington, W.F.

    1981-01-01

    Training has become complex and precise in today's world of critical review and responsibility. Entrusted to a security officer is the success or demise of large business. In more critical environments the security officer is entrusted with the monitoring and protection of life sensitive systems and devices. The awareness of this high visibility training requirement has been addressed by a limited few. Those involved in the nuclear power industry through dedication and commitment to the American public have without a doubt become leading pioneers in demanding training excellence

  3. The Dawns of the Spanish Geo technic

    International Nuclear Information System (INIS)

    Serrano Gonzalez, A.

    2013-01-01

    From a personal perspective, there are analyzed the first steps of the spanish Geotechnical Engineering history understood as an academic discipline but also linked in a very directly way the profession. This evolution is not foreign to the own history of the Geneticist in other countries of our cultural or geographical environment. The contributions discover that our predecessors transmitted important achievements to the international community. The direct presence in the international congresses of that time of the spanish geo technicians is analysed. Three consecutive stages are distinguished, personalizing in each of them the participation of celebrated spanish Civil Engineers. (Author)

  4. Cooperative Security: New Horizons for International Order

    National Research Council Canada - National Science Library

    Cohen, Richard; Mihalka, Michael

    2001-01-01

    .... Both are controversial. Richard Cohen presents a compelling and highly original model of Cooperative Security -- a term that once was applied almost exclusively to the Organization for Security and Co-operation in Europe (OSCE...

  5. Indicators for energy security

    International Nuclear Information System (INIS)

    Kruyt, Bert; Van Vuuren, D.P.; De Vries, H.J.M.; Groenenberg, H.

    2009-01-01

    The concept of energy security is widely used, yet there is no consensus on its precise interpretation. In this research, we have provided an overview of available indicators for long-term security of supply (SOS). We distinguished four dimensions of energy security that relate to the availability, accessibility, affordability and acceptability of energy and classified indicators for energy security according to this taxonomy. There is no one ideal indicator, as the notion of energy security is highly context dependent. Rather, applying multiple indicators leads to a broader understanding. Incorporating these indicators in model-based scenario analysis showed accelerated depletion of currently known fossil resources due to increasing global demand. Coupled with increasing spatial discrepancy between consumption and production, international trade in energy carriers is projected to have increased by 142% in 2050 compared to 2008. Oil production is projected to become increasingly concentrated in a few countries up to 2030, after which production from other regions diversifies the market. Under stringent climate policies, this diversification may not occur due to reduced demand for oil. Possible benefits of climate policy include increased fuel diversity and slower depletion of fossil resources. (author)

  6. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  7. Espanol para Hoteleria y Turismo = Spanish for Travel and Tourism.

    Science.gov (United States)

    Montes, Yara G.

    This beginning through advanced Spanish text includes grammar explanations, readings, and exercises with the emphasis on situations involving travel and tourism. The introductory lesson covers the Spanish language, the importance of Spanish in the United States, the Spanish alphabet, pronunciation, capitalization, punctuation, syllabication,…

  8. 16 CFR 455.5 - Spanish language sales.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Spanish language sales. 455.5 Section 455.5... § 455.5 Spanish language sales. If you conduct a sale in Spanish, the window form required by § 455.2... vehicle both an English language window form and a Spanish language translation of that form. Use the...

  9. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  10. First generation of Spanish authors to disseminate hospitality and tourism research internationally

    Directory of Open Access Journals (Sweden)

    Jesús Manuel López-Bonilla

    2017-09-01

    Full Text Available Spanish researchers have shown an increasing interest in the bibliometric analysis of tourism research. However, as of yet a sufficiently comprehensive authorship analysis on Spanish tourism research has not been performed. This study analyses the international scientific output of scholars in Spain. The search was performed using the Scopus database from 2002 to 2013. It established a ranking of 79 Spanish authors who have published six or more papers in international scientific journals. The average number of Spanish co-authors per paper is high with respect to international authors. Also, a clear gender inequality is observed, with male authors dominating. The areas of Economy and Marketing stand out for the total number of papers produced in them, as do the universities of Islas Baleares and Alicante for their output.

  11. Using the Hemophilia Joint Health Score for assessment of children: Reliability of the Spanish version.

    Science.gov (United States)

    R, Cuesta-Barriuso; A, Torres-Ortuño; S, Pérez-Alenda; J, Carrasco Juan; F, Querol; J, Nieto-Munuera; Ja, López-Pina

    2018-02-27

    Numerous measuring instruments for the evaluation of hemophilic arthropathy have been developed. One of the most used systems is the Hemophilia Joint Health Score (HJHS) given its sensitivity to clinical changes appearing in the joints because of recurrent hemarthrosis. Assessing the interrater reliability, using the Spanish version of the HJHS (version 2.1) in children with hemophilia. Reliability study to assess the interrater reliability of the Spanish version of HJHS. A sample of 36 children aged 7-13 years diagnosed with hemophilia A or B was used. Two physiotherapists performed physical assessments with the Spanish version of the HJHS. Descriptive statistics (range, mean, standard deviation) and the analysis of interrater reliability were calculated. The interrater reliability was heterogeneous since the Kappa coefficient range (ĸ), although significant (p reliability of the Spanish population version of the HJHS is high. This scale should be used generically in evaluating musculoskeletal pediatric patients with hemophilia.

  12. Multi-Level Secure Local Area Network

    OpenAIRE

    Naval Postgraduate School (U.S.); Center for Information Systems Studies Security and Research (CISR)

    2011-01-01

    Multi-Level Secure Local Area Network is a cost effective, multi-level, easy to use office environment leveraging existing high assurance technology. The Department of Defense and U.S. Government have an identified need to securely share information classified at differing security levels. Because there exist no commercial solutions to this problem, NPS is developing a MLS LAN. The MLS LAN extends high assurance capabilities of an evaluated multi-level secure system to commercial personal com...

  13. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  14. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  15. Temperature and seasonality influences on Spanish electricity load

    International Nuclear Information System (INIS)

    Pardo, Angel; Meneu, Vicente; Valor, Enric

    2002-01-01

    Deregulation of the Spanish electricity market in 1998 and the possible listing of electricity or weather derivative contracts have encouraged the study of the relationship between electricity demand and weather in Spain. In this paper, a transfer function intervention model is developed for forecasting daily electricity load from cooling and heating degree-days. The influence of weather and seasonality is proved, and is significant even when the autoregressive effects and the dynamic specification of the temperature are taken into account. The estimated general model shows a high predictive power. The results and information presented in this paper could be of interest for current users and potential traders in the deregulated Spanish electricity market

  16. Temperature and seasonality influences on Spanish electricity load

    Energy Technology Data Exchange (ETDEWEB)

    Pardo, Angel; Meneu, Vicente [Departamento de Economia Financiera y Matematica, Facultad de Economia, Avda. de los Naranjos s/n., Edificio Departamental Oriental, Universidad de Valencia, 46022 Valencia (Spain); Valor, Enric [Departamento de Termodinamica, Universidad de Valencia, 46100 Burjassot, Valencia (Spain)

    2002-01-01

    Deregulation of the Spanish electricity market in 1998 and the possible listing of electricity or weather derivative contracts have encouraged the study of the relationship between electricity demand and weather in Spain. In this paper, a transfer function intervention model is developed for forecasting daily electricity load from cooling and heating degree-days. The influence of weather and seasonality is proved, and is significant even when the autoregressive effects and the dynamic specification of the temperature are taken into account. The estimated general model shows a high predictive power. The results and information presented in this paper could be of interest for current users and potential traders in the deregulated Spanish electricity market.

  17. Spanish Minister of Science and Technology visits ATLAS

    CERN Multimedia

    Patrice Loïez

    2002-01-01

    H.E. Mr Josep Piqué i Camps, Minister for Science and Technology, Spain, pictured in front of a barrel toroid cryostat vessel in the ATLAS assembly hall. The air-core ATLAS barrel toroid magnet system will consist of eight large superconducting coils, each in its own vacuum vessel, built by Spanish company Felguera Construcciones Mecanicas SA under the responsibility of IFAE (Institute for High Energy Physics), Barcelona. Photo 01: The Minister in front of the cryostat vessel. Photo 02: The Minister (right) with H.E. Mr Joaquin Pérez-Villanueva y Tovar, Spanish Ambassador to the United Nations in Geneva. Photo 03: (left to right) Manuel Delfino, leader of the Information Technology division at CERN; Matteo Cavalli-Sforza of CERN; Juan Antonio Rubio, leader of the Education and Technology Transfer division at CERN; The Minister; and Peter Jenni, ATLAS spokesperson.

  18. Reliability and validity of the Spanish version of the modified Yale Preoperative Anxiety Scale.

    Science.gov (United States)

    Jerez, C; Ullán, A M; Lázaro, J J

    2016-01-01

    To minimise preoperative stress and increase child cooperation during induction of anaesthesia is one of the most important perioperative objectives. The modified Yale Preoperative Anxiety Scale was developed to evaluate anxiety. The aim of this study was to translate into Spanish, and validate the psychometric properties of the Spanish version of this scale. The Spanish translation of the scale was performed following the World Health Organisation guidelines. During induction of anaesthesia, 81 children aged 2 to 12 years were recorded. Two observers evaluated the recordings independently. Content validity index of modified Yale Preoperative Anxiety Scale Spanish version was assessed. Weighted Kappa was calculated to measure interobserver agreement, and the Pearson correlation between the Induction Compliance Checklist and the modified Yale Preoperative Anxiety Scale was determined. The Spanish version obtained high content validity (0.91 to 0.98). Reliability analysis using weighted Kappa statistics revealed that interobserver agreement ranged from 0.54 to 0.75. Concurrent validity was high (r=0.94; P<.001). Validated assessment tools are needed to evaluate interventions to reduce child preoperative anxiety. The Spanish version of the modified Yale Preoperative Anxiety Scale evaluated in this study has shown good psychometric properties of reliability and validity. Copyright © 2015 Sociedad Española de Anestesiología, Reanimación y Terapéutica del Dolor. Publicado por Elsevier España, S.L.U. All rights reserved.

  19. The Impact of a Systematic and Explicit Vocabulary Intervention in Spanish with Spanish-Speaking English Learners in First Grade

    Science.gov (United States)

    Cena, Johanna; Baker, Doris Luft; Kame'enui, Edward J.; Baker, Scott K.; Park, Yonghan; Smolkowski, Keith

    2013-01-01

    This study examined the impact of a 15-min daily explicit vocabulary intervention in Spanish on expressive and receptive vocabulary knowledge and oral reading fluency in Spanish, and on language proficiency in English. Fifty Spanish-speaking English learners who received 90 min of Spanish reading instruction in an early transition model were…

  20. 7 CFR 51.2734 - Spanish type.

    Science.gov (United States)

    2010-01-01

    ... FRESH FRUITS, VEGETABLES AND OTHER PRODUCTS 1,2 (INSPECTION, CERTIFICATION, AND STANDARDS) United States... peanuts of varieties which belong to the Spanish classification group and which are free from kernels of...

  1. Big increase in Spanish reseach funding

    CERN Document Server

    Bosch, X

    1998-01-01

    The Spanish government plans to increase spending on civilian science research and development by between 8 and 10 per cent. The exact figure is unclear since it has been included in the budget along with military research projects (1 page).

  2. Lexicalisation Patterns in Danish and Spanish

    DEFF Research Database (Denmark)

    Woldersgaard, Casper A. G

    In this dissertation, I investigate the theoretical framework by Leonard Talmy (2000b) on lexicalisation patterns in Motion events. I examine his characterisations of Co-event languages (e.g., Danish) and Path-event languages (e.g., Spanish), and I relate his work to a Danish language setting....... Furthermore, my objective is to determine whether the predictions set forth by Talmy apply to Danish and Spanish from an empirical perspective, i.e., in a Danish monolingual reference corpus, Korpus-DK, and a Spanish monolingual reference corpus, CORPES. I present different methods for testing Talmy’s theory....... As a consequence, to identify Motion events and discard false positives is an extremely time-consuming process. I suggest that a context-free grammar is a way to facilitate the retrieval and analysis of linguistic data that contain Motion events. Thus, I implement a context-free grammar for Spanish. More...

  3. Cancer Currents Now Available in Spanish

    Science.gov (United States)

    As part of our effort to more effectively reach patients, health care providers, and researchers with timely, authoritative, and scientifically accurate cancer information, we are now offering selected Cancer Currents blog posts in Spanish.

  4. Prevention of adolescent depression in the Spanish-speaking world

    OpenAIRE

    Horn, Andrea B; Canizares, Catalina; Gomez, Yvonne

    2014-01-01

    This paper aims at presenting programs targeted at the prevention of adolescent depression applied with Spanish-speaking populations that have been developed in Spanish-speaking countries and are mostly published in Spanish. These programs have been developed under different cultural contexts in Spain and Latin-America. The main goal of this paper is to make the studies and movements of the Spanish-speaking literature in this field accessible to the non-Spanish-speaking part of the research c...

  5. Model-Based Security Testing

    Directory of Open Access Journals (Sweden)

    Ina Schieferdecker

    2012-02-01

    Full Text Available Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on test identification and specification as well as for automated test generation. Model-based security testing (MBST is a relatively new field and especially dedicated to the systematic and efficient specification and documentation of security test objectives, security test cases and test suites, as well as to their automated or semi-automated generation. In particular, the combination of security modelling and test generation approaches is still a challenge in research and of high interest for industrial applications. MBST includes e.g. security functional testing, model-based fuzzing, risk- and threat-oriented testing, and the usage of security test patterns. This paper provides a survey on MBST techniques and the related models as well as samples of new methods and tools that are under development in the European ITEA2-project DIAMONDS.

  6. Nuclear Security Education in Morocco

    International Nuclear Information System (INIS)

    Hakam, O.K.

    2015-01-01

    Morocco has made significant progress in the field of nuclear security by supporting the efforts and activities of the International Atomic Energy Agency (IAEA), promoting nuclear security under international initiatives and continues to undertake actions aiming at strengthening capacity building in nuclear security. As well, Morocco has developed a new law on radiological and nuclear safety and security which was promulgated in 2014. Some Moroccan universities in cooperation with the IAEA-International Nuclear Security Education Network (INSEN) and the US-DoS Partnership for Nuclear Security (PNS) are working to develop their nuclear security educational programmes. In this regard, faculties who have been involved in INSEN Professional Development Courses (PDCs) have acquired a high-quality of knowledge and teaching tools in nuclear security topics that led them to be able to develop and teach their nuclear security curriculum as is the case at the University of Ibn Tofail. Furthermore, University of Ibn Tofail has developed in 2014 with collaboration with CRDFGlobal the first Institute of Nuclear Material Management (INMM) Student Chapter in Africa. This Chapter has organized many events to promote best practices among the young generation. Moreover, University of Ibn Tofail and Brandenburg University in Germany are working to develop a PDC on Nuclear IT/Cyber Security to be held in Kenitra, Morocco. This PDC aims at building capacity among the academic communities from Africa and MENA Region in order to further raise awareness, develop and disseminate best practices, increase professional standards and therefore enhance nuclear security culture. So, this paper will present some nuclear security education activities in Morocco and more specifically at the University of Ibn Tofail. These activities involve women as leaders but also contribute in education and training of young generation of women in nuclear field. (author)

  7. The Spanish participation in the SKA

    Science.gov (United States)

    Verdes-Montenegro, L.; Garrido, J.; González-García, M.

    2017-03-01

    The Square Kilometre Array (SKA) will be a radio interferometer aiming to answer fundamental questions in Astrophysics, Fundamental Physics, and Astrobiology. It will be composed of thousands of antennas distributed over distances of more than 3000 kilometres on both Africa and Australia. The SKA has been recently identified as a Landmark Project in the European Strategy Forum on Research Infrastructures (ESFRI) roadmap. Spain has been participating in SKA-related activities since the 1990s, coordinated since 2011 by the Instituto de Astrofísica de Andalucía (IAA-CSIC). Up to now, 21 researchers participate in 7 out of the 11 main SKA Science Working Groups, and a total of 119 researchers from 40 Spanish centres have participated in the Spanish SKA White Book, published in 2015. From a technological point of view, more than 20 research centres and companies are contributing to the design of the SKA as part of 7 international consortia. The Spanish contribution was estimated in 2M euro (2014), officially recognized by the SKA Organisation Director General in a letter to the Spanish Ministry of Economy and Competitiveness. In addition, the Spanish Astronomy Infrastructures Network (RIA from its Spanish initials) issued a recommendation on the interest of the scientific community and industry that Spain explores the possibility to join the SKA project as Full Member before the construction phase starts. In December 2015, the Spanish Secretary of State of Research, Development and Innovation sent a letter to the SKA Organisation Director General proposing to establish a dialogue in order to explore scenarios for Spain to join the SKA, what constitutes a further motivation for the Spanish community to continue its efforts.

  8. Internationalisation of Spanish fashion brand Zara

    OpenAIRE

    Lopez, C; Fan, Y

    2008-01-01

    Zara is one of the world’s most successful fashion retailers operating in 59 countries. However, there is little research about the firm in English as the majority of publications have been written in Spanish. This paper seeks to address this gap in the literature by examining the internationalisation process of Zara. This study adopts an in-depth case approach based on extensive secondary research. Literature published in both English and Spanish has been reviewed, including c...

  9. The Supply of Medical Radioisotopes. Final Report of the Third Mandate of the High-level Group on the Security of Supply of Medical Radioisotopes (2013-2015)

    International Nuclear Information System (INIS)

    Charlton, Kevin; )

    2016-07-01

    At the request of its member countries, the Organisation for Economic Co-operation and Development (OECD) Nuclear Energy Agency (NEA) became involved in global efforts to ensure a secure supply of molybdenum-99 ( 99 Mo)/technetium-99m ( 99m Tc). In April 2009, the High-level Group on the Security of Supply of Medical Radioisotopes (HLG-MR) was created and received an initial, two-year mandate from the NEA Steering Committee for Nuclear Energy to examine the causes of supply shortages of 99 Mo/ 99m Tc and develop a policy approach to address them. In its first mandate, the HLG-MR conducted a comprehensive economic study of the 99 Mo/ 99m Tc supply chain, which identified the key areas of vulnerability and major issues to be addressed. The HLG-MR released a policy approach, including six principles (Appendix 1) and supporting recommendations to help resolve the issues in the 99 Mo/ 99m Tc market. In the second mandate (2011-2013), the HLG-MR worked to encourage the implementation of the six policy principles and promoted an industry transition away from the use of highly enriched uranium (HEU) targets for 99 Mo production. Projects were undertaken by the NEA that resulted in the publication of documents and reports to assist in implementing the HLG-MR policy approach. The second mandate showed that, while commendable progress had occurred in many areas, there were still major issues in the 99 Mo/ 99m Tc market, with some continued government subsidisation, insufficient ORC and inadequate reimbursement for 99 mTc. Potential future periods of supply shortage were identified, particularly concerning the likely loss of significant capacity around 2016. In the third mandate, the HLG-MR continued its efforts to help ensure the global security of supply of 99 Mo/ 99m Tc through implementation of the six policy principles. The NEA undertook a further self-assessment review of the 99 Mo/ 99m Tc supply chain, focusing again on progress with implementing FCR and paid ORC and

  10. Spanish Nuclear Industry in Lungmen Project

    International Nuclear Information System (INIS)

    Alomar, F.

    1998-01-01

    Spain's Advanced Nuclear Reactors Programs, under DTN's leadership, has meant an active participation the American Design of Advanced Nuclear Power Plants, in both General Electric and Westinghouse Programs. This collaboration has given to the Companies, which directly involved, an in-depth knowledge of both Development Programs, as well as it has allowed to establish relationships with Nuclear Island DTN's coordination. These Companies included a broad sample of Spanish Companies most interest in the Nuclear Field: DTN representing Spanish Utilities with Nuclear Assets; Empresarios Agrupados and INITEC as a Joint Venture, representing Spanish A/E; Equipos Nucleares, S.A., representing Nuclear Components Manufacturers; Tecnatom, representing Nuclear Services and Engineering and CIEMAT as National Laboratory. Taiwan Electric Power has awarded its two 1300 MWe Lungmen Units to General Electric. Knowledge acquired by these Spanish Companies along FOAKE First of kind then Engineering has allowed them to bid for some authorities in Lungmen NPP and in some cases to get important awards. Furthermore, the good working relationship which has been established has made way for other Spanish Companies to bid for other Project Packages. On a case by case basis the response of Spanish manufacturer has been irregular . In some instances manufactures have stopped manufacturing nuclear components, and in other instances a distinct lack of interest has been detected. (Author)

  11. Problems in use and security of measurement of high temperature strain gages at various temperature limits up to 10000C

    International Nuclear Information System (INIS)

    Ziegler, K.

    1982-01-01

    The examples given show the quality and use of manufacturers' data for a series of behaviour criteria for strain gages in the high temperature region. These results should not only be regarded critically. The manufacturer must appreciate that the very costly programme of investigations on the users' side represents a product development for large parts for the manufacturer of the strain gauges. It would therefore be desirable if these considerations were to initiate investigations on the manufacturer's part, in order to clear up the problematic are of the use of strain gages in the high temperature field, in order to provide the customer with more reliable and better strain gage characteristics for very expensive high temperature strain measurements. (orig.) [de

  12. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  13. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  14. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  15. Airborne metals in Spanish moss

    Energy Technology Data Exchange (ETDEWEB)

    Connor, J.J.; Shacklette, H.T.

    1973-01-01

    One hundred twenty-three samples of Spanish moss (Tillandsia usneoides L.) were collected throughout the southern United States to assess the potential use of the plant as a natural long-term integrator of local atmospheric metal burdens. R-mode components analysis of the ash chemistry strongly suggests that at least five nearly uncorrelated factors are contributing to the observed chemical variation. Four of these factors are thought to reflect chemical properties of the atmosphere or airborne particulates; the fifth appears to be related in some way to metabolic activity in the living plant. The atmospheric factors are interpreted to be a) the ratio of terrestrial dust to ocean-derived salt in the local atmosphere, b) the regional variation in trace-element content of the terrestrial dust, c) the local concentration of automotive or technology-related lead-rich emissions, and d) higher concentrations of airborne vanadium east of the Mississippi River. If the intensity of the lead-rich factor in each sample is used as an index of general atmospheric pollution, sets of most polluted and least polluted samples may be defined. The estimates of abundance (arithmetic mean) are given for ash (Pb, Cu, Zn, Cd, Ni, and Cr) based on the 20 most polluted (MP) and 17 least polluted (LP) samples.

  16. Leadership in organizations with high security and reliability requirements; Liderazgo en organizaciones con altos requisitos de seguridad y fiabilidad

    Energy Technology Data Exchange (ETDEWEB)

    Gonzalez, F.

    2013-07-01

    Developing leadership skills in organizations is the key to ensure the sustain ability of excellent results in industries with high requirements safety and reliability. In order to have a model of leadership development specific to this type of organizations, Tecnatom in 2011, we initiated a project internal, to find and adapt a competency model to these requirements.

  17. CERN Computing Colloquia Spring Series: IT Security - A High-Performance Pattern Matching Engine for Intrusion Detection

    CERN Multimedia

    CERN. Geneva

    2006-01-01

    The flexible and modular design of the engine allows a broad spectrum of applications, ranging from high-end enterprise level network devices that need to match hundreds of thousands of patterns at speeds of tens of gigabits per second, to low-end dev...

  18. Potential roles of research in enhancing the performance of management in securing high quality visitor experiences in wilderness

    Science.gov (United States)

    Stephen F. McCool

    2012-01-01

    Does research help managers provide opportunities for visitors to have high quality experiences in wilderness? Difficulties in applying visitor experience research result from several factors: the nature of wilderness itself, the character of the wilderness visitor experience challenge as a research and management topic, and the paradigm of research applications...

  19. Longitudinal analysis of receptive vocabulary growth in young Spanish English-speaking children from migrant families.

    Science.gov (United States)

    Jackson, Carla Wood; Schatschneider, Christopher; Leacox, Lindsey

    2014-01-01

    The authors of this study described developmental trajectories and predicted kindergarten performance of Spanish and English receptive vocabulary acquisition of young Latino/a English language learners (ELLs) from socioeconomically disadvantaged migrant families. In addition, the authors examined the extent to which gender and individual initial performance in Spanish predict receptive vocabulary performance and growth rate. The authors used hierarchical linear modeling of 64 children's receptive vocabulary performance to generate growth trajectories, predict performance at school entry, and examine potential predictors of rate of growth. The timing of testing varied across children. The ELLs (prekindergarten to 2nd grade) participated in 2-5 testing sessions, each 6-12 months apart. The ELLs' average predicted standard score on an English receptive vocabulary at kindergarten was nearly 2 SDs below the mean for monolingual peers. Significant growth in the ELLs' receptive vocabulary was observed between preschool and 2nd grade, indicating that the ELLs were slowly closing the receptive vocabulary gap, although their average score remained below the standard score mean for age-matched monolingual peers. The ELLs demonstrated a significant decrease in Spanish receptive vocabulary standard scores over time. Initial Spanish receptive vocabulary was a significant predictor of growth in English receptive vocabulary. High initial Spanish receptive vocabulary was associated with greater growth in English receptive vocabulary and decelerated growth in Spanish receptive vocabulary. Gender was not a significant predictor of growth in either English or Spanish receptive vocabulary. ELLs from low socioeconomic backgrounds may be expected to perform lower in English compared with their monolingual English peers in kindergarten. Performance in Spanish at school entry may be useful in identifying children who require more intensive instructional support for English vocabulary

  20. Measuring Nutrition Literacy in Spanish-Speaking Latinos: An Exploratory Validation Study.

    Science.gov (United States)

    Gibbs, Heather D; Camargo, Juliana M T B; Owens, Sarah; Gajewski, Byron; Cupertino, Ana Paula

    2017-11-21

    Nutrition is important for preventing and treating chronic diseases highly prevalent among Latinos, yet no tool exists for measuring nutrition literacy among Spanish speakers. This study aimed to adapt the validated Nutrition Literacy Assessment Instrument for Spanish-speaking Latinos. This study was developed in two phases: adaptation and validity testing. Adaptation included translation, expert item content review, and interviews with Spanish speakers. For validity testing, 51 participants completed the Short Assessment of Health Literacy-Spanish (SAHL-S), the Nutrition Literacy Assessment Instrument in Spanish (NLit-S), and socio-demographic questionnaire. Validity and reliability statistics were analyzed. Content validity was confirmed with a Scale Content Validity Index of 0.96. Validity testing demonstrated NLit-S scores were strongly correlated with SAHL-S scores (r = 0.52, p internal consistency was excellent (Cronbach's α = 0.92). The NLit-S demonstrates validity and reliability for measuring nutrition literacy among Spanish-speakers.

  1. Validation of a Spanish version of the Revised Fibromyalgia Impact Questionnaire (FIQR)

    Science.gov (United States)

    2013-01-01

    Background The Revised version of the Fibromyalgia Impact Questionnaire (FIQR) was published in 2009. The aim of this study was to prepare a Spanish version, and to assess its psychometric properties in a sample of patients with fibromyalgia. Methods The FIQR was translated into Spanish and administered, along with the FIQ, the Hospital Anxiety Depression Scale (HADS), the 36-Item Short-Form Health Survey (SF-36), and the Brief Pain Inventory (BPI), to 113 Spanish fibromyalgia patients. The administration of the Spanish FIQR was repeated a week later. Results The Spanish FIQR had high internal consistency (Cronbach’s α was 0.91 and 0.95 at visits 1 and 2 respectively). The test-retest reliability was good for the FIQR total score and its function and symptoms domains (intraclass correlation coefficient (ICC > 0.70), but modest for the overall impact domain (ICC = 0.51). Statistically significant correlations (p FIQ scores, as well as between the FIQR scores and the remaining scales’ scores. Conclusions The Spanish version of the FIQR has a good internal consistency and our findings support its validity for assessing fibromyalgia patients. It might be a valid instrument to apply in clinical and investigational grounds. PMID:23915386

  2. A Study on the Dependable and Secure Relaying Scheme under High Resistance Earth Faults on HV, EHV Line

    Energy Technology Data Exchange (ETDEWEB)

    Kim, I.D.; Han, K.N. [Korea Electric Power Research Institute, Taejeon (Korea, Republic of)

    1997-12-31

    This report contains following items for the purpose of investigating and analyzing characteristics of high impedance ground faults. - Reason and characteristics identification of HIF - Modeling of power system - Testing of protective relays using RTD(Real Time Digital Simulator) - Staged ground faults test - Development of new algorithm to detect HIF - Protective coordination schemes between different types of relays - HIF monitoring and relaying scheme and H/W prototyping. (author). 22 refs., 28 figs., 21 tabs.

  3. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  4. 77 FR 4573 - Maritime Security Directive 104-6 (Rev 6); Guidelines for U.S. Vessels Operating in High Risk Waters

    Science.gov (United States)

    2012-01-30

    ... political complexity. Despite these efforts, piracy persists and the combination of piracy and weak rule of... Development, Naval Criminal Investigative Service, Customs and Border Protection, Transportation Security...

  5. Spanish translation and validation of the Preschool Activity Card Sort.

    Science.gov (United States)

    Stoffel, Ashley; Berg, Christine

    2008-05-01

    Few standardized assessments exist for children living in the United States who are Hispanic/Latino. This study reports the Spanish translation process for the Preschool Activity Card Sort (PACS), which is a measure of participation in preschool children, and examines content, construct, and concurrent validity. Methods of verifying accuracy of translation included expert review and back translation and supported content validity of the Tarjetas de Actividades Preescolares (TAP). Subsequently, a sample of 37 parents of children between 3 and 6 years of age completed the PACS/TAP by structured interview. Twenty-six parents were Spanish speaking, and 11 were English speaking. A comparison of reported participation by Spanish- and English-speaking children provides initial construct validity of the TAP. Results indicate that the TAP differentiates among children of recent immigrants as compared to preschoolers who were born in the United States on domains of self-care, high and low demand leisure, and educational activities. Results emphasize the importance of considering sociocultural influences when assessing participation. PACS/TAP scores were moderately correlated with Pediatric Evaluation of Disability Inventory scores for the self-care domain, but did not correlate with the mobility or social function domains. The PACS/TAP appears to provide a useful means of understanding preschoolers' participation. Future research is needed to further establish the validity of this assessment.

  6. Spanish version of Bus Drivers' Job Demands Scale (BDJD-24).

    Science.gov (United States)

    Boada-Grau, Joan; Prizmic-Kuzmica, Aldo-Javier; González-Fernández, Marcos-David; Vigil-Colet, Andreu

    2013-01-01

    Karasek and Theorell's Job Demands-Control Model argues that adverse health-related outcomes, both psychological and physiological, arise from a combination of high job demand and a low level of job control. The objective was to adapt Meijman and Kompier's Bus Drivers' Job Demands Scale (BDJD-24), which enables us to assess the job demands of bus drivers, to Spanish. The final version of the Spanish adaptation was applied to a sample made up of 287 bus drivers living in Spain (80.1% men and 19.9% women), whose average age was 40.44 (SD= 11.78). The results yielded a three-factor structure for the scale used: Time Pressure, Safety, and Passengers. These findings confirm that the Spanish version replicates the factor structure of the original English scale. The reliability of the three subscales was acceptable, ranging from .75 to .84. Furthermore, the subscales were also related to different external correlates and to other scales and showed good convergent and criterion validity. The present instrument can be used to evaluate job demands of bus drivers, as its psychometrics are substantially sound.

  7. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  8. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  9. Control system security in nuclear power plant

    International Nuclear Information System (INIS)

    Li Jianghai; Huang Xiaojin

    2012-01-01

    The digitalization and networking of control systems in nuclear power plants has brought significant improvements in system control, operation and maintenance. However, the highly digitalized control system also introduces additional security vulnerabilities. Moreover, the replacement of conventional proprietary systems with common protocols, software and devices makes these vulnerabilities easy to be exploited. Through the interaction between control systems and the physical world, security issues in control systems impose high risks on health, safety and environment. These security issues may even cause damages of critical infrastructures and threaten national security. The importance of control system security by reviewing several control system security incidents that happened in nuclear power plants was showed in recent years. Several key difficulties in addressing these security issues were described. Finally, existing researches on control system security and propose several promising research directions were reviewed. (authors)

  10. Zen and the art of information security

    CERN Document Server

    Winkler, Ira

    2007-01-01

    While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winkler's experiences making security understandable to the business world. Mr. Winkler is one of the most popular and highly rated speakers in the field of security, and lectures to tens of thousands of people a year. Zen and the Art of Information Security is based on one of his most well received international presentations.

  11. Spanish Teachers' Sense of Humor and Student Performance on the National Spanish Exams

    Science.gov (United States)

    Swanson, Peter B.

    2013-01-01

    Research suggests that second/foreign language teachers' sense of humor is directly related to many outcomes for teachers and their students. This research investigates the relationship between the perceived sense of humor of in-service Spanish teachers' (n?=?102) and their students' (n?=?5,419) score on the National Spanish Exams…

  12. Secure computing on reconfigurable systems

    OpenAIRE

    Fernandes Chaves, R.J.

    2007-01-01

    This thesis proposes a Secure Computing Module (SCM) for reconfigurable computing systems. SC provides a protected and reliable computational environment, where data security and protection against malicious attacks to the system is assured. SC is strongly based on encryption algorithms and on the attestation of the executed functions. The use of SC on reconfigurable devices has the advantage of being highly adaptable to the application and the user requirements, while providing high performa...

  13. Clozapine: an effective treatment for seriously violent and psychopathic men with antisocial personality disorder in a UK high-security hospital.

    Science.gov (United States)

    Brown, Darcy; Larkin, Fintan; Sengupta, Samrat; Romero-Ureclay, Jose L; Ross, Callum C; Gupta, Nitin; Vinestock, Morris; Das, Mrigendra

    2014-10-01

    A number of studies have demonstrated the anti-aggressive properties of clozapine in schizophrenia and its positive effect in borderline personality disorder. There is no published literature on the treatment of antisocial personality disorder (ASPD) with clozapine. We present a case series of 7 patients with primary ASPD and high psychopathic traits treated with clozapine, having a significant history of serious violence and currently detained in a UK based high-security hospital. A retrospective review of case notes was carried out to formulate Clinical Global Impression (CGI) scores and record incidents of violence and aggression. Effect on specific symptom domains (cognitive-perceptual, impulsive-behavioural dyscontrol, affective dysregulation) was also noted. Metabolic parameters and serum clozapine levels were also sampled. All 7 patients showed significant improvement on clozapine. It was shown to benefit all symptom domains, especially impulsive behavioral dyscontrol and anger. The number of violent incidents committed by 6 of the 7 patients reduced significantly, and all patients' risk of violence reduced. Clozapine serum levels for 6 of the 7 patients were in the range 150-350 ng/mL. Clozapine is of benefit in reducing the clinical severity of ASPD. It improved all symptom domains, especially impulsive-behavioral dyscontrol and anger, and reduced levels of aggression and violence, especially at lower doses (serum levels <350 ng/m). To our knowledge, this is the first account of clozapine treatment in patients with ASPD and high psychopathy.

  14. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  15. IT Convergence and Security 2012

    CERN Document Server

    Chung, Kyung-Yong

    2013-01-01

    The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.

  16. Rethinking Spanish: Understanding Spanish Speakers Motivations and Reasons to Opt for Either an English Only or a Dual English-Spanish Educational Program

    Science.gov (United States)

    Wright, Adrienne C.

    2017-01-01

    Spanish-speaking parents choose to enroll their children in either an English only or English-Spanish dual immersion program when presented with both choices. This ethnographic study explored parent's perceptions of the purpose, advantages, and disadvantages of learning in school in English only or in a dual English-Spanish. Through focus group…

  17. Mobile code security

    Science.gov (United States)

    Ramalingam, Srikumar

    2001-11-01

    A highly secure mobile agent system is very important for a mobile computing environment. The security issues in mobile agent system comprise protecting mobile hosts from malicious agents, protecting agents from other malicious agents, protecting hosts from other malicious hosts and protecting agents from malicious hosts. Using traditional security mechanisms the first three security problems can be solved. Apart from using trusted hardware, very few approaches exist to protect mobile code from malicious hosts. Some of the approaches to solve this problem are the use of trusted computing, computing with encrypted function, steganography, cryptographic traces, Seal Calculas, etc. This paper focuses on the simulation of some of these existing techniques in the designed mobile language. Some new approaches to solve malicious network problem and agent tampering problem are developed using public key encryption system and steganographic concepts. The approaches are based on encrypting and hiding the partial solutions of the mobile agents. The partial results are stored and the address of the storage is destroyed as the agent moves from one host to another host. This allows only the originator to make use of the partial results. Through these approaches some of the existing problems are solved.

  18. Biometric Template Security

    Directory of Open Access Journals (Sweden)

    Abhishek Nagar

    2008-03-01

    Full Text Available Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorization of the various vulnerabilities of a biometric system and discuss countermeasures that have been proposed to address these vulnerabilities. In particular, we focus on biometric template security which is an important issue because, unlike passwords and tokens, compromised biometric templates cannot be revoked and reissued. Protecting the template is a challenging task due to intrauser variability in the acquired biometric traits. We present an overview of various biometric template protection schemes and discuss their advantages and limitations in terms of security, revocability, and impact on matching accuracy. A template protection scheme with provable security and acceptable recognition performance has thus far remained elusive. Development of such a scheme is crucial as biometric systems are beginning to proliferate into the core physical and information infrastructure of our society.

  19. THE PHONOLOGICAL SYSTEM OF SPANISH

    Directory of Open Access Journals (Sweden)

    Claudia S. Salcedo

    2010-10-01

    Full Text Available Spanish articulatory phonetics, the classification of sounds and the physiological mechanism used in the production of phonemes are discussed in this article. The process of learning a language consists of classifying sounds within the target language. Since the learner may be hearing the utterance in a different way than the native speaker some objective criteria are needed to classify sounds. If these distinctions are not mastered, he may be perceived as sounding awkward. Other phonological processes are applied in informal situations due to socio-linguistic factors such as age, social class, and education. Sound deletion in particular phonological environments are not done randomly by the speaker, but by necessity to retain semantic comprehension. Allophonic choices within phonemes make up the dialect for a particular area.

  1. Cancer Health Literacy Test-30-Spanish (CHLT-30-DKspa), a New Spanish-Language Version of the Cancer Health Literacy Test (CHLT-30) for Spanish-Speaking Latinos.

    Science.gov (United States)

    Echeverri, Margarita; Anderson, David; Nápoles, Anna María

    2016-01-01

    This article describes the adaptation and initial validation of the Cancer Health Literacy Test (CHLT) for Spanish speakers. A cross-sectional field test of the Spanish version of the CHLT (CHLT-30-DKspa) was conducted among healthy Latinos in Louisiana. Diagonally weighted least squares was used to confirm the factor structure. Item response analysis using 2-parameter logistic estimates was used to identify questions that may require modification to avoid bias. Cronbach's alpha coefficients estimated scale internal consistency reliability. Analysis of variance was used to test for significant differences in CHLT-30-DKspa scores by gender, origin, age and education. The mean CHLT-30-DKspa score (N = 400) was 17.13 (range = 0-30, SD = 6.65). Results confirmed a unidimensional structure, χ(2)(405) = 461.55, p = .027, comparative fit index = .993, Tucker-Lewis index = .992, root mean square error of approximation = .0180. Cronbach's alpha was .88. Items Q1-High Calorie and Q15-Tumor Spread had the lowest item-scale correlations (.148 and .288, respectively) and standardized factor loadings (.152 and .302, respectively). Items Q19-Smoking Risk, Q8-Palliative Care, and Q1-High Calorie had the highest item difficulty parameters (difficulty = 1.12, 1.21, and 2.40, respectively). Results generally support the applicability of the CHLT-30-DKspa for healthy Spanish-speaking populations, with the exception of 4 items that need to be deleted or revised and further studied: Q1, Q8, Q15, and Q19.

  2. The Spanish radioactive waste management programme

    International Nuclear Information System (INIS)

    Beceiro, A.R.

    1994-01-01

    All radioactive waste management activities in Spain are controlled by the Empresa Nacional de Residuos Radiactivos, installed by royal decree in 1984. The programme for low- and intermediate-level wastes is well advanced. A near-surface repository for these type of wastes has been in operation since October 1992. The programme for high-level wastes including spent fuel from the operating nuclear power plants is progressing stepwise. As the first step, effforts are made to secure the temporary storage of spent fuel. Final disposal is envisaged in an deep repository in one of the main geological media available in Spain, namely, granite, salt and clay. (orig.) [de

  3. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  4. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  5. A Secure Web Application Providing Public Access to High-Performance Data Intensive Scientific Resources - ScalaBLAST Web Application

    International Nuclear Information System (INIS)

    Curtis, Darren S.; Peterson, Elena S.; Oehmen, Chris S.

    2008-01-01

    This work presents the ScalaBLAST Web Application (SWA), a web based application implemented using the PHP script language, MySQL DBMS, and Apache web server under a GNU/Linux platform. SWA is an application built as part of the Data Intensive Computer for Complex Biological Systems (DICCBS) project at the Pacific Northwest National Laboratory (PNNL). SWA delivers accelerated throughput of bioinformatics analysis via high-performance computing through a convenient, easy-to-use web interface. This approach greatly enhances emerging fields of study in biology such as ontology-based homology, and multiple whole genome comparisons which, in the absence of a tool like SWA, require a heroic effort to overcome the computational bottleneck associated with genome analysis. The current version of SWA includes a user account management system, a web based user interface, and a backend process that generates the files necessary for the Internet scientific community to submit a ScalaBLAST parallel processing job on a dedicated cluster

  6. Quantifying risk: verbal probability expressions in Spanish and English.

    Science.gov (United States)

    Cohn, Lawrence D; Vázquez, Miguel E Cortés; Alvarez, Adolfo

    2009-01-01

    To investigate how Spanish- and English-speaking adults interpret verbal probability expressions presented in Spanish and English (eg, posiblemente and possibly, respectively). Professional translators and university students from México and the United States read a series of likelihood statements in Spanish or English and then estimated the certainty implied by each statement. Several terms that are regarded as cognates in English and Spanish elicited significantly different likelihood ratings. Several language equivalencies were also identified. These findings provide the first reported evaluation of Spanish likelihood terms for use in risk communications directed towards monolingual and bilingual Spanish speakers.

  7. Biometric Template Security

    OpenAIRE

    Abhishek Nagar; Karthik Nandakumar; Anil K. Jain

    2008-01-01

    Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorizat...

  8. The Use of Questionnaires in Safety Culture Studies in High Reliability Organizations. Literature Review and an Application in the Spanish Nuclear Sector; El Uso de Cuestionarios en Estudios de Cultura de Seguridad en Organizaciones de Alta Fiabilidad. Revision de la Literatura y una Aplicacion en el Sector Nuclear Espanol

    Energy Technology Data Exchange (ETDEWEB)

    German, S.; Navajas, J.; Silla, I.

    2014-07-01

    This report examines two aspects related to the use of questionnaires in safety culture research conducted in high reliability organizations. First, a literature review of recent studies that address safety culture through questionnaires is presented. Literature review showed that most studies used only questionnaires as a research technique, were cross-sectional, applied paper-based questionnaires, and were conducted in one type of high reliability organization. Second, a research project on safety culture that used electronic surveys in a sample of experts on safety culture is discussed. This project, developed by CISOT-CIEMAT research institute, was carry out in the Spanish nuclear sector and illustrates relevant aspects of the methodological design and administration processes that must be considered to encourage participation in the study.. (Author)

  9. Radiation protection training programmes Spanish approach

    International Nuclear Information System (INIS)

    Arboli, M. Marco; Suarez, M. Rodriguez; Cabrera, S. Falcon

    2002-01-01

    Radiation Protection Programmes are being considered the best way to promote safety culture and to spread and propagate European basic safety standards. It is widely accepted that training is an important tool to upgrade competence for radiation exposed workers. The Spanish Radiation Protection Education and Training Programmes provide a solid and integrated educational model, which takes into account the variety of applied fields, the different levels of responsibilities, the technological and methodological advances, as well as the international tendencies. The needs for a specialised training on Radiation Protection (RP) for exposed workers appears into the Spanish regulation in 1964. National initial training programmes are well established since 1972. Individual certifications, based on personal licences are required for exposed workers. The Spanish regulation also includes continuous and on the job RP training. The educational programmes are being continuously updating and improving. CIEMAT plays an important role in RP Spanish training, improving and modifying the previous RP courses and developing new programmes in order to complete the RP training levels. To achieve Radiation Protection objectives, new technological media for educational methods and material are taking into account. Nevertheless, Spanish RP education and training model has to be improved in some aspects. The purpose of this paper is to analyse the situation and the future needs to be considered in order to complete the RP training processes

  10. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  11. [The possibility of registering in the Spanish Civil Registry children born abroad from surrogate mothers].

    Science.gov (United States)

    De Barrón Arniches, Paloma

    2009-01-01

    In the Spanish Civil Registry it is now possible to register "natural" children of a homosexual marriage born overseas through surrogate pregnancy. And this is despite article 10.1 of the current Spanish law regarding assisted human reproduction techniques, which declares fully null and void contracts renouncing maternal relationship, and orders imperatively that in these cases, the relationship of children is determined by birth. This article analyses and formulates a criticism regarding the Resolution of the Office of Registries and Notaries, of February 18, 2009, insisting on some relevant issues such as legal security and greater interest of the minor, in the context of the analysis of the facts of the case and the arguments put forward in the resolution.

  12. Spanish experience in the use of synthetic geo membranes for hydraulic works

    International Nuclear Information System (INIS)

    Blanco Fernandez, M.; Leiro Lopez, A.

    2014-01-01

    The Spanish institution Centro de Estudios y Experimentacion de Obras Publicas (CEDEX) has studied for decades the behaviour of geosynthetic products, specially the polymeric geosynthetic barriers used as waterprofing systems of different hydraulic works, mainly in reservoirs. Both in geotextiles or related products and in geomembranes, initial characteristics are determined; besides of that, periodic controls along the service life are performers in geomembranes. The monitoring of more than two hundred hydraulic structure hydraulic structures requires technical inspection, taking samples and replacing them, experimental tests and recommendations, with the purpose of increasing security and durability in hydraulic structures. Because of that, the Spanish experience in this field of technology is presented along this paper. (Author)

  13. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  14. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  15. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  16. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  17. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  18. Developing Scalable Information Security Systems

    Directory of Open Access Journals (Sweden)

    Valery Konstantinovich Ablekov

    2013-06-01

    Full Text Available Existing physical security systems has wide range of lacks, including: high cost, a large number of vulnerabilities, problems of modification and support system. This paper covers an actual problem of developing systems without this list of drawbacks. The paper presents the architecture of the information security system, which operates through the network protocol TCP/IP, including the ability to connect different types of devices and integration with existing security systems. The main advantage is a significant increase in system reliability, scalability, both vertically and horizontally, with minimal cost of both financial and time resources.

  19. Marginalia. The Literary Independence of Spanish America

    Directory of Open Access Journals (Sweden)

    Juan Guillermo Gómez García

    2010-12-01

    Full Text Available This article discusses some of the characteristic problems and issues of the so-called “literary independence” of Spanish America in the light of its political emancipation from Spain. This topic goes beyond the temporal framework or the periodization of the wars of independence; instead, it covers the entire nineteenth century and part of the twentieth, and appears discontinuously and non-simultaneously in the different nations. The path followed by Spanish American literature was filled with vicissitudes,manifestations, and regressions of diverse types. The paper specifically analyzes La biblioteca americana and El repertorio americano by the Venezuelan, Andrés Bello, and Juan García del Río, a native of Cartagena, as well as the role of the young Argentinean Domingo F. Sarmiento, author of Facundo, in the genesis and first outlines of an independent Spanish American “literary expression”.

  20. THE SPANISH SCIENTIFIC JOURNALS: A DESCRIPTIVE APPROACH

    Directory of Open Access Journals (Sweden)

    Melba G. Claudio-González

    2017-02-01

    Full Text Available The main objective of this article is to present a broad description of Spanish scientific journals. The results were obtained from a survey distributed to 1,280 editors of Spanish scientific journals included in Dulcinea database (2012 edition. The response rate was 43,8%. As specific objectives, the study aimed to characterize scientific journals and to analyze the particularities of a set of parameters that make up the economic, strategic and operational dimensions of the journals in the period studied. The results show that the funding model of the Spanish scientific journals depends mainly on institutional support, that many journals lack a stable organizational structure and rely heavily on volunteer work, and that the debate on the limitations and difficulties affecting the development of open access remains open.

  1. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  2. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  3. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  4. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  5. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  6. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  7. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  8. Spanish program of advanced Nuclear Power Plants

    International Nuclear Information System (INIS)

    Marco, M.; Redon, R.

    1993-01-01

    The energy Spanish Plan is promoting some actions within the area of advanced reactors. Efforts are focussed onto the European Program of Advanced Reactors, the Program of Passive Plants (EPRI), European Fast Reactor Project and the APWR-1000 Program of INI. Electrical sector utilities and industrial partners supported by the Administration have organized an steering committee. The program of Passive Plants includes activities on Qualification, design and detailed engineering (Qualification project, SBWR project of G.E. and AP600 Project of Westinghouse. The european project on advanced plants has the following Spanish contribution: Analysis of alternative Dossier on European requisites (EUR) and Design of an European Reactor (EPR)

  9. Technology transfer in the Spanish nuclear programme

    International Nuclear Information System (INIS)

    Perez-Naredo, F.

    1983-01-01

    The paper describes the process of technology transfer under the Spanish nuclear programme and its three generations of nuclear power plants during the last 20 years, with special reference to the nine new plants equipped with Westinghouse pressurized water reactors and the rising level of national involvement in these stations. It deals with the development of Westinghouse Nuclear's organization in Spain, referring to its staff and to the manufacturers who supply equipment for the programme, going into particular detail where problems of quality assurance are concerned. In conclusion, it summarizes the present capacity of Spanish industry in various areas connected with the design, manufacture and construction of nuclear power plants. (author)

  10. Lexical Borrowings in Spanish: Function, Length, Genealogy and Chronology.

    Science.gov (United States)

    Patterson, William T.

    1986-01-01

    A study reveals that lexical borrowing in Spanish, from a variety of languages including Latin, French, Italian, Greek, Arabic, Provencal, and Catalan, accounts for 41 percent of the basic Spanish vocabulary, with variation in source according to historical period. (MSE)

  11. Intrapreneurship in the Spanish context : a regional analysis

    NARCIS (Netherlands)

    Turro Sol, A.; Alvarez, Claudia; Urbano, David

    2016-01-01

    The objective of this article is to examine the influence of internal and external (environmental) factors on intrapreneurship in the Spanish context, considering differences among regions. Methodologically, the study applies logistic regression and uses data from the Spanish Global Entrepreneurship

  12. Remarks on the elaboration of an English–Spanish ...

    African Journals Online (AJOL)

    Spanish word-combination dictionary examined here, some concluding remarks are made with regard to the educational implications of this kind of dictionary primarily aimed at intermediate- to advanced-level Spanish-speaking EFL learners.

  13. A Prototype Analysis of Spanish Indeterminate Reflexive Constructions.

    Science.gov (United States)

    Turley, Jeffrey S.

    1998-01-01

    Discussion of the Spanish indeterminate reflexive construction, the impersonal reflexive, finds that prototype theory allows this subjectless Spanish construction to be included within the category of generally subject-bearing indeterminates in Romance languages. (MSE)

  14. Working with Spanish-Speaking Latin American Students in Toronto

    Science.gov (United States)

    Duran, Marcela S.

    1978-01-01

    The problems affecting the reception, adjustment, and placement of Spanish-speaking students into the Toronto school system are discussed, and include immigration patterns, Spanish values, and the Latin American school. (Author/HP)

  15. THz and Security Applications

    CERN Document Server

    Sizov, Fedir; Detectors, Sources and Associated Electronics for THz Applications

    2014-01-01

    These proceedings comprise invited papers from highly experienced researchers in THz technology and security applications. THz detection of explosives represents one of the most appealing technologies to have recently emerged in dealing with terrorist attacks encountered by civil security and military forces throughout the world. Discussed are the most advanced technologies and developments, the various points of operational strength and weaknesses as well as are suggestions and predictions the best technological solutions to  overcome current operational limits.  The current status of various levels of cooling in THz detectors, sources and associated electronics are also addressed. The goal was to provide a clear view on the current technologies available and the required advances needed in order to achieve more efficient systems. This goal was outlined in part by establishing the baseline of current uncertainty estimations in physics-based modelling and the identification of key areas which require additi...

  16. Security and policy driven computing

    CERN Document Server

    Liu, Lei

    2010-01-01

    Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses con

  17. Cyber security of critical infrastructures

    Directory of Open Access Journals (Sweden)

    Leandros A. Maglaras

    2018-03-01

    Full Text Available Modern Supervisory Control and Data Acquisition (SCADA systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the Internet of Things, SCADA has evolved into big, complex and distributed systems that are prone to be conventional in addition to new threats. Many security methods can be applied to such systems, having in mind that both high efficiency, real time intrusion identification and low overhead are required. Keywords: SCADA systems, Security

  18. Embedding security messages in existing processes: a pragmatic and effective approach to information security culture change

    CERN Document Server

    Lopienski, Sebastian

    Companies and organizations world-wide depend more and more on IT infrastructure and operations. Computer systems store vital information and sensitive data; computing services are essential for main business processes. This high dependency comes with a number of security risks, which have to be managed correctly on technological, organizational and human levels. Addressing the human aspects of information security often boils down just to procedures, training and awareness raising. On the other hand, employees and collaborators do not adopt security attitude and habits simply when told to do so – a real change in behaviour requires an established security culture. But how to introduce a security culture? This thesis outlines the need of developing or improving security culture, and discusses how this can be done. The proposed approach is to gradually build security knowledge and awareness, and influence behaviours. The way to achieve this is to make security communication pervasive by embedding security me...

  19. Security threads: effective security devices in the past, present, and future

    Science.gov (United States)

    Wolpert, Gary R.

    2002-04-01

    Security threads were first used to secure banknotes in the mid 1800's. The key to their anti-counterfeiting success was the fact that by being embedded in the paper, they became an integral part of the banknote substrate. Today, all major currencies still utilize this effective security feature. Technological developments have allowed security threads to evolve from a feature authenticated by only visual means to devices that incorporate both visual and machine detectable components. When viewed from the perspective of a thread being a carrier of various security technologies and the fact that they can be incorporated into the core substrate of banknotes, documents, labels, packaging and some high valued articles, it is clear that security threads will remain as effective security devices well into the future. This paper discusses a brief historical background of security threads, current visual and machine authentication technologies incorporated into threads today and a look to the future of threads as effective security devices.

  20. Augmentation of clozapine with amisulpride: an effective therapeutic strategy for violent treatment-resistant schizophrenia patients in a UK high-security hospital.

    Science.gov (United States)

    Hotham, James E; Simpson, Patrick J D; Brooman-White, Rosalie S; Basu, Amlan; Ross, Callum C; Humphreys, Sharon A; Larkin, Fintan; Gupta, Nitin; Das, Mrigendra

    2014-10-01

    Clozapine is used in the management of treatment-resistant schizophrenia and is effective in reducing aggression; however a subgroup of patients is poorly responsive. For violent patients in this group, there is limited literature on the use of strategies to augment clozapine with other agents. Here we present a case series of 6 schizophrenia patients, within a high-security hospital, who have a history of serious violence and who were treated with clozapine augmented with amisulpride. We reviewed case notes and health records for evidence of violence/aggression and positive factors such as engagement in activities, and Clinical Global Impression (CGI) scores were formulated. We also examined metabolic parameters before and after augmentation. All 6 of the patients showed clinical improvement in symptoms and a reduction in their risk of violence to others. Five patients had a reduction in number of violent/aggressive incidents, and all patients showed improvement in engagement in occupational, vocational, and/or psychological work. Metabolic parameters were largely unchanged except for 1 patient whose Body Mass Index (BMI) increased. Five patients reported side effects as unchanged or improved. These schizophrenia patients with a history of violence showed clinical improvement and reduced aggression and violence with amisulpride augmentation of clozapine. To our knowledge, this is the first report of an antiaggressive benefit of this combination in forensic psychiatric patients. Further studies are warranted to establish the efficacy and anti-aggressive effects of amisulpride augmentation of clozapine.